You are on page 1of 56

A COMPUTERIZED PRISON INFORMATION MANAGEMENT

SYSTEM FOR NIGERIAN PRISON SERVICE UMUAHIA

BY:

EKPO ROWLAND NNA

MOUAU/CMP/15/82980

IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR' THE

AWARD OF THE DEGREE OF BACHELOR OF SCIENCE (BSc.) IN

COMPUTER SCIENCE

REQUIREMENT OF THE COURSE CSC 499

DEPARTMENT OF COMPUTER SCIENCE

COLLEGE OF PHYSICAL AND APPLIED SCIENCES

MICHEAL OKPARA UNIVERISTY OF AGRICULTURE UMUDIKE,

ABIA STATE

SUPERVISOR:

ENGR. DR. MRS. NNOCHIRI IFEOMA U.

January, 2020
CERTIFICATION
This is to certify this work "A COMPUTERIZED PRISON INFORMATION MANAGEMENT
SYSTEM FOR NIGERIAN PRISON SERVICE UMUAHIA" was carried out by EKPO
ROWLAND NNA with Registration number MOUAU/CMP/15/82980 in the Department of
Computer Science, College of Physical and Applied Sciences, Michael Okpara University of
Agriculture, Umudike under the supervision of Engr. Dr. Mrs. Nnochiri Ifeorna U. The literature
review in this report has been duly acknowledged in the text and a list of references provided.

- O/ - 2
Ek a Rowland Nna Date
Student

I Engr. Dr. Mrs. Nnochiri Ifeoma U. Date


Supervisor

7.. -ZQZO
vIarc N. Ogbuagau (PhD) Date
\Uead of Departrnen

External Supervisor Date


DEDICATION
I dedicate my Report work to God Almighty for His goodness, mercies, guidance and grace and
for seeing me through the period of research and preparation of this work.
V
ACKNOWLEDGEMENTS
My deepest gratitude is to God Almighty who played a major role in aiding this research through
the gift of life, knowledge and understanding.

I also express my gratitude to my Supervisor and Lecturer Engr. Dr. Mrs .Nnochiri Ifeoma U. for
her diligent reviews and useful comments which have added to the quality of this research; Also
to my indefatigable lecturers of the Computer Science Department (MOUAU) mostly my I-lead
of Department (H.O.D) Marc N. Ogbuagau (PhD) and the Dean of COLPAS for their tireless
effort in the knowledge they imbibed in me, I acknowledge my Course Adviser Dr. Obinna
Beloved, Miss Chioma, Mr. Charles Osadeke, Mr. Etuk Emmanuel, Mr. Ihejirika.

My Heartfelt appreciation goes to my beloved parents Mr. and Mrs. N.C. Ekpo who is the brain
store of my academic pursuit for their financial support, parental advice and spiritual aspirations
to me. I am also indebted to my lovely siblings: Ijeoma Ekpendu, Glory Ogbonna, Theresa
Rowland, Josiah and Pleasure Rowland and my entire friends who have in one way or the other
contributed to my welfare while in school I say a very big thank you to you all.
ABSTRACT

Management of prisons in Nigeria has long been a neglected area which has recently been
incorporated in the 20-20 vision document under the e-governance. Currently, prisoner's records
are maintained in a very rudimentary way in the form of manual files and registers. This method
of data management often results in human error, delay to retrieve information etc. Thus, A
Computerized Prison Information Management System was designed and implemented to
manage prisoner's records for the Nigerian Prison Service Umuahia command. This project was
done using basic Html for visible web contents, PHP for server scripting and MySQL database
was used to store and manage the prisoner's records. Tools used to achieve this Project includes
Dreamweaver CS5 html editor, CSS3 for styling, Java Script, PHP Wamp5 server and MySQL.
The project was implemented successfully and the result obtained provides a single management
system which integrates all the information about a prisoner in a single profile and can easily be
accessed with improved the overall efficiency of prison management.

iv
TABLE OF CONTENT
CERTIFICATION I
DEDICATION II
ACKNOWLEDGEMENT III
ABSTRACT IV
TABLE OF CONTENT V
LIST OF TABLES VI
LIST OF FIGURES VII
CHAPTER ONE: INTRODUCTION
1.1 Background of the study 1
1.2 Statement of Problem 1
1.3 Aims and Objective of the study 2
1.4 Significance of the study 2
1.5 Scope of the study 2
1.6 Limitation of the study 2
1.7 Methodology of the study 3
1.8 Definition of terms 3

CHAPTER TWO: LITERATURE REVIEW


2. 1 Introduction 4
2.2 Managerialism In The Context of the Prison 4
2.3 Database management System 5
2.4 Management Information System 9
2.5 Review of Prison management System 13
2.6 Human Resource Management 14

ChAPTER THREE: METHODOLOGY AND SYSTEM ANALYSIS


3.1 Research Methodology 18
3.2 Method of data collection 19
3.3 System investigation 22
3.4 System analysis 22

CHAPTER FOUR: SUMMARY/CONCLUSION, LIMITATIONS AND FUTURE SCOPE


4.1 Overview of system design 24
4.2 Input/forms design 24
4.3 Process design 27
4.4 Output design 28
4.5 Database design 28
4.6 Program design 29
4.7 System implementation 30
4.8 Project Costing 33
CHAPTER FIVE: SUMMARY, RECOMMENDATIONS AND CONCLUSION,
5.1 Summary 34
5.2 Recommendations 34
5.3 Conclusion 34

V
REFERENCES 37

APPENDIX A

APPENDIX B

APPENDIX C

vi
LIST OF TABLES
Table 4.5: Structure of the Admin table 28
Table 4.5.1: Structure of the Prisoners table 29
Table 4.7.1: Hardware requirements 31
Table 4.7.2: Software requirements 31
Table 4.8: Project costing 33

VII
LIST OF FIGURES

Figure 2.1: Fields of HRM (source: Abecker et a!, 2004) 16


FiguIe 3. 1: Basic Water wall Model 18
Figure 3.2: Advance Waterfall Model 19
Figure 4.1: Input specification for Login details. 24

Figure 4.2: The input design shows the prisoner's registration form 25

Figure 4.3: the input design shows the Admin registration form 26

Figure 4.4: The input shows how to edit the prisoner's profile 27

VIII
CHAPTER ONE

INTRODUCTION

1.1 Background Of The Study

In this information age, coupled with the increasingly large number of people that commit crime,
and are involved in other social vices. Places such as the prisons, are in dire need for acquisition
of appropriate information system to record, compute and store information and disseminate the
information for management use, towards affective prison management. Information is an
important resource in the effective management of any organization. Information is any fact or
set of facts, which is useful in making a specific decision among alternative courses of action.
The information potential of data is enhanced by refinement, which involves selection,
processing, sorting and re-organizing the Data into a usable form and transmission to the
appropriate end-users. Nigerian prisons are complex in terms of the organizational structure,
number, and rapid increase in inmate population. There is therefore the need for an effective
Management Information System (MIS) in Nigerian prisons, possible only through adequate
provision and effective use of important system.

1.2 Statement Of The Problem


The following necessitate the carrying out of his project-
V Umuahia Prison Services still keep record in the old fashioned way of recording in paper
and filling them into shelves which makes them vulnerable to unofficial changes e.g.
changing of inmate's name, crime committed or even carry away the entire file.
V Statistics is the bedrock of decision making in every society, having a reliable source of
such statistics would help government plan and budget effectively.
V Most inmates are often known to give fake name when being caught. So there is a need
for an information system that can automatically allocate special identification number
and capture their biometrics (Finger prints and photographs).
V More often than not, due to the bulk of case file in the various prisons in Nigeria, sorting
out a particular case file of an inmate could be frustration especially those that have
stayed for long.
1.3 Aim And Objectives Of The Study
The projects aim is to propose an effective and a Computerized Management Information
System (CMIS) in Umuahia Prison Services.
This project seeks to achieve the following objectives:-
V Design an information system capable of capturing and storing information on the
Activities of an inmate and personal details.
V Emphasize the importance of an information system in Urnuahia prison management.
V Record the health details of inmates such as impairment.

1.4 Significance of the Project.


The nature of the project is such that outcome of the project could be measured such as:
V Automatic detection of duplication.

V Immediate generation of report on categorization of prisoners on basis of their cases,

period of confinement etc.


V Automatic calculation of Remission to be granted to a convict prisoner for good

behavior, discipline etc.


V Reduction in the cost (saving of resources) of physical production of prisoners in courts.

1.5 Scope Of The Study


Information system generally deals with recording, processing and storing information to aid
decision making in every given organization. We briefly discuss the problems intended to be
solved using computerized prison management information system. Information system terms
and definitions to toe used in this project are only the ones relevant to our study of prison
management system and not the myriad of terms.

1.6 Limitations Of The Study


The following Limitations are anticipated during the project research:-
V The information system designed depends on computer hardware, hence would

require computers to run.


V The ability of the prison wards to know what features would be needed on the

information system as most of them may not be computer literate.

2
1.7 Methodology Of The Study
The following methods will be used to acquire information for this project:-
V Articles on computerized prison information management system would be downloaded
from the internet.
/ Past and ongoing research work on computerized prison information management system
would be sourced from journals, books and the internet.
V Visits will be made to Umuahia prison to ascertain the lapses on the current mode of

capturing and storing activities of inmate and how it could be computerized. This will be
the bases for our proposed system.
/ Information on United Nations recommendation on prison.
V Propose a model for Umuahia Prison Information Management System.
V Implement the model.

1.8 Definition of Terms


> Data: This can be defined as facts about the organizations and its business transaction.
> Information: This can be defined as data that has been transformed and organized by
processing and purposeful intelligence.
> Information system: This is an arrangement of people, data, processes and interface that
interact to support and improve day to day operation in a business as well as support the
problem solving and decision making needs for management and users.
> Management: It is the coordination of all resources of an organization through the
process of planning, organizing, and controlling in order to attain organizational
objectives.

3
CHAPTER TWO
LITERATURE REVIEW
2.1 Introduction
The criminal justice system runs on information about criminal incidents, people who are
incarcerated either serving their sentence or awaiting trial. There is information about the court
process including scheduled events and outcomes of past events. All of this information affects
the way people are treated in the system and perhaps impacts the final outcome of any individual
case. The quantity and timeless of information are crucial to participants in the system.
Information flows can also affect the way the entire system works. The efficiency of then system
and the quality of justice dispensed are highly inter-related. Administrators must be able to
understand the flow of cases through their system.

2.2 Managerialism In The Context Of The Prison


Managerialism has been a developing political philosophy for many years and wa particular
feature of Thatcherite governments in the UK. Since 1997 the British Labour Government has
developed 'a Third Way through the processes of managerialism and modernization of public
services in order to achieve greater efficiency, effectiveness and value for money. The origin for
this policy was cited by McLaughlin and Munice (2000) and was a departure from the traditional
left and right debates which have been a feature of British Labour and Conservative parties.
Managerialism is a central plank of this new way which in criminal justice system matters has
spawned the slogan "tough on crime and tough on the causes of crime". In this way "an amalgam
of Mangerialism, communitarian and authoritarian populist ideas have been pulled together
under the phrase 'modernization' (McLaughlin and Munice, 2000). 1-lence the impetus for having
an integrated joined up criminal justice system (Carter, 2003, Blunkett, 2004). "Managerialism -
like professionalism - defines a set of expectations, value and beliefs. It is a normative system
concerning what counts as valuable knowledge, who knows it, and who is empowered to act in
what ways as a consequence" (Clarke et al, 2000). This form of mangerialism brings about
changes in power, knowledge and calculation within 4 organizations, between organization and
in the organization of social welfare" (Clarke et al, 2000). It has the potential to make the internal
workings of social welfare organizations more open and subject to public debate and to allow
politicians a greater degree of overall social control. The question is whether such a policy thrust

4
is more concerned with issues of social control or whether it is concerned with issues of social
inclusion? This depends on the nature and purpose of the instruments used to audit these
structures. It can also "create dilemmas for and conflict within organization over defining
objectives, choosing indicators, the attribution of causality and how to make comparisons'
(Clarke et al, 2000). These dilemmas are even more complex when one of the issues from a
health and/or justice perspective. There is a need to address the inefficient and the uncoordinated
use of resources within prison, between prison and community and within the comm1nity. This
appreciation of system service management should also include the judiciary who do not have a
responsibility for resources use or the means to determine sentencing guideline (Carter, 2003;
Law reform Commission, 1996). It may well be that as a result of closer official monitoring, the
individual client will become subject to a greater degree of social control. This may in turn lead
to the development of protocols which define values and explicitly state the limits of
unacceptable behavior or the definition of legitimate need. This repressive intent can be found
within the criminal justice system concepts of net widening and up-terrifying which relate to the
inappropriate inclusion of offenders in a form of punishment level based on social diagnosis,
which is higher than the one they would be allocated to were it not for the bureaucratic features
of the decision making structure.

2.3 Database Management System


Prison is defined as a custom and tradition of society according to the law of the land to punish
anyone or person who commits a crime. This is to prevent (a lawless society which invariably
help secure) lives and properties of the people living in such a country or state. It is also a place
in which individuals are physically confined or interned and usually deprived of personal
freedom. This is usually a legal penalty that may be imposed by the state for committing a crime.
It is also defined as the criminal law forbids the commission or omission of certain acts in order
to preserve public order protect person or property from what is offensive and injurious and
provide sufficient safeguards against corruption of the state. The prison, as an institution and an
environment, is manipulated by both inmate and guard to help ease the passing of time and work
and to srtain some individual identity within the institution, which can undermine the intended
purpose o C the prison. In short to understand the prison and its purpose, "we must see prison life
as something more than a matter of walls and bars, of cells, and locks.. .we must see the prisons

5
as a society within a society" Once an inmate is surrounded by the prison walls,' he or she
becomes subject to the operation and function of the institution.

Database management systems (DBMS) are specially designed applications that interact with the
user, other applications and the database itself to capture and analyze data. A general purpose
database management system (DBMS) is a software system designed to allow the definition,
creation, querying, update and administration of databases. A database is not generally portable
across different DBMS, but different DBMS can inter operate by using standards such as SQL
and ODBC or JDBC to allow a single.

Database management system is typical information processing system or orgnizational


information system on people's information. World Net describes an information system (IS) as
"a system consisting of the network of all communication channels used within an organization,
and includes software and hardware." It may also be defined as "a system that collects and
processes data (information) and provides it to managers at all levels that use it for decision
making planning, program implementation and control".

The aim of information system in immigration is improving the quality and accuracy of
information provided to all involved as well as assisting management in compiling and reporting
information. Computerization is a social process for providing access to and support for
computer equipment to be used in activities such as teaching, accounting, writing, designing,
circuits, file processing etc. computerization entails social choices about the levels of appropriate
investment and control over equipment and expertise, as well as choices of equipment.

Dunlop and king (1991), by the early 1990s, computing and telecommunications accounted for
half of the capital investments made by private firms. However, paper (1980), Feigenbaum and
McCorduck (1983) and Yourdon(1986) stated that the most fervent advocates of computerization
have argued that the actual pace of computerization in schools, factories and homes is too slow
king(1986), others emphasize a labour market pragmatism that we label 'vocational Matching'.
In this view, people will need computer skills, such as programming, to compete in future labour
markets and to participate in a highly automated society; a Responsible school will teach some of

6
these skills today. King (1986), advocate of computer based education promote a utopian image
of computer using schools as places where students learn in a cheerful, cooperative setting and
where all teachers can be supportive, enthusiastic mentors.

Therefore, a computerized database management system is usually a system, which is


implemented with a computer to achieve the utmost efficiency and desired goals. Russell, M.
(1987) dealt extensively on the need for the use of computers on such database system like
database management system. In the words of David(2003), at the center of any information
system is a database, which is any collection of related information grouped together as a simple
item. The term can also apply to the ways in which information is catalogued, analyzed, stored
and used manually.

Database Management Systems (DBMS) have become a standard tool for shielding the computer
user from details of secondary storage management. They are designed to improve the
productivity of application programmers and to facilitate data access by computernaIve end
users. There have been several database models. Whichever conceptual model or database
management system is adopted, the use of a central database management system has a number
of advantages and some costs compared to the commonly employed special purpose data files. A
data file consists of a set of records arranged and defined for a single application system.
Relational information between items in a record or between records is not explicitly described
or available to other application systems. For instance, a file of project activity durations and
scheduled times might be assembled and manipulated by a project scheduling system. This data
file would not necessarily be available to the accounting system or to corporate planners.

A centralized DBM has several advantages over such stand-alone systems.


> Reduced Redundancy: Good planning can allow duplicate or similar data stored in
different files for different applications to be combined and stored only once.
> Improved Availability: Information may be made available to any application program
through the use of the DBM.
> Reduced Inconsistency: If the same data is stored in more than one place, then updating
in one place and not everywhere can lead to inconsistencies in the database.

7
> Enforced Data Security: Authorization to use information can be centralized.

For the purpose of project management, the issues of improved availability is particularly
important. Most application programs create and own particular data files in the sense that
information is difficult to obtain directly for other applications. Common problems in attempting
to transfer data between such special purpose files are missing data items, useable formats and
unknown formats.

As an example, suppose that the purchasing department keeps records of equipment ental costs
on each project underway. This data is arranged so that payment of invoices can be handled
expeditiously and project accounts are properly debited. The records are arranged by individual
suppliers for this purpose. These records might not be particularly useful for the purpose of
preparing cost estimates since:

Some suppliers might not exist in the historical record.


> Finding the lowest cost supplier for particular pieces of equipment would be exceedingly
tedious since every record would have to be read to find the desired piece of equipment
and the cost.
> No direct way of abstracting the equipment codes and prices might exist.

An alternative arrangement might be to separately record equipment rental costs in (1) the
Purchasing Department Records, (2) The cost Estimating Division, and (3) the company
warehouse. While these multiple databases might each be designed for the individual use, they
represent considerable redundancy and could easily result in inconsistencies as prices change
over time. With a central DBM, desired views for each of these three users could be developed
from a single databases of equipment costs

A manager need not conclude from this discussion that initiating a formal database will be a
panacea. Life is never so simple. Installing and maintaining databases is a costly and time
consuming endeavor. A single database is particularly vulnerable to equipment failure.
Moreover, a central database system may be so expensive and cumbersome that it becomes

8
ineffective, we will discuss some possibilities for transferring information between databases in a
later section. But lack of good information and manual information management cin also be
expensive.

One might also contrast the operation of a formal, computerized database with that of a manual
filing system. For the equipment supplier example cited above, an experienced purchasing clerk
might be able to immediately find the lowest cost supplier of a particular piece of equipment.
Making this identification might well occur in spite of the formal organization of the records by
supplier organization. The experienced clerk will have his/her own subjective, conceptual model
of the available information. This subjective model can be remarkably powerful. Unfortunately,
the mass of information required, the continuing introduction of new employees, and the need for
consistency on large project make such manual systems less effective and reliable.

2.4 Management Information System (MIS)


The concept of the Management information System has evolved over a period of time
comprising many different facets of the organizational function. MIS is a necessity of all the
organizations. The initial concept of MIS was to process data from the organization and presents
it in the form of reports at regular intervals. The system was largely capable of handling the
data from collection to processing. It was more impersonal, requiring each individual to pick and
choose the processed data and use it for his requirement. This concept was further modified
when a distinction was made between data and information. The information is a product of an
analysis of data. This concept is similar to a raw material and the finished product. What are
needed are information and not a mass of data. However, the data can be analyzed in anumber of
ways, producing different shades and specifications of the information a product. It was
therefore, demanded that the system concept be an individual — oriented as each individual may
have a different orientation towards the information. This concept was further modified, that the
system should present information in such a form and format that it creates an impact on its user,
provoking a decision or an investigation. It was later realized that even though such an impact
was a welcome modification, some sort of selective approach was necessary in the analysis and
reporting. Hence, the concept of exception reporting was imbibed in MIS. The norm for an
exception was necessary to evolve in the organization. The concept remained valid till and to the

9
extent that the norm for an exception remained true and effective. Since the environment turns
competitive and is ever changing, fixation of the norm for an exception becomes futile exercise
at least for the people in the high echelons of the organization. The concept was then evolved
that the system should be capable of handling a need based exception reporting. This need
maybe either of an individual or a group of people. This called for keeping all data together in
such a form that it can be accessed by anybody and can be processed to suit his needs. The
concept is that the data is one but it can be accessed by anybody and can be processed to suit his
needs. The concept is that the data is one but it can be viewed by different individuals in
different ways. This gave rise to the concept of DATABASE, and the MIS based on the
DATABASE proved much more effective.

Over a period of time, when these conceptual developments were taking place, the concept of the
end user computing using multiple databases emerged. This concept brought a fundamental
change in MIS. The change was decentralization of the system and the user of the information
becoming independent to computer professionals. When this becomes a reality, the concept of
MIS change to a decision making system. The job is a computer department is to iianage the
information resources and leave the task of information processing to the user. The concept of
MIS in today's world is a system which handles the databases, databases provides com-putting
facilities to the end user and give a variety of decision making tools to the user of the system.

The concept of MIS gives high regards to the individual and his ability to use information. An
MIS gives information through data analysis. While analyzing the data, it relies on many
academic disciplines. These include the theories, principles and concepts from the Management
Science, Psychology and Human Behavior, making the more effective and useful. These
academic disciplines are used in designing the MIS, evolving the decision support tools for
modeling and decision — making.

The foundation of MIS is the principles of management and if its practices. MIS uses the concept
of Management Information System can be evolved for a specific objective if it is evolved after
systematic planning and design. It calls for an analysis of a business, management view and
polices, organization culture and the culture and the management style. The information should

10
be generated in this setting and must be useful in managing the business. This is possible oniy
when it is in conceptualized as system with an appropriate design. The MIS, therefore, relies
heavily on the systems theory offers solutions to handle the complex situations of the input and
output flows. It uses theories of communication which helps to evolve a system design capable
of handling data inputs, process and outputs with the best possible noise or distortion in
transmitting the information from a source to a destination. It uses the principles of system
Design, ability of continuous adjustment or correction in the system in line with the
environmental change in which the MIS operates. Such design helps to keep the MIS tuned with
the management needs of the organization.

The concept, therefore, is a blend of principle, theories and practices of the Management
Information and System giving rise to single product known as Management Information System
(MIS). The Physical view of the MIS can be seen as assembly of several subsystems based on
the databases in the organization. These subsystems ranges from data collection, transaction
processing and validating, processing, analyzing and storing the information in databases. The
subsystem could be at a functional level or a corporate level. The information is evolved through
them for a functional or a department management and it provides the information for the
management of business at the corporate level.

The MIS is a product of a multi-disciplinary approach to the business management. It is a


product which needs to be kept under a constant review and modification to meet the corporate
needs of the information. It is prescribed product design for the organization. The MIS differs
since the people in two organizations involved in the same business. The MIS is for the people in
the organization. The MIS model may be the same but it differs greatly in the contents. The MIS,
therefore, is a dynamic concept subject to change, time and again, with a change in the business
management process. It continuously interacts with the internal and the external environment of
the business and provides a corrective mechanism in the system so that the change needs of
information are with effectiveness. The MIS, therefore is a dynamic design, the primary
objective. The MIS, Therefore, is dynamic design that the primary objective of which is to the
information for decision making and it is developed considering the organizational fabric, giving

11
due regard to the people in the organization the management functions and the managerial
control.

The role of the MIS in an organization can be compared to the role of heart in the body. The
information is the blood and MIS is the heart. In the body, the heart plays the role of supplying
pure blood to all the elements of the body including the brain. The heart works faster and
supplies more blood when needed. It regulates and controls the incoming impure blood,
processes it and sends it to the destination in the quantity needed. It fulfills the needs of blood
supply to human body in normal course and also in crisis.

The MIS plays exactly the same role in the organization. The system ensures that an appropriate
data is collected from the various sources, processed and sends it further to all the need
destinations. The system is expected to fulfill the information needs of an individual, a group of
individuals, the management functionaries: the managers and the top management The MIS
satisfies the diverse need through a variety of systems such as Query System, Analysis Systems,
Modeling Systems and Decision Support Systems. The MIS helps in Strategic Planning,
Management Control, Operational Control and Transaction Processing.

The MIS helps the clerical personnel in the transaction processing and answers their queries on
the data pertaining to the transaction, the status of a particular record and references on a variety
of documents. The MIS helps the junior management personnel by providing the operational data
for planning, scheduling and control, it also helps them further in decision making at the
operations level to correct an out of control situation. The MIS helps the middle management in
short planning, target setting and controlling the business functions. It is supported by the use of
the management tools of planning and control. The MIS helps the top management in goal
setting, strategic planning and evolving the business plans and their implementation. The MIS
plays the role of information generation, communication, problem identification and helps in the
process of decision making. The MIS plays a vital role in the management, administration and
operations of an organization.

12
2.5 Review of Prison Management System: Automating and streamlining the process of
prisoner / visitor movement at Prisons. Followings are the accomplishment in this area of prison
management:
• Establishment of LAN: Establishment of LAN connecting all prisons situated in a big
wide spread complex using 5,500 meters of Optical Fiber Cable (12 and 6 core)
Operated with one layer — 3 switch supported by 16 layer — 2 switches in the entire jail
complex. The network has 185 lOs and can be expanded to 300 nodes without any
additions/modifications/disruptions to the existing infrastructure. Surveys were
conducted and laying of OFC was found to be the best suitable option.

• Development and Implementation of CPMS: Computerized Prison Information


Management System (CPMS) comprises of 12 primary functional modules. More than
65 reports of various types have been developed under Client / Server architecture. It has
been developed, tested and implemented. This PMS is having following major features
Based on Client-Server architecture and supporting latest GUI features; Centralized
Database for supporting powerful & fast retrieval of data; Monitors physical location of
inmate, their movements within and outside the jail complex, punishments, medical
history of the inmate at the time of his / her arrival at the jail, cases filed against him,
court hearings among other attributes; and Supports more than 65 reports as per the
present needs of the various monitoring agencies like National 1-lurnan Right
Commission, National Crime Records Bureau and Tihar Jail itself

• Biometric Tools: The PMS has been integrated with biometrics tools, which stores
Inmate's biometric details at the time of entry and shall be used to authenticate him at
the time of their movement. The biometric based verification and authentication system
is installed in all 9 jails of Tihar Prisons Complex and at District Jail, Rohini and New
Delhi with facility to store prisoner photograph. Tihar Prisons was the first prison using
this technology for prisoner's identification and verification along with the phàtographs.

• Photo pass for visitors: Visitor's Management System (VMS) is implemented at the
Central Public Relation Office situated at Gate /3 and at Gate /4 of the Tihar Prisons.

13
All visitors coming to jail to meet their relative prisoners are first being photographed
and then they are issued photo pass. Details of the visitors are being kept in the database
and this information is shared with police for the investigation purpose.

• Videoconferencing: The use of videoconferencing facility in prisons has drastically


reduced expenditure incurred as compared to being physically producing the jail inmates
in the courts. Physical production of an inmate require transportation, escort by armed
police personnel, prevention of fights between inmates and nearly 6 hours of time wasted
by each inmate. Fear of custody break is always there during the physical production.
There was incidents when prisoners have fled after breaking lockups in the courtroom or
from the custody of armed security personnel escorting them to court or by arh-ied attack
of the police vans by daredevils. In some cases, there are incidents of clashes between
the prisoners inside the lockup vans during transportation. There is sometimes remote
possibility that inmate may get changed during transportation, which keeps the number
intact but inmate is changed by the use of videoconferencing.

• Cameras: Using analog and digital cameras security has been enhanced in the Tihar
Prison complex. Cameras have been installed at strategic locations within wards, inside
high security cells, at meeting points and at dheodi, where inmates are searched
whenever they are escorted out of jail or are brought inside the jail complex. Each and
every inmate can be watched from a video wall and surveillance brief is also sent to DG
(Prisons) in real time. These video graphed shots are produced in case of any disputes.

2.6 human Resource Management (1-IRM)


The term 'Human Resource Management' has been the subject of considerable debate and its
underlying philosophy and character are highly controversial. Much of this controversy stems
from the absence of a precise formulation of an agreement on its significance and definition
(Storey, 1995), as cited by Bratton and Gold (2003). Obviously, definition of the subject matter
is needed for analysis and understanding of HRM theory and practices.

14
HRM has a variety of definitions but there is general agreement that has a closer fit with business
strategy than previous models, specifically personnel management. In all debates about the
meaning, significance and practice of HRM, nothing seems more certain than the link between
HRM and performance (HRM Guide October, 2006). Below are some of the definitions of
HRM, although it can be argued that these will only be ones of several possible definitions. De
Cenzo and Robbins (1996) defined HRM as the part of the organization that is concerned with
the people dimension and it is normally a staff or support function in the organization. HRM role
is the provision of assistance in HR1vI issues to line employees, or those indirectly involved in
producing the organization's goods and services. Acquiring people's services, developing their
skills, motivating them to high levels of performance, and ensuring their continuing mainteanace
and commitment to the organization are essential to achieving organizational goals .this is much
the case regardless of the type of organization, government, business, education, health,
recreation, or social action. The authors proposed an HRM specific approach as consisting of
four functions staffing, training and development, motivation, and maintenance.

In addition, Bratton and Gold (2003) define HRM as the strategic approach to managing
employment relations which emphasizes that leveraging people's capabilities is critical to
achieving sustainable competitive advantage. This is achieved through a distinctive set of
integrated employment policies, programs, and practices. The authors presented HRM functions
as planning, recruitment, and selections, appraisal and performance management, reward
management, development, employee relations, health and safety, and union management
relations. Moreover, to Alan price (2004) HRM aims at recruiting capable, flexible and
committed people, managing and rewarding their performance and developing key
competencies.

Contributing to the working definition of HRM is Abecker et al.,(2004). They see HRM as a
strategic and target oriented composition, regulation and development of all areas that effect
human resources in a company. Efficient and effective management of these resources to a large
extend, affects human resource behavior, and consequently the performance of the organization

15
as a whole. Moreover, the authors identified HRIvI with the field it covers. These include
planning aspects personnel requirements analysis and personnel asset analysis, and change
aspects recruitment, personnel development and labor displacement.

Human Resources
Management

L 9

Planning Aspect Change Aspects

Personal Personnel
Personnel Labour
Requirements Asset Recruitment
Development Displacement
Analysis Analysis
•1

Figure 2.1; Fields of HRM (source; Abecker et al., 2004)

According to Torrington et al.,(2005) HRM is fundamental to all management activity and has
evolved from a number of different strands of thought. It is best described as a loose philosophy
of people management rather a than a focused methodology. Thus, distinction has been made
between HRM as a body of management activities on one hand (generically described as
personnel management) and then on the other as a particular approach to execute those activities
(carrying out people oriented organizational activities than traditional personnel management).
An organization gains competitive advantage by using its employees effectively, drawing on
their expertise and ingenuity to meet clearly defined objectives. Torrington et al., (2005)
identified the role of the human functions with four key objectives.

These four objectives are the corner stone of all HR activities. This includes staffing,
performance, change management and administrations. Staffing objectives focuses on finding the

16
appropriate pooi of human resources needed to ensure fully and timely supply of work force. It
therefore involves designing organizational structures, identifying working concitions for
different groups of employees followed by recruiting, selecting, and developing the personnel
required to fill the roles. Performance objective aims at ensuring workforce motivation and
commitment for effective performance.

17
CHAPTER THREE
METHODOLOGY AND SYSTEM ANALYSIS
3.1 Research Methodology
This section covers the actual process of sitting down and designing the website. The real
process of putting the pen to paper and the true process behind it is covered. It is the chapter's
intention to take the mystery out of designing any type of website. Methodology is the analysis
of the body of methods applied to a field of study, or the theoretical analysis of the body of
methods and principles associated with branch knowledge. The methodology used is the
waterfall model.

Coding Testing

Figure 3.1: Basic waterfall mode

The figure 3;l illustrates the basic waterfall model, which is one of the main system development
models. In this model, stages were set as a series of sequential steps with flow of time and
information from left to right. The model defines the order of stages that will be delivered
completely to the management at the end of each stage. This is a long used tradition model and
all the plus points and the drawbacks have been identified clearly. It is the most widely used
methodology in the software development industry.

18
3.1.1 Advanced Waterfall Model
The new waterfall model, which is known as the Advance waterfall model have been explained
in the figure3.l .1. it allows returning to the previous stage when the need arises but this
provision should be used with care. This advantage is important in software developments as it is
considered a plus point of this model. It is undesirable to change the specification of the previous
phases to accommodate new requirements. However this model does allows this to provide the
flexibility to incorporate important requirements found later in the development process.

Requirement
Analysis

System Design

System
Development

System Testing
II

II

II

II

II

II

Development II

System
=== Maintenance
Implementation

Fig: 3.2 Advance Waterfall Model

3.1.2 Water implementation


Below are the stages from the waterfall model that will be used in the development of the new
system.
> Requirement Analysis: The waterfall model implemented in this research is preceded
with the requirement analysis. In this phase, the requirement of the new system is to be

19
identified. All the requirements for the system were gathered with employing techniques
such as questionnaires, interviews and survey. Interviews are done with key personals in
the agency and from other agencies to get a clearer idea of the industry and the business
activities involved. Questionnaires are given to their customers and survey is done during
their business process to understand the business needs.

> System design: This scheduled is followed by the next stage in the waterfall model,
which is the system design phase. In this part, requirements of the project will be
translated into detail design. The dataflow diagram (DFD) will be used to link the whole
system with this specification. As generally known, DFD will provide detailed
information regarding the flow between the information and the tables involved. This will
also give a clearer idea of the tables that is needed. This followed by the normalization
method. All the tables will be created and normalized to the third level to minimize its
dependency and redundancy. Primary and foreign keys in each table, a complete database
for the system will be created. The database design will be equipped with detailed
description of each attribute by field name, data type, data validation and description
respectively. Next part in the designing will be the Entity Re1ationship9(ER) diagram.
The relationship between every table in the database will be explained in this diagram.
The ER diagram also examines the relation and the dependency of the tables. Interface
design is the final stage in the designing. It is one of the main components in system
design. Only the necessary data should be provided in each page and confusing labeling
should be avoided. All the irrelevant information in a page should be avoided to reduce
mistakes made by the users. Not much graphical notation is required in this system since
most of the users assumed to be a computer literate.

> System Development:


This is the phase where all the designs will be translated into machine readable coding.
The coding should be done keeping in mind the future enhancement and the system
reliability.

20
> System Testing And Implementation:
The complete software will be also tested based on the functional and non-functional
requirements. Each components of the software will be tested separately to ensure error
free software and components integration. The testing activity includes the involvement
of computer technical people and customers. The testing log will include information on
the program, tested item and expected action or value and remark criteria. In tFis research
the testing will be done based on the actual data to know the system's performance in the
real life-working environment. In this phase the test reports are to be documented
carefully.
The system implementation process concentrates on how the developed system plan to be
implemented in the advertisement agency.

Discussion and Conclusion


The effect of the VCA in the system development will be discussed at this stage of the
research. The new system will be reviewed to measure the system's performance. The
additional and minus points of the system will be discussed at this stage of the research
and future suggestions will be addressed as an input to the next phase. Finally, the
conclusions will be made on the implementation of VCA in system development.

3.2 Method of Data Collection Used


A thorough investigation of the current system was made in order to obtain detailed fact about
the application area to be re-designed. Investigation also covered looking at the functional
requirement of the present system and finding out whether the Requirements and objective of the
present system are being achieved. In the investigation proper, several methods of data collection
were employed which includes interviewing of the office representatives, evaluationlinspection
of forms and direct observation. These methods were adopted to ensure the validity of data
collected and relevance of the result after processing the data.

3.2.1 Interviewing
In view to investigation, prison management staff was interviewed. This method yields the most
profitable result as it is obtained by physical contacts, hence a firsthand knowledge of the various

21
processes involved is obtain by speaking to the operator of the system. The essential element of
the interview is obtained directly and in a short time than when other methods are employed
since the interviewer is with the interviewed.

3.2.2 Observation
The method of data collection enables the researchers to witness a firsthand operation of the old
system or manual system. Direct observation is the surest method of learning as a scientist and
this method was richly employed.

3.3 System Investigation


In the investigation of the system, the researcher considered the various research problems that
where highlighted in chapter one above. He carried out data collection using questionnaires and
some oral interviews and in the process for the investigation the research found out that all the
records of the prisoners are been stored din the role book and visitors don't have a sign in or sign
out form in the investigation. When the prisoner comes in, the officer gets the records of the
prisoner his full name, last name, phone number, state of origin, date in and date out etc. and
then assign a cell for the prisoner and set up a form for the prison visitors.

3.4 System Analysis


This system would have two inputs forms; Authentication and Prisoner details which would be
stored in a Database. This database will contain all the information and necessary data required
by the application for its functioning.
There are three (3) aspects of the feasibility study considered on this research, which includes:
+ The Technical Feasibility: This considers if the work for the project can be done with
current equipment, sofiware technology and available personnel or if a new technology
will be required. From the study carried out, it was discovered that the work for the
project will require new hardware equipment (such as computer systems, printers),
updated software technology (such as a newer version of IDE like Microsoft Visual
Studio 2013 and above). The technology feasibility is guaranteed as the researcher is the
developer of the system.

22
+ Operational Feasibility: Here consideration is based on if the new system will be used
if developed or if there will be resistance from the users. Report from the investigation
however showed over 80% acceptance generally thus, it is operationally feasible.
+ Economic Feasibility: This work further considered the cost and benefits of the
proposed system and it was found to be considerably better than the current system.

3.4.1 Problem of Existing System


The existing system has the following limitations;
• Inefficient organization of prison information and records.
• Information look up is hard and time consuming.
• Impedes the flow of critical information.

3.4.2 Proposed System


Taking in mind the above deficiencies, the project effectively deals with the above pioblems by
providing a single integrated system where all the prison as well as prisoner/criminal information
will be stored in a single centralized system having complete prisoner profiles. Each prisoner
profile would have his/her demographic details, a digital photograph of the prisoner as well as
his parole, visitor and the number of times the prisoner has been out of prison with appropriate
reason attached to it. This effectively scales down the time in which critical information has to be
transferred to concerned agencies. Also maintenance of records is a more easy as well as
efficient when compared to the manual system.

3.4.3 Advantages of Proposed System


• Efficient organization of prison information and records
• Information look up is easy.
• Substantially decreases the time in which critical information is passed on.

23
CHAPTER FOUR
SYSTEM DESIGN
4.1 System Design Overview
System design is the process of creating a blue print for the proposed system in other words a
prototype for the proposed system. The system is designed aimed at developing an online system
that can be used by Nigerian prison to keep track of prison records. Security of the database used
in the design was highly taken care of by the website developed. The objective of the design
includes:
+ Design software that can be used to store prisoner's information on database.
+ Structure a database system that will store all the information.
+ Design a query system to retrieve specified prisoners information.
+ Design a well formatted out put that will present information in a meaningful format.
+ Maintain a database for prisoner's jail term.
+ Ensure accuracy in the handling of the data.

4.2 Input/Form Design


The system would require two inputs from users. The first login details for security and the new
prisoner registration, which is entered through the keyboard.

4.2.1 Log In Input Specification


The login input would require users to input their login details for security of the system as seen
in the diagram below. This module would contain two text input field and a button.

LOGIN

User Name:

Password:

Figure 4.1 Input Specification for login detail.

24
*
This design module when implemented would be used to verify and authenticate user's access to
the management system.

4.2.1 Prisoner's Registration.

PRISONER REGISTRATION

First Name: Last Name:

State:
File No.:

Phone No:
City:

Date In:
Age:

Next of kin:
Date Out:

Information:

Sign Up

Figure 4.2; The input design here shows that the prisoner should provide his or her full name,
phone number, before he/she can be registered.

25
4.2.3 Admin Registration

SIGN UP ADMIN OFFICER

First Name:

Last Name:

User Name:

Password:

Email Add:

D.O.B:

Sex:

Register

Fig 4.3: The input design here shows that the user slzo aid provide his or her full name, Login
ID before lie/she can be registered.

26
4.2.4 Edit Prisoner's Profile

EDIT PRISONER'S PROFILE

File No.: State:

City: Phone No:

Age: City:

Information:

L
Update Profile:

Fig 4.4: Input design here shows that the user who login can edit the prisoner 's inJbrrnation in
the database.

4.3 Process Design


+ In Fig 4.1: Immediately the user name and the password, the system searches the
information provided on the database to see if the client is already a user in the database
and then it logs in the user in to the admin page.
+ In Fig 4.2: Once the prisoner's provides the necessary information, the system stores it in
the database, Thereby opening a unique record for the prisoner.
•. In Fig 4.3: Once the user provides the necessary information, the system stores it in the
database, thereby opening a unique record for the user to access to the admin page.
+ In Fig 4.4: The data of the prisoner in the database can also be edited or updated after the
registration has been done by the user.

27
4.4. Output Design
+ In Fig 4.1: Once the User gains access, the system displays the admin page as n output.
+ In Fig 4.2: The system registers the prisoner and pops out a message "Successfully
Registered" as an output.
+ In Fig 4.3: The system registers the admin officer and pops out a message "Successfully
Registered" as an output.
+ In Fig 4.4: The Admin's log's in and edit the prisoner's profile and pops out a message
"Profile has been updated"

4.5 Database Design


In any good database design, effort should be made to remove completely or at worst reduce
redundancy. The database design in the software is achieved using MySQL database. Below is
the structure of the tables in the database.

Table 1: Structure of the Admin table


Field Name Data Type/Size Description

Id Int(1 1) Stores a unique id for each user

Firstname Varchar(20) Stores the first name for each user

Lastnarne Varchar(20) Stores the last name for each user

Usernarne Varchar(20) Stores the user name for each user

Password Varchar(20) Stores the password for each user

Email Varchar(20) Stores the email for eah user

D.O.B Varchar(20) Stores the date of birth for each user

Sex Varchar(20) Stores the sex for each user

Admin table indicating field type, data type/size and Description which stores the admin first
name, last name, state and others in the field type.

28
4.5.1 Table 2: Structure of the Prisoner table
Field Name Data Type/Size Description
Id Int(1 1) Stores a unique id for each user
First name Varchar(20) Stores the first name for each user
Last name Varchar(20) Stores the last name for each user
File number Varchar(20) Stores the file number for each user
State Varchar(20) Stores the state for each user
Sex Varchar(20) Stores the sex for each user
City Varchar(20) Stores the city for each user
Phone number Varchar(20) Stores the phone number for each user
D.O.B Varchar(20) Stores the date of birth for each user
Age Varchar(20) Stores the age for each user
Date In Varchar(20) Stores the date in for each user
Date Out Varchar(20) Stores the date out for each user
Next of Kin Varchar(20) Stores the next of kin for each user
Email Varchar(20) Stores the email for each use
Information Varchar(20) Stores the information for each user

Prisoner table indicating field type, data type/size and Description which stores the prisoner's
first name, last name, state and others in the field type.

4.6 Program Design


Server-side scripting using PI-IP and client-side scripting using HTML and CSS which are
markup language. For every task, navigation links are created to help the task, be it downloading
forms, printing forms or making comment on website. Furthermore, the program i.e, well-
structured will make use of navigation links as well as sub menus such as:
o 1-lome: The home page layer is the first and welcome page the user will access before
others.
o history: The history page layer helps user to know more about the website.
o Login System: The login system page layer helps the user to have access to the admin
page if the user's data is in the database.

29
o Sign up System: The sign up system page layer helps the user to register him or behalf
into the system database.
o Contact us: The contact us page layer helps the user to contact the admin if him/her is
having a problem with the system.
o List of Prisoners: The list of prisoners page layer helps the user to view all the prisoners
in the database.
o Register prisoner: The register prisoner's page layer helps the admin user to register the
prisoner.
o Add User: The add user page layer helps the admin user to add another user.
o Edit Profile: The edit profile page layer helps the user to edit his/her profile e.g
Password, email address, and user name.
o Logout: The logout page layer helps the admin user to logout whenever he/she is done
with what she is doing on the admin page.
Whenever the user clicks on a particular navigation menu, it automatically links to the
page requested by the user. In its organization, search Engine giant, Google, was
incorporated in all the web pages for easy connection or log on to other websites all over
the globe.

4.7 System Implementation


The system requests the user details for authentication before the user gains access to he system.
There is one type of user in the system which is the administrator. Implementation deals with the
process of patting a system into operation. It starts with the end of design and development
phase. It is also a set of programs modules that run effectively on computers and its
accompanying users.

30
4.7.1 System Requirements and Specification
Hardware Requirements:
System must have internet connection to run the application. Internet speed as low a 256Kbps
can run the application very well with great speed.
Component Requirement
RAM 256MBofRAM
Hard disk 10GB of hard disk space
Processor 3Hz or higher

Table 4.7.1: 1-lardware Requirements

Software Requirements
This application has been tested and is compatible with all web browser e.g. Opeia, internet
explorer. Mozilla Firefox etc.

- Table 4.7.2: Software Requirements


Component Requirement
Operating system XP, Vista, Windows 7 & above,
Memory 128 or higher
Database MySQL
Web server XAMP server

The following software tools were used to develop the software:


HTML: The html is used for the user interface in the software development
CSS: The CSS is used for styling the user interface
PuP: The PHP is used for scripting in the program.
MYSQL: MySQL is used to store data in the database.
XAMPP: The XAMPP is the IDE (Integrated Development Environment) used in hosting the
program.

31
4.7.2 Training of Staff
It is important to prepare training schedule for the staff before the new system is to be installed.
The user of the new system should be given specific time for training courses. This will enable
them fit into the new system. Also, user manual will be produced in regards to the operation of
the new system.

4.7.3 System Testing


For the implementation of the new system, data must be prepared for live testing. The result from
the new system is compared to that of the existing system to check if the expected result was
achieved. It is also necessary to formulate the operation of the new system to check the overall
time and ability of the staff to handle the operation of the new system.

4.7.4 Software Maintenance Issues


Software maintenance is the modification of a software product after delivery to correct faults,
improve performance or other product attributes or to adopt the product to a new or changing
environment. It also serves as an opportunity to improve the performance of the software to suit
the needs of the users if it becomes necessary for the user requirements to be improvbd upon or
changed.

Maintenance would be seen in three areas in this research; corrective maintenance, preventive
maintenance and adaptive maintenance.

/ Corrective maintenance
Corrective maintenance is a maintenance task performed to identify, isolate and rectify a
fault so that the failed system can be restored to an operational condition within the
tolerances or limits established for in-service operations. Necessary corrections in the
form of removal, modification or addition of program modules should be prmitted by
the software to allow for optimal use of the application.

32
V Preventive Maintenance
This is a schedule of planned maintenance actions aimed at the prevention of breakdowns
and failures. The primary goal of preventive maintenance is to prevent the failure of
software before it actually occurs. It is designed to preserve and enhance software
reliability by replacing error-prone components before they actually fail. Recent
technological advances in tools for inspection and diagnosis have enabled more accurate
and effective software maintenance. Measures like regular diagnosis, database backups,
creating system mirrors preserve the integrity of information stored in the application. If
these are strictly followed, limited instances of such occurrences would be noticed in the
use of the software application.

V Adaptive Maintenance
This involves enhancing the system by adding features, capabilities and functions in
response to new technology, upgrades, new requirements or new problems. Since the
enviroment in which the application would be running is dynamic, it should be made to
suit whatever requirements that may change in the long run.

4.8 Project Costing


ITEMS AMOUNT
Cost of transportation during project research N 20,000
Feeding during research N 35,000
Cost of online research N 15,000
HP Laptop N 95,000
Printing N 5,000
Others N 45,000
Total 215,000

33
1 ClIAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATIONS

5.1 Summary
It is now imperative to say that it has become essential to embrace the new technologies in the
area of information and communication Technology (ICT) for the development, modernization,
advancement of prisons. Internetworking of all the jails across Nigeria for sharing of information
related to prison inmates who had been lodged in various jails of the country should improve the
law and order within the state. It is recommended that Umuahia Prisons be pioneer in this area
and they have shown it through IT setup, role model for other states and even other countries. It
is likely that this may be replicated in the whole country.

5.2 Recommendations
I recommend the followings
The following are recommendation that would enable improvement on the system;
7 There should be a way of limiting the amount of prisoners in the cell to avoid congestion
V' There should be a way to separate records of criminals and civilians
V There should be a means of adding finger print recognition to the project.

5.3 Conclusion
Management of prisons as well as prison records is a vital aspect in the national security which
becomes all the more important in the current volatile security situation. Prison Management in
Nigeria is still in a nascent stage using manual system of files and folders to store arid organize
prison record. This system is inefficient as well as looking up of specific information is
cumbersome and tedious. This greatly impedes the flow of critical information. All these
deficiencies are removed using the Computerized Prison Information Management System.
CPIMS effectively stores all the information in neat prison profiles which have all the necessary
information about a prisoner as well as his//her finger print signature and a passport photograph
be attached with the profile, ID numbers can also be used as a search key to identify prison
records by comparing them.

34
References
Bently. D. (2013). System Analysis and Design Methods 5th Edition. Published by Sandra
Donaldson Dewitz, San-Jose State University.
Beynon-Davies P. (2013). Business Information + Systems. Paigrave, Basingstoke.
ISBN 978-0-230-20368-6
Flavin, M. (2012). Database Management System Published by Hoummele Printer Inc.
French, C. 5. (2010). Data Processing and Information Technology 10th Edition. Published
by British Library Cataloguing Publication Data.
Gerald, V. (2010). Database Management System 2nd Edition. Published by Palmohills prints.
Goldsmith. L. (2012). History from the inside out: Prison life in nineteenth-century
Massachusetts. Journal of Social History, 31, 109-125.
Grey, J. (2011). Information System Development Essentials Published by McGrew-Hil1
Companies Inc. USA.
Jeffrey, L. (2012) System Analysis and Design Method 4th Edition. Published by Paigrave
Macmillan, New York.
[Knowpap. .J. (2009). Computer Maintenance and Management Published by Mangraw
Publishers Inc.
Kroenke, S. (2009). Management Information System Published by Hoummele Printers Inc.
McKen, B. (2011). Visual Basic 6.0 Progamming Made Easy Published by Palmote Mangrills,
New York.
Michael, V. (2010). Database Design, Application, Development and Administration, 5th
Edition. Published by Paigrave Houndmills. Basingstoke, Hampshire, New York.
Paul, B. (2013). Database Management System 3rd Edition. Published by Paigrave Houndmills,
Basingstoke, Hampshire, RG2 16XS. New York.
Suedfeld, P. (2012). Environmental effects on violent behavior in prisons. Internationql Journal
of Offender Therapy and Comparative Criminology, 24, 107-116.
Wikipedia, free Encyclopedia 2009 (www.wikipedia.com) www.prisons.gov.ngn.
www.model 6956 .net/child-model-site.html, July 12, 2010.

35
Appendix A: Screenshots

36
- C C ims!host, - C

Add nev in-niate

Choose FIe t0 chOser

i_ C? -. O'; a: r C'; Ca C1!,

C C Cht

Name: ekpo amby blessed

Ace: 45 years

State of orisin: abia

LGA: ohinewa

.-°ddress: uinuokpo

37
List of in-mates

J MORE

Surname Firstiiaiiie Local Government Of Origin Sentenced

ekpo amby obingwa Iga 200

hdghzg hzghghd o'nafia ga 5

gLirubase Nkechi ohafia ga 8

hdg'nzg hzghghd ga 8

38
Appendix B: Source Code
<?php
require('classes/inmate.php');
mi set("display errors", false);
if (!isset($ SESSION['admin'])) {
header("location:admin_login.php");
}

<!DOCTYPE html>
<html>
<head>
<title>prison management system</title>
<link re1"stylesheet" type="text/css" href"icons/css/font-awesome.css">
<style typ e=r"text/css">
.left-nav {
width: 10%;
position: fixed;
left: 0%;
padding: 20px l0px;
background: #83365c;
height: 100%;
top: 0;
z-index: 1;

.left-nav a{
text-decoration: none;
color: azure;
font-size: l8px
}
.left-nav ul {
margin-left: -18%;
}
.left-nav li{
margin-top: 20px;
list-style-type: none;
}
,/*ffor top navigation bar*/

.top-nav {
background: #ffff;
padding: l5px;
width: 100%;
box-shadow: 1px 3px 5px grey;
position: fixed;
top: 0;

39
?php
require 'classes/user.php';
mi set('display errors', false);

<!DOCTYPE html>
<html>
<head>
<title>login
</title>
<meta charset="utf-8">
<meta name="viewport" content="widthdevice-width, initial-scale= 1 .0">
<link rel="stylesheet" type"text/css" href="login_style.css">
<link rel="stylesheet" type"text/css" href="icons/css/font-awesome.css">
<link rel="icon" type="image/png' href="irnages/aha.png">
<style type="text/css">
a{
text-decoration: none;

a:hover {
color:#83365c;
text-decoration: underline;
}
</style>
*
</head>
<body stylez=h'backgroundimage: url('img/img (2).jpg');">
<div class"div 1" style="margin-top: 10%">
<b style="rnargin-left: 35%;color:#83365c">ADMIN
<Ib>
<br>
<br>
<img src="image/profile.png" class="img circle" width"60" height"60" style"margin-
left: 35%">
<br>
<br>
<center>
<form me1hod"POST">
<span class"fa fa-user" style"border-bottom: ipx solid silver;font-size: 23px;padding-
bottom: 7px;color:1f83365c">&nbsp; &nbsp;
</span>
<input type="text" narne"username" placeholder"enter your username" required="
class="form span" id"form 1" style="font-size: 1 8px;padding-bottom: 6px">
<br>
<span c1ass"fa fa-lock" style"border-bottom: ipx solid silver;font-size:23px;adding-
bottom: 7px;color:#83 3 65c">&nbsp; &nbsp;
</span>

40
<input type="password' name="psd" placeholder="enter your password' required="
class="form span" style="font-size: 1 8px;padding-bottom: 6px">
<br>
<br>

?php
require('classes/inmate.php');
"", false);
?>
<!DOCTYPE html>
<html>
<head>
<title>prison management systern</title>
<link rel="stylesheet" type="text/css" href="icons/css/font-awesome.css">
<style type"text/css">
.left-nav {
width: 10%;
position: fixed;
left: 0%;
padding: 20px lOpx;
background: #83365c;
height: 100%;
top: 0;
4 z-index: 1;

.left-nav a{
text-decoration: none;
color: azure;
font-size: l8px
}
left-nay ul{
margin-left: -18%;
}
left-nay li{
margin-top: 20px;
list-style-type: none;
}
/*ffor top navigation bar*/

.top-nav {
<?php
require('classes/inrnate.php');
mi set("display errors", false);
if (!isset($ SESSION{'admin'])) {

41
header('location:admin_login.php');

<!DOCTYPE html>
<html>
<head>
<title>pri son management system</title>
<link rel= stylesheet" type="text/css" href="icons/css/font-awesome.css">
<style type="texticss">
.left-nav{
width: 10%;
position: fixed;
left: 0%;
padding: 20px lOpx;
background: #83365c;

S height: 100%;
top: 0;
z-index: 1;

}
left-nay a{
text-decoration: none;
color: azure;
font-size: 1 8px

}
.left-nav ul{
margin-left: -18%;

}
.lcft-nav li{
margin-top: 20px;
list-style-type: none;
1

42
/*ffor top navigation bar*/

top-nay {
background: #ffff;
padding: l5px;
width: 100%;
box-shadow: ipx 3px 5px grey;
position: fixed;
top: 0;

top-nay .left{
margin-left: 15%;
width: 50%;
display: inline;
float: left;

}
left input{
width: 70%;
padding: 12px;
border:ipx solid silver;
border-top-left-radius: l0px;
border-bottom-left-radius: l0px;
</head>
<body style= "background-image: url('img/img (2) .jpg');">
<div class="wrapper" style"width: 103%;background: rgba(255,255,255,0.7):">
<div class="left-nav">

<h3 style="text-align: center;color: lightblue">AFARA<b style="color: gold;font-size:


13px">PRIS.</b></h3>

43
<U'>

<li><a href="index.php"><span class="fa fa-home" style="font-size:


25px"></span> Dashboard</a></li>
<ii onclick" showModalO" style"cursor: pointer;><a><span class="fa fa-plus"
style=" font-size: 25px"></span> add-new</a></li>
<li><a href="freeinrnates.php"><span class"fa fa-user-circie" style="font-size:
20px"></span> free-inrnates</a></li>
<Ii><a href="logout.php"><span class="fa fa-sign-out" style="font-size:
25px"></span> log-out</a></li>
</ul>
</div>
<div class="top-nav">
<span class"Ieft">
<form method"post">
<input type"text" name="value" placeholder= "search in-mate">
<button narne=" search"><span c1ass=" fa fa-search "></span></button>
</form>
</span>
<span class="right">
<img src="irnage/bg.jpg" width="3 0" height='3 0" style"hcrder-
radius:100%;border:2px solid #ccc; " align"left">
<b style" font-weight: normal ;co br: grey ">Admin</b>
</span>
</div>
<section c1ass"rnain">

44
Appendix C: Program Flow Chart

No
Input username, password

Yes

View prisoner
Register Prisoner
Add user
Edit Profile
"4

PROGRAM FLOW CHART FOR THE ADMIN LOGIN

45
Input username, password

Login=datab
ase login?

Yes

Input firstname, last name, file number, state,


sex, dob, datein, dateout, nextofkin,
information to table users

PROGRAM FLOW CHART FOR THE PRISONER REGISTRATION

46
No
Input username, password

Yes

Input
firstname, last name, password, state, city,
phonenumber, email, age, sex to table users

PROGRAM FLOW CHART FOR ADD NEW USER

47

You might also like