PL EN


Preferences help
enabled [disable] Abstract
Number of results
2019 | 131 | 164-180
Article title

Development of an Online Crime Management & Reporting System

Content
Title variants
Languages of publication
EN
Abstracts
EN
Nowadays, much of the crimes committed were unreported to the authorities. Given this fact, the study presents the development of a Crime Management and Reporting System through online and even offline and at the same time is the active participation of the citizens. The idea draws its motivation from the inconvenience of going to the police station and personal belief of the weak investigative capabilities of the authorities to resolve petty crimes and limited spreading of crime information to the community. The project specifically looks into the crime detection and prevention. This study aims to provide an overview of the investigative process and, in doing so, identify effective and efficient approaches to the investigation and detection of the volume of crimes. The review is particularly aimed to highlight the research evidence those investigative practices and actions that are likely to lead to a positive outcome. The development of software includes the process of brainstorming and planning, requirements analysis, system analysis and designs, implementation and testing, deployment, and maintenance. The criteria of evaluation of software quality were adapted in ISO/IEC 25010:20011. This also shows that distance is also a factor that influences greatly how crimes are being handled with many crimes going unreported as a result. Crime Management and Reporting System would really help the complainant and the authority to communicate privately and easily with regards to the reported issue. In addition, it would be easier for the complainant to report a witnessed crime without the fear of getting involved in the problems because of the security that the only authorized user can see the report. Based on the findings, the researchers recommend the following for further study: widening the limit of the system by considering other cities; a generic platform for keeping human records from birth till death, deploying this sort of platform will serve as a source of information on persons from various states within the country and even those outside. Verification using Biometric is highly recommended to enhance the security of data stored in the system. This increases the restriction on access to the system, thus unauthorized users have no access to the system. Face recognition technology can be added.
Year
Volume
131
Pages
164-180
Physical description
Contributors
  • Civil Engineering Department, Qassim University, Al Qassim Province, Saudi Arabia
  • College of Computer Studies, AMA Computer College, Makati City, Philippines
  • College of Computer Studies, AMA Computer College, Makati City, Philippines
  • College of Computer Studies, AMA Computer College, Makati City, Philippines
References
  • [1] Addington, L. A. (2006). Using national incident-based reporting system murder data to evaluate clearance predictors: A research note. Homicide Studies, 10(2), 140-152
  • [2] Ahluwalia, G. (2004). U.S. Patent No. 6,728,685. Washington, DC: U.S. Patent and Trademark Office.
  • [3] Allison, S. F., Schuck, A. M., & Lersch, K. M. (2005). Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice, 33(1), 19-29.
  • [4] Angeles, P. (2015). U.S. Patent No. 9,058,416. Washington, DC: U.S. Patent and Trademark Office.
  • [5] Alrwisan, A., Ross, J., & Williams, D. (2011). Medication incidents reported to an online incident reporting system. European journal of clinical pharmacology, 67(5), 527-532
  • [6] Basch, E., Artz, D., Dulko, D., Scher, K., Sabbatini, P., Hensley, M., ... & Schrag, D. (2005). Patient online self-reporting of toxicity symptoms during chemotherapy. Journal of clinIcal oncology, 23(15), 3552-3561
  • [7] Bossler, A. M., & Burruss, G. W. (2012). The general theory of crime and computer hacking: Low self-control hackers? In Cyber Crime: Concepts, Methodologies, Tools and Applications (pp. 1499-1527). IGI Global.
  • [8] Brahan, J. W., Lam, K. P., Chan, H., & Leung, W. (1998). AICAMS: artificial intelligence crime analysis and management system. Knowledge-Based Systems, 11(5-6), 355-361
  • [9] Bromby, M. (2006). Security against crime: Technologies for detecting and preventing crime. International Review of Law Computers & Technology, 20(1-2), 1-5
  • [10] Byrne, J. M., & Rebovich, D. J. (2007). The new technology of crime, law and social control. Monsey, NY: Criminal Justice Press.
  • [11] Calhoun, C. C., Stobbart, C. E., Thomas, D. M., Villarrubia, J. A., Brown, D. E., & Conklin, J. H. (2008, April). Improving crime data sharing and analysis tools for a web-based crime analysis toolkit: Webcat 2.2. IEEE Systems and Information Engineering Design Symposium (pp. 40-45). IEEE 2008.
  • [12] Chaikin, D. (2009). How effective are suspicious transaction reporting systems? Journal of Money Laundering Control, 12(3), 238-253
  • [13] Chen, H., Chung, W., Xu, J. J., Wang, G., Qin, Y., & Chau, M. (2004). Crime data mining: a general framework and some examples. Computer 37(4), 50-56
  • [14] Cunningham, G. M., & Harris, J. E. (2005). Toward a theory of performance reporting to achieve public sector accountability: A field study. Public Budgeting & Finance, 25(2), 15-42
  • [15] Delia, W. M., & Kelley, E. E. (2014). U.S. Patent No. 8,818,829. Washington, DC: U.S. Patent and Trademark Office.
  • [16] Dintino, J. J., & Martens, F. T. (1983). Police Intelligence Systems in Crime Control: maintaining a delicate balance in a liberal democracy. CC Thomas.
  • [17] Douglas, J. E., Burgess, A. W., Burgess, A. G., & Ressler, R. K. (2013). Crime classification manual: A standard system for investigating and classifying violent crime. John Wiley & Sons.
  • [18] Eterno, John A., Arvind Verma, and Eli B. Silverman. Police manipulations of crime reporting: Insiders’ revelations. Justice quarterly 33, no. 5 (2016) 811-835
  • [19] Ganiron Jr, T. U., Manlutac, K. B., Castro, M. S., & Jerusalem, C. R. (2019). Development of User Guide on Interactive Way-Finder and E-Notices System. World Scientific News 128(2), 363-390
  • [20] Ganiron Jr, T. U. (2017). Issues and Challenges in the College of Architecture, Qassim University towards Accelerated Learning Techniques. World Scientific News, 90, 203-230
  • [21] Gitmed, W. (2007). Citizens reporting crimes online: The San Francisco experience. POLICE CHIEF, 74(8), 124
  • [22] Gottschalk, P., & Tolloczko, P. C. (2007). Maturity model for mapping crime in law enforcement. Electronic Government, An International Journal, 4(1), 59-67
  • [23] Harvey, Jackie, and Siu Fung Lau. Crime-money, reputation and reporting. Crime, law and social change 52, no. 1 (2009) 57-72
  • [24] Haugen, S., & Roger Selin, J. (1999). Identifying and controlling computer crime and employee fraud. Industrial Management & Data Systems, 99(8), 340-344
  • [25] Icove, D. J. (1986). Automated crime profiling. FBI L. Enforcement Bull. 55, 27.
  • [26] Iriberri, A., Leroy, G., & Garrett, N. (2006, January). Reporting on-campus crime online: User intention to use. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) (Vol. 4, pp. 82a-82a). IEEE.
  • [27] Iriberri, A., & Leroy, G. (2007, August). Natural language processing and e-government: extracting reusable crime report information. In 2007 IEEE International Conference on Information Reuse and Integration (pp. 221-226). IEEE.
  • [28] Iriberri, A., & Navarrete, C. J. (2013). E-government services: design and evaluation of crime reporting alternatives. Electronic Government, an International Journal, 10(2), 171-188
  • [29] Jamieson, R., Land, L. P. W., Winchester, D., Stephens, G., Steel, A., Maurushat, A., & Sarre, R. (2012). Addressing identity crime in crime management information systems: Definitions, classification, and empirics. Computer Law & Security Review, 28(4), 381-395.
  • [30] Jewkes, Y., & Yar, M. (Eds.), (2013). Handbook of Internet crime. Routledge.
  • [31] Ku, C. H., & Leroy, G. (2014). A decision support system: Automated crime report analysis and classification for e-government. Government Information Quarterly, 31(4), 534-544
  • [32] Lanelli, N., & Hackworth, A. (2005). Botnets as a vehicle for online crime. CERT Coordination Center, 1(1), 28
  • [33] Lejins, P. (1967). National crime data reporting system: proposal for a model. Appendix C in President's Commission Task Force Report: Crime and Its Impact: An Assessment. Washington, DC: Government Printing Office.
  • [34] Madensen, T. D., & Eck, J. E. (2012). Crime places and place management. The Oxford Handbook of Criminological Theory, Online Publication Date: Dec 2012, DOI:10.1093/oxfordhb/9780199747238.013.0029
  • [35] Messing, J. T., Becerra, D., Ward-Lasher, A., & Androff, D. K. (2015). Latinas’ perceptions of law enforcement: Fear of deportation, crime reporting, and trust in the system. Affilia, 30(3), 328-340
  • [36] Mwiya, M., Phiri, J., & Lyoko, G. (2015). Public Crime Reporting and Monitoring System Model Using GSM and GIS Technologies: A Case of Zambia Police Service. International Journal of Computer Science and Mobile Computing, 4(11), 207-226
  • [37] Rainey, H. G., & Chun, Y. H. (2009). Public and private management compared. The Oxford Handbook of Public Management, Online Publication Date: Sep 2009. DOI:10.1093/oxfordhb/9780199226443.003.0005
  • [38] Richardson, R., & Director, C. S. I. (2008). CSI computer crime and security survey. Computer security institute, 1, 1-30.
  • [39] Rossmo, D. K. (1998). U.S. Patent No. 5,781,704. Washington, DC: U.S. Patent and Trademark Office.
  • [40] Santiago, M. D. (1989). Corruption prevention strategies in developing countries. Police Stud.: Int'l Rev. Police Dev. 12, 144
  • [41] Smith, E. (2005). Online Crime Reporting: Should Law Enforcement Turn to the Internet for Savings? Public Management – Lawrence Then Washington 87(6), 26.
  • [42] Stambaugh, H., Beaupre, D., Icove, D. J., Baker, R., Cassaday, W., & Williams, W. P. (2000). State and local law enforcement needs to combat electronic crime. National Institute of Justice, Research in Brief (NCJ 183451). Retrieved February, 10, 2008.
  • [43] Tomas, U., & Tomas, U. (2017). Influence of Compensation, Work Experience, and Project Work on Career Success. World Scientific News, 87, 77-98
Document Type
undetermined
Publication order reference
Identifiers
YADDA identifier
bwmeta1.element.psjd-be5f3bb7-ccf8-4602-a4ec-3437dcd448f0
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.