CHAPTER ONE
1.0 INTRODUCTION
The definition of management cannot easily be stated in one line of
thought.
Individuals differ in their understanding and definitions of the term.
Advanced Dictionary of current English defined management as
skilful treatment and delicate contrivance.
Obikeze and Obi (2004) defined management as the process of
combining and utilizing or allocating organization inputs (me,
material and money) by planning, organizing, directing and
controlling for the purpose of producing outputs (goods and services
or whatever the object are) desired by customers so that the
organizational objectives are accomplished.
Drucker (1989) sees management as denoting a function as well as
the people who discharge it, a social position and authority, and a
discipline.
1
Some scholars see management as a collective noun referring to a
certain group of people occupying the top echelon of organization.
Management can be seen as the process of utilizing the available
human and material resources in order to achieve the goals and
objective of an organization. In essence, management involves
combing and utilizing men, material and money to achieve desired
results in an organization.
Prison is an institution designed to securely house people who have
been convicted of crimes. These individuals known as prisoners or
inmates are kept in continuous custody on a long term basis. The
Encyclopedia of social sciences defines prison as a place where
persons whose liberty has been curtailed by law are confined to
assume the successful administration of justice or application of panel
treatment. Individuals who commit the most serious crimes are sent to
prison for one more years, the more serious the offense, the longer the
prison term imposed.
2
Before the advent of British rule in Nigeria, there were, in the various
towns and villages diverse ways of punishing miscreants. These
varied from one community to the other and were dictated largely by
the tradition, customs and belief of a people. One thing seems clear
however, that is natural that a wrong doer whose continued freedom
and liberty pose a threat to the general community should be
restrained. It was therefore common to lock up a suspected wrong
doer till a competent body or authority “tried” him/her or as a means
of punishment (mostly prescribed by the adjudicating body or
authority) binds him with shackles etc., there by confining and
restraining him. Ikeazor (1986).
In our traditional societies, the Ogboni house serves as a sort of
prison in
Yoruba land. The Edo’s, the Ewedo building served only for keeping
those to be sold but also those offenders who had to be put away for
sometimes. It is also on record that in 1908 Sir Frederick Lugard
recorded the existence of prisons among the Fulani ethnics who used
3
them both for incarcerating offenders and for locking away
condemned persons. The Ibo’s built darkroom or houses were
constructed by communities, villages and powerful individuals in the
society for the purpose of confining offenders and captives.
Nnonyelu and Obiajulu (1997). Thus the concept and reality of
imprisonment in Nigeria came with the arrival of British Colonialists
in Nigeria. The British people were for administrative conveniences
and imperialist motives that any other reason else. The penal system
was introduced into Nigeria as an ancillary measure led to the
promulgation of staggering member of regulations. The Nigerian
penal system as it stands today has its roots in country’s colonial past.
1.1 BACKGROUND OF THE STUDY
Management of prisons in Nigeria has long been a neglected area,
which has recently been incorporated in the e-governance program of
Government of Nigeria. Currently a rudimentary process of storing all
the prisoner data in manual files and registers is in place. The Prison
Management System project will integrate all the prisoner data into a
4
single integrated system, which will in turn result all the information
being present in a digital format.
ICT in prisons was initiated in the year 2002 at Delhi Prisons, Tihar.
The Tihar Prisons Complex in New Delhi is the biggest prison
complex in Asia comprising of 9 prisons and one District Jail at
Rohini with a total strength of more than 11,000 prisoners against a
normal sanctioned capacity of 6250 prisoners. In a year about 70,000
- 80,000 inmates remain lodged in these prisons for different duration
and crimes committed by them. This prison population has about 80%
under trials and includes about 480 women inmates. About 400
inmates are foreigners from different parts of the world. Many high
security criminals also live here. There has been a substantial increase
in number of prison inmates coming to Tihar because of a
phenomenal increase in the crime scene at Delhi that has resulted in
the increase of the ICT needs and its management at the Tihar Jail
Complex.
5
Nearly 1700-1800 visitors meet their relative inmates’ every day.
There was manual system of booking (meetings) in each jail for its
respective inmates. Centralized visitor record was not available.
There was lack of exchange of visitors’ information within jails and
prison headquarters. No provision for identification / detection /
verification of visitors was there.
Managing the prisoner record and monitoring of prisoner / visitor was
always difficult since most of the records were normally maintained
manually, so the concerned authorities were required to go through all
the registers to find out the details and status of the inmate as well as
of the visitor.
In order to cope up with the increasing number of prisoners being
lodged in, the Tihar Administration required a re-engineering and
rationalization of their key business processes and functions of
prisoners’ related information and their computerization in order to
speed up the processing of information need of courts and various
other national agencies.
6
As the technology evolution is taking place, there arose a need for
centralization of prisoner’s data to facilitate information exchange
and data sharing to the users of the prison. It shall reduce
administrative overheads, speed up responsiveness to users, reduce
risks involved in inmate’s custody, eliminated obsolete processes and
reap cost-cutting benefits.
1.2 STATEMENT OF PROBLEM
Management of prisons in Nigeria is still at a nascent stage and
follows rudimentary processes. Most of the prisons in Nigeria have a
collection of manual files and registers to store prisoner/criminal
records. This is a very inefficient and cumbersome way of storing
records, which greatly impedes the flow of critical information as
well as makes looking up of information time consuming. Also,
different files and registers are required to store the information
which is relevant to a single prisoner. This hinders the profiling
process of prisoners.
7
1.3 AIM & OBJECTIVES OF THE STUDY
The main purpose behind the implementation of the Prison
Management System (PMS) was to enhance the administrative
capabilities of the jails in terms of monitoring and security of the
prison while improving the efficiency and productivity of the Prisons.
The main goals of the project are enunciated below:
To develop a system that can be monitored properly by the top
officials.
To develop a system that would made sure no impersonation of
the prisoners happens, by proper validation and authentication of
the prisoner’s identity
To create the availability of data in digital form for preservation,
analysis and reporting.
1.4 SIGNIFICANCE OF THE STUDY
This project is very essential in the prisons and other social security
organization, because it gives a constructive solution to most
8
problems faced in keeping records of the inmates in the prison. Some
areas of its benefit are:
Automatic detection of duplication
Immediate generation of report on categorization of prisoners on
basis of their cases, period of confinement etc.
Automatic calculation of Remission to be granted to a convict
prisoner for good behavior, discipline etc.
Reduction in the cost (Saving of resources) of physical production
of prisoners in Courts.
1.5 SCOPE OF THE STUDY
The basic purpose of this study is to develop an online system for
prison management. The system developed covers prisoner’s
information such as picture, conviction, offence, visitors, address, jail
term record etc.
9
1.6 LIMITATIONS OF THE STUDY
Generally, a study of this nature would have some constraints such as
time, money and data collection method. I wish to say that data
collection method used has the limitation of rigidity (people finding it
difficult to respond to questions) thereby restricting the information
obtained. Also, lack of finance is another obstacle that hindered a
wider consultations and research on the project. Some materials may
have some cost implications, which may be above the budgeted
money for the research work.
1.7 DEFINITION OF TERMS
Data: This can be defined as facts about the organization and its
business transaction.
Information: This can be defined as data that has been transformed
and organized by processing and purposeful intelligence.
10
Information system: This is an arrangement of people, data,
processes and interface that interact to support and improve day to
day operation in a business as well as support the problem solving
and decision making needs for management and users.
Management: It is the co-ordination of all the resources of an
organization through the process of planning, organization, directing
and controlling in order to attain organizational objectives.
1.8 METHODOLOGY
A thorough investigation of the current system was made in order to
obtain detailed fact about the application area to be re-designed.
Investigation also covered looking at the functional requirement of
the present system and finding out whether the requirements and
objective of the present system are being achieved. In the
investigation proper, several methods of data collection were
employed which includes interviewing of office representatives,
evaluation/ inspection of forms and direct observation. These
11
methods were adopted to ensure the validity of data collected and
relevance of the result after processing the data.
CHAPTER TWO
LITERATURE REVIEW
2.1 DATABASE MANAGEMENT SYSTEM
The introduction of computer into information technology has
massively improved the information need of organization; the success
of this machine is dependent on the knowledge base.
A database is an organized collection of data. The data is typically
organized to model relevant aspects of reality, in a way that supports
processes requiring this information.
Database management systems (DBMS) are specially designed
applications that interact with the user, other applications, and the
database itself to capture and analyze data. A general-purpose
database management system (DBMS) is a software system designed
to allow the definition, creation, querying, update, and administration
of databases.
12
Database management system is typical information processing
system or organizational information system on people’s information.
World Net describes an information system (I.S) as “a system
consisting of the network of all communication channels used within
an organization, and includes software and hardware”. It may also be
defined as “a system that collects and processes data (information)
and provides it to managers at all levels that use it for decision
making, planning, program implementation and control.
The aim of information system in prisons is improving the quality and
accuracy of information provided to all involved as well as assisting
management in compiling and reporting information.
Computerization is a social process for providing access to and
support for computer equipment to be used in activities such as
teaching, accounting, writing, designing, circuits, file processing etc.
computerization entails social choices about the levels of appropriate
investment and control over equipment and expertise, as well as
choices of equipment.
13
Dunlop and Kling (1991), by the early 1990s, computing and
telecommunications accounted for half of the capital investments
made by private firms. However, paper (1980), Feigenbaum and
McCorduck (1983) and Yourdon (1986) stated that the most fervent
advocates of computerization have argued that the actual pace of
computerization in schools, factories and homes is too slow.
King (1986), others emphasize a labor-market pragmatism that we
label “vocational matching”. In this view, people will need computer
skills, such as programming, to compete in future labor markets and
to participate in a highly automated society; a responsible school will
teach some of these skills today. Kling (1986), advocate of computer-
based education promote a utopian image of computer- using schools
as places where students learn in a cheerful, cooperative setting and
where all teachers can be supportive, enthusiastic mentors.
Therefore, a computerized database management system is usually a
system, which is implemented with a computer to achieve the utmost
efficiency and desired goals.
14
Russell, M. (1987) dealt extensively on the need for the use of
computers on such database system like database management
system. In the words of David (2003), at the center of any information
system is a database, which is any collection of related information
grouped together as a simple item. The term can also apply to the
ways in which information is catalogued, analyzed, stored and used
manually.
Database management systems (DBMS) have become a standard tool
for shielding the computer user from details of secondary storage
management. They are designed to improve the productivity of
application programmers and to facilitate data access by computer-
naive end users. There have been several database models. Whichever
conceptual model or database management system is adopted, the use
of a central database management system has a number of advantages
and some costs compared to the commonly employed special purpose
data files. A data file consists of a set of records arranged and defined
for a single application system. Relational information between items
15
in a record or between records is not explicitly described or available
to other application systems. For example, a file of project activity
durations and scheduled times might be assembled and manipulated
by a project scheduling system. This data file would not necessarily
be available to the accounting system or to corporate planners.
A centralized DBM has several advantages over such stand-alone
systems:
Reduced redundancy: good planning can allow duplicate or
similar data stored in different files for different applications to be
combined and stored only once.
Improved availability: information may be made available to any
application program through the use of the DBM
Reduced inconsistency: if the same data is stored in more than
one place, then updating in one place and not everywhere can lead
to inconsistencies in the database.
Enforced data security: authorization to use information can be
centralized.
16
For the purpose of project management, the issue of improved
availability is particularly important. Most application programs
create and own particular data files in the sense that information is
difficult to obtain directly for other applications. Common problems
in attempting to transfer data between such special purpose files are
missing data items, unusable formats, and unknown formats.
As an example, suppose that the Purchasing Department keeps
records of equipment rental costs on each project underway. This data
is arranged so that payment of invoices can be handled expeditiously
and project accounts are properly debited. The records are arranged
by individual suppliers for this purpose. These records might not be
particularly useful for the purpose of preparing cost estimates since:
Some suppliers might not exist in the historical record.
Finding the lowest cost supplier for particular pieces of equipment
would be exceedingly tedious since every record would have to be
read to find the desired piece of equipment and the cost.
17
No direct way of abstracting the equipment codes and prices might
exist.
An alternative arrangement might be to separately record equipment
rental costs in (1) the Purchasing Department Records, (2) the Cost
Estimating Division, and (3) the Company warehouse. While these
multiple databases might each be designed for the individual use, they
represent considerable redundancy and could easily result in
inconsistencies as prices change over time. With a central DBM,
desired views for each of these three users could be developed from a
single database of equipment costs.
A manager need not conclude from this discussion that initiating a
formal database will be a panacea. Life is never so simple. Installing
and maintaining databases is a costly and time consuming endeavor.
A single database is particularly vulnerable to equipment failure.
Moreover, a central database system may be so expensive and
cumbersome that it becomes ineffective. But lack of good information
and manual information management can also be expensive.
18
One might also contrast the operation of a formal, computerized
database with that of a manual filing system. For the equipment
supplier example cited above, an experienced purchasing clerk might
be able to immediately find the lowest cost supplier of a particular
piece of equipment. Making this identification might as well occur in
spite of the formal organization of the records by supplier
organization. The experienced clerk will have his (or her) own
subjective, conceptual model of the available information. This
subjective model can be remarkably powerful. Unfortunately, the
mass of information required, the continuing introduction of new
employees, and the need for consistency on large projects make such
manual systems less effective and reliable.
2.2 MANAGEMENT INFORMATION SYSTEM (MIS)
The concept of the MIS has evolved over a period of time comprising
many different facets of the organizational function. MIS is a
necessity of all the organizations. The initial concept of MIS was to
process data from the organization and presents it in the form of
19
reports at regular intervals. The system was largely capable of
handling the data from collection to processing. It was more
impersonal, requiring each individual to pick and choose the
processed data and use it for his requirements. This concept was
further modified when a distinction was made between data and
information. The information is a product of an analysis of data. This
concept is similar to a raw material and the finished product. What
are needed are information and not a mass of data. However, the data
can be analyzed in a number of ways, producing different shades and
specifications of the information as a product. It was, therefore,
demanded that the system concept be an individual- oriented, as each
individual may have a different orientation towards the information.
This concept was further modified, that the system should present
information in such a form and format that it creates an impact on its
user, provoking a decision or an investigation. It was later realized
then that even though such an impact was a welcome modification,
some sort of selective approach was necessary in the analysis and
20
reporting. Hence, the concept of exception reporting was imbibed in
MIS. The norm for an exception was necessary to evolve in the
organization. The concept remained valid till and to the extent that the
norm for an exception remained true and effective. Since the
environment turns competitive and is ever changing, fixation of the
norm for an exception becomes futile exercise at least for the people
in the higher echelons of the organization. The concept was then
evolved that the system should be capable of handling a need based
exception reporting. This need maybe either of an individual or a
group of people. This called for keeping all data together in such a
form that it could be accessed by anybody and can be processed to
suit his needs. The concept is that the data is one but it can be viewed
by different individuals in different ways. This gave rise to the
concept of DATABASE, and the MIS based on the DATABASE
proved much more effective.
The concept of MIS gives high regard to the individual and his ability
to use information. A MIS gives information through data analysis.
21
While analyzing the data, it relies on many academic disciplines.
These include the theories, principles and concepts from the
Management Science, Psychology and Human Behavior, making the
MIS more effective and useful. These academic disciplines are used
in designing the MIS, evolving the decision support tools for
modeling and decision - making.
The MIS model of the organization changes over a time as the
business passes through several phases of developmental growth
cycle. It supports the management of the business in each phase by
giving the information, which is crucial in that phase. Every model
has critical success factors in each phase of growth cycle and the MIS
model gives more information on the critical success factors for
decision making.
The role of the MIS in an organization can be compared to the role of
heart in the body. The information is the blood and MIS is the heart.
In the body, the heart plays the role of supplying pure blood to all the
elements of the body including the brain. The heart works faster and
22
supplies more blood when needed. It regulates and controls the
incoming impure blood, processes it and sends it to the destination in
the quantity needed. It fulfills the needs of blood supply to human
body in normal course and also in crisis.
The MIS plays the role of information generation, communication,
problem identification and helps in the process of decision making.
The MIS, therefore, plays a vital role in the management,
administration and operations of an organization.
2.3 REVIEW OF PRISON MANAGEMENT SYSTEM
Automating and streamlining the process of prisoner / visitor
movement at Prisons. Followings are the accomplishment in this area
of prison management:
1. Establishment of LAN: Establishment of LAN connecting all
prisons situated in a big wide spread complex using 5,500 meters
of Optical Fiber Cable (12 and 6 core) operated with one Layer - 3
switch supported by 16 Layer - 2 switches in the entire jail
complex.
23
The network has 185 IOs and can be expanded to 300 nodes without
any additions / modifications / disruptions to the existing
infrastructure. Surveys were got conducted and laying of OFC was
found to be the best suitable option;
2. Development and Implementation of PMS: Prison Management
System (PMS) comprises of 12 primary functional modules. More
than 65 reports of various types have been developed under
Client / Server architecture. It has been developed, tested and
implemented. This PMS is having following major features:
Based on Client-Server Architecture and supporting latest GUI
features;
Centralized Database for supporting powerful & fast retrieval of
data;
Monitors physical location of inmate, their movements within and
outside the jail complex, punishments, medical history of the
inmate at the time of his / her arrival at the jail, cases filed against
him, court hearings among other attributes; and
24
Supports more than 65 reports as per the present needs of the
various monitoring agencies like National Human Rights
Commission, National Crime Records Bureau and Tihar Jail itself.
3. Biometric Tools: The PMS has been integrated with biometrics
tools, which stores inmate’s biometric details at the time of entry
and shall be used to authenticate him at the time of their
movement. The biometric based verification and authentication
system is installed in all 9 jails of Tihar Prisons Complex and at
District Jail, Rohini, and New Delhi with facility to store prisoner
photograph. Tihar Prisons was the first prison using this
technology for prisoner’s identification and verification along with
the photograph;
4. Photo pass for visitors: Visitor Management System [VMS] is
implemented at Central
Public Relation Office situated at Gate # 3 and at Gate # 4 of the
Tihar Prisons. All visitors coming to Jail to meet their relative
prisoners are first being photographed and then they are issued photo
25
pass. Details of the visitors are being kept in the database and this
information is shared with police for the investigation purpose. The
meeting slip is generated within 45 seconds. The booking is using the
concept of call Centre. ISO Certification has been obtained for this
process;
5. Video conferencing: The use of videoconferencing facility in
prisons has drastically reduced expenditure incurred as compared
to being physically producing the jail inmates in the courts.
Physical production of an inmate require transportation, escort by
armed police personnel, prevention of fights between inmates and
nearly 6 hours of time wasted by each inmate. Fear of custody
break is always there during the physical production.
There are incidents when prisoners have fled after breaking lockups
in the courtroom or from the custody of armed security personnel
escorting them to court or by armed attack on the police vans by
daredevils. In some cases, there are incidents of clashes between the
prisoners inside the lockup vans during transportation. There is
26
sometimes remote possibility that inmate may get changed during
transportation, which keeps the number intact but inmate is changed.
By the use of videoconferencing, there is a check on all such
incidents; and
6. Cameras: Using analog and digital cameras security has been
enhanced in the Tihar Prison complex. Cameras have been
installed at strategic locations within wards, inside high security
cells, at meeting points where inmates are searched whenever they
are escorted out of jail or are brought inside the jail complex. Each
and every inmate can be watched from a video wall and
surveillance brief is also sent to DG (Prisons) in real time. These
video graphed shots are produced in case of any disputes.
2.4 HUMAN RESOURCE MANAGEMENT (HRM)
The term ‘Human Resource Management’ has been the subject of
considerable debate, and its underlying philosophy and character are
highly controversial. Much of this controversy stems from the
absence of a precise formulation of an agreement on its significance
27
and definition (Storey, 1995), as cited by Bratton and Gold (2003).
Obviously, definition of the subject matter is needed for analysis and
understanding of HRM theory and practice.
HRM has a variety of definitions but there is general agreement that it
has a closer fit with business strategy than previous models,
specifically personnel management. In all the debates about the
meaning, significance and practice of HRM, nothing seems more
certain than the link between HRM and performance (HRM Guide
October 2006). Below are some of the definitions of HRM, although
it can be argued that these will only be ones of several possible
definitions.
De Cenzo and Robbins (1996) defined HRM as the part of the
organization that is concerned with the people dimension, and it is
normally a staff or support function in the organization. HRM role is
the provision of assistance in HRM issues to line employees, or those
directly involved in producing the organization’s goods and services.
Acquiring people’s services, developing their skills, motivating them
28
to high levels of performance, and ensuring their continuing
maintenance and commitment to the organization are essential to
achieving organizational goals. This is much the case regardless of
the type of organization, government, business, education, health,
recreation, or social action. The authors proposed an HRM specific
approach as consisting of four functions- staffing, training and
development, motivation, and maintenance.
In addition, Bratton and Gold (2003) define HRM as the strategic
approach to managing employment relations, which emphasizes that
leveraging people’s capabilities is critical to achieving sustainable
competitive advantage. This is achieved through a distinctive set of
integrated employment policies, programs and practices. The authors
presented HRM functions as planning, recruitment and selection,
appraisal and performance management, reward management,
development, employee relations, health and safety, and union-
management relations. Moreover, to Alan Price (2004) HRM aims at
29
recruiting capable, flexible and committed people, managing and
rewarding their performance and developing key competencies.
Contributing to the working definition of HRM is Abecker et al.,
(2004). They see HRM as a strategic and target oriented composition,
regulation and development of all areas that affect human resources in
a company. Efficient and effective management of these resources to
a large extend, affects human resource behavior, and consequently the
performance of the organization as a whole. Moreover, the authors
identified HRM with the field it covers. These include planning
aspects such as; personnel requirements analysis and personnel asset
analysis, and change aspects such as; recruitment, personnel
development and labor displacement.
According to Torrington et al., (2005) HRM is fundamental to all
management activities have evolved from a number of different
strands of thought. It is best described as a loose philosophy of people
management rather than a focused methodology. Thus, distinction has
been made between HRM as body of management activities on one
30
hand (generically described as personnel management) and then on
the other as a particular approach to execute those activities (carrying
out people-oriented organizational activities than traditional personnel
management).
An organization gains competitive advantage by using its employees
effectively, drawing on their expertise and ingenuity to meet clearly
defined objectives. Torrington et al., (2005) identified the role of the
human resource functions with four key objectives.
These four objectives are the corner stone of all HR activities. These
include Staffing, Performance, Change-management and
Administration. Staffing objective focuses on finding the appropriate
pool of human resources needed to ensure full and timely supply of
work force. It therefore involves designing organizational structures,
identifying working conditions for different groups of employees
followed by recruiting, selecting and developing the personnel
required to fill the roles. Performance objective aims at ensuring
workforce motivation and commitment for effective performance.
31
2.5 ISSUES IN PRISON MANAGEMENT:
Modern organization and its management requires the co-ordination
of men, materials, equipment, money and time, while the other,
inanimate objects are relatively easier to understand and handle, the
human factor poses the greatest problem of management today.
Organizations are structured into departments and sections, which are
made up of groups of individuals. Each group in the Organization has
its own objective which is components of the Organizational
objectives.
To achieve its objectives each group requires among others:
1. The spirit of team work
2. Effective communication
3. Skills of members to perform their jobs in the group.
4. Utilization of the abilities and skills of everyone in the group to
the fullest extent possible.
5. Willingness of each member to share responsibilities for the
success of the group
32
6. An atmosphere of trust.
The Nigerian prison service being a social security organization is as
old as country and has been under great pressure to modernize.
This has become necessary because of the changing role it has often
been called upon to play in the social security organization of Nigeria.
In response to the demand for modernization, the prison system in
Nigeria has undergone many changes over the years. The system has
moved from Local government and state Government controls to join
other Federal controlled prisons service under the control of the
federal government.
The Nigerian prisons service which operates under Decree No 9 1972
and other ordinances before it is charged with the following
responsibilities:
1. Identifying the reason for anti-social behavior of offenders,
teaching and training them to be useful citizens of a free society.
2. Treating, training and rehabilitating them to become useful
citizens of free society. Regrettably, Nigerians Prisons Service is
33
finding it increasingly difficult to meet its goals. A visit to any of
Nigeria Prison (Benin, Oko, and Ogba prisons) in Edo State
reveals that none of the prisons is meeting the United Nations
organizations minimum regulation on treatment of prisoners. The
civil liberties organization (CLO) and Human Rights organizations
say presently that life in Nigeria is rough and terrible. The physical
appearance of many of the awaiting trial prisoners who go to court
for hearing of their cases or to the hospital for medical treatment
lead credence to what has been written and said by these
organization. They look pale and haggard. Besides, the
infrastructure looks obsolete and is poorly maintained. Inmates
especially awaiting trial inmates sleep on bare without blankets,
there is constant stench and around the cells because the awaiting
trial inmates seldom take their bath. Common medicines a local
peasant can buy are not available in the prisons. Worse ‘chaff’ is
supplied in the name of food.
34
2.6 PROBLEM OF MANAGING NIGERIA PRIOSONS
SERVICES
A. Inadequate lack of information and rehabilitation of the
inmates: Kayode (1987) says that the penal policy of the reformation,
rehabilitation in Nigeria is no more than a public disguise for
modernizing, while in practice nothing have changed from the
inherited penal system that was geared towards the punishment,
incapacitation and deprivation of incarcerated offenders in spite of
official declaration that the Nigerian Prison Service goals have done
in any meaningful way to change the operations and organization of
this service to fulfill such goals.
Orah, said in one of the Nigerian newspaper that though president
Obasanjo has introduced majors to recognize the prison, it has not
gone far enough as the system is incapable of reforming any prisoner.
According to him the system is not capable of reforming prisoners
because of congestion and inadequate recreational facilities coupled
35
with the presence of many disease in the prison which include
HIV/AIDS, with the death toll conservatively put at 25 inmates
prisons weekly “for you to know damage the Nigerian prisons can do
to human being, look at Obasangos picture before he went to the
prison, when he came out and “he said”, He was like a working
skeleton”.
Abdul Orah said further that president Obasanjo, was just fortunate
that God preserved his life, “Others like him did not make it. He cited
Bisi Onabanjo, former governor of Ogun State, Busan Adelakun,
former commissioner in Oyo State, Barkin Zuwo, former governor of
Kano State, and Ambrose Ali former governor of Bendel State as
example of those who do not survive prisons horror. They died
shortly after their release from prisons. While former commissioner
of police in Oyo State during the second republic Olu Akeyode, Musa
Yaradua all these men did not walk out of prisons alive.
B. Lack of vocational training equipment: There are inadequate
training facilities for reforming and rehabilitating the prisoners.
36
C. Lack of comprehensive policy on medical care: The poor
condition of the prison increase health risk. Most inmates take in
easily and those who take ill always never receive treatment.
Medical care in our prisons is appealing, the clinics are in shambles.
Diseases spread fast: prisoners are prone to such contagious diseases
as cholera, scabies, tuberculosis, dysentery, [Link] etc. The lack
of comprehensive policy on HIV, AIDS in prisons portends great
danger to the health and human right of the prisoners.
The prison environment has presently constituted is a veritably
avenue for the spread of HIV/AIDS virus among prisoners. Report
show that the dreaded is more prevalent at the medium prison,
Kirikiri Lagos. There, it is gathered that out of the 2,376 prisoners, 13
have tested positive to the killer disease, like tuberculosis. Recorded
gathering statistics reveals that due to the inadequate medical
attention and facilities hardly does a week pass without one causality
or another in most of the large prisons, Kirikiri and Enugu prisons.
37
D. Prisons Congestion: Is partly responsible for the seemingly
insufficient infrastructural amenities in Nigeria prisons. Prisons
facilitates are stretched to the limits by the unchecked population
explosion.
According to Ujah (2004), the majority of inmates are living under
the most horrendous conditions with appealing food, poor to non-
existent medical facilities, no showers and no beds, because of silly
policy, they do not perform work or attend any programmers, they do
they receive any social or physiological care, instead they sit ideally
for months and years wasting their lives, losing their self-esteem and
with no knowledge of when their case will be hard, unable to aim a
living or make a contact with their families. The case of the awaiting
trial persons (ATP) brings out both the brutality and perversity of the
Nigerian prisons system. As a rule, (ATP) constitute a significant
percentage of the prison population.
B.B.C news article on the state of Nigerian prison and legal system on
Jan. 6, 2006 stated that Nigeria is to set free about half of all prisoners
38
to reduce overcrowding. Then ministers of justice (Bayo Ojo) said
that up to 25,000 people, including the sick, the elderly and those
with HIV will be freed, also those who have been awaiting trial for
longer that the sentences they face and those case file have been lost
by the authorities will also benefit. Nigeria has 148 prisons and about
83 satellite prisons, 10 prisons farm and nine cottage industries for the
training of inmates. The actual capacity of the Nigerian Prisons is
about 33,348 but prison currently holds 47,000 inmates in awaiting
trials constituting 24,953 (59%) of this figure. In a more recent
statistic of the Nigerian Prisons Service (Nov. 2000) report shows that
Nigerian Prisons are over populated.
Obia (2001) contends that population explosion in Nigerian prisons is
one of the major problem militating against proper and effective
administration of the Nigerian Prisons.
E. The inadequacy of office accommodation, stationary, transport
and communication facilities further limits their efficiency:
Transfer of officers handling a case and lack of transportation
39
facilities to bring prisoners to court constitute additional constraints.
The ministries of justice are similarly faced with the problems of
actual shortage of dedicated, honest and well trained state counsel
thus necessitating calls for adjournment of cases
F. Class differentiation: Inmates who are materially buoyant are
allowed a free hand to indulge in unethical practices in return for
gratification, Sunday independent newspaper 18th March 2006 stated
that rich prisoners are often allowed to bring in their own foods, and
use gadgets like television sets, radio and mobile phones. Some even
brings in women.
According to the former internal affairs minister, Mohammed Mogeji
in an inspection of the confusion at Ikoyi Prisons “I saw what we
recovered from them. Some things like weapons and mobile phones,
we even saw television sets, knives, machetes, daggers and hammer.
“Rich inmates use their resources to maintain loyalties among fellow
prisoners and the prison officers. Recent riots in some Nigerian
Prisons have been attributed to attempts by prisoners to stop the
40
removal of some rich generous inmates on whom many of them
depend for food.
G. Lack of motivation: The prison staffs complain that their
promotion comes sparingly to both junior and senior staff, Hospital or
medical expenses are hardly refunded.
Etanibi and Alamika (1987) said that poor wages, adverse working
condition and social stigma that go with prison services employment,
affect the moral of the staff. The right of prisons staff to dignity and
sense of justice is violated when they are forced to administer cruelty
to poor prisoners while simultaneously treating the few inmates that
are provided with better clothing and bedding materials.
H. Poor Sanitation: The prisoners in Nigeria today still make use of
bucket system of human waste disposal of faces in the environment is
unhealthy for staff and inmates.
I. Poor sleeping condition: The convicted inmates sleep on bare
spring iron bed covered only with dirty and tattered mats, the
awaiting trial inmates sleep on unkempt cold concrete floor.
41
J. Public Attitude: The staff claims that they have been subjected too
much adverse criticism by the general public in recent years and very
few people fully appreciate that treatment of offenders in modern
society is a complicated administrative task requiring the co-operation
of the society as a whole.
What is responsible for the low assessment of the prisons service is
because the service has no public relations unit that should educate
the public on the laudable objective of service.
K. Inadequate Training of Staff: Prisoners and prison guards in
Africa remain understudied and ill understood and are most often
represented in the literature as objects/subjects of critique or targets of
reform. There should be more workshops/seminars for prison staff in
order to update.
42
CHAPTER THREE
SYSTEM ANALYSIS AND DESIGN
3.1 RESEARCH METHODOLOGY
The waterfall model was adopted for the development of the prison
management system (PMS). The model views the process of software
development in five stages. The activities in one stage will be
completed before moving to the other. Phases involved in the
waterfall model are.
1. requirement analysis and definition
2. system and software design
3. implementation and testing
4. system testing
5. maintenance
Requirement Analysis and Definition
A thorough investigation of the current system was made in order to
obtain detailed fact about the application area to be re-designed.
43
Investigation also covered looking at the functional requirement of
the present system and finding out whether the requirements and
objective of the present system are being achieved. In the
investigation proper, several methods of data collection were
employed which includes interviewing of office representatives,
evaluation/ inspection of forms and direct observation. These
methods were adopted to ensure the validity of data collected and
relevance of the result after processing the data.
Interviewing: In view to investigation, prison management staffs
were interviewed. This method yields the most profitable result as it
is obtained by physical contacts; hence, a firsthand knowledge of the
various processes involved is obtained by speaking to the operator of
the system. The essential element of the interview is obtained directly
and in a short time than when other methods are employed since the
interviewer is with the interviewed. This immediate feedback gives
the opportunity to ask ambiguous questions and hence, obtain detailed
responses.
44
Observation: The method of data collection enables the researchers
to witness a firsthand operation of the old system or manual system.
Direct observation is the surest method of learning as a scientist and
this method was richly employed.
System and Software Design:
The requirement specifications from the first phase were studied and
a system design was prepared to help in specifying hardware and
software requirements and also help in defining the overall system
architecture. This includes the use of data flow diagrams and activity
diagram.
Implementation and Testing:
This stage involved the actual development of the system by
developing the graphical user interface, implementing the model
using visual studio 2010 and creating the system database using
mysql server 2008.
45
System Testing:
This is the stage after coding where every unit of the program was
tested and integrated as a complete system in order to ensure the
system works according to required specification.
Maintenance:
This is the final stage of development in which all necessary
maintenance activities were carried out in order to see that the
software continues to work even when there is a new development in
the future.
3.2 ANALYSIS OF THE EXISTING SYSTEM
Management of prisons in Nigeria is still at a nascent stage and
follows rudimentary processes. Most of the prisons in Nigeria such as
the Nigerian prison service Benin have a collection of manual files
and registers to store prisoner/criminal records. This is a very
inefficient and cumbersome way of storing records which greatly
impedes the flow of critical information as well as makes looking up
of information time consuming. Also, different files and registers are
46
required to store the information which is relevant to a single
prisoner. This hinders the profiling process of prisoners.
STRUCTURE OF EXISTING SYSTEM
FIG 3.1 Existing System Structure
1. Personnel: The work of function of personnel section in the prison
is different from the functions of personnel offices in complex
organization. The prison personnel section is in charge of handling
correspondences between the prison and its headquarters; it processes
correspondence for staff and inmates.
47
2. Welfare: The welfare unit sees to the social and economic
conditions of the inmates and staff. It seeks to provide recreational
activities to the inmates and staff, example ludo, draft, table tennis,
football etc. It also tries to reconcile some inmates with their
parents/relation where relationship is strained.
3. Medical and Health Service: This section takes care of the health
of the prisoners, and also in charge of the general cleanliness of the
compound, sell and ensure high standard of neatness in the prison
kitchen and certifies that meals served to the inmates is of good
quality.
4. Industry: In the section, convicted inmates are apprenticed to
carpentry, tailoring, cane making, basket making, shoes making, soap
making etc. This is a training ground for in-mates.
5. Agriculture: This section is headed by Assistant superintendent.
This section is in-charge of prison farm.
48
6. General duties: This section does the main job for which the
prison service is created. Members of this section do the surveillance
job of the service, they run three shifts, morning, afternoon and night.
While those in general duties are seen as line officers, those in the
other five divisions are staff officers.
3.3 CONSTRAINTS OF EXISTING SYSTEM
The existing system has the following limitations;
Inefficient organization of prison information and records.
Information look up is cumbersome and time consuming.
Impedes the flow of critical information.
3.4 PROPOSED SYSTEM
Taking in mind the above deficiencies, our project effectively deals
with the above problems by providing a single integrated system
49
where all the prison as well as prisoner/criminal information will be
stored in a single centralized system having complete prisoner
profiles. Each prisoner profile would have his/her demographic
details, a digital photograph of the prisoner as well as his parole ,
visitor and number of times the prisoner has been out of prison with
appropriate reason attached to it. This effectively scales down the
time in which critical information has to be transferred to concerned
agencies. In addition, maintenance of records is all the more easy as
well as efficient when compared to the manual system.
3.5 ADVANTAGES OF PROPOSED SYSTEM
Efficient organization of prison information and records
Information look up is easy
Substantially decreases the time in which critical information is
passed on
50
3.6 PROPOSED SYSTEM STRUTURE
FIG 3.2 Main menu design; the management system would have
seven main menu and several sub menu as seen in the design above.
51
3.7 UML OF THE PROPOSED SYSTEM
FIG 3.3 Activity diagram of the system
3.8 INPUT DESIGN ANALYSIS
This system would have two inputs from a user; Authentication and
Prisoner details, which would be stored in a Database. This database
52
will contain all the information and necessary data required by the
application for its functioning. The various tables in the database
include;
Prisoners’ database: This will store all the necessary details
pertaining to the prisoner profile e.g. Name, age, address etc.
Users Database: This will store all the necessary information about
the users of the application e.g. name and password etc.
3.9 LOGIN INPUT SPECIFICATION
The Login input would require users to input their login details for
security of the system as seen in the diagram below. This module
would contain two text input fields and two buttons.
53
Fig 3.4 Input specifications for Login details
3.10 PRISONER DETAILS INPUT SPECIFICATION
The Prisoner’s details input would require users to input details for a
new prisoner as seen in the design diagram below;
54
Fig 3.5 Prisoner details input specification:
3.11 OUTPUT SPECIFICATION AND DESIGN
The output form is designed to generate printable reports from the
database. The output is placed on a database grid and contains
prisoner’s information. The output produced can be printed on a hard
copy or viewed on the screen.
55
Fig 3.6 Output design: As seen from the diagram this module when
implemented would be used to view the details of a prisoner.
56
INTERFACE DESIGN
Fig 3.7 Output design
3.12 SYSTEM DATABASE DESIGN
In any good database design, effort should be made to remove
completely or at worst reduce redundancy. The database design in the
software is achieved using MySQL database. Below is the structure
of the file designed in the database.
57
Table 3.1User Login Table
Table 3.2 Prisoners Registration Table
58
Table 3.3 User Registration Table
Table 3.4 THE INTERFACE TABLE
Interface Textbo Grid Hyperlin Dropdow Imag Butto Men
Name x - k n list e n u
Vie
w
Default 7 3 6
page
Registratio 15 4 5 3 5
Page
59
Login page 2 2 6
Visitors 1 4 5
record page
Staff record 1 4 5
page
Home page 6 3 5
Visitors 7 1 4 2 5
page
CHAPTER FOUR
60
SYSTEM IMPLEMENTATION
4.0 INTRODUCTION
System implementation is the process of defining the user
requirements and designing a system to meet them. Testing on the
other hand is the process of testing the newly developed system to
ensure the hardware and the operating software is properly installed
and configured ensuring other system parameters are properly
established.
The Prison Management System project when implemented,
integrated all the prisoner data into a single integrated system, which
will in turn result all the information being present in a digital format.
4.1 SYSTEM DESIGN (DESIGN OVERVIEW)
The system designed aimed at developing an online system that can
be used by Nigerian prison to keep track of prison records. Security
of the database used in the design was highly taken care of by the
website developed. The objective of the design includes:
61
Design software that can be used to stored prisoners information
on database.
Structure a database system that will store all the information.
Design a query system to retrieve specified prisoners information
Design a well formatted output that will present information in a
meaningful format.
Maintain a Database for prisoners jail term
Ensure accuracy in the handling of data.
4.2 SYSTEM DESCRIPTION
The system was designed using Top – Down Approach. It makes use
of the fundamental program solving techniques. The software is
structured in such a way that each subsystem is selected and executed
62
independently. The task is divided into several modules, which come
together to give the solution to the problem. These modules are:
Login module design
New prisoner registration module design
Output module design
Interface module design
Login Module Design
This design module is used to verify and authenticate users’ access to
the management system.
New Prisoner Registration Module Design
This module is used to input the details of a prisoner such as image,
name, address, phone number etc.
Output Module Design
This module is used to view the details of a prisoner.
Interface Module Design
63
This module is the implementation of the design details
4.3 SYSTEM IMPLEMENTATION
System implementation has the coordination of the system
components in order to make it not just workable but highly
successful. It consist the following task, document compilation of
staff and inmates of the prison’s record, evaluating the input records
and stored in a general database.
The technology integration is the practice of integrating multiple
system activities to interact and generate information efficiently. In
both cases, the system development life cycle is heavily integrated in
this practice.
4.4 HARDWARE REQUIREMENT
64
In the cost of the design, the software developed required the
following hardware for an effective and efficient operation of the new
system.
Pentium IV
1GB RAM.
2GigaHertz of processor speed and above
At least 80GB hard disk.
E.G.A/V.G.A, a colored monitor.
An uninterruptible power supply (UPS) units
LaserJet or Desk Jet printer.
1024*768 screen resolution
4.5 SOFTWARE REQUIREMENT
The software requirement includes:
A window7 or higher version for faster processing
MySQL server 2008 for storage of input data
65
Visual Studio 2010 frame work
Web browser like internet explorer, Mozilla Firefox, Google
chrome
4.6 USER REQUIREMENTS
The major users of the system are the staffs of the Nigerian Prison
Service. Their requirements include the following;
Visual studio 2010 frame work
MySQL sever 2008 enterprise edition
Pentium iv system
IIS Installed
Web browser
4.6.1 Functional Requirements
The system provides a platform for the registration of prisoners
and prison staffs online.
The system shall accept valid input of registered staffs of prisons
online.
66
The system provides access to information about how to register
and be a valid user of the system online.
The system provides a platform where you can get news update on
what is happening around the prisons in Nigeria.
With this system one can locate the particular prison where a
person is been jailed and the number of years he/she is been
sentenced.
The system will capture prisoner’s details and photograph for
proper identification.
The system shall provide an efficient way to monitor staffs and
prisoners record.
The system provides a general database where all prisoners’
information is stored.
The system can keep the record of every visitor coming to visit the
prisoners
4.6.2 Non-Functional Requirements
The system should be easy to maintain.
67
The system should be compatible with different platforms.
The system should be fast as users always need speed.
The system should always be available online all times.
The system should be secure.
The system should be accessible to online users.
The system should be easy to learn by both sophisticated and
novice users.
The system should provide easy, navigable and user friendly
interfaces.
The system should have a standard graphical user interface that
allows for the on-line data entry, editing, and deleting of data with
much ease.
4.7 SYSTEM TESTING
After the integration of modules, the whole system was tested. The
online prison management system was tested using a local host and it
worked properly. Sample prisoner details were imputed into the
68
system and it was stored in the database and viewed using the view
prisoner module.
4.8 SYSTEM REVIEW AND MAINTENANCE
The system needs to be review and maintained from time to time to
add more functionality, to expand the system activities and upgrade
system programming and the framework environment to higher
version.
4.9 INSTALLATION PROCEDURE
The application folder name is copy and pasted into the project file
folder of the visual studio document folder. Then click on the folder
to open it. Visual studio must be installed in the system.
4.10 USER GUIDE
To use this application, internet information service (IIS) must be
installed in the system. Open a web browser, type [Link]
69
application name/default the click on the keyboard or click on the go
button in the browser.
The default page will be displayed, then select user to login/register.
To login, you need to provide your username and password if already
you have registered and login or click on the register and create an
account then login.
It takes you to the home page where you can navigate to perform any
task, namely:
Home, about us, directorate, command, resources, complains, news,
management system.
70
CHAPTER FIVE
5.1 SUMMARY
Management of prisons in Nigeria has long been a neglected area,
which has recently been incorporated in the e-governance program of
Government of Nigeria. Currently a rudimentary process of storing all
the prisoner data in manual files and registers is in place.
Management of prisons in Nigeria is still at a nascent stage and
follows rudimentary processes. Most of the prisons in Nigeria have a
collection of manual files and registers to store prisoner/criminal
records. This is a very inefficient and cumbersome way of storing
records, which greatly impedes the flow of critical information as
well as makes looking up of information time consuming. Also,
different files and registers are required to store the information
which is relevant to a single prisoner. This hinders the profiling
process of prisoners.
71
A thorough investigation of the current system was made in order to
obtain detailed fact about the application area to be re-designed.
Investigation also covered looking at the functional requirement of
the present system and finding out whether the requirements and
objective of the present system are being achieved. In the
investigation proper, several methods of data collection were
employed which includes interviewing of office representatives,
evaluation/ inspection of forms and direct observation. These
methods were adopted to ensure the validity of data collected and
relevance of the result after processing the data.
The project effectively deals with the problems by providing a single
integrated system where all the prison as well as prisoner/criminal
information will be stored in a single centralized system having
complete prisoner profiles. Each prisoner profile would have his/her
demographic details, a digital photograph of the prisoner as well as
his parole , visitor and number of times the prisoner has been out of
prison with appropriate reason attached to it. This effectively scales
72
down the time in which critical information has to be transferred to
concerned agencies. In addition, maintenance of records is all the
more easy as well as efficient when compared to the manual system.
It has now become essential to embrace the new technologies in the
area of Information and Communication Technology (ICT) for the
development, modernization, advancement of prisons.
Internetworking of all the jails across Nigeria for sharing of
information related to prison inmates who had been lodged in various
jails of the country should improve the law and order within the state.
It is recommended that Edo State Prisons be pioneer in this area and
they have shown it through their IT setup, a role model for other
states and even other countries. It is likely that this may be replicated
in the whole country.
73
5.2 CONCLUSION
Management of prisons as well as prison records is a vital aspect in
the national security which becomes all the more important in the
current volatile security situation. Prison management in Nigeria is
still in a nascent stage using manual system of files and folders to
store and organize prison record. This system is inefficient as well as
looking up of specific information is cumbersome and tedious. This
greatly impedes the flow of critical information. All these deficiencies
are removed using the online Prison Management System. PMS
effectively stores all the information in neat prison profiles which
shave all the necessary information about a prisoner as well as his/her
photogragh attached with the profile. Surname and ID numbers can
be used as a search key to identify prison records by comparing them
with external database that are found at crime scene. All these
improvements greatly reduce the time at which specific information is
delivered to concerned agencies.
74
5.3 RECOMMENDATIONS
Currently the Prison Management System can only be deployed for a
single prison. But the system has the scope to be developed as a
distributed application where each implementation of PMS in
different prisons can be connected and communicate with each other.
In such a scenario a person sitting in Edo state prison can access the
data of Abuja central jail. This will make the whole system highly
centralized as well as well connected. This will provide the end user
who has the necessary security clearance a single portal where he/she
can access prison records from all major prisons in Nigeria where the
PMS would be deployed thus making it a truly practical deployable
application which can be used in prisons all over Nigeria.
75
REFERENCES
Aderind, A. & Stepheny, P. (2001). Human Resource Management
fifth edition. Australia:Australian Press.
Alan, P. (2004). Human Resource Management in a Business
Context. London: Pearson Publication Limited.
Archibong, M. (2004) Daily Sun News: Awka Memoriba:, April 29
Vol 109 no 130.
B.B.C, Article: The State of Nigeria Prison And The Legal System.
http/ news. B.B.C [Link] 3/18/06.
Bratton, J. & Gold P. (2003). Human Resource Management: Theory
and Practice. London: Palgrave Macmillan.
Drucker, P.F (1989) The Practice Of Management London:
Hienneman Professional.
Etanibi and Alamika (1987) Trouble with Nigeria Prisons X
Hienneman Professional. 3/ 18/ 2006
Ikeazor, C (1986) Anambra State Law Conferences On Prison System
And Reforms In Nigeria. Held In HotelPresidential Enugu:
76
10th –12th December.
Koyode, I (1987) Nigeria Prison Service System http /
[Link] /Prawa 3/ 18 / 2006
Nigeria Government Human Right Commission In Africa. http /
Www. Hrw. Org/ 2001 /Africa / Nigeria. 3 / 28/ 2006.
Nnoyelu and Obiajulu, (1997) Contemporary Issue In. Sociology,
Enugu: John Jacob’s Classic Pub. Ltd.
Obia, V (2001) Prisons of Pain http / www. Independent [Link] 3 /
18 / 06
Obiekezie, O.S. and Obi, E.A. (2004) Administration In Nigeria. A
Development Approach, Onitsha: Book point Ltd.
Storey, J. (1995). Human Resource Management: A critical text.
London: Routledge Publishers.
Torrington, D. (2005). Human Resource Management sixth edition.
London: Pearson Education Limited.
Ujah, E (2004) Inside Prison, Vangard. Http / [Link]
3 / 29 / 2006
77
APENDIX
Imports [Link]
Partial Class ADMIN
Inherits [Link]
Protected Sub Button1_Click(ByVal sender As Object, ByVal e As
[Link]) Handles [Link]
Dim cn As New SqlConnection
[Link] = "server= manninno-PC; user id= sa ;
password=manninno; database= Prisonmgt"
If [Link] = [Link] Then [Link]()
[Link]()
Dim cmd As New SqlCommand
[Link] = cn
[Link] = " INSERT INTO LOGIN VALUES ('" + [Link] +
"','" + [Link] + " ')"
[Link]()
[Link]()
[Link]("[Link]")
End Sub
End Class
Imports [Link]
Partial Class AdminLogin
78
Inherits [Link]
Protected Sub Button1_Click(ByVal sender As Object, ByVal e As
[Link]) Handles [Link]
Dim cn As New SqlConnection
[Link] = "server= manninno-PC; user id= sa ;
password=manninno; database= Prisonmgt"
If [Link] = [Link] Then [Link]()
[Link]()
Dim cmd As New SqlCommand
[Link] = cn
[Link] = "SELECT * from LOGIN where USERNAME = '" +
[Link] + "'"
Dim rd As SqlDataReader
rd = [Link]
If [Link] = True Then
[Link]()
If [Link]("password") = [Link] Then
Session("user") = [Link]
[Link]("[Link]")
ElseIf [Link]("password") <> [Link] Then
[Link] = True
[Link] = False
End If
ElseIf [Link] = False Then
79
[Link] = False
[Link] = True
End If
End Sub
Imports [Link]
Partial Class Complains
Inherits [Link]
Protected Sub Button2_Click(ByVal sender As Object, ByVal e As
[Link]) Handles [Link]
Dim cn As New SqlConnection
[Link] = " server = okarofrank-PC; user id = sa;
password = frank; database = Prison"
If [Link] = [Link] Then [Link]()
[Link]()
Dim cmd As New SqlCommand
[Link] = cn
[Link] = " INSERT INTO Complains_TABLE VALUES ('" +
[Link] + "','" + [Link] + " ')"
[Link]()
[Link]()
End Sub
80
Protected Sub Button1_Click(ByVal sender As Object, ByVal e As
[Link]) Handles [Link]
[Link]("[Link]")
End Sub
End Class
Imports [Link]
Partial Class REGISTRATION
Inherits [Link]
Protected Sub Button1_Click(ByVal sender As Object, ByVal e As
[Link]) Handles [Link]
Dim cn As New SqlConnection
[Link] = "server= manninno-PC; user id= sa ;
password=manninno; database= Prisonmgt"
If [Link] = [Link] Then [Link]()
[Link]()
Dim cmd As New SqlCommand
[Link] = cn
[Link] = " INSERT INTO REG_TABLE VALUES ('" + [Link] +
"' , '" + [Link] + "' , '" + [Link] + "' , '" + [Link] +
"' , '" + [Link] + "' , '" + [Link] + "' , '" + [Link] +
"' , '" + [Link] + "' , '" + [Link] + "' , '" + [Link]
+ "' , '" + [Link] + "' , '" + [Link] + "' , '" +
81
[Link] + "' , '" + [Link] + "' , '" + [Link] +
"' , '" + [Link] + "' , '" + [Link] + "')"
[Link]()
[Link]()
[Link] = True
End Sub
Protected Sub Button2_Click(ByVal sender As Object, ByVal e As
[Link]) Handles [Link]
[Link]("[Link]")
End Sub
End Class
Imports [Link]
Partial Class VISITORS_FORM
Inherits [Link]
Protected Sub Button1_Click(ByVal sender As Object, ByVal e As
[Link]) Handles [Link]
Dim cn As New SqlConnection
[Link] = "server= manninno-PC; user id= sa ;
password=manninno; database= Prisonmgt"
If [Link] = [Link] Then [Link]()
[Link]()
Dim cmd As New SqlCommand
82
[Link] = cn
[Link] = " INSERT INTO VISITORS_TABLE VALUES ('" +
[Link] + "','" + [Link] + " ','" + [Link] + " ','"
+ [Link] + " ','" + [Link] + " ','" + [Link] +
" ','" + [Link] + " ','" + [Link] + " ')"
[Link]()
[Link]()
[Link] = True
End Sub
Protected Sub Button2_Click(ByVal sender As Object, ByVal e As
[Link]) Handles [Link]
[Link]("Visitors [Link]")
End Sub
End Class
83