Industries

 
   

 

 
     
 
 
 

Functional Requirements

 
 

The functionality of the police crime investigation system is focused on providing value to the police personnel, especially the officers operating at the cutting edge and easing the day to day operations of the police function.

Crime Profile
Crime profile (low, medium and high) is proportional to the police office tasks involved to get the case closed. Crime investigation system accepts the profile and gets the task flow for the officer. Crime profile will act as a main menu for police to operate.

Registration
Citizens can register their complaints with police and then based on the evidence, facts and following investigation, police shall take the complaint forward. The Registration module acts as an interface between the police and citizens and it eases the approach, interaction and information exchange between police and complainants.

Investigation
After a complaint is initiated, police initiates the investigation process. The investigation module of the system facilitates the investigation process and introduces operational efficiencies by automating most of the tasks that take place after initial entries are made during Registration.

Search
The Search module of the crime investigation system gives police personnel the ability to execute a basic or advanced search on cases. Using the search functionality, police personnel can search for a particular person, type of crime, modus operandi, property, vehicle information etc. It also gives the user the ability to customize the results view by criminal/accused or by cases. It makes reporting easy for police by enabling them to execute different types of queries such as monthly reporting also.

Citizen Interface
The Citizen Interface module of the crime investigation system acts as a conduit for the information exchange between citizens and police units/personnel. Citizens can use it as a tool to get information or acknowledgements from police. The police in turn can use it to respond to citizens with very little turnaround time. It improves overall productivity by helping citizens and police to cut short the drudgery of large amounts of paperwork.

Navigation
The Navigation module of the crime investigation system provides role based landing pages which help in navigating through the application. It shows information such as cases assigned, alerts, pending tasks, cases status etc hence helping police personnel to plan better and execute with greater efficiency

Based on the split up modules explained above, the following functional requirement can be drafted for crime investigation system.

1) The system should support multilingual interface.
2) The system should be designed in manner that operational data is not lost in case of any failure of equipment or communication network.
3) The system should work even in an offline mode with the critical functionality
4) The system should be designed to have satisfactory performance within the Police networks connected even on low-bandwidth
5) The system should be implemented using Service Oriented Architecture (SOA) and have a modular design
6) The system should be developed on Open Standards
7) The system should be built on a common User Access and Authentication Service to ensure Single-Sign on for the end-user
8) The system should be developed for a centralized deployment and maintenance
9) The system should be developed to be deployed in a 3-tier datacenter architecture
10) The system should be designed to have a n-tier architecture with the presentation logic separated from the business logic that is again separated from the data-access logic
11) The system should be extensible to provide access to the interfaces through PDA’s and mobile data terminals
12) The system should adopt standardized formats and common metadata elements
13) The system should be designed for access through browser-based systems and must impose minimal requirements on the client device
14) The system must support multiple types of communication services for remote access
15) The system should have capability to support public access to a subset of data and functionality
16) The system should support multi-tier authentication where required
17) The system should support SSL encrypted connections
18) The system should support secure virtual private network connections
19) The system should use HTTPS as the communication protocol, i.e., HTTP over an encrypted secure socket layer (SSL)
20) The system should run on multiple browsers
21) The system should support selective encryption of the stored data
22) The system should ensure secure transmission of data over the network and utilize SSL and 2-way digital signatures