Académique Documents
Professionnel Documents
Culture Documents
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
Search UK Dissertations
My account
Study Aids
You are here: UK Dissertations Dissertations Information Systems Designing And Implementing E Procurement
GET A PRICE
United Kingdom Essay Undergraduate 2:1 1000 Words (~ 4 pages) GBP ()
Order Now
Share this:
Tweet
1 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
To Vendors:
Ensures Savings in marketing cost / distributor margins Facilitates flexibility in pricing decision. Transparency increases Allows vendors to assess their pricing power from close quarters of competition.
E-payment
Commonly available modes for effecting EMD/ Fee/ other payments electronically, from within a software Application, are: Online payment through Credit cards/ Debit cards or Direct Account Debit (using Gateway for Internet Banking)
Depending on the actual need and usage constraints, the appropriate mode could be chosen and integrated into the s/w application. Credit cards could conveniently be integrated for use if the payment amounts involved are not substantial. For all other cases where payment amounts could be heavy, payments through Direct Debits from concerned accounts, using Internet Banking is the only alternative.
2 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
Transactional Benefits
Electronic purchase enable purchaser to process transaction through internet. For instance, an internet-base transacts means through which things can be chosen mostly from an identified catalogues and submit for authorization. The device can be connected in same direction of the backside part of ERP structure for access, imbursement of invoice, and arrangement of organization information. Electronic procedures (together with computerization of p-card purchase) lead to immense period saving as well as effectiveness owing to: universal, computerized process incorporate finest tradition as well as eliminate needless actions; electronic processing enable affiliation with supplier, which speed purchase phase period and facilitate contractor feat improvement; and better data correctness, which minimize order in accuracy as well as provide the necessary base for enhanced supervision from side to side control and scrutiny.
Compliance Benefits
A lot of instances in a company, conformity and unconventional expenditure is an important problem - not for the reason that workers intentionally procure outside of favoured arrangements, but to a certain extent through
3 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
4 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
5 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
6 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
Conclusion
Not until June 2008 was the procurement bill recently signed into law, previously there was no Federal or state law governing the practice of public procurement in Nigeria. With the advent of the new law, a number of challenges with regards to transparency, accountability and good governance in the area of contracts and procurement of supplies and services by government. In Nigeria it is pertinent to note that e-procurement is not prominently featured in law, this project sets out to make e-procurement prominently featured. With the advent of digital technology and globalisation, Nigeria as a third world country needs to be aware of the challenges and opportunities with regards to the e-procurement process. Furthermore, this project seeks to classify the meaning as well as the benefits of the E-procurement process in Nigeria. This project will also highlight the challenges in transforming Nigeria into a transparent and corrupt-free business environment and also ways of overcoming the challenges of adopting e-procurement in Nigeria. (E-Public Procurement in Nigeria: Some Lessons from EU, 2009)
7 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
Security
E-procurement platform transacts confidential procurement data and is exposed to several security threats. Agencies world over face threats to their online e-procurement and usually desist from sending sensitive information over the Internet for security reasons. The growing number of cyber crimes has added doubts regarding the reliability of the Internet. Security measures such as authentication and encryption are therefore employed while passing sensitive information between companies. Another major issue concerning e-procurement is the type of goods that are procured through the online medium. Companies usually prefer to source smaller, inexpensive goods such as office stationery (Miller, 2006). Larger complex orders that usually take weeks or months for negotiation are done in the traditional manner but this can be addressed by employing a combination of security features and security best practices which result in reduced threat of data loss, leakage or manipulation. Security and secrecy of tender data is of paramount importance as the portal handles sensitive procurement transactions of departments and has foreseen the security concerns. Security mechanisms provide a secure communication interface, mainly for the exchange of documents between procurement authorities and Economic Operators. Standards constituting adequate and acceptable security need to be provided for the implementation of services during each stage of the procurement process.
8 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
Conclusion
Security of e-procurement system is essentially an amalgamated output of Security of Infrastructure, Application and Management. Security is importance because without proper security measures loss or corruption of sensitive information can occur. Security breach could also lead to fraud and financial loss, misappropriation of funds and revealing of sensitive information Non-repudiation. Security involves Authentication, Authorisation, Confidentiality, and Integrity. Security is necessary to ensure safety of the data, users information and minimize issues already highlight above. Security can be implemented in hardware and Software, and on individuals using Policies.
Analysis of the data Collected from the Ministry The data gathering are made up of phases divided into phase actions
(Research design) Research objectives and scope, collected and literature review. (Data collection) Collected questionnaires from the Ministry staff (Data analysis) Data were divided and conceptualized
9 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
PROBLEM EXPLORATION
From interviews and multiple discussions done with the staff of the Ministry, it was found that the Ministry faces multiple problems during procurement. Deficiencies in the manual procurement process were analyzed and are enumerated below.
1. Delays in issue of tender schedules to suppliers: There were delays in preparing the schedules of tenders in physical forms because of constraints like lack of stationery items in the ministry. Because of this, bidders were not in a position to receive the tender document on the specified dates which results in putting the bidders under pressure. 2. Formation of cartels hinders competition: Information about all the bidders can be gathered from the ministry by competitors or participating bidders. This information encourages the participating bidders to lobby for formation of Syndicates or Cartels and bid for the tender for higher quotations to the disadvantage of government departments. 3. Physical threats to bidders: Sometimes the genuine bidders were physically threatened and prevented from submitting their bids. The bidder or his agent had to risk their physical safety for submitting the bids in the tender box placed in the office. These incidents were drawing the attention of media, affecting the reputation of government's functioning. 4. Tender Boxes at Multiple locations: To counter the menace of physical threats to bidders by the Contractor's Cartels, the government departments had resorted to keeping the tender boxes at multiple locations. 5. Manual movement of tender files: For the purposes of evaluation, the bid documents are manually transported across the administrative hierarchy. The transportation of bid documents manually and using surface mail is a time consuming activity. Additionally, the possibility of bid details being tampered or lost, while the documents are physically transported across the administrative hierarchy, could not be avoided. 6. Delays in finalization of tenders: Red tapism, lack of transparency, manual movement of files across the administrative hierarchies involved in the tender process, were all resulting in inordinate delay in finalization of tenders. Typically, tenders for major projects used to take longer tender process time ranging from 90 days to 150 days and these delays were contributing to cost and time overruns for the projects. 7. Human interface at every stage: The manual system exposed the departmental personnel to the bidders at every stage of the process beginning with the Sale of tender schedules, Issue clarifications, bid submission, bid evaluation and so on. This continued human interface has introduced subjectivity, favouritism and other undesirable elements in tender processes. 8. Lack of Transparency: Often times, a tender may have two or three bidders. But only one of them would be the real bidder the rest two being dummies, leading to forceful acceptance of the bid by the government. Lack of transparency is seen in the manual procurement process, right from tender publication, sale of tender schedules, and issue of clarifications to bidders, bid evaluation. Besides, even the departments were unwilling to share the information, which became the main cause for the bidders, media, and citizens, to lose confidence in the system.
Interpretation of Questionnaire
A lot of the staff working in the Ministry find the traditional method of procurement very tedious, as it requires a lot of filing of papers from various company tenders. The traditional process includes: Filing of various tender documents Manual record management
10 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
Summary
After completing this chapter, the author now has an in depth understanding on procurement problems in the Ministry and is better equipped to apply solutions to problems of the Ministry in the coming chapters.
Time
The author is limited by the short time constraint where every phase of the project needs to be completed on time and submitted to the supervisor. Procurement process usually takes a long time between 90 to 150 days but during the time, the project phase does not grant the author enough time to conduct full observation.
Financial Restrictions
Financial is also another limitation so not enough funds to travel round and conduct research on the prizes of items and services outside the Ministry. Also visitation of the Ministry daily for observation of procurement by the author incurred huge cost and limited the study to specific days where important decision would be taken.
Books
E-procurement is the new technology and not yet being documented in books, which caused the author to find it difficult to find any books regarding to the e-procurement technology. The author also having problems in searching for the criteria to measure suitability because there is no common criterion can be used for the measurements. Thus, different books have its own criteria to follow to determine the suitability.
Internet Sources
The author gained the information on e-procurement technology. By carrying out this research method, the author can collect a lot of useful information that relates to the project topic. Besides that, the author uses
11 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
PROJECT SCOPE
By doing this project, the author chooses to limit the project scope to identify whether e-procurement would bring about efficiency and transparency in ministry of Science and Technology. In order to gather feedback from public perceptions, the sample sizes of questionnaire are limited to 30 samples because if sample size less than 10, the results collected might not be accurate to be documented as findings. However, the author found that sample size more than 30 would create difficulty and complexity in analysis part of the research paper. The author would only prefer questionnaires and interview are chosen because identification of users' perceptions are important for determine which technology are appropriate to act as strategic promotion strategy. The author needs to ensure that all the distributed questionnaires must be collected back. Interview is needed because opinions from a specific branded company about what are the steps they would take if they want to adopt the most appropriate technology. The most appropriate technology would be determined by conducting questionnaire. Their opinions enabled the author to produce the intended framework that is applicable to all Ministries. On the other hand, interview is needed in order to evaluate the framework designed by the author. The author had performed a very simple experimentation in order to determine and compare the time of connectivity between computer and mobile to Internet. Observation is not the author's choice due to the reason that observation is not appropriate to be used to measure e-procurement Sometimes, the data collected from the observation might be wrong without conducting the questionnaires and the author would found that what the author see might not be true for the analysis from just observing the situation or examples provided.
12 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
DATABASE
Microsoft SQL Azure Database is a cloud-based relational database service built on SQL Server technologies. It provides a highly available, scalable, multi-tenant database service hosted by Microsoft in the cloud. SQL Azure Database helps to ease provisioning and deployment of multiple databases. Developers do not have to install, setup, and repair or manage any software. High availability and fault tolerance is built-in and no physical administration is required msdn, (2005).
ADVANTAGES
No need to install or patch software or other physical administration Automatic high availability and fault tolerance Simple provisioning and deployment of multiple databases Scale databases up or down based on business needs Multi-tenant Integration with SQL Server and tooling including Visual Studio Support for T-SQL based familiar relational database model
VISUAL STUDIO
Visual studio.Net is a programming environment that provides advanced development tools, which include, database functionality, debugging features, and various innovative features creating gutting edge applications across a variety of platforms. Visual studio enables us to use the client-side and server-side frameworks to easily build client-centric web applications that integrate with the data provider. Visual Studio includes several
13 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
CHAPTER 7 Introduction
The Main principle of the UML is to communicate the Object orientation, where it describes everything in terms of objects, and the relationship between these objects, and the way objects respond to events or activities, we see the graphical representation of how these objects are deployed.
Use case Diagram Use case are used in analyzing a project in order to identify system functionality that separate the system into actors and use cases. Actors represent roles that can or are played by users of the system. These users can be humans or computers. Use case describes the behaviour of the system when one of these actors sends a particular stimulus. It describes the nature of the stimulus that triggers the use case; the inputs from and outputs to other actors, and the behaviour that transfer the inputs to outputs. Engineering Notebook, (1998). In E-procurement, the role of the user is to sign in or sign up; if he or she is not signed in they would only have access to public available information. Furthermore he or she is limited to certain functionalities like calling for
14 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
Activity diagram
Activity diagram is a UML diagram that is used to model a process. It models the actions or behaviours that are performed by the system, the situation which coordinate the actions, the order in which they are carried out in a specific fashion. Activity Diagram is the graphical representation of the activities and actions of the various actors as they are used to show the overall flow. Activity diagram is dynamic showing the activity and event as the actor performs a function. Below are the diagrams showing the flow of the proposed system
Database diagram
The diagram above is a database design depicting E-procurement system. The database design produces a detailed model of the database; it also describes parts of the design of an overall database system. A perfect database design contains attributes for each entity. It is the logical design of the database structure where all the data or information of the system is stored. However, database design is not just used for designing or storing data alone, but it can also be used to create forms and queries used as part of the overall database application.
Class Diagram Class diagram depict the classes of the system, the relationship between them, and the operations and attributes in the class. It is a graphical representation used in object oriented design to show the classes of objects in the system.
Software Installation
During the installation of SQL server management studio 2008, the author had some difficulties as she found that it was not compatible with Microsoft Visual studio 2008. Visual Studio 2008 could only connect with the SQL server management studio 2005. The author had then had to downgrade the computer operating system form Windows 7 to Vista Basic in order SQL server 2005 to run.
15 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
Coding Sample
Coding is the process of writing, assembling, and compiling of computer code. The instructions for hardware and software are known as coding.
System Testing
Is the method of executing a variety of tests on a system to discover functionality or to identify problems. System testing is regularly required before and after a system is put in place. A series of methodical trials are raised while testing is being accomplished. These trials tell the tester how the system should achieve and where common mistakes may be found. Testers regularly try to "break the system" by putting data that will make the system to malfunction or reoccurrence of incorrect data. Usually system testing is categorized into 2 steps or types, system developers testing and the system user testing. System developer trial is the type of test carried out by the system developer to see whether the system is ready for invention or not, while system user testing is the one being conducted by end the users of the system.
Objective of testing
The main purpose of doing this testing is to make sure the proposed does not have any error that will allow it to function properly and also to make the system to be dependability and excellence.
Types of Testing
There are many different types or approaches of testing; the author is going to explain some of the types of testing available in testing system functionalities.
Unit Testing
Unit testing refers to the end users testing of single units of software system. In object-oriented systems, these units characteristically are classes and approaches. (M. K lling, 2009). The main goal of unit testing is to take the minimum piece of testable software in the application, isolate it from the rest of the code, and control whether it works accurately as end user assume. Every unit is tested individually, before mixing them into components to test the interfaces between modules. Unit testing has confirmed its importance in that a huge ratio of defects is recognized throughout its use. (Microsoft Corporation, 2009)
Integration Testing
16 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
User
A user can be defined as the real trade users, that will have to access the system; usually the employee of an organization, but it could be the providers or clients. They are the only individuals that comprehend accurately what the business is, and how it operates. So they are the only individuals are qualified to check a system to see if it will bring any benefit to the business or organization. Coley Consulting, (2001-2007)
Acceptance
The acceptance method means that its confident to give benefit to the ministry. It does not mean that it only meets the inventive specification as requested. A system might be very well meet of all the conditions requested of it, nevertheless when trying to see how it will work in the business it is realized that it will not give anything positive to the organization, or might even damage the organization. This may be for a number of reasons such as a change in the business or business environment, such as a takeover. Coley Consulting, (2001-2007)
Testing
Each time individuals are requested what testing is, many of them say it is to prove the system works. This is the key problem with the way UAT is employed in numerous organizations, as it is incredible to prove any system is accurate. In fact a portion of effort is used, and missed, in trying to get correct responses. Coley Consulting, (2001-2007)
Performance testing
Performance testing is the procedure of defining the rapidity or efficiency of a computer, network, software program or device. This procedure might involve measurable tests completed in a lab, such as determining the response, on which a system works. Qualitative characteristics such as dependability, scalability and interoperability may also be assessed. Performance testing is regularly completed in aggregation with stress testing. Tech Target, (2006-2009)
Black-box testing
This test method is to test the system's module functions. This method is performed under the system function requirement. It is more importance on the system performance process, like how the system implements the function and generates the system invention. The author is applying this method in the proposed system testing, by means of this testing approach, the author will test the code of the function obviously and this method might help to find the errors quicker by testing the system based on the module purpose fundamentals. Sommerville, (2001)
Usability Testing
Usability test is a method for confirming that the future users of a system might conduct out the planned tasks competently, successfully and acceptably. Gerry Gaffney, (1999).
Testing Results
Hello, my name is Josephine Ede. I am from the faculty FOCIT, studying business and technology information (BITCU). I am doing system evaluation on my final project a study and development of an E-procurement online system for the federal ministry of science and technology Nigeria, using asp.net. Please kindly, respond to the questionnaires below as your response is very important for the enhancement of the system
17 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
PART B
1. Is the system very informative?
18 out of the 20 evaluated users ticked yes that the system is very informative while 2 of the remaining respondent ticked No that the system is not informative. According to the user response analysis and evaluation, the users are satisfied with the system in terms of information.
2. Is it easy to use?
18 out of the 20 respondents ticked yes that the system is easy to use while 2 of the remaining users ticked No that the system is not easy to use. According to the analysis done on user response, it shows that they are satisfied with the system because of its easy to use.
PART C
1. Please rate your overall happiness about System?
18 out of the 20 users ticked good that as being happy and satisfied with the entire system. This shows that the users are willing and will love to use the new system when implemented online. According to the user response analysis, it shows that the users are happy with the entire system. It shows that the entire system functionality and features meet the user requirement.
Future Enhancement
The future enhancement includes: Creating an automated way of evaluating the best company to for the job. Language translator may also be included in the future enhancement. The interface can be changed in the future: in the future a lot of designs may be enhanced in the proposed system, and the text colour can be change in order to meet the customer/users satisfaction at that time, will be
18 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
Reference: Books
Alexander, B. (2006). Web 2.0: A new wave of innovation for teaching and learning? Educause Review,2006(March/April), 33-44. Beamish, A (1995) 'Communities on-line: community based community networks', Unpublished MA Thesis, Massachusetts Institute of Technology. Carter McNamara, (2008) Overview of Basic Methods to Collect Information. Authenticity Consulting, LLC. Choudhury.V, Hartzel, K.S. and Konsynski, B. (1998). Uses and Consequences of Electronic Markets: An Empirical Investigation in the Aircraft Parts Industry. MIS Quarterly, 22, 4, 471-507 Dunleavy P. (1994) The globalization of public services production: can government be "best in world"? Public Policy and Administration, 9(2): 36-64 Henderson, C. (2006). Building Scalable Web Sites: building, scaling, and optimizing the next generation of web applications. Knudsen, D. (2002). "Uncovering the strategic domain of E-procurement," in 11th Annual International Purchasing and Supply Education Research Association Conference, Netherlands, Mills M. (1996) 'Changing the project culture for procurement,' Information Technology and Public Policy, 14(3): 167-9 Martin, T. N et al (2001), "Purchasing Agents: Use of the Internet as a Procurement Tool". Quarterly Journal of Electronic Commerce, Vol. 2, No. 1. Miller, S. (2006, August 20th). E-Procurement Initiatives. , New York: McGraw-Hill. Nwokak, et al. (2007). E-Procurement and Marketing Performance in Corporate Organizations in Nigeria. Nssuka: Ugo Press. Pabedinskaite & Elskyte, (2007) Vilnius Gediminas Technical university: Department of Business Technology Riccardi G. (2001), Principles of Database Systems with Internet and Java Applications, Addison-Wesley Publishing Company, 480 P. Teorey, T. (1996) Database Modeling and Design: The Fundamental Principles. Morgan Kaufmann, 1996. The Economist (1995) 'The future of democracy, and democracy and technology', the Economist, 17 June: 15-16 and 21-3 Tonkin C., (2002). " Adoption of electronic commerce in procurement: The experience of selected Australian jurisdictions, Brisbane: Unpublished Research Paper, Turban, et al (2006), Electronic Commerce: A Managerial Perspective, New York: McGraw-Hill. Zwass, V. (2003), "Electronic Commerce and Organizational Innovation: Aspects and Opportunities", Journal of Electronic Commerce, Vol. 7, No. 3.
Online
Bates, C. (2002) Web Programming: Building Internet Applications. Wiley. Beginner Developer Learning Center (online) (cited Nov 4th 2009) Available fromhttp://msdn.microsoft.com/vstudio/express/vwd/ Bailey, K. (1987) Methods of Social Research (online) (cited Jan 21, 2009) Available from http://www.vgtu.lt/upload/vvf_vtk/basics%20of%20research%20work.pdf Braithwaite R. B, (1968) Scientific Explanation, London: Cambridge University Press (online) (cited Febuary 5, 2010) Available from http://www.vgtu.lt/upload/vvf_vtk
19 of 20
11-03-2013 17:27
http://www.ukdissertations.com/dissertations/information-systems/desig...
Help
Contact us
Buy Now
My account
Please note: The above dissertation snippet was written by a student and then submitted to us to display and help others. Thanks to all the students who have submitted their work to us. To see more dissertations, click here.
Find us on Facebook
Follow us on Twitter
Copyright 2003 - 2013 - UK Dissertations is a trading name of All Answers Ltd. All Answers Ltd is a company registered in England and Wales Company Registration No: 4964706. VAT Registration No: 842417633. Licensed under the Consumer Credit Act under Licence No: 0612201. Registered Data Controller No: Z1821391. Registered office: Venture House, Cross Street, Arnold, Nottingham, Nottinghamshire, NG5 7PJ. Fair use policy | Terms & conditions | Privacy policy | Complaints policy | Cookies | Sitemap
20 of 20
11-03-2013 17:27