0% found this document useful (0 votes)
22 views43 pages

Final Documentation 1

The document outlines a project proposal for the MSUAS Crime Management System, aimed at replacing the manual record-keeping system currently used at Manicaland State University of Applied Sciences. The new system seeks to enhance efficiency, data security, and timely access to crime-related information, addressing issues such as data redundancy and corruption in the existing manual system. The project includes a detailed plan covering the introduction, planning, analysis, design, and implementation phases, along with acknowledgments and a budget breakdown.

Uploaded by

liamphileo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views43 pages

Final Documentation 1

The document outlines a project proposal for the MSUAS Crime Management System, aimed at replacing the manual record-keeping system currently used at Manicaland State University of Applied Sciences. The new system seeks to enhance efficiency, data security, and timely access to crime-related information, addressing issues such as data redundancy and corruption in the existing manual system. The project includes a detailed plan covering the introduction, planning, analysis, design, and implementation phases, along with acknowledgments and a budget breakdown.

Uploaded by

liamphileo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

MANICALAND STATE UNIVERSITY OF APPLIED SCIENCES

FACULTY OF APPLIED SCIENCE AND TECHNOLOGY


DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION SYSTEMS

MSUAS CRIME MANAGEMENT SYSTEM

THIS ENTERPRISE TEAM PROJECT IS SUBMITTED IN PARTIAL FULFILLMENT OF


THE REQUIREMENTS FOR THE BACHELOR OF SCIENCE HONOURS IN
INFORMATION SYSTEMS

BY

STUDENT NAME REGNUMBER

CHABATA DELIGHT. M214UR

STUDENT NAME REGNUMBER

MAPOLISA LILLIAN M21AST

2023

APPROVAL FORM

1
The undersigned certify that they have supervised the student(s) Delight Chabata and Lillian
MAPOLISA, registration number M214UR and M21AST on dissertation entitled: MSUAS
CRIME MANAGEMENT SYSTEM, submitted in the partial fulfilment of the requirements of
the Bachelor of Science Honours in Information Systems at Manicaland State University of
Applied Sciences.

…………………………………………. ………………………………
Supervisor Date

…………………………………………. ………………………………
Chairperson Date

DECLARATION

2
We Delight Chabata and Lillian MAPOLISA confirm that this work is our original work and
it has been written by us in its entirety. We have duly acknowledged all the sources of
information which have been used in the dissertation.

Student’s signature ______________________ Date ________________


Student’s signature ______________________ Date ________________

ABSTRACT

3
For us to keep track of MSUAS records, it is still using the conventional technique of pen and
paper. This system takes a lengthy time to complete a single transaction, resulting in the loss of
information in some circumstances (crime files), insecurity, and data redundancy. Similarly,
certain situations have been documented in which jail employees conspire with clients (victims)
to falsify and conceal material or files, thereby jeopardizing the case's evidence. This has resulted
in time wasted handling cases, increased corruption and vulnerability of crucial files, and hence
raised the overall cost of the procedure. Also, when reports are required, particularly about
convicts, it takes a long time, making it difficult for Prison Management to make quick
judgments. This has resulted in numerous system flaws because there is no tracking and/or
monitoring of the information available in the various Departments, and there are no security
procedures in place to protect the available information. This demanded the system being
automated in order to be more efficient and effective. The present manual file-based system in
use was closely examined and compared to the proposed solution. A prototype of a proposed
system was created to facilitate data access, security, and retrieval for the prison administration's
quick report preparation. The prototype was created MySql database, PHP, CSS, JavaScript and
HTML

ACKNOWLEDGMENT

4
We would like to extend our heartfelt gratitude to our Supervisor Mrs C. Ruvinga for the
seamless support and guide throughout my endeavour. Throughout the writing of this project, we
have received great support from my lecturers in the department of Computer Science, I would
love to appreciate their effort towards guiding us from the first year to date. They provided me
with the tools that I needed to choose the right direction and successfully complete our project,
without them this project would never be a success. In addition, we would like to thank our
parents for their wise counsel and sympathy, there are our friends, who were of great support in
deliberating over our problems and findings, as well as providing a happy distraction to rest my
mind outside of our research. Finally, so much thanks to the Lord Almighty for backing me in
this great and challenging endeavour.

Author L MAPOLISA AND DELIGHT CHABATA .

5
Table of Contents
DECLARATION i
ABSTRACT ii
CHAPTER 1: INTRODUCTION 1
1.0 Introduction 1
1.1 Background 1
1.2 Problem Statement 2
1.3 Objectives 2
1.4 Research Question 3
1.5 Instruments and Methods 3
1.6 Justification 4
CHAPTER 2: PLANNING PHASE 6
2.0 Introduction 6
2.1 Business Value 6
2.2 Technical and Social Feasibility 7
2.3 Economic and Operational Feasibility 8
2.4 Operational Feasibility 13
2.5 Risk Analysis 14
2.6 Develop work plan 15
2.7 Chapter Summary 18
CHAPTER 3: ANALYSIS PHASE 19
3.0 Introduction 19
3.1Analysis of Existing System 19
3.2 DFD and Activity Diagrams of existing system 19
3.3 Information Gathering technique(s) used 21
3.4 Context Diagram 22
3.5 Chapter Summary 23
CHAPTER 4: DESIGN PHASE 24
4.0 Introduction 24
4.1 DFD and Context diagram of the proposing system 24
4.2 ER-Diagrams/ Tables, Sequence, package 26
4.3 Main menu and submenu design 27
4.4 Interface design (Input forms/Output forms) 29
4.5 EER and Class diagrams 32
4.6 Pseudo code 33
4.7 Architectural design 33
4.8 Security design (Physical, network and operational) 37
4.9 Chapter Summary 42
CHAPTER 5: IMPLEMENTATION 43
5.0 Introduction 43
5.1 System Security 43

6
5.2 Testing 43
5.3 Maintenance 45
5.5 Conversion 46
5.6 Recommendations for future development 46
5.7 Conclusions and Reflection 46
5.8 Chapter Summary 47
References 48

CHAPTER 1 INTRODUCTION

1.0 Introduction

7
Over the past years MSUAS have been using a manualized system for managing security
records. The system was once considered as the best before technology. No-one ever thought
about having a computerized system until recently. We often see in films that they provide
security to the schools and Universities by installing sliding gates which can only be opened by
authorized personnel. This means not everyone has access to the system. These schools and
Universities also install CCTVs to monitor the activities of every student inside and outside their
premises. That means every activity they undertake is under surveillance. But have they ever
thought about a security management system. This is because they found the need to make sure
no criminal ever escapes and their records. But what happens if there is a fire outbreak and there
are handwritten documents with criminal details. With the computerized system our information
will be safe on cloud storage if there is a fire outbreak and even is earthquake where to attack the
University. No information can be lost no matter what happens. If our machines are to come
across different threatening situations. We can still get other machines and access our
information.

The MSUAS SECURITY Management System would allow us to have information of those
with criminal records and damages at the University. Instead of the personnel having to flip over
pages to identify the crime and criminals we have.
After its completion, the MSUAS SECURITY Management System must be able to give us
crime index in the form of reports where we are going to have information on the number of
people with crimes and for what crime.

1.1 Background
In the current system, there is the slower retrieval of records that is if a criminal is to be be given
a judgement , it takes time to look through the manual records. This is because, the officers will
be looking through into each and every records kept.

Moreover, with this current manualized system, MSUAS continue to have more criminals. This
is because, with the use of manual records it is hard to determine which crimes are being done
makes it even more difficult to manage. Overpopulation has led to a difficulty in managing the
day-to-day activities of the crimes. Then lastly, with the u use system being used to manage the
crimes, some criminals are actually going free because of lack of proper record keeping. If there
are records of an individual stating the crimes , it will be easier to know were security is needed
most.

1.2 Problem Statement


There are quite a number of universities in Zimbabwe, still using manual record systems which
requires too much workforce, effort and time to manage records. It also consumes more
stationary, not forgetting poor data security and backups. As researchers we have noted that the
MSUAS is overcrowded due to improper record management. This is because using manual
system takes time to notice overpopulation. Thus, we have decided to develop a system as a

8
replacement of the manual system, which is more secure, enhances record backups, it is going
help reducing the costs incurred by the organisation in the case of stationary, help reduce
overpopulation, among others.

1.3 Objectives
● To maintain statistical records of crimes based on category.
● To facilitate effective crime recording and tracking.
● To enable timeous allocation of officers to cases reported.

1.4 Research Question


i) How to generate the crime index and the criminal population?
ii) How to group the criminals according to the crimes committed?

1.5 Instruments and Methods


Developer Requirements

Hardware
Processor – intel dual core processor, 2.0 GHz or higher
RAM – minimum 4Gb
Network interface chip
Hard drive – 160 GB

Software
Operating system: windows XP or higher
Front end: c# (visual studio 2013 or higher)
Back end: SQL Server

1.6 Justification
The main users of the system will basically be the Chief of records, Admin or security guards.
The users and the system will be interacting through a Graphical User Interface supported by
Microsoft.Net framework 3.0 or latter. The MSUAS SECURITY management will give solution
to accurate and consistent handling of bulk criminal records without redundancy. The system
will also provide real time reports concerning university overall population, crime done.

The system is also going to reduce too much paper work at the same time strengthening data
security and backup. The University has been facing a problem of records disappearance. If in
any case they have a system to manage criminal records, there would be little to no risk of
records loss. This is because if records are being stored in a database, the probability that the
information is backed up. So, in any case, if the manual record is to disappear there would be a
backup, be it an online backup facility or a physical backup facility. Adding on, system will

9
enhance security for the records of the criminals. The problem comes after the case, where an
individual student after stealing a printer, the security guards took him to the adim and they gave
him to the police. But, the problem came when they noticed that there were no records regarding
the name of the security guard who caught him, the records had mysteriously disappeared . So,
our system aims to avoid such a problem from occurring at the University. Where there is
security there is little to no chance of records disappearing. These two work hand-in-hand.
Thus, the introduction of the MSUAS SECURITY Management System, would reduce the risk
of the disappearance of criminal records.

The system will allow:

Admin (Disciplinary Commit)

Add criminal
Update criminals
Criminal information
View reports:
i) Crime index report
ii) Criminal categories
iii)Cleared Criminals
Print report
Profile
View file
Print file

Of course, the system is designed to provide advantages to the users, but there is a however side
to everything. This system can only be edited by personnel who are computer literate. Thus, it
will definitely be expensive for the organization to empower the officers with the required skills
so they can be able to edit, access and delete records.

Adding on, there may be duplications, the skipping of records that may be of importance to the
organization in question.

1.7 Chapter Summary

In this chapter we are finding out the problems being faced by university and how to address
those problems. We then go on to define the requirements so that we have a successful system.
To have a successful system that meets the required functionalities we should define the
Problem, objectives, requirements and we justify. These are essential in the first stage of the
system development.

10
CHAPTER 2 : PLANNING PHASE

2.0 INTRODUCTION
This chapter is going to explain various concepts including Business Value, which gives an
overview on the benefits that will come by the development of a new system, Technical and
Social Feasibility, Economic and Operational Feasibility and Stakeholders Analysis. It will also

11
look into the development of a work plan which is essential for smooth management, monitoring
and evaluation of the project.

2.1 Business Value


According to (Schwartz, 2016) business value is the accomplishment of an organization as it
applies information to attain its business and goals and objectives. This tells us about benefits
that will come with the development and implementation of a new system. The below listed are
the benefits of the proposed projects:

I. MSUAS CRIME MANAGEMENT SYSTEM is aiming to improve the disciplinary


committee (adim) operation in every aspect. There will be better efficiency. This system
can also help to improve efficiency. For example, if you need to track criminals, you can
do this easily using MSUAS CRIME MANAGEMENT SYSTEM. This can save a lot of
time and effort compared to doing it manually.
II. Once the system is introduced to the intended organisation. There is need to train the
organisations workforce so they can be able to operate the system. As an organisation,
having suitably qualified personnel improves its value since it will not be getting
outsiders to operate their own system.
III. Quick decision making. The system provides a bird’s eye to the disciplinary committee
to view of their facility, illustrating every change in bed allocation, crimes that are mostly
done and anything else they need to know in real-time.
IV. The MSUAS CRIME MANAGEMENT SYSTEM will contain a dashboard showing the
crime index for each crime committed, for example, theft, violence, breakages,etc. This
means, MSUAS as stakeholders will know the safety precautions to take as a way of
protecting the University . That is, the University will have information on the cases in a
certain period of time.

2.2 Technical and Social Feasibility

Technical Feasibility
According to Dennis. A (2012), technical feasibility is a tool used to evaluates project‘s potential
for success by specifying the hardware and software equipment that will successfully satisfy the
user requirement. This concept measures the practicality of the technical solution and the
availability of technical resources and expertise. It is carried out to assess whether the
organisation is technically feasible to support the project in terms of hardware, software and
technical expertise. Technical feasibility is inclined on the technical expertise and the availability
of the equipment to be used.

Hardware and Software Requirements

Hardware

12
● Processor – intel dual core processor, 2.0 GHz or higher
● RAM – minimum 4Gb
● Network interface chip
● Hard drive – 160 GB

Software
● Operating system: windows XP or higher
● Front end: c# (visual studio 2013 or higher)
● Back end: SQL Server

To conclude on the Technical Feasibility most of the requirements are readily available and the
organization is willing to purchase the items and update specific software.

2.3 Economic and Operational Feasibility

Economic Feasibility
Social Feasibility looks at how the new system will affect the environment with interest on how
society can benefit from the system. According to Matthew J. Franchetti (August 23rd, 2011),
economic feasibility study is the financial evaluation of the project to analyse alternatives. Social
Feasibility looks at how the new system will affect the environment with interest on how society
can benefit from the system.

There are number of social changes that are brought about by the adoption of the proposed
system which will affect the operations, admin performance and prospects as well as user
confidence. In other terms the social feasibility clarifies the fact that, will the proposed system
influence working practices in a favourable way and show improvements on working conditions
of employees.

The system will reduce the need of numerous physical meetings thereby reducing time to
socialise during work hours hence that time is reserved for other activities. MSUAS CRIME
MANAGEMENT SYSTEM physical interaction with the criminal is monitored. The system can
collect and maintain accurate and consistent crime's information hence improving safety and
security of the University.
DEVELOPMENT COST

Quantity Description Unity Cost Total Cost


($) ($)

12 Laptops Computers 1300 15 600

13
1 Visual Studio Free Free

1 Sever Machine 2000 2000

2 48 Port Switch 1000 2000

1 Windows 11 OS 100 100

Total 19 700
.
RUNNING Cost

Installation and Operating costs USD Cost

Stationary and computer consumables 600

Software Upgrades 400

System Maintenance(over one year) 1000

Total 2000

Tangible Benefits
In the old system there we almost 20 workers in disciplinary committee who were responsible
for organizing documents, with the introduction of the new system those 20 workers will be
reduced and thus, giving us benefits.
Benefits Cost ($)

Labor Costs Reductions 10000

Enriched staff productivity 7000

Total 17 000
Intangible Benefits
These are benefits that cannot be easily measured in monetary terms (Aizcorbe, Moylan,
Robbins ,2009)
● Improve Less human errors thereby increasing efficiency
● Job satisfaction due to reduced labor.
● Improved staff moral since the allocation will now be computerized

14
Cost Benefit Analysis
On cost-benefit analysis Sustain, 2005 alluded that the most appropriate method of carrying out
an economic assessment of a proposed information system is by comparing the expected costs of
development and operation of the system with the benefits of having it in place. The assessment
is centred on checking whether estimated costs are exceeded by the estimated income and other
benefits. It is necessary to ask whether or not the project under consideration is the best of a
number of options. There might be more candidate projects that can be undertaken at any one
time and, in any case, projects will need to be prioritized so that any scarce resources may be
allocated effectively.The standard way of evaluating the economic benefits of any project is to
carry out a cost-benefit analysis which involves:
● Identifying and estimating all of the costs and benefits of carrying out the project.
● Expressing these costs and benefits in common units that is in monetary terms.

Costs and Benefits Cost (USD) Cost (USD) Cost (USD)

Development Costs 19000

Running costs 2600

Total costs 11600

Benefits to the Organization

Tangible 14000

Intangible monetary 10000

Total Benefits 24000

Net Benefits 12400

Return on Investment Analysis


The cost benefit will be determined by the following three methods:
● payback
● Net Present Value
● Return on Investment

Payback Period
Payback Period is the period of time it takes for investments to yield profits. It can also be a
period needed to break even. The time value is considered as it measures how long an investment
takes to pay itself.
The longer the payback period the riskier the project is and the period should never go above
acceptable payback period. The period found by adding the inflows to the cumulative flow is
zero, the project is deemed the project period.

15
Year Expected cash flow Cumulative Cash Flow

0 (11600) (11600)

1 6000 (5600)

2 6500 900

3 8000 8900

Payback Period

From the table above, the payback period is calculated as follows:

Initial investment/ cash inflow per period

= A+B/C

= 1+(5600/6500)

= 0,9 years

Net Present Value

If Net Present Value of a prospective project is positive, it should be accepted, and when it is
negative, the project should probably be rejected:

Year Estimated Cash Flows

0 (11600)

1 6000

2 6500

3 8900

Using a Discounting Rate of 10%


Formula : NPV = Rt/((1 + i)^t)
Where Rt = net cash flow which is net cash inflow – cash outflow,
I = discount rate
t = time of cash flow in years

16
Initial investment is $15000
6000/ (1+0.1) ^1 + 6500/ (1+0.1) ^2 + 8900/(1+0.1) ^3

=$17 513.15 -$11600

=$5913.15

Return on Investment (ROI)

Provides a simple way to calculate rate on return of capital invested.

Calculated as follows:

ROI = Profit/ initial *100

12400/15000*100

=51%

The system also bring satisfaction to all stakeholders because instead of doing manual adding,
releasing, updating and information retrieval these processes are computerized thereby saving
time and effort.

However, the computerized system may be a threat to employees and society. To the society the
system can reduce demand for labour therefore increasing unemployment rate. To the existing
employees some will have fear on losing their jobs. It can also be a monster to those employees
who are computer illiterate. In order to solve this problem there will be a minimum retrenchment
rate if employees are thoroughly trained to enhance necessary computer skills. Training will also
motivate them at the same time helping them to understand that technology is not a tool to be
afraid of but rather it comes to make work easier for them.

In conclusion on social feasibility, it can be deemed feasible since the analysis highlighted more
of positive effects the change will bring

2.4 Operational Feasibility

Economic feasibility measures the cost-effectiveness of the project and the system can be
deemed feasible if the projected benefits of the proposed system outweigh the estimated costs in
developing, installing and operating it. In dealing with economic feasibility, cost benefit analysis
is done to evaluate the expected costs and the benefits. In economic feasibility cost benefit
analysis is a pre-requisite. Quantification and identification of all the benefit expected to be
brought about is included. The benefits can either be tangible or intangible.

Intangible or soft benefits

17
These are benefits in relation to qualitative feature expected of the new system. The benefits
include:

● Increased security
● Organizational standards, professionalism and values are improved.
● Enhanced decision making by the disciplinary committee management.

Tangible or hard benefits

● reduction of labour costs


● vital data like criminal details, behaviours and attitudes are captured

Operational Feasibility

It is mainly concerned with the usability of the system if it is developed and in place. It takes into
account the reactions from users. The following questions help in trial of the operability of the
system:

● Are the intended users satisfied by the current system functions?


● Are the management going for the project?
● Is the new system in acquaintance with the University?
● Are the current technical resources sufficient for the new system?

2.5 Risk Analysis

According to Ian Sommerville (2015) risk analysis is the process of identifying risks that are
associated with developing and deploying the project and drawing up plans to minimize their
effect.A considerable number of risks may be confronted during the new system development.
This analysis identifies important risks in association with the project.

.Technical risks

● The system may not be able to meet the expectations set in terms of the graphical user
interface taking into mind that some users could have used varying types of systems with
different interfaces before.
● System maintenance can be a problem.
● The system will need backup and full support until the system can comfortably run.
● System Delivery requires parallel conversion in implementation until risks are done with.

Social Risks

The reimbursements of the crimes initiatives accrue mostly to university. The chances are that
the new system will face rejection as criminals may feel that they are not being allowed their

18
right of doing what they want at the University . Employees may be afraid to lose their jobs and
fear of the unknown.

Economic Risks

These risks are mainly associated with the cost of the project.

● As a result of the poor economic situation the country is rolling in, the project can be
terminated at any given time since it will be funded by the government unless a third
hand takes interest.
● The government and regulatory bodies have the rationale, power and opportunity to
improve competitive conditions through promoting standards, lessening network
externalities at community level.

2.6 Develop work plan

It records and keeps track of tracks in need to be done over life project. It gives account of tasks
and their durations. The author is going to use the System Development Life Cycle to model the
sequential activities involved in the development of the project. The Gantt shows the project time
allocation for each phases involved.In scheduling feasibility, an organization or a project team
estimates how much time the project will take to complete. Schedule feasibility of a project can
be shown using the Gantt chart and Critical path. The following is the work plan of the security
management system development.

ACTIVITY DATE DURATION (weeks)


Proposal 27/03/2023 1
Feasibility study 03/04/2023 1
Planning 10/04/2023 1
Design(UI, UX) 17/04/2023 2
Coding 01/05/2023 2
Testing 15/05/2023 1
Implementation 22/05/2023 1
Maintenance 29/05/2023

Gantt chart

PHASE| Week 1 2 3 4 5 6 7 8 9 10

Proposal

19
Feasibility
Study

Planning

Design

(UI, UX)

Coding

Testing

Implementation

Documentation
Maintenance

2.7 Chapter Summary

At this stage we are planning how we are going to develop our system taking into consideration
the related stakeholders and how they are going to benefit from the introduction of the system
and how they are going to be affected.

20
CHAPTER 3: ANALYSIS PHASE

3.0 Introduction

The analysis phase addresses the most crucial questions that the stakeholders are keen to know
the answers to while venturing into the development of the system. According to A. Dennis and
BH Wixom (2015) the analysis phase answers the questions of who will use the system, what the
system will do, and where and when it will be used. The analysis phase takes a glare at
operations of the current system, how processes are linked to the proposed system and how
activities are going to be coordinated. In this phase a set of information gathering methods were
used to collect data, and to help to find out how the system would work. The collected data was
analysed pointing out the weaknesses and strength of the current system and providing solutions
to the system weaknesses. A victorious development and completion of a suitable information
system depends on the achievement of the system analysis phase.

3.1Analysis of Existing System

When a criminal has been added,. The admin have to go through the process of adding the
criminal records manually. Keeping inmate information is time-consuming and leaves a long
trail of paperwork. With the manual system, which is the current system, there was the risk of
loss of records of criminals . According to what we searched at MSUAS University there was a
situation were a student was supposed to pay fine for breaking a window pane but, the
punishment was not done because no record was found from the criminal list.

3.2 DFD and Activity Diagrams of existing system

DFD

It shows the flow of information in the old MSUAS crime management system .

21
Activity Diagram

A few activities were undertaken in the system that is going to be replaced. The system only
allowed Conviction.

22
3.3 Information Gathering technique(s) used

A. Kahate (2004) compares requirements gathering to the way the doctors examine the patient
before prescribing the medication or to the way the lawyers study the case before they defend,
which means at this stage the analyst is studying the problems (as a doctor) with the current
system to clearly understand what demands for changing the current system.

During the analysis of the system we come up with a clear comprehension of the current system
operations. After we analysed, we came up with a system that satisfies the user requirements.
This gives a detailed explanation of the current system, how the processes are linked within the
current system and how activities are going to be linked in the new system. A set of information
gathering techniques were used to gather data to help us find out how the system works. The
techniques help in collecting data, but like any other concept they have weaknesses. The
techniques used include;

● Interviews

Interviews

An interview according to Fontana and Frey (2005) is a conversation between two people (the
interviewer and the interviewee). The interviwer will designed some questions written on papers.
Questions will be asked to the interviewees who will be selected.

Findings from the interview

The interview was carried out with the organisations stakeholders, which are the admin
(disciplinary committee), security guards and some of the criminals. Stakeholders perceptions,
attitudes and behaviours were noted during the interview.

Advantages

● Body language allowed the analyst to observe non-verbal communication from the
interviewee.
● The interview room for customization of questions for employees respective to their
departments and positions.

Disadvantages

● Interviews are time consuming and costly.


● The results are prone to subjectivity since they depend on the interviewer.
● You to get information from a large audience.

3.4 Context Diagram

23
In the old system, there was no involvement of a parent if the student commits a crime.

3.5 Chapter Summary

Analysis allows us to identify what is lacking in the current system and what needs to be added
to the new system. In other words, we are finding loop holes and come up with solutions.

24
CHAPTER 4: DESIGN PHASE

4.0 Introduction

According to Kassem A. Saleh (2009), the design phase is initiated after the deliverables of the
analysis phase are reviewed and accepted by the appropriate stakeholders and this phase includes
the activities such as high-level architectural, database, interface, and detailed designs.During the
design phase, the system is intended to fulfill the necessities distinguished in the past stages.
Stage of a design process is the preliminary design phase in which the design parameters and
conceptual diagrams are drawn up Marsot (2005). The motivation behind the outline stage is to
change the necessities into complete and itemized system plans determination.

4.1 DFD and Context diagram of the future system

DFD Diagram

Data flow diagram Below is the diagram of a DFD map out the flow of information in the
proposed Manicaland State university crime management system

Context Diagram

Shows the relationships among methods in a component. In this case we are showing the
relationships among the components in the crime as a component.

25
4.2 ER-Diagrams/ Tables, Sequence, package

4.3 Main menu and submenu design

26
The main menu gives us an overview of the operations in the system.

After accessing the main menu we access the submenu.

CRIMINAL Main Menu

The menu shows us the operations that are under the criminals.

Submenu

this menu allows us to manage users and log out of the system. By managing users we will either
be adding or deleting the user.

MSUAS CRIME Management System main menu

This for allows authorized users to gain access to the system after inputing the username and the
password.

27
4.4 Interface design (Input forms/Output forms)

This is an idea on how the users are going to interact with the system. This is the interaction
between the system and the intended users and provides communication between the entities.
This includes defining the external and internal control and data flows. It clearly shows the
design of menus, forms and the indexes. It consists of the design of the graphical user interface
components and artefacts needed to support the human interaction with the software system.

The interface should be:

● Easy to use by inexperienced users


● Easy to remember
● Fast responding and processing speed
● Easy to develop

Input Forms

Designing of all forms necessary for information input for example criminal details.

Input criminals

This form allows the admin to enter the criminal details and add to the criminal database.

28
Input form for the user

This form is using to add the users who can access the system and carry out operations.

Criminal Search

After searching for the wanted criminal using crime category. All the details of that criminal are
displayed so that the personnel who would have requested can access the information easily.

29
User output

This form gives us a list of the personnel allowed to access our system and carry out operations.
It allows us to add another user and delete another one in case they have retired or they passed-
on.

Criminal Output

It shows the list of criminals who have been added into the system and their records. The form
allows us to Insert, Update, Delete and go back to the main menu.

4.5 Pseudo code

30
Start

Select system

Enter username, password and access level

IF (username, password and access level) valid THEN

Log in

ELSE

Invalid login. Consult Administrator.

ENDIF

End

4.6 Architectural design

Architectural design is a way of representing the structure of data and program components that
are required to build a computer based system. This includes the interpretation of the theoretical
legitimate model under those particular specialized plans. It may be the configuration of the
equipment, product that those suggested framework is setting off to work on. Those framework
segments are recognized including the control and also information stream between them. The
framework will have a chance to be web based and the structural engineering will comprise of:
User Machine, System Cables and Server.

Physical Design

Physical design is the translation of business requirements into a system model that depicts
technical implementation of the users’ business requirements. Physical design is the place you
make an interpretation of the normal patterns into real database structures. Right now one needs
to guide substances to the tables, connections to the remote keys, credits to segment, one of
unique identifiers to one of unique keys

31
.

Database Design

The database design outlines the smart representation of the database. It contains 3 layers which
are external, ascertained and inside.

Database Architecture

External Level
This is the most elevated level of reflection. Its principle point will be should improve those
user’s collaboration for those database by procurement for interface that those client camwood
basically control. Those user’s see of the database is altered should his/her investment. They
main see those information that is applicable should them. The database records could make seen
utilizing forms, reports Furthermore table.

32
Conceptual Level
This level depicts what information is really saved in the database and the associations that exist
amongst the information. The information may be put away previously, tables and a table’s plan
depicts the thing that it stores, which will be the table qualities. Queries would also characterized
in this level.

Physical Level
This is the least level about reflection on how information will be really saved in the database.

Database tables

A database will be the central stockpiling of the data in this framework and with the ability to
have the same data over different applications. The accompanying are the framework tables in
their crucial institutionalised structures. Field Name insinuates the trademark name, field sort
implies the data sort of the quality and the depiction is just an optional decree.

Admin

name Date of birth password username


Varchar(20) Varchar(30) Varchar(15) Varchar(30)
Next of keen

name phone Home Relationship


address
Varchar(20) Varchar(20) Varchar(20) Varchar(20)
Criminal

name National House Crime crime Date of Date of gender


identity address categor arrest birth
y
Varchar(2 Varchar(2 Varchar(2 text(20 Varchar(2 Date(12 Varchar(2 Text(6
0) 0) 0) ) 0) ) 0) )

4.7 Security design (Physical, network and operational)

At this stage we are looking at the measures which will be taken into consideration to secure our
system. If the system is not secured,it is vulnerable to attacks which may result in us losing all
our information. The security design is found in different stages which are:

Physical Security

Physical security is the protection of personnel, hardware, software, networks and data from
physical actions and events that could cause serious loss or damage to an enterprise, agency or

33
institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism
and terrorism.

The physical security framework is made up of three main components: access control,
surveillance and testing. The success of an organization's physical security program can often be
attributed to how well each of these components is implemented, improved and maintained.

Access control

The key to maximizing one's physical security measures is to limit and control what people have
access to sites, facilities and materials. Access control encompasses the measures taken to limit
exposure of certain assets to authorized personnel only. Examples of these corporate barriers
often include ID badges, keypads and security guards. However, these obstacles can vary greatly
in terms of method, approach and cost.

The building is often the first line of defense for most physical security systems. Items such as
fences, gates, walls and doors all act as physical deterrents to criminal entry. Additional locks,
barbed wire, visible security measures and signs all reduce the number of casual attempts carried
out by cybercriminals.

Using tactically placed obstacles, organizations can make it more difficult for attackers to access
valuable assets and information. Similarly, these barriers increase the time it takes for threat
actors to successfully carry out acts of thievery, organizations have to respond to physical
security threats and contain them.

But criminals are not the only threat that access controls can minimize. Barriers such as walls
and fences can also be used to harden buildings against environmental disasters, such as
earthquakes, mudslides and floods. These risks are extremely location-dependent. Organizations
that divert resources toward such hardening measures should balance the cost and benefit of their
implementation prior to investment.

Surveillance

This is one of the most important physical security components for both prevention and post-
incident recovery. Surveillance, in this case, refers to the technology, personnel and resources
that organizations use to monitor the activity of different real-world locations and facilities.
These examples can include patrol guards, heat sensors and notification systems.

The most common type of surveillance is closed circuit television (CCTV) cameras that record
the activity of a combination of areas. The benefit of these surveillance cameras is that they are
as valuable in capturing criminal behavior as they are in preventing it. Threat actors who see a
CCTV camera are less inclined to break in or vandalize a building out of fear of having their
identity recorded. Similarly, if a particular asset or piece of equipment is stolen, surveillance can
provide the visual evidence one needs to identify the culprit and their tactics.

34
Testing

Physical security is a preventative measure and incident response tool. Disaster recovery (DR)
plans, for example, center on the quality of one's physical security protocols -- how well a
company identifies, responds to and contains a threat. The only way to ensure that such DR
policies and procedures will be effective when the time comes is to implement active testing.

Testing is increasingly important, especially when it comes to the unity of an organization. Fire
drills are a necessary activity for Jails because they help to coordinate large groups, as well as
their method of response. These policy tests should be conducted on a regular basis to practice
role assignments and responsibilities and minimize the likelihood of mistakes.

Importance of physical security

IoT demands a significant amount of physical security to safeguard data, servers and networks.
The rising connections of IoT has expanded the sphere of physical security. Virtual machines
and applications that run in the cloud, for example, are only as protected as their physical
servers.Whether organizations invest in first-party or third-party cloud computing services, these
data centres need to be sufficiently protected using physical security measures to avoid severe
data losses.

Network Security

Network Security protects your network and data from breaches, intrusions and other threats.
This is a vast and overarching term that describes hardware and software solutions as well as
processes or rules and configurations relating to network use, accessibility, and overall threat
protection.

Network Security involves access control, virus and antivirus software, application security,
network analytics, types of network-related security (endpoint, web, wireless), firewalls, VPN
encryption and more.

Benefits of Network Security

Network Security is vital in protecting client data and information, keeping shared data secure
and ensuring reliable access and network performance as well as protection from cyber threats. A
well designed network security solution reduces overhead expenses and safeguards organizations
from costly losses that occur from a data breach or other security incident. Ensuring legitimate
access to systems, applications and data enables business operations and delivery of services and
products to customers.

Types of Network Security Protections

Firewall

35
Firewalls control incoming and outgoing traffic on networks, with predetermined security rules.
Firewalls keep out unfriendly traffic and is a necessary part of daily computing. Network
Security relies heavily on Firewalls, and especially Next Generation Firewalls, which focus on
blocking malware and application-layer attacks.

Network Segmentation

Network segmentation defines boundaries between network segments where assets within the
group have a common function, risk or role within an organization. For instance, the perimeter
gateway segments a company network from the Internet. Potential threats outside the network
are prevented, ensuring that an organization’s sensitive data remains inside. Organizations can go
further by defining additional internal boundaries within their network, which can provide
improved security and access control.

Robust Network Security Will Protect Against

Virus: A virus is a malicious, downloadable file that can lay dormant that replicates itself by
changing other computer programs with its own code. Once it spreads those files are infected and
can spread from one computer to another, and/or corrupt or destroy network data. Is this case it
will affect the network of our Inmates Records Management System, thus reducing our operation
speed.

Worms: Can slow down computer networks by eating up bandwidth as well as the slow the
efficiency of your computer to process data. A worm is a standalone malware that can propagate
and work independently of other files, where a virus needs a host program to spread. In this case
it may take a lot of time to receive a notification when we have an Inmate whose sentence is
about to expire.

Ransomware: This is a type of trojan cyberware that is designed to gain money from the person
or organization’s computer on which it is installed by encrypting data so that it is unusable,
blocking access to the user’s system.

Operational Security

The Five Steps of Operational Security

The processes involved in operational security can be neatly categorized into five steps:

Identify your sensitive data, including the system research, intellectual property, employee
information, and jail personnel information. This will be the data you will need to focus your
resources on protecting.

● Identify possible threats. For each category of information that you deem sensitive, you
should identify what kinds of threats are present. While you should be wary of third

36
parties trying to steal your information, you should also watch out for insider threats,
such as negligent jail guards and unsatisfied administrartors.
● Analyze security holes and other vulnerabilities. Assess your current safeguards and
determine what, if any, loopholes or weaknesses exist that may be exploited to gain
access to your sensitive data.
● Get countermeasures in place. The last step of operational security is to create and
implement a plan to eliminate threats and mitigate risks. This could include updating your
hardware, creating new policies regarding sensitive data, or the Jail personnel who will
be in direct contact with the system on sound security practices and company policies.
Countermeasures should be straightforward and simple. The jail personnel should be able
to implement the measures required on their part with or without additional training.

Best Practices for Operational Security

Follow these best practices to implement a robust, comprehensive operational security program:

Implement precise change management processes that your employees should follow when
network changes are performed. All changes should be logged and controlled so they can be
monitored and audited.

● Give your employees the minimum access necessary to perform their jobs. Practice the
principle of least privilege.
● Implement dual control. Make sure that those who work on your network are not the
same people in charge of security.
● Automate tasks to reduce the need for human intervention. Humans are the weakest link
in any organization’s operational security initiatives because they make mistakes,
overlook details, forget things, and bypass processes. For example, instead of a jail guard
carrying out the visitor authentication process, we can use the visitors finger print as an
authentication method.
● Incident response and disaster recovery planning are always crucial components of a
sound security posture. Even when operational security measures are robust, you must
have a plan to identify risks, respond to them, and mitigate potential damages.
● Risk management involves being able to identify threats and vulnerabilities before they
become problems. Operational security forces Administrators to dive deeply into their
operations and figure out where their information can be easily breached. Looking at
operations from a malicious third-party’s perspective allows the Jail Administrators to
spot vulnerabilities they may have otherwise missed so that they can implement the
proper countermeasures to protect sensitive data.

4.8 Chapter Summary

For a system to be developed it would have been driven from somewhere. Thus at this stage, we
are looking at the costs to be incurred to enhance the success of the proposed system and the

37
benefits of the system in question. The new system to be developed gives an overview on how
the demerits of the existing system are going to be overtaken. For example, how it is going to
reduce costs in a Jail. This stage also allows us to identify the threats and vulnerabilities of the
system.

CHAPTER 5: IMPLEMENTATION

5.0 Introduction

After all the stages are complete in System Development. Then we can safely say the system is
ready for implementation. At the implementation stage we first look at the security measures to
be used so that we have a successful and secure system. During implementation stage we also
test our system to make sure there are no errors. We also look mat the maintenance strategies.
The maintenance strategies can either be successful or not, thus we need to evaluate the level of
success of the maintenance strategies.

5.1 System Security

System Security is one major aspect of a system. We need to have security strategies to enhance
a successful system. At this stage we look at the system accessed by only the authorized
personnel.

5.2 Testing

Testing is intended to show that a program does what it is intended to do and to discover
program defects before it is put into use. When you test software, you execute a program using
artificial data. So, we are going to test the MSUAS Management System to find out whether our
development has yield fruits or not. We undertake the testing process using the following
techniques, these techniques include:

Development testing

Development testing includes all testing activities that are carried out by the team developing the
system. The tester of the software is usually the programmer who developed that software,
although this is not always the case. Some development processes use programmer/tester pairs
(Cusamano and Selby, 1998) where each programmer has an associated tester who develops tests
and assists with the testing process. During the development process, testing is carried out in
three stages which are:

Unit testing: it allows each method to be tested for functionality. For example, we are checking
if the method of Keen authentication,its performing, its function without any errors or bugs.

38
Component testing: where several individual units are integrated to create composite
components. Component testing should focus on testing component interfaces. For

example, testing if our interfaces are allowing us to carry out the required functionalities.

System testing: some or all of the components in a system are integrated and the system is tested
as a whole. System testing should focus on testing component interactions. After all the
components are integrated we then have a complete system, the system then needs to be tested
for errors and see if they are meeting the specified requirements.

Development testing is primarily a defect testing process, where the testing process is to discover
bugs. It is usually combined with debugging, where we are discovering bugs and fixing them.

At this stage, we are carrying out unit testing where we are testing every component
independently. Unit testing is the process of testing program components, such as methods or
object classes. When you are testing object classes, you should design your tests to provide
coverage of all of the features of the object. This means that you should:

• test all operations associated with the object;

• set and check the value of all attributes associated with the object;

• put the object into all possible states. This means that you should simulate all events that cause
a state change.

Test-driven development

Software components are often composite components that are made up of several interacting
objects. You can assume that unit tests on the individual objects within the component have been
completed.

Release testing

System testing during development involves integrating components to create a version of the
system and then testing the integrated system. System testing checks that components are
compatible, interact correctly and transfer the right data at the right time across their interfaces

User testing

After all the testing techniques have been successful, and we are sure our system has no more
bugs and no errors have been detected recently. We then proceed to user testing. We opt for the
releasing our system and receive reviews from the users, then we know whether our system has

39
satisfied user requirements and our users are happy. For example, we deploy our system to a
small population of the University and they test the system on a few criminals check if the
system is performing the required functionalities.

5.3MAINTENANCE

According to Gary B. Shelly Harry J. Rosenblatt (2011), system maintenance as the process of
refining the system to make sure it continues to meet business needs. Once the system is
successfully installed they are processes, components, modules, and users that changes, evolver
or break which requires the continuous maintenance of the system.Maintenance is the general
process of changing a system after it has been delivered. Changes are implemented by modifying
existing system components and, where necessary, by adding new components to the system.
There are three different types of software maintenance:

1.Fault repairs

Coding errors are usually relatively cheap to correct; design errors are more expensive as they
may involve rewriting several program components. Requirements errors are the most expensive
to repair because of the extensive system redesign which may be necessary.

2. Environmental adaptation

This type of maintenance is required when some aspect of the system’s environment such as the
hardware, the platform operating system, or other support software changes. The application
system must be modified to adapt it to cope with these environmental changes.

3.Functionality addition

This type of maintenance is necessary when the system requirements change in response to
organizational or business change. The scale of the changes required to the software is often
much greater than for the other types of maintenance.

5.4 System Evaluation

The system maintenance was successful. After the implementation, errors were discovered after
testing. The errors were successfully corrected leaving no errors and no room for errors. The
system was developed in a way that it fits in every environment. But that does not mean it was
successful in every environment. Thus, maintenance for the environmental adaptation was
expensive, this was because we discovered that some areas have no Network coverage. Thus
introducing a network is expensive.

40
The tech industry is ever changing, thus we would need to constantly add some functionalities to
the system.

5.5 Conversion

This is how we are going to change from the old system to another. In this case we are going to
use the Pilot Implementation technique. This technique allows us to introduce the system to a
small segment of the desired segment while maintaining the old system. That is, we are going to
replace the old system only after the system we are going to introduce has been successfully
implemented and has met with the requirements.

Advantages of the Pilot Implementation technique

It has less risk as compared to Direct Takeover

5.6 Recommendations for future development

System development was successful, however there are some components we were not able to
implement because of time. Future developers can add the following so that they improve the
functionality of the Inmates Records Management System:

Instead of entering criminal details manually, developers could actually link the MSUAS il to the
registry. Since the registry department has details on everyone, the system could allow the entry
of details using a fingerprint. The moment ones fingerprints are detected all the information
needed is displayed.

Instead of having a few people being able to use the system, we should involve the security
guards from This will help in completing the task at hand on time.

5.7 Conclusions and Reflection

The system is performing satisfactorily thus, the project was a success of its own kind. All the
system objectives specified were satisfied. However, we faced a challenge in terms of time. The
system was implemented successfully and there are errors for now. It has since been concluded
that the system could be further expanded and introduced to the whole criminals for the
successful management system.

5.8 Chapter Summary

The implementation stage checks for the suitable security measures for the system, checks for
errors after before the final implementation. We find a strategy of implementation. This is
because we cannot just introduce a new system to an organization that has no computer
background, for this we use Pilot Implementation.

41
This is the stage were we make recommendations for future developers on what they should add
to the system that we were not able to add.

References

Dennis, A., Roth, R. and Wixom, B. (2015). Systems analysis and design. Hoboken, NJ: Wiley.

Dennis, A., Wixom, B., Tegarden, D. and Seeman, E. (n.d.). System analysis & design.

Gary B. Shelly Harry J. Rosenblatt (2011). Systems analysis and design. New Dheli

J., M. (2011). Economic and Operational Feasibility Analysis of Solid Waste Minimization
Projects. Integrated Waste Management - Volume I.

Prentice Hall. Khan, F. and Khan, M.E. (2012). International Journal of Advanced Computer
Science and Applications (IJACSA), Vol. 3, No.6.

Kahate, A. (2004). Object Oriented Analysis & Design. New Dehli: Tata McGraw-Hill
Education.

Marchewka, J. (2015). INFORMATION TECHNOLOGY PROJECT MANAGEMENT 5E. New


York: Wiley.

Rivero, L., Doorn, J. and Ferraggine, V. (2006). Encyclopedia of database technologies and
applications. Hershey, PA: Idea Group Reference.

Roth, R., Dennis, A. and Wixom, B. (2013). System analysis and design. Hoboken: J. Wiley &
Sons.

Saleh, K. (2009). Software engineering. Fort Lauderdale: J. Ross.

Sommerville, I. (2008). Software engineering. Addison Wesley.

42
Fontana, A., & Frey, J. H. (2005). The interview. The Sage handbook of qualitative research, 3,
695-727.

Appendix

Username: Lillian

Password: 12345

43

You might also like