CHAPTER ONE
GENERAL
INTRODUCTION
According to Gupta (2012), in a very
short span of time, computer has grown from a scientific curiosity to an
indispensable tool of modem society. There is hardly any scientific/technical
or business activity which is not in one way or the other, affected by modern
data processing techniques. The human mind can handle only a limited number of
things at a time. The digital computer, on the other hand, can be programmed to
compare, measure, calculate and evaluate thousands of readings in an extremely
short period of time. Also, nations of the world are now adopting the computer
system for security purposes. Many countries maintain a comprehensive database
of their citizens for information and security reasons. One of the
distinguishing characteristics of nationhood is a state’s ability to provide
security for her citizens, defend her sovereignty and territorial integrity.
This is the minimum requirement for a nation to build a solid prosperous
economy and begin the ultimate match towards social and political well being
encapsulated as national interest. At the core of a complex policy aimed at
achieving safety by defending sovereignty and maintaining territorial
integrity, national security is therefore a grand policy to achieve, sustain
and maintain a state of national survival. National security seeks first and
foremost to guarantee internal cohesion, maintain law and order and ensure
safety of citizens’ lives and property as well as guide against state vulnerability
to internal insurrections and external aggression.
A state security database model is a
database application that enables the data of every citizen in a state to be
captured such that in the case of a crime investigation, reference can be made
to the system to track down offenders or suspects. It is an application of the
computer system and database in a positive direction to aid security
investigations and verification of identity.
1.1
Statement of problem
Law enforcement agencies such as the
Nigeria Police force is faced with the challenge of not having a system that is
able to provide needed information on the profile of suspects involved in a
crime or the verification of identity. As such, needed information to aid
investigation is not easily obtained. To overcome this problem, it is important
that a database model is in place to enable the capturing of the identity of
the citizens to aid investigation and verification needs.
1.2
Objectives of the study
The following are the objectives of
the study:
- To
develop a state security database system
- To
understand the concept of database and its different models
- To
showcase the application of computers in state security
- To
present the need and benefits of a state security database model
1.4 scope of
the study
This study covers the development
of a state security database model using the Nigerian Police Force as a case
study. It covers the concept of database, the models and the application of
computers in state security.
1.5
significance of the study
The significance of the study is that
it will provide a system that will aid security and law enforcement bodies to
get relevant information pertaining to any citizen that is involved in any
crime. It will facilitate the capturing and easy retrieval of information pertaining
to citizens or members of a state.
1.6
Definition of terms
Security: precautions taken to keep
somebody or something safe from crime, attack, or danger
Database: a systematically arranged collection
of computer data, structured so that it can be automatically retrieved or
manipulated
Investigation an examination or inquiry into
something, especially a detailed one that is undertaken officially, or the act
of undertaking an examination
Crime; an
action prohibited by law or a failure to act as required by law
DESIGN AND IMPLEMENTATION OF STATE SECURITY DATABASE MODEL
Chapters: 1 - 5
Delivery: Email
Chapters: 1 - 5
Delivery: Email
Number of Pages: 70
Price: 3000 NGN
In Stock

No comments:
Post a Comment
Add Comment