Computer Science Project Topics

Design and Implementation of a Security Information System (A Case Study of the Nigerian Police)

Design and Implementation of a Security Information System (A Case Study of the Nigerian Police)

Design and Implementation of a Security Information System (A Case Study of the Nigerian Police)

Chapter One

 OBJECTIVES OF THE STUDY

The general objective of the study is to develop a database for security information storage and retrieval.

Specifically, the following objectives are also considered:

  1. To build a database system for police security
  2. To develop a software for managing security
  3. To determine the effectiveness of Nigerian police in managing signal.

CHAPTER TWO

LITERATURE REVIEW

SECURITY INFORMATION SYSTEM

System is the degree of protection against danger, damage, loss and crime. Security as a form of protection is structures and processes that provide or improve security as a condition. The Institution for Security and Open Methodologies (ISECOM) in the OSSTMM 3  defines security as a “form of protection where a separation is created between the assets and the threat”. This includes but is not limited to the elimination of either the asset or the threat. Security as a national condition was defined in a United Nations study (1986) so that countries can develop and progress safely.

Security has to compare to related concepts: safety, continuity, and reliability, the key difference between security and reliability is that security must take into account the actions of people attempting to cause destruction. Different scenarios also give rise to the context in which security is maintained.

With respect to classified matter, the condition that prevents unauthorized persons from having access to official information that is safeguarding in the interest of the national security.

Measures taken by a police unit, an activity or installation to protect itself against all acts designed to, or which may, impair its effectiveness.

Perception of security may be poorly mapped to measurable  objective security. For example, the fear of earthquakes has been reported to be more common than the fear of slipping on the bathroom floor although the latter kills more people than the former. Similarly, the perceived effectiveness of security measures is sometimes different from the actual security provided by those measures. The presence of security protection may even be taken for security itself. For example, two computer security programs could  be interfering with each other and even cancelling each other’s effect while the owner believes he/she is getting double of the protection.

Security Theater is a critical form for the deployment of measures primarily aimed at raising subjective security in a population without a genuine commensurate concern for the effects of that measure on- and possibly decreasing- objective security.

Perception of security can also increase objective security when it affects or deters malicious behavior, such with the vital signs of security protections, such as video surveillance, alarm systems in a home, or an anti-theft system in a car such as Lojack, signs.

For example, approach a car, break the window, and flee in response to an alarm being triggered. Either way, perhaps the car itself or the objects inside aren’t stolen, but with perceived security even windows of the car has a lower chance of being damaged, increasing the financial security of the owner(s).

However, the non-profit , security research group, ISECOM, has determined that such signs may actually increase the violence, daring, and desperation of the intruder. This claim shows that perceived security works mostly on the provider and not the security at all. It is important, however, for signs advertising security not to give clues as to how to subvert that security, for example in the case whereby a home burglar might be more likely to break into a certain home if he or she is able to learn beforehand which company makes the security system.

Private security and public provide some of the same services and sometimes they even mirror each other, but there are distinct differences among the similarities. The scopes of their duties are different and each has advantages and disadvantages.

Allen Pinkerton (1855) established the first private police organization (Northwest Police Organization), by the end of the century, other organizations like Burns and Wackenhut were also established. Contact security guards were used heavily by industrial companies in the early part of the 20th century and were used as strikebreakers. In (1930), The Ford Motor Company had a private force of 3,500 called “The Ford Service”. Private security is contracted services to companies, people or organizations for the protection of personnel and property. Private Security includes guard services, private investigators, bodyguards any detail (in house) detectives as also mobile patrols. All of these positions have the power of police on any property that is private or have an open contract. The reason behind this is because public police have no power or jurisdiction of any kind on private property. Police can’t even go onto private property at all unless they have been invited on to that property by the owner and has the owners ok to be there. In almost all cases security need some training and licensing, but fewer restraints than public police on the licensing and training.

 

CHAPTER THREE

 METHODOLOGY AND ANALYSIS OF THE EXISTING SYSTEM

The existing system is manually carried out. Information on military signals is stored in an office file. Their personal data are being collected and each person has a file created for him or her.

Search on these files takes time. One has to go through the whole files in search of a particular record. This is cumbersome, hence the need for the computerization of the system.

FACT FINDING METHOD

Different methods adopted in the collection and gathering Data and Information for the project include, interview, Reference, and written texts.

INTERVIEW METHOD

This was done between the researcher and the Nigerian police authorities. Reliable facts were gotten based on the questions posed to them by the researcher.

REFERENCE TO WRITTEN TEXT

Security information documentations were studied and a lot of information concerning the system in question was obtained. Some forms that are necessary and available were assessed. Also internet downloads was made to obtain some text materials.

CHAPTER FOUR

 DESIGN OF THE NEWSYSTEM

 Output Specification and Design

The output design was based on the inputs. The report generated gives a meaningful report to the management. The system designed generated the following reports.

  1. Security Information Report
  2. Police Report

These outputs can be generated as softcopy or printed in hard copy.

CHAPTER FIVE

 SUMMARY, RECOMMENDATION AND CONCLUSIONS

 SUMMARY

Information in its most restricted technical sense is an ordered sequence of symbols that record or transmit a message. It can be recorded as signs, or conveyed as signals by waves. Information is any kind of event that affects the state of a dynamic system. As a concept, however, information has numerous  meanings. Moreover, the concept on information is closely related to motions of constraint, communication, control, data, form, instruction, knowledge, meaning, mental stimulus, pattern, perception, representation, and especially entropy.

The measures adopted to maintain national security in the face of threats to society has led to ongoing dialectic, particularly in the liberal democracies, on the appropriate scale and role of authority in matters of civil and human rights.

Tension exists between the preservation of the state (by maintaining self-determination and sovereignty) and the  rights and freedoms of individuals. Although national security measures are imposed to protect society as a whole, many such measures will restrict the rights and freedoms of all individuals in society. The concern is that where the exercise of national security laws and powers I not subject to good governance, the rule of law, and strict checks and balances, there is a risk that “national security” may simply serve as a pretext for suppressing unfavorable political and social views.

CONCLUSION

For much of police history the armed forces were considered to be for use by the heads of their societies, until recently, the crowned heads of states. In a democracy of other political system run in the public interest, it is a public force.

The relationship between the police and the society it serves is a complicated and ever-evolving one. Much depends on the nature of the society itself and whether it sees the police as important, as for example in time of threat or war, or a burdensome expense typified by defense cuts in time of peace

RECOMMENDATION

 The following recommendations are made:

That this system be implemented by Nigeria police to enable them go into computerized information system.

Also schools should expose students to some more relevant programming languages like visual basic so as to enable them carry out their projects on their own.

Libraries should b well equipped to simplify the work for the students and especially during the research phase.

These relationships are seen from the perspective of political police relations, the police industrial complex mentioned above, and the socio-police relationship. The last can be divided between those segments of society that offer for the police, those who voice oppositions to the police, the voluntary and involuntary civilians in the police forces, the populations of civilians in combat zone, and of course the police self-perception.

Police often function as societies within societies, by having their own police communities, economies, education, medicine and other aspects of a functioning civilian society. Although a police is not limited to nations in of itself as many private police companies (or PPC’s) can be used or “hired” by organizations and figures as security, escort, ot other means of protection where police, agencies, or militaries are absent or not trusted.

REFERENCES

  • Cynthia, A. (2008). U.S. National Security: A Reference Handbook. India: Pretience Hall. pp.223.
  • Depuy, T. N. (1992). Understanding War: History And Theory Of Combat. London:Leo Cooper Inc.
  • Kayode, F. J. (2003). Governing The Security Sector in a Democratizing Polity. Niger: Zed Books
  • MAIER, C. S. (1990). Peace & Security For the 1990’s. New York Oxford Press.pp.132-134.
  • Olunsegun O. (1980). My Command: An Account Of The Nigerian Civil war. Ibadan: Heinemann Publishers:
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!