You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/351519845

Design of a Novel Online Crime Reporting System

Conference Paper · March 2016

CITATION READS

1 15,730

3 authors, including:

Avdesh Bhardawaj
Juno Terra Technology Private Limited
97 PUBLICATIONS 139 CITATIONS

SEE PROFILE

All content following this page was uploaded by Avdesh Bhardawaj on 12 May 2021.

The user has requested enhancement of the downloaded file.


International Conference on Engineering Technology and Science (ICETS’16)

Design of a Novel Online Crime Reporting System


1
Ashwani Sharma#, 2Bhuvanesh Kumar Sharma*, 3Avdesh Bhardawaj^
#
Department of Computer Science Engineering, Greater Noida Institute of Technology and Management,
Greater Noida, Uttar Pradesh 201310
1sharma.ashwani8@gmail.com

*
Department of Mechanical Engineering, ITM University, Gurgaon, Haryana 122017
2sharmabhuvanesh1993@gmail.com

^
Department of Civil Engineering, IIT Delhi, Hauz Khas, New Delhi 110016
3avdeshsir@gmail.com

Abstract— The Online Crime Reporting System is an solving activity that requires intensive communication
application that covers complete case management system between the system users and system developers. System
and this project will help in managing all activities of the analysis or study is an important phase of any system
police station. It can used to report crimes and manage all development process. The system is studied to the minutest
the activities in a police station using computers by detail and analyzed. The system analyst plays the role of the
tracking all the details of complaints, most wanted interrogator and dwells deep into the working of the present
criminal, police station, etc. Currently, most tasks are system. The system is viewed as a whole and the input to the
done manually, but by computerizing all the activities system are identified. The outputs from the organizations are
inside a police station the working systems can be traced to the various processes. System analysis is concerned
managed easily and effectively. The modules involved in with becoming aware of the problem, identifying the relevant
this project are: Login for user and admin, complaint variables, analyzing, and synthesizing the various factors and
registration, view complaint status, criminal register determining an optimal or at least a satisfactory solution or
management, case history details management, manage program of action. A detailed study of the process must be
the list about most wanted criminals, latest news made by various techniques like interviews, questionnaires,
regarding crime in the city, Safety tips for individuals, etc. The data collected from these sources must be scrutinized
especially for women and also for vendors. This project is to arrive to a conclusion. The conclusion is an understanding
helpful in the Automation of police station records, of how the system functions. This system is called the existing
including complaints, criminal records, Admin, User and system. Now the existing system is subjected to close study
Police Station Management System, etc. and problem areas are identified. The designer now functions
as a problem solver and tries to sort out the difficulties that the
Keywords— case management system, complaints registration, enterprise faces. The solutions are given as proposals. The
safety tips, police station, automation. proposal is then weighed with the existing system analytically
and the best one is selected. The proposal is presented to the
I. INTRODUCTION user for an endorsement by the user. The proposal is reviewed
The software to be produced is on “Crime Reporting on user request and suitable changes are made. This is a loop
System”. The main authority is given to the Admin. He that ends as soon as the user is satisfied with the proposal [2].
provides unique username and password for each employee Preliminary study is the process of gathering and interpreting
through which the user can login and perform the activities facts, using the information for further studies on the system.
given by the Admin [1]. As soon as a new employee joins the Preliminary study is a problem solving activity that requires
company Admin assigns tasks to him/her. Next is the main intensive communication between the system users and
module of the system that is the Crime module. In this all the system developers. It does various feasibility studies. In these
crime information will be stored in the database. First studies a rough figure of the system activities can be obtained,
complaint details will be added into the system, and then from which the decision about the strategies to be followed for
Station employee checks, complaint is related to crime or law effective system study and analysis can be taken.
and order. If it is a crime, it goes to a criminal record. As soon
as this task is completed FIR charge sheet will submit to the A. Existing System
court. • Lack of security of data.
• More manpower.
II. SYSTEM ANALYSIS • Time consuming.
Objective: System analysis is a process of gathering and • Consumes large volume of pare work.
interpreting facts, diagnosing problems and the information to • Needs manual calculations.
recommend improvements in the system [2]. It is a problem • No direct role for the higher officials.
Ashwani Sharma#, Bhuvanesh Kumar Sharma*, Avdesh Bhardawaj#

B. Proposed system B. Economical feasibility


The aim of the proposed system is to develop a system of The developing system must be justified by cost and benefit.
improved facilities. The proposed system can overcome all the Criteria to ensure that effort is concentrated on the project,
limitations of the existing system. The system provides proper which will give best, return at the earliest. One of the factors,
security and reduces the manual work. which affect the development of a new system, is the cost it
• Security of data. would require [3].
• Ensure data accuracy's. The following are some of the important financial questions
• Proper control of the higher officials. asked during preliminary investigation:
• Minimize manual data entry. > The costs, conduct a full system investigation.
• Minimum time needed for the various processing. > The cost of the hardware and software.
• Greater efficiency. > The benefits in the form of reduced costs or fewer costly
errors.
• Better service.
Since the system is developed as part of project work, there is
• User friendly and interactive.
no manual cost to spend for the proposed system. Also, all the
• Minimum time required. resources are already available, it gives an indication of the
system is economically possible for development.
III. FEASIBILITY STUDY
C. Behavioral feasibility
A Feasibility study is made to see if the projects on This includes the following questions: Is there sufficient
completion will serve the purpose of the organization for the support for the users? Will the proposed system cause harm?
amount of work, effort and the time that spend on it. The projects would be beneficial because it satisfies the
Feasibility study lets the developer foresee the future of the objectives when developed and installed [4]. All behavioral
projects and the usefulness. A feasibility study of a system aspects are considered carefully and conclude that the project
proposal is according to its workability, which is the impact is behaviorally feasible.
on the organization, ability to meet their user needs and
effective use of resources. Thus, when a new application is IV. SYSTEM REQUIREMENT
proposed it normally goes through a feasibility study before it A. Hardware Requirements
is approved for development. The document provides the Processor : Intel Processor
feasibility of the projects that is being designed and lists RAM : 1 GB RAM
various areas that were considered very carefully during Hard Disk : 80 GB
the feasibility study of this project such as Technical, Monitor : 19” color monitor
Economic and Operational feasibilities. The following are its Peripheral : Key board, Mouse
features: USB Ports : 2.0 or higher
A. Technical feasibility B. Software Requirements
The system must be evaluated from the technical point of Operating System : Window XP, 7
view first. The assessment of this feasibility must be based on Wamp Server : 2.2 or Higher
an outline design of the system requirement in the terms of Apache server : 2.4.2 or Higher
input, output, programs and procedures. Having identified an Browser : Internet Explorer, Mozilla Firefox
outline system, the investigation must go on to suggest the Front End : PHP, HTML
type of equipment, required method developing the system, of Back End : SQLITE
running the system once it has been designed. Web Technology :HTML, PHP
Technical issues raised during the investigation are:
>Does the existing technology sufficient for the suggested V. SYSTEM DESIGN
one? The Crime File System is a system used to report crimes. This
> Can the system expand if is developed? project will be done using VB 6.0 as front end, and MS
The projects should be developed such that the necessary Access as back end. It can used to report crime. This project is
functions and performance are achieved within the mainly useful for police stations. This system will help to
constraints [4]. The projects are developed within latest manage all the activities in a police station using computers.
technology. Through the technology may become obsolete Currently, all the works are done manually, by computerizing
after some period of time, due to the fact that newer version of all the activities inside a police station can be managed easily
same. and effectively.The modules involved in this project are:
The Software supports older versions; the system may still be • Login for user and admin
used. So there are minimal constraints involved with this • Complaint registration
project. The system has been developed using Java the
• View complaint status
projects is technically feasible for development.
• Criminal register management
International Conference on Engineering Technology and Science (ICETS’16)
• Case History Details management product. As in the case of any systematic approach, this
• Manage list about most wanted criminals software too has undergone the best possible design phase fine
• Latest news regarding crime in the city tuning all efficiency, performance and accuracy levels [7].
• Safety tips for individuals, especially for women and The design phase is a transition from a user oriented document
also for vendors. to a document to the programmers or database personnel.
A. Login System design goes through two phases of development:
This includes Administrator, Police and User login. There will Logical and Physical Design.
be a username and password to login into the system to use all
VI. DATA FLOW DIAGRAM
the facilities.
The data flow diagram is analogous to a road map. It is a
B. Complaint registration network model of all possibilities with different detail shown
This module helps to register the details about the crime. This on different hierarchical levels [5]. This process of
is done by entering some details, such as incident details, representing different details level is called “leveling” or
Victim details, crime details etc. “partitioning” by some data flow diagram advocates. Like a
road map, there is no starting point or stop point, no time or
C. View complaint status timing, or steps to get somewhere. We just know that the data
This module allows us to view the status of the complaint that path must exist because at some point it will be needed. A
you have registered earlier. road map shows all existing or planned roads because the road
is needed [3]. Details that are not shown on the different levels
D. Criminal register management of the data flow diagram such as volumes, timing, frequency,
Here we can have the facility to view the details of the etc. is shown in supplementary diagrams or in the data
criminals. The administrator can add new criminals’ details dictionary. For example, data store contents may be shown in
and save it in a database. This can be done by entering details the data dictionary.
such as criminal number, age, occupation, type of crime etc. Data Flow Diagram (DFD) uses a number of symbols to
represent the systems. Data Flow Diagram also known as
E. Case history details management ‘Bubble Chart’ is used to clarify system requirements and
Here we can view the details of the case, date of occurrence, identifying the major transformations that will become
the type of crime and place of occurrence etc. program codes in system design [5]. So it is the starting point
of the design phase that functionally decomposes the
F. Manage the list of most wanted criminals
requirements specifications down to the level of details.
This is an additional feature added to this Software, which
helps us to make a quick search about the most wanted
criminals. This helps to always keep track of and identify a
person quickly, who is a most wanted criminal.
G. Latest news regarding crime in the city
This is an additional feature added to the software in which
the admin enters the latest news regarding crime in the city
which is made visible to the general user in the News tab. Fig. 1 User registration module

H. Safety tips for individuals, women and vendors


Here the admin adds a few safety tips for individuals, women
and vendors on how to react and what necessary steps to take
when in unfavorable conditions [6]. The basic aim for Safety
Tips’ tab is to spread awareness to avoid further mishaps.
Design is the first step into the development phase for any
engineered product or system. Design is a creative process. A
good design is the key to effective system. The term "design"
is defined as "the process of applying various techniques and
principles for the purpose of defining a process or a system in
sufficient detail to permit its physical realization". It may be
defined as a process of applying various techniques and
principles for the purpose of defining a device, a process or a
system in sufficient detail to permit its physical realization [7].
Software design sits in the technical kernel of the software
engineering process and is applied regardless of the Fig. 2 Administrator login module
development paradigm that is used. The system design
develops the architectural detail required to build a system or
Ashwani Sharma#, Bhuvanesh Kumar Sharma*, Avdesh Bhardawaj#
VII. DATABASE DESIGN
A database is an organized mechanism that has the capability
of storing information through which a user can retrieve stored
information in an effective and efficient manner. The data is
the purpose of any database and must be protected.
The database design is a two level process. In the first step,
user requirements are gathered together and a database is
designed which will meet these requirements as clearly as
possible. This step is called Information Level Design and it is
taken independent of any individual DBMS [8]. In the second
step, this Information level design is transferred into a design
for the specific DBMS that will be used to implement the
system in question [8]. This step is called Physical Level
Design, concerned with the characteristics of the specific
DBMS that will be used. A database design runs parallel with
the system design.

Fig. 3 User login-complaint module A. Input design


The design of input focuses on controlling the amount of input
required, controlling the errors, avoiding delays, avoiding
extra steps and keeping the process simple. The input is
designed in such a way so that it provides security and ease of
use with retaining the privacy [8]. The dialog to guide the
operating personnel in providing input.

B. Output Design
A quality output is one, which meets the requirements of the
end user and presents the information clearly. In output design
it is determined how the information is to be displaced for
immediate need and also the hard copy output. It is the most
important and direct source information to the user. Efficient
and intelligent output design improve the system's relationship
to help user decision-making [7]. Designing computer output
should proceed in an organized, well thought out manner; the
right output must be developed while ensuring that each
Fig. 4 Administrator user interaction module
output element is designed so that people will find the system
can use easily and effectively.

VIII. ENTITY- RELATIONSHIP DIAGRAM


An entity-relationship model is a systematic way of describing
and defining a business process. The process is modeled as
entities that are linked with each other by relationships that
express the dependencies and requirements between them,
such as: one building may be divided into zero or more
apartments, but one apartment can only be located in one
building [9]. Entities may have various properties that
characterize them. Diagrams created to represent these entities,
attributes, and relationships graphically are called entity–
relationship diagrams as shown in the Fig.6.

Fig. 5 User reports module


International Conference on Engineering Technology and Science (ICETS’16)
confirming existing beliefs. Checking is a process of
confirmation, verification, and validation. When we already
believe something to be true, we verify our belief by checking.
We check when we’ve made a change to the code and we
want to make sure that everything that worked before still
works [3]. When we have an assumption that’s important, we
check to make sure the assumption holds. Excellent
programmers do a lot of checking as they write and modify
their code, creating automated routines that they run
frequently to check to make sure that the code hasn’t broken.
Checking is focused on making sure that the program doesn’t
fail.
Checking Procedures
• Checking Reports.
• Avoid redundant data.
• Support for focusing on major issues.
• Makes data & structures consistent.
• Checking Drawings.
• Provides the design according to the requirement of
the project.
• Provides complete & a clear idea of the project.
• Provides coordination with other aspects of the
project, i.e., structural, civil, traffic, right-of-way, etc.
• Gives compatible standards and good plans,
preparation practice.
• Checking calculations.
• Checking correspondence.

B. Controls
System Access Controls: Ensuring that unauthorized users
don't get into the system, and by encouraging (and sometimes
forcing) authorized users to be security-conscious–for
example, by changing their passwords on a regular basis. The
Fig. 6 Entity-relationship diagram system also protects password data and keeps track of who's
IX. SYSTEM SECURITY doing what in the system, especially if what they're doing is
security-related (e.g., logging in, trying to open a file, using
A. Checks special privileges).
A check provides a binary result—true or false, yes or no.
Checking is all about asking and answering the question Data Access Controls: Monitoring who can access what data,
“Does this assertion pass or fail?” Such simple assertions tend and for what purpose. Your system might support
to be machine-decidable and are, in and of them, value-neutral. discretionary access controls; with these, you determine
When a check passes, we don’t know whether the program whether other people can read or change your data [4]. Your
works; we only know that it’s still working within the scope of system might also support mandatory access controls; with
our expectations [2]. The program might have serious these, the system determines access rules based on the security
problems, even though the check passes. To paraphrase levels of the people, the files, and the other objects in your
Dkijstra, “checking can prove the presence of bugs, but not system.
their absence.” Machines can recognize inconsistencies and
problems that they have been programmed to recognize, but Discretionary Access Controls: Discretionary access control
not new ones. Testing doesn’t tell us whether the program (DAC) is an access policy that restricts access to files (and
works either—certainty on such questions isn’t available—but other system objects such as directories and devices) based on
testing may provide the basis of a strong inference addressing the identity of users and/or the groups to which they belong
the question “problem or no problem?” Testing is, in part, the [10]. What's discretionary about discretionary access control?
process of finding out whether our checks have been good In contrast to mandatory access control, in which the system
enough. When we find a problem through testing, one controls access, DAC is applied at your own discretion. With
reasonable response is to write one or more checks to make DAC, you can choose to give away your data; with MAC, you
sure that that particular problem doesn’t crop up again. can't. Not only does DAC let you tell the system who can
Checking is something that we do with the motivation of access your data, it lets you specify the type of access allowed.
Ashwani Sharma#, Bhuvanesh Kumar Sharma*, Avdesh Bhardawaj#
For example, you might want everyone in the system to be
able to read a particular file, but you might want only yourself
and your manager to be able to change it [10]. Most systems
support three basic types of access:
Read- If you have read access to a file, you can read the file.
Write- If you have write access to a file, you can write
(change or replace) the file.
Execute- The execute permission is relevant only if the file is
a program. If you have executed permission for a file, you can
run the program.
Self/Group/Public Controls: In many systems, you control
access to your files by dividing the world of users into three
categories, and telling the system what the users in each
category can do with your file. Some systems call
these self/group/public controls. In UNIX, they're
called user/group/other (UGO) controls:
Fig. 9 Missing person

Fig. 7 Self/group/public permissions

X. RESULTS
Fig. 10 Most wanted

Fig. 8 Homepage

Fig. 11 Registration Page to Complain Online


International Conference on Engineering Technology and Science (ICETS’16)
phase are fully met, thus resulting in the formation of good
software. The interface provided is very user friendly and
flexible for all times.

XII. FUTURE ENHANCEMENT


We can update this system as online application. The main
advantage of online application is that, a person or Users can
view the progress of their complaints online. By the future
technology user can view the case details and progress of the
complaints on their mobile phones. Face recognition
technology can apply. User or witness of the crime can give
the physical information of the thief.

XIII. REFERENCES
[1] S. Maghu, S. Sehra and A. Bhardawaj, Inside of Cyber Crimes and
Information Security: Threats and Solutions”, International Journal of
Information & Computation Technology, Volume 4, Number 8 spl., pp. 835-
840, 2014.
[2] P. Bhateja, P. Sehrawat and A. Bhardawaj, An Analysis of Data Mining,
Web Image Mining and their Applications, International Journal of
Fig. 12 Post Complaints Information and Computation Technology, Vol. 3, No. 6, pp. 603-608, 2013.
[3] C. Arora, C. Kaur, A. Gupta and A. Bhardawaj, A Review of Recent E-
learning Trends: Implementation & Cognitive Styles”, International Journal
of Information & Computation Technology, Volume 4, Number 3 spl., pp.
215-220, 2014.
[4] S. Goel and A Bhardawaj, A Critical Analysis of Augmented Learning by
Applicability of IT Tools”, International Journal of Information &
Computation Technology, Volume 4, Number 4 spl., pp. 425-430,2014.
[5] J. Govil, Ramifications of cyber crime and suggestive preventive measures.
In Electro/Information Technology, IEEE International Conference on (pp.
610-615). IEEE, 2007.
[6] M. Gupta, B. Chandra, and M. P. Gupta, Crime data mining for Indian
police information system. Proceeding of the 2008 Computer Society of India.
[7] C. H. Ku, and G. Leroy, A decision support system: Automated crime
report analysis and classification for e-government. Government Information
Quarterly, 31(4), 534-544, 2014.
[8] N. Martin, and J. Rice, Cybercrime: Understanding and addressing the
concerns of stakeholders. Computers & Security, 30(8), 803-814, 2011.
[9] J. S. Jadhav, and K. M. Nalawade, Research Aspect of Expert system of
Indian judiciary of crime against women. The International Journal Of
Fig. 13 Track Complaints Engineering And Science, 2(7), 2013.
[10] A. B. Patki, S. Lakshminarayanan, S. Sivasubramanian, and S. S. Sarma,
Cyber crime information system for cybernetics awareness. In Cyberworlds,
XI. CONCLUSION 2003. Proceedings. 2003 International Conference on (pp. 46-53). IEEE.

Crime reporting system initiates the objective of providing


the user with customized and powerful complaint registration
and process management system side software. The software
is built with all options such as complaint registration, the
prisoner’s registration, and postmortem report generation, etc.
all the requirements specified during the analysis and design

View publication stats

You might also like