72
DESIGN AND IMPLEMENTATION OF MOBILE COMMUNITY POLICING SYSTEM (A CASE STUDY OF UNIVERSITY OF LAGOS COMMUNITY) BY ADEYEMI, ADEBIMPE ATINUKE 980805091 THESIS SUBMITTED IN FULFILMENT OF REQUIREMENT FOR AWARD OF MASTER IN INFORMATION TECHNOLOGY (MIT) IN COMPUTER SCIENCES, SCHOOL OF POSTGRADUATE STUDIES; UNIVERSITY OF LAGOS, NIGERIA MARCH, 2020

DESIGN AND IMPLEMENTATION OF MOBILE COMMUNITY … · 2020. 7. 6. · In this project a mobile-based community policing application is proposed. It aims at assisting school security

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

  • DESIGN AND IMPLEMENTATION OF MOBILE COMMUNITY POLICING SYSTEM

    (A CASE STUDY OF UNIVERSITY OF LAGOS COMMUNITY)

    BY

    ADEYEMI, ADEBIMPE ATINUKE

    980805091

    THESIS SUBMITTED IN FULFILMENT OF REQUIREMENT FOR AWARD OF

    MASTER IN INFORMATION TECHNOLOGY (MIT) IN COMPUTER SCIENCES,

    SCHOOL OF POSTGRADUATE STUDIES; UNIVERSITY OF LAGOS, NIGERIA

    MARCH, 2020

  • ii

    ABSTRACT

    Community is network of people that interrelate via physical or virtual technologies for different

    social purposes by exchanging information and share idea on mutual interests. Community and

    police work together to combat crime in the community. In University of Lagos (UNILAG)

    community, safety depends on school security and police to curtail crime to barest minimum

    within the academic society while security officers also depend on members of community to

    give them vital information about crime activities in their domains on time. In contemporary

    environment, relationships between community members and police have increased due to

    different social technologies available to report crime situation in the community. Crime reporter

    may remain anonymous while reporting without going to police stations before reporting issues.

    There are many programs used by many communities to support community policing in their

    areas; they include: Neighborhood-Survey, Neighborhood-Watch, setting up police-academy and

    building infrastructure for community police-unit in their domains. Neighborhood Watch taught

    citizens how to detect unlawful activities and what should be response of citizens if criminals are

    found in the communities. Organizing neighborhood-watch is important to have crime free

    community that promotes quality of life. In this project a mobile-based community policing

    application is proposed. It aims at assisting school security and police to eliminate crimes with

    useful and timely information about criminals and their modes of operations. Finally, prototype

    based mobile community policing application was designed to report crime activities from

    community members irrespective of locations they found themselves without having facial

    contact with police. The system is implemented using Java, Basic4Android and Google SDK for

    front-end interface while PHP, SQLITE and MYSQL are used to design application backend.

  • iii

    TABLE OF CONTENTS

    Title Page i

    Declaration ii

    Certification iii

    Dedication iv

    Acknowledgement v

    Abstract vi

    Table of Contents vii

    List of Tables x

    List of Figures xi

    CHAPTER ONE: INTRODUCTION

    1.1 Background of Study 1

    1.2 Statement of Problem 4

    1.3 Aim and Objectives of Study 5

    1.4 Scope of Study 6

    1.5 Significance of Study 6

    1.6 Methodology 7

    1.7 Definition of Term 7

    CHAPTER TWO: LITERATURE REVIEW

    2.1 Historical Background of University of Lagos (UNILAG) Community 8

    2.2 Evaluating Effectiveness of Community Policing 8

    2.3 Challenges in Community Policing Implementation 9

    2.4 Community Policing in Practice 10

    2.5 Reason for Embracing Community Policing 11

    2.6 Prospect of community policing in Nigeria 12

    2.7 Mobile Android SDK and its Feature 13

    2.8 Review of Literatures on Community Policing System 14

  • iv

    CHAPTER THREE SYSTEM ANALYSIS AND DESIGN

    3.1 Analysis of Existing System 15

    3.2 Problem of Existing System 15

    3.3 Analysis of New System 16

    3.4 Justification of New System 17

    3.5 System Design 17

    3.5.1 Output Design 17

    3.5.2 Process Analysis 20

    3.5.3 Input Design 20

    3.5.4 Database Design 23

    3.5.5 Use Case Diagram 26

    3.6 System Coding Tool and Technique 28

    3.6.1 Entity Relationship 29

    CHAPTER FOUR SYSTEM IMPLEMENTATION AND DOCUMENTATION

    4.1 Introduction 31

    4.2 System Implementation 31

    4.3 Changeover Method 31

    4.3.1 Changeover Recommendation 32

    4.4 System Installation & System Run 32

    4.4.1 Hardware Specifications 32

    4.4.2 Software Specifications 33

    4.5 Choice of Programming Language 33

    4.6 System Documentation 34

    4.6.1 Installation Processes 34

    4.6.2 for Server-Side 35

    4.6.3 System Maintenance 36

  • v

    CHAPTER FIVE SUMMARY, CONCLUSION & RECOMMENDATIO

    5.1 Summary 37

    5.2 Recommendation 37

    5.3 Conclusion 38

    5.4 Further Research 39

    5.5 Problem Encountered 40

    REFERENCES 41

    Appendix A (Sample Output) 43

    Appendix B (Program Flowchart) 47

    Appendix C (Application Source Code) 49

  • vi

    LIST OF TABLES

    Table 3.1: List of Registered Member Record 18

    Table 3.2: List of Reported Incident 19

    Table 3.3: List of Social Community Signup Record 19

    Table 3.4: Member Record 24

    Table 3.5: Incident Report Database Design 25

    Table 3.6: Social Community Signup Database Design 26

  • vii

    LIST OF FIGURES

    Figure 3.1: Member Registration Entry Form 21

    Figure 3.2: Incident Report Entry Form 22

    Figure 3.3: Social Community Sign Up Entry Form 23

    Figure 3.4: Use Case Diagram for Community Policing 27

    Figure 3.5: Entity Relationship Diagram for Community Policing 30

  • 1

    CHAPTER ONE

    INTRODUCTION

    1.1 Background of Study

    With mobile technology rapid development, modern societies are part of digital network; all

    sectors now utilize network services to invent digital opportunities via community policing.

    Community is network of people that interact via verbal or technology means for social and

    information-exchange purposes on common mutual interest Castro (2017). Community exists on

    different mediums that include academic community, email community, message-board

    community or social networking community for people to interact and communicate together.

    Community policing is problem solving tactic that tackles community social disorder and

    misdeed via community participation and engagement of residents and police to combat crime

    within the community they belong. Community usually depends on police or available security

    outfit to curb civil unrest by reducing crime to barest minimum in the society. On the other hand,

    police rely on community members to provide them with vital information about their

    neighborhoods by reporting crime in their areas Haywaite (2015). In contemporary environment,

    relationship between police and community has increased in many communities due to

    availability of different social technologies that aid crime reportage without restriction to time

    and location of report. Crime reporter can report from any location in the world without going to

    police station to lodge complaint and can also decide to remain anonymous while reporting to

    police.

    Community policing without community involvement and engagement is not complete. Police

    officers handle criminal part of community policing while community members handle social

    program and project with support from assigned police officers to combat crime and other

    nefarious activities within their neighborhood communities. Several programs are usually

    implemented by different communities to offer support for community policing in their areas like

    neighborhood-survey, neighborhood-watch, police-academy and building-structure for

    community police unit. With neighborhood-watch, citizens are taught on how to detect nefarious

    activities and what to do if criminals are found in the communities. Organizing neighborhood-

    watch is important to have peaceful community that is free of crime and improve quality of life

  • 2

    Hellström (2014). Every community encourages her citizens on active participation via regular

    attendance and financial contributions to make community safer to live and work. To make

    community policing attract interest of police involvement, community members must hold

    schedule meetings at public community buildings that are accessible to other members like

    home, school, library, town hall, church, mosque and other public buildings. Attendance must be

    taken seriously to attract police involvement by marking attendance sheet that contains member

    names, addresses and phone numbers. Socializing is part of vital component for community

    policing, members should be allowed to express themselves. Drug-Abuse-Resistance-Education

    (D.A.R.E) is another community program that community uses to support community policing in

    their domains. It is program that targets youths in the community to give information about drug

    abuse and crime to police James (2015). Youths are important in community policing; their

    involvement cannot be underestimated. Youths in the community are trained with relevant skills

    to resist temptation to taste tobacco, alcohol and drugs; they are equipped with skill to detect

    nefarious activities before reporting to police. Police officers are seen as friends by youths of the

    community and relay useful information to police within the neighborhood to combat crime.

    Adults and youths in the community see police officers as friends that are parts of their

    community members that can be trusted with confidential information without fear of being

    harassed.

    Community policing assists citizen and police to work together to prevent crime in the

    neighborhood before it occurs. In modern world, social media and other related technologies are

    improving community policing; facebook group-account, twitter, whatsapp, email and other

    social networks are improving modern community policing as enlighten youths can act as

    anonymous to send text, image, audio and video messages to update police about crime situation

    in their communities Jintana (2017). Community members and police officers on social

    platforms get posted information that sparks them into actions to fight crime. Even though,

    modern technologies are becoming tools to collaborate with police officers in disseminating

    information, many citizens from local communities are adult illiterates that cannot use these

    technologies; they must be involved by simplifying modern technologies for them to

    communicate with members and police Vatcharaporn (2015). It is the responsibility of men and

  • 3

    women, literates and illiterates to safeguard community they all reside by making it possible for

    community members to work together with police in eradicating crimes and related activities.

    Collaboration removes fear about police among citizens; with increase in police presence and

    patrols, citizens can report crime incidence in their domains before it occurs due to established

    trust and security by community members Donohoe (2016). Community policing differs from

    community to community, each community should come out with working template to curb

    crime in the community through partnership with police. One major setback for community

    policing is that it requires total commitment to eliminate crime in the community. As police

    officers perform their daily community duties, community members are encouraged to assist in

    getting rid of crime, drug abuse and other social vices from the community.

    Recent assessment of University of Lagos academic community indicates that community

    policing in the institution is still being handled via traditional policing. University of Lagos has

    indigenous security outfit that works in collaboration with Yaba Police station to prevent crime

    within the institution. UNILAG security apparatus is restricted by constitutions to prosecute

    offenders; every crime case must be handed over to police within the area of jurisdiction.

    Community policing in University of Lagos involves collaboration among students, internal

    security outfit and police officers assigned to work with the institution. Officers in charge of the

    academic community usually patrol crime-zone areas to prevent or detect crime. Officers are

    usually seeing receiving calls during patrol; this is dangerous for 21st century community

    policing because student-criminals and the collaborators from outside can ambush security

    officers with superior firearms to attack police and school security on patrol. Sighting police

    vehicles alone on campus can scare students from giving out important security information to

    police and school security; many students with useful information like to remain anonymous

    before divulging security information to security. Some students and staffs with sensitive

    security information run away whenever they see police or security vehicle on patrol because of

    fear of being tagged criminals or taking them as first suspects Alex (2013). Academic

    community like University of Lagos and people with diver culture, belief, moral up-bringing and

    propensity to crime, violence, cultism, rape, and so on need to update its community policing

    approach to rid the institution off crime. Having noticed lots of problems militating against

  • 4

    success of community policing in a learned environment like University of Lagos, it is better to

    utilize information technology to strengthen community policing in the institution to achieve

    crime free society which the institution is aiming to achieve. New approach works on existing

    mobile infrastructure and internet services which institution and staffs already have. Mobile

    community policing application that is based on client-server architecture design will be

    developed. Proposed mobile app will run on mobile phones of every community member to

    upload and report real-time crime incidents within the community to police, school security and

    community members. In situation where reporter is the victim attacked with his/her phone

    seized, victim voice is enough to activate application from seized phone to send SMS, email,

    FCM messages and underground emergency calls to security officers and police. Location of

    incidence along with map of the area is silently sent to security officer for emergency

    mobilization. Regular meetings are hosted between police and community members to discuss

    current criminal issues to police. Detail about individual criminal like full-name, sex, age,

    occupation, address, complexion, crime committed, weapon found on him/her, group-member,

    video/audio evidences and so on are usually uploaded to server for police and school security to

    investigate and combat crime

    1.2 Statement of Problem

    Daily situations in UNILAG community raise lots of questions on how school security and

    police are handling community policing and responding to new threats in the area. Crimes like

    drug abuse, rape, theft, sex-trafficking, and cultism have increased within the academic

    environment recently as reported in the dailies. Even though UNILAG has long successful

    standing with traditional policing, this approach contains many weaknesses that shouldn’t be

    continued. In conventional community policing, officers are busy patrolling crime-zone areas

    with vehicles to detect new cases of crime while others are busy receiving calls during patrol;

    this approach is dangerous in 21st century community policing because criminals can hide with

    superior firearms to attack officers on patrol. Sighting police vehicles alone on campus can scare

    students from giving out important security information to police and school security; many

    students with useful information like to remain anonymous before divulging security information

    to security. Some students and staff with sensitive security information run away whenever they

  • 5

    see police or security vehicle on patrol because of fear of being tagged criminals or taking them

    as first suspects. Other problems facing traditional community policing include:

    i. Lack of trust on school security and police officers by members of academic community

    ii. It doesn’t give room to make anonymous reports, thereby, many information is not

    divulged

    iii. It doesn’t permit close relationship with police officers because many see them as enemy

    of people

    iv. No reliable security on crime data

    v. Lots of security and police officers are involved to fight social vices effectively in the

    school community before impact is felt

    vi. It is time consuming to retrieve information and update data

    vii. Large volume of paperwork is involved which leads to waste of money and storage space

    viii. No direct role for higher officials policing the community

    ix. Misplacement of community crime paper-records can occur to frustrate future community

    investigation

    x. Manual handling of large number of community crime cases can be difficult

    xi. Paper files for keeping community information are sometimes attacked by pest or fire

    outbreak and unauthorized user

    1.3 Aim and Objectives of Study

    The aim of this project is to implement and design mobile community policing application that

    allows community members to divulge sensitive information to security officers within the

    university community to fight crime and other social vices in the area

    The specific objectives of study are:

    i. To design system that is capable of tracking criminals within the academic community

    ii. To implement application that serves as prototype for future community policing

    iii. To assist police and school security officers get reliable information to reduce crime

    iv. To demonstrate possibility of using mobile technology to combat crime

  • 6

    1.4 Scope of Study

    This study covers use of community social network to report crime where videos, images and

    text that assist police to fight crime within the school community are uploaded to all community

    members involved. Proposed mobile application will cover:

    i. Application offers accounts to community members and officers so that their details are

    stored for future referencing and to ensure users do not fill member forms whenever they

    logon to their accounts

    ii. Voice recognition system is implemented to enable crime victims talk to activate

    application to report emergency cases even if their mobile phones are seized

    iii. It incorporates search engine to allow community members search for current posts by

    date, event and location where crime is committed

    iv. It uses Google map to obtain location of incidence and other useful information that are

    sent to community members and securities during emergency reportage

    v. Email facility offers community members to enter their email addresses for future

    community notification or emergency alert

    vi. It maintains community records for effective school policing

    vii. Uploading incident video, audio and image files to community members are allowed

    viii. Report on FIR records about crime cases are generated for future decision or court cases

    1.5 Significance of Study

    Significances of study are:

    i. To help security administrators of UNILAG community tackle crime effectively within

    academic environment

    ii. To assist police in crime investigation and verification in the community

    iii. To safeguard community data and information in the system

    iv. Operation of community policing application developed is easy, there is no need of training

    users at extra cost

    v. To keep accurate record of community policing

    vi. Software developed is tailored for UNILAG community usages, no foreign technical jargon is

    included in the documentation

  • 7

    vii. To help community members divulge information to security personnel even if the phones are

    seized by criminal gangs

    1.6 Software Development Methodology

    Research methodology collects and analyzes data to solve research problem identified. Method

    to adopt is broken into many small modules with different units. I will use Java, Basic4Android,

    Google SDK and Basic4Java to implement frontend of this application for client-side while

    MYSQL and PHP are used to design backend of this application. Method of data collection for

    gathering facts for this research are:

    i. Observation-Method: Accurate information from reliable sources was collected after

    monitoring existing community policing to identify its short comings

    ii. Browsing Method: This is faster technique; vital information was extracted from

    electronic book, journal, publication and article relating to community policing

    iii. Interview Method: This technique is special of all fact-findings. During interview, facts

    about present methods used in community policing and their effectiveness were explored

    before implementing this research

    1.7 Definition of Term

    Community policing: is involves community partnership that engages in problem solving

    within environment

    Crime record: is record with crime entry report on what happened over period ordered by date

    Data: raw resource used by computer

    File: is collection of related records

    Information: is processed data that can solve problem

    Management: is process of getting activities carried out through other people

    Mobile Phone: is telephone with access to cellular radio that can be used over wide area without

    physical connection to communication network

    Program: set of instructions to perform specific task on given problem

    Social network: is web-based service that allows individual to create public profile to share

    information together as group

    Software: This is application that can be run on computer

    Storage Device: This is device for storing data in computer system

  • 8

    CHAPTER TWO

    LITERTURE REVIEW

    2.1 Historical Background of University of Lagos (UNILAG) Community

    UNILAG community is located within Mainland district of Lagos state. It is located in Yaba

    local government and has more than 62,000 students with close to 30,000 students and over 1000

    staff live within university campus community. UNILAG community is host to many religion

    institutions like churches and mosques. Some of them include student fellowships like RCCG,

    Foursquare Youth Fellowship, Christ Apostolic Youth Fellowship, student Muslim organizations

    and so on. Community is head by vice chancellor, who resides in school VC’s lodge on campus.

    Many businesses are hosted in UNILAG community like banks, pure water factory, kiosks and

    business centers; the school was established in 1962 to serve as citadel of learning in Nigeria.

    First ever Vice-Chancellor of University of Lagos community was Professor Eni Njoku, who

    was installed from 1962-1965; while current vice-chancellor for UNILAG community is

    Professor Toyin Ogundipe. Part of student mandate is to take part in cultural and Founder’s Day

    festival which is usually one of the largest festivals in UNILAG community. UNILAG has

    internal security outfit and host community meeting with police and other student groups within

    UNILAG community for security purposes. At the moment, security headquarters in UNILAG

    is called Alpha-base, which is located at the back of multipurpose halls along university road or

    adjacent to School of Post Graduate Studies, faculty of education area.

    2.2 Evaluating Effectiveness of Community Policing

    According to Sherman (2015), there are several parameters used to evaluate efficiency of

    community policing like community-unity, police-managerial structure and culture. Vagueness

    behind the concept of community policing is the only factor that affects its effectiveness.

    Community policing is idea that showcases roles of police in the society to combat crime with

    support from community members. Martin (2016), highlighted many approaches used in

    examining effectiveness of community policing:

    i. Foot-Patrol: This strategy is important to make community policing becomes effective in the

    neighborhood. Frequent foot-patrol of police in a community prevents occurrence of crime

  • 9

    and familiarize police officers to all community members in the areas as well as understand

    security challenges facing the community. Community members usually feel safe whenever

    police patrol team is seen around to safeguard the community Rosenbaum (2014)

    ii. Police-Storefront/Post: This strategy is meant to decentralize police service by bringing

    police officer closer to community they serve. Community members should try to build police

    posts in their domains to provide temporary shelters to police. Presence of police post

    contributes to crime reduction within the areas close to police post while areas that are far

    from police post have higher rate of crime in many previous cases analyzed

    iii. Community-Meeting: This method enhances community policing effectiveness through

    regular meeting with police officers; where members of community can communicate with

    police about security situation bothering the community and dialogue on current approach to

    resolve issues. Having regular meeting with police makes them become friends of many

    community members with exchange of contacts for emergency notification and report of any

    danger in the community. It also makes police train segment part of community on modern

    crime reportage and remote sensing

    iv. Door-to-Door Visit: This practice enables police to have face-to-face and house-to-house

    visit to neighborhood to familiarize patrol officers to community members to get updated

    information on criminal activities in the community. This approach builds trust relationship

    between community members and police officers as well as causes sharp decrease in crime

    rate in many communities as residents are cautious because nobody knows if his/her

    household or nearby will be next for police officers to visit Eck (2014)

    2.3 Challenges in Community Policing Implementation

    Success of community policing depends on how it is implemented; implementation of

    community policing is faced with many challenges that are external and internal. External means

    challenges emanate from the community while internal means challenges emanate from police

    structure. Future growth of community policing depends on how police superiors structure

    policing system to accommodate future development and give room to self-critics with continual

    learning system Sherman (2017). Lack of trust, poor communication and power tussle can lead to

  • 10

    downfall of community policing. Successive police must lay solid structure to that which permits

    continuous active participation of community policing in area of jurisdiction. Constant training

    of community members especially youths about community policing must be put in place to

    create awareness on crime reportage and remote sensing as well as promote moral decadence

    among their peers in the community. Role of community to combat crime through intelligence

    gathering and reportage to police contributes to crime prevention among community members.

    Without community involvement, crime in the neighborhood would not get police attention.

    Closeness of police to members of community and religion leaders can further strengthen

    community policing in the areas by reducing crime rate in the areas where crime and poverty are

    high

    2.4 Community Policing in Practice

    Strategy and concept introduced into community policing are numerous; Martin (2016), lists

    many initiatives that demonstrate how community policing is carried out in practice:

    i. Public-Education Program: This initiative implements context of community policing to

    earn police support and cause increase in police human resources. Police educates public on

    how to avoid being victimized and prevents individual from being involved in crime. Police

    uses D.A.R.E (Drug Abuse Resistance Education) program to educate community members

    especially young ones to resist peer pressure, violence, drug abuse to leave crime-free lives

    ii. Neighborhood-Watch: This permits members of community in local residence come

    together to share information relating to crime and violence in the community by discussing

    required methods to combat or report to community police officers

    iii. Neighborhood-Town Meeting: is community meeting scheduled to maintain mutual contact

    between police and public. The meetings hold in public places like town halls, schools and

    advertise publicly to garner maximum attendance possible. According to Skogan (2014),

    meeting permits member of community to have face-to-face contact with police to exchange

    sensitive information on prevention of crime in the community and helps police garner public

    support for specific initiative

  • 11

    iv. Weed-and-Seed Program: This type of program prevents crime in the community. It is two-

    tier approach to crime combat where prosecutors and law-enforcement agencies weed-out

    criminals and drug addicts in the community via surveillance and regular patrol while

    community members “seed” by providing support through human service intervention,

    prevention and neighborhood-restoration programs. Security agencies are alert to weed-and-

    seed program to reduce fear-of-crime in the society

    2.5 Reason for Embracing Community Policing

    There are many reasons why community policing must be embraced to combat modern crime in

    the community. Increase in crime rate has caused police to look inward to prevent crime and

    lawlessness. There is need for collaboration between public and police to get rid of crime and

    violence in the community. According to Leary (2015), crime control was responsibility of

    member of public in 1960s before gradually shifting responsibility to police officers to do the

    prevention. During this period, emergency of new technologies to combat crime later widen gap

    between public and police officers. Cutting tie with community was due to top-down hierarchical

    approach introduced by police where responsibility of fighting crime became major duties of

    police officers due to availability of sophisticated modern technologies. This totally cut tie with

    community members as police were no longer seeking collaboration of community members;

    they were instead busy seeking technologies to combat crime and violence in the community.

    According to Weiss (2017), emergence of technologies like patrol vehicle and superior-fire arms

    to fight crime created crack walls between police and community members; police were so

    engrossed with their technologies that they became less aware of human-community

    involvement. Police patrols community areas on duty-rotation basis to prevent criminals even

    though they change their routes for security reasons. Most times, community can’t predict exact

    time police comes around to obtain sensitive security information from community. Police are

    then seen as strangers that disengage community people from their services and suggests that

    police are less concerned about community policing Miller (2015)

    Another incident that caused poor relationship between community and police is social unrest of

    1960s that resulted into assassination, civil riot and gang violence. During this period, police

    were oppressive in their tactics; police brutality caused civil unrest that made people see police

  • 12

    as enemy of common people that upholds unjust cause. Many community members started losing

    confidence in police services. Community members do not want to associate with police any

    longer or stand as witnesses to crime cases in favor of police. Many members are scared of

    reporting crime situations to police because of fear of being held as chief suspects; this hinders

    police effort to control crime and maintains social disorder in the community. In-between 1980s

    and 1990s, crime rates were on increase across the nation despite advance in police training and

    technology. During this time, the public lost confidence in police structure within poor and urban

    communities; police heads later discovered importance of community members as they realized

    that modern technologies alone were not enough to combat modern crime; they started tracing

    back community roots to gain confidence of community members in tackling contemporary

    crime to boost community policing.

    2.6 Prospect of Community Policing in Nigeria

    Idea behind community policing in Nigeria started in 2004 as means of soliciting for human

    involvement to regain their confidence and become partners in quality police service re-branding

    Kappeler (2016). Potential and prospect of community policing now determines how police

    agencies engage community members; this already serves as eye opener for police by widening

    their visions beyond focusing only on law enforcement services to community mobilization to

    seek support in fighting crime. According to Coquilhat (2015), prospect of community policing

    gets community members along with police activities by improving public relationship and trust

    about police for grass root support. Many communities are likely to take part in community

    policing if police can see them as partners in modern crime fighting. Police needs to become

    community’s friend by collaborating with chiefs and kings of communities before they can

    change orientation and perception of ordinary members of community to join hands with them in

    fight against crime in the society. Community must also realize that without police, community

    cannot be safe for people to live and prosper. No foreign or domestic investor will come to

    community that is full of acrimony and wicked people; community must respect police who are

    sacrificing their life to safeguard the community by giving useful information to police that will

    help them eliminate all forms of wickedness in the community so we can all have better society

    we had wanted Mudiare (2014). Community policing is achievable, it has prospect in Nigeria

    since offending action from both ends can be resolved.

  • 13

    2.7 Mobile Android SDK and its Feature

    Android is operating system that is based on Linux kernel; it is responsible for developing

    Android mobile apps and primarily leads by Google. Android system supports background

    processing, provides rich user interface library that supports 2-D and 3-D graphics using

    OpenGL-ES (short OpenGL) standard, and grants access to file system as well as embeds SQLite

    database. Android application consists different visual and nonvisual components which are

    reusable component of other applications. Android tool contains Android device emulator; this

    emulator runs Android Virtual Device (AVD), which emulates real Android phone. AVD allows

    one to test Android application on different mobile android versions and configurations without

    access to real hardware. Even if one has real mobile android device available, one gets familiar

    with creation and usage of AVDs. Virtual devices give one possibility to test application for

    selected Android versions and specific configurations. One can define multiple AVDs with

    different configurations and start them in parallel to test different device configurations at once.

    Different versions of Android Operating System exist which include:

    i. Android Cupcake

    ii. Android Donut

    iii. Android Éclair

    iv. Android Froyo

    v. Android Gingerbread

    vi. Android Honeycomb - First OS design for tablets and launched on Motorola Xoom

    vii. Android Ice Cream Sandwich: First OS to run Smartphone and tablet as well as ends 2.X

    naming conventions

    viii. Android Jelly Bean: Launched on Google Nexus 7 tablet by Asus

    ix. Android Jelly Bean: Arrived on LG Nexus 4

    x. Android Jelly Bean

    xi. Android Kit Kat: Launched on LG Nexus 5

    xii. Android Lollipop: Launched on Motorola Nexus 6 and HTC Nexus 9

    xiii. Android Marshmallow: Launched on LG Nexus 5X and Huawei Nexus 6P

    Android Marshmallow aims to make OS become more user-friendly with improved battery life

    and control over apps

  • 14

    2.8 Review of Related Literatures on Community Policing System

    i. According to Boe (2014), provides analysis that focuses on dynamic interaction among

    community youths and criminal involvement outcomes. Individual panel report by Afro-

    American male population between 14 and 23 in U.S community was used. Multinomial

    discrete choice-vector for auto regression model was used to determine youth decisions to

    engage in schooling, employment and criminal behavior

    ii. According to Joy (2012), she identifies effect of educational realization on youth crime in the

    community using reform in post education system within 1980 and 1990 in U.K. to determine

    participation of community individual ranges from 16 and 21 years of age. Study was

    conducted randomly by selecting wrongdoers from the community. Result indicated that there

    was 1% increase in number of males in full-time education while there was 1% increase in

    number of men continuing in education after compulsory school leaving age; this alone

    reduced criminal behavior of males by 1.9% while that of females were reduced by 1.1%

  • 15

    CHAPTER THREE

    SYSTEM ANALYSIS AND DESIGN

    3.1 Analysis of Existing System

    Investigation about community policing reveals that UNILAG academic community uses

    traditional approach to gather information about crime activities within the school environment

    before relaying the same to Yaba police station. Students and staffs are not carried along in the

    existing system, they are scared to report crime activities in their respective areas to security unit

    or police on campus because many students and staff have to trek long distances from their

    hostels or staff quarters to report crime incidences in Alpha-Base, which is security headquarters

    in UNILAG before it can be taken seriously. Urgent crime attack that demands attention of

    police on campus environment is usually delayed before arrival of police to school community;

    police station is far from school and transportation fare is not affordable to many students and

    staffs from campus to report crime or call attention of police to urgent issues. Reporting crime on

    campus takes longer process and responses are not usually immediate; many times, delay on part

    of security and police has been attributed to “organization protocols” that must be followed.

    Crime reporters must fill FIR form before report can be taken serious by security personnel, at

    times, reporters are subjected to intimidation by arresting them as first suspects and subjecting

    them to long waiting hours or weeks before they can be cleared. With these happening in

    existing community policing system, community members are scared to relate with police and

    internal security, crime like raping, cultism, stealing on campus especially forest-regions has

    been on increase since existing system lacks capacity to involve community members in crime

    fighting and reportage. In existing system, crime report cannot be done as anonymous and

    reporting is usually delayed. All community data and crime details in the community are

    documented on paper in UNILAG which get lost due to mismanagement

    3.2 Problem of Existing System

    Community policing in use at UNILAG has problems that affect performance of traditional

    community policing that include:

    i. High-Cost: Conventional community policing is difficult to maintain. Constant patrol of

    police in the community to monitor security situation every minute of the day is

  • 16

    expensive. Cost of fueling patrol vehicles and hiring spies to carry out 24hrs surveillance

    within the community is easy to maintain on long run. Cost of storage for community

    record keeping and police details for community are expensive when compare to proposed

    system

    ii. Time-wastage: Many times, are wasted during crime reporting and before response from

    police due to administrative protocols that must follow. Searching relevant community

    record is time consuming. Time wasted on irrelevant issues can cause death of victim

    before response from rescue squad

    iii. Lack-of-Security: Insecurity on community records, member details, community events,

    multimedia files (pictures, videos and audios) can be manipulated

    iv. Loss-of-Document: Traditional method of storing community policing information may

    get lost; media files can get corrupt which can lead to problem beyond management

    3.3 Analysis of New System

    New community policing for University of Lagos Academic Community is designed to address

    shortcomings experienced in existing system by introducing mobile based community policing.

    In new system, community members can report to police directly or through member forum by

    uploading information without visiting police post from their mobile phones and locations.

    Community members can post information or report crime situation as anonymous and

    information can reach destination instantly which enables rescuer team to mobilize on time to

    counter criminal activities. New system is based on client-server architecture design; proposed

    mobile app runs on mobile phones of every community member to upload and report real-time

    crime incident within the community areas to police, internal UNILAG security and community

    members. In situation where reporter becomes victim attacked with his/her phone seized, new

    system incorporates voice recognition and background location tracking system; victim voice is

    enough to activate application from seized phone to send SMS, email, FCM messages and

    underground emergency calls to security officers and police. Location of incidence along with

    map of the area is silently sent to security officer for emergency mobilization for counterattack.

    Community policing record system in new system is computerized and simple to use; it is less

    error prone compared to traditional method. Searching community member information is fast as

    information can be retrieved in matter of second. Main features of new system are:

  • 17

    i. Immediate dissemination and retrieval of information: New system provides quick

    information to police for emergency rescuer and information retrieval system

    ii. Immediate transmission of multimedia files: In traditional mobile policing system,

    information transmission was difficult as video, picture and audio were difficult to

    transmit instantly to community forum members due to size involved

    iii. Easy to operate: This application is easy to operate and fits into limited budget of the

    institution

    3.4 Justification of New System

    It is expected that with introduction of new system, lots of positive changes will be noticed. In

    design of community policing software, effort is made to create affordable and efficient

    community policing application which if adopted for University of Lagos community, will

    tighten security apparatus in UNILAG. New system is very cheap because it works on existing

    internet and telecommunication infrastructures that exist in university community as well as

    individual mobile phone of community members to proffer solution to insecurity in the school

    community. To justify implementation of new system to aid insecurity in the school community,

    following features are expected to be considered during design and implementation stages:

    i. Authentication: New system will make sure provided login credentials of community

    members are correct

    ii. Confidentiality: Unauthorized disclosure of member’s identity and criminal details to

    third-parties outside police, internal security and community members of UNILAG

    community will not be allowed

    iii. Integrity: New system will prevent unauthorized modification of member and criminal’s

    information from server

    iv. Availability: New system will prevent unwanted withholding of crime information from

    time it is needed

    3.5 System Design

    3.5.1 Output Design

    At design stage, output design is formulated to showcase how output will be displayed when

    implemented in real life scenario based on design interface. It is considered first during design

  • 18

    stage because it is output that will determine input while processing input will determine output.

    System provides many reports to answer different design approaches for mobile community

    policing system. Tables below show the expectation of output data from application when

    implemented, they are presently at design stages:

    NOTE:

    xxxxx—means alphanumeric or alphabetic output data expected to be displayed by computer

    when program is implemented

    99999---- means numeric output data is expected to be displayed when program is implemented

    SAMPLE REPORTS FORMATS

    1. UNILAG COMMUNITY POLICING

    LAGOS UNIT 001

    LIST OF REGISTERED MEMBER RECORD

    DATE:

    S/N Member ID Member Full

    Name

    Address Mobile No Leader’s

    Attestation

    Occupation

    Community

    Leader

    Officer in

    Charge

    99 99999 xxxxx Xxxxx 99999 xxxxx xxxxx xxxxx xxxxx

    99 99999 xxxxx Xxxxx 99999 xxxxx xxxxx xxxxx xxxxx

    99 99999 xxxxx Xxxxx 99999 xxxxx xxxxx xxxxx xxxxx

    99 99999 xxxxx Xxxxx 99999 xxxxx xxxxx xxxxx xxxxx

    99 99999 xxxxx Xxxxx 99999 xxxxx xxxxx xxxxx xxxxx

    Table 3.1: List of Registered Member Record

  • 19

    2. UNILAG COMMUNITY POLICING

    LAGOS UNIT 001

    LIST OF INCIDENT REPORT RECORD

    DATE:

    Table 3.2: List of Reported Incident

    3. UNILAG COMMUNITY POLICING

    LAGOS UNIT 001

    LIST OF SOCIAL COMMUNITY SIGNUP MEMBER

    DATE:

    S/N Username Password Firstname Lastname Email City Gender Birthday Remark

    99 xxxxx xxxxx xxxxx Xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx

    99 xxxxx xxxxx xxxxx Xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx

    99 xxxxx xxxxx xxxxx Xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx

    99 xxxxx xxxxx xxxxx Xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx

    99 xxxxx xxxxx xxxxx Xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx

    Table 3.3: List of Social Community Signup Record

    S/N Member ID Member

    Full Name

    Incident

    ID

    Report

    Title

    Report

    Incident

    Image

    Evidence

    Video/Audio

    Evidence

    Date

    Reported

    Officer in

    Charge

    99 99999 xxxxx 99999 xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx

    99 99999 xxxxx 99999 xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx

    99 99999 xxxxx 99999 xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx

    99 99999 xxxxx 99999 xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx

    99 99999 xxxxx 99999 xxxxx xxxxx xxxxx xxxxx xxxxx xxxxx

  • 20

    3.5.2 Process Analysis

    Information gathered was processed into meaningful format before entry into system. Criminal’s

    information is captured by community members and stored in database for future reference

    3.5.3 Input Design

    Input design interface is where raw data are entered into computer for processing. For operation

    to be performed on computer, data must be entered into it via input interface form. In this new

    system, input interface design for this research involves input forms to capture data to derive

    required outputs. Input interface form designs are expected to be used for capturing program

    inputs. Some input interface forms at design stage include:

    i. Member Registration Form

    ii. Incident Report Entry Form

    iii. Social Community Sign Up Entry

    Member Registration Design Form: This is used to capture data from member of UNILAG

    Community at design stage of development.

  • 21

    Figure 3.1: Member Registration Entry Form

    Incident Report Entry: This is used to capture incident report in the community for effective

    policing and documentation purposes at design stage of development

  • 22

    Figure 3.2: Incident Report Entry Form

    Social Community Sign_Up Input Design: This is used to capture profile data of community

    member who wishes to join online social community for information dissemination and

    reportage purposes

  • 23

    Figure 3.3: Social Community Sign_Up Entry Form

    3.5.4 Database Design

    Data in the system must be stored and retrieved from database; designing database is part of

    system design. Data elements to store have been identified at analysis stage to design data

    storage and retrieval system. Database is a collection of interrelated data stored with minimum

    redundancy to serve many users. General objective is to make database access become easier and

  • 24

    flexible for users. Relationships are established between data items while unnecessary data items

    are removed. Normalization is done to get internal consistency of data to have minimum

    redundancy with maximum stability. This minimizes data storage required to reduce data

    inconsistency and optimize data for updates. MYSQL database has been chosen to develop

    relevant databases needed for this application. The following are database tables involved in

    proposed system:

    1. Table Name: Member_Record.sql

    Purpose: For keeping community member’s details

    Key Field: Member ID

    FIELD NAME DATA TYPE FIELD LENGTH DESCRIPTION

    Member ID Alphanumeric 10 Member identification number

    Full Name Alphabetic 20 Member’s full name

    Address Alphanumeric 15 Member’s home address

    Phone No Alphabetic 11 Member’s contact number

    Leader’s Attestation Alphabetic 40 Leader’s confirmation of

    member

    Occupation Alphabetic 20 Member’s occupation

    Community Leader Alphabetic 25 Community leader name

    Officer in Charge Alphabetic 05 Patient’s Blood Group

    Table 3.4: Member Record

  • 25

    2. Table Name: Incident_Report.sql

    Purpose: To keep record of crime in the community and report made for future purposes

    Key Field: Incident ID

    FIELD NAME DATA TYPE FIELD

    LENGTH

    DESCRIPTION

    Incident ID Numeric 10 Incident identification

    number

    Full Name Alphabetic 20 Member’s full name

    Member ID Numeric 10 Member identification

    number

    Report Title Alphabetic 20 Crime report heading

    Report Incident Alphabet 40 Crime report detail

    Image Evidence Blob 50 Picture evidence of incident

    Video/Audio

    Evidence

    Encoded base64 90 Video/Audio evidence of

    crime incident

    Date Reported Alphanumeric 20 Crime report date

    Officer-in-Charge Alphabetic 35 Police officer reported to

    Table 3.5: Incident Report Database Design

  • 26

    Table Name: Social_Community_Signup.sql

    Purpose: For keeping record of user’s login purposes

    Key Field: Username, Password

    FIELD NAME DATA TYPE FIELD LENGTH DESCRIPTION

    Member ID Numeric 15 Social member identification

    no

    Username Alphanumeric 20 Social member’s username

    Password Alphanumeric 20 Social member’s password

    First Name Alphabetic 30 Social member’s surname

    Last Name Alphabetic 30 Social member’s last name

    Email Alphanumeric 20 Social member’ email

    City Alphabetic 20 Social member’ city

    Gender Alphabetic 10 Social member’ gender

    Birthday Alphanumeric 15 Social member’ date of birth

    Remark Alphabetic 50 Social member’ general

    remark

    Table 3.6: Social Community Signup Database Design

    3.5.5 Use Case Diagram

    Use Case Diagram is graphical technique that stands for system functional requirement; it is

    designed during requirement collection before being redefined by community member or police

    officer to suit pre-defined objectives. Use case model consists of textual description.

  • 27

    Figure 3.4: Use Case Diagram for Community Policing (Boe, 2014)

    Features of the New System

    The following features are identified

    a. Security button: This is the centre red button; it is used for making emergency contacts

    during distress. Clicking the button sends background messages via SMS, Email, FCM

    and tracking locations and map to police, school security as well as all community

    members registered on the app. It also has voice feature which makes it easy to activate

    and send background messages via voice once the phone has been collected from the

    victim during robbery, raping, kidnapping or other crime related activities. It can also

    wake up or restart the phone that is switched off or in sleep mode to carry out all the tasks

    mentioned above.

    b. Add: This button enables app user or community member to register information like

    name, email, mobile number about police, school security and all community members

    into this application. It can also be used to edit existing information about community

    members in case of sudden contact changes.

    c. Officer: This button enables user to view all executives of community member and their

    related profile information. This allows members to familiarize with their coordinators

    and contacts for proper community information flow.

  • 28

    d. Helpline: This button helps showcases all community location offices within the campus

    in case of face-to-face contacts with their coordinators. It also includes all mobile and

    email to reach each of the community office locations for direct contacts or making

    inquiry purposes.

    e. Camera: This button enables app user to take picture of crime incident within the

    community to serve as future evidence of crime occurrence or exhibit to prove court

    cases. The app can use forward or back camera to make emergency shots before

    uploading via web server or email to all community members.

    f. Video: This button helps user to record live video of crime incident within the

    community to serve as future evidence of crime occurrence or exhibit to prove court

    cases. The app can use forward or back camera to make emergency video recording

    before uploading via web server or email to all community members. Other buttons are

    included to begin and stop live recording; another one can be used to playback the

    recorded video before uploading.

    g. Chat: With this button, all community members can chat together irrespective of their

    locations around the globe. This boosts information flow among members and aids crime

    reportage among members.

    h. Tracking: Once the security button is clicked or voice mode is activated, background

    tracking of incident location becomes activated and updates police and other community

    members so that current location and map where the victim has been carried to can be

    tracked as well as how long it will take to get to current destination where the victims are

    located. The app sends tracking code to all community members and police which can be

    used to keep track update of the present victim’s location; this feature is advised to be

    used by police only in order not to compromise security effort at securing the victims.

    3.6 System Coding Tool and Technique

    Programming coding tool consists of coding environment used for designing this application;

    many tools were used for development, testing and evaluation to determine program workability

    by targeting specifications that meet aim and objectives at beginning of this reseach.

    Programming tools involved in this implementation are:

    i. Basic4Android

    ii. Android Google SDK

    iii. SQLite

  • 29

    Basic4Android: is refered to B4A, it is another programming language with Java and Android

    SDK capability. It uses visual designer environment to build user interface that targets mobile

    phone and tablet with different screen sizes. Compiled mobile APK can be tested in AVD

    emulator or physical android device using B4A Bridge. B4A language is like Visual Basic that

    fits in native android environment. B4A is object and event-driven language that generates

    standard-signed APK ready for upload at Google Play, Samsung and Amazon App store. Below

    are features that attract researchers to this language:

    i. It has powerful rapid development tool for building native android apps

    ii. B4A IDE is 100% dedicated to android development

    iii. APKs generated are native to that of Java, no runtime libraries are required

    iv. It is object-oriented language with similar performance to Java

    v. It can share code with B4J, which another development tool for desktop application

    development

    vi. XML programming is not necessary

    vii. It has rapid debugger that supports fast deployment, code-swapping and expression

    viii. It has designer script feature that permits programmers to create complex layout

    Android SDK: This programming tool is used together with B4A to design android mobile

    application. SDK stands for Software Development Kit that comprises tools

    like debugger, library, handset-emulator QEMU, sample-code and tutorial. It supports multiple

    screen sizes and development-platform that includes computer running Linux, Mac

    OS and Window. Until end of 2014, supported IDE was officially Eclipse via Android

    Development Tool (ADT) Plug-in. Developer can use text editor to edit Java with XML files,

    before using command-line tool to create, build and debug android application. SDK supports

    older versions of android platform if developer wishes to target applications for older devices

    3.6.1 Entity Relationship Diagram

    This is essential tool used to represent flow of application development life cycle for application

    to work as unit. The diagram represents how different entities like people, object or concept

    relates with one another in a system.

  • 30

    Figure 3.5: Entity Relationship Diagram for Community Policing (Kappeler, 2016)

  • 31

    CHAPTER FOUR

    SYSTEM IMPLEMENTATION AND DOCUMENTATION

    4.1 Introduction

    This is exact chapter that is concerned with implementation and research evaluation; it was

    achieved based on input-outcome from chapter three. Inputs were used to achieve result

    enumerated as output design from chapter three. Central-focus of this chapter is to enlighten

    application users on necessary software and hardware requirements needed to run developed

    application

    4.2 System Implementation

    Implementation is process of switching from one system to another that has provision for

    different defects of previous system. Now that implementation of Mobile Community Policing

    has been achieved, there is need for total-integration of this application to replace existing

    system in use presently at University of Lagos community. Users of this application must be

    carried along until they are fully-familiar with new system. Several changeover methods are

    available for management to adopt without affecting users in their present working

    environments.

    4.3 Changeover Method

    There are various changeover methods namely;

    i. Parallel-Changeover

    ii. Pilot-Changeover

    iii. Direct-Changeover

    i. Parallel-Changeover: is one of safest methods that provide way of verifying results of

    new-system. Current and new-system are put to run in parallel manner for period of time.

    Cross-checking is exercised as both systems are processing same kind-of-data. Indication

    is shown if there is any problem with new system

    ii. Pilot-Changeover: this involves selecting part of school-community to operate new-

    system in parallel with existing system. If satisfied with new system, management

  • 32

    discontinues old system and continues with new-one before piloting is transferred to

    another part in the community

    iii. Direct Changeover: this is the type of changeover method where old system is wholly

    replaced by new system in one move. This method is quick with minimal work load but

    risky and unavailable when two-systems differ. This method is cheap and less time is

    consumed in the process, it is difficult to correct programs while the system remains

    operational

    4.3.1 Changeover Recommendation

    However, out of all changeover-methods, parallel changeover method is good for use of

    whosoever wishes to implement this application. As experienced programmer, I decided to

    recommend this changeover method to University of Lagos community after understudy many

    software developers like Oracle, IBM and so on that had won huge amount of contracts running

    several millions within local and international academic institutions. This enables management to

    learn new-system; optimum performance of new system enables management to decide whether

    to replace old system with new system or retains old system

    4.4 System Installation & System Run

    System Installation works in conjunction with evaluation of new-system. Having designed and

    implemented mobile community policing application for UNILAG community, running program

    on mobile device must be explained in order to understand environment where this application

    will run to achieve target-objectives

    4.4.1 Hardware Specification

    For proper implementation of new-system, author recommends the following minimum

    hardware requirements where this application will run:

    i. Pentium-4 processor and speed of 3.20GHz

    ii. RAM of about 448 megabytes (MB)

    iii. 500-megabytes (500 MB) of available space on hard-disk

    iv. CD/DVD-ROM drive

    v. Simple-enhanced windows-keyboard and mouse

  • 33

    vi. Sound-card

    vii. Android mobile phones with different screen sizes

    viii. HP-Laser Jet printer for report generations

    ix. Uninterrupted Power Supply (UPS)

    4.4.2 Software Specification

    The following software requirements are necessary for optimum performance of mobile based

    community policing:

    i. The system runs on windows XP or any higher Microsoft windows operating system

    ii. Basic4Android, Java, Android SDK for front-end Graphical User Interface mobile design

    iii. SQLITE for back-end mobile database design

    iv. Emulator like YouWave

    v. PHP

    vi. WAMP

    vii. MYSQL

    4.5 Choice of Programming Language

    Programming language used in designing this application is Basic4Android with support of

    Android Google SDK and Sqlite. Other tools were used for development, testing and evaluation

    purposes in order to meet-up with set objectives at beginning of this research. Below are some

    programming tools involved:

    iv. Basic4Android

    v. Android Google SDK

    vi. SQLite

    Basic4Android: is popularly called B4A, another language used with Java and Android SDK for

    programming. It uses visual-designer-environment to simplify procedures for building user

    interfaces that target phones-and-tablets with different screen-sizes. Compiled mobile programs

    can be tested in AVD emulators or on real-android devices using B4A-Bridge. Language is

    similar to Visual Basic but adapted to native Android environment. B4A is event-driven

    language. B4A generates standard signed-Android applications that are uploaded to Google Play

  • 34

    store, Samsung-App store and Amazon-App store. Below are features that make researchers

    adopt the language:

    ix. Simple RAD-tool for developing native Android-applications

    x. Complete programming language that is 100% focused on Android-development

    xi. It compiles to native byte-code without requiring runtime libraries

    xii. It has performance similar to applications written in Java

    xiii. It is object oriented-programming language

    xiv. There is no need for XML-programming

    xv. It has rapid-debugger that supports quick-deployments and code-swapping

    xvi. It has powerful designer scripts feature that permits one to create sophisticated layouts

    Android-SDK: This programming tool is used with B4A to design android based mobile apps.

    SDK means Software Development Kit which comprises development tools

    like debugger, libraries, handset-emulator based on QEMU, sample-code and tutorials. It

    supports multiple mobile screen-sizes and development-platforms like computers

    running Linux, Mac OS and Windows. Developers use text-editor to edit Java and XML files,

    then use command-line tools to create and debug Android-applications. SDK also supports older

    versions of Android-platform if developers wish to target their applications at older devices

    4.6 System Documentation

    Documentation gives elaborate information about design specifications and functionalities like

    hardware and software specification, program flowchart and so on. It also assist in development

    of new system

    4.6.1 Installation Process

    Having developed this system, it becomes important to instruct users about installation of this

    software without difficulty. Here are steps to follow for successful-installation for server and

    client-side application:

    For Server-Side: (Community Policing Server)

    i. Find and Install WampServer Software included in project CD

    ii. Run newly installed WampServer Software

  • 35

    iii. Browse to local-folder “C:\wamp\www”

    iv. Create folder named “communitypoliceserver” or choose any other name that suits existing

    domain

    v. Open web-browser and type address: http://localhost/phpmaydmin

    vi. Under CREATE_DATABASE textbox, type: “mcpdb” and click on CREATE button

    vii. After new database has been created, click IMPORT_Tab and navigate to project CD to

    browse “datasite” folder and select the “mcpdb.sql” file

    viii. Click on GO-button to populate database with initial data

    ix. Open project CD to copy all contents of “mcpdb” folder to “c:\wamp\www\

    communitypoliceserver” folder that was created earlier

    x. Finally, open browser and type “http://localhost/communitypoliceserver/cpanel” in address

    bar

    xi. You are now ready to operate this application

    xii. Default Administrator’s Login are

    xiii. Username: admin

    xiv. Password: admin

    xv. From administrator’s Control Panel, one can configure and edit all communitypoliceserver

    application you need to run

    xvi. THANK YOU!!!

    4.6.2 For Client-Side: (Mobile Community Policing App)

    i. Connect USB cable from android based mobile phone to Computer or switch-ON

    Bluetooth connection on both devices

    ii. Locate android file from PC and send to mobile device

    iii. Double-click android file to start installation

    iv. Follow on-screen installation wizard as shown from mobile devices and respond

    accordingly

    v. Click on “Finish” to exit

    http://localhost/phpmaydminhttp://localhost/communitypoliceserver/cpanel

  • 36

    4.6.3 System Maintenance

    System maintenance describes different forms of server maintenance to run well. System

    maintenance covers many activities like program-removal, designing-errors, testing-data and

    updating user support. For convenient purposes, maintenance is grouped into three:

    i) Corrective Maintenance

    ii) Adaptive Maintenance

    iii) Perfective Maintenance

    However, perfective maintenance remains the best choice of all categories. Perfective

    maintenance modifies existing programs to enhance information performance. This maintenance

    responds to additional needs of users due to changes in or out of the organization. For better

    performance in productivity, management must stick to perfective maintenance for quality

    delivery purposes

  • 37

    CHAPTER FIVE

    SUMMARY, RECOMMENDATION AND CONCLUSION

    5.1 Summary

    This system followed necessary activities of software development from initial stages to

    implementation stages and testing. This research identifies use of mobile community police

    application developed to resolve issues between members of community and police from time-

    to-time. Analysis of existing system was carried out to identify related problems while solutions

    to problems identified were also provided. After this, implementation of system-design,

    database-design, client side-design, server side-design, interface-design and system security-

    design were considered carefully during implementation. After design and implementation of

    different units, system-testing was done using test data to check actual test-result. However,

    performance evaluation was ascertained to know if it matches objectives set out earlier to have

    perfect mobile community police system that will take care of identified problems to improve

    efficiency. Finally, documentation and implementation of this proposed application were

    affected while system-requirement, changeover-procedure, manual and training were also

    handled accordingly

    5.2 Recommendation

    UNILAG mobile community policing may find it difficult to function effectively as security

    management tool except certain measures are taken by internal security apparatus and police

    administrators in charge of University of Lagos’s jurisdiction. Recommendations listed below

    are worthy of note:

    i. Internal security officers in collaboration with police administrators should improve

    towards UNILAG community crime record keeping. Due to lack of commitment in the

    past before this application was developed, some vital community-crime records for

    UNILAG community were not kept properly while others were not kept at all. Crime

    record keeping should be seen as major contributor in attainment of crime-free society

    Edem (2016)

  • 38

    ii. Every police officer posted to UNILAG community to maintain law and order should

    relate professionally to community members by dwelling in their midst to understand

    areas that need constant monitoring

    iii. Workshops and seminars must be conducted on crime record-keeping by making

    templates available for them to see and follow. In addition to this, community record

    managers should be allowed to acquire knowledge on contemporary methods of

    community crime-record keeping via information-technology

    iv. Members of UNILAG community and environs must leverage on deployment of mobile

    community policing for academic communities to be at alert in their surroundings to

    notify security officer about suspicious crime in their neighborhoods via new developed

    mobile app irrespective of their locations

    v. Government with support from community-members should provide necessary facilities

    needed for contemporary crime combat for security officers to perform their duties under

    law to safeguard community

    vi. UNILAG community leaders must setup monitoring team to enforce use of new mobile

    app to achieve secure environment

    vii. Community police and their internal security collaborators should adhere to security

    ethics to achieve sustainable development as community switch over to new system

    viii. Before using new mobile community policing, recommendation for adequate training and

    orientation must be given to community members and police officers

    5.3 Conclusion

    Analysis of this thesis reveals that all initial objectives have been achieved. Community policing

    moved from face-to-face interaction to mobile and internet-based technologies that give comfort

    to community police and members-of-community; crime report cases can be reported as

    anonymous without seeing police face-to-face within the community. This new automated

    system is designed for UNILAG community as against present traditional mode-of-operation on

    crime prevention within the community; it is regarded as value-added service that improves

    security among members of community to promote productivity. University Community

    members and all security apparatus can now sit back to explore rear-opportunities in this new

    mobile community policing apps. Successful implementation will boost delivery of service in

  • 39

    UNILAG Community. Quality record keeping system will improve as mobile community

    policing application becomes fully integrated into day-to-day activities in each police unit where

    crime-information holds vital position in contemporary security-service. Mobile community

    policing application prevents face-to-face interaction with police-officers before community

    crime information is reported. To guarantee their continuous operations, it must be judiciously

    maintained and use only for the sole purpose it was developed. Now that implementation period

    of mobile community policing is over, its maintenance should be taken over by IT department of

    UNILAG internal-security unit and provide routine software and hardware training support to

    members of the school community. Objectives set-out when this project began have been

    achieved; other related achievements include:

    i. To assist security-administrators and stakeholders in UILAG Community environment

    tackle daily crime among members

    ii. To help police in crime-investigation and prevention within the academic community

    iii. The operation is very easy even for dullest, there is little cost of user training expenses

    iv. This application is customized for UNILAG Academic Community in-house use,

    operating manual is in plain English without foreign technical jargon that may confuse

    potential users of this application

    5.4 Further Research

    This research can get improved upon in future research; current version of new software resides

    in Alpha-Base’s dedicated server, but more areas will need additional features in this direction in

    the future to enable community members lodge useful complaints to police from their respective

    locations. However, to improve on existing system; possible areas that need future development

    are:

    i. Improving on Graphical-User-Interface (GUI) of application

    ii. Implementation of smart watch-based community policing application must be

    encouraged in future to enable community members lodge complaints un-noticed

    from their mobile watch devices

    iii. Ensure each community member is provided with access permission to appropriate

    segment of the application

  • 40

    iv. Real-time location-based tracking should be introduced in future implementations

    5.5 Problem Encountered

    The problems encountered during this project design are:

    i. Unavailable Literature Sources: Although, the project research topic looks simple, but

    useful materials on topic areas are difficult to research

    ii. Programming-Methodology: Methodology adopted in handling programming aspect of

    this project caused many problems that took days to solve. Problems that include

    connectivity issues via MYSQL database posed many challenges

    iii. Inadequate-Fund: This design will not be successful without financial involvement for

    paying computer time; typing and planning of work also has its own financial involvement

    that contributed to huge-financial investment on this project engagement

    iv. Inadequate Power Supply: Poor supply of power in the society caused delay in this

    program implementation and programming

  • 41

    REFERENCES

    Alex C, (2013). Analysis of Police and Policing in Nigeria, Center for Law Enforcement

    Education and National Human Rights Commission, Lagos

    Boe Q, (2014). An Assessment of Police Officers’ Acceptance of Community Policing;

    Anderson Publishing, pg. 16-25

    Castro L, (2017). Institutional frameworks for addressing public sector corruption in Africa:

    Mandate, performance, challenges & capacity needs. Boulder, Colorado, USA: The African

    Capacity Building Foundation.

    Change, pg. 18-21

    Coquilhat F, (2015). The Development of Community Patrol Program: Community-Oriented

    Policing in New York City Police Department. New York: Praeger Publishers, pg.73-88

    DC: Police Executive Research Forum, pg. 3-12

    Donohoe G, (2016). Police-Community Violence in Nigeria, Lagos: Centre for Law Enforcement

    Education

    Eck I, (2014). Above the Law: A Report on Torture and Extra-Judicial Killings by Police in

    Nigeria. Lagos: Civil Liberties Organization

    Edem T, (2016). Police Corruption and the State: Prevalence and Consequences. Global

    Haywaite H, (2015). A New Nigerian Police Image: Its Role in the Next Millennium. A Paper

    delivered at a seminar organized for Assistant Inspectors–General and Commissioners of Police

    by Nigeria Police Force at International Conference Centre Abuja, October 19-20.

    Health

    Hellström P, (2014). Policing freedom: A Commentary on Dilemmas of Policing in Western

    Democracies. Eastover, Plymouth: MacDonald & Evans

    James N, (2015). Colonialism, State and Policing in Nigeria; Crime, Law and Social

    Jintana B, (2017). Police-Community Relations in Nigeria: What Went Wrong?

    Journal of Arts, Humanities and Social Sciences, pg. 19-27

    Joy O, (2012). Policing Nigeria: Control and Autonomy in the Exercise of Coercion; African

    Studies Review, pg. 73-78

    Kappeler V, (2016).Community policing in South East: Policing Nigeria in the 21st Century.

    Ibadan, Spectrum Books

  • 42

    Leary G, (2015). The Key Element of Oriented Community Policing; Colorado: Regional

    Community Policing Institute

    Lucey R, (2013). Community Policing: Comparative Perspectives and Prospects. New York: St.

    Martin's Press, pg. 23 -29

    Martin D, (2016). Community Policing: Elements and Effects-Contemporary Readings;

    Martin T, (2016). Policing Nigeria in the 21st century; Ibadan: Spectrum Books, Waveland

    Press, pg. 45-62

    Miller P, (2015). Problem-Oriented Policing in Practice, Criminology and Public Policy, pg.: 5-

    18

    Modum A, (2015). The Defining Characteristics of Community Policing; Washington

    Mudiare E, (2014). Community Policing is Good Policing: The Past, Present, and Future.

    Rosenbaum E, (2014). The Functions of Police in Modern Society; National Institute of Mental

    Sherman B, (2017). What Community Policing Teaches us about Community Criminal Justice;

    Available on http://www.policing.com/articles/pdf/ccj.pdf, Retrieved on 28th November, 2019

    Sherman H, (2015). Policing Japan Community; Law and Order pg. 46-52

    Skogan W, (2014). Element of Community Policing Perspectives: An Anthology. Roxbury

    Publishing Company, pg. 37-49

    Vatcharaporn R, (2015). Policing a Democracy; Lagos: Centre for Law Enforcement Education

    Washington DC: Police Executive Research Forum, pg. 25-38

    Weiss F, (2017). Research, planning and implementation in West .Africa on Local Government

    Police Management, Washington, D.C. 3rd edition

    http://www.policing.com/articles/pdf/ccj.pdf

  • 43

    APPENDIX A – SAMPLE OUTPUT

    SPLASH PAGE:

  • 44

    Menu Page:

  • 45

    Social Community Page: This is where user selects from the options available in

    the proposed system.

    Signup Page: This is where new community member registers for social community forum for

    effective policing

  • 46

  • 47

    APPENDIX B – FLOWCHART

  • 48

  • 49

    APPENDIX C – SOURCE CODE

    #Region Project Attributes

    #ApplicationLabel: Community Policing

    ' #VersionCode: 1

    ' #VersionName:

    'SupportedOrientations possible values: unspecified, landscape or portrait.

    ' #SupportedOrientations: unspecified

    ' #CanInstallToExternalStorage: False

    #End Region

    #Region Activity Attributes

    #FullScreen: False

    #IncludeTitle: True

    #End Region

    #AdditionalRes: ..\res.ChatMessageView

    #Extends: android.support.v7.app.AppCompatActivity

    Sub Process_Globals

    'These global variables will be declared once when the application starts.

    'These variables can be accessed from all modules.

    Private Mv2 As MovieViewControl

    End Sub

    Sub Globals

    Private mnubt7 As Button

    Private pnl7 As Panel

    Dim xui As XUI

    Dim xlbl As B4XView

    Dim Button1 As Label

    Dim Button2 As Label

    Dim Button3 As Label

    Dim Button4 As Label

    Dim Button5 As Label

    Dim const ACTIVE_COLOR As Int = Colors.White

    Dim const INACTIVE_COLOR As Int = Colors.RGB(205, 95, 75) '105, 105, 105

    End Sub

    Sub Activity_Create(FirstTime As Boolean)

    'Do not forget to load the layout file created with the visual designer. For example:

    'Activity.LoadLayout("Layout1")

    Activity.LoadLayout("login")

  • 50

    Mv2.Load(File.DirAssets, "c.gif", False)

    Dim Panel1 As Panel

    Panel1.Initialize("")

    Panel1.Color = Colors.RGB(188, 132, 128) '128, 128, 128 'panel color here

    Button1.Initialize("Button1")

    Panel1.AddView(Button1, 0, 10dip, 60dip, 60dip)

    Button2.Initialize("Button2")

    Panel1.AddView(Button2, (100%x / 5), 10dip, 60dip, 60dip)

    Button3.Initialize("Button3")

    Panel1.AddView(Button3, (100%x / 5) * 2, 10dip, 60dip, 60dip)

    Button4.Initialize("Button4")

    Panel1.AddView(Button4, (100%x / 5) * 3, 10dip, 60dip, 60dip)

    Button5.Initialize("Button5")

    Panel1.AddView(Button5, (100%x / 5) * 4, 10dip, 60dip, 60dip)

    Activity.AddView(Panel1, 0, 100%y - 60dip, 100%x, 60dip)

    CreateLabel(Button1, Chr(0xF006), "Call Us")

    CreateLabel(Button2, Chr(0xF002), "Search")

    CreateLabel(Button3, Chr(0xF01D), "About")

    CreateLabel(Button4, Chr(0xF08A), "Map")

    CreateLabel(Button5, Chr(0xF2BE), "Email")

    Button1_Click

    End Sub

    Sub CreateLabel(Label As Label, Text1 As String, Text2 As String) As B4XBitmap

    Dim cs As CSBuilder

    cs.Initialize.Typeface(Typeface.FONTAWESOME).Size(30).Append(Text1).Pop.Appen

    d(CRLF).Size(10).Append(Text2).Alignment("ALIGN_CENTER").PopAll

    xlbl = Label

    xlbl.Text = cs

    xlbl.TextColor = xui.Color_RGB(105, 105, 105)

    Return xlbl.Snapshot

    End Sub

    Sub Button1_Click

    SetActiveButtonColor(Button1)

  • 51

    Dim Phone As PhoneCalls

    Phone.Call("08076009700")

    End Sub

    Sub Button2_Click

    SetActiveButtonColor(Button2)

    Dim market As Intent, uri As String

    uri="market://search?q=pub:Google"

    market.Initialize(market.ACTION_VIEW,uri)

    StartActivity(market)

    End Sub

    Sub Button3_Click

    SetActiveButtonColor(Button3)

    StartActivity(about2)

    End Sub

    Sub Button4_Click

    SetActiveButtonColor(Button4)

    Dim intent1 As Intent

    Dim URI As String

    URI = "geo:" & 6.4541 & "," & 3.3947 & "?q=" & 6.4541 & "," & 3.3947

    intent1.Initialize(intent1.ACTION_VIEW,URI)

    intent1.SetComponent("googlemaps")

    StartActivity(intent1)

    End Sub

    Sub Button5_Click

    SetActiveButtonColor(Button5)

    Dim intent1 As Intent

    intent1.Initialize("android.intent.action.SENDTO" , "mailto:

    [email protected]")

    intent1.PutExtra("android.intent.extra.SUBJECT","Our Able Community Leader")

    intent1.PutExtra("android.intent.extra.TEXT", "Here is my complaint/request")

    intent1.WrapAsIntentChooser("Send feedback")

    StartActivity(intent1)

    End Sub

    Sub SetActiveButtonColor(View As Label)

    For Each button As Label In Array As Label(Button1, Button2, Button3, Button4,

    Button5)

    If button = View Then

    button.TextColor = ACTIVE_COLOR

    Else

  • 52

    button.TextColor = INACTIVE_COLOR

    End If

    Next

    End Su