Font Size: a A A

The Design And Application Of The Public Security Organs’Law Enforcement Evaluation System

Posted on:2015-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:J Q XuFull Text:PDF
GTID:2268330428485520Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In the context of the information age, people’s social lifestyle has begun to changefundamentally. Technologies, such as network, information and communications,pervasively penetrate the arena of study, work and life, which requires the publicsecurity organs to make fully and effectively use of the information-based meansduring their work, initiatively meet the demand of the Times. Public securityinformation refers to a change which aims at driving the public security organs topromote information technology and the transformation to be integrated organically,and to a system engineering of the modern policing model. Meng Jianzhu, minister ofthe Ministry of Public Security, once pointed out that "information is an importantapproach to improve the overall combat effectiveness of public security organs, is animportant carrier to improve the level of basic work and is an important link to affectpolicing mechanism reform. From the policing operation and policing law enforcementto team’s management, the in-depth application of information will deeply affect everyaspect of public security". Therefore, Public security information construction cannotbe simply understood as the popularization and application of information technologyin public security work. It should be considered as a vast integrated system, not onlyincluding software and hardware construction, information security, etc., but a wholeprocess including police operations internal information and all kinds of related socialinformation’s collection, processing, storage, integration, operation. It also consists ofmany other main points, such as the wide establishment of the information concept, theall-round improvement of information quality, the scientific building of informationmechanism, the highlighting of information advantage. So, public security informationapparently services the public security organs, but it essentially provides service for thesociety as a whole. Based on The Party Central Committee’s scientific outlook on development, takingthe important strategic thought of building a socialist harmonious society in anall-round way as guidance, taking the construction of "Golden Shield Project" and"Three Foundation Construction” as an opportunity, considering promoting the publicsecurity information construction of Heilongjiang province as the goal, regarding thedeployment in public security information construction of Heilongjiang province as theguidance, combined with the public security organs’ law enforcement examinationsystem, using information technology, and relying on public security private network,the purpose of this paper is on the research and development of the public securityorgans’ law enforcement evaluation system. The system is a three-dimensional lawenforcement evaluation system with a complete, all time and all positions process. It isan integration mechanism consisting of the early warning, source control, processtracking, link to review, check later, misconduct liabilities. The system is also apractical application system adhering to pay attention to a small case, early case, atordinary times, which can provide an early prevention, detection, treatment on lawenforcement issues. The system includes many modules such as basic services,checking on special cases, special evaluation, business supervision, law enforcementfile, law and regulations. The evaluation covers every link during the law enforcementprocess, which satisfies the requirements of the law enforcement evaluation made byour provincial public security organs through information means. At the time ofresearch and development, according to the requirements of supervision on specialcases and basic data constantly entering into the file information base, the systemestablishes many kinds of evaluation model, utilizing math and statistics, combiningthe competing relationship of examiner and investigator and actual characters of ourprovincial police officers. By constantly refreshing the fluctuation curve and ranking ofthe evaluation in every municipal and county bureau, the system effectively stimulatethe law enforcement purposes of objective, fair and courageous in our provincialpublic security organs and police officers.Taking law-enforcement normalization and objective evaluation by municipalorgans at all levels and law enforcement officers as core content, the public security organs’ law enforcement evaluation covers supervision and examination in every linksduring the law enforcement by public security organs. Including basic services,checking on special cases, special evaluation, business supervision, law enforcementfile, star officers, law and regulations, as a three-dimensional law enforcementevaluation system with a complete, all time and all positions process, the system is anintegration mechanism consisting of the early warning, source control, process tracking,link to review, check later, misconduct liabilities.The system was approved in May2013, completed and accepted in December ofthe same year and became to be used officially in the beginning of2014.The projectconsists of9people,2of which are customer service. During the process ofdevelopment, the staff of the project repeatedly analyzes, demonstrates and tests thesystem according to the particularity of the policing business and actual business of thelaw enforcement evaluation. Finally, they developed the evaluation system of thepublic security organs’ law enforcement suited to the actual circumstances in ourprovince. The system was put into use in Heilongjiang provincial public security’ssystem and got a well effect. This paper contains the following aspects on the project.(1)The project begins requirements analysis by using object oriented model,confirming the system adopting multilayer network system of Asp.Net and integratinginformation engine technology and Internet technology through Web Servicetechnology. The executable file in the client can be realized by IE. The networkstructure in the middle layer can pass any firewall to provide services for enterprise.The trans-format of the network data is XML, which improves the system’sfault-tolerant capability and load-balanced capacity, makes sure the system’s extensibleand scalable in the performance through software architecture.(2)The system adopted iterative development method to design, which can reducethe risk of software development and promote the efficiency and quality of thedevelopment. The final product well meets the customers actual needs. During theprocessing, a large number of data savings was used, which improve the efficiency ofthe system and reduce the burden of the network.(3)This paper introduces the system’s design, implementation and key technology in detail. The main content includes framework construction of SOA, multilayernetwork architecture of Asp.Ne, system’s function design and implementation, Oracledata base design and implementation, and the last one is the system’s security designand implementation. The key technology in the system’s development includes richclient of Asp.Net, data factory and data warehouse.Because of the complexity of the system’s business requirements, application’surgency and data interaction in many public security systems, so it’s hard to avoidsome shortcomings during the process of design and development. In the future, wewill continue to complete the system according to the actual use. In addition, there aresome unreasonable aspects in the system’s design. How to design reasonable system’sframework according to different functions still need to be studied further. Thesystem’s development framework suggested in this paper not only guide the project’sdesign and implementation, but give suggestions to other application programs.
Keywords/Search Tags:Evaluation of the law enforcement, Iterative development, Framework of SOA, Architecture of Asp.Net
PDF Full Text Request
Related items