Select Currency
Translate this page

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED CHILD ABUSE DATABASE MANAGEMENT SYSTEM

Format: MS WORD  |  Chapter: 1-5  |  Pages: 76  |  3473 Users found this project useful  |  Price NGN5,000

  DOWNLOAD THE COMPLETE PROJECT

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED CHILD ABUSE DATABASE MANAGEMENT SYSTEM

 

ABSTRACT

The computerized child abuse database management system is a project proposed to create awareness among masses on the issues related to child abuse. The computerized system will keep tracks of all the suspicious incidents of child abuse by generating reports, aid law enforcement agency based on numerous details. Implementing this computerized system will play a crucial role in child welfare. The management system and data collection tools will meet with the Federal reporting requirements, it will also serve the information needs of an organizations, help inform management decisions and support caseworkers' interactions with children, youth, and families.

CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND OF THE STUDY

The increased Violence against young people includes all types of violence, these occurs for ages between 0-18 years old. This violence may be child maltreatment (i.e. sexual and emotional abuse, neglect or physical violence) mostly between parents or other authority figures. Both genders (boys or girls) are at same risk of physical assault and emotional neglect and abuse, the females are at greater risk of sexual abuse or violence, this mostly leads to unwanted pregnancy or sexually transmitted diseases. As young people between this age groups reaches adolescence, peer violence and intimate partner violence, in addition to child maltreatment, becomes highly unavoidable. Violence against children can be avoided by setting up preventable measures. Preventing and addressing to violence against children requires that efforts the society, health workers and other organizations to systematically address the risk and protective factors at all four interrelated levels of risk (individual, relationship, community, society). World Health Assembly (May 2016), reached a resolution which endorsed the first ever WHO Global plan of action on tightening the roles of the health system within a national multisectoral response to fight against child neglect, interpersonal violence in particular against girls and women, and against children.The Online child abuse database management system when implemented, will be an application developed to move beyond addressing the impact of child abuse by seeking out the root cause and identifying ways to prevent it. This is an application created to trace out the statistics based on the reports about child abuse and help reduce the rates of the crime. It will maintain a centralized database of all scheme related information. This computerized system verifies and generate reports of incidents about abusive parents, physical and sexual abuse. The Child abuse application will maintain vital information about child abuse laws, it will provide details about those children who are in risk. Encounter the challenges with proper documentations which include misplacement of vital information or cases, as a result of large volume of work handled, duplicated or efforts due to inconsistency in activities, and a lot of time spent in searching for files or reports when needed for processing.

1.2 STATEMENT OF THE PROBLEM

The existing system, which is a manual process requires modification and replacement to enhance it effectiveness, they exist a lot of challenges associated with the old and existing system. The existing system faces numerous challenges due to the manual procedure of recording and keeping track of child abuse victims, which may include:

A lot of paper work is required to keep vital information, which may lead to lost or damage. Unauthorized users can easily have access to sensitive information. Processing time is slow and lengthy, most times data is duplicated. Keeping multiple folders of child abuse report manually takes a lot of time and resources and some of the information is unreliable and inaccurate.

1.3 AIM AND OBJECTIVES OF THE STUDY

The primary objective of the project is to comprehend the challenges of the current system and to recognize the essential requirements and discuss how the computerization of the system can help in eradicating the challenges of the manual based system, with the following objectives:

To design a functionally database system for child abuse offenders and victims. To compute child abuse records for easy retrieval. Deny access to unauthorized personnel. Help in the fight against child abuse across the country.

1.4 SCOPE OF THE STUDY

This study is not limited to or within any agency, it is designed and developed for the prevention and protection against child Abuse and Neglect.

1.5 SIGNIFICANCE OF THE STUDY

Child abuse and child neglect are social challenges that influences countless underage individuals, and something must be done to change these problems. They is a need to design a computerized child abuse and neglect database management system to help combat this issue. With findings from the research, it will help law enforcement agency, organizations and other agencies to solve the issues and challenges associated with inability to keep precise records effectively and reduce loss of vital information or reported cases. Furthermore, reduce the rate of child abuse across the country. This study will also be beneficial to scholars who want to do additional research on the study.

1.6 LIMITATION OF THE STUDY

The computerized system will be able to compute children abused over recent years, store complainant and offenders’ records for easy retrieval, since is the system is a web-based application, it will require internet access to be enable to access information on the platform.

1.7 DEFINITION OF TERMS

Child: Child is defined as the dependent person in the custody of a parent or guardian for protection of his/her life. Abuse: It is any deliberate act by a person, group of person in the society designed to inflict on a child mentally, physically sexually or emotionally. Neglect: This usually occur when families fail to or on their own part fail to provide the necessary need for their children such as food, medical care, being deprived of essential need of life. 4.  Violence: Behavior involving physical force intended to hurt, damage, or kill someone or something. WHO: World Health Organization. Online: while connected to a computer or under computer control. Child Abuse: This is a child this is physically, sexually, emotionally or psychologically maltreated by the parent, caregivers, teachers or group of persons. Offender: This is a person who commits an illegal act. He/she is a criminal and guilty of an offence. Complainant: A complainant is a person who lodges a complaint. It is a term used in content of criminal law to refer to person who alleges that another person committed a criminal act against him/her in a legal way. It is a person who reports a case or crime.

  DOWNLOAD THE COMPLETE PROJECT

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED CHILD ABUSE DATABASE MANAGEMENT SYSTEM

Not The Topic You Are Looking For?



For Quick Help Chat with Us Now!

+234 813 292 6373

+233 55 397 8005


HOW TO GET THE COMPLETE PROJECT ON DESIGN AND IMPLEMENTATION OF A COMPUTERIZED CHILD ABUSE DATABASE MANAGEMENT SYSTEM INSTANTLY

  • Click on the Download Button above.
  • Select any option to get the complete project immediately.
  • Chat with Our Instant Help Desk on +234 813 292 6373 for further assistance.
  • All projects on our website are well researched by professionals with high level of professionalism.

Here's what our amazing customers are saying

Abdul Mateen Iddrisu
UDS
At first I taught is a site full of fraudsters until I saw my project in my Gmail after my payment.. THANK YOU IPROJECTMASTER and May God the almighty bless u guys abundantly
Excellent
Musa From Ahmadu Bello University
Thank you iprojectmaster for saving my life, please keep it up and may God continue to bless you people.
Excellent
Adam Alhassan Yakubu
UDS
Excellent work and delivery , I promise to share my testimonies everyone in need of this kind of work. You're the best
Excellent
Uduak From Uniuyo
IProjectMaster is the best project site for students. Their works are unique and free of plagiarism!
Excellent
Temitayo Ayodele
Obafemi Awolowo University
My friend told me about iprojectmaster website, I doubted her until I saw her download her full project instantly, I tried mine too and got it instantly, right now, am telling everyone in my school about iprojectmaster.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work
Very Good
Oluchi From Michael Opara University
If you are a student and you have not used iprojectmaster materials, you are missing big time! iprojectmaster is the BEST
Excellent
Gbadamosi Solomon Oluwabunmi
Lasu
Swift delivery within 9 minutes of payment. Thank you project master
Excellent
Dau Mohammed Kabiru
Kaduna State College of Education Gidan Waya
This is my first time..Your service is superb. But because I was pressed for time, I became jittery when I did not receive feedbackd. I will do more business with you and I will recommend you to my friends. Thank you.
Very Good
Azeez Abiodun
Moshood Abiola polytechnic
I actually googled and saw about iproject master, copied the number and contacted them through WhatsApp to ask for the availability of the material and to my luck they have it. So there was a delay with the project due to the covid19 pandemic. I was really scared before making the payment cause I’ve been scammed twice, they attended so well to me and that made me trust the process and made the payment and provided them with proof, I got my material in less than 10minutes
Very Good
Abubakar Iliyasu Hashim
Federal college of education pankshin affiliated to university of jos
I am highly impressed with your unquantifiable efforts for the leaners, more grace to your elbow.I will inform my colleagues about your website.
Very Good

FREQUENTLY ASKED QUESTIONS

How do I get this complete project on DESIGN AND IMPLEMENTATION OF A COMPUTERIZED CHILD ABUSE DATABASE MANAGEMENT SYSTEM?

Simply click on the Download button above and follow the procedure stated.

I have a fresh topic that is not on your website. How do I go about it?

How fast can I get this complete project on DESIGN AND IMPLEMENTATION OF A COMPUTERIZED CHILD ABUSE DATABASE MANAGEMENT SYSTEM?

Within 15 minutes if you want this exact project topic without adjustment

Is it a complete research project or just materials?

It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data

What if I want to change the case study for DESIGN AND IMPLEMENTATION OF A COMPUTERIZED CHILD ABUSE DATABASE MANAGEMENT SYSTEM, What do i do?

Chat with Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

How will I get my complete project?

Your Complete Project Material will be sent to your Email Address in Ms Word document format

Can I get my Complete Project through WhatsApp?

Yes! We can send your Complete Research Project to your WhatsApp Number

What if my Project Supervisor made some changes to a topic i picked from your website?

Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

Do you assist students with Assignment and Project Proposal?

Yes! Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

What if i do not have any project topic idea at all?

Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 813 292 6373

How can i trust this site?

We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!