0% found this document useful (0 votes)
47 views

Chapter One Introduction 1 1 Background

A research work on design and implementation of a computerized child abuse database management system

Uploaded by

Nwankwo Chidiogo
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views

Chapter One Introduction 1 1 Background

A research work on design and implementation of a computerized child abuse database management system

Uploaded by

Nwankwo Chidiogo
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 37

CHAPTER ONE

INTRODUCTION
1.1 BACKGROUND OF THE STUDY
The increased Violence against young people includes all types of violence, these occurs for ages between 0-18
years old. This violence may be child maltreatment (i.e. sexual and emotional abuse, neglect or physical
violence) mostly between parents or other authority figures. Both genders (boys or girls) are at same risk of
physical assault and emotional neglect and abuse, the females are at greater risk of sexual abuse or violence,
this mostly leads to unwanted pregnancy or sexually transmitted diseases. As young people between this age
groups reaches adolescence, peer violence and intimate partner violence, in addition to child maltreatment,
becomes highly unavoidable. Violence against children can be avoided by setting up preventable measures.
Preventing and addressing to violence against children requires that efforts the society, health workers and
other organizations to systematically address the risk and protective factors at all four interrelated levels of risk
(individual, relationship, community, society). World Health Assembly (May 2016), reached a resolution
which endorsed the first ever WHO Global plan of action on tightening the roles of the health system within a
national multisectoral response to fight against child neglect, interpersonal violence in particular against girls
and women, and against children.The Online child abuse database management system when implemented,
will be an application developed to move beyond addressing the impact of child abuse by seeking out the root
cause and identifying ways to prevent it. This is an application created to trace out the statistics based on the
reports about child abuse and help reduce the rates of the crime. It will maintain a centralized database of all
scheme related information. This computerized system verifies and generate reports of incidents about abusive
parents, physical and sexual abuse. The Child abuse application will maintain vital information about child
abuse laws, it will provide details about those children who are in risk. Encounter the challenges with proper
documentations which include misplacement of vital information or cases, as a result of large volume of work
handled, duplicated or efforts due to inconsistency in activities, and a lot of time spent in searching for files or
reports when needed for processing.
1.2 STATEMENT OF THE PROBLEM
The existing system, which is a manual process requires modification and replacement to enhance it
effectiveness, they exist a lot of challenges associated with the old and existing system. The existing system
faces numerous challenges due to the manual procedure of recording and keeping track of child abuse victims,
which may include:
A lot of paper work is required to keep vital information, which may lead to lost or damage.

Unauthorized users can easily have access to sensitive information.

Processing time is slow and lengthy, most times data is duplicated.


Keeping multiple folders of child abuse report manually takes a lot of time and resources and some of
the information is unreliable and inaccurate.

1.3 AIM AND OBJECTIVES OF THE STUDY


The primary objective of the project is to comprehend the challenges of the current system and to recognize the
essential requirements and discuss how the computerization of the system can help in eradicating the
challenges of the manual based system, with the following objectives:
To design a functionally database system for child abuse offenders and victims.

To compute child abuse records for easy retrieval.

Deny access to unauthorized personnel.

Help in the fight against child abuse across the country.

1.4 SCOPE OF THE STUDY


This study is not limited to or within any agency, it is designed and developed for the prevention and
protection against child Abuse and Neglect.
1.5 SIGNIFICANCE OF THE STUDY
Child abuse and child neglect are social challenges that influences countless underage individuals, and
something must be done to change these problems. They is a need to design a computerized child abuse and
neglect database management system to help combat this issue. With findings from the research, it will help
law enforcement agency, organizations and other agencies to solve the issues and challenges associated with
inability to keep precise records effectively and reduce loss of vital information or reported cases. Furthermore,
reduce the rate of child abuse across the country. This study will also be beneficial to scholars who want to do
additional research on the study.
1.6 LIMITATION OF THE STUDY
The computerized system will be able to compute children abused over recent years, store complainant and
offenders’ records for easy retrieval, since is the system is a web-based application, it will require internet
access to be enable to access information on the platform.
1.7 DEFINITION OF TERMS
• Child:Child is defined as the dependent person in the custody of a parent or guardian for
protection of his/her life.
• Abuse: It is any deliberate act by a person, group of person in the society designed to inflict
on a child mentally, physically sexually or emotionally.

• Neglect: This usually occur when families fail to or on their own part fail to provide the
necessary need for their children such as food, medical care, being deprived of essential need of life.

• Violence: Behavior involving physical force intended to hurt, damage, or kill someone or
something.

• WHO: World Health Organization.

• Online: while connected to a computer or under computer control.

• Child Abuse: This is a child this is physically, sexually, emotionally or psychologically


maltreated by the parent, caregivers, teachers or group of persons.

• Offender: This is a person who commits an illegal act. He/she is a criminal and guilty of an
offence.

• Complainant: A complainant is a person who lodges a complaint. It is a term used in content


of criminal law to refer to person who alleges that another person committed a criminal act against
him/her in a legal way. It is a person who reports a case or crime.
CHAPTER TWO

LITERATURE REVIEW
2.0 INTRODUCTION
in this chapter, the researcher covers the concepts leading to the topic under discourse. The

concept of child abuse is treated from who a child is, what is the meaning of child abuse, what

makes an action to be called child abuse, the forms that a child can be abused are also well

researched. The researcher also took an examination of effective and preventive measures that
child abuse can be addressed and then the manual way that child abuse is normally reported.

Since the project is all about developing a database management system to hold child abuse

records, the concepts of database is been examined together with the web technologies that made

the implementing of the topic of discourse possible.

2.1 Child Abuse


2.1.1 Who Is A Child
Children make up that subdivision of a community which is the most weak,
susceptible, and wholly dependent on adults. It is the mistake of adults when
children end up in areas of natural disasters and catastrophes or zones of military
combat operations and become the hostages and victims of physical, sexual, and
emotional violence (Alekseeva 2007).
A child is:
• A person who exists as a human being,
• The child with his or her own characteristic or quality,
• A child who is at risk, reliant, and speedily developing,
• An individual with mind-set, opinions, and perceptions and,
• A social being that will more and more relate and corresponds within her or his
own social situation.
Every aspect of the child needs to be accepted, valued, and cherished by the child’s
major caregiver or a parent. The desecration of or malfunction to value any of
these fundamentals of the child’s psycho-social being comprises categories of child
abuse and neglect (Barnett, Manly, & Cicchetti, 1993).
According United Nations Convention on the Rights of the Child (UNCRC), any
person who is under the age of 18 years is a child. This is a generally
acknowledged explanation of a child and it comes from an international legal
organization which is accepted by most countries around the world. However in
India defining the age of a person has been a constant disagreement. The Census of
India considers children to be any person below the age of 14, as do most
government programs.
2.1.2 What Is An Abuse?
Abuse is any form of behavior or act that is intentional to have authority over,
intimidate, force, or hurt another person. It is a mishandling of an authority which
uses the connections of closeness, faith and reliance to make the sufferer
vulnerable. Abuse can be affective, mental, monetary, sexual, and bodily, but abuse
is not restricted to any one of these. Any exploitation, mishandling, or misuse of
control for the intention of conniving the behaviors, events, opinions, or thoughts
of another person is abuse.

2.1.3 Definition/ Meaning Of Child Abuse


Child abuse is any action, behavior and gestures by another person adult or child
that causes considerable damage to a child. It can be physical, sexual or emotional,
but can just as often be about a lack of affection, care and attention. WHO (2002)
defines child abuse and neglect, or child maltreatment, as all forms of physical or
emotional ill-treatment, sexual abuse, neglect or neglectful action, or commercial
or other mistreatment ensuing in definite or possible harm to the child’s health,
continued existence, growth or self-esteem in the circumstance of a relationship of
accountability, trust or authority.
2.2 Types Of Child Abuse
Abusive or offensive behaviors or an act comes in various forms, but the most
common result of abuse is the emotional effect on the child. If the child is being
abused by a slap, a cruel remark, gritty stillness, the conclusion is child feels
insecure, uncared for, and all alone. There are mainly four forms of child abuse that
has been defined i.e. physical abuse, neglect, emotional abuse and sexual abuse. It
is very essential to remind that if a child is suffering from one type of abuse, it is
most likely that the child is suffering from other form of abuse as well. The four
forms of child abuse and its effects are discussed below:-
Physical Abuse
Emotional Abuse
Child Sexual Abuse
Neglect Abuse

2.2.1 Physical Abuse


Physical abuse is defined as “physical injury caused by punching, beating, kicking,
biting, burning or otherwise harming a child. Physical abuse is the most visible
form of child ill- treatment” (American Humane Society, p. 1).Physical injury that
ranges from small bruises to brutal fractures or death as a result of punching,
beating, kicking, biting, shaking, throwing, stabbing, choking, hitting with a hand,
stick, strap or other object, burning or otherwise harming a child. Such injury is
considered abuse regardless of whether the caretaker intended to hurt the child.
The consequences associated with child physical abuse go beyond what many
people think of initially. Not only are there potential physical injuries like broken
bones, head trauma, abdominal injuries, skin injuries, and so on, there can also be
behavioral, emotional, and psychological effects from exposure to abuse of this
kind. Research has found links between physical abuse, depression, and aggressive
behaviors but the relationship among these variables appears different when
looking at men versus women (Scarpa, Haden, & Abercromby, 2010). It appears
that males and females react differently to trauma, with males engaging in more
antisocial behaviors and females becoming more withdrawn. Several studies have
reported that child physical abuse is a noteworthy predictor of depressive
symptoms (Gover & Mackenzie, 2003; Hill, 2003; Kilpatrick et al., 2003, in
Scarpa, Haden, & Abercromby, 2010). Depression can be a difficult disorder to live
with as it can impact us personally and professionally, so understanding the link
between depression and childhood trauma is an important area of study.
Children who have been physically abused may still feel the effects long after their
injuries have healed. Being shaken, hit or physically abused in any way as a child
can lead to poor physical or mental health later in life, including depressive
disorders, anxiety disorders, eating disorders, childhood behavioral or conduct
disorders, drug use, suicide attempts, obesity, sexually transmitted infections and
risky sexual behavior (Norman, R.E. et al, 2012).
Other long-term effects include
• Not doing as well at school or education
• Criminal risk taking behavior
• Drug and alcohol problems.
2.2.2 Emotional Abuse
Opposite of some people’s beliefs, words can hurt and emotional abuse can
severely damage a child’s mental health or emotional development. It includes a
way of behaving that impairs a child's emotional development or sense of sense of
worth. This may include constant criticism, threats, or rejection, as well as
withholding love, support, or guidance. Emotional abuse is often difficult to prove
and therefore, it may be difficult to intervene. Emotional abuse is almost always
present when other forms are identified.
Examples of emotional abuse include:
• Regular mocking, shaming, and embarrassing
• Calling names and making negative comparisons to others
• Telling a child they’re “no good,” “worthless,” “bad,” or “a mistake”
• Regular yelling, frightening, or maltreatment
• Ignoring a child as reprimand, giving them the silent treatment
• Limiting physical contact with a child—no hugs, kisses, or other signs of
affection
• Exposing a child to violence against others, whether it is against the other parent,
a sibling, or even a pet.
Effects of child emotional abuse
Emotional abuse is often considered as less grave than other forms of abuse
because it has no instant physical effects. But over time emotional abuse can have
very grave long term effects on a child’s social, emotional and physical health and
development.
Emotional abuse and risk taking behavior: - A child who is being
emotionally abused by caregivers, parents, and siblings or in neighborhood
may develop risk taking behaviors such as robbery, aggressive behavior and
usually running away from home.
Emotional abuse and mental development: - Emotional abuse can also
increase the risk of developing mental health problems, eating disorders or
self-harming. Some research studies propose that there’s a significant
correlation between emotional abuse eating and language. If emotional abuse
continues when the child gets older, it can have more serious consequences.
Adolescents who have been emotionally abused over a long period of time
are more likely to hurt themselves like self-harm and experience other
mental health problems (Shaffer et al, 2009).
Emotional abuse and emotional development: - Emotional abuse can limit
a child's emotional development, including their ability to attend, feel and
communicate emotions properly, and to manage their emotions. Children
who usually grow up in such places where they always have to face rebuking
and belittled may experience problems like insecurity, worthlessness and
anger. One of the most significant problems with emotional abuse or with
children who don’t get the affection and warmth which they need from their
parents may find it extremely hard to develop and maintain healthy
relationships with other people in their life. Lower satisfaction with life is
often experienced by those adults who had been abused as a child as
compared to those who have lived a life without abuse (Gavin, 2011).
Emotional abuse and Behavioral problem: -Emotional abuse can be a
significant cause for a child with problematic behavior. They might not care
about the way they act or the consequences of their behavior. This is also
identified as negative impulse behavior. Or they may deliberately attempt to
construct an image so that people dislikes them, which is called self-isolating
behavior. Some research has also shown a link between emotional abuse and
attention deficit disorders (Milletich et al, 2010).
2.2.3 Child Sexual Abuse
Child Sexual Abuse (CSA) is a form of child abuse in which an adult or older
adolescent who is in a relationship of accountability, trust or control, uses a child
for sexual stimulation (Medline Plus, 2008). CSA means making inappropriate
touches or interactions between a child and an older or more knowledgeable child
or adult (stranger, sibling, parent, or caretaker), when the child is being used as an
object of gratification for the older child’s or adult’s needs. Such contacts or
interactions are carried out against the child using power, deception, bribes,
pressure or demands (UNICEF, 2001). Child sexual abuse (CSA) is defined as the
misuse of power and authority, combined with force or compulsion, which leads to
the misuse of children in situations where adults, or children sufficiently older than
the victim to have greater strength and power, seek sexual gratification through
those who are developmentally immature, and where, as a result, consent from the
victim is a non-concept. Such gratification can involve explicit sexual acts, or may
involve persistent and inappropriate actions not directly involving contact (Miller
et al. 2007).
Exposing a child to sexual situations or material is sexually offensive, whether or
not touching is involved. There are 2 different types of child sexual abuse. These
are called contact abuse and non-contact abuse.

Contact abuse involves touching activities where an abuser makes physical


contact with a child. It includes: Sexual touching of any part of the body
whether the child's wearing clothes or not;Rape or penetration by putting an
object or body part inside a child's mouth, vagina or anus;Forcing or
encouraging a child to take part in sexual activity;Making a child to take off
their clothes, touch someone else's genitals or masturbate.
• Non-contact:- involves non-touching activities, grooming,
exploitation, persuading children to perform sexual acts over the internet and
flashing. It includes: Encouraging a child to watch or hear sexual acts; Not
taking proper measures to prevent a child being exposed to sexual activities
by others; Meeting a child following sexual grooming with the intent of
abusing them; Online abuse including making, viewing or distributing child
abuse images; Allowing someone else to make, view or distribute child
abuse images; Showing pornography to a child;Sexually exploiting a child
for money, power or status (child exploitation).
Effects of child sexual abuse
CSA and Nervous system: - Alexander (2011) calls sexual abuse a "chronic
neurologic disease" and discusses how the effects create decades of negative
consequences for victims. The consequences of child sexual abuse can
include depression, eating disorders, post-traumatic stress and an impaired
ability to cope with stress or emotions (Allnock et al, 2009). Child sexual
abuse can have a more fundamental effect on brain functioning, where a
child's brain becomes damaged by the abuse they have suffered (Mizenberg,
Poole and Vinogradov, 2008). The effects of sexual abuse can include
dissociation, memory impairment and reduced social functioning
(Whitehead, 2011).
• Self harm: - aggression towards self as in self-blame, self-harm and suicide
are common consequences of sexual abuse. A study by Calder (2010) found
participants sexually abused in childhood were more than twice as likely to
consider committing suicide in later life.
• Sexual health: -Being sexually abused as a child, especially when that
abuse is not discovered, can lead to confused ideas about relationships and
sexual behavior.
• Emotional and Physical damage: - Sexual abuse can also have physical
consequences for children, from sexually transmitted diseases to pregnancy.
These physical effects add to the significant emotional and psychological
damage inflicted by the abuse (Whitehead, 2010).
• Guilt and shame: - Children who are sexually abused can be manipulated
by their abuser to believe that the abuse is their fault. The feelings of shame
and guilt that come from the abuse can reduce the likelihood of that child
telling anyone about the abuse (Allnock, 2009).
• Post Traumatic stress disorder: - Some people block out the abuse –
meaning that they don’t remember parts of their childhood. It can also lead
to symptoms of post traumatic stress disorder. If a child doesn't tell anyone
about the abuse, if it isn't discovered or when children don't receive the right
kind of help and support, the damage can last a lifetime (Goodyear-Brown,
2012).
2.2.4 Neglect Abuse
It is a pattern in which the child’s basic needs, which include sufficient food,
garments, security, sanitation, or care is denied. Child neglect is not always easy to
identify. In cases of serious illness or injury, or untreated depression or anxiety,
sometimes, a parent might become physically or mentally unable to care for a
child. Other times, substance abuse including alcohol or drug abuse may seriously
impair judgment and the ability to keep a child safe. Neglect is an act of omission,
where people, typically caregivers, fail to provide adequate care to another person
dependent on them. There are various forms of neglect including physical, medical,
emotional, and educational.
According to Gaudin (1993), defining neglect includes analysis of the following
items:Minimally adequate types of care that are required by children; Actions that
would constitute neglectful behavior. Intent of the action (or lack of action);
Effects or potential effects on the child’s health, safety, well-being, development,
and so on; Situational factors (poverty, etc.).
In general, the four most common forms of neglect are defined as follows,
according to American Humane Society.
• Physical Neglect: - Physical neglect accounts for the majority of cases of
neglect that are reported. Physical neglect generally involves the parent(s) or
caregiver(s) not providing the child with basic provisions needed for
survival such as adequate food, clothing, supervision, and/or shelter.
Because these are important to our survival, failure to provide these
necessities can have long-term consequences including developmental
concerns, cognitive deficits, and/or mental health issues. For example, a
father/mother who eats all of the food in the household and does not provide
food for his/her children may be neglecting a need related to physical
neglect.
• Medical neglect: - Medical neglect is the failure to provide suitable health
care for a child when the means exist to provide such care. In another words,
financially, a person is capable of providing access to health care services
and does not do so. This is an important distinction because the law may
view a lack of medical care due to poverty in a different way than a lack of
medical care due to a motivation issue. If a child breaks his arm and his
parents refuse to take him to the doctor because of inconvenience, this would
be viewed differently than a family who does not seek medical services due
to financial concerns and lack of access. Mental health professionals and
Child Protection services would not necessarily look at this delay in care as
neglect, but a lack of available resources. The delay in care may have
harmful effects, however, as waiting many months to address a problem that
is currently an issue is unacceptable.
• Educational Neglect: - Educational neglect involves the failure to provide
adequate educational resources to a child of school age. Doesn’t allow child
to go school is a form of educational neglect.
• Emotional Neglect:-Emotional, or psychological, neglect may include
engaging in unstable interactions in front of the child (domestic violence),
refusing access to mental health care, withholding affection, ignoring,
rejecting, isolating the child, or exploiting. Poor emotional development can
lead to severe psychological consequences, including social skill concerns,
substance abuse, poor self-esteem, and/or destructive decision making For
example, a mother who calls her son names multiple times a day and
withholds affection and praise may be neglecting his emotional needs.
Perpetrators of neglect may lack understanding of child development (which
may lead to unnecessary frustration or a lack of necessary care), may be
single parents, may be in financial distress, may report greater mental health
concerns, may have a history of substance abuse, may have been previously
victimized, and may be younger in age (Children’s Bureau, 2011).
Effects of neglect
Children who have been neglected may experience short-term and long-term
effects that last throughout their life. Children who don’t get the love and care they
need from their parents may find it difficult to maintain healthy relationships with
other people later in life, including their own children. Children who have been
neglected are more likely to experience mental health problems including
depression and post-traumatic stress disorder. Young people may also take risks,
such as running away from home, breaking the law, abusing drugs or alcohol, or
getting involved in dangerous relationships - putting them at risk from sexual
exploitation.
2.3 Reporting Child Abuse; The Manual Method
It is the duty of every local authority to promote and safeguard the welfare of all
children living in their area. If you suspect a child is at risk of abuse or is
experiencing abuse, you should:
• In the first instance contact your local authority children’s services
department. You can reach them by calling the Local Authority.
• When you are put through to Children’s Services, state that you want to
make a Child Abuse “referral”. This simply means you want to report a case
of child abuse.
• You will be asked to provide further details about the case you are reporting.
Please note that you do not have to provide your personal details.
• The local authority is obliged to make an investigation. If you do not see any
changes in the case you have reported. Please follow up with another phone
call.
• If nothing happens, you can contact organizations such as AFRUCA and
they will pursue the case until action is taken. Our contact details are at the
back of this publication.
2.4 Review Of Related Works On Child Abuse
According to Alister Lamont in his work on child abuse titled effects of child
abuse and neglect for child and adolescent, he explained that Child abuse and
neglect is a social and public health problem in every country, as well as a
children’s rights issue. Abuse and neglect can lead to a wide range of adverse
consequences for children and young people. Alister went on to examine in his
research work the possible effects of child abuse and neglect and to explore
whether different types of maltreatment are associated with specific adverse
consequences in childhood and adolescence. He went on in the research work by
examining key topics like types of child abuse and neglect, factors affecting the
consequences of child abuse and neglect, what increases the risks for or protect
against adverse outcomes,consequences of child abuse and neglect, and the
research work concluded by proposing that Child abuse and neglect may lead to a
wide range of adverse consequences for children and adolescents. Research
suggests that specific types of abuse are more closely related to some adverse
outcomes than others; for example, the links between physical abuse and violent or
aggressive behaviour. However, experiencing chronic and multiple forms of abuse
increases the risk of more damaging and severe consequences for children and
young people.

In 2012, Child Protective Services (CPS) agencies estimated that about 9 out of
1000 children in the United States were victims of child maltreatment. Most (78%)
were victims of neglect. Physical abuse, sexual abuse, and other types of
maltreatment, were less common, making up 18%, 9%, and 11% of cases,
respectively ("other types" included emotional abuse, parental substance abuse,
and inadequate supervision). According to data reported by the Children’s Bureau
of the US Department of Health and Human Services, more than 3.5 million
allegations of child abuse were looked into by child protective services who in turn
confirmed 674,000 of those cases in 2017. [194] However, CPS reports may
underestimate the true scope of child maltreatment. A non-CPS study estimated
that one in four children experience some form of maltreatment in their lifetimes,
according to the Centers for Disease Control and Prevention (CDC).
According to a report by the WHO, As of 2014, an estimated 41,000 children under
15 are victims of homicide each year. this number underestimates the true extent
of child homicide; a significant proportion of child deaths caused by
maltreatment are incorrectly attributed to unrelated factors such as falls, burns, and
drowning. Also, girls are particularly vulnerable to sexual violence, exploitation
and abuse in situations of armed conflict and refugee settings, whether by
combatants, security forces, community members, aid workers, or others.
According to David Finkelhor who tracked Child Maltreatment Report (NCANDS)
data from 1990 to 2010, sexual abuse had declined 62% from 1992 to 2009 and the
long-term trend for physical abuse was also down by 56% since 1992. He stated:
"It is unfortunate that information about the trends in child maltreatment are not
better publicized and more widely known. The long-term decline in sexual and
physical abuse may have important implications for public policy.
2.5 Database And Database Management System
A database is a collection of data, typically describing the activities of one or
more related organizations. For example, a university database might contain
information about the following:
Entities such as students, faculty, courses, and classrooms.
Relationships between entities, such as students' enrollment in courses, faculty
teaching courses, and the use of rooms for courses.
A database management system, or DBMS, is software designed to assist in
maintaining and utilizing large collections of data, and the need for such systems,
as well as their use, is growing rapidly. The alternative to using a DBMS is to use
adhoc approaches that do not carry over from one application to another; for
example, to store the data in files and write application- specific code to manage it.
2.5.1 Advantages Of Database Management System
Data independence: Using a DBMS to manage data has many advantages:
Application programs should be as independent as possible from details of data
representation and storage. The DBMS can provide an abstract view of the data to
insulate application code from such details.
Efficient data access: A DBMS utilizes a variety of sophisticated techniques to
store and retrieve data efficiently. This feature is especially important if the data is
stored on external storage devices.
Data integrity and security: If data is always accessed through the DBMS, the
DBMS can enforce integrity constraints on the data. For example, before inserting
salary information for an employee, the DBMS can check that the department
budget is not exceeded. Also, the DBMS can enforce access controls that govern
what data is visible to different classes of users.
Data administration: When several users share the data, centralizing the
administration of data can offer significant improvements. Experienced
professionals who understand the nature of the data being managed, and how
different groups of users use it, can be responsible for organizing the data
representation to minimize redundancy and for fine-tuning the storage of the data
to make retrieval efficient.
Concurrent access and crash recovery;A DBMS schedules concurrent accesses
to the data in such a manner that users can think of the data as being accessed by
only one user at a time. Further, the DBMS protects users from the effects of
system failures.
Reduced application development time: Clearly, the DBMS supports many
important functions that are common to many applications accessing data stored in
the DBMS. This, in conjunction with the high-level interface to the data, facilitates
quick development of applications. Such applications are also likely to be more
robust than applications developed from scratch because many important tasks are
handled by the DBMS instead of being implemented by the application.
2.5.2 Types of database system
• Hierarchical Database System
• Network Database System
• Relational Database System
2.5.3 Implementation: Database management systems
A database management system (DBMS) is a system that allows to build and
maintain databases, as well as to utilize their data and retrieve information from it.
A DBMS defines the database type that it supports, as well as its functionality and
operational capabilities. A DBMS provides the internal processes for external
applications built on them. The end-users of some such specific application are
usually exposed only to that application and do not directly interact with the
DBMS. Thus end-users enjoy the effects of the underlying DBMS, but its internals
are completely invisible to end-users. Database designers and database
administrators interact with the DBMS through dedicated interfaces to build and
maintain the applications' databases, and thus need some more knowledge and
understanding about how DBMSs operate and the DBMSs' external interfaces and
tuning parameters.
A DBMS consists of software that operates databases, providing storage, access,
security, backup and other facilities to meet needed requirements. DBMSs can be
categorized according to the database model(s) that they support, such as relational
or XML, the type(s) of computer they support, such as a server cluster or a mobile
phone, the query language(s) that access the database, such as SQL or XQuery,
performance trade-offs, such as maximum scale or maximum speed or others.
Some DBMSs cover more than one entry in these categories, e.g., supporting
multiple query languages. Database software typically support the Open Database
Connectivity (ODBC) standard which allows the database to integrate (to some
extent) with other databases.

CHAPTER THREE

METHODOLOGY

3.0 INTRODUCTION
This chapter takes an overview on the system design and the entire research work,
it is important to note that a poorly designed system will equally produce an
incorrect output as such this chapter presents a skeletal approach to the design of
the entire system.

3.1 EXISTING SYSTEM

In the existing system, the researcher takes a look at a situation where when child
abuse is commited , an intended person that want to report first locate a nearby
police unit or social walfare or authorities responsible for handling such cases and
file a manual report for due action to be taken.

The major disadvantage of this manual system is that the user has to go to the
authorities which is a waste of time and can result to death of the child been abuse
if the type of abuse is physical and severe.

Also another disadvantage is that the manual method docunment records and this
reocrds are prone to damages due to physical occurances such as flooding, tear and
abuse of paper docunments etc

3.2 SYSTEM ANALYSIS FOR PROPOSED SYSTEM


The research work proposes a system whereby there are two users, the reporter and
the admin.
The reporter logs into the system and make complaint about a child who has been
abuse. He can also view his profile on the system and finally log out of the system.
But before the user will be able to do all this he will have to first sign up on the
system so that his details will be captured.
The admin on the other hand is incharge of managing all the modules on the
system. He is responsible for making complaints, view all complaints made, edit
complaints, delete complaints as well as manage users ie add, delete, edit user
details on the system.
This proposed system will run on the internet and hence the system can also be
referred to as online child abuse database system.
The technologies that will be deployed for this is html which stands for hypertext
Markup language for the web outline, css which stands for cascading style sheet
for beautification of the website, MySQL which stands for my structured query
language for the database and php for the functionality of the website.
3.2.1 FEATURES OF PROPOSED SYSTEM
• Secured reporter and admin login
• A homepage with menus for about, login, sign up and contact us page.
• A sign up page
• An admin module which permits the admin to perform the functions
of managing all users on the system and also complaints made by people
about child abuse.
• A reporter module which permits normal users to make complaints as
well as view their profile.
3.2.2 ADVANTAGES OF PROPOSED SYSTEM
• Makes it possible for large datasets to be gotten about child abuse.
• Tacking of certain child abuse becomes feasible since the system
provides a platform for certain abuses and what made parents to do that to
children.
• Information about child abuse are readily protected from physical
damage as a result of fire outbreak, floodng and other occurances since
information is been saved on the internet.
• Large information becomes available to other NGOs who wants to
partner in reduction of child abuse.
• With large data sets about child abuse more adverts/ education will be
centered on educating certain category of perents on how to avoid child
abuse.
• Child abuse can be reported from anywhere in the world with once a
user is sign up on the system.

3.2.3 LIMITATIONS OF PROPOSED SYSTEM


• You must be connected or online to be able to access the platform
since its web based.
• A user must be sign up on the system before he will be able to perform
any task.

3.3 SYSTEM ARCHITECTURE

The system architecture is shown below:


Figure 3.1 System architecture for online eLearning website

3.4 DESIGN TOOLS


This section explains the tools used in the development of the vehicle recovery
System.
• Application Server: xampp server is been used for application
deployment and testing.
• Graphical User Interface Development Tools: Visual Code IDE was
used for the design and development of the web pages.
• Unified Modeling Language modeling tools. During the system
modeling process, starUML was used because it is an open source project to
develop fast, flexible, extensible, and freely-available UML/MDA platform
running on Win32 platform.
• Data Base Server: The Project utilizes MySQL database server for
data persistence and retrieval that comes with the php server known as
phpmyadmin.

3.5 SYSTEM UML MODELS


The Unified Modeling Language (UML), an OMG standard since late 1997, is a
graphical language for the modeling and development of software systems. It
provides modeling and visualization support for all phases of software
development, from requirements analysis to specification, to construction and
deployment. The central idea behind using the UML for visual modeling is to
capture the significant details about a system such that the requirements for the
project are clearly understood, solution architecture is developed, and a chosen
implementation is clearly identified and constructed. A rich notation for visually
modeling software systems is needed to accomplish this. The UML not only
provides the notation for the basic building blocks, it also provides for ways to
express complex relationships among the basic building blocks. Such relationships
are captured in the form of UML diagrams. This section demonstrates, with UML
diagrams, how the vehicle recovery system is developed.

3.5.1 USE CASE


A use case refers to as a blueprint of what each user of the system will be doing in
the system. Thus, it covers each role and what each user will be performing and
certain privileges that are restricted to certain users and not granted to certain
users. The use cases also serve as a connection point to the use case document
where the details of the requirements are captured. Fig 3.2 below is the use case
diagram for the development of the online elearning website.

Figure 3.2 Use case diagram showing reporters role on the system child abuse
database system
Figure 3.3 Diagram showing the admin role on the child abuse database
system

In the two use case diagrams above, it explain the roles that each user on the
system or what each user can do on the system.

First is the use case which shows that once the reporter log in to the system, he has
the role of viewing his profile which is generated from the information he provided
while he was filling the signup page. He can also log complaints on the system by
filling in the complaint form after he has clicked on make complaint dashboard. He
can then finally log out of the system by clicking the logout menu.

In the second use case, it lists the roles assigned to the admin of the system. The
admin Is the person in charge of managing the system. He add users into the
system, edit users, delete users, view profile, manage complaints from viewing of
all complaints made, editting them, deleting and generate reports and send to the
necessary authorities for immediate action.

From the above diagram and explanation, its pertinent to note that there are two
major users on the system which include reporter and admin.

3.5.2 CLASS DIAGRAM

The UML class diagram is useful for capturing the static relationships between
different structural elements. Star UML typically improves the productivity and
ensure consistency, and therefore quality, across my entire model. Other similarly
useful capabilities include the ability to query the model on which classes and
messages are unresolved (i.e. unmapped to actual classes or operations in the
model). Another aspect of fleshing out each individual class is to identify attributes
for the class. Attributes represent information that may be requested of the class by
others or that may be required by the class itself to fulfill its responsibilities. At this
stage in the analysis, it is appropriate to identify attributes as generic types such as
number, string, etc. Identifying the relationships between the classes completes the
class diagram for the vehicle recovery System. The relationships specifically
interested in at this stage are association, dependency, and inheritance. Fig 3.4
shows the class diagram for online Child abuse database system
+SIGNUP
*NAME
*PHNENO
*EMAIL
*ADDRESS
*OCCUPATION
*MSTAT
*AGE
*USERNAME
*PASSWORD

1.1
+ABUSE
*CHILDNAME
*ABUSETYPE
*REPORTER
*AREA
*REPORTEDTO
*DATE

Figure 3.4 Diagram of class diagram showing the most vital tables in the Child
abuse database system
3.5.3 ACTIVITY DIAGRAM
These are graphical representations of workflows of stepwise activities and
actions with support for choice, iteration and concurrency. In the Unified Modeling
Language, activity diagrams are intended to model both computational and
organizational processes (i.e. workflows). Activity diagrams show the overall flow
of control. Activity diagrams are constructed from a limited number of shapes,
connected with arrows. The most important shape types: rounded
rectangles represent actions; diamonds represent decisions; bars represent the start
(split) or end (join) of concurrent activities; a black circle represents the start
(initial state) of the workflow; an encircled black circle represents the end (final
state). It contains arrows running from the start towards the end and represents the
order in which activities happen.
The specific usage of activity diagram is to model the control flow from one
activity to another. This control flow does not include messages. The activity
diagram is suitable for modeling the activity flow of the system. An application can
have multiple systems. Activity diagram also captures these systems and describes
flow from one system to another. This specific usage is not available in other
diagrams. These systems can be database, external queues or any other system. Fig
3.4 shows the activity diagram for online elearning website.
Figure 3.5 Activity diagram for the child abuse dataabase system

3.6 DATABASE TABLE DESIGN

One of the most important software design consideration is how data will be stored
and presented in the database. This section covers the database tables integrated
into the online eLearning website. The database sql table structures can be seen
from figure below.
Table 3.1 Signup table
s/no Field name Data type
1 name varchar(200)
2 phneno varchar(200)
3 email varchar(200)
4 address varchar(200)
5 occupation varchar(200)
6 mstat varchar(200)
7 age varchar(200)
8 username varchar(200)
9 password varchar(200)

Table 3.2 complaints table


s/no Field name Data type
1 Child name varchar(200)
2 Type of abuse varchar(200)
3 by varchar(200)
4 area varchar(200)
5 Reportedto varchar(200)
6 Dateof report varchar(200)

CHAPTER FOUR
RESULTS AND DISCUSSION
4.0 SOURCE CODES
This Child Abuse Database System was written using HTML for the front-end
user interface, Php for the functionality.
4.1 HOW TO RUN THE PROGRAM
This application requires the following hardware and software to function:
Hardware Requirement:
The following under listed hardware requirements are needed for the testing of this
system.
1. Color Monitor
2. 512MB Random Access Memory (RAM Size)
3. 1 Gigabyte Hard Disk Drive
4. Keyboard
5. Mouse
Software Requirement
The software requirements for the system include:
• Web Browser Application (java script enabled) the system was tested
with Google chrome, Mozilla and opera mini web browsers.
• Xampp application server
• MySQL Database

4.2 SYSTEM IMPLEMENTATION


This section is concerned with detail explanation of the functionality of the system
been designed.
4.2.1 STARTING THE APPLICATION
First of all the child abuse databse system is designed and implemented in php, a
server or script language and that means before you run it, you have to start your
server. For the purpose of this research work, we make use of the xampp server.
Therefore for you to start the child abuse database system, start the xampp server
and then launch your browser. After launching the browser, type in the url:
localhost://xampp/child abuse database system
After you have type in the URL above in your browser, the index page below is
been displayed for you.

Figure 4.1 Homepage


4.3 SYSTEM OUTPUT
In the above homepage, it can be seen that there are four basic menus: Home,
About, Signup, and Login. Each of the menus will redirect a specific page assigned
to it.
Therefore, about page, he is taken to the page displayed below:

Figure 4.2 About Page


once the user click on the Signup Page, he is redirected to the page shown below:
Figure 4.3 Sign up Page
if the user clicks on the login page, he is taken to the page shown below:

Figure 4.4 Login Page


in the above each user with a password is assigned a role of either a reporter or
admin, if he enters a username and the role is for reporter, hes taken to the reporter
dashboard as shown below:

Figure 4.5 Reporter Dashboard


On the reporter dashboard, the reporter is permitted to make coplaint or report
incidence of child abuse, he can also view his pofile and then logout. Below is a
screenshot of how the view profile page looks like:

Figure 4.6 Reporter View Profile Page


if the reporter clicks on make complaint menu, hes taking to the page shown below where he
report cases of child abuse by filling in the details.

Figure 4.7 Child Abuse Report Dashboard


the logout page redirect the user back to the login page.
If the username and password entered earlier has a role for admin, the user is taken
to admin dashboard where he can view his profile, manage users which include
adding new users, editting users, deleting users;he can also do same for complaints
made about child abuse and then he can log out. Below is a screenshoot of how
the view child abuse records page looks like;
Figure 4.8 child Abuse View Reported cases Page
CHAPTER FIVE

SUMMARY, RECOMMENDATION AND CONCLUSION

5.0 INTRODUCTION

This chapter gives an overview of this research project in the summary section. It
handles the summary of the whole research work, recommendation for its use, and
then conclusions.
5.1 SUMMARY

With the emergence of information technology, a lot of events have been recorded
in computer industry. One area that is hugely underestimated is the aspect of data
storage in a secured format. Hence from the system under review, it can be seen
that a model has been developed which handles issues of data storage for cases of
child abuse. This system can be use to make lot of decisions and generate reports
concerning child abuse and it runs on the internet using web technologies.
5.2 RECOMMENDATION

As the world moves gradually away from the manual method of storing date which
prone to a lot of physical hazards, it becomes more important for this manual
methods to be taken to the cloud. This system more or less handles only situations
where the child abuse is been reported.

However, in as much as its an online platform and relies basically on internet


subscription, it remains a more secured way of storing information or large data
sets for cases of child abuse since manual records can be tempered with by
physical occurrences such as water, flooding etc

5.3 CONCLUSION

The child abuse database system will go a long way in helping NGOs ,
Government and concern citizens make decisions about child abuse and possible
ways to reduce it if not totally eliminate child abuse.
BIBLOGRAPHY

Aekseeva, L. S. (2007). Problems of child abuse in the home. Problems of child abuse in
the home, 49(5), 6-18.

Alexander, R. (2011) Introduction to the special section: medical advances in child sexual
abuse, part 2. Journal of Child Sexual Abuse, 20(6): 607-611.

Allnock, D, et al (2009) Sexual abuse and therapeutic services for children and young
people: the gap between provision and need: full report. London: NSPCC

Alister Lamont(2010) Effect of child abuse and neglect for child and adolescent. Full
report for national child protection clearinghouse.

American Humane Society (n.d.).Child neglect, 1.Retrieved from


http://www.americanhumane.org/children/stop-child-abuse/fact-sheets/child

neglect.html.

Barnett, D., Manly, J., &Cicchetti, D. (1993). Defining child maltreatment: the interface
between policy and research. In D. Cicchetti& S. Toth (Eds.), Child abuse, child
development, and social policy. Advances in applied developmental psychology (Vol. 8,
pp. 7–73).

Bromfield, Leah; Holzer, Prue. "Australian Institute of Family Studies Submission to the
Special Commission of Inquiry into Child Protection Services in NSW". National Child
Protection Clearinghouse. CiteSeerX 10.1.1.385.2444
(https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.385.2444).

Calder, J., McVean, A. and Yang, W. (2010) History of abuse and current suicidal
ideation: results from a population based survey. Journal of Family Violence, 25(2): 205-
214.

Child Sexual Abuse. Medline Plus; U.S. National Library of Medicine, 2008.04.02.

Child Welfare Information Gateway (2009) Understanding the effects of maltreatment on


brain development (PDF). Washington, D.C.: United States Department of Health and
Human Services.
Children’s Bureau. (2011). Child maltreatment 2011, 1–251. Retrieved from

http://www.acf.hhs .gov/sites/default/files/cb/cm11.pdf#page=28

Gavin, H. (2011) Sticks and stones may break my bones: the effects of emotional

abuse. Journal of Aggression Maltreatment and Trauma, 20(5): 503-529.

Goodyear-Brown, P. (ed.) (2012) Handbook of child sexual abuse: identification,


assessment and treatment. Hoboken, New Jersey: Wiley.

Gover, A., & MacKenzie, D. (2003). Child maltreatment and adjustment to juvenile

correctional institutions. Criminal Justice and Behavior, 3, 374–396.

Hill, A. (2003). Issues facing brothers of sexually abused children: Implications for

professional practice. Child & Family Social Work, 8(4), 281–290.

Holtzman, D., Greene, B. Z., Ingraham, G. C., Daily, L. A., Demchuk, D. G., & Kolbe, L.
J. (1992). HIV education and health education in the United States: A national survey of
local school district policies and practices. Journal of School Health, 62, 421-427.

Howe, D. (2011) Attachment across the life course: a brief introduction. Basingstoke:

Palgrave Macmillan.
I. Fayaz (2019).Child Abuse: Effects and Preventive Measures. International Journal of
Indian Psychology, 7(2), 871-884. DIP:18.01.105/20190702, DOI:10.25215/0702.105

Kaplan, T. (2009). Handbook Children and Adolescents with Mental Health. London:

RCPsych Publication.

Kilpatrick, D., Ruggiero, K., Acierno, R., Saunders, B., Resnick, H., & Best, C. (2003).
Violence and risk of PTSD, major depression, substance abuse/dependence, and
comorbidity: Results from the National Survey of Adolescents. Journal of Consulting and
Clinical Psychology, 71(4), August, pp. 692–700.

Klein, D. C., & Goldston, S. E. (1977). Primary prevention: An idea whose time has
come. Department of Health, Education and Welfare, Publication No. (ADM) 77-447.

Washington, DC: U.S. Government Printing Office.

Miller, B. J., Cardona, J. R. P., & Hardin, M. (2007). The use of narrative therapy and

internal family systems with survivors of child sexual abuse: examining issues related

to loss and oppression. Journal of Feminist Family Therapy, 18(4), 1–27.

Milletich, R. J., et al (2010) Exposure to interparental violence and childhood physical


and emotional abuse as related to physical aggression in undergraduate dating

relationships. Journal of Family Violence, 25(7): 627-637.


Minzenberg, M. J., Poole, J. H. and Vinogradov, S. (2008) A neurocognitive model of
borderline personality disorder: effects of childhood sexual abuse and relationship to
adult social attachment disturbance. Development and Psychopathology 20(1): 341-68.

Norman, R. E. et al (2012). The long-term health consequences of child physical abuse,


emotional abuse, and neglect: a systematic review and meta-analysis. PLOS Medicine
9(11).

Scarpa, A., Haden, S., & Abercromby, J. (2010). Pathways linking child physical abuse,
depression, and aggressiveness across genders. Journal of Aggression, Maltreatment &
Trauma, 19, 757–776.

Shaffer, A., Yates, T. M. and Egeland, B. R. (2009). The relation of emotional


maltreatment to early adolescent competence: developmental processes in a prospective
study. Child Abuse and Neglect, 33(1): 36-44.

Slavin, R. E., Karweit, N. L., & Madden, N. A. (1989). Effective programs for students at
risk. Needham Heights, MA: Allyn& Bacon.

Whitehead, J. (2010). Back to basics: sexual abuse. Protecting Children Update, 71: 8-9.

Whitehead, J. (2011). How do children cope with sexual abuse? Protecting Children
Update, 84: 9-10. World Health Organization (WHO). (2002). World report on violence
and health. Geneva: World Health Organization.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy