|
The
functionality of the police crime investigation system is
focused on providing value to the police personnel, especially
the officers operating at the cutting edge and easing the day to
day operations of the police function.
Crime Profile
Crime profile (low, medium and high) is proportional to the
police office tasks involved to get the case closed. Crime
investigation system accepts the profile and gets the task flow
for the officer. Crime profile will act as a main menu for
police to operate.
Registration
Citizens can register their complaints with police and then
based on the evidence, facts and following investigation, police
shall take the complaint forward. The Registration module acts
as an interface between the police and citizens and it eases the
approach, interaction and information exchange between police
and complainants.
Investigation
After a complaint is initiated, police initiates the
investigation process. The investigation module of the system
facilitates the investigation process and introduces operational
efficiencies by automating most of the tasks that take place
after initial entries are made during Registration.
Search
The Search module of the crime investigation system gives police
personnel the ability to execute a basic or advanced search on
cases. Using the search functionality, police personnel can
search for a particular person, type of crime, modus operandi,
property, vehicle information etc. It also gives the user the
ability to customize the results view by criminal/accused or by
cases. It makes reporting easy for police by enabling them to
execute different types of queries such as monthly reporting
also.
Citizen Interface
The Citizen Interface module of the crime investigation system
acts as a conduit for the information exchange between citizens
and police units/personnel. Citizens can use it as a tool to get
information or acknowledgements from police. The police in turn
can use it to respond to citizens with very little turnaround
time. It improves overall productivity by helping citizens and
police to cut short the drudgery of large amounts of paperwork.
Navigation
The Navigation module of the crime investigation system provides
role based landing pages which help in navigating through the
application. It shows information such as cases assigned,
alerts, pending tasks, cases status etc hence helping police
personnel to plan better and execute with greater efficiency
Based on the split up modules explained above, the following
functional requirement can be drafted for crime investigation
system.
1) The system should support multilingual interface.
2) The system should be designed in manner that operational data
is not lost in case of any failure of equipment or communication
network.
3) The system should work even in an offline mode with the
critical functionality
4) The system should be designed to have satisfactory
performance within the Police networks connected even on
low-bandwidth
5) The system should be implemented using Service Oriented
Architecture (SOA) and have a modular design
6) The system should be developed on Open Standards
7) The system should be built on a common User Access and
Authentication Service to ensure Single-Sign on for the end-user
8) The system should be developed for a centralized deployment
and maintenance
9) The system should be developed to be deployed in a 3-tier
datacenter architecture
10) The system should be designed to have a n-tier architecture
with the presentation logic separated from the business logic
that is again separated from the data-access logic
11) The system should be extensible to provide access to the
interfaces through PDA’s and mobile data terminals
12) The system should adopt standardized formats and common
metadata elements
13) The system should be designed for access through
browser-based systems and must impose minimal requirements on
the client device
14) The system must support multiple types of communication
services for remote access
15) The system should have capability to support public access
to a subset of data and functionality
16) The system should support multi-tier authentication where
required
17) The system should support SSL encrypted connections
18) The system should support secure virtual private network
connections
19) The system should use HTTPS as the communication protocol,
i.e., HTTP over an encrypted secure socket layer (SSL)
20) The system should run on multiple browsers
21) The system should support selective encryption of the stored
data
22) The system should ensure secure transmission of data over
the network and utilize SSL and 2-way digital signatures

|
|