+ All Categories
Home > Documents > DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

Date post: 27-Dec-2021
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
52
DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS’ INFORMATION MANAGEMENT SYSTEM CASE STUDY: UGANDA PRISON SERVICES KAUGA PRISON, MUKONO DISTRICT BY: NAMBWERE AGNES BIT/30172/102/DU PROJECT REPORT SUBMITTED TO THE COLLEGE OF APPLIED SCIENCE AND TECHNOLOGY IN PARTIAL FULFILMENT AS A REQUIREMENT FOR THE AWARD OF A BACHELORS DEGREE IN INFORMATION TECHNOLOGY AT KAMPALA INTERNATIONAL UNIVERSITY (KIU) DATE: JUNE 2013
Transcript
Page 1: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS’

INFORMATION MANAGEMENT SYSTEM

CASE STUDY: UGANDA PRISON SERVICES

KAUGA PRISON, MUKONO DISTRICT

BY: NAMBWERE AGNES

BIT/30172/102/DU

PROJECT REPORT SUBMITTED TO THE COLLEGE OF APPLIED

SCIENCE AND TECHNOLOGY IN PARTIAL FULFILMENT AS A

REQUIREMENT FOR THE AWARD OF A BACHELORS DEGREE

IN INFORMATION TECHNOLOGY AT

KAMPALA INTERNATIONAL UNIVERSITY

(KIU)

DATE: JUNE 2013

Page 2: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

DECLARATION

I Nambwere Agnes declare that to the best of my knowledge, this project report

is my own work and has never been submitted to any other institution for any

academic award.

Signature ~.ii.......Date..&.~4l~R!~’

Page 3: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

APPROVAL

This research report has been submitted with the approval of the following

Supervisors;

Supervisor: Mr. Ochen Moses

sign...~4~

Page 4: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

DEDICATION

This work is dedicated to Mr. John Ndungutse (Assistant Inspector General of

Police) who encouraged me to continue pursuing my studies.

III

Page 5: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

Abstract

Electronic information management system is a key success factor in all

organisations hence it is a vital necessity in planning and controlling the business

operations. The systematic, efficient and organised information management

system provides comprehensive information for organisations to guarantee

unbiased decisions.

Therefore the re-design and implementation of a computerised system for the

Uganda Prison Service is meant to improve services in the institution and

increase on their productivity.

This project study further evaluates the skills and competence gained by the

database designer in designing, implementing and managing databases.

iv

Page 6: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

Acknowledgement

I greatly appreciate all lecturers of Kampala International University who

devoted their time to equip me with the valuable education.

My thanks go to my fellow course mates most especially Sylvia Mwenesi and

Kodet Ronald who rendered their time to discuss and explain to me issues to

ensure that I clearly understand and don’t lag behind.

I thank the management of Kauga Prison Station who accepted my request and

availed to me all necessary information that was needed for me to achieve my

goals during my project.

V

Page 7: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

TABLE OF ABBREVIATION

UPS . Uganda Prison Service

KAR Kings African Riffle

UPF Uganda Police Force

HE His Excellency

JLOS Justice Law and Order Sector

OC Officer In-charge

ASP Assistant Superintendent of Prison

EDMS Electronic Database Management System

IT Information Technology

ICTs Information and Communication Technologies

HTML Hyper Text Mark up Language

GIU Graphical User Interface

PHP Hyper Text Preprocessor

PK Primary Key

RAM Random Access Memory

vi

Page 8: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

TABLE OF CONTENTDECLARATION .iAPPROVAL iiDEDICATION iiiABSTRACT ivACKNOWLEDGEMENT vTABLE OF ABBRIVIATION viTABLE OF CONTENT vii

CHAPTER!: BACKGROUND 11.0 Introduction 11.1 Background 11.2 Problem Statement 31.3 Objectives of the Study 41.4 Scope of the Study 51.5 Significance of the Study 51.6 Justification 6

CHAPTER II: LITERATURE REVIEW 72.0 Introduction 72.1 Information Technology 72.2 Electronic Information Management System 82.3 Databases 10

CHAPTER III: METHODOLOGY 123.0 Introduction 123.1 Research Design 123.2 Research Instruments 12

3.2.1 Observation 123.2.2 Questionnaire 133.2.3 Interview 133.2.2 Literature Review 13

3.3 Design Methods and Tools 133.3.1 System Modeling 143.3.2 System Development Tools 14

CHAPTER IV: SYSTEMS ANALYSIS AND DESIGN 154.0 Introduction 154.1 System Study 15

vii

Page 9: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

4.2 Problems of the Existing System .164.3 Design Features of the New System 164.4 System Design 17

4.4.1 System Architecture 174.4.2 Entity Relational Diagram 194.4.3 Integral Process 214.4.4 Data Flow Diagrams 21

4.5 Requirements 244.5.1 Data Requirement 244.5.2 Data Dictionary 25

4.5.3 Functional and Non-Functional Requirements 27

4.5.4 System Requirement Specification 28

CHAPTER V: SYSTEMS IMPLEMENTATION AND TESTING 305.0 Introduction 305.1 Data Security and Accessibility 30

5.1.1 Data Security 30

5.1.2 Data Accessibility 32

5.2 Testing and Validation 335.3 TrainingUsers 365.4 System Maintenance 36

CHAPTER VI: RECOMMENDATIONS AND CONCLUSION 376.0 Introduction 376.1 Problems Faced of the Case Study 376.2 Recommendations 37

6.2.1 Achievements 37

6.2.2 Hardware and Software Requirements 38

6.2.3 Configuration 38

6.3 Conclusion 38References 39Appendices 41

VIII

Page 10: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

CHAPTER I

INTRODUCTION

1.0 Introduction

This report is objectively giving an over view into the data recording management

system of the prisoners and prison officers within the Uganda Prisons Service

(UPS). The report will basically encompass on the scope at Kauga Prison, Mukono

Municipal Council in Mukono district.

1.1 Background of the study

The Uganda Prison Service was founded in 1896, as a branch of the Kings African

Rifle (KAR) and established in 1903 as an independent department. The

department was run by the Uganda Police Force (UPF) and the training was done

by soldiers of KAR.

In 1907, DEPOT Prison Training School was established at Luzira but, still run by

the soldiers of the KAR as instructors. On the 26th April 1950, the school was

officially opened by His Excellency (HE) Sir, John Harthon, then Governor and

Commander in Chief of the Armed Forces. In 1917 an independent Prison

department was established from the Protectorate Police but still the prison and

police remained under joint command until 1938.

The mission for the UPS is “to provide safe, secure, and humane custody of

offenders while placing human rights at the centre of their correctional

programs”.

The UPS is mandated under the Constitution of the Republic of Uganda 1995 and

the Prison Act 2006 to provide safe custody and rehabilitate the offenders. The

UPS is one of thirteen institutions which have been brought together under the

1

Page 11: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

Justice Law and Order Sector (JLOS) wide approach to enhance planning and

budgeting capacity in order to improve access to justice. The JLOS has outlined its

mission as to “enable all people in Uganda to live in a safe and just society”.

The laws for the organization, administration and functions of the UPS are

regulated by the Parliament of Uganda to ensure that the members of UPS are

recruited from every district of Uganda. The laws provide that the UPS shall be

nationalistic, patriotic, professional, disciplined, competent and productive; and

its members shall be citizens of the Republic of Uganda of good character

recruited from every district of Uganda.

The Prison Act stipulates that every prison officer shall have all the powers,

protection and privileges of a police officer; within the prison, while in charge of

prisoners and for the purpose of conveying any person to or from prison

premises. The Act provides that a prison officer shall apprehend any prisoner

who may have escaped from the prison or while being conveyed to or from

prison.

The UPS like other organizations has many prison stations, which accommodate

prisoners on being remanded, sentenced or confinement for any other reasons.

The prisoners may be removed from any prison to another, when sentenced or on

temporal basis due to other reasons. Therefore, prison officers are subjected to

take control of any prisoner in their custody until otherwise released. For that

reason, the UPS is supposed to keep efficient and up-to date records of the

prisoners under their custody to enable them keep track of proper details for

each prisoner.

2

Page 12: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

Efficient records management is now a necessity in all institutions for

complimentary with legal and regulatory obligations. It supports the core

functions and provides the basis for effective and accountable administration. The

system ensures sound decisions; necessary trace, scrutiny and justification of the

rationale for those decisions are made based on accurate and up-to-date

information. Therefore, the prison management is mandated to keep perfect

records/details of prisoners such that they are able to track the identity, number

of prisoners in custody, offences committed, and their status. The UPS is supposed

to keep records of their officers stationed in any prison to track the number of

prison staff under their command and their full details.

It is noted that during the establishment of the UPS, the population was very low

hence, leading to low crime rate. The prison stations could receive smaller

number of prisoners therefore; they were able to maintain manual records

effectively. The population growth in late 1980s led to a high crime rate resulting

into a dramatic increase of manual managed volumes of records kept for a longer

period of time, thus insufficient to rely on individual personal memory about the

past initiative procedures.

1.2 Problem Statement

According to the OC ICauga Prison, Ms. Tamale Mary (ASP), it was observed that

Kauga Prison management faces a problem of tracking prison staff details under

their command and the prisoners in custody. It becomes tedious to trace for a

particular prisoner’s identification profile, since they are accommodated in

different wards and yet some remand prisoners have to appear in different courts

of law at given dates.

3

Page 13: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

The space to keep manual managed volumes of records about the prisoners’

details is no longer enough due to the first set up of the prison that was based on

the low population density when the crime rate was low hence; leading to a

smaller number of prisoners committed to prison as compared to the current

situation.

Therefore, it is very important to change from the manual to automated

information system in order to improve the working environment of prison staff

under Kauga Prison and enable them increase on their productivity.

1.3 Objectives of the Study

1.3.1 General Objective

Design a new system to improve the performance and productivity of the prison

work at Kauga Prison.

1.3.2 Specific Objectives

Study and understand the current information system to identify its weaknesses

and strength and use them as a basis to design an efficient new information

system.

Implement the new system and ease the administration from a task of tracing for

alternatives to keep manual managed volumes of records.

Test, evaluate and maintain the new system to appreciate the improvement in

using electronic information system at Kauga Prison.

4

Page 14: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

1.4 Scope of the Study

This research project specifically concentrated on the information management

process of prison staff and prisoners at Kauga Prison. It is intended to analyze the

problems faced in the information management and recommend possible

solutions to improve the operations of the station and organization as a whole.

The sample size however, focused on the records management staff,

administrators and the prison officers involved in the process.

1.4.1 Geographical Scope

The research was conducted at Kauga Prison, Mukono municipal council in

Mukono district, 19Km away from Kampala city centre on Kampala - Jinja

Highway.

1.4.2 Logical Scope

The software product will be capable to address the following;

i. Monitor all activities conducted within the scheme.

ii. Capture all particulars of the prison staff and prisoners’ details in relation

to the offences against which they are charged.

iii. Capture and keep the previous records of all the second offender prisoners

in custody.

iv. Update records such as adding, modifying and deleting when need arises.

1.5 Significance of the Study

The study will help the management of Kauga Prison solve the problems affecting

efficient information management hence; Kauga Prison will improve their

operations, increase on their productivity and minimize time taken to trace for

particular information when needed.

5

Page 15: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

1.6 Justification

This study is intended to relieve the prison staff of Kauga Prison from hectic and

tedious work performed during their day to day duties especially when the

tracking and tracing for particular information when needed. Therefore, the study

will enable the management of Kauga Prison to minimize time taken to perform

particular transactions, then enable them utilize the available resources and

maximize their performance standards.

The study will further enable the management to keep track of all previous and

current details of the prisoners in custody such that they are capable to identify

those who have ever been previously committed to that prison. The management

will further be relieved of tracing for alternatives to keep manual managed

volumes of records.

6

Page 16: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

CHAPTER II

LITERATURE REVIEW

2.0 Introduction

This chapter provides critical literature review that addresses the intended

design of prison Electronic Database Management System (EDMS), and explores

the current scenario of paper-based information management system at Kauga

Prison. In this chapter, different books, journals and Internet were used to explain

the importance and benefits of the electronic information management system.

It is a business need to manage electronic documents and solve various problems

associated with them such as finding the current document and version control.

The need for electronic information management system must be clear to satisfy

any solution to those problems.

2.1 Information Technology

Association for Computing Machinery (2013): The adaption of information

technology (IT) in organizations is growing at a rapid pace. The use of technology

has evolved from the automation of structured processes to systems that are truly

revolutionary because they introduce change in the fundamental business

procedures. Indeed, it is believed that “More than being helped by computers,

companies will live by them, shaping strategies and structures to fit new

information.

Wan Satirah Wan Mohd Saman & Abrar Haider (2012): The explosion of

sophisticated information and communication technologies (ICTs) creates new

opportunities as well as challenges for the whole service delivery systems;

particularly to fulfil the ever increasing demand of citizens who have high level of

information technology (IT) literacy and advanced in knowledge and awareness

7

Page 17: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

of their rights. To remain competitive, government information systems must

progress in line with IT advancement without compromising the existing strict

government principles and regulations set through acts and policies.

The revelation of systems that capture various information, serve as important

institutional memory and central to efficient public service machinery. The

management of court records through electronic means leads to a great impact on

the government and citizens as a whole. It preserves the memory of a nation’s

civilization in judicial matters. The tremendous increase of case disposal rate

after the electronic system implementation proves a great improvement and

excellent achievement in judicial service delivery.

Sabina Klanecek (2012) stressed that the Ministry of Justice and Public

Administration in Slovenia explained how technology was used to deal with

vulnerable groups, in particular children, during court proceedings. In her

opinion, the introduced video conferencing ensured avoidance of second or even

third victimization of children.

2.2 Electronic Information Management System

Hassan 2007: The efficiency of service delivery sets the benchmark for public

service excellence. Effective information management system guarantees the

accountability and integrity of an organisation that provides services to the public

at large and serves as strategic resource for government administration.

Gouanou & Marsh (2004) recommended that, in order to minimize the risks and

costs of regulatory and legal non-compliance, litigation, discovery, business

inefficiency and failure; organizations need to remove the human element by

automating information management via technology.

S

Page 18: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

This transformation means removing freedom of choice, enforcing electronic

record creation, indexation, classification and naming conventions; creation and

preservation of meta-data, minimizing duplicate records by creating a central

information repository which will also facilitate knowledge and content

management, systematically archiving and tracking records and amendments;

applying retention schedules to purge redundant ones, but preserving their

access logs, audit trails and meta-data. The major issues in implementing

electronic information in organizations are regarding access, security and

interoperability.

Nathan Mnjama and Justus Wamukoya (2006) urged that use of electronic

communications increases citizen participation in the public decision-making

process. The use of information technology improves the management of

government, from streamlining business processes to maintaining electronic

information, and improving the flow and integration of information.

Daniel ES. Kawai & Dogo H. Samson (2011) proposed that, in order for police

stations which lack electronic information management systems to aid their data

capturing ability to effectively control crime; should have electronic databases

where the reported crimes with all details can be recorded and stored regularly

other than the paper based records that hinder their efficiency. This information

management system can enable the police to draw accurate analytical statistics

regarding the information about reported cases.

Laudon & Laudon (2004) defined information system as an assortment of

components which are mainly used for collection, processing, storing and

dispensing information in order to back up the important processes of decision

making and commanding or controlling the organization.

9

Page 19: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

Checkland & Hoiwell (1999) urged that information systems help managers to

analyze business capabilities and levels of individuals in the workforce of

problems, visualize complicated subjects and developing new ventures and

projects.

Kotler (2006) stated that information management system comprises of

manpower, instruments, and processes to accumulate, classify, examine, assess,

and then dispensed to the decision makers within an organization in a timely and

accurate manner.

2.3 Databases

Margaret Rouse (2006) defined computer databases as structured collection of

records or data that is stored in a computer system. The structure is archived by

organizing data according to database relational models. The computer database

relies upon software called database management system (DBMS) to organize

data storage. Database management system relies on the database model which

tends to determine the query language that is available to access the database.

A typical data structure of database is made up of linked tables in form of rows

and columns used to store organized information in an organization. A database

is an electronic filing systems or a collection of information organized in such way

that a computer program can quickly select desired pieces of data. Traditionally

databases are organized by fields, records and files. A field is a single piece of

information, a record is one complete set of field and a file is a collection of

records.

10

Page 20: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

Why use electronic databases

Databases are the major sources of information therefore, increasingly being

published only in electronic formats. A single database may refer to a variety of

sources, including periodical articles, books, government documents, and

industry reports, papers at meetings, newspaper items, film and video recordings.

Uribe -Luis Martinez & Meriel Patrick (August 2011) argued that databases

can form a key part of information management strategy to support researchers

and facilitate data management throughout the research lifecycle.

An ever increasing corpus of heterogeneous digital materials such as documents,

pictures, spreadsheets can be efficiently managed by use of databases.

Customized methods of inputting data for different contexts, allow diverse bodies

of information to be captured. However, databases can be complex and the

technical skills required to develop and maintain them represent a barrier to the

researchers.

11

Page 21: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

CHAPTER III

METHODOLOGY

3.0 Introduction

This chapter basically describes the methods used to collect the requirements for

the database system that included; data collection, data analysis, design tools and

database development. The methods highlight the current state of the existing

system which was based on to identify the requirements for the new system in

order to improve the operations at Kauga Prison.

3.1 Research Design

The cross sectional research design was used to assist in gathering information

from the management, prison staff and the officers concerned with information

management.

3.2 Research Instruments

The information gathering involved different techniques with help of the sample

population group of employees. These collection methods were used effectively to

describe the characteristics of variables of the study.

3.2.1 Observation

A site survey was conducted at Kauga Prison with guidance of the existing

information system users. It involved use of physical analysis of the current

manual system such as (prisoners’ recording books, annual & monthly returns)

where, the researcher identified the activities conducted in the scheme. This first

hand and detailed information was obtained in context with their related

activities helped in identifying inconsistencies in the process.

12

Page 22: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

The design tools such as database development software applications were used

to come up with efficient database application software.

3.3.1 System Modeling

Ms Studio 2003 was used for developing the relationship diagrams to direct the

design of the system structure which involved determining the relationship

between various entities and associating them together by use of attributes and

attributes domain.

Data flow diagrams were designed to represent the information flow into and out

of the system in top-down manner which indicate the system components and the

way they interface with each other.

3.3.2 System Development Tools

The database was developed using Macromedia fireworkss activated in

Macromedia Dreamweaver8 embedded into HTML to design an interactive

Graphical User Interface (GIU), MySql was used for coding to enable users access

to the database and PHP serves at the backend as server.

14

Page 23: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

CHAPTER IV

SYSTEM ANALYSIS AND DESIGN

4.0 Introduction

In this chapter, the system requirements were driven from the data contained in

the existing manual system input such as the prisoner registration book, monthly

and annual reports. The data flow tables, frame work plan and entity relationship

plan helped to organize data and defined the relationship between the entities.

The process can assist the analysts to understand the structure of database and

how the activities like capturing and retrieving data are effectively conducted

within the scheme.

4.1 System Study

The system study describes the project area of Kauga Prisons and particularly

concentrated on the information management process. After receiving prisoner

from courts of law, the concerned prison staff records the details of the prisoner

in the prisoners’ registration book which include the full names, address, offence

committed and its status. The next date to court has to be tracked in order to

enable production of a remand prisoner before court for court proceedings. The

prisoner is then allocated a ward where he will be confined as the process

continues.

Monthly and annual reports are generated every end of the month and year

respectively then submitted to the prison headquarters for further management.

On the other side of the prison staff, the management prepares monthly and

annual personnel returns and submits them to the prison headquarters to keep

track of the number of personnel under their command and eliminate those who

could have died or left the prisons services due to other reasons.

15

Page 24: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

4.2 Problems of the Existing System

The operation of the existing system is described as follows:

Personnel manual mechanism to capture data is the basis of the scheme which

causes failure to keep accurate records. This process is so tiresome and time

consuming with possibilities to make errors during data capture because the user

enters one data at a time.

The resources available (computers) are not enough to sustain the new database

system. Therefore, there is need to purchase the requirements such as hardware

and software that will be used to run the new system efficiently.

4.3 Design Features of the New System

Tables and fields were first defined with the features of the database at the back

end server, followed by the definition of data types to be used to store data in

each field of the table. The relationships between various entities were identified

and defined. That’s to say; one to one, one to many and many to many

relationship.

Data integrity rules were applied as follows:

i. The value of the primary key exists in each instance of the entity. Duplicate

and incorrect data input in the primary key is rejected.

ii. The primary key does not accept null values according to integrity rules.

iii. Primary key values must be unique for identification purposes of records.

iv. Foreign key values must match primary key values in associated table as

referential integrity to ensure correct navigation between the related

entities.

16

Page 25: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

4.4 System Design

The researcher considered the design of the system which included drawing

context diagrams, and the flow charts to make the system users understand the

flow of information within and out of the system.

Codes from the design tools such as the programming languages like Mysqi, PHP

were used to come up with the efficient system. Gathered specifications in form of

logical models as input for designing the system architecture were considerably

used to enable the system builder understand how data flows in and out of the

system.

4.4.1 System Architecture

The architectural design of the system will have a big impact on the system’s

ability to fulfill both functional and non-functional requirements. The correct

design patterns, mechanisms, and technology were specified in the design of the

architecture. The architecture can be modeled using various different models.

In figure 1 below, the user accesses the first page of the system interface, where

he opts to continue with the transactions then click the login direction button.

The user enters the username and password which is submitted to the database

in form of request for database access. If the user is successful then, he accesses

the user interface where all operations are performed.

On the other hand, the administrator can base on the login form to request change

of password which directs him to the change password form. The administrator

then enters the existing username, old password and the new password which is

retyped for confirmation purposes then submitted to the password repository.

17

Page 26: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

If the new password is accepted, the administrator receives a feedback and starts

using the new password to access the system.

After using the system, the user is free to logout and the system directs him back

to the initial page (Index) of the system interface. Updates and deletions are

performed at the back end to avoid other users temper with the system data.

Exit system Accs:::r Exit system -- _______

~ st±on log~

Admin’s Ops Area

5 .0PS

Data repository)C Changec password~ATh

~j-~ T

‘~ P issword 1 SLnd pass~%.ord update e

repository bend iequesb I Send request.n — 00 ____________

1+ ____________

Administrator’s Operational Interface OC Stations User Interfacc g- IMonitor and process input and output I Perform transactions

E0

Figure 1: System Arcintecture

18

Page 27: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

4.4.2 Entity Relational Diagram

The entities in the database are related to each other and accessed through the

graphical user interface by use of forms to enter and submit data to the database.

Various triggers react to row inputs in the tables to generate completion and

store different records which are executed in the database. Primary key attributes

are represented by (P1<).

Figure 2 below explains how the entities in the database are related to each other

by use of arrow symbols to direct the relationship.

19

Page 28: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

CourtReferenceSentenceSentenceDateCommitmentflateReleaseD ate

‘,

I Staff

PK ForteNuniber

aLahIflaIIIc

RankGenderStaifRoleStationEnlistnientD ateHomecontact

Index I

I ILogin usersystem

PK username PK username

password password

I ___ ICbangepassword I I_____ PMIS

— Oldpassword InterfaceNewpassword

— Conflrmpassword

Courtorder

PK Cnurtld —.

Prison

PK Prisonid

PrisonNameDistrictPrisonDepartment

Prisoners

A~

Offence

PK OffenceldPK Prlsnnersld

PrisonersNameSexAgeNationalityPhysica!AddressHomeAddress

PrisonerNameOffenceOffenceCategoryCommitmentDateReleaseDate

~1

RecordsAssociates

PK Associateld

AssociateNameSexAgeNationalityPhysicalAddress

___________

PK Recordid

OffenceCategoryOffenceNumbersYear

Figure 2: Database Entity Relational Diagrams

Page 29: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

k4.3 Integral Processes

ntegral processes are common processes which are performed in context with

iiore than one development activity. In other words; the review process is

jerformed in context with the requirement definition, design and coding.

The diagram below is an example of work flow which involved both the

requirement and design specifications. The work units are Design, Code and Test

then; the feedback paths carry requirements, design and coding issues.

Requirement Unit TestedSpecification Code

4~1

Figure 3: System Development Life Cycle Model

4.4.4 Data Flow Diagrams

The diagram involves the processes conducted by the system users and the ways

in which entities interact with each other within the scheme. There are only two

users of the system; the System Administrator and the Officer In-charge (OC)

Station.

The System Administrator after logging into the system, he enters details, updates

the system, deletes unwanted data from the system, views and prints out reports.

The OC Station only views and prints out reports. If there are reviews to be done

on the information, the OC Station makes them outside the system then alerts the

21

Page 30: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

ystem Administrator who updates the database since he is the only one with the

)rivlleges to edit data in the database.

;ystem Data Flow

~igure 4 below explains the simple way in which data flows between the users of

he system and the system itself.

Figure 4: System data flow diagram

Key

Represents the system

Represents the external user of the system

~. Represents data flow between the user and the system

Page 31: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

Drocess Flow

‘he figure indicates the flow of processes in the system from the genesis when

he user accesses the system and all the activities performed by each system user.

23

Page 32: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

Key

Process is a process or activity in which data is used or generated

External represents an external source, user or repository of the data

—*~ Data Flow (connector) represents how data flows through the system, in physical

or electronic form.

r Data Store represents an internal physical or electronic repository of data, intoand out ofwhich data is stored and retrieved

Figure 5 above indicates the process flow; there are two system users, the System

Mministrator and the O.C Station who enter the usernames and passwords then

submit the input to the database. The system confirms the user account and

allows the user to access the graphical user interface where the user inserts data,

views reports and prints the reports. The System Administrator can make

updates and drop records at the backend of the system. The O.C Station only

views and prints the reports.

4.5 RequirementS

The users of the new system shall expect the following from the system

performance;

4.5.1 Data Requirement

Information and data capture was designed in form of attributes from the

associated major entities in the functionality of the project as follows;

Entity Data Requirements

CourtOrder Courtld, CourtReference, Sentence, SentenceDa1~jCommitmentDate, ReleaseDate

Prison Prisonld, PrisonName, District,

24

Page 33: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

PrisonDepartmentStaff ForceNumber, StaffName, Rank, Gender,

StaffRole, Station, EnlistmentDate, HomeContactRecords Recordld, OffenceCategory, OffenceNumbers,

YearPrisoners Prisonerld, PrisonersName, Sex, Age, Nationality,

PhysicalAddress, HomeAddressAssociates Associateld, AssociuateName, Sex, Age,

Nationality, PhysicalAddress, HomeAddressOffence Offence I d, Pris o nerNam e, Offence,

OffenceCategory, CommitmentDate, ReleaseDateTable 1: Data Requirement

4.5.2 Data Dictionary

Data dictionary described all data used in the system management. The changes

that were made to the model to determine if it can affect the model interfaces for

other systems were applied in the data dictionary.

ATTRIBUTE DATA TYPE LENGTH KEY DESCRIPTIONusername Varchar 11 User identification by namepassword Varchar User security codeTable 2: Login Table

ATTRIBUTE DATA TYPE LENGTH KEY DESCRIPTIONCourtld Varchar 15 PK Court Identification CodeCourtReference Text Court ReferenceSentence Text SentenceSentenceDate Date Date of SentenceCommitmentDate Date Date of CommitmentReleaseDate Date Expected Release DateTable 3: Court details TableATTRIBUTE DATA TYPE LENGTH KEY DESCRIPTIONPrisonld Varchar 15 PK Prison Identification CodePrisonName Text Prison NameDistrict Text DistrictPrisonDepartment Text Prison DepartmentTable 4: Prison Table

25

Page 34: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

ATTRIBUTE DATA TYPE LENGTH KEY DESCRIPTIONForceNumber Integer 15 PK Force NumberStaffName Text Staff’s NameRank Text RankGender Text GenderStaffRole Text Staff RoleStation Text Prison StationEnlistmentDate Date Date of EnlistmentHomeContact Date Home AddressTable 5: Staff Table

ATTRIBUTE DATA TYPE LENGTH KEY DESCRIPTIONPrisonersld Varchar 15 PK Prisoner Identification CodePrisonersName Text Prisoner’s NameSex Text SexAge Integer AgeNationality Text NationalityPhysicalAddress Text Physical AddressHomeAddress Text Home AddressTable 6: Prisoner Table

ATTRIBUTE DATA TYPE LENGTH KEY DESCRIPTIONRecordld Varchar 15 PK Records Identification CodeOffenceCategory Text Category of offenceOffenceNumbers Text Number of offencesYear Date Year of imprisonmentTable 7: Records Table

ATTRIBUTE DATA TYPE LENGTH KEY DESCRIPTIONAssociateld Varchar 15 PK Associate Identification CodeAssociateName Text Associate’s NameSex Text SexAge Integer AgeNationality Text NationalityPhysicalAddress Text Physical AddressHomeAddress Text Home AddressTable 8: Associate Table

26

Page 35: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

ATTRIBUTE DATA TYPE LENGTH KEY DESCRIPTIONOffenceld Varchar 15 PR Offence Identification CodePrisonersName Text Prisoner’s NameOffence Text OffenceOffence Category Text Offence CategoryCommitmentDate Date Commitment DateReleaseDate Date Release DateTable 9~ Offence Table

4.5.3 Functional and Non-functional Requirements

Functional requirements

i. The system will have provisions for capturing, retrieving and accessing

information about prison staff and prisoners details.

ii. The system will be able to generate and provide reports periodically.

iii. It will have a friendly graphical user interface and easily adapted by the

users.

iv. The system will provide security of data therein by allowing only

authorized users to access the system by use of usernames and

passwords.

v. The system will be able to monitor accused persons who have ever been

convicted before.

vi. It will accept the updates like; deletion and alteration of data.

Non Functional Requirements

According to the uniqueness of the scheme, below are the non function

requirements:

i. The system will be easily maintained by the users and scalable.

ii. The system will be accessed by skilled staff for data retrieval and

updates.

iii. The backups and recovery of data must be done immediately at least

once in a week.

27

Page 36: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

iv. The hardware requirements like RAM, hard disc, processor must have

sufficient capabilities such as space, capacity and speed to enable the

system improve its performance.

4.5.4 System Requirement Specification

The usefulness of the computer hardware entirely depends upon the availability

of software which plays an important role to manage the operations of the

computer system. In order to successfully manage this electronic information

management system, the following software must be considered in the computer

system as in table 10 below.

Software RequirementsSoftware Minimum System RequirementsOperating System Windows XP/Windows 2007 will be used due to their

compatibility to enable the application programs tosuccessfully perform the desired tasks.

System Environment e WampServer2.3-beta-x32 to be used at the backend as(Application a server for database.Programs)

c Macromedia Fireworks8 activated into MacromediaDreamweaver8 embedded into HTML and backed upby Cascading Style Sheet (CSS) to serve at the frontendas GUI. When activated, it will come up with Javascripting codes as a back support of their stand.

• Mysql is used for coding to create an interactiveinterface between the graphical user interface and thebackend server to enable users’ access and use thedatabase.

Table 10: Offence Table

28

Page 37: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

Hardware RequirementsHardware Minimum System Requirements3 desktop computers Acer type

Processor Intel (R) Core(TM)2 Duo Cpu is capablefor modern applications and ever thebest CPU, processor speed of 3.0GHz

Memory 3 GB RAM and aboveHard Disk Space Capacity of 282 GBCD-ROM Drive SOX SpeedVisio Display Unit (VDU) High Resolution, 15* computerTable 11: Offence Table

29

Page 38: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

CHAPTER V

SYSTEM IMPLEMENTATION AND TESTING

Introduction

rhis chapter explains the system implementation and ftinctions then guides the

Isers on how to use the application. The graphical user interface was designed

.ising Macromedia Fireworks 8 activated into Macromedia Dreamweaver 8 which

~as linked to the WampServer2.3-beta-x32 using Mysql codes to efficiently

manage the database environment.

5.1 Database Security and Accessibility

The system will be accessed through the index page as in figure 6 below by

strictly two users, (System administrator and OC. Station) using usernames and

passwords.

5.1.1 Data Security

Graphical User Interface

PRISONS MANAGEMENT INFORMATION SYSTEM

Sysfenn Mm~nhfraHv omcer User Systems officer

MISSION:

TO PROVIDE SAFE, SECURE, AND HUMANE CUSTODY OF OFFENDERS

WHILE PLACIIIG HUMAN RIGHTS AT THE (,ThTER OF THEIR

CORRECTIONAL PROGRAMS

Pi isons Mon age neat System

Figure 6: Index page

30

Page 39: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

ifter accessing the index page, the user logs into the system as in figure 7 below.

)n successfully logging into the system, the System Administrator has all rights to

jerform and monitor all activities within the scheme however; the OC Station has

imited privileges such as viewing and printing the reports only then makes the

reviews outside the system activities and informs the System Administrator to

practically address the reviews. Otherwise wrong passwords are rejected by the

system as in figure 8.

PRISON MANAGEMENT INFORM&flON SYSTEM

LOGIN>>

U,a~De

Password ...flfl

c~mPasswocd ......~

[~ji~jjäeas I ~~ePasswocd

9!6’2013 2oStU p~

Dflfl.OPXD a: NnmwmA&4zS

Figure 7: User Login form

PRISON MANAGEMENT INFORMATION SYSTEM

LOGIN>>

deiiied ,cothtt Mmi.ñtntorUsaoaiie

Password

~

r~ 1 [~i~ One Password

I’~~~’

Figure 8: Wrong password entered and access rejected

Page 40: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

~igure 9 below is an interface for changing password in order to back up security

~f the system. The System Administrator has rights to change password

,eriodically as the need may be. At the login form, the System Administrator

:licks on the ‘Change Password’ option then directed to the change password

‘orm where the existing username and old password are entered, plus the new

password and its confirmation before submission. On submission of the correct

input, a message is received confirming password change and the user will start

using the new password.

PRJSON MANAGEMENE INFORMATION SYSTEM

LOGIN>>

Figure 9: User interface to allow change of password

5.1.2 Data Accessibility

When the user accesses the system, it directs him to the operational graphical

user interface as in figure 10 bellow which was designed as pmis.php. The System

Administrator can have access to all forms and reports of each module for

purposes of performing required activities within the scheme such as inserting,

viewing and printing reports. The OC Station can only view and print the reports;

if there are some amendments then the reviews are done outside the system

32

Page 41: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

PRISONS NANAGEMEIff INFORMATION SYSTEM

COINa PJ~1 F€~ STE ~oa k.WQA1~

Figure 10: Graphical user interface to allow the user access all integrated modules

5.2 Testing and Validation

Installation of the system components like hardware, software and training users

about the system are done at this stage. The system modules were all first tested

before integration and errors debugged. After validation of all modules, they were

integrated into a running program then tested to validate its capability.

The system is capable to capture and make updates of data therein as in figure 11

below.

Page 42: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

4. kathc*

PRISONS MANAGEMENT INFORMATION SYSTEM

COlJRTORDE~ PRISON RECORDS STIFF PRiSON~S MSOCIMES LOG OUT

‘&aczld ~‘FTh~IO

tCae~y Fth~

C~sD~it ~12~11

~3lW13

~flw

• 62~U~iUI

co~w F~ gç~

Figure 11: Inserting data into forms then submitted into the database for storage

After capturing data in the database, the system can generate and print periodic

reports which are sent monthly or annually to the Prison headquarters. Figure 12

below, is a report that is generated by the system. Then figure 13 indicates the

capability for the system to print periodic reports. At that level, the user after

clicking ‘print this report’, a dialog box appears on the left the user selects the

printer to print the report depending on which printer is installed on the

computer. The user also selects more options such as the number of pages to be

printed then clicks ok and the report is printed.

Page 43: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

PRISONS MANAGEMENT INFORMATION SYSTEM

COURT ORDER PRISON RECORDS STAFF PRISONERS ASSOCIATES OFFENC LOG OUT

Offencejil PñsonerName Offence &enceCetegeiy~CemmitmentD.te IReleaseDete

0W1123,2011 Ganld jmce frd~iy 2011-04—12 12016-08-02

IOW439~2000 IKtuao ~* ~ fl’w fr012-05-12 201942-02

OFW200/2010F~e Join ~, ~Mkdaneatc., ~2012-05-12 ~2012-07-20

I0W/201~200L1Q0&M0cen ~ ~ 12010-12-12 12011-02-02

jo~w2o4noio [roknt. bmw ~ I4~hl~~~1 fr~’~-~’~ j2012_0&02

OF 09/2010 fridotnilt IMniisImigltr Fdmxy [2012-05-12 2020-02-02

OFFt21012010~~ ~ fracmi 2012-05-12 201344-13

p45/2009~ ~M.nc1ng1in fr&n~ 2012-02-12 2016-02-02

IOF~fl6512010 frij~i nazi jma Izoii -04—12 2016-02-02

0py,567,2010~frt ~ freio&w 120h1_04-12 201344-13

IOFF/568t2011 Mmyfi.gaflia I0~id Ahi~ 1201144—12 2013-04-13I0ff/672/2010~Mo~ frs~..ci~.ngwn~ 12009-12-12 11016-02-02

Pnntthispage Cbckbacjçj

Figure 12: Report of prisoners in custody

NAGEMENT INFORMATION SYSTEM

RECORDS ST PRISONERS ASSOCIATES 0

- ci Off~ Osncecatcrq Iconmit ..stDate litseneDileGa& lThd fr&g~~ ~011-04-I2 12016-08-02Poly 12azt frelcey [2032-05-12 12019-02-02

kin fi&iieme.ar ~2012.0512 f201247-20

yobeMosa lEoccait 3&do,ra,mr 2030-12-12 [2011-02-02

frcn~imny ~ jJt_.__ j2012-05-12 ~

INe —I-- -~.--frasq 12012-05-12 [2020-02-02

fr~ fr~o~i~ 2013-04-13

I P~”P9~_1

Figure 13: The system can print reports

-a

4~ S&idTcQwMcblOO7 I c9— I*: Pae*

Two: ~d To 1 Qieja WeeMOe.. Seed Ic I~.m OneNea Pod.

QPettolIe

Psi eeI~ Coy.

~&jcIcop.g. 1

Pace. bw~l wi1 •2~ 3 CcU~e

Sde~w 1 2r’ 3

irc~_j

l100.OIIT

I01~t14512009~ ~do.q [2012-02-32 [2016-0242

0PFl365I20I0IK*a~Pai jmm jEdocey 12011-04-12 [2016-02-02

I0~~6~010~’ ma 12011_04_12 [2013-04-33

0~F/56I42Oll IMsyAsdb j0~.1M,in IFdaw 12011-04-12 j2013-04-13I0FF$7efl0I0~~Mo.a tu_~l~.~IJ.. ~dooy j2009-12-12 12016-02-02

35

Page 44: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

5.3 Training Users

The user training about the usability of the system will be done as soon as

the project owners accept the system and sign the acceptance. The training

will mostly cover how to access the GUI and perform the activities within

the scheme such as insertions, updates, performing backups and any other

requirements. The persons to be trained will involve the System

Administrator and other staff in relation to the scheme.

5.4 System Maintenance

Maintenance is an ongoing activity performed during the normal operation

of the system. It can be done either to fix the bugs, changing the software

application due to technological enhancement requirements or even

environmental needs.

36

Page 45: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

CHAPTER VI

RECOMMENDATIONS AND CONCLUSION

6.0 Introduction

This section includes a summary about the project results, the achievements,

limitations, recommendations and conclusion. The main objective of this project

was to design an efficient information management system for Kauga prison with

a view to create a convenient working environment, increase on their

productivity and improve services for the UPS as a whole.

6.1 Problems faced of the Case Study

There were quite a number of problems faced during the project development life

cycle which included the following;

o Identifying a case study was a bit hectic due to poor responses from the

organizations that were not willing to offer information about their

organizations.

o Analysis and retrieving information from the related records was somehow

difficult due to the mix up, big volumes and missing records.

6.2 Recommendations

The following are the recommendations for the successful operation of the entire

system;

6.2.1 Achievements

The new system is expected to reduce on time taken to capture and trace for

particular records hence; the system users will be relieved of tedious work that

has been the basis of the day.

37

Page 46: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

The new system does not apply to Kauga prison station alone but the organization

as a whole, therefore the prison service is expected to benefit a lot and take into

account that even other stations that have not yet been automated be considered

to improve their services.

6.2.2 Hardware and Software requirements

The necessary hardware and software requirements to enable smooth running of

this application are as follows;

Intel (R) Core(TMJ2 Duo CPU is capable for modern applications and ever best

CPU, processor speed of 3.0GHz, Capacity of 282 GB, RAM 3.0GB.

Software packages required are; Ms Windows XP/Windows 2007, Macromedia

Fireworks 8, Macromedia Dreameweaver8, WampServer2.3-beta-x32 and Ms

Office 2007.

6.2.3 Configuration

Trained personnel will do the configuration to run the system, provide the system

backups at least once in a week and any necessary support in case of system

failure.

6.3 Conclusion

Conclusively the research study on the manual information management system

has led to the successful implementation of the desired objectives. This software

product has many benefits to the users and the organization as a whole in such a

way that they will improve on their services, increase productivity and they will

be relieved of the hectic work of finding the alternatives to keep manual managed

records.

38

Page 47: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

References1. Association for Computing Machinery (2013). ACM guide to computing

literature: Retrieved on April 14, 2013 from

http://dl.acm.org/citation.cfm?id=99990 (1 4/04/2013 1 8:40:00).

2. Checkland & HoIwell (1999). Managing information systems: Received on

January 20, 2013 from http://www.studymode.com/essays/Managing

Information-Systems-A-Study-538877.html.

3. Chris F. Kemerer (1996). Software Project Management — Reading cases.

University of Pittburgh.

4. Daniel E.S. Kawai, Dogo H. Samson (2011). Department of Mathematical

Science, David M. Waiss Chai Tau Robert Lai. Software Line Engineering —

Famh3’ based software development process.

5. Faculty of Science, Kaduna State University, Kaduna, Nigeria. Information

Technology for People - Centred Development (ITePED 2011). Retrieved on

15/02/2013, from www.ncs.org.ng.

6. Jeffrey L. Whitten, Lonnie D. Bentley, Kevin C. Dittman (2004). Systems

Analysis and Design Methods, 6th Edition. Irwin/McGraw-Hill, McGraw-Hill

Companies.

7. Jeffrey L. Whitten, Lonnie D. Bentley, Victorm Barlow (2001). Systems

Analysis and Design Methods, 3rd Edition. D. Irwin Publishing.

8. Lipchak, A. (2002). Information management to support evidence-based

government in the electronic age: Retrieved on March 30th 2013 from

www.ppforum.ca/ow/ow_p_1 1_2002B_es.pdf.

39

Page 48: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

9. Nathan Mnjama, Justus Wamukoya (2006). E-government and records

management: Retrieved on April 23, 2013 from

www.bridges.org/ereadiness/tools.html.

10. Sabina Klanecek (December 2012). Experts discuss impact of information

technology on access to justice. Retrieved on April 25, 2013 from,

http://www.rieurope.eu/article/experts-discuss-impact-information

technology-access-justice.

11. Uribe -Luis Martinez, Meriel Patrick (August 2011). Virtual Infrastructure

with Database as a Service (VIDaaS) Project Retrieved on February 12,

02/2013 from

http://portal.acm.org/citation.cfm?doid=1409360.1409373.

12. Wan Satirah Wan Mohd Saman & Abrar Haider (2012): Electronic Court

Records Management Retrieved on April 12, 2013 from, http: Vol. 2012

(2012), Article ID 925115, 51; www.ibimapublishing.com.

40

Page 49: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

AppendicesI’m in a process to design an automated information management system forKauga prison therefore, I kindly request you to answer the following questionstherein this form. Your cooperation is highly appreciated.

Appendix 1:QuestionnaireGuidelinesQuestionnaire for Kauga prison management and staff:

Dear respondent

(Please tick the most appropriate and fill the blank spaces where applicable)

1. Gender: Male I Female I2. Age bracket: Below 30 ____ 31-401 I 41-5~____ Above 50 ____

3. How long have you been an employee in Prison service?

Below 5 years _____ ~ -10 _____ Above 10 years I

4. In which department do you work?General dutiesi I Records~_____ Others specify

5. What is your role? Data capturel I Prepare returns _____ Others I

6. How many prisoners do you_receive/inmates in a months?Below2OI___ 20-401 41-501 I AboveSOl I

7. On what basis do prepare returns (if you prepare returns)?

Monthly~____ Quarterly ____ Annually I I All

8. State the problems encountered during data capture, tracinginformation:

41

Page 50: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

9. Is there any measures being_put in place to improve the informationmanagement system? Yes No Not sure

42

Page 51: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

APPENDIX 2:Sample Codes used in Mysqi and PHPA code to create user account<?phpif(isset($_POST[’submit’j)){$username=$_POST[’username’];$password=$YOST[’password’j;$confirmpassword=$_POST[’confirmpassword’];if($username==”prison” and $password==”prisonl” and$confirmpassword==”prisonl”)

echo “<META http-equiv=refresh content=3;URL=pmis.php>”;

$errorMessage = “Access denied ,Contact Administrator;}

A code to insert data into database<?php$hostname = “locaihost”;$username = “root”;$password = “I;

$dbname = “pmis”;$usertable = “staff’;

$con = mysqlsonnect($hostname,$username, $password) or die (“<html><scriptlanguage=’JavaScript’>alert(’Unable to connect to database! Please try againlater.’J,history.go (-1)</script></html>”);if (!$con){die(’Could not connect: ‘.mysql_errorQ);}

mysql_select_db[$dbname, $con);

$sql=”INSERT INTO $usertable (ForceNumber, StaffName, Rank, Gender,StaffRole, Station, EnlistmentDate, FlomeContact)VALUES

43

Page 52: DESIGN AND IMPLIMENTATION OF PRISON AND PRISONERS ...

(‘$_POST[ForceNumberj ‘,‘$_POST[StaffName] ‘,‘$_POST[Rank] ‘,‘$_POST[Gerider]’,’$_POST[StaffRole] ‘,‘$_POST[Station] ‘,‘$_POST[EnlistmentDate] ‘,‘$_POST[HomeContact]’)’;

if (!mysql_query($sql,$con)){die(’Error: mysql_errorQ);}

echo “1 record added”;mysql_close($con)

44


Recommended