Number of Pages: 77

File Size: 1049 KB

File Type: MS Word & PDF

Chapters: 1 - 5

5,000.00

ABSTRACT

The computerized child abuse database management system is a project proposed to create awareness among masses on the issues related to child abuse. The computerized system will keep tracks of all the suspicious incidents of child abuse by generating reports, aid law enforcement agency based on numerous details. Implementing this computerized system will play a crucial role in child welfare. The management system and data collection tools will meet with the Federal reporting requirements, it will also serve the information needs of an organizations, help inform management decisions and support caseworkers’ interactions with children, youth, and families. The methodology used is Structured System Analysis and Design Methodology (SSADM) because each phase must be complete in its entirety before the next phase can begin. The choice of language adopted is Visual Basic programming language due to the flexibility they provide. The software was tested with windows 10. The result achieved is, 1) A better service that speed-up detecting species of frecords, and ensures data security by restricting access to the program and to the database, enable stress-free system for staff to easily document their records’ report, eliminate wrong naming of fish species by some authors. 2) A system where information and output report will be produced much faster, more accurately and more detailed to the. In summary, the project work was aimed at developing a Software that will eliminate wrong naming of fish species by some authors and safely and also will help to document and store fish species’ report, and also allows users to print-out the hard-copy of the fish species’ report.

 

 

TABLE OF CONTENT

Title page                                                                                                                                           i

Certification                                                                                                                                      ii

Approval page                                                                                                                                  iii

Dedication                                                                                                                                       iv

Acknowledgement                                                                                                                            v

Abstract                                                                                                                                           vi

Table of content                                                                                                                              vii

CHAPTER ONE                                                                                                                            1

INTRODUCTION                                                                                                                           1

1.1. Background of the study                                                                                                           1

1.2. Statement of the problem                                                                                                          2

1.3. Aims and Objectives of the study                                                                                             2

1.4. Significance of the Study                                                                                                          3

1.5. Scope of the study                                                                                                                     3

1.6. Limitation Of Study                                                                                                                  3

1.7 Definition of terms                                                                                                                     4

CHAPTER 2WO                                                                                                                            7

LITERATURE REVIEW                                                                                                                7

2.1 Review of Related Works                                                                                                          9

CHAPTER THREE                                                                                                                     13

Methodologies and System Analysis                                                                                              13

3.1 Methodologies                                                                                                                          13

3.2 System Analysis                                                                                                                        17

3.3 Data Collection                                                                                                                         18

3.4 Organization and her Environment                                                                                           19

3.5 Modus Operandi of the Present System                                                                                   20

3.5.1 Input Analysis                                                                                                                        20

3.5.2 Process Analysis                                                                                                                    21

3.5.3 Output Analysis                                                                                                                     21

3.5.4 Data Flow Diagram of the Present System                                                                           22

3.5.4.1 Data Flow Diagram Notations                                                                                            22

3.6 Problems of the Present System                                                                                               25

3.7 The Proposed System                                                                                                               26

3.8 High Level Model of the Proposed System                                                                             26

CHAPTER FOUR                                                                                                                        27

Systems Design                                                                                                                               27

4.1 Objectives of the system design                                                                                               27

4.2 Specification                                                                                                                             28

4.2.1 Expanded DFDs to Show all the Processes and Data Stores                                                29

4.3 Database Specification                                                                                                             30

4.4 Program Module Specification                                                                                                 31

4.5 Input and Output Specification                                                                                                32

4.5.1 Output Specification                                                                                                              34

4.5.2 Input Specification                                                                                                                35

4.6 Algorithms                                                                                                                                36

4.7 System Flowchart                                                                                                                     37

4.8 Program Flowchart                                                                                                                   43

4.9   Data Dictionary                                                                                                                      43

4.10 Choice of Programming Language Platform                                                                          44

CHAPTER FIVE                                                                                                                         45

5.0 System Documentation and Implementation                                                                           45

5.1 System implementation Documentation                                                                                   45

5.2. Hardware requirement                                                                                                             45

5.3 Software Requirements                                                                                                            46

5.4 Installation arrangement                                                                                                           46

5.5 Testing                                                                                                                                      46

5.5.1 Unit Testing                                                                                                                           46

5.5.2 Test Data                                                                                                                                47

5.5.3 Test Result                                                                                                                             47

5.6 Training Arrangements                                                                                                             47

5.7ConversionArrangement                                                                                                            47

5.8 System Documentation                                                                                                             48

CHAPTER SIX                                                                                                                            50

6.0 SUMMARY, CONCLUSION AND RECOMMENDATION                                              50

6.1 Summary                                                                                                                                   50

6.2 Conclusion                                                                                                                                50

6.3 Recommendation                                                                                                                      50

REFERENCES                                                                                                                            51

APPENDIX I

APPENDIX II

 

 

 

CHAPTER ONE

INTRODUCTION

1.1 Background of the Study

Children are precious gift from the almighty God. “Children are an heritage of the Lord, the fruit of the womb is His reward” (Psalms 127:3 KJV). They need to be cared for, loved, cherished, appreciated and adored in a reliable manner. In African context, children are so regarded that a family without a child is seen as incomplete institution.

According to Onuzulike (2017) generally stated that a child is an individual under the age of eighteen years. Child abuse is defined as the portion of harm done to a child who may be from human action or inaction that is proscribed or proximate and preventable. Preventable here implies that it is not accidental but intentionally inflicted on the child by perpetrator who does not care about the outcome.

Child abuse as a social problem has only recently opined recognition and attention of the Nigeria public. This was as a result of an organization known as the African Network for prevention and protection against child abuse and neglect (ANPPCAN) which was set up in (1984) by some African countries including Nigeria (Leonard, Nnaemeka, & Izuchukwu, 2015).

Their aim was to look into the area of child abuse and neglect, 25 pertains to Africa, since the Nigeria has formed its own chapter of the network which was inaugurated in (1986) and this body has held a couple of conference in an effort to defined and identify aspects of child abuse within the society. Kalu and Ede (2018), defines child abuse as denial of the basic rights and need of the child by parents, schools, government and society. According to Waboso (2016), also stated that “Neglect” implies a disorder in parent child relationship characterized by a failure of parent to provide for the child the personal values and the child suffers from lack of attention, malnutrition and lack of stimulation.

Anukam (2016) said that in emotional abuse, the parent was so depended on the child that the parent child role was reserved. The child is laid upon the burden of fending for himself and his limited capabilities; he cannot meet the demands and therefore becomes frustrated. The child may want to run away from the family environment and its hardship. Sexual abuse implies sexual harassment given to a child by parents, caregivers, teachers, and so on without the child’s consent and understanding. Kalu, et al. (2018) also stated that reflected or physically or sexually abused children performed poor in school; they receive lower states than no-maltreated children. Against this background, this work is aimed at or examines the nature, causes, and aspects of child abuse and neglect in Nigeria.

The main background of the study exposes the problems inherent in a non-computer based database system. An organization like African Network for Prevention and Protection against Child Abuse and Neglect, encountered serious problems in the area of documentations which include misplacement of vital information or cases, as a result of large volume of work handled, duplicated or efforts due to inconsistency in activities, and a lot of time spent ins searching for files or reports when needed for processing.

 

  • Statement of the Problems

For a system to require some modification or replacement or enhancement, there must be some existing problems associated with the old or existing system that prompted to it. This organization faces numerous problems due to the manual methods of recording which may include:

  1. Inefficient and ineffective security measures in order to avoid loss of data by unauthorized users.
  2. The keeping and retrieval of accurate data or records on child abuse, complainant and offenders which are poorly carried out.
  • Wrongly filed and placed, hence it is not easy to obtain accurate information
  1. The length of time required for processing client report is much
  2. Keeping folders of report manually takes a lot of time, money and some of the information is redundant.
  3. It is unreliable and accurate
  • It results to unnecessary duplication of reports
  • It causes loss of documents

 

 

 

1.3 Aim and Objectives of the Study

The main objective of the project is to fully understand the existing system and to identify the basic information requirement and then discuss now the computerization of the system can assist in eradicating the problems of non-computer based system. The purpose of this project is to design and implement a system that will solve the problem of misplacement of vital reported cases, documents and records, duplication of efforts, and time taken or needed to process files and records.

The specific objectives includes:

  1. To design a functionally database system for child abuse offenders and victims.
  2. To compute and achieve child abuse records.
  • To process and achieve each record.
  1. To analyze each record.
  2. To produce event report in demand.
  3. To ensure data security by restricting access to the program and to the database.
  • To ensure easy access and retrieval of data in the program.

 

  • Significance of the Study

Child abuse and child neglect are social problem that affects a significant number of people, about which something must be done by designing a computerized child abuse and neglect database management system. When finding from this study are implemented, it will help the staff in African Network for Prevention and Protection against Child Abuse and Neglect, Anambra State any other Child Protection Agency Programme, to solve the problem associated with inability to keep accurate reports and records effectively and acid loss of data or reported cases, and also the Nigeria to be aware of the rate of child trafficking. This work will also be beneficial to researcher who want to do further research of the topic. Hence, the need for computerization of child abuse database management system cannot be over emphasized.

 

1.5 Scope of the Study

The scope of this study is not limited to or within any agency, it is designed and developed for the Prevention and Protection against Child Abuse and Neglect. This is to achieve the targeted area of the study. This work will only compute the child abused, complainant and offenders’ records.

1.6 Limitations of Study

In the course of carrying out this research work a number of problems were encountered.

  1. Lack of adequate fund to finance the project: this was another limitation to this work because much money is needed to carry out a detailed research work which is not easily borne by every student.
  2. The limited knowledge of ASP.net and Visual Basic programming was great challenge to this project. However, more research was made to complete this project successfully.

 

1.7 Definition of Terms

Abuse: It is any deliberate act by a person, group of person in the society designed to inflict on a child mentally, physically sexually or emotionally.

ANPPCAN: African Network for the Prevention and Protection against Child Abuse and    Neglect

Automation: it is the replacement of human workers by technology; a system in which a workplace or processes has been converted to one that replaced or ministries human labor with electronic or mechanical equipment.

Child Abuse: This is a child this is physically, sexually, emotionally or psychologically maltreated by the parent, caregivers, teachers or group of persons.

Child: Child is defined as the dependent person in the custody of a parent or guardian for protection of his/her life.

Complainant: A complainant is a person who lodges a complaint. It is a term used in content of criminal law to refer to person who alleges that another person committed a criminal act against him/her in a legal way. It is a person who reports a case or crime.

Data processing: it is defined as the entire process of converting or manipulating data into definite meaningful information (Adigwe, & Okoye, 2015).

Data Security: Data security prevents unauthorized users from viewing or updating the database by the use of passwords.

Data: is any collections of vital information that meant to be processed.

Database Management System (DBMS): it is software which controls the flow of data and checks and checks on how data are stored.

Database: is an organized /unique collection of related files. It is a collection of schemas, tables, queries, reports, views and other object.

Design: is the art or process of designing how something will look, work.

Documentation: material that provides official information or evidence that serves as record; written specifications and information that describes the product.

Information: is a processed data that can be read and understand.

Management: it is act of getting people together to accomplish desired goals and objectives using available resources efficiently and effectively. It includes planning, organizing, staffing, leading or directing, and controlling an organization or a system to accomplish a goal.

Neglect: This usually occur when families fail to or on their own part fail to provide the necessary need for their children such as food, medical care, being deprived of essential need of life.

Offender: This is a person who commits an illegal act. He/she is a criminal and guilty of an offence.

Security: This helps to prevent unauthorized users from illegally accessing certain data within the database, it protects your data/ files.

Software: is a program or a set of programs written to carry out some task in the computer, it also perform logical related programs that works together to control the hardware.

System: It is the collection of hardware and software, data information procedure and people.

Vagrancy: it is a way of life in which someone moves a lot from place to place because they have no permanent home and have to ask for or steal things in order to live.

Violence: Behavior involving physical force intended to hurt, damage, or kill someone or something.

WHO: World Health Organization.

DOWNLOAD THE FULL WORK

DISCLAIMER: All project works, files and documents posted on this website, UniProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. UniProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. All creative work builds on what came before. Nothing is completely original.” - Austin Kleon. The paid subscription on UniProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.

WeCreativez WhatsApp Support
Administrator (Online)
I am online and ready to help you via WhatsApp chat. Let me know if you need my assistance.