Chapter One Introduction 1 1 Background
Chapter One Introduction 1 1 Background
INTRODUCTION
1.1 BACKGROUND OF THE STUDY
The increased Violence against young people includes all types of violence, these occurs for ages between 0-18
years old. This violence may be child maltreatment (i.e. sexual and emotional abuse, neglect or physical
violence) mostly between parents or other authority figures. Both genders (boys or girls) are at same risk of
physical assault and emotional neglect and abuse, the females are at greater risk of sexual abuse or violence,
this mostly leads to unwanted pregnancy or sexually transmitted diseases. As young people between this age
groups reaches adolescence, peer violence and intimate partner violence, in addition to child maltreatment,
becomes highly unavoidable. Violence against children can be avoided by setting up preventable measures.
Preventing and addressing to violence against children requires that efforts the society, health workers and
other organizations to systematically address the risk and protective factors at all four interrelated levels of risk
(individual, relationship, community, society). World Health Assembly (May 2016), reached a resolution
which endorsed the first ever WHO Global plan of action on tightening the roles of the health system within a
national multisectoral response to fight against child neglect, interpersonal violence in particular against girls
and women, and against children.The Online child abuse database management system when implemented,
will be an application developed to move beyond addressing the impact of child abuse by seeking out the root
cause and identifying ways to prevent it. This is an application created to trace out the statistics based on the
reports about child abuse and help reduce the rates of the crime. It will maintain a centralized database of all
scheme related information. This computerized system verifies and generate reports of incidents about abusive
parents, physical and sexual abuse. The Child abuse application will maintain vital information about child
abuse laws, it will provide details about those children who are in risk. Encounter the challenges with proper
documentations which include misplacement of vital information or cases, as a result of large volume of work
handled, duplicated or efforts due to inconsistency in activities, and a lot of time spent in searching for files or
reports when needed for processing.
1.2 STATEMENT OF THE PROBLEM
The existing system, which is a manual process requires modification and replacement to enhance it
effectiveness, they exist a lot of challenges associated with the old and existing system. The existing system
faces numerous challenges due to the manual procedure of recording and keeping track of child abuse victims,
which may include:
A lot of paper work is required to keep vital information, which may lead to lost or damage.
• Neglect: This usually occur when families fail to or on their own part fail to provide the
necessary need for their children such as food, medical care, being deprived of essential need of life.
• Violence: Behavior involving physical force intended to hurt, damage, or kill someone or
something.
• Offender: This is a person who commits an illegal act. He/she is a criminal and guilty of an
offence.
LITERATURE REVIEW
2.0 INTRODUCTION
in this chapter, the researcher covers the concepts leading to the topic under discourse. The
concept of child abuse is treated from who a child is, what is the meaning of child abuse, what
makes an action to be called child abuse, the forms that a child can be abused are also well
researched. The researcher also took an examination of effective and preventive measures that
child abuse can be addressed and then the manual way that child abuse is normally reported.
Since the project is all about developing a database management system to hold child abuse
records, the concepts of database is been examined together with the web technologies that made
In 2012, Child Protective Services (CPS) agencies estimated that about 9 out of
1000 children in the United States were victims of child maltreatment. Most (78%)
were victims of neglect. Physical abuse, sexual abuse, and other types of
maltreatment, were less common, making up 18%, 9%, and 11% of cases,
respectively ("other types" included emotional abuse, parental substance abuse,
and inadequate supervision). According to data reported by the Children’s Bureau
of the US Department of Health and Human Services, more than 3.5 million
allegations of child abuse were looked into by child protective services who in turn
confirmed 674,000 of those cases in 2017. [194] However, CPS reports may
underestimate the true scope of child maltreatment. A non-CPS study estimated
that one in four children experience some form of maltreatment in their lifetimes,
according to the Centers for Disease Control and Prevention (CDC).
According to a report by the WHO, As of 2014, an estimated 41,000 children under
15 are victims of homicide each year. this number underestimates the true extent
of child homicide; a significant proportion of child deaths caused by
maltreatment are incorrectly attributed to unrelated factors such as falls, burns, and
drowning. Also, girls are particularly vulnerable to sexual violence, exploitation
and abuse in situations of armed conflict and refugee settings, whether by
combatants, security forces, community members, aid workers, or others.
According to David Finkelhor who tracked Child Maltreatment Report (NCANDS)
data from 1990 to 2010, sexual abuse had declined 62% from 1992 to 2009 and the
long-term trend for physical abuse was also down by 56% since 1992. He stated:
"It is unfortunate that information about the trends in child maltreatment are not
better publicized and more widely known. The long-term decline in sexual and
physical abuse may have important implications for public policy.
2.5 Database And Database Management System
A database is a collection of data, typically describing the activities of one or
more related organizations. For example, a university database might contain
information about the following:
Entities such as students, faculty, courses, and classrooms.
Relationships between entities, such as students' enrollment in courses, faculty
teaching courses, and the use of rooms for courses.
A database management system, or DBMS, is software designed to assist in
maintaining and utilizing large collections of data, and the need for such systems,
as well as their use, is growing rapidly. The alternative to using a DBMS is to use
adhoc approaches that do not carry over from one application to another; for
example, to store the data in files and write application- specific code to manage it.
2.5.1 Advantages Of Database Management System
Data independence: Using a DBMS to manage data has many advantages:
Application programs should be as independent as possible from details of data
representation and storage. The DBMS can provide an abstract view of the data to
insulate application code from such details.
Efficient data access: A DBMS utilizes a variety of sophisticated techniques to
store and retrieve data efficiently. This feature is especially important if the data is
stored on external storage devices.
Data integrity and security: If data is always accessed through the DBMS, the
DBMS can enforce integrity constraints on the data. For example, before inserting
salary information for an employee, the DBMS can check that the department
budget is not exceeded. Also, the DBMS can enforce access controls that govern
what data is visible to different classes of users.
Data administration: When several users share the data, centralizing the
administration of data can offer significant improvements. Experienced
professionals who understand the nature of the data being managed, and how
different groups of users use it, can be responsible for organizing the data
representation to minimize redundancy and for fine-tuning the storage of the data
to make retrieval efficient.
Concurrent access and crash recovery;A DBMS schedules concurrent accesses
to the data in such a manner that users can think of the data as being accessed by
only one user at a time. Further, the DBMS protects users from the effects of
system failures.
Reduced application development time: Clearly, the DBMS supports many
important functions that are common to many applications accessing data stored in
the DBMS. This, in conjunction with the high-level interface to the data, facilitates
quick development of applications. Such applications are also likely to be more
robust than applications developed from scratch because many important tasks are
handled by the DBMS instead of being implemented by the application.
2.5.2 Types of database system
• Hierarchical Database System
• Network Database System
• Relational Database System
2.5.3 Implementation: Database management systems
A database management system (DBMS) is a system that allows to build and
maintain databases, as well as to utilize their data and retrieve information from it.
A DBMS defines the database type that it supports, as well as its functionality and
operational capabilities. A DBMS provides the internal processes for external
applications built on them. The end-users of some such specific application are
usually exposed only to that application and do not directly interact with the
DBMS. Thus end-users enjoy the effects of the underlying DBMS, but its internals
are completely invisible to end-users. Database designers and database
administrators interact with the DBMS through dedicated interfaces to build and
maintain the applications' databases, and thus need some more knowledge and
understanding about how DBMSs operate and the DBMSs' external interfaces and
tuning parameters.
A DBMS consists of software that operates databases, providing storage, access,
security, backup and other facilities to meet needed requirements. DBMSs can be
categorized according to the database model(s) that they support, such as relational
or XML, the type(s) of computer they support, such as a server cluster or a mobile
phone, the query language(s) that access the database, such as SQL or XQuery,
performance trade-offs, such as maximum scale or maximum speed or others.
Some DBMSs cover more than one entry in these categories, e.g., supporting
multiple query languages. Database software typically support the Open Database
Connectivity (ODBC) standard which allows the database to integrate (to some
extent) with other databases.
CHAPTER THREE
METHODOLOGY
3.0 INTRODUCTION
This chapter takes an overview on the system design and the entire research work,
it is important to note that a poorly designed system will equally produce an
incorrect output as such this chapter presents a skeletal approach to the design of
the entire system.
In the existing system, the researcher takes a look at a situation where when child
abuse is commited , an intended person that want to report first locate a nearby
police unit or social walfare or authorities responsible for handling such cases and
file a manual report for due action to be taken.
The major disadvantage of this manual system is that the user has to go to the
authorities which is a waste of time and can result to death of the child been abuse
if the type of abuse is physical and severe.
Also another disadvantage is that the manual method docunment records and this
reocrds are prone to damages due to physical occurances such as flooding, tear and
abuse of paper docunments etc
Figure 3.2 Use case diagram showing reporters role on the system child abuse
database system
Figure 3.3 Diagram showing the admin role on the child abuse database
system
In the two use case diagrams above, it explain the roles that each user on the
system or what each user can do on the system.
First is the use case which shows that once the reporter log in to the system, he has
the role of viewing his profile which is generated from the information he provided
while he was filling the signup page. He can also log complaints on the system by
filling in the complaint form after he has clicked on make complaint dashboard. He
can then finally log out of the system by clicking the logout menu.
In the second use case, it lists the roles assigned to the admin of the system. The
admin Is the person in charge of managing the system. He add users into the
system, edit users, delete users, view profile, manage complaints from viewing of
all complaints made, editting them, deleting and generate reports and send to the
necessary authorities for immediate action.
From the above diagram and explanation, its pertinent to note that there are two
major users on the system which include reporter and admin.
The UML class diagram is useful for capturing the static relationships between
different structural elements. Star UML typically improves the productivity and
ensure consistency, and therefore quality, across my entire model. Other similarly
useful capabilities include the ability to query the model on which classes and
messages are unresolved (i.e. unmapped to actual classes or operations in the
model). Another aspect of fleshing out each individual class is to identify attributes
for the class. Attributes represent information that may be requested of the class by
others or that may be required by the class itself to fulfill its responsibilities. At this
stage in the analysis, it is appropriate to identify attributes as generic types such as
number, string, etc. Identifying the relationships between the classes completes the
class diagram for the vehicle recovery System. The relationships specifically
interested in at this stage are association, dependency, and inheritance. Fig 3.4
shows the class diagram for online Child abuse database system
+SIGNUP
*NAME
*PHNENO
*EMAIL
*ADDRESS
*OCCUPATION
*MSTAT
*AGE
*USERNAME
*PASSWORD
1.1
+ABUSE
*CHILDNAME
*ABUSETYPE
*REPORTER
*AREA
*REPORTEDTO
*DATE
Figure 3.4 Diagram of class diagram showing the most vital tables in the Child
abuse database system
3.5.3 ACTIVITY DIAGRAM
These are graphical representations of workflows of stepwise activities and
actions with support for choice, iteration and concurrency. In the Unified Modeling
Language, activity diagrams are intended to model both computational and
organizational processes (i.e. workflows). Activity diagrams show the overall flow
of control. Activity diagrams are constructed from a limited number of shapes,
connected with arrows. The most important shape types: rounded
rectangles represent actions; diamonds represent decisions; bars represent the start
(split) or end (join) of concurrent activities; a black circle represents the start
(initial state) of the workflow; an encircled black circle represents the end (final
state). It contains arrows running from the start towards the end and represents the
order in which activities happen.
The specific usage of activity diagram is to model the control flow from one
activity to another. This control flow does not include messages. The activity
diagram is suitable for modeling the activity flow of the system. An application can
have multiple systems. Activity diagram also captures these systems and describes
flow from one system to another. This specific usage is not available in other
diagrams. These systems can be database, external queues or any other system. Fig
3.4 shows the activity diagram for online elearning website.
Figure 3.5 Activity diagram for the child abuse dataabase system
One of the most important software design consideration is how data will be stored
and presented in the database. This section covers the database tables integrated
into the online eLearning website. The database sql table structures can be seen
from figure below.
Table 3.1 Signup table
s/no Field name Data type
1 name varchar(200)
2 phneno varchar(200)
3 email varchar(200)
4 address varchar(200)
5 occupation varchar(200)
6 mstat varchar(200)
7 age varchar(200)
8 username varchar(200)
9 password varchar(200)
CHAPTER FOUR
RESULTS AND DISCUSSION
4.0 SOURCE CODES
This Child Abuse Database System was written using HTML for the front-end
user interface, Php for the functionality.
4.1 HOW TO RUN THE PROGRAM
This application requires the following hardware and software to function:
Hardware Requirement:
The following under listed hardware requirements are needed for the testing of this
system.
1. Color Monitor
2. 512MB Random Access Memory (RAM Size)
3. 1 Gigabyte Hard Disk Drive
4. Keyboard
5. Mouse
Software Requirement
The software requirements for the system include:
• Web Browser Application (java script enabled) the system was tested
with Google chrome, Mozilla and opera mini web browsers.
• Xampp application server
• MySQL Database
5.0 INTRODUCTION
This chapter gives an overview of this research project in the summary section. It
handles the summary of the whole research work, recommendation for its use, and
then conclusions.
5.1 SUMMARY
With the emergence of information technology, a lot of events have been recorded
in computer industry. One area that is hugely underestimated is the aspect of data
storage in a secured format. Hence from the system under review, it can be seen
that a model has been developed which handles issues of data storage for cases of
child abuse. This system can be use to make lot of decisions and generate reports
concerning child abuse and it runs on the internet using web technologies.
5.2 RECOMMENDATION
As the world moves gradually away from the manual method of storing date which
prone to a lot of physical hazards, it becomes more important for this manual
methods to be taken to the cloud. This system more or less handles only situations
where the child abuse is been reported.
5.3 CONCLUSION
The child abuse database system will go a long way in helping NGOs ,
Government and concern citizens make decisions about child abuse and possible
ways to reduce it if not totally eliminate child abuse.
BIBLOGRAPHY
Aekseeva, L. S. (2007). Problems of child abuse in the home. Problems of child abuse in
the home, 49(5), 6-18.
Alexander, R. (2011) Introduction to the special section: medical advances in child sexual
abuse, part 2. Journal of Child Sexual Abuse, 20(6): 607-611.
Allnock, D, et al (2009) Sexual abuse and therapeutic services for children and young
people: the gap between provision and need: full report. London: NSPCC
Alister Lamont(2010) Effect of child abuse and neglect for child and adolescent. Full
report for national child protection clearinghouse.
neglect.html.
Barnett, D., Manly, J., &Cicchetti, D. (1993). Defining child maltreatment: the interface
between policy and research. In D. Cicchetti& S. Toth (Eds.), Child abuse, child
development, and social policy. Advances in applied developmental psychology (Vol. 8,
pp. 7–73).
Bromfield, Leah; Holzer, Prue. "Australian Institute of Family Studies Submission to the
Special Commission of Inquiry into Child Protection Services in NSW". National Child
Protection Clearinghouse. CiteSeerX 10.1.1.385.2444
(https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.385.2444).
Calder, J., McVean, A. and Yang, W. (2010) History of abuse and current suicidal
ideation: results from a population based survey. Journal of Family Violence, 25(2): 205-
214.
Child Sexual Abuse. Medline Plus; U.S. National Library of Medicine, 2008.04.02.
http://www.acf.hhs .gov/sites/default/files/cb/cm11.pdf#page=28
Gavin, H. (2011) Sticks and stones may break my bones: the effects of emotional
Gover, A., & MacKenzie, D. (2003). Child maltreatment and adjustment to juvenile
Hill, A. (2003). Issues facing brothers of sexually abused children: Implications for
Holtzman, D., Greene, B. Z., Ingraham, G. C., Daily, L. A., Demchuk, D. G., & Kolbe, L.
J. (1992). HIV education and health education in the United States: A national survey of
local school district policies and practices. Journal of School Health, 62, 421-427.
Howe, D. (2011) Attachment across the life course: a brief introduction. Basingstoke:
Palgrave Macmillan.
I. Fayaz (2019).Child Abuse: Effects and Preventive Measures. International Journal of
Indian Psychology, 7(2), 871-884. DIP:18.01.105/20190702, DOI:10.25215/0702.105
Kaplan, T. (2009). Handbook Children and Adolescents with Mental Health. London:
RCPsych Publication.
Kilpatrick, D., Ruggiero, K., Acierno, R., Saunders, B., Resnick, H., & Best, C. (2003).
Violence and risk of PTSD, major depression, substance abuse/dependence, and
comorbidity: Results from the National Survey of Adolescents. Journal of Consulting and
Clinical Psychology, 71(4), August, pp. 692–700.
Klein, D. C., & Goldston, S. E. (1977). Primary prevention: An idea whose time has
come. Department of Health, Education and Welfare, Publication No. (ADM) 77-447.
Miller, B. J., Cardona, J. R. P., & Hardin, M. (2007). The use of narrative therapy and
internal family systems with survivors of child sexual abuse: examining issues related
Scarpa, A., Haden, S., & Abercromby, J. (2010). Pathways linking child physical abuse,
depression, and aggressiveness across genders. Journal of Aggression, Maltreatment &
Trauma, 19, 757–776.
Slavin, R. E., Karweit, N. L., & Madden, N. A. (1989). Effective programs for students at
risk. Needham Heights, MA: Allyn& Bacon.
Whitehead, J. (2010). Back to basics: sexual abuse. Protecting Children Update, 71: 8-9.
Whitehead, J. (2011). How do children cope with sexual abuse? Protecting Children
Update, 84: 9-10. World Health Organization (WHO). (2002). World report on violence
and health. Geneva: World Health Organization.