PowerPoint Presentation

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

Xlii. DESIGN AND DEVELOPMENT OF MOBILE APPLICATION FOR ACCESSING CRIME RISK FOR INVESTIGATION OFFICER (IO).

Scene 2 (21s)

BACKGROUND OF THE STUDY. NO MORE CRIMES PLEASE!. Crime can be defined as an activity that is against the laws of a nation. However, the meaning of the term ‘crime’ itself varies across countries depending on the respective laws of the nations. The Royal Malaysian Police (RMP) uses the term “index crime” as a measure of the general crime situation in the country..

Scene 3 (55s)

BACKGROUND OF THE STUDY. In Malaysia, Investigation Officer (IO) from the Royal Malaysian Police (RMP) play the significant role in the criminal justice system and they are with the Crime Investigation Department (CID). In response to the investigation, they need to make an accurate decision to the crime cases that will affect to the prosecution procedure in criminal justice framework. They also have a huge responsibility and commitment to make ethical, legal, and informed decisions that protect the public's confidence in their ability to maintain law and order in our communities..

Scene 4 (1m 30s)

BACKGROUND OF THE STUDY. With the advancement of the technology, computers can assist to suggest a variety of decision support solution that can be utilized by the Investigation Officers to support their determination, judgement and courses of action..

Scene 5 (1m 44s)

PROBLEM STATEMENT. The expert opinion or judgement is important to assist IO in decision-making process to ensure an efficient and effective organization. Unfortunately, experts may not always be present when needed. Therefore, the importance of a computerized system to assist IO during the response to criminal cases is required.

Scene 6 (2m 34s)

OBJECTIVES. To identify a Risk Appetite and Crime Risk Matrix in RMP ;.

Scene 7 (3m 10s)

Example of Risk Appetite.

Scene 8 (3m 16s)

Example of Risk Matrix. Severi Likelihood Probabili 5 4 3 2 1 Personnel Fatality Major Injury Multiple casualty hospitalized Outpatient treatment Basic first Slight inj ury Asset Massive loss (50k above) Major loss (20K- 49K) Moderate loss (5K-19K) Minor loss (1000K- 4900K) Sight loss (less than 1000K) Rare 5 4 3 2 1 Unlikely 10 8 6 4 2 Possible 15 12 9 6 3 Likely 20 16 12 8 4 Almost Certain 25 20 15 10 5.

Scene 9 (3m 27s)

OBJECTIVES. To create the framework of Integrated Crime Risk Assessment System (ICRAS) ; A system flow process or system framework. The framework will show how it is going to move from start to end.

Scene 10 (3m 41s)

OBJECTIVES. To create ICRAS for IO to use It is a computerized systems for IO to use. With this kind of systems its hope that ICRAS can assist IO to make a variety of well-informed judgements that can be utilized to support their determinations, judgments, and courses of action..

Scene 11 (3m 58s)

SCOPE AND LIMITATION OF THE STUDY. The scope of this research will include all relevant studies and a description of the limitations of risk factors and predictive models. It will be centered on crime index as the aim is to design and develop a database for an Integrated Crime Risk Assessment System for Investigation Officer. Data collection is based on the violent and property crime confirmed cases that reported in Shah Alam District, from 2010-2021. This research will exclude unconfirmed cases, fake reporting call, missed information and improper recording technique to avoid low accuracy to the system. The limitation of this study includes the availability of the case report at the Shah Alam District Police Headquarters. The availability is based on the document itself because some documents might be incomplete due to improper documentation and filing system. The constraints of this research include cost, security, transportation charges required during the data collection process. The priority in developing this mobile application system is focused on the operating environment of a laptop. This project requires to understand the software development kit (SDK) to create application for ICRAS..

Scene 12 (4m 43s)

SIGNIFICANCE OF THE STUDY. ICRAS will be developed. This system has not yet developed in RMP but it is needed..

Scene 13 (5m 13s)

LITERATURE REVIEW. Advances in information technology have changed the basis of technological innovation and organizational performance. In law enforcement entity especially in policing agency, have begun to focus on innovative knowledge management technologies to aid in the analysis of criminal information and knowledge. Information technology has certainly enhanced the capacity of the police to collect, retrieved, and analyzed information. Most of the ways of investigation in each policing organization are the same as the difference in the criminal justice system according to the jurisdiction of their respective entities. There is the literature review on the variety of approaches use in computerized crime systems in policing as shown in table 1.0 ;.

Scene 14 (5m 43s)

LITERATURE REVIEW. Table 1.0. Comparative study on the computerized crime analysis systems.

Scene 15 (5m 52s)

LITERATURE REVIEW. Table 2.0. Research on the related works.

Scene 16 (6m 25s)

LITERATURE REVIEW. Title, Author, Year The prediction and control of organized crime: A risk assessment instrument for targeting law enforcement efforts, Albanese, Jay S, 2001 Method 1. Improvements to data collection 2. utilizing a team approach to gather information identifring 3. common elements in organized crime incidents 4. understanding the parameters of a risk assessment ins tmment connecting 5. organized crime risk assessment to the implementation of law and policy Outcome organized crime activity can be better anticipated, investigated, and prevented. Connecting isolated incidents to organized crime through better information from offenders, victims, and police is possible with teams of investigators, researchers, analysts. and Advantage 1. victims can provide information about the nature and circumstances of which crunes, can then be used to anticipate and prevent future incidents. 2. Infonnation gathered by researchers can be used by law enforcement for both strategic and tactical analysis of organized Disadvantage 1. could easily find a criminal not guilty while finding an innocent individual guilty for a crime they didn't do. 2. it provides in correlation of false prosecution 3. Going through an entire case to find someone Innocent at the end can cost a good amount crrme jurisdiction. a 3. police actions can be informed by re ar analysis of trends, criminals, and crime groups in a particular.

Scene 17 (7m 3s)

LITERATURE REVIEW.

Scene 18 (7m 9s)

LITERATURE REVIEW. Title, Author, Year Decision Support System for Risk Assessment and Management Strategies in Distributed Software Development Method risk identification, whose purpose is to identify possible tlu•eats which can occur during the development process and analysis of identified risks by Outcome develop an automated decision support system to aid practitioners assessing risks and deciding on suitable control strategies determining likelihood occurrence the of and Advantage Analysis 1. results can be used to produce a rank ordering of identified risks. 2.Provide risk control sub processes consist of risk management planning, risk resolution, and risk monitoring. provides 3. several approaches for risk assessment and discusses useful guidelines for controlling the risk. Disadvantage I. provided generic framework without considering contextual factors of companies 2. these rules and guidelines are either implicit or spread across different publication. probability impact..

Scene 19 (7m 33s)

LITERATURE REVIEW.

Scene 20 (7m 40s)

RESEARCH METHODOLOGY. Material - Understanding risk assessment and establishing the RMP risk assessment index necessitates a systematic approach to analyzing or assessing documents, both printed and electronic. These materials were then evaluated using tool validity, which refers to the degree to which a study tool is genuinely assessing what it is supposed to measure in terms of academic accomplishment. The content validity and face validity approaches were used to develop a risk assessment index, and this study acknowledges the use of both validity methods to measure the success in acquiring evidence and data. Because document analysis necessitates the examination and interpretation of data in order to rekindle meaning, obtain understanding, and develop observational knowledge, the content validity approach will be employed. Content validity method will be used because document analysis requires the data to be examined and interpreted in order to kindle the meaning, gain understanding, and develop observational knowledge. Content validity is defined as validation of research tool based on credible resources . Face validity is the less rigorous method because the only process involved is reviewing the measure and making the determination of content validity is based on the face of the measure. Logical validity is a more methodical way of assessing the content validity of a measure..

Scene 21 (8m 29s)

Implementation Compliance Test ICRAS 1 DEVELOPMENT Structuring Problem Conceptua Izauon of knowled e System Development Database Design.

Scene 22 (8m 37s)

RESEARCH METHODOLOGY.

Scene 23 (8m 46s)

RESEARCH METHODOLOGY. Table 3.0. IDMS Design Process.

Scene 24 (9m 15s)

DATA COLLECTION / ANALYSIS. Retrieving existing documents and data Collecting data from individual or group Observation -Reports, Official statistic, Program monitoring data , Programmed records -Interview: key informant, individual, group, focus group discussion, - Questionnaire or survey: email, web, face to face, mobile data Structured or non structured Recorded through notes, photo or video.

Scene 25 (9m 32s)

RESEARCH PUBLICATION. NO PAPER STATUS 1. Analysis on drone's RCS for different perspective using LTE frequency Checked by SV 2. Readability and reliability of Risk Appetite Index Questionnaire Checked by SV.

Scene 26 (9m 44s)

GANTT CHART.