Development of Secure Electronic Cybercrime Cases Database System for the Judiciary

Full Text (PDF, 1208KB), PP.1-16

Views: 0 Downloads: 0

Author(s)

Olawale Surajudeen Adebayo 1,* Joshua Bulus Micah 1 Ganiyu Shefiu Olusegun 2 Ishaq O. Alabi 1 Lateefah Abdulazeez 1

1. School of Information and Communication Technology, Federal University of Technology Minna

2. School of Mathematics and Computing, Kampala International University, Uganda

* Corresponding author.

DOI: https://doi.org/10.5815/ijieeb.2022.01.01

Received: 17 Oct. 2021 / Revised: 20 Nov. 2021 / Accepted: 28 Dec. 2021 / Published: 8 Feb. 2022

Index Terms

Electronic Cybercrime Record, Cybercrime Database System, Case Management System, Judiciary Cybercrime Database, Rapid Application Development, Cybercrime Cases Digitalization

Abstract

The recent covid-19 pandemic created a barrier to every activity that needed physical interaction and involvement, especially in the judiciary. Careful research of some courts in Nigeria shown that case records are still been manually processed and stored and some courts operate a semi-digital and semi-manual processing pattern, which also has its own shortcoming of preprocessing manual records and converting them into digital records and physical presence is required to access court records. This research develops a secure electronic Cybercrime Cases Database System (eCCDBS), for prosecuted cybercrime in the judicial service in Nigeria. The system will provide an efficient method for collecting, retrieving, preserving, and management of court case records. The Rapid Application Development (RAD) methodology is used for the system development, because of its speed and time friendliness and can be easily restructured to meet the client’s requirement at any point in time during the development life span. RAD can also present a prototype of the final system software to the client. Access control mechanism and secure password hashing were used to ensure the security of the system. The system was implemented and evaluated through deployment and found to have functioned according to the specification. The application subunits of records’ creation, submission, modification, deletion, retrieval, and storage functioned effectively. Hence this system provides a secure online repository specifically for cybercrime case records that have elements of confidentiality, integrity and availability.

Cite This Paper

Olawale Surajudeen Adebayo, Joshua Bulus Micah, Ganiyu Shefiu Olusegun, Ishaq O. Alabi, Lateefah Abdulazeez, "Development of Secure Electronic Cybercrime Cases Database System for the Judiciary", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.14, No.1, pp. 1-16, 2022. DOI:10.5815/ijieeb.2022.01.01

Reference

[1]Alnieriute, M. O. Z., & Ell, F. E. B. (2021). Technology and the judicial role. Cambridge University Press, 116–142.
[2]Aniekwe, C. A. (2019). Legal Framework for the Use Of Information and Communications Technology (Ict) in the Nigerian Justice System: A Call for Review. IJOCLLEP, 3(Washington 2001), 125–132.
[3]Bharuka, D. (2020). Need for a uniformly enabled ICT for the Indian Judiciary. National Policy for ICT Enablement of the Indian Judiciary, August 2005, 1–4.
[4]Buchanan, J. R., Fennell, R. D., & Samet, H. (1984). A Database Management System for the Federal Courts. AMC, 9(1), 72–88.
[5]Ekpendu, C. M. (2021). Embracing ICT as an Effective Tool in Legal Education and Administration of Justice in Nigeria. IJOCLLEP, 3(1), 32–42.
[6]Hasan, M. I., & Rupa, F. J. (2021). Digitalization of Bangladesh Judiciary and Access to Justice. Asian Journal of Social Sciences and Legal Studies, 3(3), 49–58. https://doi.org/https://doi.org/10.34104/ajssls.021.049058
[7]Ibekwe, C. S. (2021). ICT in the Administration of Justice : Challenges and Prospects for Labour and Productivity. JOURNAL OF COMMERCIAL AND PROPERTY LAW, 8(17), 1–9.
[8]Lageson, S. E. (2019). 28 . Creating digital legal subjects : the use of online criminal court records for research. Elgaronline, 394–403. https://doi.org/10.4337/9781788113205.00039
[9]Lederer, F. I. (2021). The Evolving Technology-Augmented CourtroomBefore , During , and After the Pandemic The Evolving Technology-Augmented Courtroom Before , During , and After the Pandemic. Vanderbilt Journal of Entertainment & Technology Law Volume, 23(2).
[10]Letkowski, J. (2015). Doing database design with MySQL. ResearchGate, February, 1–15. https://www.researchgate.net/publication/271910489
[11]Lupo, G., & Bailey, J. (2014). Designing and Implementing e-Justice Systems: Some Lessons Learned from EU and Canadian Examples. OEN ACESS Laws, 353–387. https://doi.org/10.3390/laws3020353
[12]Mousa, A., Karabatak, M., & Mustafa, T. (2020). Database Security Threats and Challenges. IEEE, 1–5.
[13]Poljak, R., Pošcic, P., & Jakšic, D. (2017). Comparative Analysis of the Selected Relational Database Management Systems. MIPRO, 1496–1500.
[14]Salkute, S. R. (2019). Effective Management in District Court Record Scanning and Digitization. International Journal of Information , Business and Management, 11(4), 99–111.
[15]Schmitz, A. J. (2020). Dangers of Digitizing Due Process. Social Sciences Research Network Electronic Paper Collection, 1–26. http://ssrn.com/abstract=3525757AElectronic
[16]Singh, P., & Dr. Kuljit, K. (2016). Database Security Using Encryption. ResearchGate, July 2015, 353–358. https://doi.org/10.1109/ABLAZE.2015.7155019
[17]Singh, S. P., Mishra, A. K., Maurya, A. K., & Tripathi, U. N. (2016). Enforcing Database Security using Encryption and Secure Database Catalog. International Journal of Engineering Research & Technology (IJERT), 5(01), 359–363.
[18]Sule, I. (2021). ICT-enabled Applications for Decision-Making by the Courts : Experiences From Malaysia and Nigeria. International Journal of Law Government and Communication ·, March. https://doi.org/10.35631/IJLGC.6220018
[19]Valiant, G., & Valiant, P. (2020). Secure-In-Between-Accesses Database Security. 1–20.
[20]Wan Satirah Saman, & Haider, A. (2017). E-Court : Technology diffusion in court management. ResearchGate, April, 1–13. https://www.researchgate.net/publication/287089385
[21]WaveMaker. Rapid-application-development-model. Retrieved from WaveMaker: https://www.wavemaker.com/rapid-application-development-model/. April 17, 2020.