THE DEVELOPMENT OF A STATE SECURITY DATABASE MODEL

THE DEVELOPMENT OF A STATE SECURITY DATABASE MODEL

CHAPTER ONE

GENERAL INTRODUCTION

Introduction

According to Gupta (2012), in a very short span of time, computer has grown from a scientific curiosity to an indispensable tool of modem society. There is hardly any scientific/technical or business activity which is not in one way or the other, affected by modern data processing techniques. The human mind can handle only a limited number of things at a time. The digital computer, on the other hand, can be programmed to compare, measure, calculate and evaluate thousands of readings in an extremely short period of time. Also, nations of the world are now adopting the computer system for security purposes. Many countries maintain a comprehensive database of their citizens for information and security reasons.

One of the distinguishing characteristics of nationhood is a state’s ability to provide security for her citizens, defend her sovereignty and territorial integrity. This is the minimum requirement for a nation to build a solid prosperous economy and begin the ultimate match towards social and political well being encapsulated as national interest. At the core of a complex policy aimed at achieving safety by defending sovereignty and maintaining territorial integrity, national security is therefore a grand policy to achieve, sustain and maintain a state of national survival. National security seeks first and foremost to guarantee internal cohesion, maintain law and order and ensure safety of citizens’ lives and property as well as guide against state vulnerability to internal insurrections and external aggression.

A state security database model is a database application that enables the data of every citizen in a state to be captured such that in the case of a crime investigation, reference can be made to the system to track down offenders or suspects. It is an application of the computer system and database in a positive direction to aid security investigations and verification of identity.

Related Article:  DESIGN AND IMPLEMENTATION OF AN HOSPITAL BILLING SYSTEM

1.1 Statement of problem

Law enforcement agencies such as the Nigeria Police force is faced with the challenge of not having a system that is able to provide needed information on the profile of suspects involved in a crime or the verification of identity. As such, needed information to aid investigation is not easily obtained. To overcome this problem, it is important that a database model is in place to enable the capturing of the identity of the citizens to aid investigation and verification needs.

1.2 Objectives of the study

The following are the objectives of the study:

To develop a state security database system
To understand the concept of database and its different models
To showcase the application of computers in state security
To present the need and benefits of a state security database model

1.4 scope of the study

This study covers the development of a state security database model using the Nigerian Police Force as a case study. It covers the concept of database, the models and the application of computers in state security.

1.5 significance of the study

The significance of the study is that it will provide a system that will aid security and law enforcement bodies to get relevant information pertaining to any citizen that is involved in any crime. It will facilitate the capturing and easy retrieval of information pertaining to citizens or members of a state.

1.6 Definition of terms

Security: precautions taken to keep somebody or something safe from crime, attack, or danger

Database:

a systematically arranged collection of computer data, structured so that it can be automatically retrieved or manipulated

Related Article:  DESIGN AND IMPLEMENTATION OF WIRELESS VOICE OVER INTERNET PROTOCOL

Investigation an examination or inquiry into something, especially a detailed one that is undertaken officially, or the act of undertaking an examination

Crime; an action prohibited by law or a failure to act as required by law

Get Full Work




Use this article as a guide for your own research paper (if properly cited)

Copyright © 2021 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0

WeCreativez WhatsApp Support
We are here to answer your questions. Ask us anything!
Hi, how can we help?