PNP-Benito Soliven Crime-Mapping

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 27

PNP VISUALIZING CRIME DATA IN BENITO SOLIVEN ISABELA:

DEVELOPING AN INTERACTIVE CRIME MAPPING ANDROID


APPLICATION

A Capstone Project Presented to the Faculty of the


College of Computing Studies, Information and
Communication Technology
Isabela State University
Cauayan Campus

In Partial Fulfillment of the Requirements for the Degree


Bachelor of Science in Information Technology

Espiloy, Mary Joy B.

Gonatise, Rosalinda V.

Lucillo, Victorino II. C.


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

December 2023

Bachelor of Science in Information Technology ii


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

CHAPTER I
INTRODUCTION

Project Context

It's interesting to note that the origins of the field of criminology itself can be linked

to the early attempts at crime mapping.

The evolution of crime mapping has heralded a new era in spatial criminology, and a re-

emergence of the importance of place as one of the cornerstones essential to an

understanding of crime and criminality. While early criminological inquiry in France and

Britain had a spatial component, much of mainstream criminology for the last century has

labored to explain criminality from a dispositional perspective, trying to explain why a

particular offender or group has a propensity to commit crime. This traditional perspective

resulted in criminologists focusing on individuals or on communities where the community

extended from the neighborhood to larger aggregations (Weisburd et al. 2004). Even when

the results lacked ambiguity, the findings often lacked policy relevance. However, crime

mapping has revived interest and reshaped many criminologists appreciation for the

importance of local geography as a determinant of crime that may be as important as

criminal motivation. Between the individual and large urban areas (such as cities and

regions) lies a spatial scale where crime varies considerably and does so at a frame of

reference that is often amenable to localized crime prevention techniques. For example,

without the opportunity afforded by enabling environmental weaknesses, such as poorly lit

streets, lack of protective surveillance, or obvious victims (such as overtly wealthy tourists

or unsecured vehicles), many offenders would not be as encouraged to commit crime. (J.

Ratcliffe,2009)

Bachelor of Science in Information Technology 3


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

According to Jon Simmons, Clarissa Legg, and Rachel Hosking(2003). Statistics have become

increasingly important to all areas of public policy. They both serve to highlight and describe the

nature of social problems and also to monitor and inform the policies and practices designed to

remedy them. Yet, in many complex areas of public policy, the practice of recording, collating

and producing statistics has evolved over time. The field of crime statistics has been no

exception. There has been considerable debate over recent years as to the relative merits and

shortcomings of recorded crime statistics in England and Wales, and several attempts have been

made to reform the process of collecting and presenting them to provide greater reliability and

accuracy.

This study will be implemented in Philippine National Police, Benito Soliven Chapter.

The current system lacks the ability to represent geographic information accurately.

Mapping crime incidents and visualizing them on a map is challenging or not possible with the

current system alone. Geographical coordinates and spatial relationships may need to be manually

entered or calculated, which can be error-prone and time-consuming.

It also may not be suitable for handling large datasets or complex data structures. As the

volume of data increases, the performance of the current system can decline, leading to slower

processing times, increased file size, and potential system crashes.

The agency may benefit from a more efficient system, which would make their work

more productive. In order to create the Crime Mapping System, an Android application that will

be published to the Play Store, we will collaborate with the PNP Benito Soliven, Isabela chapter.

For these four paragraphs, do not forget to have a transition words which will connect

each paragraph. This will make your Project Context more understandable to the reader, as if you

are just making a story.

Bachelor of Science in Information Technology 4


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

Objectives of the Project

The objective of this study is to make the storing and retrieval of data more efficient

and make the system interactive, to help the agency visualize and analyze crime data.

Specifically, it aims to;

1. Determine the problems encountered in the present (manual system).

2. Evaluate the PNP Visualizing Crime Data in Benito Soliven Isabela: Developing an

Interactive crime Mapping Android Application, in terms of:

2.1. Performance

2.2. Information

2.3. Security; and

2.4. Efficiency

Scope and Limitations

The specific scope and features of the application will be determine based on the

requirements and priorities of the Philippine National Police Benito Soliven, and the available

resources. For the initial development of the system, we will include registration, for the security

of the information that was gathered. The application can provide a map-based interface to

display crime percentages, allowing users to see the location within Benito Soliven. For the

administrator, the application can include a feature that will allow them to create users, for the

security of the syste,.

Bachelor of Science in Information Technology 5


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

A reliable internet connection and a strong network foundation is necessary for the

system to operate properly. The system's performance may be impaired in places with low

network coverage or limited connectivity, which could interfere with the ability to transcribe and

retrieve criminal incidence data in real-time. The application will only be available for Android.

Bachelor of Science in Information Technology 6


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

CHAPTER II
REVIEW OF RELATED LITERATURE AND STUDIES

Review of Related Literature and Studies

Crime is significantly concentrated in small areas, or "hot spots," where it accounts for

half of all criminal activities. Researchers contend that if police officers concentrated their efforts

on these outlaw locations, many crime issues could be reduced more effectively.

Anthony A. Braga, Brandon Turchan, Andrew V. Papachristos, and David M.

Hureau(2019), stated that in recent years, crime scholars and practitioners have pointed to the

potential benefits of focusing crime prevention efforts on crime places. A number of studies

suggest that there is significant clustering of crime in small places, or “hot spots,” that generate

half of all criminal events. Researchers have argued that many crime problems can be reduced

more efficiently if police officers focused their attention to these deviant places. The appeal of

focusing limited resources on a small number of high-activity crime places is straightforward. If

crime can be prevented at these hot spots, then citywide crime totals could be reduced.

Compiling statistics documenting within their crime jurisdiction was inspired by the

professionalization of policing back in the 19 th-20th century. And it brought one of the primary

grounds for the establishment of the Federal Bureau of Investigation was to specifically document

the scope of crime in the United States through the Uniform Crime Reporting program.

According to the Criminal Justice, Accompanying these early efforts in crime mapping

were developments in the profession of policing that provided additional opportunities for crime

mapping. In the late 19th and early 20th centuries, the professionalization movement in policing

encouraged police organizations to compile statistics documenting the extent of crime in their

jurisdictions. In fact, one of the main justifications for the creation of Federal Bureau of

Bachelor of Science in Information Technology 7


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

Investigation was for the explicit purpose of documenting the extent of crime in the United States

through the Uniform Crime Reporting program (Mosher, Miethe, & Phillips, 2002). During this

time, many agencies began compiling crime statistics and conducting analyses of crime data.

Crime mapping was primarily done using pin maps, which were very time-consuming and

provided only a basic visualization of crime patterns. The late 1960s and early 1970s were critical

for the development of crime mapping. In 1966, the Harvard Lab for Computer Graphics and

Spatial Analysis developed SYMAP (Synagraphic Mapping System), one of the first widely

distributed computerized mapping software programs. The Environmental Science and Research

Institute was founded in 1969 and in the subsequent decades emerged as one of the top

distributors of GIS software, including the current ArcView and ArcGIS software packages. Also

around this time, the U.S. Census Bureau began the ambitious GBF-DIME (Geographic Base

Files and Dual Independent Map Encoding) project, which was used to create digitized street

maps for all cities in the United States during the 1970 census (Mark, Chrisman, Frank,

McHaffie, & Pickles, 1997). These advances were necessary for the development of GIS

programs used in crime mapping.

However, the emergence of GIS software has provided new context for the field of crime

mapping. GIS gave advantages like computers have dramatically reduced the time and effort

required to produce crime maps. Given the relatively low cost and user-friendliness of many of

these software programs, it no longer requires a substantial investment for agencies that wish to

engage in crime mapping. These GIS programs reduce the amount of error associated with

assigning geographic coordinates to crime events. Virtual maps are much more flexible than

physical maps, allowing researchers and crime analysts to compare the geographic distribution of

crimes against other characteristics of the area under investigation (e.g., census bureau

information, city planning and zoning maps, and maps produced by other agencies). Finally, GIS

Bachelor of Science in Information Technology 8


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

and other spatial analysis software provide powerful statistical tools for analyzing and detecting

patterns of criminal activity that cannot be detected through simple visual inspection.

The Criminal Justice also stated that the use of GIS programs for mapping has been the

most important advance in the field of crime mapping. There are several important advantages in

using virtual maps instead of physical maps. First, computers have dramatically reduced the time

and effort required to produce crime maps. Given the relatively low cost and user-friendliness of

many of these software programs, it no longer requires a substantial investment for agencies that

wish to engage in crime mapping. Second, these GIS programs reduce the amount of error

associated with assigning geographic coordinates to crime events. Third, virtual maps are much

more flexible than physical maps, allowing researchers and crime analysts to compare the

geographic distribution of crimes against other characteristics of the area under investigation

(e.g., census bureau information, city planning and zoning maps, and maps produced by other

agencies). Finally, GIS and other spatial analysis software provide powerful statistical tools for

analyzing and detecting patterns of criminal activity that cannot be detected through simple visual

inspection. In the mid-1970s and early 1980s, a crisis of confidence in traditional police practices

emerged following the results of studies, such as the Kansas City Preventative Patrol experiment,

that suggested that the police were not effective in combating crime (Weisburd & Lum, 2005).

Goldstein’s (1979) problem-oriented policing emerged as a response to this crisis and emphasized

that policing should involve identifying emerging crime and disorder problems and working to

address the underlying causes of these problems. Academic interests in the field of criminology

also began to shift during this time. While many criminologists were concerned with causes of

crime that were outside the sphere of influence of police agencies (e.g., economic depravation,

differential association, and social bonds), a number of researchers, such as Jeffery (1971),

Newman (1972), and Cohen and Felson (1979), began discussing factors that contribute to the

Bachelor of Science in Information Technology 9


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

occurrence of crime that were more amenable to intervention. The combination of the shift in

theoretical focus in criminology and the shift in the philosophy of policing yielded new

opportunities for crime mapping and initiated a resurgence of research on both the geography of

crime as well as crime prevention strategies involving crime mapping. Although the first

instances of computerized crime mapping occurred in the mid-1960s in St. Louis, Missouri, the

adoption of computerized crime mapping across the United States remained relatively slow.

Although a number of agencies, in particular in larger jurisdictions, became early adopters of

computerized crime mapping technology, the large period of growth in computerized crime

mapping did not begin until the late 1980s and early 1990s (Weisburd & Lum, 2005). The rate of

adoption of crime mapping among departments greatly increased as desktop computers became

cheaper and more powerful and GIS software became easier to use and more powerful. The

Compstat program, which started in 1994 in New York City, emphasized crime mapping as a

central component to strategic police planning and helped popularize crime mapping among

police agencies. With assistance from the Office of Community Oriented Police Services and the

National Institute of Justice, a large number of departments adopted computerized crime mapping

practices. By 1997, approximately 35% of departments with more than 100 officers reported

using crime mapping (Weisburd & Lum, 2005).

Bachelor of Science in Information Technology 10


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

Concept of the Study

Figure 1. Input Process Output (IPO Model)

Provide a conceptual framework in the form of a single diagram which should show all

the aspects of the study. In dealing with diagrams, do not define the purpose of that diagram or

its advantage of using it but discuss below each figure the complete details and focus on the

content. So that, your readers could easily understand what is all about your study

Concept of Study must not be focused on using the traditional IPO diagram composing of

three boxes. As our activity before, make use of other framework or diagram. And, follow the

format for the figure title, which is in bold style, times new roman font type, and size 10.

Bachelor of Science in Information Technology 11


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

Bachelor of Science in Information Technology 12


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

CHAPTER III
DESIGN AND METHODOLOGY

Requirement Analysis

Data Flow Diagram

Figure 2. Data Flow Diagram of Existing Procedure

The system can perform the following basic operations:


 Add new crime record – insert a new crime record from reporter into the database.
 Search particular crime record – use some information about the crime report such as
report number, name of the accused, and etc to retrieve back previous crime record.
 View crime report – after successfully search the crime record, police officer can view
the detail of the particular report.
 Print report – after viewed the report, the police officer can print the report as the hard
copy if necessary.

Bachelor of Science in Information Technology 13


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

Fishbone Diagram

Figure 3. Sample Fishbone diagram of existing procedure

Timeline of the Project

Bachelor of Science in Information Technology 14


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

Gantt Chart
Activities May June July August September October November December
Title Defense

Proposal
Defense

System
Development

Alpha Testing

Beta Testing

System
Defense

Implementatio
n

Documentation

Final Defense

Manuscript
editing

Finalization of
Manuscript

Submission of
Hardbound

Figure 4. Gantt chart of the Capstone Project

Explain the different activities that you have conducted to achieve and finish your
capstone project. Again, do not define nor discuss the importance of gantt chart in your
manuscript.

Requirements Documentation

Bachelor of Science in Information Technology 15


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

Technical Background

Materials

1.1.1 Software

1. Android Studio: The official integrated development environment (IDE) for creating Android

apps is called Android Studio. It offers a complete set of tools, including a performance analyzer,

emulator, debugger, and code editor. Building Android apps is the sole focus of Android Studio,

which is built on JetBrains' IntelliJ IDEA.

2. PHP: The main programming language used to create Android apps is PHP. It is a versatile
scripting language designed primarily for web development. Programmer Rasmus Lerdorf, a
Canadian-Dane, originally designed it in 1993, and it was made available in 1995. The PHP
Group is now responsible for producing the PHP reference implementation.

2.1. Java: Java has long been the preferred language for Android app development and is

officially supported by Google.

3. Android SDK: A collection of resources, frameworks, and programming tools called the

Android Software Programming Kit (SDK) are made available by Google. It has necessary parts

that let programmers build Android applications, such as APIs, documentation, examples of code,

and emulator pictures.

Hardware

Describe the hardware that you used and least specification of computers where you will
install the system. //**

Device name: DESKTOP-B0TED06

Processor: AMD Ryzen 7 5700X 8-Core Processor 3.40 GHz

Installed RAM:12.0 GB

Device ID: 57669D4E-C823-4E18-8B73-5B49D1A8F395

Product ID: 00331-10000-00001-AA256

Bachelor of Science in Information Technology 16


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

System type: 64-bit operating system, x64-based processor

Pen and touch: No pen or touch input is available for this display

BIOS or Basic Input / Output System

1.1.2 Data

The data that will be provided by the Philippine National Police will be:

- Crime and incidents information

- Blotter report information

Use case Diagram

Bachelor of Science in Information Technology 17


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

Functional decomposition diagram


System flowchart

Bachelor of Science in Information Technology 18


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

Bachelor of Science in Information Technology 19


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

Entity relationship diagram

Bachelor of Science in Information Technology 20


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

Design of Software/ Systems


Software Development Methodology

Development and Testing


Data Gathering Procedure

We will use review of existing records as our procedure for this project.

Data Analysis Plan

For tables, use the following format:

Table 1. From "References" > Insert Caption >Caption Label>Table

Remember:

Bachelor of Science in Information Technology 21


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

 Indent the Table label to start of table

 Only the table number is capitalized., the label is not

 The List of Tables should be automatically generated

 The Chapter number is included in the table number

Table 1. To determine the perception of the customer in problem and challenges


encountered in the traditional method of food ordering.
Scale Weight Mean Interpretation
5 4.20 - 5.0 Very Much a Problem
4 3.40 - 4.19 Much a Problem
3 2.60 – 3.39 A Problem
2 1.80 – 2.59 Less a Problem
1 1.00 – 1.79 Least a Problem

***Note: the table title should not be like this. Instead, as a suggestion, follow this:

Table 1. Equivalent Weight Mean and Interpretation of Scale on the Problems and
Challenges Encountered by the Respondents in Traditional Method of Food Ordering

A. For finding the percentage of the samples in the presentation, analysis, and

interpretation of data, the researchers used this formula:

Where:
% = percentage
f = frequency
n = number of respondents

Bachelor of Science in Information Technology 22


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

B. For finding the weighted mean in the presentation, analysis and interpretation
of data, the researcher used this formula.

Where:

WM= Weighted Mean

F= frequency

N= Number of Respondents

Bachelor of Science in Information Technology 23


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

Bachelor of Science in Information Technology 24


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

Different Software Testing

Description of the Prototype

System Architecture

Implementation Plan

Table #. Sample Implementation Plan number 1

STRATEGY ACTIVITIES PERSON’S DURATION


INVOLVED

Approval from the Letter for the Researchers 1 Day


admin of HR Office administrator Administrator
in Isabela State
University Cauayan
Campus

System’s Installation of the Researchers 2 Hours


Installation system and required Administrator
software and
hardware

Information Questionnaires Faculty/Staff 1 Day


Distribution Administrator

STRATEGY ACTIVITIES PERSON’S DURATION


INVOLVED

Approval from the Letter for the Researchers 1 Day


admin of HR Office administrator Administrator
in Isabela State
University Cauayan
Campus

Bachelor of Science in Information Technology 25


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

System’s Installation of the Researchers 2 Hours


Installation system and required Administrator
software and
hardware

Information Questionnaires Faculty/Staff 1 Day


Distribution Administrator

Implementation Results

Bachelor of Science in Information Technology 26


ISABELA STATE UNIVERSITY
Cauayan City, Isabela
COLLEGE OF COMPUTING STUDIES, INFORMATION AND COMMUNICATION TECHNOLOGY

Bachelor of Science in Information Technology 27

You might also like