Police provides safety to citizens. It always remains steady for arresting any criminal who is a threat for the safety of society. After registering the FIR from any citizen, police starts its work and on that basis it arrests the criminals if proofs are found against them. Once the criminals are arrested, police starts investigation from them. After getting all the proofs against the criminal, it is the duty of the police to present all the proofs honestly to the court so that the right man can get right punishment. The true and right information provided by the people to police helps a lot in arresting the criminals who try to spoil the peaceful environment of society. Along with low salary scale, facilities of modern technology such as computerized system of keeping records are not provided to police department which causes low efficiency. As it is the age of computers and all the organizations today use computers to maintain their records, so this facility should also be given to police department in order to increase their efficiency and to save their time. In our Project we are going to implement a CRMS (Criminal Record Management System).
Police patrol is an important activity for maintaining public safety and security. Officers perform various duties like enforcing traffic laws, responding to accidents and crimes, gathering information, and making decisions on how to resolve issues. Effective patrol requires skills like judgment, active listening, critical thinking and the ability to assess different situations. Police may patrol on foot, bicycle, motorcycle, car or other vehicles. Their goal is to prevent and respond to crimes while protecting the public.
Crime analysis involves the systematic study of crime and disorder problems using qualitative and quantitative data. It examines sociodemographic, spatial, and temporal factors to assist police in apprehension, reduction, prevention, and evaluation. Crime analysis developed from early uses of pin maps and began professionalizing in the 1980s. It includes administrative, investigative, tactical, and strategic types. Ratcliffe's Hotspot Matrix examines crime concentrations spatially as dispersed, clustered, or a hotpoint and temporally as diffused, focused, or acute to determine appropriate police tactics. Strategic crime analysis uses tactical analysis to identify long-term community problems and generate innovative solutions in partnership with community policing.
The document is an interactive online lesson about the Fourth Amendment of the US Constitution. It covers key topics like probable cause, reasonable suspicion, examples of reasonable vs unreasonable searches. Users can navigate between pages on the main topics using blue hyperlinks. Short videos and a quiz are also included to help explain the concepts.
Modus operandi refers to a criminal's pattern of behavior or method of operation when committing crimes. It describes the specific actions and behaviors a criminal uses to successfully carry out offenses. A criminal's modus operandi can evolve over time as they discover which actions are most effective and refine their skills. While useful evidence for law enforcement, a criminal's modus operandi may change due to outside influences like substance abuse.
You've probably spent a lot of time learning how to write police reports. Why not take a look at what NOT to do when you write a report? This PowerPoint reviews basic principles officers need to think about when writing reports.
this is all about criminal justice system of the philippines that includes the pillars of law enforcement, prosecutions, courts, corrections and community.
Accordingly, it is a system of practices employed by organizations used by the government in maintaining social control, deterring and controlling crime and sanctioning those who violate laws with criminal penalties.
It is the mechanism that society uses to maintain standards of conduct necessary to protect individuals and itself.
The purpose of the CJS is to deliver justice for all by convicting and punishing the guilty and helping them to stop offending
while protecting the innocent.
It is responsible for detecting crime and bringing it to justice; and in the process rehabilitate and reform criminal offenders and make them useful citizens in our society.
This document discusses how police departments can use social media for community outreach, public information, and crime prevention and tracking. It recommends that police departments have a plan for two roles of social media: community outreach and relationship building, as well as monitoring for crime prevention. It also stresses the importance of creating both an external policy for how the public should engage on social media and an internal policy for how officers and staff should behave online.
The document discusses crime scene investigation procedures for first responders. It defines key terms related to crime scene investigation such as crime scene, first responder, evidence, and forensic evidence. It outlines the purpose of crime scene investigation as collecting physical evidence to identify suspects and link them to the crime. It also discusses protocols for jurisdictional investigation and maintaining an official police blotter. The document lists standard investigative tools and equipment and methods for recording investigative data like photographs, sketches, written notes, and fingerprint development.
Police patrol is an important activity for maintaining public safety and security. Officers perform various duties like enforcing traffic laws, responding to accidents and crimes, gathering information, and making decisions on how to resolve issues. Effective patrol requires skills like judgment, active listening, critical thinking and the ability to assess different situations. Police may patrol on foot, bicycle, motorcycle, car or other vehicles. Their goal is to prevent and respond to crimes while protecting the public.
Crime analysis involves the systematic study of crime and disorder problems using qualitative and quantitative data. It examines sociodemographic, spatial, and temporal factors to assist police in apprehension, reduction, prevention, and evaluation. Crime analysis developed from early uses of pin maps and began professionalizing in the 1980s. It includes administrative, investigative, tactical, and strategic types. Ratcliffe's Hotspot Matrix examines crime concentrations spatially as dispersed, clustered, or a hotpoint and temporally as diffused, focused, or acute to determine appropriate police tactics. Strategic crime analysis uses tactical analysis to identify long-term community problems and generate innovative solutions in partnership with community policing.
The document is an interactive online lesson about the Fourth Amendment of the US Constitution. It covers key topics like probable cause, reasonable suspicion, examples of reasonable vs unreasonable searches. Users can navigate between pages on the main topics using blue hyperlinks. Short videos and a quiz are also included to help explain the concepts.
Modus operandi refers to a criminal's pattern of behavior or method of operation when committing crimes. It describes the specific actions and behaviors a criminal uses to successfully carry out offenses. A criminal's modus operandi can evolve over time as they discover which actions are most effective and refine their skills. While useful evidence for law enforcement, a criminal's modus operandi may change due to outside influences like substance abuse.
You've probably spent a lot of time learning how to write police reports. Why not take a look at what NOT to do when you write a report? This PowerPoint reviews basic principles officers need to think about when writing reports.
this is all about criminal justice system of the philippines that includes the pillars of law enforcement, prosecutions, courts, corrections and community.
Accordingly, it is a system of practices employed by organizations used by the government in maintaining social control, deterring and controlling crime and sanctioning those who violate laws with criminal penalties.
It is the mechanism that society uses to maintain standards of conduct necessary to protect individuals and itself.
The purpose of the CJS is to deliver justice for all by convicting and punishing the guilty and helping them to stop offending
while protecting the innocent.
It is responsible for detecting crime and bringing it to justice; and in the process rehabilitate and reform criminal offenders and make them useful citizens in our society.
This document discusses how police departments can use social media for community outreach, public information, and crime prevention and tracking. It recommends that police departments have a plan for two roles of social media: community outreach and relationship building, as well as monitoring for crime prevention. It also stresses the importance of creating both an external policy for how the public should engage on social media and an internal policy for how officers and staff should behave online.
The document discusses crime scene investigation procedures for first responders. It defines key terms related to crime scene investigation such as crime scene, first responder, evidence, and forensic evidence. It outlines the purpose of crime scene investigation as collecting physical evidence to identify suspects and link them to the crime. It also discusses protocols for jurisdictional investigation and maintaining an official police blotter. The document lists standard investigative tools and equipment and methods for recording investigative data like photographs, sketches, written notes, and fingerprint development.
This document outlines standard operating procedures for Philippine police units. It discusses policies for maintaining police blotters, coordinating operations between units, use of force guidelines, arrest procedures, crime scene management, and search and seizure protocols. Police units must keep separate blotters for cases involving violence against women and children to protect privacy. Officers are instructed to use reasonable and proportional force, issue warnings before using force, and file reports after discharging firearms. When responding to calls, priorities are aiding the injured, apprehending criminals, and protecting crime scenes.
S.M.A.R.T. policing explores shifting traditional police systems to a model focused on being strict and sensitive, modern and mobile, alert and accountable, reliable and responsive, and tech-savvy and trained. Smart cities face security risks from physical, economic, cultural and emotional attacks on infrastructure and data. Risks include privacy violations, catastrophic failures, and impacts from locational data access. S.M.A.R.T. policing aims to address these challenges through sensitivity, partnership with society, public broadband networks, mobile technology, and coordination between departments.
The document outlines the key steps and concepts in criminal prosecution in India according to the Criminal Procedure Code and other relevant laws. It discusses classes of criminal courts, registration of FIRs, investigation and arrest procedures, production of the accused before courts, police reports and charge sheets, trial procedures for both warrant and summons cases, and concepts like bail, cognizance, and judgments. The document provides a comprehensive overview of the criminal prosecution process in India from the registration of an FIR through investigation, trial and final judgment.
The crime scene is where forensic investigations begin and physical evidence must be carefully collected and preserved. Upon arrival, the scene is documented through photography, sketches, and notes while being secured and searched systematically. Evidence is then packaged with detailed labeling to maintain the strict chain of custody, recording everyone who handles it to ensure its integrity if used in court.
This document contains 34 multiple choice questions about police organization and administration. It discusses topics like the different types of police organizational structures, principles of management, roles and ranks within the police force, and historical events related to the development of the Philippine National Police. The questions are intended to analyze test material for a police organization and administration exam. Short hashtags are included between some questions for additional context.
This document is the revised 2011 Criminal Investigation Manual published by the Philippine National Police (PNP). It contains introductory messages from the Secretary of the Department of Interior and Local Government, the Chief of PNP, and the Director of PNP Directorate for Investigation and Detective Management. The manual is copyrighted by PNP Directorate for Investigation and Detective Management. It provides guidelines and procedures for criminal investigations for PNP officers. It covers general investigation principles and procedures, specific crimes under the Revised Penal Code, and crimes committed by public officers. The manual aims to enhance the investigative capabilities of PNP officers.
Internship at office of regional police and dpo office sargodha final report ...hanzil fatima
1. The document summarizes the internship of Urwa Batool at the Office of the Superintendent of Police in Punjab Regional Police Office.
2. During the 6-week internship, Urwa learned about the different branches and operations of the police office, including criminal records, investigations, and community policing efforts.
3. As a criminology student, Urwa found the internship relevant to applying theories of crime prevention and analysis to the practical work of the police.
This 3-credit course teaches investigative report writing and presentation skills to police officers. The instructor is a police lieutenant who will provide guidance on documenting investigations and communicating findings effectively in a written report or oral presentation. Students will learn best practices for organizing information gathered from a crime scene or incident in a clear, concise manner for supervisors, prosecutors, and other officials.
These PowerPoint presentations are intended for use by crime prevention practitioners who bring their experience and expertise to each topic. The presentations are not intended for public use or by individuals with no training or expertise in crime prevention. Each presentation is intended to educate, increase awareness, and teach prevention strategies. Presenters must discern whether their audiences require a more basic or advanced level of information.
NCPC welcomes your input and would like your assistance in tracking the use of these topical presentations. Please email NCPC at trainings@ncpc.org with information about when and how the presentations were used. If you like, we will also place you in a database to receive updates of the PowerPoint presentations and additional training information. We encourage you to visit www.ncpc.org to find additional information on these topics. We also invite you to send in your own trainer notes, handouts, pictures, and anecdotes to share with others on www.ncpc.org.
This document discusses the four types of police reports that officers should be familiar with:
Type 1 reports involve the officer recording information but taking no action. Type 2 reports involve the officer recording information and taking action like an investigation or arrest. Type 3 reports involve the officer becoming part of the scenario, such as pursuing a suspect. Type 4 reports involve the officer initiating involvement after seeing or hearing something suspicious, and probable cause must be included. The document provides details on the requirements and characteristics of each type of report.
This document discusses audio and video forensic evidence analysis. It begins by explaining how audio and video recordings can provide eyewitness accounts of crimes. It then discusses different types of recordings, including analog and digital, as well as techniques for repairing, authenticating and enhancing recordings. The document outlines the process of audio and video analysis, including how the analysis is performed and what information is included in analysis reports. It discusses limitations and certification programs in the field.
This document provides an overview of criminal investigation and identification. It discusses the goals of criminal investigation as identifying, locating, and providing evidence of guilt of the offender. The primary job of an investigator is to determine what offense was committed by answering who, what, when, where, why, and how. Identification of criminals can occur through confession, eyewitness testimony, circumstantial evidence, associative evidence, or modus operandi. Gathering evidence and using tools like interviews, interrogation, and instrumentation are also discussed.
This document provides an overview of comparative police systems and globalization's effects on law enforcement. It discusses key concepts like transnational crime, terrorism, and weapons of mass destruction. It also summarizes several major police models from countries like Japan, Singapore, and Australia. Furthermore, it outlines United Nations conventions and organizations that promote international cooperation against transnational criminal threats.
The document outlines the probation and parole process in the Republic of the Philippines. It shows that after conviction and sentencing, those given probationable offenses are investigated by the Parole and Probation Administration (PPA) while those with non-probationable offenses go to prison. The PPA then supervises probationers and parolees. For parole, the Board of Pardons and Parole determines if an inmate receives parole or has their parole denied. Parolees are then supervised by the PPA and can have their parole revoked or continued based on compliance with conditions.
Police officers work to maintain law and order, protect the public, prevent and solve crimes using technology. The job requires honesty, integrity, ethics, respect for others, and teamwork. Police officer education includes bachelor's or master's degree programs in law enforcement or criminal justice fields. While the job offers health benefits, it also has disadvantages like long hours and danger, with rising crime rates adding more challenges. Opportunities exist for those interested in helping communities and enforcing the law through crime prevention, investigation, and prosecution. Police can work in various settings and received a salary increase announced by the president.
Breathalyzers: Friend or Foe?
breathalyzer is an electronic device designed to estimate blood alcohol concentration. Breathalyzers are usually used by police officers to grab hold of drunk drivers on the road. Breathalyzers can be installed in cars for citizens who constantly are intoxicated. We chose this topic because we strongly believe that breathalyzers should be installed into all vehicles, and that it would benefit everyone.
This document outlines the powers and functions of the Philippine National Police (PNP) according to Republic Act 6975. It states that the PNP has the powers to enforce laws and protect lives and property, maintain peace and order, investigate and prevent crimes, make arrests according to the constitution, detain arrested persons, issue licenses for firearms and explosives, supervise security agencies, and perform other duties as provided by law. It then provides a table of contents outlining the manual.
This document discusses media management in criminal investigations. It provides guidance on properly handling media during police work like investigations. It outlines policies on media relations and releasing information to the public. It emphasizes the importance of understanding the media and their role, as well as establishing proper protocols for sharing information, especially during crisis situations. The goal is to enhance cooperation between police and media while ensuring the integrity of investigations and protecting privacy.
Mobile forensics is a branch of digital forensics that recovers evidence from mobile phones. It is important because mobile phones are ubiquitous and can contain evidence of crimes. Mobile forensics follows steps including preservation of the device, acquisition of data, examination of data, analysis of findings, and reporting results. It is challenging due to various device types and conditions, but techniques like isolating devices and using forensic software can extract hidden or encrypted data for investigations.
The World Wide Web is the most popular part of the Internet by far. The Web allows rich and diverse communication by displaying text, graphics, animation, photos, sound and video. The Web physically consists of your personal computer, web browser software, a connection to an Internet Service Provider, computers called servers that host digital data, and routers and switches to direct the flow of information.
Search Results
WiMAX (Worldwide Interoperability for Microwave Access) is a wireless industry coalition dedicated to the advancement of IEEE 802.16 standards for broadband wireless access (BWA) networks.
This document outlines standard operating procedures for Philippine police units. It discusses policies for maintaining police blotters, coordinating operations between units, use of force guidelines, arrest procedures, crime scene management, and search and seizure protocols. Police units must keep separate blotters for cases involving violence against women and children to protect privacy. Officers are instructed to use reasonable and proportional force, issue warnings before using force, and file reports after discharging firearms. When responding to calls, priorities are aiding the injured, apprehending criminals, and protecting crime scenes.
S.M.A.R.T. policing explores shifting traditional police systems to a model focused on being strict and sensitive, modern and mobile, alert and accountable, reliable and responsive, and tech-savvy and trained. Smart cities face security risks from physical, economic, cultural and emotional attacks on infrastructure and data. Risks include privacy violations, catastrophic failures, and impacts from locational data access. S.M.A.R.T. policing aims to address these challenges through sensitivity, partnership with society, public broadband networks, mobile technology, and coordination between departments.
The document outlines the key steps and concepts in criminal prosecution in India according to the Criminal Procedure Code and other relevant laws. It discusses classes of criminal courts, registration of FIRs, investigation and arrest procedures, production of the accused before courts, police reports and charge sheets, trial procedures for both warrant and summons cases, and concepts like bail, cognizance, and judgments. The document provides a comprehensive overview of the criminal prosecution process in India from the registration of an FIR through investigation, trial and final judgment.
The crime scene is where forensic investigations begin and physical evidence must be carefully collected and preserved. Upon arrival, the scene is documented through photography, sketches, and notes while being secured and searched systematically. Evidence is then packaged with detailed labeling to maintain the strict chain of custody, recording everyone who handles it to ensure its integrity if used in court.
This document contains 34 multiple choice questions about police organization and administration. It discusses topics like the different types of police organizational structures, principles of management, roles and ranks within the police force, and historical events related to the development of the Philippine National Police. The questions are intended to analyze test material for a police organization and administration exam. Short hashtags are included between some questions for additional context.
This document is the revised 2011 Criminal Investigation Manual published by the Philippine National Police (PNP). It contains introductory messages from the Secretary of the Department of Interior and Local Government, the Chief of PNP, and the Director of PNP Directorate for Investigation and Detective Management. The manual is copyrighted by PNP Directorate for Investigation and Detective Management. It provides guidelines and procedures for criminal investigations for PNP officers. It covers general investigation principles and procedures, specific crimes under the Revised Penal Code, and crimes committed by public officers. The manual aims to enhance the investigative capabilities of PNP officers.
Internship at office of regional police and dpo office sargodha final report ...hanzil fatima
1. The document summarizes the internship of Urwa Batool at the Office of the Superintendent of Police in Punjab Regional Police Office.
2. During the 6-week internship, Urwa learned about the different branches and operations of the police office, including criminal records, investigations, and community policing efforts.
3. As a criminology student, Urwa found the internship relevant to applying theories of crime prevention and analysis to the practical work of the police.
This 3-credit course teaches investigative report writing and presentation skills to police officers. The instructor is a police lieutenant who will provide guidance on documenting investigations and communicating findings effectively in a written report or oral presentation. Students will learn best practices for organizing information gathered from a crime scene or incident in a clear, concise manner for supervisors, prosecutors, and other officials.
These PowerPoint presentations are intended for use by crime prevention practitioners who bring their experience and expertise to each topic. The presentations are not intended for public use or by individuals with no training or expertise in crime prevention. Each presentation is intended to educate, increase awareness, and teach prevention strategies. Presenters must discern whether their audiences require a more basic or advanced level of information.
NCPC welcomes your input and would like your assistance in tracking the use of these topical presentations. Please email NCPC at trainings@ncpc.org with information about when and how the presentations were used. If you like, we will also place you in a database to receive updates of the PowerPoint presentations and additional training information. We encourage you to visit www.ncpc.org to find additional information on these topics. We also invite you to send in your own trainer notes, handouts, pictures, and anecdotes to share with others on www.ncpc.org.
This document discusses the four types of police reports that officers should be familiar with:
Type 1 reports involve the officer recording information but taking no action. Type 2 reports involve the officer recording information and taking action like an investigation or arrest. Type 3 reports involve the officer becoming part of the scenario, such as pursuing a suspect. Type 4 reports involve the officer initiating involvement after seeing or hearing something suspicious, and probable cause must be included. The document provides details on the requirements and characteristics of each type of report.
This document discusses audio and video forensic evidence analysis. It begins by explaining how audio and video recordings can provide eyewitness accounts of crimes. It then discusses different types of recordings, including analog and digital, as well as techniques for repairing, authenticating and enhancing recordings. The document outlines the process of audio and video analysis, including how the analysis is performed and what information is included in analysis reports. It discusses limitations and certification programs in the field.
This document provides an overview of criminal investigation and identification. It discusses the goals of criminal investigation as identifying, locating, and providing evidence of guilt of the offender. The primary job of an investigator is to determine what offense was committed by answering who, what, when, where, why, and how. Identification of criminals can occur through confession, eyewitness testimony, circumstantial evidence, associative evidence, or modus operandi. Gathering evidence and using tools like interviews, interrogation, and instrumentation are also discussed.
This document provides an overview of comparative police systems and globalization's effects on law enforcement. It discusses key concepts like transnational crime, terrorism, and weapons of mass destruction. It also summarizes several major police models from countries like Japan, Singapore, and Australia. Furthermore, it outlines United Nations conventions and organizations that promote international cooperation against transnational criminal threats.
The document outlines the probation and parole process in the Republic of the Philippines. It shows that after conviction and sentencing, those given probationable offenses are investigated by the Parole and Probation Administration (PPA) while those with non-probationable offenses go to prison. The PPA then supervises probationers and parolees. For parole, the Board of Pardons and Parole determines if an inmate receives parole or has their parole denied. Parolees are then supervised by the PPA and can have their parole revoked or continued based on compliance with conditions.
Police officers work to maintain law and order, protect the public, prevent and solve crimes using technology. The job requires honesty, integrity, ethics, respect for others, and teamwork. Police officer education includes bachelor's or master's degree programs in law enforcement or criminal justice fields. While the job offers health benefits, it also has disadvantages like long hours and danger, with rising crime rates adding more challenges. Opportunities exist for those interested in helping communities and enforcing the law through crime prevention, investigation, and prosecution. Police can work in various settings and received a salary increase announced by the president.
Breathalyzers: Friend or Foe?
breathalyzer is an electronic device designed to estimate blood alcohol concentration. Breathalyzers are usually used by police officers to grab hold of drunk drivers on the road. Breathalyzers can be installed in cars for citizens who constantly are intoxicated. We chose this topic because we strongly believe that breathalyzers should be installed into all vehicles, and that it would benefit everyone.
This document outlines the powers and functions of the Philippine National Police (PNP) according to Republic Act 6975. It states that the PNP has the powers to enforce laws and protect lives and property, maintain peace and order, investigate and prevent crimes, make arrests according to the constitution, detain arrested persons, issue licenses for firearms and explosives, supervise security agencies, and perform other duties as provided by law. It then provides a table of contents outlining the manual.
This document discusses media management in criminal investigations. It provides guidance on properly handling media during police work like investigations. It outlines policies on media relations and releasing information to the public. It emphasizes the importance of understanding the media and their role, as well as establishing proper protocols for sharing information, especially during crisis situations. The goal is to enhance cooperation between police and media while ensuring the integrity of investigations and protecting privacy.
Mobile forensics is a branch of digital forensics that recovers evidence from mobile phones. It is important because mobile phones are ubiquitous and can contain evidence of crimes. Mobile forensics follows steps including preservation of the device, acquisition of data, examination of data, analysis of findings, and reporting results. It is challenging due to various device types and conditions, but techniques like isolating devices and using forensic software can extract hidden or encrypted data for investigations.
The World Wide Web is the most popular part of the Internet by far. The Web allows rich and diverse communication by displaying text, graphics, animation, photos, sound and video. The Web physically consists of your personal computer, web browser software, a connection to an Internet Service Provider, computers called servers that host digital data, and routers and switches to direct the flow of information.
Search Results
WiMAX (Worldwide Interoperability for Microwave Access) is a wireless industry coalition dedicated to the advancement of IEEE 802.16 standards for broadband wireless access (BWA) networks.
Global Warming is the increase of Earth's average surface temperature due to effect of greenhouse gases, such as carbon dioxide emissions from burning fossil fuels or from deforestation, which trap heat that would otherwise escape from Earth.
This document defines hacking and discusses its history and types. It began in the 1960s at MIT and was done by early computer programmers out of curiosity. There are three main types of hackers - black hat hackers violate security for gain/malice, white hats exploit weaknesses ethically, and grey hats fall in between. Reasons for hacking include fun, status, stealing information, or destroying enemy networks. The document outlines various hacking techniques like website, network, password and computer hacking. It provides tips for securing data and accounts as well as discussing advantages like recovering lost information and disadvantages like harming privacy and illegality.
This document presents an overview of a computerized criminal record management system that aims to digitize criminal records to reduce paperwork, ensure secure storage of data, and allow for powerful searching and report generation. It describes the system scope, analysis, design including entity relationship diagrams and screenshots, and proposes future enhancements such as an online interface and additional fields.
This document provides a summary of some of the world's most famous hackers and what happened to them. It discusses Jonathan James, a teenage hacker who hacked into NASA and other networks in the early 2000s and later committed suicide. It also discusses Kevin Mitnick, considered the most wanted computer criminal in US history in the 1990s, who served prison time and is now a computer security consultant. Finally, it discusses Albert Gonzalez, who stole over 170 million credit card and ATM numbers over 2 years and was sentenced to 20 years in prison.
Objecto de estudo da ciencias da informacaosteliomacuacua
O texto discute os desafios da Ciência da Informação em definir seu objeto de estudo, apontando para a complexidade das relações entre informação, comunicação e contextos sociais e culturais. A informação emerge em diversos domínios e não pode ser reduzida a sistemas formais, sendo necessário considerar também processos comunicacionais e cognitivos nos quais o valor informacional é construído socialmente.
La sociedad de la información se caracteriza por la capacidad de sus miembros para crear, obtener, distribuir, compartir y manipular información instantáneamente desde cualquier lugar. Esto trae consigo la globalización, nuevos sectores laborales, un ritmo de cambio acelerado y la necesidad de que las instituciones educativas se vuelvan más flexibles y adapten sus currículos y estructuras a las nuevas tecnologías.
El documento describe las características básicas de una base de datos. La información se organiza en documentos a los que se accede a través de formas y vistas previamente diseñadas. Ofrece ventajas como mayor coherencia, valor y normalización de la información, así como flexibilidad y productividad. Sin embargo, también presenta desventajas como la necesidad de personal especializado y los altos costos de implantación.
UNIP 4 Semestre - Provas
Fenomenos de Transportes, Complementos de Fisisca, Dinamica dos solidos, Estatistica Indutiva, Equaçoes Diferenciais, Engenharia de Meio Ambiente, Programação de Computadores
O prefeito de Simolândia deseja realizar uma pesquisa sobre a qualidade de ensino na cidade. Ele precisa extrair uma amostra de alunos do ensino fundamental, médio e superior para avaliar suas notas, com um erro máximo de 0,30 e confiança de 99,5%. Além disso, deve estimar o intervalo de confiança para a média e desvio padrão da amostra e calcular o intervalo de confiança da diferença entre as médias de Simolândia e Mimolândia.
O documento contém resumos de fotos de jornalismo feitos por alunos de escolas primárias de Rosário, na Argentina. As fotos mostram vários aspectos da vida local, incluindo esportes, política, sociedade, economia, meio ambiente e desastres naturais.
Edgar Jesús Herrera Herrera es el nombre de una persona. El documento proporciona el nombre completo de una persona, Edgar Jesús Herrera Herrera, en una sola oración sin más detalles.
Este documento estabelece a Lei de Imprensa em Portugal. Garante a liberdade de imprensa e limites como a privacidade e reputação dos cidadãos. Define publicações periódicas versus não periódicas e requisitos como identificação do proprietário. Rege direitos de resposta e publicidade. Estabelece responsabilidades civis e crimes relacionados à imprensa.
El software envía instrucciones al hardware para generar las operaciones de la máquina, permitiendo la interacción entre el software y el hardware que hace posible el funcionamiento del equipo.
Este documento presenta la autoevaluación de Gabriela Paola Chavira Fernández del Bloque I de la Escuela Normal Superior de Jalisco. La autoevaluación fue observada por José Gallegos.
O documento descreve as principais características dos quatro tipos de tecidos: epitelial, conjuntivo, muscular e nervoso. Inclui informações sobre as células, funções e estruturas de cada tecido.
El documento describe los conceptos fundamentales del diseño de investigación. Explica que el diseño de investigación es el plan que intenta responder preguntas de manera clara y no ambigua. Luego describe los tipos de investigación como cuantitativa, cualitativa, explicativa y descriptiva, así como conceptos como pertinencia, validez, confiabilidad, justificación, procesos cognitivos, problema e variable.
O documento discute conceitos-chave da ecologia, incluindo definições de população, comunidade, ecossistema e bioma. Também aborda fatores bióticos e abióticos, nicho e habitat, cadeia alimentar, fluxo de energia e tipos de interação trófica.
An FIR is a First Information Report filed with the police when they learn about a cognizable criminal offense. It initiates the criminal justice process by allowing the police to begin an investigation. Anyone who is aware of a cognizable crime can file an FIR, whether they are a victim or witness. The FIR must contain key details like the names of those involved, date/time/location of the incident. If the police refuse to register an FIR, one can file a complaint with higher-ranking police officials to compel the investigation.
The document summarizes the process for filing a First Information Report (FIR) under Section 154 of the Code of Criminal Procedure (CrPC). It outlines what information should be included in the FIR, such as the name and details of the complainant, description of the incident, accused, witnesses, evidence, and more. It also discusses the duties of the police in registering an FIR and investigating the case, as well as the role of the judiciary in accepting chargesheets and issuing summons.
The document summarizes the process for filing a First Information Report (FIR) under Section 154 of the Code of Criminal Procedure (CrPC). It outlines what details should be included in the FIR, such as the name and address of the complainant, details of the crime, description of the accused, witnesses, etc. It also discusses the duties of the police in registering the FIR and investigating the crime. The document uses an example case to illustrate how the police machinery can sometimes be misused in civil disputes.
Detailed Presentation on First Information Report (F.I.R)
Made By:
Edited By: Ayush Patria, Sangam University, Bhilwara
Follow us on Instagram: @law_laboratory
Website: www.lawlaboratory.in
The police blotter document provides information on properly recording incidents in a police blotter or log book. It discusses the legal basis and importance of maintaining an accurate police blotter. Key details that should be included in blotter entries are names of those involved, date, time, location, narrative of events, and signatures. A sample police blotter entry for a shooting incident is also provided, with specifics on who, what, when, where, how details.
This document summarizes a police report form and procedures for recording incidents in police blotters and reports. It discusses the legal basis and importance of police blotters, as well as the proper procedures, contents, and samples for completing entries in the blotter. Key details like names of involved individuals, date, time, location, and narrative of incidents should be recorded accurately and signed by responding officers.
This document summarizes a police report form and procedures for recording incidents in police blotters and reports. It discusses the legal basis and importance of police blotters, as well as the proper procedures, contents, and samples for completing entries in the blotter. Key details like names of individuals involved, date, time, location, and narrative of incidents should be recorded accurately and signed by responding officers.
This document provides lecture notes on report writing and presentation. It defines key terms like police report and report. It outlines the characteristics of an effective police report including being factual, accurate, clear, concise, complete and timely. It discusses the uses of police reports in areas like criminal identification, investigations, court preparation and statistical analysis. It also covers topics like field notes, note taking, conducting interviews and answering the questions of who, what, where, when, how and why in a report.
In the complex landscape of criminal law, the terms "FIR" (First Information Report) and "Chargesheet" play pivotal roles in initiating and progressing legal proceedings. An FIR is the foundational document filed with law enforcement agencies, serving as the initial step in reporting a crime. This comprehensive report outlines the details of the alleged offense, the complainant, and the accused. On the other hand, a Chargesheet, also known as a charge sheet or final report, is a comprehensive document prepared by the investigating authorities after conducting a thorough inquiry into the FIR. It includes evidence, witness statements, and legal analysis, serving as the basis for formal charges to be filed against the accused. Understanding the nuances of these crucial legal documents is essential for anyone involved in or affected by criminal proceedings, providing insight into the initiation, progression, and resolution of legal cases. Explore the intricacies of FIR and Chargesheet with our detailed guide, shedding light on their significance in the pursuit of justice.
An FIR (First Information Report) is a written document containing the earliest information about the commission of a cognizable offense. It must be filed with the police station in the jurisdiction where the offense took place. An FIR can be filed by the aggrieved person, an eyewitness, or anyone with hearsay information about the offense. It aims to set the criminal law into motion by providing essential details like what crime was committed, who committed it, where and when it took place, and any other relevant information or witnesses. If the police refuse to record an FIR, the complainant can escalate the matter to higher authorities or file a private complaint with the court.
An FIR is a written document prepared by the police upon receiving information about a cognizable crime. It is called a "First Information Report" because it contains the first information received by the police about a crime. An FIR can be filed by the victim of the crime or anyone else who has knowledge of the crime. It should include details like the names and descriptions of those involved, the date, time, and location of the incident. Recording an FIR immediately is important as it helps the police arrest offenders and collect evidence, and the earliest version is considered most reliable by courts.
Now get the Best private detectives and investigation services for best result in New York, Los Angeles, and the entire USA. For more information visit. www.wincor.com or drop an email to win@wincor.com
- The expert accountant drafted a preliminary report on his investigation into missing funds from a company. He received some minor suggested changes from the client which he incorporated. The accountant, client, and counsel then proceeded with filing a police report and insurance claim based on the preliminary report. The accountant continued gathering documentation from vendors and updated his report, which he then finalized.
Chapter 6 – Field Notes and ReportingField notes are t.docxrobertad6
Chapter 6 – Field Notes and Reporting
Field notes are the shorthand written record made by police officers from the time
they arrive at the scene until the assignment is completed. The following factors they arrive at the scene until the assignment is completed. The following factors
form the importance of field notes.
Field Notes are More Reliable Than an Officer’s Memory
It only takes a short period of time for some important details to slide away from
your memory and the only way to combat this potential loss of information is to rely
on field notes which you previously prepared.
Field Notes are the Primary Information Source for the Incident/Offense Report
Because the first-responding officer is usually the person who writes any incident
report which is required by the situation, field notes are important because they
represent the information which forms the content of the incident report.
Detailed Field Notes May Reduce the Need to Re-contact the Parties Involved
Once in a while, victims and witnesses get annoyed and even angry when they are
re-contacted by an officer who obviously did not take good field notes when he/she
talked to them earlier and therefore cannot complete the incident report without
additional information.
Field Notes Can be Used to Defend the Integrity of the Incident/Offense Report.
During courtroom testimony you may refer to field notes to refresh you recollection
of the events.
In terms of the incident report, the basic questions which the first-responding
officer to a crime scene needs to find answers for are the blank spaces on the officer to a crime scene needs to find answers for are the blank spaces on the
face of an incident report. Typically this includes information about who the
victims and witnesses are and how to contact them, the specifics associated
with the crime, and descriptions of the suspect.
There are also numerous other questions which must be asked called interrogatory
questions. These include: what, when where, who, how, and why. Although no
single set of questions can meet the needs for investigating all types of crime, there
are six primary questions which have long be recognized in the field for being very
useful.
While the exact layout for incident reports typically varies from one
jurisdiction to another, they all have a “face” with blanks into which the jurisdiction to another, they all have a “face” with blanks into which the
officer conducting the preliminary investigation enters basic case
information. These blanks require information about the type of crime
committed, the complainant, victim, witnesses, and offenders, and other
details. Additional investigative information is written in the blank space
available on the reverse of the face or on a page which may be referred to as
“continuation.”
For roughly a decade, there has been a voluntary program underway which is
moving police departments away from the basi.
The document summarizes Avinash's visit to the Police Station South Rohini in Delhi. It includes an acknowledgement, details of the 3-day visit in October 2011, and its purpose to understand police organization and functioning. The document describes the organizational structure of police from state level down to police station. It provides observations of the reception area, duty officer, investigation room, records room, police property storage, computer and wireless rooms, and lock-ups in the police station. It also explains case diary preparation and personal observations from the visit.
Crj 101 after having reviewed many traditional forms of white collarleonardjonh215
This document discusses identity theft and resources available to combat it. It reviews two articles on identity theft from a police chief's perspective and the FBI. It outlines the growth of identity theft and its impact. It then details resources available through the Federal Trade Commission (FTC) to assist law enforcement and victims, including an identity theft database, publications, and seminars to help investigations. Partnerships between law enforcement and the FTC are emphasized as critical to fighting identity theft.
Investigation and Crime Scene Preservation Seminar.pptxMichaelOnia
This document discusses investigation and crime scene preservation. It defines an investigation as a planned effort to uncover facts about a specific event or occurrence. It also outlines the differences between police and private investigations. The document details important procedures for preserving a crime scene, such as cordoning off the area and not touching anything. Evidence can be gathered through interrogation, surveillance, background checks, and scientific tools like fingerprinting and DNA analysis. Facts about who, what, when, where, why, and how must be documented at a crime scene.
The document discusses various types and classifications of police reports. It identifies 5 main classifications of reports: technical reports, problem determining reports, problem solution reports, fact finding reports, and performance reports. It also describes different categories of reports such as operational reports, internal business reports, and summary reports. Finally, it lists and provides examples of specific types of police reports such as spot reports, special reports, beat inspection reports, wanted person reports, arrest reports, crime reports, and situation reports.
Cybercrimes in cybersecurity Investigations.pptxadnis1
This document provides an overview of criminal investigation processes and techniques. It discusses the goals of criminal investigations, which include determining if a crime has been committed, identifying suspects, recovering stolen property, and building a case for prosecution. The document also outlines the roles of various stakeholders in cybercrime investigations, including law enforcement agencies, prosecutors, private sector organizations, and international cooperation between agencies. Several challenges of cybercrime investigations are described, such as anonymity of suspects, attribution of crimes, lack of harmonized laws, and technical challenges around digital evidence collection.
Similar to Crime Record Management System (CRMS) (20)
Corporate Governance : Scope and Legal Frameworkdevaki57
CORPORATE GOVERNANCE
MEANING
Corporate Governance refers to the way in which companies are governed and to what purpose. It identifies who has power and accountability, and who makes decisions. It is, in essence, a toolkit that enables management and the board to deal more effectively with the challenges of running a company.
Capital Punishment by Saif Javed (LLM)ppt.pptxOmGod1
This PowerPoint presentation, titled "Capital Punishment in India: Constitutionality and Rarest of Rare Principle," is a comprehensive exploration of the death penalty within the Indian criminal justice system. Authored by Saif Javed, an LL.M student specializing in Criminal Law and Criminology at Kazi Nazrul University, the presentation delves into the constitutional aspects and ethical debates surrounding capital punishment. It examines key legal provisions, significant case laws, and the specific categories of offenders excluded from the death penalty. The presentation also discusses recent recommendations by the Law Commission of India regarding the gradual abolishment of capital punishment, except for terrorism-related offenses. This detailed analysis aims to foster informed discussions on the future of the death penalty in India.
Business law for the students of undergraduate level. The presentation contains the summary of all the chapters under the syllabus of State University, Contract Act, Sale of Goods Act, Negotiable Instrument Act, Partnership Act, Limited Liability Act, Consumer Protection Act.
1. Criminal Record Management System
Introduction
Police provides safety to citizens. It always remains steady for arresting
any criminal who is a threat for the safety of society. After registering the
FIR from any citizen, police starts its work and on that basis it arrests the
criminals if proofs are found against them. Once the criminals are
arrested, police starts investigation from them. After getting all the proofs
against the criminal, it is the duty of the police to present all the proofs
honestly to the court so that the right man can get right punishment. The
true and right information provided by the people to police helps a lot in
arresting the criminals who try to spoil the peaceful environment of
society. Along with low salary scale, facilities of modern technology such
as computerized system of keeping records are not provided to police
department which causes low efficiency. As it is the age of computers
and all the organizations today use computers to maintain their records,
so this facility should also be given to police department in order to
increase their efficiency and to save their time. In our Project we are going
to implement a CRMS (Criminal Record Management System). This is a
database system in which police will keep the record of Criminals who
have been arrested, to be arrested or escaped. This will help the Police
department to manage their records easily. In police system when an
incident occurs, a Petitioner reports an FIR (First Information Report).
Police starts investigation according to law on this FIR. An investigation
Officer supervises the investigation process. The main concerning people
in the whole process are Petitioner (The person who files an FIR), Victim,
Accused/Criminal, investigation officer. CRMS will keep the record of following
entities:
These are the entities of CRMS
P e t i t i o n e r
V i c t i m
A c c u s e d
F I R
2. C a s e
Investigation Officer
Petitioner:
A person who is seeking legal help from police station or he has some problem or
complaints regarding the matters under the jurisdiction of police. Petitioner may or
maynot be the victim of offense.
Victim:
"Victim"
1. means anindividual who suffers,inrelationto anoffence.
FIR:
FirstInformationReport(FIR)isawritten documentprepared bythe police whenthey
receiveinformationfromthe Petitioneraboutthe commissionofacognizableoffence.
Accused:
"Accused"
means apersonwho is charged withanoffence orcrime.
Case:
Case
is the issue to be investigated bythe police and resolved bythe court
Investigation officer:
“Investigation officer”
is the police officer who investigates the case. There may be more than one
investigationofficers inone police station.
ATTRIBUTES OF ENTITIES
Petitioner:
Definition:
3. A person who is seeking legal help from police station or he has some problem or
complaints regarding the matters under the jurisdictionof police .Anyone who knows
aboutthe commissionofacognizable offence canfile anFIR.Itis notnecessarythat
only the victim of the crime should file an FIR.A police officer who comes to know
about a cognizable offence canfile an FIR Himself/herself. You can file an FIR if:
1.You are the person against whom the offence has been committed2.You
know yourself about an offence which has been committed3.You have
seen the offence being committed.
Attributes:
The Petitionerhas the following attributes
Name:
The fullname of Petitioner.
Father_name:
The fathername of Petitioner.
Address:
Address of Petitioner.
Contact:
Contactnumberof Petitioner.
NIC:
National identitycard numberof Petitioner
Identifier:
NIC+NAME:
Since NIC number is the only attribute of a Petitioner which is unique and no
Petitioner can file FIR without NIC due to which it can never be an unknown value
(null value) but it can be duplicate in fraudulent cases so we take NIC and NAME as
an identifier
Investigation officer:
Definition:
Every criminal case has an investigation officer who finds and examines the nature
of the case, witnesses and evidences to find the criminal.
4. Attributes:
The investigationofficerhas the following attributes
Name:
The fullname of the investigationofficer.
Officer ID:
Every police officer has got some ID so the code or ID of investigation
officeris anotherattribute.
Rank:
The rank of aninvestigationofficer.
Identifier:
Officer ID:
As everypolice officerhas aunique ID so we cantake officerID as an identifier.
Case:
Definition:
A file in which daily detail of a case are written down bythe investigating officer The
police may not investigate a complaint evenif youfile aFIR,when:(i)The case is not
serious in nature;(ii) The police feel that there is not enough ground to investigate.
However, the police must record the reasons fornotconducting aninvestigationand
in the latter case mustalso inform you.
Attributes:
Case ID:
Eachcase is assigned anID.
Section_of_law :
Through section of law we canfind alotaboutnature of the case E.g. the criminalact
and its sentence accordingly.
Case Status:
It’s another attribute of entity case, through which we can find whether the case is
closed oropen.
Case detail:
The detailof the case is writtenhere.
5. Identifier:
Case ID:
Sinceeachcasehas itsown unique identifierwhich isit’s IDsowe take caseID as an
identifier,whichcanneverbe anunknown value.
Accused:
Definition:
Accused is the personwho commits acrime.Itis the mostimportant entityinourDB
because our whole project is based upon this entity. So that’s why is also related to
mostof the entities.And also we are concerned withmostof its attributes to watchan
accused as easilyas possible.
Attributes:
Accused_ID:
It is assigned bythe police departmentwheneverapersoneitherguiltyornotsuffers
frompoliceinvestigationorin any sortofprocedures remains unique forthe whole life
Name:
Inthis attribute the name againstan accused id is entered.
Father_Name:
Inthis attribute the Father’s name againstan accused id is entered.
Alias:
Alias is the nick name sort of thing which is popular among the people and is very
important these days because one accused usually is not known as his real name
and has severalnicknames that’s why Alias is amultivalued attribute.
Address:
In this attribute the expected or permanent address of accused is saved. It is also
multivalued because one mayhave manyaddresses.
NIC:
If the NIC of accused is knownthenitis saved inthis attribute.
Gender:
Genderof accused.
Age:
The age of accused is entered inthis attribute.
Status:
6. The status of accused is entered like eitherhe is
Arrested, Escaped, Bailed or Released.
Contact:
It is composite attribute.Inthis attribute we listthe mobile numberor land line number
and emailaddress of the accused. Itis composed of following attributes
Phone:
The phone number of the accused. It is multivalued attribute because an
accused canhave more thanone contactnumbers.
Email:
The emailid of the accused.
Photo:
The picture identityof the accused.
Finger print:
The fingerprintof the accused stored for identificationpurpose.
Identifier:
Accused_ID:
Accused ID is the sole identifier for accused because all other attributed becomes
multivalued in case of dangerous criminals whose identity is not confirmed. Once
accused id is assigned to acriminalthenwe startfiling otheravailable attributes.
FIR:
Definition:
First Information Report (FIR)
is awritten documentprepared bythe police whentheyreceive informationaboutthe
commission of a cognizable offence. It is a report of information that reaches the
police first in point of time and that is why it is called the FirstInformationReport. Itis
generally a complaint lodged with the police by the victim of a cognizable offence or
by someone on his/her behalf. Anyone can report the commission of a cognizable
offence either orally or in writing to the police. Even a telephonic message can be
treated as anFIR.
Importance of FIR
7. An FIR is a very important document as it sets the process of criminal justice in
motion. It is only after the FIR is registered inthe police stationthat the police take up
investigationof the case.
Attributes:
FIR_ID:
Once FIR is longed againstanysortof complaintanID is assigned to it.
Date_lodged:
The date onwhichFIR is lodged.
Time_lodged:
The time of FIR being lodged.
Detail:
The detailof anFIR consists of following attributes.
Incident Place:
The place onwhichcomplained incidenttookplace.
Incident Date:
The date onwhichcomplained incidenttookplace.
Incident Time:
The time onwhichcomplained incidenttookplace.
Identifier:
FIR_ID:
FIRIDisidentifierofanFIRbecauseitis keptin recordofpolice departmentfiling that
specific FIR against a compliant. So a specific ID will always toward the unique
incident
Victim:
Victim is apersonis apersonwhichis affected byanysortof activity bythe accused.
He mightbe dead oralive due to the crime committed.
Attributes:
Name:
The name of the victim is entered inthis attribute.
Father_Name:
8. Fathername of accused person.
Address:
The address of the victim is entered inthis attribute. Contact:
The contactinformationof the accused is entered inthis attribute like phone# etc.
Identifier:
Name+Address:
Onename can existonmorethan oneaddress,butitis notpossiblethattwo persons
with same name have same address
RELATIONSHIPS BETWEENENTITIES
Petitioner and FIR
➢Petitionerfiles anFIR
➢There is one-to-many relationship betweenPetitionerand FIR because
➢One Petitionercanfile more thanone FIRs.
➢Butone FIR is filed byone and onlyone Petitioner.
➢Itis notpossible thatanFIR is lodged byunknownPetitioner.
➢Hence we conclude that cardinality ofPetitioner is mandatory one
➢AccordingtothedefinitionofPetitioneritis necessaryforapersontobeaPetitioner
that he/she mustfile atleastone FIR.
➢Hence the cardinality of FIR is mandatory-many
Accused and FIR
FIR is lodged orfiled againstaccused
➢One FIR canbe lodged againstmore thanone accused
➢One FIR canbe lodged againstunknownaccused orcriminal
➢Similarly there maybe more thanone FIRs againstone accused but one accused
will have at leastone FIR againsthim.
➢Inthis relationship cardinality of FIRis mandatory-one
➢and cardinality of accused is optional-many
FIR and Victim
FIR is filed byPetitionerforavictim who is suffered from offence.
➢ There canbe one ormanyvictims forone FIR.
9. ➢There is one and onlyone FIR foravictim.
➢Cardinality of FIR is mandatory one
➢Cardinality of victim is one-many
FIR and Case
FIR initiates a Case
➢Case is dependentonFIR.
➢When a Petitioner files an FIR, the Police analyze the report whether it is a valid
report and needs a case to be initiated or the issue would be solved without filing a
case.
➢The police maynotinvestigate acomplaintevenif youfile aFIR,when:
➢The case is notserious innature;
➢The police feelthatthere is notenoughground to investigate.
➢The police must record the reasons for not conducting an investigation and inthe
latter case mustalso inform you.
➢If the complaintis acrime according to Law,thenacase is initiated.
➢Eitherone orno case canbe initiated (filed)onone FIR.
➢Cardinality of FIR is mandatory one
➢Cardinality of case is optionalone
Investigation Officer and Case
Investigationofficerinvestigates the case
➢Investigationofficermustinvestigate atleastone case
➢Investigationofficermayinvestigate more thanone case atthe same time
➢A case is investigated byone and onlyofficer
➢Hence the cardinality ofinvestigation officer is mandatory-one
➢And cardinality ofcase is mandatory many
➢Cardinality of FIR is mandatory one
➢Cardinality of case is optionalone
Investigation Officer and Case
➢Investigationofficerinvestigates the case
➢Investigationofficermustinvestigate atleastone case
➢Investigationofficermayinvestigate more thanone case at the same time
10. ➢A case is investigated byone and onlyofficer
➢Hence the cardinality ofinvestigation officer is mandatory-one
➢And cardinality ofcase is mandatory many
ER-Model
(Entities and their relationships)
RELATIONAL MODEL
Investigation officer:
• Name and rank are attributes of entityinvestigationofficer
• Officer_ id is primarykey
Officer_id Name Rank
Case:
Case status , section of law ,case detail are the attributes and Case_ ID is
primarykey of entitycase
Since ithas one-to many relationship with FIR and Investigation officer that is
why FIR_ID and Officer_ id are added as foreignkeyattributes inthis relation
Petitioner:
•Father_name,Address and Contactare attributes and the NIC and Name is primary
keyof Petitioner
FIR:
Case_
ID
Case
status
section of
law
case detail FIR_ID Officer_ id
NIC Name Father_name Address Contact
11. • Date_ lodged, Time_ Lodged, Incident_ time, Incident_ place, Incident_ date is
attributes and FIR_ID is primarykeyof FIR.
• P_NIC and P _Name is foreign key since FIR has one to many relationship with
petitioner.
• Victim _Name and Victim _address is foreign key since FIR has one to many
relationship with Victim
Accused:
Name, Father_ Name, Status, Photo, Age, Email, Gender, and NIC is attributes and
Accused_IDisprimarykeyofaccused,whereas accusedAddress,accused Phone
and Accused Alias is multivalued attributes of accused.
FIR_ID is the foreignkeysince accused has aone-to–manyrelationship with FIR
Accused_ Address:
Accused_ Phone:
Accused_
Alias:
Accused:
Name Fathers
_name
Status Photo Ag
e
Gen
der
Email Finger_p
rint
N
I
C
Accused_ID FIR_I
D
P_NI
C
P
_Na
me
Date
_
lodg
ed
Time
_
Lodg
ed
Incide
nt_
time
Incide
nt_
place
Incident_d
ate
FIR_I
D
Victi
m
_Na
me
Victim
_addre
ss
Accused_ID Address Accused_ID Phone
Accused_
ID
Alias
12. Victim:
•Father_ Name ,contactisattributes ofVictimand Name ,Addressis theprimarykey
Name Address Father_name Contact
Investigation officer:
Case:
Petitioner:
Petitio
ner_NI
C
Petition
er_nam
e
Victu
m_na
me
Victum
_addres
s
Time
_lodg
e
Date
_lod
ge
Incide
nt_tim
e
Incide
nt_pla
ce
Incide
nt_dat
e
FI
R_I
D
NIC Name Father_name Address Contact
FIR:
Victim:
NORMALIZATION
First Normal Form
Officer_ID Name Rank
Case_ID Case_status Section_of_law Case_detail FIR_ID Officer_ID
Accused_ID Phone
Name Address Father_name Contact
13. All the tables inrelational model are in 1NF because they fulfill the definition
of relation.
i.e there are no multi-valued attributes
Second Normal Form Investigation Officer:
•Name and Rank canbe determined byofficer_id (primarykey)
•Officer_ID, Name ,Rank
•This implies thatthere is no partialfunctionaldependencyinthis relation.Hence
•The relation“Investigation_officer” is in2nd
NormalForm
Case
Case_ID,Case_status , Case_Description, Section_of_law
•No partial functionaldependency
•“Case” is in 2nd
NormalForm
NIC +Name, Name,Father_name,Address,Contact
•Only NIC cannot be determinant because fraud cases can cause duplicate NIC
values
•No Partial functionaldependency
•Relation“Petitioner” is in2nd
NormalForm
Victim:
•Father_name and contact can be determined exactlyif name and address bothare
known because name is not unique similarly address is also not unique but
name+address collectivelyis unique
•Hence there is no partialfunctionaldependency
FIR:
•FIR_ID, Date_lodged ,Time_lodged ,Incident_place,incident_date
•No Partial functionaldependency
•Relation “FIR” is in 2nd
NormalForm
Accused:
•Accused_ID, Name,father_name,status,gender,age,nic,email
•No Partial functionaldependency
14. Relation“Accused” is in2nd
NormalForm
Above three relations Accused_Address, Accused_Alias, Accused_Contact arein
2nd
normalform.
Third Normal Form
In the relation “Accused” NIC seems to be the possible determinant for the
Name , Address , Fathers_name , Gender and Age of the accused but the
problem is that it is an optional attribute that its value can be null(unknown)
because mostly accused NIC# is not known for several reasons. So there
is no transitive dependency here and our relation is in 3NF
All the other relations are in 3NF because there are no transitive
dependencies
IMPLEMENTATION
SQL Implementation:
Note: All the following queries are written for Oracle XE so this SQL script
mayneed some variations while running onsome other DBMS product
Petitioner_T:
CREATE TABLE Petitioner_T( NIC VARCHAR2(15) NOT NULL, Nam
VARCHAR2(50) NOT NULL,Father_name VARCHAR2(50), Address
VARCHAR2(100),Contact NUMBER(12,0),CONSTRAINT
Petitioner_PK PRIMARY KEY(NIC,Name));
•Primary key is composed of NIC and Name that is why NOT NULL constraint is
applied to these columns
FIR:
CREATE TABLE
FIR_T(F I R _ i d N U M B E R ( 5 , 0 ) N O T N U L L , In
cident_date DATE NOT NULL,Incident_time
TIMESTAMP,Incident_place VARCHAR2(30),Time_lodged TI
15. MESTAMP DEFAULT SYSDATE,Date_lodged DATE NOT NULL,Petiti
oner_id VARCHAR2(15),
V i c t i m _ N a m e V A R C H A R 2
( 5 0 ) , V i c t i m _ A d d r e s s V A R C H A
R 2 ( 1 0 0 ) , C a s e _ i d N U
M B E R ( 1 0 , 0 ) , P e t i t i
o n e r _ N a m e V A R C H A R 2 ( 5 0 ) , CONSTRAINT
FIR_PK PRIMARY KEY(FIR_id),CONSTRAINT FIR_FK1 FOREIGN
KEY(victim_name,victim_address)REFERENCES
Victim_T(name,address),CONSTRAINT FIR_FK2 FOREIGN
KEY(Petitioner_id,Petitioner_Name)REFERENCES
Petitioner_T(NIC,Name),CONSTRAINT FIR_FK3 FOREIGN
KEY(Case_ID) REFERENCESCase_T(Case_ID));
•The attribute Incident_timeis notspecified NOT NULL because mostly
exactincident_time maynotbe known
•Time_lodged Is givensystem date as defaultvalue
Victim:
CREATE TABLE Victim_T
( Name VARCHAR2(50) NOT NULL, A d d r e s s V A R C H A R 2 ( 1
0 0 ) N O T N U L L , Father_name VARCHAR2(50),Contact
NUMBER(12,0),CONSTRAINT Victim_PK PRIMARY
KEY(Name,Address),);
Accused:
CREATE TABLE
Accused_T( Accused_ID NUMBER(5,0) NOT NULL, Name
VARCHAR2(50),Father_name
VARCHAR2(50),Status VARCHAR2(8) CHECK(StatusIN('Arrested','
Escaped','Bailed','Released')), Age NUMBER(3,0) CHECK(Age<150
),Gender CHAR(1) CHECK(Gender IN('m','f')), NIC
VARCHAR2(15),E m a i l V A R C H A R 2
( 5 0 ) U N I Q U E , P h o
t o B L O B , F i n g e r _
P r i n t s B L O B , FIR_ID NUMBER(5,0),CONSTRAINT
Accused_PK PRIMARY KEY(Accused_ID),CONSTRAINT
16. Accused_FK FOREIGN KEY(FIR_ID )
REFERENCESFIR_T(FIR_ID));
•There are only four possible status values for an accused
'Arrested','Escaped','Bailed','Released' Hence this constraint is
implemented here.
•A constraint of less than 150 is also applied on the age column
•Gender will be stored as a character only ‘M’ for male and ‘F’ for female
Investigation Officer:
CREATE TABLE
Investigation_officer_T(Officer_id VARCHAR2(15) NOT N
ULL, Name VARCHAR2(50),Rank
VARCHAR2(5),CONSTRAINT Investigation_officer_PK
PRIMARY KEY(Officer_id));
Case:
CREATE TABLE
Case_T(Case_id NUMBER(10,0) NOT NULL,Case_status C
HAR(1) CHECK(Case_status IN('c','o')),C a s e _ D e
t a i l L O N G , Section_of_law
VARCHAR2(6),FIR_ID NUMBER(5,0),Officer_id
VARCHAR2(15),CONSTRAINT Case_PK PRIMARY
KEY(Case_id),CONSTRAINT Case_FK1 FOREIGN
KEY(Fir_id)REFERENCES FIR_T(FIR_id),CONSTRAINT Case_FK2
FOREIGN KEY(Officer_id) REFERENCES
Investigation_officer_T(Officer_id));
•There are two possible values for
case_status
i.e. either a case is open or close so only a single character is stored for case
status ‘c’forclosedand‘o’foropenFollowingthree tablesare created formulti-valued
attributes of accused.
Accused Address:
17. CREATE TABLE
Accused_address_T( Accused_ID NUMBER(5,0) NOT NULL, A d d
r e s s V A R C H A R 2 ( 1 0 0 ) N O T N U L L , CONSTRAINT
Accused_address_PK PRIMARY
KEY(Accused_ID,Address),CONSTRAINT Accused_address_FK
FOREIGN KEY(Accused_ID)REFERENCES
Accused_T(Accused_id));
Accused Alias:
CREATE TABLE
Accused_alias_T( Accused_ID NUMBER(5,0) NOT NULL, Alias VAR
CHAR2(50) NOT NULL,CONSTRAINT Accused_alias_PK PRIMARY
KEY(Accused_ID,Alias),CONSTRAINT Accused_alias_FK FOREIGN
KEY(Accused_ID) REFERENCES Accused_T(Accused_ID));
Accused Contact:
CREATE TABLE
Accused_Contact_T( Accused_ID NUMBER(5,0) NOT NULL,P h o n
e _ N o N U M B E R ( 1 2 , 0 ) N O T N U L L , CONSTRAINT
Accused_Contact_PK
PRIMARYKEY(Accused_ID,Phone_No),CONSTRAINT
Accused_Contact_FK FOREIGN KEY(Accused_ID)REFERENCES
Accused_T(Accused_ID));