DEVELOPMENT OF WEB GIS FOR FISHERIES SURVEILLANCE IN FISHERIES MANAGEMENT ZONE OF INDONESIA DONNY WICAKSONO

Size: px
Start display at page:

Download "DEVELOPMENT OF WEB GIS FOR FISHERIES SURVEILLANCE IN FISHERIES MANAGEMENT ZONE OF INDONESIA DONNY WICAKSONO"

Transcription

1 DEVELOPMENT OF WEB GIS FOR FISHERIES SURVEILLANCE IN FISHERIES MANAGEMENT ZONE OF INDONESIA DONNY WICAKSONO GRADUATE SCHOOL BOGOR AGRICULTURAL UNIVERSITY BOGOR 2009

2 STATEMENT I, Donny Wicaksono, hereby stated that this thesis entitled: Development of Web GIS for Fisheries Surveillance in Fisheries Management Zone of Indonesia is a result of my own work during the period of August 2006 to May 2009 and has not been published before in any form for another diploma, under-graduate, nor post-graduate degree to any University or other institutions. The content of the thesis has been examined by the advising committee and the external examiner Bogor, May 2009 Donny Wicaksono G

3 ABSTRACT DONNY WICAKSONO (2009). Development of Web GIS for Fisheries Surveillance in Fisheries Management Zone of Indonesia. Under supervision of KUDANG BORO SEMINAR and PURWANTO. As an archipelagic country, Indonesia has become the largest one in the world. Indonesia has been known as a country with its abundant natural resources potential at both land and sea areas. If both areas are compared, then the sea area is larger than land area, that more than 65 percent of Indonesia total area is sea. This makes the sea area has a very high potential role in Indonesia economic development that its resources are able to be utilized. Fish is one of Indonesia sea resources that are potential to be utilized for Indonesia s prosperity. Indonesia has the largest fish biodiversity for about 37 percent of the world s fish species. This resource will achieve its sustainable yield and optimal production if the management of fishing is conducted in the right way. Fish is highly demanded, and its abundant resources at sea trigger illegal fishing activities. Illegal fishing arrestments data are already been recorded but reliable provided data are limited, data management are weak and also data outputs are ineffective to support the fisheries management activities. Geographic Information System (GIS) is capable in assembling, storing, manipulating, and displaying map and database information. GIS allows us to view, understand, question, interpret, and visualize data in a very informative way. In fisheries management that required good and effective data management, GIS is appropriate to be applied. As its function of providing data and information, this GIS application is developed in web GIS. It means GIS is able to be accessed via internet. Users that have particular interests about the data and information can access directly through web GIS to get what they need. The objectives of the research are to design a system that is able to visualize illegal fishing occurrence in Indonesia Fisheries Management Zone (IFMZ) through a web GIS, to implement the prototype of the system and to evaluate the prototype and provide recommendations for full implementation of the prototype. A prototype design of web GIS has been developed to be able to visualize illegal fishing occurrences in IFMZ that utilize illegal fishing data to become important inputs to mapped illegal fishing occurrences. Prototype of the system is capable to provide recommendation for surveillance activities through its facilities in presenting data and information and encouraging a good fisheries database management system. Keywords : GIS, web GIS, information system, database, Indonesia fisheries, illegal fishing, surveillance, IFMZ

4 SUMMARY DONNY WICAKSONO (2009). Development of Web GIS for Fisheries Surveillance in Fisheries Management Zone of Indonesia. Under supervision of KUDANG BORO SEMINAR and PURWANTO. As an archipelagic country, Indonesia has become the largest one in the world. Indonesia has been known as a country with its abundant natural resources potential at both land and sea areas. If both areas are compared, then the sea area is larger than land area, that more than 65 percent of Indonesia total area is sea. This makes the sea area has a very high potential role in Indonesia economic development that its resources are able to be utilized. Fish is one of Indonesia sea resources that are potential to be utilized for Indonesia s prosperity. Indonesia has the largest fish biodiversity for about 37 percent of the world s fish species. This resource will achieve its sustainable yield and optimal production if the management of fishing is conducted in the right way. Fish is a resource that has ability to renew (renewable resources) that affected by several factors such as fish recruitment, individual growth and natural mortality. However this ability is limited. The sustainable fish yield can be achieved when they are harvested not more than their ability to renew in a certain time. If they are harvested more than their ability to renew, fish stock will continually decrease and may extinct. Therefore, for fishing management, the Government has regulated the amount of total fish allowable catch for every species in its growing location/ecosystem on fishing zones and regulated the way and methods for fishers to harvest the fish, based on many researches and monitoring activities. The Government has also developed a system to control the fishers to get permission to fish, so the fishers are expected to know their rights and obligations in fishing. In order to guarantee and stabilize people s loyalty to the rules, especially for the fishers, surveillance activities are conducted Fish is highly demanded, and its abundant resources at sea trigger illegal fishing activities. Illegal fishing arrestments data are already been recorded but reliable provided data are limited, data management are weak and also data outputs are ineffective to support the fisheries management activities. As a result of growing technology, GIS is continually developed. GIS is capable in assembling, storing, manipulating, and displaying map and database information. GIS allows us to view, understand, question, interpret, and visualize data in a very informative way. Data management is more effective in order to support any management in any sectors by managers that role as decision and policy makers. Also in fisheries management that required good and effective data management, GIS is appropriate to be applied. As its function of providing data and information, this GIS application is developed in web GIS. It means GIS is able to be accessed via internet. Users that have particular interests about the data and information can access directly through web GIS to get what they need. As its function of providing data and information, some of GIS application for certain purposes, are then developed in web GIS. It means GIS is able to be accessed via internet. Users that have

5 particular interests about the data and information can access directly through web GIS to get what they need. The objectives of the research are to design a system that is able to visualize illegal fishing occurrence in Indonesia Fisheries Management Zone (IFMZ) through a web GIS, to implement the prototype of the system and to evaluate the prototype and provide recommendations for full implementation of the prototype. Development of information system is implementing prototyping method. Prototyping method is used because this method simplifies and accelerates the steps of system development life cycle. Generally, method of this research is in three main steps, they are: requirements analysis step, development of information system step, and system implementation step. The first step, requirements analysis is implemented in four steps, which are: problems identification, user needs analysis, data collection and data preparation. While the second step, development of information system is applied in four steps: software and hardware selection, database design, system design and graphical user interface (GUI) design. The third step, system implementation is applied in two steps: system testing and system maintenance. The first step of the method is to understand what requirements are needed for developing information system. The requirements include problem identification, user need analysis, data collection and data preparation. Problems identification and user needs analysis is important to state the goals/objectives to develop an information system. This is usually an informal process that involves discussions with user groups and also a study of the current operating environment. System developer should identify what users need to utilize related to problems that they may be facing. After problems and user needs have been identified, the next step is to collect required supported data in order to develop appropriate system to fulfill user needs and answer the problem faced. Data sufficiency will support completion of the system developed and make the system to produce reliable data and information. Collected data should also be prepared and managed to be utilized in the system. Many data sources may cause differences in data format therefore data preparation should be done. Data preparation goal is to manage data to have appropriate data standards in their format, accuracy, completeness and reliability. The next step after requirements analysis is development of information system. There are four steps for development of information system: software and hardware selection, database design, system design and graphic user interface (GUI) design. After appropriate data are collected and prepared, then the next step is software and hardware selection. Softwares are chosen for database management system (DBMS) and for web GIS application. Software are needed in DBMS as management for database, storing database definition metadata, accessing the stored data and processing queries. After data are managed in DBMS, application softwares that utilize the DBMS are determined. The determination of the software should consider several aspects: compatibilities with the DBMS software, the ease of use and availability in the domestic markets. The next step is hardware selection. Appropriate hardware selection is important that the selected

6 software can be run conveniently on the selected hardware platform. Appropriate hardware selection may minimize technical obstacles in activating the system. The database design process can be divided into six steps: Requirements Analysis, Conceptual Database Design, Logical Database Design, Schema Refinement, Physical Database Design and Security Design. The system is based on client/server GIS architecture. The client-side components are separated from server-side components (databases and programs). Client/server architecture allows distributed clients to access a server remotely by using distributed computing techniques. A Client-Server system has one or more client processes and one or more server processes, and a client process can send a query to any one server process. Clients are responsible for user-interface issues, and servers manage data and execute transactions. Thus, a client process could run on a personal computer and send queries to a server running on a mainframe. This architecture has become very popular for several reasons. First, it is relatively simple to implement due to its clean separation of functionality and because the server is centralized. Second, expensive server machines are not underutilized by dealing with mundane user-interactions, which are now relegated to inexpensive client machines. Third, users can run a graphical user interface that they are familiar with, rather than the (possibly unfamiliar and unfriendly) user interface on the server. Graphical User Interface (GUI) is a type of user interface which allows users to interact with electronic devices such as computers, in this case, to connect visually information system and users. A GUI offers graphical icons, and visual indicators such as windows, pull-down menus, buttons, scroll bars, as opposed to text-based interfaces, typed command labels or text navigation to fully represent the information and actions available to users. After development of information system, then the system is tested to implement in order to see whether it works properly. Results of system testing are used as basis for the next step, system maintenance. Technical obstacles or system errors that may occur are observed and fixed. System maintenance is also a step to continually checking the system to perform some updates and modifications for further system utilization. As the result, a prototype design of web GIS has been developed to be able to visualize illegal fishing occurrences in IFMZ that utilize illegal fishing data to become important inputs to mapped illegal fishing occurrences. Prototype of the system is capable to provide recommendation for surveillance activities through its facilities in presenting data and information and encouraging a good fisheries database management system.

7 Copy right 2009, Bogor Agricultural University Copy right are protected by law, 1. It is prohibited to cite all or part of this thesis without referring to and mentioning the source a. Citation only permitted for the sake of education, research, scientific writing, report writing, critical writing or reviewing scientific problem. b. Citation does not inflict the name and honor of Bogor Agricultural University. 2. It is prohibited to republish and reproduce all part of this thesis without written permission from Bogor Agricultural University.

8 DEVELOPMENT OF WEB GIS FOR FISHERIES SURVEILLANCE IN FISHERIES MANAGEMENT ZONE OF INDONESIA DONNY WICAKSONO A Thesis submitted for the degree of Master of Science of Bogor Agricultural University MASTER OF SCIENCE IN INFORMATION TECHNOLOGY FOR NATURAL RESOURCES MANAGEMENT GRADUATE SCHOOL BOGOR AGRICULTURAL UNIVERSITY BOGOR 2009

9 External Examiner: Dr. Ir. Hartrisari Hardjomidjojo, DEA.

10 Research Title Name Student ID Study Program : Development of Web GIS for Fisheries Surveillance in Fisheries Management Zone of Indonesia : Donny Wicaksono : G : Master of Science in Information Technology for Natural Resources Management Approved by, Advisory Board Prof. Ir. Kudang B. Seminar, M.Sc., Ph.D. Supervisor Ir. Purwanto, M.S., Ph.D. Co-Supervisor Endorsed by, Program Coordinator Dean of Graduate School Dr. Ir. Hartrisari Hardjomidjojo, DEA. Prof. Dr. Ir. Khairil A. Notodiputro, M.S. Date of Examination: May 23, 2009 Date of Graduation:

11 ACKNOWLEDGEMENTS I would like to express my highest gratefulness to Allah SWT for His blessing, His will, His power, His help and His guidance to me during my study. I wish to show my gratitude to my supervisor Prof. Ir. Kudang B. Seminar, M.Sc., Ph.D. and my co-supervisor Ir. Purwanto, M.S., Ph.D. for their patience, advices, guidance, valuable inputs, time, encouragement and constructive criticisms during the supervision of my research. I wish to express my highest respect and gratefulness to my Father, Ir. H. Wignyo Handoko, and my Mother, Hj. Yetty Muryati, for their love, support, prayers and patience. And also to my brother, Boya Subhono, S.T., M.Sc, and my sister, Sanitianing Anggraini, S.P. for their cares and support. Highest thank is also addressed to my friend, Tejo Damai Santoso, S.Kom, from BIOTROP Training and Information Centre (BTIC) for his genuine and persistence aids. I also wish to thank and give highest appreciation to MIT students batch 2004 for their friendliness, togetherness and best years in study time, and also to all MIT students generally. I thank also MIT secretariat and staffs for their cooperation and friendliness during study. Moreover, to all MIT lecturers, I really appreciate for their sharing of valuable knowledge and experiences. And finally, I would also like to express my most gratefulness and appreciation to my half soul, Galuh Astika, S.Hut for her patience, understanding, support, care, before, throughout and after my study.

12 CURRICULUM VITAE Donny Wicaksono was born in Madiun, East Java, Indonesia, in March 18, He spent his childhood in Sukabumi and Medan, and had his high school at SMUN-1 Bogor. He achieved his undergraduate degree in 2004 from Bogor Agricultural University, Faculty of Forestry, majoring in Forest Management. In 2004, Donny Wicaksono pursued his Master Degree at Master of Science in Information Technology for Natural Resources Management (MSc in IT for NRM) Master Degree Program, Bogor Agricultural University. He proposed Development of Web GIS for Fisheries Surveillance in Fisheries Management Zone of Indonesia for his thesis.

13 CONTENTS Page STATEMENT... ABSTRACT... SUMMARY... COPY RIGHTS... ACKNOWLEDGEMENTS... CURRICULUM VITAE... CONTENTS... i ii iii vi ix x xi LIST OF TABLES... xv LIST OF FIGURES... xvi LIST OF APPENDICES... xviii I. INTRODUCTION Background Objectives Scopes... 4 II. LITERATURE REVIEW Geographic Information System (GIS) Web Geographic Information System (Web GIS) Database and Database Management System Database Design Approach for Information System Development General Understanding of Illegal, Unreported and Unregulated Fishing (IUU Fishing) Monitoring, Control and Surveillance (MCS) Implementation as Actions to Combat IUU Fishing... 20

14 2.8. Area and Potencies of Indonesian Sea Indonesia Fish Consumption Needs Indonesia Loss Due to Illegal Fishing Activities III. RESEARCH METHODOLOGY Time and Location of the Research Methodology Requirements Analysis Development of Information System Software and Hardware Selection Database Design System Design Graphical User Interface (GUI) Design System Implementation IV. RESULTS AND DISCUSSIONS Requirements Analysis Problems Identification User Needs Analysis Data Collection Data Preparation Development of Information System Software and Hardware Selection Software Selection Hardware Selection Database Design Conceptual Database Design Context Diagram Data Flow Diagram Entity Relationship Diagram Logical Database Design Physical Database Design System Design xii

15 Integration of Spatial and Non Spatial Data Mapserver Installation Mapfile Configuration Graphical User Interface (GUI) Design System Implementation Outputs of the System Display of Home and General Information Tabular Data Tabular data Application for the Government as Administrator Fishing Vessel Data Display for Administrator Violation Cases Data Display for Administrator Fishing Vessel Data Input Violation Cases Data Input Fishing Vessel Data Edit Violation Cases data Edit Fishing Vessel Data Delete Violation Cases data Delete Total Cases Data for Administrator Data Export Function (to Microsoft Excel) Tabular Data Applications for the Government as Official Fishing Vessel Data Display for Official Violation Cases Data Display for Official Total Cases Data for Official Data Export Function (to Microsoft Excel) xiii

16 Tabular Data Application for Public Fishing Vessel Data Display for Public Violation Cases Data Display for Public Total Cases Data for Public Web-GIS Application Map Display Function Zoom In, Zoom Out, Pan, Zoom to Full Extent Identify Feature Query by Attribute (Search Function) User Login Powered by Menu V. CONCLUSIONS AND RECOMMENDATIONS Conclusions Recommendations REFERENCES APPENDICES xiv

17 LIST OF TABLES Page Table 4.1. Logical model of the system Table 4.2. Physical Design of the system... 54

18 LIST OF FIGURES Page Figure 2.1. Web-based GIS application architecture... 9 Figure 2.2. A simplified database system environment Figure 2.3. The traditional Systems Development Life Cycle (SDLC) Figure 2.4. Application development using prototyping Figure 3.1. Research methodology Figure 4.1. Context Diagram of the system Figure 4.2. Data Flow Diagram Level 1 of the system Figure 4.3. Entity Relationship Diagram of the system Figure 4.4. System architecture Figure 4.5. Welcome screen of the system Figure 4.6. Display of General Information Menu Figure 4.7. Fishing vessel data display for Administrator Figure 4.8. Violation cases data display for Administrator Figure 4.9. Displaying violation cases data in a certain time range Figure Fishing vessel data input button Figure Fishing vessel data input form Figure Violation cases data input button Figure Violation cases data input form Figure Fishing vessel data edit button Figure Fishing vessel data edit form Figure Violation cases data edit button Figure Violation cases data edit form Figure Fishing vessel delete button Figure Fishing vessel data delete confirmation Figure Violation cases data delete button Figure Violation cases accumulation data for Administrator Figure Export data function to Microsoft Excel data format Figure Data display in Microsoft Excel as export result Figure Fishing vessel data display for Official Figure Violation cases data display for Official... 82

19 Figure Violation cases accumulation data for Official Figure Fishing vessel data display for Public Figure Violation cases data display for Public Figure Total violation case accumulation data display for Public Figure Main interface of the webgis Figure Zoomed In application of the map Figure Identify Feature application in the map Figure Query by Attribute application in the map Figure Bar chart of violation case in total years Figure Pie chart of violation case in total years Figure Bar chart of violation case in each year Figure Pie chart of violation case in each year Figure Login function for specific users Figure Appreciation and list of software used in the system xvii

20 LIST OF APPENDICES Page Appendix 1. Illegal fishing database in PostgreSQL Appendix 2. Fishing_vessel table in illegal fishing database Appendix 3. Violation_case table in illegal fishing database Appendix 4. View of illegal fishing database, as a virtual database, that relate all required data from separate tables into one table for query purpose Appendix 5. PostgreSQL database storage of shape file data after imported into database

21 I. INTRODUCTION 1.1. Background As an archipelagic country, Indonesia has become the largest one in the world. Indonesia has been known as a country with its abundant natural resources potential at both land and sea areas. In land area, some of them are forests, mineral mines, oil mines, agricultures, fruits, vegetables and animals. While at sea area, there are marine living resources such as fish population, fish stock, coral reefs, mangroves, see grass, beaches, oil and mineral mines and many others. If both areas are compared, then the sea area is larger than land area, that more than 65 percent of Indonesia total area is sea. This makes the sea area has a very high potential role in Indonesia economic development that its resources are able to be utilized. For it is in Indonesia territory, it is Indonesia s right, and also its obligation to utilize and manage its potential resources for the wealth of Indonesia and its citizens. Fish is one of Indonesia sea resources that are potential to be utilized for Indonesia s prosperity. Indonesia has the largest fish biodiversity for about 37 percent of the world s fish species (State Minister for the Environment, 1994 in Purwanto, 2003). This resource will achieve its sustainable yield and optimal production if the management of fishing is conducted in the right way. Fish is a resource that has ability to renew (renewable resources) that affected by several factors such as fish recruitment, individual growth and natural mortality. However this ability is limited. The sustainable fish yield can be achieved when

22 they are harvested not more than their ability to renew in a certain time. If they are harvested more than their ability to renew, fish stock will continually decrease and may extinct. Therefore, for fishing management, the Government has regulated the amount of total fish allowable catch for every species in its growing location/ecosystem on fishing zones and regulated the way and methods for fishers to harvest the fish, based on many researches and monitoring activities. The Government has also developed a system to control the fishers to get permission to fish, so the fishers are expected to know their rights and obligations in fishing. In order to guarantee and stabilize people s loyalty to the rules, especially for the fishers, surveillance activities are conducted. The fact, it is not a simple duty to maintain the stabilization of fishing activities. There have been a lot of violations in Indonesian Fisheries Management Zone (IFMZ) for fishing activities years by years. These activities are known as Illegal Fishing. There are many factors causing these violations, some of them are lack of fishers awareness to respect the law and concern for sea ecosystem and limited frequency of surveillance activities at field. Surveillance activities may not be conducted often regarding the wideness of IFMZ and a limited number of surveillance vessels with their operators and crews compared to it, which cause detailed overall preparations for surveillance action implementation, its duration and determination of which IFMZ to be surveyed. The factors that are also very important are limited reliable provided data, weakness of data management and also ineffectiveness of data outputs to support 2

23 the activities. To encourage fishing management activities, it is needed to have a good data management, data process and analyzing and also good outputs for required data and information to support further fisheries system development and regulations. These requirements can be fulfilled by applying a Geographic Information System (GIS). As a result of growing technology, GIS is continually developed. GIS is capable in assembling, storing, manipulating, and displaying map and database information. GIS allows us to view, understand, question, interpret, and visualize data in a very informative way. Data management is more effective in order to support any management in any sectors by managers that role as decision and policy makers. Also in fisheries management that required good and effective data management, GIS is appropriate to be applied. As its function of providing data and information, some of GIS application for certain purposes, are then developed in web GIS. It means GIS is able to be accessed via internet. Users that have particular interests about the data and information can access directly through web GIS to get what they need. The system in this research is developed in web GIS. There are three target users for this system, which are the Government, divided into an Administrator and an Official; and public. The Government is represented by Department of Marine and Fisheries Affairs and Coordinating Agency of Maritime Security (BAKORKAMLA). The three users have their own restrictions and permissions in accessing the system. This is important to be implemented to support system maintenance and its security. 3

24 1.2. Objectives The objectives of this research are: 1. To design a system that is able to visualize illegal fishing occurrence in IFMZ through a web GIS 2. To implement the prototype of the system 3. To evaluate the prototype and provide recommendations for full implementation of the prototype 1.3. Scopes The scopes of this research are: 1. This research covers Illegal Fishing occurrences in IFMZ. 2. Illegal Fishing occurrences are recorded yearly during activities of surveillance. 4

25 II. LITERATURE REVIEW 2.1. Geographic Information System (GIS) A geographic information system (GIS) integrates hardware, software, and data for capturing, managing, analyzing, and displaying all forms of geographically referenced information. GIS allows us to view, understand, question, interpret, and visualize data in many ways that reveal relationships, patterns, and trends in the form of maps, globes, reports, and charts. A GIS helps you answer questions and solve problems by looking at your data in a way that is quickly understood and easily shared (ESRI 2000). GIS stands for Geographic Information System, often defined as a computerized database management system for capture, storage, retrieval, analysis, and display of spatial data. Any data that includes information about location be it a street address, zip code, census tract, or longitude and latitude coordinates can be considered spatial. Many different types of data can be integrated into GIS and represented as a map layer. When these layers are drawn on top of each other, spatial patterns and relationships often emerge. The most common GIS product is a map, but GIS can be used to generate answers to queries or as part of spatial statistical analysis (Cartographic Modeling Laboratory 2004). In the strictest sense, a GIS is a computer system capable of assembling, storing, manipulating, and displaying geographically referenced information (that is data identified according to their locations). Practitioners also regard the total

26 GIS as including operating personnel and the data that go into the system. A GIS can use information from many different sources and in many different forms. Any variable that can be located spatially can be fed into a GIS. Also, different kinds of data in map form can be entered into a GIS. A GIS makes it possible to link, or integrate, information that is difficult to associate through any other means. Thus, a GIS can use combinations of mapped variables to build and analyze new variables (USGS 2000). GIS is used to display and analyze spatial data which are tied to databases. This connection is what gives GIS its power: maps can be drawn from the database and data can be referenced from the maps. When a database is updated, the associated map can be updated as well. GIS databases include a wide variety of information including: geographic, social, political, environmental, and demographic. Geographic Information System (GIS) technology is a computerbased data collection, storage, and analysis tool that combines previously unrelated information into easily understood maps. But GIS is much more than maps. A GIS can perform complicated analytical functions and then present the results visually as maps, tables or graphs, allowing decision-makers to virtually see the issues before them and then select the best course of action (MapCruzin 2008). GIS is a rapidly growing technological field that incorporates graphical features with tabular data in order to assess real-world problems. The key word to this technology is Geography - this usually means that the data (or at least some proportion of the data) is spatial, in other words, data that is in some way 6

27 referenced to locations on the earth. Coupled with this data is usually tabular data known as attribute data. Attribute data generally defined as additional information about each of the features, which can then be tied to spatial data. GIS operates on many levels. On the most basic level, GIS is used as computer cartography, i.e. mapping. The real power in GIS is through using spatial and statistical methods to analyze attribute and geographic information. The end result of the analysis can be derivative information, interpolated information or prioritized information (GIS Lounge 2008) Web Geographic Information Systems (Web GIS) Much recent attention has focused on developing GIS functionality in the Internet, Worldwide Web, and private intranets and is sometimes termed Web GIS. Web GIS holds the potential to make distributed geographic information (DGI) available to a very large worldwide audience. Internet users will be able to access GIS applications from their browsers without purchasing proprietary GIS software. Web GIS will make it possible to add GIS functionality to a wide range of network-based applications in business, government, and education. The challenge of Web GIS lies in creating software systems that are platform independent and run on open TCP/IP-based network, that is on any computer capable of connecting to the Internet (or any TCP/IP-based network) and running a Web browser. This task is different from running proprietary GIS software over local-area networks (LANs) or intranets on just a few types of computer hardware. Such systems already exist. Many strategies can be employed to add GIS functionality to the Web: Server-side strategies allow users (clients) to submit 7

28 requests for data and analysis to a Web server. The server processes the requests and returns data or a solution to the remote client, Client-side strategies allow the users to perform some data manipulation and analysis locally on their own machines, and Server and client processes can be combined in hybrid strategies that optimize performance and meet special user needs. The visual design of the Web GIS interface requires great care to assure that users can understand and make use of the information and functions provided by the system (Foote & Kirvan 1997). The synergy of Geographical Information Systems and Web Technology allows access to dynamic geospatial information without burdening the users with complicated and expensive software. The World Wide Web provides GIS users easy access to spatial data in a distributed environment through a simple browser interface or sometimes by a lightweight client side application. The concept of Web GIS is based on how the map is produced and responds to users' interactions over the Web. The publication and distribution of spatial data are increasingly important activities enabling organizations to share domain-specific dynamic spatial information over the Web. Web GIS add GIS functionality to a wide range of internet-based applications in government, business, research and education. It has several advantages such as worldwide access, dynamic data access and userfriendly interface. Web GIS is useful to any organization that deals with geographic information for decision support on a distributed environment. It becomes more important when the location-specific information is dynamic and decisions have to be made on real time basis. Examples are the market prices of commodities of various markets, the stock and supply-chain management, real 8

29 time weather information, real estate, asset management and asset tracking (GIS Development Centre 2007). Referring to Hu (2002), web-based GIS applications are becoming an important tool to disseminate geographical information on the Internet because of their platform independence, interactivity, and wide accessibility. Those applications can be generally categorized into two types: to allow various endusers to access spatial database and conduct simple spatial analysis and to allow end-users to perform sophisticated spatial analysis for decision-making. Webbased GIS applications are based upon the interactions between clients and server computer systems through network technology. The architecture can be seen in Figure 2.1. Figure 2.1. Web-based GIS application architecture (Hu 2002) 9

30 Internet GIS is not necessarily synonymous with Web-based GIS. Internet GIS refers to the use of the Internet as a means to exchange data, perform GIS analysis, and present results, whereas Web-based GIS refers to the use of World Wide Web (WWW) as primary means. WWW is a networking application supporting a HyperText Transfer Protocol (HTTP) that runs on top of the Internet, while there are many other applications that are run on the top of the Internet but are not part of the Web, such as , File Transfer Protocol (FTP) and Telnet (Peng & Tsou 2003). As the advantages of web mapping, Internet mapping opens many new possibilities such as geographically communicating with other people in presenting ideas and integrating information or making the right decision in figuring out which is the shortest route through the traffic. Furthermore, interactive maps often let you query the data in order to derive more useful information such as where is the nearest and cheapest supermarket in comparison to traditional maps that are static. Other benefits are for instance displaying multiple data sets. The question of data sharing gets more important at the same time as digital data resources are growing with the expansion of the World Wide Web. Probably, consumer-directed applications of web mapping will replace the need of users to own large amounts of software because internet sessions will get more interactive and web sites will more and more adopt the task of data processing. Moreover there is a growing trend in using web mapping for government services. Institutions collect, use and supply monitoring information and consequently data sharing plays a major role that will be improved through Web mapping. In addition, Internet mapping opens a new source of accessing 10

31 geographical data very fast, because searching for paper maps for getting locational data gets superfluously if almost all kind of maps are available over the WWW in only some minutes. But as the problem, Users should think about that the data transfer is affected by the speed of the Internet connection as well as it depends which data type is transferred (Weise 2001). A GIS can perform complicated analytical functions and then present the results visually as maps, tables or graphs, allowing decision-makers to virtually see the issues before them and then select the best course of action. Add the Internet, and GIS offers a consistent and cost-effective means for the sharing and analysis of geographic data among government agencies, private industry, nonprofit organizations, and the general public (MapCruzin 2008) Database and Database Management System A database is a large collection of interrelated data stored within a computer environment. In such environments, the data is persistent, which means that it survives unexpected software or hardware problems (except severe cases of disk crashes). Both large data volume and persistence, two major characteristics of databases, are in contrast with information manipulated by programming languages, which is small enough in volume to reside in main memory and which disappears once the program terminates (Rigaux et al. 2002). Based on Hernandez (2003), a database is an organized collection of data used for the purpose of modeling some type of organization or organizational process. It really doesn't matter whether it is using paper or a computer software 11

32 program to collect and store the data. As long as data are gathered in some organized manner for a specific purpose, it is a database. Simply put, a database is a computerized record keeping system. More completely, it is a system involving data, the hardware that physically stores that data, the software that utilizes the hardware's file system in order to 1) store the data and 2) provide a standardized method for retrieving or changing the data, and finally, the users who turn the data into information. The important thing is that a database allows you to store data and get it or modify it when you need to easily and efficiently regardless of the amount of data being manipulated (Sol 1998). A database is a collection of data, typically describing the activities of one or more related organizations. While a database management system or DBMS is software designed to assist in maintaining and utilizing large collections of data. A DBMS provides efficient data access, data independence, data integrity, security, quick application development, support for concurrent access, and recovery from system failures. Using a DBMS provides the user with data independence, efficient data access, automatic data integrity, and security (Ramakrishnan & Gehrke 2000). According to Rigaux et al. (2002) a Database Management System (DBMS) is a collection of software that manages the database structure and controls access to data stored in a database. Generally speaking, a DBMS facilitates the process of : Defining a database; that is, specifying the data types, structures, and constraints to be taken into account. 12

33 Constructing the database; that is, storing the data itself into persistent storage. Manipulating the database. Querying the database to retrieve specific data. Updating the database (changing values) Figure 2.2 depicts a simplified database system environment. It illustrates how a DBMS acts as a mediator between users or application programs and the devices where data resides. DBMS software consists of two parts. The upper part processes the user query. The lower part allows one to access both the data itself (denoted stored database in the figure) and the metadata necessary to understand the definition and structure of the database (Rigaux et al. 2002). Figure 2.2. A simplified database system environment (Rigaux et al. 2002) 13

34 Using a DBMS to manage data has many advantages: Data independence: Application programs should be as independent as possible from details of data representation and storage. The DBMS can provide an abstract view of the data to insulate application code from such details. Efficient data access: A DBMS utilizes a variety of sophisticated techniques to store and retrieve data efficiently. This feature is especially important if the data is stored on external storage devices. Data integrity and security: If data is always accessed through the DBMS, the DBMS can enforce integrity constraints on the data. Also, the DBMS can enforce access controls that govern what data is visible to different classes of users. Data administration: When several users share the data, centralizing the administration of data can offer significant improvements. Experienced professionals who understand the nature of the data being managed, and how different groups of users use it, can be responsible for organizing the data representation to minimize redundancy and for fine-tuning the storage of the data to make retrieval efficient. Concurrent access and crash recovery: A DBMS schedules concurrent accesses to the data in such a manner that users can think of the data as being accessed by only one user at a time. Further, the DBMS protects users from the effects of system failures. 14

35 Reduced application development time: Clearly, the DBMS supports many important functions that are common to many applications accessing data stored in the DBMS. This, in conjunction with the high-level interface to the data, facilitates quick development of applications. Such applications are also likely to be more robust than applications developed from scratch because many important tasks are handled by the DBMS instead of being implemented by the application (Ramakrishnan & Gehrke 2000) Database Design The structure of the data is described in terms of a data model and the description is called a schema. The relational model is currently the most popular data model. A DBMS distinguishes between external, conceptual, and physical schema and thus allows a view of the data at three levels of abstraction. Physical and logical data independence, which are made possible by these three levels of abstraction, insulate the users of a DBMS from the way the data is structured and stored inside a DBMS (Ramakrishnan & Gehrke 2000). The entity-relationship (ER) data model allows us to describe the data involved in a real-world condition in terms of objects and their relationships and is widely used to develop an initial database design. The ER model is important primarily for its role in database design. It provides useful concepts that allow us to move from an informal description of what users want from their database to a more detail, and precise, description that can be implemented in a DBMS. Within the larger context of the overall design process, the ER model is used in a phase called conceptual database design (Ramakrishnan & Gehrke 2000). 15

36 According to Ramakrishnan and Gehrke (2000), the database design process can be divided into six steps: (1) Requirements Analysis, (2) Conceptual Database Design, (3) Logical Database Design, (4) Schema Refinement, (5) Physical Database Design and (6) Security Design. The ER model is most relevant to the first three steps Approach for Information System Development Based on O Brien (1999), most computer-based information systems are conceived, designed and implemented using some form of systematic development process. In this process, end users and information specialists design information systems based on an analysis of the information requirements. Thus, a major part of this process is known as system analysis and design. Using the systems approach to develop information system solutions involves a multistep process called the information systems development cycle, also known as the systems development life cycle (SDLC), which includes the steps of investigation, analysis, design, implementation and maintenance. All the activities involved are highly related and interdependent, as shown in Figure 2.3 below. Systems Investigation Systems Analysis Systems Design Systems Implementation Systems Maintenance Figure 2.3. The traditional Systems Development Life Cycle (SDLC) (O Brien 1999) 16

37 Figure 2.3 above shows that the steps are flowing in cycle and it is able to recycle back to any previous step if more work is needed. Systems investigation, as the first step, determines whether a problem or opportunity exists and then conduct a feasibility study to determine whether a new or improved information system is a feasible solution. The second step is systems analysis that analyzes the information needs of end users that use the system. The third step is systems design that develops specifications for the hardware, software, people, network and data resources, and information products that will satisfy the functional requirements of the proposed system. The fourth step is systems implementation which acquires or develops hardware and software, and then tests the system to the real condition, train people to operate and use the system. The fifth step is systems maintenance that uses a post-implementation review process to monitor, evaluate and modify the system as needed (O Brien 1999). Prototyping is the rapid development and testing of work models, or prototypes, of new applications in an interactive, iterative process that can be used by both systems analysts and end users. Prototyping makes the development process faster and easier for systems analysts. Prototyping has also opened up the application development process to end users because it simplifies and accelerates systems design. These developments are changing the roles of end users and information system specialists in systems development. It changes and simplifies some of the activities of information systems development (SDLC), as shown in Figure 2.4 below. 17

38 Identify an End User s Information Requirements Investigation/Analysis. End users identify their information needs and assess the feasibility of several alternatives information system solutions Prototyping Cycle Maintenance Cycle Develop Information System Prototypes Revise the Prototypes to Better Meets End User Requirements Use and Maintain the Accepted System Analysis/Design. End users and/or systems analysts use application development packages to interactively design and test prototypes of information system components that meet end user information needs. Design/Implementation. The information system prototypes are tested, evaluated, and modified repeatedly until end users find them acceptable. Implementation/Maintenance. The accepted information system can be modified easily since most system documentation is stored on disk. Figure 2.4. Application development using prototyping (O Brien 1999) Figure 2.4 illustrates that prototyping is an iterative, interactive process that combine steps of the traditional systems development cycle. The prototype is usually modified several times until the end user finds it acceptable (O Brien 1999) General Understanding of Illegal, Unreported and Unregulated Fishing (IUU Fishing) Illegal fishing is considered to be an act by a fishing vessel and or fishers contrary to the laws of a flag State or in contravention of the laws of a coastal State or in contravention of internationally agreed conservation and management measures. Unreported fishing is considered to mean that fishing vessels or 18

39 fishers dispose of their catch in a manner or in a place so as to avoid reporting catch data to the competent authority. The lack of due diligence by a flag State, could also lead to it falling short of its duties to report aggregated fisheries data at the global, regional or sub-regional level as the case may be. Unregulated fishing may be the consequence of the lack of provisions in domestic and or international law that set the management and conservation measures in relation to a fishery. More commonly, it is likely that monitoring, control and surveillance systems as well as enforcement provision are not in place or where they are in place they are ineffective (Fitzpatrick 2000). IUU fishing has many facets and motivations, through the most obvious underlying motivations are those of an economic nature. Different in scope and severity, the impact of IUU fishing on resources is, non-the-less, similar: In any form it serves to undermine national and regional efforts to conserve and manage fish stocks. In cases where stocks are seriously depleted, IUU fishing will inhibit, if not prevent, the re-building of those stocks (Doulman 2000). A major form of illegal fishing within coastal States jurisdictions is poaching by vessels with no permission to fish there. To address this, States - particularly developing States - need improved surveillance and enforcement (boats, aircraft, satellite coverage, etc). In areas such as developing States, poachers can easily move from one country s EEZ to that of another country. The other major form of illegal fishing within coastal States jurisdictions is noncompliance with the terms of their licenses by vessels licensed to fish there (whether flagged to the coastal State or another State) (Bray 2000). 19

40 2.7. Monitoring, Control and Surveillance (MCS) Implementation as Actions to Combat IUU Fishing Along with the potential for enhanced economic benefits, the 1982 Convention on the Law of the Sea also brought with it responsibilities for coastal States in the utilization of its marine resources. It is this latter responsibility that, in many cases, has demonstrated the need for development and control over the use of a country's marine resources. Fisheries are central to this development, as fish and their habitat are key resources in the exclusive economic zone. Monitoring, control and surveillance (MCS), especially for the fisheries sector, is the implementing tool to meet these obligations. MCS, which has often been thought of as a luxury for developed States, has now become an obligation for all States to work together to conserve the marine resources and their environment (Flewwelling 1995). There is ample literature on the subject of MCS and there are several definitions and interpretations; those commonly used by fisheries personnel stem from the MCS Conference of Experts in 1981 in Rome and are broadly defined as: i. monitoring - the continuous requirement for the measurement of fishing effort characteristics and resource yields. ii. control - the regulatory conditions under which the exploitation of the resource may be conducted. iii. surveillance - the degree and types of observations required to maintain compliance with the regulatory controls imposed on fishing activities 20

41 More simply stated, MCS is the implementation of a plan or strategy. In the case of oceans management and fisheries, it includes the implementation of operations necessary to effect an agreed policy and plan for oceans and fisheries management. MCS is an often overlooked aspect of oceans and fisheries management; but, in reality, it is the key to the success of any planning strategy. The absence of a strategy and methodology for implementation of monitoring, control and surveillance operations would render a fisheries management scheme incomplete (Flewwelling 1995). Acceptance of the aforementioned definition of monitoring, control and surveillance emphasizes the point that MCS is a three-tiered system. The monitoring and control aspects of MCS provide the base of information and legal framework for sound fisheries management and operational planning. The surveillance phase is the most expensive aspect of MCS and hence, developing countries must look at the most cost-effective methods to carry out functions related to this component. MCS activities are not solely enforcement operations, but also include the collection of data, and quality control of that data, for input into the stock assessment, social and economic, and enforcement exercises that comprise the components of fisheries management as well as safety-at-sea (Flewwelling 1995). It is impossible to make concrete suggestions which would quantify the MCS requirements of each situation, as they will be different for each system. It is possible, however, to make suggestions on core requirements and to leave the quantification to each Fisheries Administrator. For example, the monitoring 21

42 component of MCS would be best served through the receipt of information from the licensing unit, sea going units for sea sightings and inspections, port inspections and air sightings for vessel identification, activity and location. These seemingly simple tasks will require a data network and communications system. The system can also include data on the fishers licenses, fishing gear, types of vessels, fishing patterns, fishers and community profiles with respect to dependency and earnings from fishing and any other fisheries management information required. These data can be used for verification of licensing conditions, catch and effort for resource assessment and sustainable fisheries management planning for the future. The accumulation of data will require a storage and analysis capability which, although it can be manual, is best achieved with computers. It will be necessary to determine the number of entry points for data and to establish a network capability so the resultant analyses can be redistributed to all fisheries offices. This means offices in major fisheries landing points, collection schemes for sea, land and air data, and a central office for analysis, distribution and operational decision-making (Flewwelling 1995). The control component of MCS will necessitate the determination of appropriate and enforceable legislation required to implement the fisheries plans for the various fisheries. It will address the authorities of fisheries personnel, legal fishing activities, minimum terms and conditions for fishing, and penalties for non-compliance. The minimum conditions which a State may wish to implement could include vessel identification, catch and reporting requirements, conditions for transhipment, standard catch and effort log sheets, terms and living conditions for observers, local agents for international fishing partners, and flag 22

43 State responsibility for their vessels. The control component will link with the State's justice department and also necessitate the appropriate training of all personnel involved in enforcing the legislation, including sessions where the assistance and advice of the judiciary is requested. The infrastructure requirement for this component of fisheries MCS is a team of knowledgeable fisheries lawyers for both drafting of enforceable and appropriate legislation, and also for the legal follow-up which may be required to implement these laws. This component will also establish the various mechanisms, strategies and policies for the implementation of operations (MCS activities) to implement the fisheries management plans (Flewwelling 1995). The surveillance component of MCS will require fisheries personnel who not only collect data for the monitoring aspect of MCS during their surveillance duties, but also have the appropriate equipment, operating funds and training to enforce the legislative mechanisms of fisheries management. These personnel will require direction and infrastructure from which to operate, be it land, sea or air facilities. This is the enforcement component of fisheries MCS and as such is usually the largest and most expensive activity to fund. It must be remembered that for international MCS activities, there is a requirement under the Convention on the Law of the Sea that all surveillance equipment be clearly marked and identifiable as on government service (Flewwelling 1995) Area and Potencies of Indonesian Sea Indonesia is the largest archipelagic state in the world. It has a total of 17,508 islands and coastal line of 81,000 km in length. Indonesia lies around 23

44 equator between 94 45' E ' E and 06 08' N ' S. Spatially, Indonesia territory extends from West to East in 5,110 km and 1,888 km from North to South. Indonesia consists of five big islands, Sumatera, Java, Borneo, Celebes and Papua. About 65 percent of Indonesia territory is covered by sea. Total coverage of Indonesia Sea is about 5.8 million square km, consist of 0.3 million square km of territorial sea, 2.8 square km of national sea, and 2.7 square km of Exclusive Economic Zone. Indonesia coastal and marines are famous with its resources richness, both renewable (fisheries, mangroves and coral reefs) and un-renewable resources (oil and natural gas, and mined minerals). Indonesia is known to have the biggest marine biodiversity in the world, it has a very wide and various coastal ecosystem like mangrove forests, coral reefs, and sea grasses. The sustainable marine resources potential is about 6.7 million ton per year that has been 48 percent utilized. Despite of that, there have been over fishing in some area, especially in the West side (Badan Pengendalian Lingkungan Hidup Daerah 2001). Indonesian sea area has approximately 5.6 million square km wide with coastal line 81,290 km in length, with high potencies of natural resources, especially fisheries, both in its quantity and biodiversity. In addition to it, Indonesia is still has rights to participate in management and utilization of the resources in high seas outside 200 miles boundaries of Economic Exclusive Zones (EEZ), and also management and utilization of natural resources in international ocean sea floor outside continent boundaries. By looking at Indonesia islands configuration and its strategic location, geologic and environment condition, Indonesia has several comparative superiorities beside other countries, which are: 24

45 Marine Mega Biodiversity: Indonesia sea has high biodiversity both scientifically and commercially, therefore needed to be managed wisely. Plate Tectonic: Indonesia is a place where three tectonic plates meet, making it has high sea floor natural resources. But also make it vulnerable for natural disaster occurrences. Dynamic Oceanographic and Climate Variability: Indonesia sea is the meeting point of Pacific and Indonesia Ocean flows, therefore it become an important area in the global ocean flow system that determines national, regional and global climate variability and affects natural resources abundance and distribution (Badan Riset Kelautan Dan Perikanan 2008) Indonesia Fish Consumption Needs Along with Indonesia population growth, fish consumption nationally is assessed to be increasing. The latest data says, in year 2005 fish consumption national rate had reached 26 kg/capita/year. Fish production nationally was only 58.5% of sustainable fish potential that reach 6.18 million ton. The production was just reached 4.97 million ton. If it is assumed that Indonesia population in is 220 million, then fish production should be about 5.72 million ton per year (Department of Marine Affairs and Fisheries 2008). In the last 5 years, national fish consumption was increasing to more than 1.2 million ton along with population rate that reached 1.34 % per year. Regarding Indonesia fish production condition, it was obvious that national fish import rate increased to % (in year ), which was far below 25

46 national fish export rate that only reached 1.6 % (Wahana Lingkungan Hidup Indonesia 2007) Indonesia Loss Due to Illegal Fishing Activities Food and Agriculture Organization (FAO) stated that Indonesia had lost about 30 trillion rupiahs per year because of IUU Fishing activities. The loss level was about 25 % of Indonesia fisheries total potential that reached 1.6 million ton per year, based on Department of Marine Affairs and Fisheries (DKP) research (Department of Communications and Informatics 2008). Indonesia continuously committed on fighting IUU Fishing through surveillance operation held regularly. As results, in 2007 DKP had succeeded arrested 184 fishing vessels involved in IUU Fishing activities. There were 89 foreign fishing vessels and 95 local ones. This arrest saved Indonesia from loss for about billion rupiahs, in detail: 34 billion rupiahs for Fisheries Income Tax, 23.8 billion rupiahs for Fuel Subsidy, 381 billion rupiahs for saved fisheries resources or about 43,208 ton (Department of Communications and Informatics 2008). Indonesian Government war against Illegal Fishing in years had showed significant results and progress every year. During , Indonesia had been saved trillion rupiahs of loss from surveillance activities (Department of Communications and Informatics 2008). 26

47 III. RESEARCH METHODOLOGY 3.1. Time and Location of the Research The research was performed from August 2006 to May Step of data collection for the research was done in Department of Marine Affairs and Fisheries in Jakarta, while the step of development of web GIS was performed in campus of Master of Science in Information Technology for Natural Resources Management of Bogor Agricultural University (IPB), SEAMEO-BIOTROP Bogor Methodology Development of information system is implementing prototyping method. Prototyping method is used because this method simplifies and accelerates the steps of system development life cycle (SDLC), as shown in Figure 2.4. Generally, method of this research is in three main steps, they are: requirements analysis step, development of information system step, and system implementation step. The first step, requirements analysis is implemented in four steps, which are: problems identification, user needs analysis, data collection and data preparation. While the second step, development of information system is applied in four steps: software and hardware selection, database design, system design and graphical user interface (GUI) design. The third step, system implementation is

48 applied in two steps: system testing and system maintenance. Figure 3.1 shows detail methodology of this research. Step 1 Requirements Analysis Problems Identification User Needs Analysis Step 2 Data Collection Data Preparation Development of Information System Software and Hardware Selection System Testing Step 3 System Implementation Database Design System Design System Maintenance Graphical User Interface (GUI) Design Figure 3.1. Research methodology 28

49 Requirements Analysis The first step of the method is to understand what requirements are needed for developing information system. The requirements include problem identification, user need analysis, data collection and data preparation. Problems identification and user needs analysis is important to state the goals/objectives to develop an information system. This is usually an informal process that involves discussions with user groups and also a study of the current operating environment. System developer should identify what users need to utilize related to problems that they may be facing. This can be done by discussing and interviewing the users about the problems/obstacles that they need to overcome. After problems and user needs have been identified, the next step is to collect required supported data in order to develop appropriate system to fulfill user needs and answer the problem faced. Data sufficiency will support completion of the system developed and make the system to produce reliable data and information. Collected data should also be prepared and managed to be utilized in the system. Many data sources may cause differences in data format therefore data preparation should be done. Data preparation goal is to manage data to have appropriate data standards in their format, accuracy, completeness and reliability. Standardized data will make data utilization effortless in system development. 29

50 Development of Information System The next step after requirements analysis is development of information system. There are four steps for development of information system: software and hardware selection, database design, system design and graphic user interface (GUI) design Software and Hardware Selection After appropriate data are collected and prepared, then the next step is software and hardware selection. Softwares are chosen for database management system (DBMS) and for web GIS application. As shown before in Figure 3.1, software are needed in DBMS as management for database, storing database definition metadata, accessing the stored data and processing queries. After data are managed in DBMS, application softwares that utilize the DBMS are determined. The determination of the software should consider several aspects: compatibilities with the DBMS software, the ease of use and availability in the domestic markets. The next step is hardware selection. Appropriate hardware selection is important that the selected software can be run conveniently on the selected hardware platform. Appropriate hardware selection may minimize technical obstacles in activating the system Database Design According to Ramakrishnan and Gehrke (2000) the database design process can be divided into six steps: 30

51 (1) Requirements Analysis (2) Conceptual Database Design: The information gathered in the requirements analysis step is used to develop a high-level description of the data to be stored in the database, along with the constraints that are known to hold over this data. This step is often carried out using the ER model, or a similar high-level data model. (3) Logical Database Design: We must choose a Database Management System (DBMS) to implement our database design, and convert the conceptual database design into a database schema in the data model of the chosen DBMS. We will only consider relational DBMSs, and therefore, the task in the logical design step is to convert an ER schema into a relational database schema. The result is a conceptual schema, sometimes called the logical schema, in the relational data model. (4) Schema Refinement: The fourth step in database design is to analyze the collection of relations in our relational database schema to identify potential problems, and to refine it. In contrast to the requirements analysis and conceptual design steps, which are essentially subjective, schema refinement can be guided by some elegant and powerful theory. (5) Physical Database Design: In this step we must consider typical expected workloads that our database must support and further refine the database design to ensure that it meets desired performance criteria. This step may simply involve building indexes on some tables and clustering some tables, or it may involve a 31

52 substantial redesign of parts of the database schema obtained from the earlier design steps. (6) Security Design: In this step, we identify different user groups and different roles played by various users. For each role and user group, we must identify the parts of the database that they must be able to access and the parts of the database that they should not be allowed to access, and take steps to ensure that they can access only the necessary parts System Design The system is based on client/server GIS architecture. The client-side components are separated from server-side components (databases and programs). Client/server architecture allows distributed clients to access a server remotely by using distributed computing techniques. The client side components are usually platform dependent (Peng & Tsou 2003). There are three alternative approaches to separating functionality across different DBMS-related processes; these alternative distributed DBMS architectures are called Client-Server, Collaborating Server, and Middleware. A Client-Server system has one or more client processes and one or more server processes, and a client process can send a query to any one server process. Clients are responsible for user-interface issues, and servers manage data and execute transactions. Thus, a client process could run on a personal computer and send queries to a server running on a mainframe. This architecture has become very popular for several reasons. First, it is relatively simple to implement due to its clean separation of functionality and because the server is centralized. Second, 32

53 expensive server machines are not underutilized by dealing with mundane userinteractions, which are now relegated to inexpensive client machines. Third, users can run a graphical user interface that they are familiar with, rather than the (possibly unfamiliar and unfriendly) user interface on the server (Ramakrishnan & Gehrke 2000) Graphical User Interface (GUI) Design Graphical User Interface (GUI) is a type of user interface which allows users to interact with electronic devices such as computers, in this case, to connect visually information system and users. A GUI offers graphical icons, and visual indicators such as windows, pull-down menus, buttons, scroll bars, as opposed to text-based interfaces, typed command labels or text navigation to fully represent the information and actions available to users. Users utilize GUI to access and run the system applications. GUI contains pages that show about the system contents, its facilities, help or guidance to utilize the system, button and links to access system s environment. Therefore GUI should be as simple, easy to use, user-friendly, and understandable as possible System Implementation After development of information system, then the system is tested to implement in order to see whether it works properly or not. System testing can be done in one computer environment, where it becomes the server and also the 33

54 client. After that, the testing can be done by storing the system in server, and a remote client access the system by using browser. Results of system testing are used as basis for the next step, system maintenance. Technical obstacles or system errors that may occur are observed and fixed. System maintenance is also a step to continually checking the system to perform some updates and modifications for further system utilization. 34

55 IV. RESULTS AND DISCUSSIONS 4.1. Requirements Analysis Requirements analysis is the first step of this research. In this section, steps of requirements analysis are described Problems Identification A good system is the one that is able to give answers and recommendations for problems and obstacles dealt in some particular condition in real world. Problems identification is the first step of requirement analysis. From this step, it is expected obstacles are identified and utilized as basics in system development in order to provide recommendations to overcome the problems. Problems that are identified are described as follows: 1. Data of illegal fishing arrestments had been collected and stored into tabular data, but the data are not yet organized and managed in a good database management system. There are many differences in tabular data column/field name format, causes recorded data from different surveillance activities may not be in the same standard. 2. There are many data redundancies in illegal fishing arrestments recorded data between one data record table and another. It causes ineffective and inefficiency for recording, managing and retrieving the recorded data.

56 3. Valuable data records of illegal fishing arrestments are not maximally utilized. Instead of only stored in printed/hard copy and softcopy and used as reported data, they will be more useful to be used in a better function, which to be used in web GIS application. 4. It is needed to have a system that is capable to display illegal fishing data visually through a web GIS to support analyses of the arrested illegal fishing User Needs Analysis There are three types of users of the web GIS. They are the Government, divided into an Administrator and an Official; and public. (1) The Government, as an Administrator The Government as an Administrator, in this matter is represented by the Department of Marine Affairs and Fisheries of Indonesia and Coordinating Agency of Maritime Security (BAKORKAMLA) use the system to identify and analyze the condition and problems that occur in IFMZ related to illegal fishing issues. Government can utilize the information given by the system to support the decision making of their actions and policies related to the occurrence of the problems. In the web GIS, the Administrator has access to: Visualize illegal fishing occurrences that occur in years in IFMZ in an interactive map, that is able to be managed and arranged which data to be displayed, in a certain scale and location 36

57 Display and observe complete data of the violating fishing vessels: their vessel names, captains, crews, tonnages, vessel types, fishing tools, nationalities and permissions, including fishing vessel owner, whether owned by privates or companies directly from the map or in tabular data Display and observe the violating fishing vessels: their types of violation, which surveillance vessel arrested them, time, location, and coordinates of violation Input new fishing vessels and violations data, edit and delete existing data for answering data changes for system maintenance Search, query and display fishing vessels and violation occurrences by inputting vessel name or its violation types Display and observe the violations in chart data to be analyzed for its trend to support fisheries decision making and regulation As an Administrator, the Government has unlimited access to all data in the system (2) The Government, as an Official user The second level in the Government is an Official user. Official has access to the data with a few limitation compared to an Administrator. Official user may be categorized as an operator function. In the web GIS, the Official has access to: 37

58 Visualize illegal fishing occurrences that arise in years in IFMZ in an interactive map, that is able to be managed and arranged which data to be displayed, in a certain scale and location Display and observe complete data of the violating fishing vessels: their vessel names, captains, crews, tonnages, vessel types, fishing tools, nationalities and permissions, including fishing vessel owner, whether owned by privates or companies directly from the map or in tabular data Display the violating fishing vessels: their types of violation, which surveillance vessel arrested them, time, location, and coordinates of violation Search, query and display fishing vessels and violation occurrences by inputting vessel name or its violation types Display the violations in chart data Official user is not authorized to: Input new fishing vessels and violations data, edit and delete existing data for answering data changes for system maintenance (3) Public, as the third user Public also have important roles in combating illegal fishing in IFMZ. From the web GIS, public will recognize and realize the loss of Indonesia by illegal fishing in IFMZ. Their awareness will also support achievement of combating illegal fishing. Through the web GIS, the public requires to: 38

59 Display data of the violating fishing vessels: their vessel names, captains, crews, tonnages, vessel types, fishing tools, and nationalities directly from the map or in tabular data Display the violating fishing vessels: their types of violation, which surveillance vessel arrested them, time, location, and coordinates of violation Search, query and display fishing vessels and violation occurrences by inputting vessel name or its violation types Display the violations in chart data Public user is not authorized to Display all data that may describes and traces certain owner or company s fishing vessels properties, therefore public is not authorized to display the owner of fishing vessels, whether they are owned by privates or companies By the same reason, the public is not authorized to display permission number of fishing vessel Input new fishing vessels and violations data, edit and delete existing data. 39

60 Data Collection There are two types of data that are collected, which are spatial and non spatial data, where both data are integrated in the system. Data for the research are collected from Department of Marine Affairs and Fisheries of Indonesia in Jakarta. The data that are used in this research are: 1. Spatial data a. Map of Indonesia, including its land and sea area with the coordinates (shape file format) b. Locations of fishing ground and fisheries zones of IFMZ or WPP: Wilayah Pengelolaan Perikanan (shape file format) c. Coordinates of violation occurrences in IFMZ, in latitudes and longitudes d. Map of bathymetry that displays the depth of IFMZ (shape file format) e. Map of sea location names: sea names (shape file format) f. Grids of Indonesia (coordinates) 2. Non-spatial/Tabular data Non-spatial/tabular data used are data of fishing vessel and illegal fishing arrestments by Department of Marine Affairs and Fisheries that conducted regularly every year through fisheries surveillance activities. Sometimes these activities are carried out together with TNI-AL (Indonesian Navy). Surveillance activities are carried out by going to the sea and check fishing vessels they 40

61 assemble. The fishing vessels are surveyed for their vessel permission, completeness of fishing tools and their fishing method. From surveillance activities there are fishing vessels arrested for violations and some of them are allowed to continue their activities because there are no violations identified. The data from every surveillance activity are collected and recorded yearly. These data are data of all surveyed fishing vessels, including fishing vessel data such as fishing vessel names, permissions, nationality, crews and captain; date and time of surveillance activities; data of violations done by fishing vessels with its coordinates locations also the actions or penalties to the violating fishing vessels by the authorities on the field Data Preparation Data preparation is a step to observe the collected data. Data standardization is applied, where data should be in same format, type and scale, for spatial data. Prepared data would support data process, integration and manipulation Development of Information System After the step of requirements analysis, the next step is development of information system. In this section, detail steps of development of information system are described. 41

62 Software and Hardware Selection In order to support the system to be run conveniently, appropriate software and hardware should be selected. The first step in development of information system is software and hardware selection Software Selection There are many softwares for information system development. A few factors are considered for software selection, such as software licensing factor, easiness to get and use and stability. Now the Open-source softwares are widely developed. Open-source software means application softwares that can be get and use without having to pay for any licenses to any developers. The software development is usually done by some developers, and then the result is given to public with its source codes to be used. The users are free to give any improvement in the software utilization especially in its source codes. development: Regarding the factors above, below are software selected for the system a) Software for Database Management PostgreSQL PostgreSQL is an open source software that is capable in storing both spatial and non-spatial data in one database. This allows database developers to easily and effectively manage and integrate both data type. 42

63 And also, PostgreSQL database can integrate conveniently with mapserver. PostGIS PostGIS is an open source software that usually comes together with PostgreSQL. PostGIS is used to help configuring and managing PostgreSQL spatial database management system. MySQL MySQL is an open source software to manage and store database. In this research, MySQL is used for storing the structures and pages of web design that is developed by using Joomla software, because Joomla software uses MySQL database as its associate b) Scripting Language PHP PHP (PHP Hypertext Preprocessor) is a widely used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML (The PHP Group 2006). PHP is used to link both spatial and non-spatial data to be used in internet Notepad++ Notepad++ is an Open Source software that is used to assist in writing and managing the scripting language. 43

64 c) Software of GIS Quantum GIS Quantum GIS is an open source software that is used to process and manage the spatial data that are used in web GIS. It is done from spatial data preparation, then configuration of the data, integration with mapserver until later maintenance of the system. GvSIG GvSIG is an open source software that is used to process and manage spatial data. The other function of this software is its capability to configure the spatial data to integrate with mapserver. d) Software for Developing Web GIS MapServer MapServer is an Open Source platform for publishing spatial data and interactive mapping applications to the web. It excels at rendering spatial data (maps, images, and vector data) for the web (University of Minnesota, 2008). Apache Apache is used as HTTP or web server application. 44

65 Ka-Map Ka-Map is an open source project that is aimed at providing a javascript API for developing highly interactive web-mapping interfaces using features available in modern web browsers (MapTools.org) e) Software for Constructing Web Interface and Management Joomla Joomla is an open source software that is used to assist web developer to build and manage graphic user interface and structure of the web f) Software for Operating System and Client-side Microsoft Windows XP or other versions above it Microsoft Windows XP is used as the operating system. Web browser softwares Web browser softwares are used at the client side to access the web GIS. Any web browser can be used, such as Internet Explorer Browser, Mozilla Fire Fox and Opera Hardware Selection Beside software, appropriate hardware should be selected for the system to run conveniently. Hardware selected for the system development are: Personal Computer (PC) with Pentium IV 1.4 Giga Hertz (GHz) processor 45

66 PC with 1 Giga bytes (GB) Random Access Memory (RAM), or higher PC with 7 Giga bytes (GB) free Hard disk space, or higher SVGA monitor with 1024 x 768 pixels minimum resolution Database Design After the step of software and hardware selection, the next step in development of information system is database design. In this section, detail steps of development of information system are described Conceptual Database Design The first step is conceptual data model. This step focuses on data types of the application, their relationships and constraints. First design of conceptual design is Context Diagram, Data Flow Diagram (DFD) and Entity Relationship Diagram (ERD) Context Diagram Context diagram, or also termed as data flow diagram level 0, describes all users of the system. Figure 4.1 shows context diagram of the system. Figure 4.1 shows that there are three users of Illegal Fishing Surveillance Information System, they are the Government, represented by Department of Marine Affairs and Fisheries and Coordinating Agency of Maritime Security (BAKORKAMLA) divided into an Administrator and an Official; and public. 46

67 The Government as Administrator has access to all data in the system. It has access to display and observe complete data of fishing vessel and violation occurrences and authorized to input, edit and delete all data, edit them for management and maintenance purposes. As Official, the Government has a few limitation access compared to Administrator. An Official also has access to complete data of fishing vessel and violation occurrences, but Official is not authorized to have any access to input, edit and delete any data in the system. The public have more limited access to the system. Public have access to view fishing vessels and violation occurrences data, but it is limited. They are not authorized to display all data that may describes and traces certain owner or company s fishing vessels properties, such as the owner of fishing vessels, whether they are owned by privates or companies and also fishing vessel permission number. Public are also not authorized to have any access to input, edit and delete any data in the system. It is expected to increase public s awareness regarding to the illegal fishing issues. 47

68 GOVERNMENT (ADMINISTRATOR) Department of Marine Affairs and Fisheries Coordinating Agency of Maritime Security (BAKORKAMLA ) Data of illegal fishing and violation occurrences in IFMZ Illegal Data request Fishing Surveillance Information Data of illegal fishing and System violation occurrences in IFMZ except: Fishing vessel owner Fishing vessel company Fishing vessel permission types Fishing vessel permission numbers Data request Data input Data edit Data process Data analyze Data delete Data of illegal fishing and violation occurrences in IFMZ Data request Data process Data analyze PUBLIC GOVERNMENT (OFFICIAL) Figure 4.1. Context Diagram of the system Data Flow Diagram After context diagram is developed, the data flow diagram level 1 is developed. The data flow diagram shows the flow of data in the system. Figure 4.2 shows the data flow in Illegal Fishing Surveillance Information System. First the Government (Administrator) inputs both tabular and spatial data of illegal fishing to the system in Process 1, Tabular Data Management and Process 2, Spatial Data Management. The data store of Process 1 is Illegal Fishing Database and from Process 2 is Spatial Database. 48

69 Data request Data response 5 Data Analysis Data input Government (Administrator) Data input 1 Tabular Data Management 2 Spatial Data Management Non-Spatial Database Spatial Database 3 Data Integration Integrated data Government (Official) Data request Data response Data request Data response 4 Web-Based Processing Public Data request Data response Figure 4.2. Data Flow Diagram Level 1 of the system Then, data from illegal fishing and spatial databases are integrated in Process 3, Data Integration. After the data are integrated, they go to Process 4, Web Development, results the Web Display. Data in web display are prepared to supply the request from Administrator, Official and public. After Process 3, beside directly to Process 4, the data go to Process 5, Data Analysis. This process is performed by the Administrator as decision making purposes. Here the data are analyzed for further purposes. 49

70 Entity Relationship Diagram The entity-relationship data model allows us to describe the data involved in a real-world condition in terms of objects and their relationships and is widely used to develop an initial database design. It provides useful concepts that allow us to move from an informal description of what users want from their database to a more detail, and precise, description that can be implemented in a DBMS. In the ER model, a real-world object is represented as an entity. An entity is an object in the real world that is distinguishable from other objects. And a collection of entities is called an entity set. Entities are described using a set of attributes. Our choice of attributes reflects the level of detail at which we wish to represent information about entities. For each attribute associated with an entity set, we must identify a domain of possible values. Further, for each entity set, we choose a key. A key is a minimal set of attributes whose values uniquely identify an entity in the set. There could be more than one candidate keys; if so, we designate one of them as the primary key. As an assumption, in entity relationship model, each entity set contains at least one set of attributes that uniquely identifies an entity in the entity set by using a key. Two or more entities are associated by a relationship. A relationship set is a collection of relationships that relate entities from the same entity sets (Ramakrishnan & Gehrke 2000). The relation between entities can be one-to-one, one-to-many and many-to many. 50

71 Figure 4.3 describes the ERD of this system. This system has six entities: permission, ownership, fishing_vessel, violation, surveillance_vessel and violation_case. Each entity has its attributes, for example as described in Figure: ownership entity has vesl_id, owner_name, owner_company, nationality and inputlog as its attributes, and fishing_vessel entity has vesl_id, vesl_name, vesl_capt, vesl_crew, vesl_tonage, vesl_type, vesl_fishing_tool, vesl_fish_permit and inputlog as its attributes. For each entity, one attribute is selected to be a unique key to identify the entity and roles as a linkage key between two entities in their relationship. The unique key is called primary key. For example, ownership entity and fishing_vessel entity have vesl_id as primary key. Both entities are related by this primary key. Another example is fishing_vessel entity and permission entity. They have vesl_id attribute for their primary key. So both entities are related by using vesl_id primary key. 51

72 ownership has 1 M fishing_vessel 1 has 1 permission vesl_id, owner_name, owner_company, nationality, inputlog vesl_id, vesl_name, vesl_capt, vesl_crew, vesl_tonage, vesl_type, vesl_fishing_tool, vesl_fish_permit, inputlog 1 vesl_id, num_sipi, date_sipi, num_siup, date_siup, num_sib, date_sib, num_sikpi, date_sikpi, inputlog do M violation do 1 1 violation_case M survey 1 surveillance_vessel violation_id, violation_type, violation_description, inputlog M M vesl_id, surv_vesl_id, date, time, time_zone, coordinates, sea_location, violation_id, description, followup_action, inputlog M surv_vesl_id, surv_vesl_name, surv_vesl_capt, surv_vesl_crew, operation_area, inputlog overlay overlay toponimi 1 overlay bathymetry overlay gid, toponim1_, toponim1_i, katagori, nama, the_geom 1 gid, jbathymetr, area, perimeter, depth_id, depth,class, the_geom 1 overlay overlay ifmz gid, id, wpp_id, wpp_name, class, area, perimeter, hecares, the_geom propinsi overlay overlay gid, propinsi, count, sum_sum_ar, the_geom grid gid, labely, labelx, lbloffsetx, lbloffsety, label, row, column, rowcol, the_geom Figure 4.3. Entity Relationship Diagram of the system All entities are related to one another. For example, as described in Figure, fishing_vessel entity and ownership entity are related. Their relationship can be described as fishing_vessel has ownership. Their relationship is said to be one-to-many; this relationship is described by symbol 1 M. It can be described as one ownership can have many fishing_vessel. Another example is between fishing_vessel entity and permission entity. Their relationship is said to 52

73 be one-to-one, or symbolized as 1 1. It can be described as one fishing_vessel can have one permission Logical Database Design Logical modeling phase is related to the actual implementation of the conceptual data model in database management system. Table 4.1 shows the logical model of the system Table 4.1. Logical model of the system No Data Type Entity Attributes ownership vesl_id, owner_name, owner_company, nationality, inputlog fishing_vessel vesl_id, vesl_name, vesl_capt, vesl_crew, vesl_tonage, vesl_type, vesl_fishing_tool, vesl_fish_permit, inputlog vesl_id, num_sipi, date_sipi, num_siup, date_siup, num_sib, permission date_sib, num_sikpi, date_sikpi, 1 Non-spatial Data inputlog violation violation_id, violation_type, violation_description, inputlog surv_vesl_id, surv_vesl_name, surveillance_vessel surv_vesl_capt, surv_vesl_crew, operation_area, inputlog vesl_id, surv_vesl_id, date, time, time_zone, sea_location, violation_case violation_id, description, followup_action, inputlog, coordinates propinsi gid, propinsi, count, sum_sum_ar, the_geom bathymetry gid, jbathymetr, area, perimeter, depth_id, depth,class, the_geom 2 Spatial Data toponimi gid, toponim1_, toponim1_i, katagori, nama, the_geom ifmz gid, id, wpp_id, wpp_name, class, area, perimeter, hectares, the_geom grid gid, labelx, labely, lbloffsetx, lbloffsety, label, row, column, rowcol the_geom 53

74 Physical Database Design Physical design represented logical data model in the software scheme. It describes the data physically where every entity is set based on database software used. Table 4.2 below shows physical design of the system Table 4.2. Physical Design of the system No Table Column Type Width 1 ownership vesl_id character varying 50 owner_name character varying 50 owner_company character varying 50 nationality character varying 50 inputlog integer 2 fishing_vessel vesl_id character varying 50 vesl_name character varying 50 vesl_capt character varying 50 vesl_crew character varying 50 vesl_tonage character varying 50 vesl_type character varying 50 vesl_fishing_tool character varying 50 vesl_fish_permit character varying 50 inputlog integer 3 permission vesl_id character varying 50 num_sipi character varying 50 date_sipi character varying 50 num_siup character varying 50 date_siup character varying 50 num_sib character varying 50 date_sib character varying 50 num_sikpi character varying 50 date_sikpi character varying 50 inputlog integer 4 violation violation_id character varying 50 violation_type character varying 50 violation_description character varying 50 inputlog integer 5 surveillance_vessel surv_vesl_id character varying 50 surv_vesl_name character varying 50 surv_vesl_capt character varying 50 surv_vesl_crew character varying 50 operation_area character varying 50 inputlog integer 6 violation_case vesl_id character varying 50 surv_vesl_id character varying 50 date date time time without time 10 zone time_zone character varying 50 sea_location character varying 50 54

75 No Table Column Type Width violation_id character varying 50 description character varying 500 followup_action character varying 500 inputlog integer coordinates geometry 7 bathymetry gid integer jbathymetr integer area double precision perimeter double precision depth_id integer depth,class text the_geom geometry 8 propinsi gid, integer propinsi text count integer sum_sum_ar double precision the_geom geometry 9 toponimi gid integer toponim1_ integer toponim1_i integer nama text katagori text the_geom geometry 10 ifmz gid integer id integer wpp_id character varying 10 wpp_name character varying 50 class smallint area double precision perimeter double precision hectares double precision the_geom geometry 11 grid gid integer labelx double precision labely double precision lbloffsetx smallint lbloffsety smallint label character varying 10 row character varying 10 column character varying 10 rowcol character varying 10 the_geom geometry System Design The system architecture is described in Figure 4.4. The system flows in several steps. First, the client over the internet, by using web browser, sends a request to the web server. Then, the web server receives the request and passes it 55

76 to the as the application server. After that, the application server distributes the request to database for appropriate spatial and non-spatial data. The request to database is processed, queried and loaded for related information. Then, the spatial server creates response and returns the response through the reverse order of the initial request. Spatial Data Non-Spatial Data Using PostgreSQL Client (using Web browser) request response Web Server request response MapServer request response Database Figure 4.4. System architecture Integration of Spatial and Non Spatial Data Non-spatial/tabular data are stored and managed by using PostgreSQL software. PostgreSQL is a powerful, open source object-relational database system. Object-relational database system is one of database management systems where data are managed in tables. Each table has its own unique name/key that links each table to one another. Therefore data are managed effectively to avoid data redundancy. One of PostgreSQL capabilities is storing spatial data into the same database with non-spatial data. It allows both data to be integrated more stably. Data manipulation such as adding, deleting, renaming, querying, and retrieving 56

77 between both data can be done powerfully. Because both data are in one same database, it is not a trouble to concern about where to store spatial data in a separate database and how to link them both. Another advantage of one database is its easiness to back-up database for security. Spatial data include map of Indonesia, bathymetry/sea depth of Indonesia, Indonesia land and sea location names that are in shapefile format and coordinates data of surveyed fishing vessels as results from fisheries surveillance are also stored and managed in the same database with non-spatial data in PostgreSQL database. There are two methods in storing shapefile data into PostgreSQL database, they are: 1. The shapefiles data are stored in PostgreSQL by applying standard command in PostgreSQL console environment. 2. Another method for storing spatial data in shapefile format is by using gvsig software. This method is simpler. The shapefile data is opened in gvsig environment and can be directly exported into PostreSQL by using gvsig application. Either methods implementation will give the same result in storing shapefile data into PostgreSQL database Mapserver Installation MapServer is an Open Source geographic data rendering engine written in C. Beyond browsing GIS data, MapServer allows you create geographic image maps, that is, maps that can direct users to content (University of Minnesota, 57

78 2008). MapServer has several interfaces builder for map application such as: Chameleon, PMapper, ka-map and gmap. First, MapServer should be installed into server side. It requires MapServer installation application. This system uses Microsoft Windows as the platform, so it uses MapServer installer for Microsoft Windows environment. The MapServer installer package that is used, is MS4W (MapServer for Windows), that can be get from its website: It includes complete MapServer application bundle, Apache as HTTP server, PHP and other requires components required for spatial data and interactive mapping through web. It does not require any licenses for the application because it is an open source application software. From the same web source, the Mapserver interface builder such as Chameleon and ka-map are also can be get. This system uses MS4W package and ka-map as interface builder Mapfile Configuration The Mapfile is the heart of MapServer. Map File is a structured text configuration file for MapServer application. It defines the area of map, tells the MapServer program where the data is and where to output images. It also defines map layers, including their data source, projections, and symbology. MapServer with its interface application such as ka-map connect with PostgreSQL database through mapfile. Appropriate configuration of mapfile is important to make connection succeeded. 58

79 Graphical User Interface (GUI) Design GUI is developed by using Joomla, an open-source software that is used to assist web developer to build and manage graphic user interface and structure of the web. With Joomla, GUI and web structure can be effortlessly developed. It provided certain templates that are ready to be used and they can be customized as the system required. This application uses MySQL database for storing the system GUI data and configurations System Implementation After development of information system, then the system is tested to implement in order to see whether it works properly or not. System testing can be done in one computer environment, where it becomes the server and also the client. After that, the testing can be done by storing the system in server, and a remote client access the system by using browser. Results of system testing are used as basis for the next step, system maintenance. Technical obstacles or system errors that may occur are observed and fixed. System maintenance is also a step to continually checking the system to perform some updates and modifications for further system utilization Outputs of the System The system has been tested in client-server computer network, where system is stored in server and accessed by a remote client by using browser and it is working properly. Outputs of the system are described as below: 59

80 Display of Home and General Information This system provides some display of information. This display function consists of information that can be clicked in their each links. The informations displayed in the system are Home and General Information Menus. General Informations menu has four sub-menus, those are About Indonesia, About Indonesia Fisheries, Indonesia Consumption Needs, Indonesia Fisheries Loss and About IfSUIS. Home is the welcome screen to users accessing the system. Figure 4.5 shows the welcome screen of the system. Figure 4.5. Welcome screen of the system 60

81 In General Information menu, About Indonesia gives a little description about Indonesia s geographic locations and general condition about Indonesia geographic. About Indonesia Fisheries sub-menu describes a brief explanation about condition of Indonesia fisheries richness and rights. Indonesia Consumption Needs tells users about dynamical of Indonesia fish consumption related to Indonesia population growth. And Indonesia Fisheries Loss sub-menu describes about loss regarding illegal fishing activities through the years. General Information menu is meant to give users a perspective about Indonesia fisheries condition and how illegal fishing activities have given a phase of loss. While About IfSUIS tells users about brief description of what system it is, its purposes and its developers. Figure 4.6 shows General Information menu of the system. Figure 4.6. Display of General Information Menu 61

82 Tabular Data The system provides tabular data that can be accessed by users to view tabular data of fishing vessels and violation cases. The three users have their own permissions and restrictions in displaying tabular data which are described in the following sections Tabular Data Applications for the Government as Administrator The Government as Administrator has unlimited access to display all data. To activate the tabular data display, first the Government has to log into system as Administrator. Then, display pages for Administrator will appear, that are described in the following sections Fishing Vessel Data Display for Administrator As Administrator has logged in, sub-menu Fishing Vessel Data + Edit (Admin) appeared. This sub-menu is only able to be accessed by Administrator. Administrator has authority to view all fishing vessel data, including Vessel Name, Captain, Crew, Tonnage (ton), Type, Fishing Tools, Fish Permit, Owner, Company, Nationality, and fishing vessel permissions: SIPI, SIPI Date, SIUP, SIUP Date, SIB, SIB Date, SIKPI and SIKPI Date. Fishing vessel data display for Administrator is shown in Figure 4.7 below. 62

83 Figure 4.7. Fishing vessel data display for Administrator This display consists of the complete data of surveyed fishing vessels. Total data of the vessels is displayed on the top section of the page, below its title. From the display, it is recognized that many rows are empty or they do not have any data. It is assumed that it can not be directly concluded that in real world the fishing vessels did not complete their vessel equipments in the field. There are some assumptions about this matter, which are it may caused by lack of the authorities responsible in recording surveillance data in the field. The second one, it may caused by un-standardized aspects/components that should be recorded during surveillance activities by the authorities. And the third one is it may caused by operators that are responsible in inputting data for the record. 63

84 Therefore, to support completeness of collected data, standardization of recorded data should be applied by the surveillance authorities Violation Cases Data Display for Administrator Violation Cases Tabular Data can be displayed by Administrator by accessing Violation Cases Data + Edit (Admin) sub-menu that appears after Administrator has logged into the system. Administrator has full access to view violation cases data including: Vessel Name, Surveillance Vessel name, Violation, Description, Follow-up Action, Date, Time, Time Zone, Coordinates and Sea Locations. The display is shown in Figure 4.8 below. Figure 4.8. Violation cases data display for Administrator 64

85 This display consists of the complete data of violation cases as result of surveillance activities. Total violation cases data is displayed on top section of the page below the title. Administrator is able to set time range of violation data to be displayed. This function can be applied by inserting certain dates in boxes at the top section as shown in Figure 4. 9 below. Figure 4.9. Displaying violation cases data in a certain time range Figure 4. 9 shows that the user set to display violation cases data from until , means to display violation cases data in year When Display Data icon is clicked, violation cases data in 2005 are displayed in tables. And total cases data during the certain time is displayed below the table title. 65

86 Fishing Vessel Data Input Beside full access to view fishing vessel data, Administrator is authorized for fishing vessel data input. Fishing vessel data input is important to keep the system updated to new fishing vessel data as result of surveillance activities. Fishing vessel data input function can be accessed by Administrator by clicking GO TO INPUT DATA button that is located at the top right section of Fishing Vessel Data Display, as shown in Figure 4.10 below. Figure Fishing vessel data input button 66

87 When input data button is clicked, it links to form of Fishing Vessel Data Input. This form consists of blank columns for inputting fishing vessel data. Figure shows fishing vessel data input form. Figure Fishing vessel data input form There are number of empty columns to be filled with new data of fishing vessel. After filling in all the data, there are two buttons at bottom section: Cancel and Input. If Administrator wants to save inputted data, he should click Input, but if he cancels inputted data, he can click Cancel button to go back to Display Vessel Data page. The data inputted through this form will be directly stored in database. 67

88 Violation Cases Data Input Administrator is also authorized to input violation cases data that are continually added as result of surveillance activities. Fishing vessel data input function can be accessed by Administrator by clicking GO TO INPUT Violation DATA button that is located at the top right section of Violation Cases Data Display, as shown in Figure 4.12 below. Figure Violation cases data input button When input data button is clicked, it links to form of Violation Cases Data Input. This form consists of blank columns for inputting violation cases data. Figure shows violation cases data input form. 68

89 Violation cases data is the main data of the system. This data will be stored in database and then integrated in the map as a web GIS application. Therefore this data input should be done in a careful way, especially while inputting coordinates data, because it directly related to other spatial data in database. Figure Violation cases data input form There are number of empty columns to be filled with new data of violation case. After filling in all the data, there are two buttons at bottom section: Cancel and Input. If Administrator wants to save inputted data, he should click Input, but if he cancels inputted data, he can click Cancel button to go back to Display Violation Cases Data page. The data inputted through this form will be directly stored in database. 69

90 Fishing Vessel Data Edit Data of fishing vessel may be changed or renewed. This is where edit function roles. It is also useful if there are operator s mistakes in inputting fishing vessel data that may happen. Edit function can only be accessed by Administrator. Edit function is accessed by clicking Edit button that is placed in the right side of each row of fishing vessel data in Fishing Vessel Name Display page as shown in Figure Figure Fishing vessel data edit button When edit data button is clicked, it links to form of Fishing Vessel Data Edit. This form consists of columns that display the original data of fishing vessel 70

91 data to be edited. Administrator can edit the desired data by directly change them in the columns. Figure shows fishing vessel data edit form. Figure Fishing vessel data edit form After editing desired data, there are two buttons at bottom section: Cancel and Edit. If Administrator wants to save edited data, he should click Edit, but if he cancels edited data, he can click Cancel button to go back to Display Fishing Vessel Data page. The data edited through this form will be directly stored in database. 71

92 Violation Cases Data Edit Same as in Fishing Vessel Data, edit function is also provided in Violation Cases Data for Administrator. Edit function is also useful in violation cases data changes or mistakes in data entries. Edit function is accessed by clicking Edit button that is placed in the right side of each row of violation cases data in Violation Cases Data Display page as shown in Figure Figure Violation cases data edit button When edit data button is clicked, it links to form of Violation Cases Data Edit. This form consists of columns that display the original data of violation cases data to be edited. Administrator can edit the desired data by directly change them in the columns. Figure shows violation cases data edit form. 72

93 Figure Violation cases data edit form After editing desired data, there are two buttons at bottom section: Cancel and Edit. If Administrator wants to save edited data, he should click Edit, but if he cancels edited data, he can click Cancel button to go back to Display Fishing Vessel Data page. The data edited through this form will be directly stored in database Fishing Vessel Data Delete For system maintenance, there are some conditions where fishing vessel data are needed to be deleted. This is where delete function roles. This function can only be accessed by Administrator. 73

94 Fishing vessel delete function is accessed by clicking Delete button that is placed in the right side of each row of fishing vessel data in Fishing Vessel Data Display page, next to Edit button, as shown in Figure Figure Fishing vessel delete button A confirmation window appears asking whether the Administrator is certain to delete the data when delete data button is clicked. Because once the data is deleted, it can not be undone. Figure shows fishing vessel data delete confirmation. 74

95 Figure Fishing vessel data delete confirmation In confirmation window, there are two buttons at bottom section: No and Yes. If Administrator is certain to delete the data, he should click Yes, but if he cancels to delete the data, he can click No button to go back to Display Fishing Vessel Data page. The data deleted through this form will be erased in database Violation Cases Data Delete The same condition as fishing vessel data may be happen to violation cases data where in a certain condition violation data needed to be deleted. Delete function is also provided in violation cases data. Violation cases data delete function is accessed by clicking Delete button that is placed in the right side of each row of violation cases data in Violation Cases Data Display page, next to Edit button, as shown in Figure

96 Figure Violation cases data delete button The same in fishing vessel data delete, when delete data button is clicked, a confirmation window appears asking whether the Administrator is certain to delete the data. Because once the data is deleted, it can not be undone. In confirmation window, there are two buttons at bottom section: No and Yes. If Administrator is certain to delete the data, he should click Yes, but if he cancels to delete the data, he can click No button to go back to Display Violation Cases Data page. The data deleted through this form will be erased in database Total Cases Data for Administrator Total Cases Data (Admin) menu is a total violation cases data. In this display, there are data of Violation ID, Violation Types, Years of violation occurrences (in this case 2004, 2005 and 2006) and the amount of violation cases. 76

97 Amount of violation cases is calculated per violation and the result is displayed in the right side of the table. While amount of violation cases result per year is displayed at the bottom side. This display is an accumulation data of violation cases occurrences which data are in the database. Figure shows display of total accumulation data of violation cases. Figure Violation cases accumulation data for Administrator 77

98 Data Export Function (to Microsoft Excel) For Administrator, there is a special function provided by the system which is a data export function to Microsoft Excel format. This function is provided to support Administrator further role in utilizing data. Data of the system are stored in database and then processed by PHP coding to be displayed in the system. Data export function enables these data to be opened and processed in other software for further analysis. The analysis will be depending on requirements determined by the Government as Administrator, as the first user of the system. Data export function is generated by applying PHP coding. Based on user requirement, data export function is provided to Microsoft Excel format. In this software the data can be utilized more for example, to make statistical data analysis, chart analysis and allow the user to have a different output data format that may be required. For Administrator, data export functions are provided in all tabular data in the system, which are Fishing Vessel Data + Edit (Admin) as shown in Figure 4.7, Violation Cases Data + Edit (Admin) as shown in Figure 4.8 and Total Cases Data (Admin) as shown in Figure This data export function can be accessed by clicking Microsoft Excel icon that placed at the top section of each data display pages that are mentioned above. Figure 4.22 shows the data export function that is applied when the icon is clicked in Total Violation cases Accumulation Data Display. 78

99 Figure Export data function to Microsoft Excel data format When Microsoft Excel function is clicked, the data are exported into a file in Microsoft Excel format, in this case violation_cases_accumlation_data.xls. A window appears asking what to do with the file whether it is directly opened with Microsoft Excel or saved. The user can choose to directly open the file by Microsoft Excel to make data analysis. And the user can also save the file to be utilized later. Figure 4.23 shows the export result file that is opened by Microsoft Excel. 79

100 Figure Data display in Microsoft Excel as export result This function is also provided in Fishing Vessel Data Display and Violation Cases Data Display Tabular Data Applications for the Government as Official The Government as Official has access to display all data. Official is not authorized to input, edit and delete data. To activate the tabular data display, first the Government has to log into system as Official. Then, display pages for Administrator will appear, that are described in the following sections. 80

101 Fishing Vessel Data Display for Official As Official has logged in, sub-menu Fishing Vessel Data (Official) appeared. This sub-menu is only able to be accessed by Official. Official has authority to view all fishing vessel data, including Vessel Name, Captain, Crew, Tonnage (ton), Type, Fishing Tools, Fish Permit, Owner, Company, Nationality, and fishing vessel permissions: SIPI, SIPI Date, SIUP, SIUP Date, SIB, SIB Date, SIKPI and SIKPI Date. Fishing vessel data display for Official is shown in Figure 4.24 below. Figure Fishing vessel data display for Official This display consists of the complete data of surveyed fishing vessels. Total data of the vessels is displayed on the top section of the page, below its title. 81

102 Official is allowed to view complete fishing vessel data. They are not allowed to input, edit and delete any fishing vessel data Violation Cases Data Display for Official Violation Cases Tabular Data can be displayed by Official by accessing Violation Cases Data (Official) sub-menu that appears after Official has logged into the system. Official has full access to view violation cases data including: Vessel Name, Surveillance Vessel name, Violation, Description, Follow-up Action, Date, Time, Time Zone, Coordinates and Sea Locations. The display is shown in Figure 4.25 below. Figure Violation cases data display for Official 82

103 This display consists of the complete data of violation cases as result of surveillance activities. Total violation cases data is displayed on top section of the page below the title. Official is able to set time range of violation data to be displayed, the same authority as Administrator. Official is allowed to view violation cases data. They are not allowed to input, edit and delete any violation cases data Total Cases Data for Official Official can access total cases data by clicking Total Cases Data (Admin) sub-menu under Tabular Data menu. This sub-menu is a total violation cases data. In this display, there are data of Violation ID, Violation Types, Years of violation occurrences (in this case 2004, 2005 and 2006) and the amount of violation cases. Amount of violation cases is calculated per violation and the result is displayed in the right side of the table. While amount of violation cases result per year is displayed at the bottom side. This display is an accumulation data of violation cases occurrences which data are in the database. Figure shows display of total accumulation data of violation cases. 83

104 Figure Violation cases accumulation data for Official Data Export Function (to Microsoft Excel) Official can also access data export function, the same as Administrator s authority. For Official, data export functions are provided in all tabular data in the system, which are Fishing Vessel Data (Official) as shown in Figure 4.24, Violation Cases Data (Official) as shown in Figure 4.25 and Total Cases Data (Admin) as shown in Figure This data export function can be accessed by clicking Microsoft Excel icon that placed at the top section of each data display pages that are mentioned above. 84

105 Tabular Data Applications for Public Public have limited access to tabular data display. Public do not have to log in as a certain user to access the system. Public are directly logged to system and able to view and access all the display that are already provided by the system to be viewed. Tabular data applications available for public are described in the following sections Fishing Vessel Data Display for Public Public can access fishing vessel data by clicking Fishing Vessel Data sub-menu under Tabular Data menu of the system. Public has access to view fishing vessel data, including Vessel Name, Captain, Crew, Tonnage (ton), Type, Fishing Tools, Fish Permit and Nationality. Public are not allowed to view fishing vessel Owner, Company and permissions: SIPI, SIPI Date, SIUP, SIUP Date, SIB, SIB Date, SIKPI and SIKPI Date. These data are restricted because by using these data, properties of certain owners or companies can be traced for their fishing vessel ownership. Public are assumed that they may use these data in inappropriate way. Fishing vessel data display for public is shown in Figure 4.27 below. Public are only allowed to view fishing vessel data. They are not allowed to input, edit and delete any fishing vessel data. They also do not have facility to use data export function. As seen in Figure 4.27, these functions are not available in fishing vessel data display for public. 85

106 Figure Fishing vessel data display for Public Violation Cases Data Display for Public Public can access Violation Cases Tabular Data by accessing Violation Cases Data sub-menu under Tabular Data menu. Public has access to view violation cases data including: Vessel Name, Surveillance Vessel name, Violation, Description, Follow-up Action, Date, Time, Time Zone, Coordinates and Sea Locations. The display is shown in Figure 4.28 below. 86

107 Figure Violation cases data display for Public This display consists of the complete data of violation cases as result of surveillance activities. Total violation cases data is displayed on top section of the page below the title. Public is able to set time range of violation data to be displayed. Public are only allowed to view violation cases data. They are not allowed to input, edit and delete any violation cases data. They also do not have facility to use data export function. As seen in Figure 4. 28, these functions are not available in violation cases data display for public Total Cases Data for Public Public can access total cases data by clicking Total Accumulation Cases Data sub-menu under Tabular Data menu. This sub-menu is a total violation cases data. In this display, there are data of Violation ID, Violation Types, Years 87

108 of violation occurrences (in this case 2004, 2005 and 2006) and the amount of violation cases. Amount of violation cases is calculated per violation and the result is displayed in the right side of the table. While amount of violation cases result per year is displayed at the bottom side. Figure 4.29 shows total accumulation cases data for public. Public do not have facility to use data export function. As seen in Figure 4.29, these functions are not available in violation cases data display for public. Figure Total violation case accumulation data display for Public 88

109 Web-GIS Application Map Display Function Web-GIS application is accessed by The Map menu. This application can be accessed by all users. By default, at main interface, it displays map of Indonesia with land and sea area, sea names, points represented by images with three different colors: red, blue and yellow. These points symbol represent location of all surveyed vessels in three years, 2004, 2005 and This can be figured out by opening layer section on the left side of the map. The left section can be viewed as Map Information and Layers Legend. Figure 4.30 shows the main interface of the map. The Layers Legend can be activated by checking the layer desired, and non-activated by unchecking it. Points visually show the distribution of fishing vessels that were surveyed yearly. The points are represented by vessel images. As seen in Figure 4.30, points with red color represent all surveyed vessels in 2004, ones with blue color represent all surveyed vessels in 2005, and points with yellow color represent all surveyed vessels in Visually, users can directly observe level of surveyed vessels year by year by observing distribution of points shown in map. From the map, it is shown that Arafura Sea area appears to have more points distribution than other sea area. This can be assumed that surveillance activities are often held in Arafura Sea. It also can be assumed that violations are often occurred in the area, regarding the area is high frequently surveyed. 89

110 Figure 4.30 Main interface of the webgis Zoom In, Zoom Out, Pan, Zoom to Full Extent Other applications in the map are Zoom In, Zoom Out, Pan and Zoom to Full Extent. Zoom In is an application to change the map to have smaller scale, so the map will displayed bigger. While Zoom Out, contrast to Zoom in, it changes map display to be smaller. Pan is used to navigate the map to all direction. Usually Pan is used when the map is in Zoom In condition. In Zoom In condition, map will displayed bigger, all area in map can not be observed in one screen. In this case, Pan is used to navigate the map to desired direction. Zoom to Full Extent is used after user 90

111 Pan the map to all direction and needs to go back to default scale, where all area in map can be displayed in one full screen. Zoom to Full Extent will direct the map that has already Zoomed In or Out into Full Extent Scale. Figure 4.31 shows the Zoomed In map. Figure Zoomed In application of the map Identify Feature Features on the map, points, lines and polygons, can have information of it or their attributes. This attributes of the feature can be shown on the map. This can be done by clicking Identify Feature icon on the map menu, then click on a certain feature on map. If this feature has attributes, they are directly displayed. 91

112 In this system, points that represent surveyed vessels have attributes. These can be displayed by implementing the above method. The results of Identify Feature are displayed on the left side of the map. Figure 4.32 shows the Identify Feature by clicking any points symbol on the map. Figure 4.32 Identify Feature application in the map Query by Attribute (Search Function) The web GIS also has Query by Attribute/Search Function. For features that have attributes, could be searched by this application. Points feature can be searched by using Query by Attribute. First click binocular icon on map menu. It will activate Search Function. Then at the left side of the map, a combo box and 92

113 an empty column appears. The combo box contains two categories of search methods, which are search by Fishing Vessel Name or search by Violation. While the empty column where to type the key word of desired name to be searched. If the user wants to search by fishing vessel name, then the user should select the combo box to Fishing Vessel Name and type the desired fishing vessel name in the column. And also if the user wants to search by violation, then the user should select the combo box to Violation and type the desired violation type in the column. For example we would like to search for KM Bintang Samudera fishing vessel. Then type KM Bintang Samudera in the column, then click Search button. As the result, the attributes of the points are displayed in the left side of the map. To display the searched point result in closer view, it can be zoomed in by clicking Zoom to in attributes area. Figure 4.33 shows the zoomed in feature. 93

114 Figure Query by Attribute application in the map Charts The system provides chart display of data that are generated directly from database by using PHP. Charts allow user to observe data more conveniently. There are three sub-menus of this menu, which are Total Violation Cases and Total Violation Cases per Year. The charts show violation cases occurrences as result of surveillance activities. 94

115 Total Violation Cases Chart of total violation cases displays total violation cases of total years as result of surveillance activities categorized by violation types. There are two types of chart of total violation cases, which are Bar Chart of Total Years, shown in Figure 4.34, and Pie Chart of Total Years, shown in Figure Figure Bar chart of violation case in total years 95

116 Figure Pie chart of violation case in total years Total Violation Cases per Year Chart of total violation cases per year displays total violation cases in each year as result of surveillance activities categorized by violation types. There are two types of chart of total violation cases, which are Bar Chart per Year, shown in Figure 4.36, and Pie Chart of 2004, 2005 and 2006, shown in Figure

117 Figure Bar chart of violation case in each year Figure Pie chart of violation case in each year 97

118 User Login User Login is accessed by users that have special authorization in the system by clicking Login menu. The users are Administrator and Official. While Public user do not need to log in to access the system. Figure 4.38 shows user login of the system. Figure 4.38 Login function for specific users Powered by Menu Powered by menu contains list of software that are used in the system development and their links to their own website. This is meant as appreciation to 98

119 software developers that resulted powerful and useful software that can be utilized in development of this system. Figure 4.39 shows Powered by menu. Figure 4.39 Appreciation and list of software used in the system 99

120 V. CONCLUSIONS AND RECOMMENDATIONS 5.1. Conclusions 1. A prototype design of web GIS has been developed to be able to visualize illegal fishing occurrences in IFMZ. 2. Prototype of the system has been implemented to utilize illegal fishing data to become important inputs to mapped illegal fishing occurrences. 3. Prototype of the system is capable to provide recommendation for surveillance activities through its facilities in presenting data and information Recommendations 1. The Government that is represented by Department of Marine Affairs and Fisheries, is recommended to have regulations to standardize data to be collected, including their certain categories, types and formats for recording illegal fishing and other violations as results from surveillance activities to encourage having reliable data records. 2. It is recommended to integrate this web GIS with other fisheries information systems that may have been developed previously to have one major fisheries information system that has more comprehensive functions and capabilities. 100

121 REFERENCES Badan Pengendalian Lingkungan Hidup Daerah Bab-II atlas Pesisir dan Laut Jawa Barat Bagian Utara. laut/ atlas_utara.cfm Badan Riset Kelautan Dan Perikanan Luas Laut. id/home.php Bray K A Global Review of Illegal, Unreported and Unregulated (IUU) Fishing. Document AUS:IUU/2000/6. 53 p Cartographic Modeling Laboratory What is GIS?. what_is_gis.htm Department of Communications and Informatics FAO: Akibat IUU Kerugian Diperkirakan Rp. 30 Triliun. Secretariat of Indonesian Republic. content&task=view&id=7160&itemid=695 Department of Marine Affairs and Fisheries Ikan Menyehatkan dan Mencerdaskan. Secretariat of Indonesian Republic. indonesia.go.id/id/index.php?option=com_content&task=view&id=28 45&Itemid=696 Doulman DJ A GENERAL OVERVIEW OF SOME ASPECTS OF ILLEGAL, UNREPORTED AND UNREGULATED FISHING (David J. Doulman) ESRI. What is GIS?. The Guide to Geographic Information Systems. Flewwelling P An introduction to monitoring, control and surveillance for capture fisheries. FAO Fisheries Technical Paper No Rome, FAO. 217 p. Fitzpatrick J Measures to Enhance the Capability of a FLAG State to Exercise Effective Control Over a Fishing Vessel. Document AUS:IUU/2000/11. 13p. FAO, Rome, Italy Foote KE, Kirvan AP WebGIS, NCGIA Core Curriculum in GIScience, u133/u133.html, posted July 13, 1998

122 GIS Development Centre Web Enabled Geographic Information System. IIITM-K Project Wing, Nila, Technopark Campus, Thiruvananthapuram GIS Lounge and DM Geographics, LLC What is GIS?.. /what-is-gis/ Hernandez MJ Database Design for Mere Mortals : A Hands-On Guide to Relational Database Design, Second Edition. Addison Wesley. Canada. Hu S Web-based Multimedia GIS for The Analysis and Visualization of Spatial Environmental Database. Symposium on Geospatial Theory, Processing and Applications. ISPRS Commission IV. Ottawa, Canada. MapCruzin What is GIS and How Does it Work. mapcruzin.com/what-is-gis.htm MapTools.org. ka-map. MapTools.org, co-hosted by DM Solutions Group, MapGears, and Gateway Geomatics. O Brien JA Management Information Systems, Managing Information Technology in the Internetworked Enterprise. The McGraw-Hills Companies, Inc. United State Peng ZR, Tsou MH Internet GIS: Distributed Geographic Information Services for The Internet and Wireless Network. John Wiley & Sons, Inc., Hoboken, New Jersey. Purwanto Pengelolaan Sumberdaya Ikan. Paper on Workshop of Pengkajian Sumberdaya Ikan by Masyarakat Perikanan Nusantara. Ramakrishnan R, Gehrke J Database Management Systems: Second Edition. McGraw-Hill Companies. United States of America. Rigaux P, Scholl M, Voisard A Spatial Databases with Application to GIS. Morgan Kaufmann Publishers. Elsevier Science. United States of America. Sol S Introduction to Databases for the Web. Database Journal. Databases-for-the-Web-Pt-1.htm The PHP Group PHP

123 United States Geological Survey (USGS) What is a GIS?. USA. is_gis.htm University of Minnesota MapServer. Wahana Lingkungan Hidup Indonesia (WALHI) Krisis Ikan Indonesia. Weise U. 2001, Internet GIS. GEOG /talks_2001/internetgis.htm 103

124 Appendix 1. Illegal fishing database in PostgreSQL 104

125 Appendix 2. Fishing_vessel table in illegal fishing database 105

126 106 Appendix 2. Fishing_vessel table in illegal fishing database (Continued)

127 Appendix 3. Violation_case table in illegal fishing database 107

128 108 Appendix 3. Violation_case table in illegal fishing database (Continued)

129 Appendix 4. View of illegal fishing database, as a virtual database, that relate all required data from separate tables into one table for query purpose 109

130 110 Appendix 4. View of illegal fishing database, as a virtual database, that relate all required data from separate tables into one table for query purpose (Continued)

131 Appendix 5. PostgreSQL database storage of shape file data after imported into database 111

Development of Web GIS for Fisheries Surveillance in Fisheries Management Zone of Indonesia

Development of Web GIS for Fisheries Surveillance in Fisheries Management Zone of Indonesia Development of Web GIS for Fisheries Surveillance in Fisheries Management Zone of Indonesia Donny Wicaksono a, Kudang B. Seminar b, and Purwanto c a Master of Science in Information Technology for Natural

More information

Department of Economic and Social Affairs May 2007

Department of Economic and Social Affairs May 2007 UNITED NATIONS SECRETARIAT ESA/STAT/AC.115/19 Department of Economic and Social Affairs May 2007 Statistics Division English only United Nations Expert Group Meeting on Contemporary Practices in Census

More information

DEVELOPING ACHUSI SYSTEM AS A BUSINESS SYSTEM SOLUTION FOR C.V. X: HUMAN RESOURCE, COST, BONUS, AND UTILITY SUBSYSTEM

DEVELOPING ACHUSI SYSTEM AS A BUSINESS SYSTEM SOLUTION FOR C.V. X: HUMAN RESOURCE, COST, BONUS, AND UTILITY SUBSYSTEM DEVELOPING ACHUSI SYSTEM AS A BUSINESS SYSTEM SOLUTION FOR C.V. X: HUMAN RESOURCE, COST, BONUS, AND UTILITY SUBSYSTEM THESIS Prepared by: Willy Suryadi 0700722642 Approved by: Supervisor Erwien Nurwihatman,

More information

CruiseSmarter PRIVACY POLICY. I. Acceptance of Terms

CruiseSmarter PRIVACY POLICY. I. Acceptance of Terms I. Acceptance of Terms This Privacy Policy describes CRUISE SMARTER policies and procedures on the collection, use and disclosure of your information. CRUISE SMARTER LLC (hereinafter referred to as "we",

More information

Radio Research and Development Institute (NIIR) Moscow, Russian Federation

Radio Research and Development Institute (NIIR) Moscow, Russian Federation Radio Research and Development Institute (NIIR) Moscow, Russian Federation Proposals to ITU CWG-Internet open consultations on "Public Policy considerations for OTTs" September, 2017 In accordance with

More information

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

Data Partnerships to Improve Health Frequently Asked Questions. Glossary...9

Data Partnerships to Improve Health Frequently Asked Questions. Glossary...9 FAQ s Data Partnerships to Improve Health Frequently Asked Questions BENEFITS OF PARTICIPATING... 1 USING THE NETWORK.... 2 SECURING THE DATA AND NETWORK.... 3 PROTECTING PRIVACY.... 4 CREATING METADATA...

More information

JEAS-Accredited Environmental Assessor Qualification Scheme

JEAS-Accredited Environmental Assessor Qualification Scheme JEAS-Accredited Environmental Assessor Qualification Scheme Osamu Kajitani, President Japan Association of Environment Assessment (JEAS) Abstract The Japan Association of Environment Assessment (JEAS)

More information

Ecosystems Research & Environmental Assessment Biologist Department Division/Region Community Location Environment Wildlife Igloolik Nunavut

Ecosystems Research & Environmental Assessment Biologist Department Division/Region Community Location Environment Wildlife Igloolik Nunavut 1. IDENTIFICATION Position No. Job Title Supervisor s Position 13-10370 Wildlife Database Management Systems (DBMS) Specialist II Ecosystems Research & Environmental Assessment Biologist Department Division/Region

More information

CARED Safety Confirmation System Training Module. Prepared by: UGM-OU RESPECT Satellite Office Date: 22 October 2015

CARED Safety Confirmation System Training Module. Prepared by: UGM-OU RESPECT Satellite Office Date: 22 October 2015 CARED Safety Confirmation System Training Module Prepared by: UGM-OU RESPECT Satellite Office Date: 22 October 2015 Table of Contents Introduction... 3 Who are we?... 3 Our Programs and Experience... 3

More information

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility

More information

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 9 Database Design

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 9 Database Design Database Systems: Design, Implementation, and Management Tenth Edition Chapter 9 Database Design Objectives In this chapter, you will learn: That successful database design must reflect the information

More information

Overview of SAS/GIS Software

Overview of SAS/GIS Software 3 CHAPTER 1 Overview of SAS/GIS Software Introduction to Geographic Information Systems 3 Features of SAS Software 4 Data in SAS/GIS Applications 5 Spatial Data 5 Spatial Data Layers 6 Spatial Data Coverages

More information

National Data Sharing and Accessibility Policy-2012 (NDSAP-2012)

National Data Sharing and Accessibility Policy-2012 (NDSAP-2012) National Data Sharing and Accessibility Policy-2012 (NDSAP-2012) Department of Science & Technology Ministry of science & Technology Government of India Government of India Ministry of Science & Technology

More information

RippleMatch Privacy Policy

RippleMatch Privacy Policy RippleMatch Privacy Policy This Privacy Policy describes the policies and procedures of RippleMatch Inc. ( we, our or us ) on the collection, use and disclosure of your information on https://www.ripplematch.com/

More information

Chapter 3: AIS Enhancements Through Information Technology and Networks

Chapter 3: AIS Enhancements Through Information Technology and Networks Accounting Information Systems: Essential Concepts and Applications Fourth Edition by Wilkinson, Cerullo, Raval, and Wong-On-Wing Chapter 3: AIS Enhancements Through Information Technology and Networks

More information

Database Management Systems MIT Introduction By S. Sabraz Nawaz

Database Management Systems MIT Introduction By S. Sabraz Nawaz Database Management Systems MIT 22033 Introduction By S. Sabraz Nawaz Recommended Reading Database Management Systems 3 rd Edition, Ramakrishnan, Gehrke Murach s SQL Server 2008 for Developers Any book

More information

MANAGING STATISTICAL DEVELOPMENT AND INFORMATION TECHNOLOGY IN THE STATISTICAL SYSTEM OF MALAYSIA

MANAGING STATISTICAL DEVELOPMENT AND INFORMATION TECHNOLOGY IN THE STATISTICAL SYSTEM OF MALAYSIA SIXTH MANAGEMENT SEMINAR FOR HEADS OF NATIONAL STATISTICAL OFFICES IN ASIA AND THE PACIFIC. 28 30 MAY 2007, HONG KONG, CHINA 1. Introduction MANAGING STATISTICAL DEVELOPMENT AND INFORMATION TECHNOLOGY

More information

COMMITTEE ON FISHERIES

COMMITTEE ON FISHERIES April 2016 COFI/2016/Inf.12 E COMMITTEE ON FISHERIES Thirty-second Session Rome, 11-15 July 2016 THE GLOBAL RECORD OF FISHING VESSELS, REFRIGERATED TRANSPORT VESSELS AND SUPPLY VESSELS (GLOBAL RECORD)

More information

IJESRT. (I2OR), Publication Impact Factor: (ISRA), Impact Factor: 2.114

IJESRT. (I2OR), Publication Impact Factor: (ISRA), Impact Factor: 2.114 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY EVALUATING ISO STANDARDS APPLICATION OF SECURITY REQUIREMENTS OF E- BANKING IN SUDAN Inshirah M. O. Elmaghrabi*, Hoida A. Abdelgadir,

More information

Ferrous Metal Transfer Privacy Policy

Ferrous Metal Transfer Privacy Policy Updated: March 13, 2018 Ferrous Metal Transfer Privacy Policy Ferrous Metal Transfer s Commitment to Privacy Ferrous Metal Transfer Co. ( FMT, we, our, and us ) respects your concerns about privacy, and

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

Application Guideline for BOP/Volume Zone Business Support Coordinator UZBEKISTAN in FY 2015

Application Guideline for BOP/Volume Zone Business Support Coordinator UZBEKISTAN in FY 2015 Application Guideline for BOP/Volume Zone Business Support Coordinator UZBEKISTAN in FY 2015 April 7, 2015 Manabu Shimoyashiro President Director JETRO Tashkent The Japan External Trade Organization, JETRO

More information

DBMS (FYCS) Unit - 1. A database management system stores data in such a way that it becomes easier to retrieve, manipulate, and produce information.

DBMS (FYCS) Unit - 1. A database management system stores data in such a way that it becomes easier to retrieve, manipulate, and produce information. Prof- Neeta Bonde DBMS (FYCS) Unit - 1 DBMS: - Database is a collection of related data and data is a collection of facts and figures that can be processed to produce information. Mostly data represents

More information

Development of a Protected Areas Database for Jamaica

Development of a Protected Areas Database for Jamaica Progress Report Technical and Financial Development of a Protected Areas Database for Jamaica Grants for Digital Data Protected Areas Thematic Network Prepared by: Projects Planning & Monitoring Branch

More information

3. LABOR CATEGORY DESCRIPTIONS

3. LABOR CATEGORY DESCRIPTIONS 3. LABOR CATEGORY DESCRIPTIONS 001 - Consulting Systems Advisor Fifteen or more (15+) years of experience within the industry. The Consulting System Advisor develops and applies advanced methods, theories,

More information

Principles for a National Space Industry Policy

Principles for a National Space Industry Policy Principles for a National Space Industry Policy Commonwealth of Australia 2011 DIISR 11/144 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced

More information

The Discovery and Retrieval of Temporal Rules in Interval Sequence Data

The Discovery and Retrieval of Temporal Rules in Interval Sequence Data The Discovery and Retrieval of Temporal Rules in Interval Sequence Data by Edi Winarko, B.Sc., M.Sc. School of Informatics and Engineering, Faculty of Science and Engineering March 19, 2007 A thesis presented

More information

PRIVACY POLICY. 1. What Information We Collect

PRIVACY POLICY. 1. What Information We Collect PRIVACY POLICY This website, located at http://www.santana.com (the "Site"), is owned and operated by Cadestansa LLC dba Santana Management. Your privacy is important to Santana. This Privacy Policy (the

More information

ONLINE CONSUMER CHARACTERISTICS AND BEHAVIOR: INDONESIA TOURIST IN USING INTERNET FOR SEARCHING ONLINE ROOM RESERVATIONS

ONLINE CONSUMER CHARACTERISTICS AND BEHAVIOR: INDONESIA TOURIST IN USING INTERNET FOR SEARCHING ONLINE ROOM RESERVATIONS THESIS ONLINE CONSUMER CHARACTERISTICS AND BEHAVIOR: INDONESIA TOURIST IN USING INTERNET FOR SEARCHING ONLINE ROOM RESERVATIONS Compiled METHAWAT PHUTORNPUKDEE No. Mhs.: 10500419/PS/MM MASTER STUDY PROGRAM

More information

BINUS INTERNATIONAL UNIVERSITAS BINA NUSANTARA. BiNus MOBILE SERVICE SYSTEM WITH HIGH PERFORMANCE and STRUCTURED DATABASE DESIGN

BINUS INTERNATIONAL UNIVERSITAS BINA NUSANTARA. BiNus MOBILE SERVICE SYSTEM WITH HIGH PERFORMANCE and STRUCTURED DATABASE DESIGN BINUS INTERNATIONAL UNIVERSITAS BINA NUSANTARA Major Information System Sarjana Komputer Thesis EVEN Semester year 2007 BiNus MOBILE SERVICE SYSTEM WITH HIGH PERFORMANCE and STRUCTURED DATABASE DESIGN

More information

Annual Report for the Utility Savings Initiative

Annual Report for the Utility Savings Initiative Report to the North Carolina General Assembly Annual Report for the Utility Savings Initiative July 1, 2016 June 30, 2017 NORTH CAROLINA DEPARTMENT OF ENVIRONMENTAL QUALITY http://portal.ncdenr.org Page

More information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection

More information

INDEX ABOUT US 3 ARAB CERTIFIED QUALITY MANAGER PROGRAM. Body of Knowledge 6 UNESCO ICT INDICATORS 8 MESSAGE FROM THE CHAIRM AN

INDEX ABOUT US 3 ARAB CERTIFIED QUALITY MANAGER PROGRAM. Body of Knowledge 6 UNESCO ICT INDICATORS 8 MESSAGE FROM THE CHAIRM AN INDEX MESSAGE FROM THE CHAIRM AN 2 ABOUT US 3 ARAB CERTIFIED QUALITY MANAGER PROGRAM 5 Body of Knowledge 6 UNESCO ICT INDICATORS 8 1 MASSAGE FROM THE CHAIRMAN Welcome to the Arab Knowledge and Management

More information

SIMS TERMS AND CONDITIONS OF USE AGREEMENT

SIMS TERMS AND CONDITIONS OF USE AGREEMENT SIMS TERMS AND CONDITIONS OF USE AGREEMENT 1. These Terms and Conditions ("the Terms and Conditions") govern your ("the User") use of the Website and Web application and the information thereon, known

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Guide to SciVal Experts

Guide to SciVal Experts Guide to SciVal Experts Contents What is SciVal Experts and How Can I Benefit From It?....... 3 How is My Profile Created?... 4 The SciVal Experts Interface.... 5-6 Organization Home Page Unit Individual

More information

"Charting the Course... MOC A Developing Microsoft SQL Server 2012 Databases. Course Summary

Charting the Course... MOC A Developing Microsoft SQL Server 2012 Databases. Course Summary Course Summary Description This 5-day instructor-led course introduces SQL Server 2012 and describes logical table design, indexing and query plans. It also focuses on the creation of database objects

More information

GTA West Corridor Review

GTA West Corridor Review Newsroom : GTA West Corridor Review Search News $ Search Français Newsroom Bulletin GTA West Corridor Review October 7, 2016 11:30 A.M. Ministry of Transportation In December 2015 the Ministry of Transportation

More information

"Charting the Course... MOC C: Developing SQL Databases. Course Summary

Charting the Course... MOC C: Developing SQL Databases. Course Summary Course Summary Description This five-day instructor-led course provides students with the knowledge and skills to develop a Microsoft SQL database. The course focuses on teaching individuals how to use

More information

The State of Missouri

The State of Missouri NASCIO 2013 Recognition Awards Nomination The State of Missouri Hazardous Substance Site Locator Project Initiation and Completion Dates: 04/29/13 to 12/01/13 Category: Digital Government: Government to

More information

Qualification Specification

Qualification Specification BCS Level 2 Certificate in IT User Skills (ECDL Core) Version 2.0 March 2018 This is a United Kingdom government regulated qualification which is administered and approved by one or more of the following:

More information

RESOLUTION MSC.210(81) (adopted on 19 May 2006) PERFORMANCE STANDARDS AND FUNCTIONAL REQUIREMENTS FOR THE LONG-RANGE IDENTIFICATION AND TRACKING OF

RESOLUTION MSC.210(81) (adopted on 19 May 2006) PERFORMANCE STANDARDS AND FUNCTIONAL REQUIREMENTS FOR THE LONG-RANGE IDENTIFICATION AND TRACKING OF MSC 81/25/Add.1 RESOLUTION MSC.210(81) REQUIREMENTS FOR THE LONG-RANGE IDENTIFICATION THE MARITIME SAFETY COMMITTEE, RECALLING Article 28(b) of the Convention on the International Maritime Organization

More information

Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems

Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO/IEC 27006 Third edition 2015-10-01 Information technology Security techniques Requirements for bodies providing audit and certification of information

More information

Application Guideline for BOP Business Support Coordinator BANGLADESH in FY 2013

Application Guideline for BOP Business Support Coordinator BANGLADESH in FY 2013 Application Guideline for BOP Business Support Coordinator BANGLADESH in FY 2013 1 May, 2013 Kei Kawano Representative JETRO Dhaka The Japan External Trade Organization (JETRO) Dhaka Office will retain

More information

GEO-SPATIAL METADATA SERVICES ISRO S INITIATIVE

GEO-SPATIAL METADATA SERVICES ISRO S INITIATIVE GEO-SPATIAL METADATA SERVICES ISRO S INITIATIVE Pushpalata B Shah, Navita J Thakkar Space Applications Centre (ISRO) Ahmedabad 380 015 - pushpa@sac.isro.gov.in Commission IV, Working Group IV/5 KEYWORDS:

More information

TERMS OF REFERENCE ACCREDITATION PROGRAM FOR OFFICIAL STATISTICS PROFESSIONALS (Draft)

TERMS OF REFERENCE ACCREDITATION PROGRAM FOR OFFICIAL STATISTICS PROFESSIONALS (Draft) TERMS OF REFERENCE ACCREDITATION PROGRAM FOR OFFICIAL STATISTICS PROFESSIONALS (Draft) 1. Background The Certification and Accreditation of Official Statistics Professionals program (OStat) is an OIC-wide

More information

SmartMAP at Clarion University: GIS for Smart Classrooms Management

SmartMAP at Clarion University: GIS for Smart Classrooms Management SmartMAP at Clarion University: GIS for Smart Classrooms Management By: Yasser Ayad Abstract The Smart Classrooms are spread all over Clarion University s campus and are expanding with different configurations.

More information

An Analysis of Image Retrieval Behavior for Metadata Type and Google Image Database

An Analysis of Image Retrieval Behavior for Metadata Type and Google Image Database An Analysis of Image Retrieval Behavior for Metadata Type and Google Image Database Toru Fukumoto Canon Inc., JAPAN fukumoto.toru@canon.co.jp Abstract: A large number of digital images are stored on the

More information

INFORMATION NOTE. United Nations/Germany International Conference

INFORMATION NOTE. United Nations/Germany International Conference INFORMATION NOTE United Nations/Germany International Conference Earth Observation: Global solutions for the challenges of sustainable development in societies at risk Organized by The United Nations Office

More information

USER GUIDANCE ON THE SHIP FUEL OIL CONSUMPTION GISIS MODULE (IMO SHIP FUEL OIL CONSUMPTION DATABASE) CONTENTS

USER GUIDANCE ON THE SHIP FUEL OIL CONSUMPTION GISIS MODULE (IMO SHIP FUEL OIL CONSUMPTION DATABASE) CONTENTS Page 1 USER GUIDANCE ON THE SHIP FUEL OIL CONSUMPTION GISIS MODULE (IMO SHIP FUEL OIL CONSUMPTION DATABASE) CONTENTS General information on the IMO Ship Fuel Oil Consumption Database Appendix 1: Guidance

More information

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives

More information

CHAPTER 6 DATABASE MANAGEMENT SYSTEMS

CHAPTER 6 DATABASE MANAGEMENT SYSTEMS CHAPTER 6 DATABASE MANAGEMENT SYSTEMS Management Information Systems, 10 th edition, By Raymond McLeod, Jr. and George P. Schell 2007, Prentice Hall, Inc. 1 Learning Objectives Understand the hierarchy

More information

N/A. Engineering (MEng) July 2014

N/A. Engineering (MEng) July 2014 Faculty of Engineering & Informatics School of Engineering Programme Specification Programme title: MSc Mechanical Engineering Academic Year: 2017/2018 Degree Awarding Body: Partner(s), delivery organisation

More information

Global Wildlife Cybercrime Action Plan1

Global Wildlife Cybercrime Action Plan1 Global Wildlife Cybercrime Action Plan1 A Call to Action for the London Conference on Illegal Wildlife Trade October 11-12, 2018 1 Wildlife cybercrime in this context refers to cyber-enabled wildlife trafficking.

More information

EMBU UNIVERSITY COLLEGE

EMBU UNIVERSITY COLLEGE EMBU UNIVERSITY COLLEGE (A Constituent College of the University of Nairobi) P.O. BOX 6-60100, EMBU, KENYA Website: www.embuni.ac.ke Embu University College, a Constituent College of the University of

More information

CPS 101: PREVENTION CERTIFICATION IN TENNESSEE

CPS 101: PREVENTION CERTIFICATION IN TENNESSEE CPS 101: PREVENTION CERTIFICATION IN TENNESSEE Promoting skills, credibility, and competence for the prevention professional INTRODUCTION WHAT WE LL COVER What is the Tennessee Certification Board? What

More information

2.1. Scope of environmental site assessment

2.1. Scope of environmental site assessment 1. PURPOSE AND SCOPE This document contains the criteria used by the Québec Association of Environmental Auditors (QAEA) to determine whether a person may obtain the title of certified environmental site

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014 JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019

Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019 General Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019 Office Properties Income Trust ( OPI ) is committed to your right to privacy and to keeping your personal information

More information

Privacy Policy Manhattan Neighborhood Network Policies 2017

Privacy Policy Manhattan Neighborhood Network Policies 2017 Privacy Policy Manhattan Neighborhood Network Policies 2017 Table of Contents Manhattan Neighborhood Network Policies 3 MNN s Privacy Policy 3 Information Collection, Use and Sharing 4 Your Access to and

More information

IHO Report on the results of the ECDIS survey conducted by BIMCO and Denmark. 18 February 2014

IHO Report on the results of the ECDIS survey conducted by BIMCO and Denmark. 18 February 2014 Introduction IHO Report on the results of the ECDIS survey conducted by BIMCO and Denmark 18 February 2014 1. In early 2013, BIMCO and Denmark conducted a survey to obtain information on the operational

More information

USER EXPERIENCE DESIGN (UXD)

USER EXPERIENCE DESIGN (UXD) Kent State University Catalog 2018-2019 1 USER EXPERIENCE DESIGN (UXD) UXD 20001 INTRODUCTION TO USER EXPERIENCE DESIGN 3 Credit Students explore the context within which User Experience Design exists

More information

Third Party Certification: Challenges & Opportunities

Third Party Certification: Challenges & Opportunities Third Party Certification: Challenges & Opportunities Dr Michael Harte National Manager - Marine -Australia Seafood Directions October 2011 SFNI About Who are - Australia? Part of the International Network,

More information

NOTIFICATION TO THE PARTIES

NOTIFICATION TO THE PARTIES CONVENTION ON INTERNATIONAL TRADE IN ENDANGERED SPECIES OF WILD FAUNA AND FLORA NOTIFICATION TO THE PARTIES No. 2014/035 Geneva, 4 August 2014 CONCERNING: Needs assessment for strengthening the implementation

More information

Organization/Office: Secretariat of the United Nations System Chief Executives Board for Coordination (CEB)

Organization/Office: Secretariat of the United Nations System Chief Executives Board for Coordination (CEB) United Nations Associate Experts Programme TERMS OF REFERENCE Associate Expert (JPO) INT-021-14-P014-01-V I. General Information Title: Associate Expert in Interagency Coordination / Special to the Director

More information

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT CERTIFICATE PROGRAM Further your career and gain an understanding of what it takes to lead a project to successful completion functional skills,

More information

Commission Action Plan on Environmental Compliance and Governance

Commission Action Plan on Environmental Compliance and Governance EUROSAI Working Group on Environmental Auditing Spring Session on Environmental Governance 26-27 April 2018, Helsinki Commission Action Plan on Environmental Compliance and Governance COMMISSION PACKAGE

More information

MarketLine Advantage

MarketLine Advantage MarketLine Advantage User s Guide Welcome to MarketLine Advantage. This user guide will show you everything you need to know to access and utilize the wealth of information available from MarketLine Advantage.

More information

To respond to your inquiries and fulfill your requests, such as to send you newsletters or publications that you request.

To respond to your inquiries and fulfill your requests, such as to send you newsletters or publications that you request. Last updated: May 5, 2017 SJL Attorney Search, LLC is committed to protecting your privacy. This Privacy Policy describes our practices in connection with information that we collect through our website

More information

TERMS OF REFERENCE FOR INTERNSHIPS THE WHO INTERAGENCY COORDINATION GROUP ON ANTIMICROBIAL RESISTANCE FOR MEDICAL STUDENTS IN IFMSA

TERMS OF REFERENCE FOR INTERNSHIPS THE WHO INTERAGENCY COORDINATION GROUP ON ANTIMICROBIAL RESISTANCE FOR MEDICAL STUDENTS IN IFMSA TERMS OF REFERENCE FOR INTERNSHIPS THE WHO INTERAGENCY COORDINATION GROUP ON ANTIMICROBIAL RESISTANCE FOR MEDICAL STUDENTS IN IFMSA Location: Geneva, Switzerland Duration: 2 months or longer (flexible)

More information

C H A P T E R SYSTEM DESIGN

C H A P T E R SYSTEM DESIGN C H A P T E R SYSTEM DESIGN Chapter Twelve Systems Design Describe the design phase in terms of your information building blocks. Identify and differentiate between several systems design strategies. Describe

More information

AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS

AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS EXHIBIT C AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS 21. NYSE DATA PRODUCTS (a) SCOPE This Exhibit C applies insofar as Customer receives, uses and redistributes NYSE Data Products

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Certification. What: Who: Where:

Certification. What: Who: Where: Certification What: Certification is a process by which the Wisconsin Technical College System Office evaluates the occupational, academic, and teaching experience of district employees to determine his/her

More information

I. General regulations

I. General regulations Degree and examination regulations for the consecutive international master's program in Architecture Typology at Faculty VI of the Technische Universität Berlin, October 2, 206 On October 2, 206, the

More information

YOUR PRIVACY RIGHTS Privacy Policy General Col ection and Use voluntarily

YOUR PRIVACY RIGHTS Privacy Policy General Col ection and Use voluntarily YOUR PRIVACY RIGHTS Privacy Policy The Travel Society (DBA The Travel Society, LLC ) (AKA: Company ) in addition to the Members (AKA: Affiliates ) of The Travel Society values your privacy. This Privacy

More information

NC Project Learning Tree Guidelines

NC Project Learning Tree Guidelines NC Project Learning Tree Guidelines PREFACE Project Learning Tree (PLT) is an environmental education program for educators and youth leaders working with students from pre-kindergarten through grade 12.

More information

ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon. Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS

ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon. Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS Website: http:// ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS Important note on English as a Second Language (ESL) and International

More information

Member of the County or municipal emergency management organization

Member of the County or municipal emergency management organization EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,

More information

MIT Database Management Systems Lesson 01: Introduction

MIT Database Management Systems Lesson 01: Introduction MIT 22033 Database Management Systems Lesson 01: Introduction By S. Sabraz Nawaz Senior Lecturer in MIT, FMC, SEUSL Learning Outcomes At the end of the module the student will be able to: Describe the

More information

Advanced Migration of Schema and Data across Multiple Databases

Advanced Migration of Schema and Data across Multiple Databases Advanced Migration of Schema and Data across Multiple Databases D.M.W.E. Dissanayake 139163B Faculty of Information Technology University of Moratuwa May 2017 Advanced Migration of Schema and Data across

More information

GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT

GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT Duleep Thilakarathne (118473A) Degree of Master of Science Department of Electronic and Telecommunication Engineering University

More information

Student retention in distance education using on-line communication.

Student retention in distance education using on-line communication. Doctor of Philosophy (Education) Student retention in distance education using on-line communication. Kylie Twyford AAPI BBus BEd (Hons) 2007 Certificate of Originality I certify that the work in this

More information

Plone development in UNEP Country Environmental Profiles Gerard.Cunningham@unep.org Capacity Building and Partnerships Section Division of Early Warning and Assessment United Nations Environment Programme

More information

We will ask you for certain kinds of personal information ( Personal Information ) to provide the services you request. This information includes:

We will ask you for certain kinds of personal information ( Personal Information ) to provide the services you request. This information includes: PRIVACY POLICY This Website is operated by Mergent, Inc., a member of the London Stock Exchange plc group of companies ( we/our/us/mergent ). Website means the website located at www.mergent.com, any subsequent

More information

Data warehouse architecture consists of the following interconnected layers:

Data warehouse architecture consists of the following interconnected layers: Architecture, in the Data warehousing world, is the concept and design of the data base and technologies that are used to load the data. A good architecture will enable scalability, high performance and

More information

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0 ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Systems Informatiio on Systems PhD Program IS Ph.D. Program Page 0 Assiut University Faculty of Computers & Informationn

More information

ISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description

ISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description INTERNATIONAL STANDARD ISO/IEC/ IEEE 42010 First edition 2011-12-01 Systems and software engineering Architecture description Ingénierie des systèmes et des logiciels Description de l'architecture Reference

More information

Summary - Review of the legal conditions when using cloud computing in the municipal sector feasibility study

Summary - Review of the legal conditions when using cloud computing in the municipal sector feasibility study KS FoU-project 144008: Summary - Review of the legal conditions when using cloud computing in the municipal sector feasibility study April 2015 Advokatfirmaet Føyen Torkildsen AS -1- 1 Introduction Use

More information

ELECTRONIC PROJECT MONITORING INFORMATION SYSTEM FOR KENYA

ELECTRONIC PROJECT MONITORING INFORMATION SYSTEM FOR KENYA ELECTRONIC PROJECT MONITORING INFORMATION SYSTEM FOR KENYA (e-promis Kenya) ANALYTICAL INTERFACE USER MANUAL Version 3.1 COPYRIGHT 2001-2015 SYNERGY INTERNATIONAL SYSTEMS INC ALL RIGHTS RESERVED e-promis

More information

Database Management Systems MIT Lesson 01 - Introduction By S. Sabraz Nawaz

Database Management Systems MIT Lesson 01 - Introduction By S. Sabraz Nawaz Database Management Systems MIT 22033 Lesson 01 - Introduction By S. Sabraz Nawaz Introduction A database management system (DBMS) is a software package designed to create and maintain databases (examples?)

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

School of Engineering and Built Environment. MSc. Information Technology (Oil & Gas) Programme Specification Document

School of Engineering and Built Environment. MSc. Information Technology (Oil & Gas) Programme Specification Document School of Engineering and Built Environment MSc. Information Technology (Oil & Gas) Programme Specification Document 20/2016 1. Programme Specification Pro-forma GENERAL INFORMATION Programme Titles: Final

More information

Information technology Security techniques Information security controls for the energy utility industry

Information technology Security techniques Information security controls for the energy utility industry INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

Enhanced Web Log Based Recommendation by Personalized Retrieval

Enhanced Web Log Based Recommendation by Personalized Retrieval Enhanced Web Log Based Recommendation by Personalized Retrieval Xueping Peng FACULTY OF ENGINEERING AND INFORMATION TECHNOLOGY UNIVERSITY OF TECHNOLOGY, SYDNEY A thesis submitted for the degree of Doctor

More information