Description
INTRODUCTION
Information technology is an essential tool to guest tracking. The faster and more effectively it works, the safer our business management is. Information system (IS) refers to a system that comprises of persons, data records and activities that process data and information in an organization, and it includes the organization‟s manual and automated processes. In a narrow sense, the term information system refers to the specific application software that is used to store data records in a computer system and automates some of the information-processing activities of the organization. The term information technology has ballooned to encompass many aspects of computing and technology, and the term has become very recognizable. The information technology umbrella can be quite large, covering many fields. IT professionals perform a variety of duties that range from installing applications to designing complex computer networks and information database. Since the first wave of computerization in the 1970‟s, the implementation of information technology within policing has been questioned and often met with resistance. The development of an information technology strategy must be viewed in the context of increasing expectations and pressure for reform within organizations.
The business environment in which banks operate is changing; increased demands for efficiency has led to information technology being recognized as a valuable and innovative addition to guest tracking system.
Over the last decade, computer and telecommunication technologies have developed at an extraordinary rate. Increased computer power, advances in data transmission, attractive and user-friendly graphic interfaces present bank with unprecedented capacity to collect, store, analyze and share data with stakeholders inside and outside of bank. Historically, the innovation of information systems has served as the catalyst for dramatic changes in the organization work and has presented both opportunities and challenges to operators. Some banks have made tremendous efforts in creating databases for guest information system for security purposes.
TABLE OF CONTENT
Cover page
Caritas logo
Title page
Certification page
Dedication page
Acknowledgement
Abstract
Table of content
List of tables
List of figures
List of appendixes
CHAPTER ONE
INTRODUCTION
1.1 Background of the project
1.2 statement of problem
1.3 purpose of the project
1.4 Justification
1.5 scope of the project
1.6 limitation of the project
1.7 project report organization
1.8 Definition of terms
CHAPTER TWO
LITERATURE REVIEW
2.1 Brief history of Nigeria police
2.2 Review of natural law theory
2.3 Review of crime history
2.4 Tracking system
2.5 Reasons for the failure of some criminal tracking system
CHAPTER THREE
SYSTEM ANALYSIS AND DESIGN
3.1 Methodology
3.2 Data collection
3.2.1 Methods of Data Collection
3.2.2 Input analysis
3.2.3 Witness / Suspect Statement Input System
3.2.4 Case File Input System
3.2.5 Crime Diary Input System
3.2.6 Output Analysis
3.2.7 Crime Register Output System
3.2.8 Output System Form CR. 2
3.2.9 System Output Form CR.8
3.2.10 System Output Form CR 14
3.2.11 Charge Sheet
3.2.12 Files and Records
3.3 Analysis of the Existing System
3.4 Limitations of the Existing System
3.4.1 Justification for the new system
3.5 System Design
3.5.1 Output Specification and Design
3.5.2 Input Design and Specification
3.6 Database Design
3.7 Program Design and Specification
3.7.1 Criminal Registration
3.7.2 Suspect Registration
3.7.3 Report
3.7.4 Change Password
3.7. Complainant Registration
3.8 System Flowcharts
3.9 Top down design
CHAPTER FOUR
IMPLEMENTATION, TESTING AND INTEGRATION
4.1 Choice of Development Tools
4.2 System Requirement
4.2.1 Software Requirements
4.2.2 Hardware Requirements
4.2.3 People Ware (Personal Requirements)
4.3 system Implementation
4.4 Program Flowchart
4.5 Testing
4.5.1Unit testing
4.5.2 System testing
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.1 Summary of findings
5.2 limitations of the study/project
5.3 Recommendation
5.4 BEME (Bill of engineering measurement and evaluatio)
5.5 Conclusion
Bibliography
Glossory
References
Glossary
Appendix A
Appendix B
Appendix C