This project work titled THE DEVELOPMENTS OF A STATE SECURITY DATABASE MODEL has been deemed suitable for Final Year Students/Undergradutes in the Computer Science Department. However, if you believe that this project work will be helpful to you (irrespective of your department or discipline), then go ahead and get it (Scroll down to the end of this article for an instruction on how to get this project work).
Below is a brief overview of this Project Work.
Format: MS WORD
| Chapters: 1-5
| Pages: 75
THE DEVELOPMENT OF A STATE SECURITY DATABASE MODEL
CHAPTER ONE
GENERAL INTRODUCTION
According to Gupta (2012), in a very short span of time, computer has grown from a scientific curiosity to an indispensable tool of modem society. There is hardly any scientific/technical or business activity which is not in one way or the other, affected by modern data processing techniques. The human mind can handle only a limited number of things at a time. The digital computer, on the other hand, can be programmed to compare, measure, calculate and evaluate thousands of readings in an extremely short period of time. Also, nations of the world are now adopting the computer system for security purposes. Many countries maintain a comprehensive database of their citizens for information and security reasons.
One of the distinguishing characteristics of nationhood is a state’s ability to provide security for her citizens, defend her sovereignty and territorial integrity. This is the minimum requirement for a nation to build a solid prosperous economy and begin the ultimate match towards social and political well being encapsulated as national interest. At the core of a complex policy aimed at achieving safety by defending sovereignty and maintaining territorial integrity, national security is therefore a grand policy to achieve, sustain and maintain a state of national survival. National security seeks first and foremost to guarantee internal cohesion, maintain law and order and ensure safety of citizens’ lives and property as well as guide against state vulnerability to internal insurrections and external aggression.
A state security database model is a database application that enables the data of every citizen in a state to be captured such that in the case of a crime investigation, reference can be made to the system to track down offenders or suspects. It is an application of the computer system and database in a positive direction to aid security investigations and verification of identity.
1.1 Statement of problem
Law enforcement agencies such as the Nigeria Police force is faced with the challenge of not having a system that is able to provide needed information on the profile of suspects involved in a crime or the verification of identity. As such, needed information to aid investigation is not easily obtained. To overcome this problem, it is important that a database model is in place to enable the capturing of the identity of the citizens to aid investigation and verification needs.
1.2 Objectives of the study
The following are the objectives of the study:
1.4 scope of the study
This study covers the development of a state security database model using the Nigerian Police Force as a case study. It covers the concept of database, the models and the application of computers in state security.
1.5 significance of the study
The significance of the study is that it will provide a system that will aid security and law enforcement bodies to get relevant information pertaining to any citizen that is involved in any crime. It will facilitate the capturing and easy retrieval of information pertaining to citizens or members of a state.
1.6 Definition of terms
Security: precautions taken to keep somebody or something safe from crime, attack, or danger
Database:
a systematically arranged collection of computer data, structured so that it can be automatically retrieved or manipulated
Investigation an examination or inquiry into something, especially a detailed one that is undertaken officially, or the act of undertaking an examination
Crime; an action prohibited by law or a failure to act as required by law
CHAPTER ONE
GENERAL INTRODUCTION
According to Gupta (2012), in a very short span of time, computer has grown from a scientific curiosity to an indispensable tool of modem society. There is hardly any scientific/technical or business activity which is not in one way or the other, affected by modern data processing techniques. The human mind can handle only a limited number of things at a time. The digital computer, on the other hand, can be programmed to compare, measure, calculate and evaluate thousands of readings in an extremely short period of time. Also, nations of the world are now adopting the computer system for security purposes. Many countries maintain a comprehensive database of their citizens for information and security reasons.
One of the distinguishing characteristics of nationhood is a state’s ability to provide security for her citizens, defend her sovereignty and territorial integrity. This is the minimum requirement for a nation to build a solid prosperous economy and begin the ultimate match towards social and political well being encapsulated as national interest. At the core of a complex policy aimed at achieving safety by defending sovereignty and maintaining territorial integrity, national security is therefore a grand policy to achieve, sustain and maintain a state of national survival. National security seeks first and foremost to guarantee internal cohesion, maintain law and order and ensure safety of citizens’ lives and property as well as guide against state vulnerability to internal insurrections and external aggression.
A state security database model is a database application that enables the data of every citizen in a state to be captured such that in the case of a crime investigation, reference can be made to the system to track down offenders or suspects. It is an application of the computer system and database in a positive direction to aid security investigations and verification of identity.
1.1 Statement of problem
Law enforcement agencies such as the Nigeria Police force is faced with the challenge of not having a system that is able to provide needed information on the profile of suspects involved in a crime or the verification of identity. As such, needed information to aid investigation is not easily obtained. To overcome this problem, it is important that a database model is in place to enable the capturing of the identity of the citizens to aid investigation and verification needs.
1.2 Objectives of the study
The following are the objectives of the study:
1.4 scope of the study
This study covers the development of a state security database model using the Nigerian Police Force as a case study. It covers the concept of database, the models and the application of computers in state security.
1.5 significance of the study
The significance of the study is that it will provide a system that will aid security and law enforcement bodies to get relevant information pertaining to any citizen that is involved in any crime. It will facilitate the capturing and easy retrieval of information pertaining to citizens or members of a state.
1.6 Definition of terms
Security: precautions taken to keep somebody or something safe from crime, attack, or danger
Database:
a systematically arranged collection of computer data, structured so that it can be automatically retrieved or manipulated
Investigation an examination or inquiry into something, especially a detailed one that is undertaken officially, or the act of undertaking an examination
Crime; an action prohibited by law or a failure to act as required by law
How to Download the Full Project Work for FREE
- You can download the Full Project Work for FREE by Clicking Here.
- On the other hand, you can make a payment of ₦5,000 and we will send the Full Project Work directly to your email address or to your Whatsapp. Clicking Here to Make Payment.