Вы находитесь на странице: 1из 58

A DYNAMIC ONLINE RECRUITMENT & MANAGEMENT SYSTEM

A CASE STUDY OF NFT CONSULTS LTD



BY
KATUMBA NOAH BALIGIDDE
DCS/10061/81/DU
A GRADUATION REPORT SUBMITTED TO THE SCHOOL OF COMPUTER
STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS
FOR THE AWARD OF DIPLOMA IN COMPUTER SCIENCE
OF
KAMPALA INTERNATIONAL
UNIVERSITY
AUGUST, 011
DECLARATION
I declare this research report with no any duplication or photocopy of it from any
institution of higher learning either for the reward of a certificate, diploma, degree, or
beyond in the field of computer studies.
Name Katumba Noah Baligidde
RegNo. DCS!""#!$!D%
Signature&&&&............... Date'
&&&&&&&&&..
ii
APPROVAL
(his is my research report and is submitted to the School of Computer with the appro)al
of my super)isor from the Department of Computer Studies of Kampala International
%ni)ersity.
Name *r. +ssimwe ,ohn -atric.
Signature&&&&&&&
Date&&&&&&
iii
DEDICATION
I wish to dedicate this research report to my mother *s. *ary B. Semutoo.e, Sisters,
,oseph and all my friends that ha)e made this research pro/ect a success in one way or
another.
i)
ACKNOWLEDGMENT
I greatly than. the +lmighty 0od for his lo)e and protection throughout my studies and
the entire pro/ect. I wish to ac.nowledge my super)isor *r. +ssimwe ,ohn -atric. for his
guiding role through out this pro/ect.
(han.s.

LIST OF FIGURES
)
1igure !' showing the Conceptual frame wor. for the proposed system............................2
1igure 3' Showing Respondents4 strained on how to recruit employees...........................!#
1igure 5' showing the program flow of the entire system.................................................3!
1igure 2' showing the architectural Conte6t design of proposed system..........................35
1igure 7' showing Submit entity particulars......................................................................3$
1igure #' showing the 8ntity Relationship Diagram for the database...............................39
1igure :' showing a login form for system authentication................................................5"
1igure $' showing students form.......................................................................................5!
1igure 9' showing 8mployee %pgrade form.....................................................................53
1igure !"' showing payment form.....................................................................................55
1igure !!' showing Retirement form.................................................................................52
1igure !3' showing the welcome screen to N1( Consult system......................................2!
1igure !5' showing a form for /ob selection......................................................................23
1igure !2' showing a form for contacts collection............................................................23
1igure !7' showing a form for submitting /ob specific information.................................25
1igure !#' showing main menu to the system...................................................................22
1igure !:' Report for 0eneral recruitment information submitted...................................27
LIST OF TABLES
)i
(able !' showing the respondents4 occupation..................................................................!7
(able 3' showing respondents4 reasons for poor recruitment specification.......................!:
(able 5' Showing respondents4 )iews about e6istence of technological problems...........!$
(able 2' Showing hardware re;uirements for the system..................................................!9
(able 7' showing software re;uirements for the proposed system....................................!9
(able #' showing conduct entity particulars......................................................................32
(able :' showing 8mployee %pgrade entity particulars....................................................37
(able $' showing StaffData entity particulars....................................................................3#
(able 9' showing retirement entity particulars..................................................................3:
LIST OF ACRONYMS AND ABBREVIATIONS
)ii
HR ! H"#$% R&'(")*&
DBMS ! D$+$,$'& M$%$-&#&%+ S.'+&#
GB / G0-$ B.+&
ICT / I%1()#$+0(% C(##"%0*$+0(% T&*2%(3(-.
LAN / L(*$3 A)&$ N&+4()5
LTD / L0#0+&6
MH7 / M&-$ H&)+7
NFT / NFT C(%'"3+ LTD
RAM / R$%6(# A**&'' M&#().
SDLC ! S.'+&# D&8&3(9#&%+ L01& C.*3&
SPSS ! S+$+0'+0*$3 P$*5$-& 1() +2& S(*0$3 S*0&%*&'
ABSTRACT
)iii
<nline recruitment can offer significant cost sa)ings for employers and reduces the time
ta.en to fill )acancies. (raditional recruitment ad)ertising is therefore set to retain an
important role particularly when recruiting locally =or> for head?to?fill /obs. *any
organi@ations ha)e found a considered combination of both online and traditional
approaches to ma6imi@e their chances of securing the best candidate.
+n online recruitment presence shows organi@ations to be forward thin.ing and therefore
more attracti)e to potential employees for candidates, online recruitment offers great
fle6ibility and case of access to /ob searches and pro)ide recruitment ser)ices through
internet for graduates.
(his pro/ect generally deals with pro)iding for /ob see.ers through this system. (he
graduates can easily get contact with the organi@ation. +t the same time it ma.es it easy
for the company to get an employee.
Ahen graduates register online, they ha)e to gi)e their complete personal details and
s.ills they possess. (hus a resume is generated by these details that are seen by
companies. In the same way the companies ha)e to gi)e complete details of /obs they are
pro)iding. By this the employee and /ob see.er can communicate with each other.
(hus this pro/ect plays an important role for recruiting of employees. (he companies can
access e)en remote areas of the country. It also gi)es good opportunity for the freshly
graduates to access the information about the organi@ation. (hus this pro/ect satisfies both
graduates and employees.
TABLE OF CONTENTS
i6
DECLARATION.......................................................................ii
APPROVAL...........................................................................iii
DEDICATION.........................................................................iv
ACKNOWLEDGMENT..............................................................v
LIST OF FIGURES....................................................................vi
LIST OF TABLES.....................................................................vii
LIST OF ACRONYMS AND ABBREVIATIONS............................viii
ABSTRACT...........................................................................ix
TABLE OF CONTENTS................................................................x
CHAPTER ONE.......................................................................12
INTRODUCTION.....................................................................12
1.0 General Introducton...........................................................12
1.1 Bac!"round o# t$e %tud&.............................................................1
1.' State(ent o# t$e )ro*le(............................................................2
1.+ O*,ect-e% o# t$e %tud&...............................................................2
1:;:1 M$0% (,<&*+08&'..........................................................................2
1:;: S9&*010* (,<&*+08&'.......................................................................2
1.. Re%earc$ /ue%ton%..................................................................2
1.0 Sco)e o# t$e %tud&....................................................................3
1.1 2u%t#caton o# t$e %tud&.............................................................3
CHAPTER TWO......................................................................4
LITERATURE RE3IE4................................................................4
'.0 Introducton..........................................................................4
'.1 Sco)e o# t$e lterature re-e5........................................................5
'.' Data (ana"e(ent %&%te(............................................................5
::1 B&%&10+' (1 6$+$,$'& &%80)(%#&%+......................................................6
:: A99)($*2 +( 6$+$,$'& #$%$-&#&%+....................................................6
:::1 H0&)$)*20*$3 DBMS $99)($*2............................................................................6
::: N&+4()5 () CODASYL DBMS..........................................................................7
:::; R&3$+0(%$3 DBMS............................................................................................ 7
'.+ Ad-anta"e% o# u%n" co()uter *a%ed data*a%e%.....................................
'.. Area o# a))lcaton...................................................................!
:=:1 A**")$*. $%6 *(#93&+&%&'' (1 6$+$.....................................................8
'.0 De-elo)(ent 6et$odolo"&..........................................................."
6
'.1 Lterature Conclu%on..............................................................1#
CHAPTER THREE....................................................................11
6ETHODOLOG7.....................................................................11
+.0 Introducton........................................................................11
+.1 T$e )o)ulaton %tud&...............................................................11
+.' Sa()le %electon...................................................................11
+.+ Re%earc$ )rocedure................................................................11
+.. Collecton o# Data..................................................................12
;:=:1 I%+&)80&4...............................................................................12
;:=: Q"&'+0(%%$0)&'.........................................................................13
+.0 De-elo)(ent (et$odolo"& 8S&%te(% de-elo)(ent l#e c&cle9......................14
+.1 Conclu%on.........................................................................14
CHAPTER FOUR.....................................................................15
DATA PREPSENTATION: ANAL7SIS: DESIGN AND I6PLE6ENTATION......15
..0 Introducton........................................................................15
..1 Data )re%entaton..................................................................15
=:1:1 S*(9& )&-$)60%- (**"9$+0(% (1 )&'9(%6&%+'..........................................15
4.1.2 Respondents strained on how to recruit employees...........16
4.1.3 Respondents view about reasons for poor recruitment
specication.............................................................................1!
4.1.4 Respondents view about technolo"ical problems in the
company..................................................................................18
4.2 S$%&'( )*+ ,'-.i,'('*& )*)/$%i%...................................1!
4.2.1 #ystem re$uirements........................................................18
2.3.!.! Bardware re;uirements....................................................................................19
2.3.!.3 Software re;uirements..................................................................................... 19
..+ Pro,ect ()le(entaton............................................................1"
=:;:1 C('+.....................................................................................1%
=:;: T&*2%0*$3...............................................................................2&
=:;:; O9&)$+0(%..............................................................................2&
=:;:= S&*")0+..................................................................................2&
4.4 S$%&'( +'%i0*..............................................................2#
4.4.1 #ystem pro"ram 'ow........................................................21
4.4.2 (rchitectural desi"n.........................................................22
=:=:; C(%*&9+"$3 6&'0-%.....................................................................24
6i
2.2.5.! Conceptual data model..................................................................................... 24
2.2.5.3 <)er)iew of the database entities........................................................................24
2.2.5.5 Conduct entity............................................................................................... 24
2.2.5.2 8mployee %pgrade entity.................................................................................25
2.2.5.7 StaffData entity..............................................................................................26
2.2.5.# Retirement entity............................................................................................ 27
2.2.5.: Submit entity................................................................................................. 28
2.2.5.$ Relationships................................................................................................ 28
=:=:= U'&) I%+&)1$*&'.........................................................................3&
=:=:> I%9"+ 0#93&#&%+$+0(%.................................................................31
4.4.5.1 )onduct form...................................................................................... 31
2.2.7.3 8mployee %pgrade form..................................................................................32
4.4.5.3 #ta* +ata form..................................................................................33
4.4.5.4 Retirement form................................................................................34
..0 So#t5are te%tn"....................................................................34
4.5.1,nit testin".......................................................................34
4.5.2 #ystem testin".................................................................35
CHAPTER FIVE....................................................................31
RECOMMENDATIONS AND CONCL2SIONS..............................31
0.0 Introducton........................................................................31
5.1 R'34(('*+)&i4*%.........................................................31
5.2 C4*3/.%i4*%..................................................................31
APPENDICES.........................................................................3
APPENDI; A.........................................................................3
A -.'%&i4**)i,' )*%5','+ 6$ ,'3,.i&('*& 7,4(4&',%............3
APPENDI; B.........................................................................4#
A %a()le NFT Con%ult nter-e5 <ue%ton% #or drector and (ana"er................4#
APPENDI; C.........................................................................41
Sa()le %creen%$ot%....................................................................41
Re#erence...............................................................................41
CHAPTER ONE
INTRODUCTION
1:0 G&%&)$3 I%+)(6"*+0(%
*ost of the ser)ices we en/oy on the web are pro)ided by web database applications one
of which is /ob recruitment. <nline Recruitment and management system is the
6ii
comprehensi)e tool to manage the entire recruitment processes of an organi@ation. It is
one of the technological tools facilitated by the information management systems to the
Buman Resource =BR> of organi@ations. ,ust li.e performance management, payroll and
other systems, Recruitment management system helps to contour the recruitment
processes and effecti)ely managing the tas.s of recruitment.
BR management has become one of the essential functions in an organi@ation. No
organi@ation can do without this department. BR is the function or department in an
organi@ation that has the tas. to recruit, train, moti)ate, reward, dismiss, terminate as well
as loo. after the welfare of employees in an organi@ation. =Buman resource /ournal,
+ugust 3""#, I-* =K> therefore the BR has to ensure that the welfare of employees are
ta.en into consideration.
1:1 B$*5-)("%6 (1 +2& '+"6.
Computeri@ation is a control system that manages processes in industrial wor.place. It
reduces human errors and processing time, thus it can boost producti)ity and resulted into
high ;uality of product produce and ser)ice offering. In information systems,
computeri@ation is concerned with interrelating different but interdependent transactions.
(his can result in a system with well?integrated processes that can perform much faster
and more accurate than a manual system. In the year 3""", management and
administration of human resource information was done manually. (his entailed
gathering raw data to form a record base, sorting it to get rele)ant information, storing it
in files and a)ailing it when re;uired. Aith the emerging computer technology,
information in all sectors has been one of the most targeted areas to enhance the record
.eeping and also easy accessibility using a )ariety of computer programs that presents
information in a desired format and by use of internet as a communication channel to
facilitate access and e6change of information. (he online recruitment and management
system the researcher proposed for N1( Consult Company would mend the manual
recruitment system at the company that was restrained by a bac.log of files, records and
folders in addition to staff slowness handling large paper wor..
6iii
1: S+$+&#&%+ (1 +2& 9)(,3&#
Due to the increasing BR wor. density and uncertainty, the crucial tas. was to impro)e
data storage =handling and managing large files, records and folders> and indi)idual
fulfillment by pro)ision of high ;uality data and ser)ice in the most reliable way.
In addition to the abo)e, there were reports of data redundancy, lac. of data reliability,
higher cost and rate of data maintenance and dependency, reduced data ;uality and
deteriorating data management capability and this was the reason why the researcher
carried out this study.
Based on the problems stated abo)e, the purpose of the study was to design an effecti)e
dynamic computeri@ed online recruitment and data management system for N1(
Consults.
1:; O,<&*+08&' (1 +2& '+"6.
1:;:1 M$0% (,<&*+08&'
(he main ob/ecti)e was to de)elop and implement a dynamic computeri@ed online
recruitment and data management system to enable data accessibility and sharing of
resources in order to reduce the cost of operation for the consultancy company.
1:;: S9&*010* (,<&*+08&'
i. (o assess the role of shared data management systems on data security at N1(
Consults.
ii. (o design a dynamic online database application system.
iii. (o test and implement the system.
1:= R&'&$)*2 Q"&'+0(%'
Below were the research ;uestions that guided the researcherC
Ahat would be the roles of shared data management systems on informationdata
integrity for N1( ConsultsD
Ahat would be the roles of shared data management system on data security N1(
ConsultsD
6i)
Ahat would be the roles of shared data management systems on reduced data redundancy
and cost of storage of data for N1( ConsultsD
1:> S*(9& (1 +2& '+"6.
N1( Consult is located in heart of Kampala city, plot 52 along Na.asero Road. (he study
will co)er the BR department of N1( Consult mainlyC the +dministrators of the firm that
is manager and directorC 7 representati)e staff and clientele.
1:6 ?"'+010*$+0(% (1 +2& '+"6.
(he <nline Recruitment System should be a more strategic and effecti)e administration
system for human resource procedures of N1( Consults. (here would be fle6ibility in a
fast?changing en)ironment and access to ade;uate and timely information. +n e6ample of
how such success could be achie)ed is clearly demonstrated by the fact that there would
be less paper used in the process, when disseminating information to employees or
sta.eholders. (he system would impro)e greatly the communication and organi@ational
patterns between sta.eholders and the human resource sector.
F0-")& 1@ '2(40%- +2& C(%*&9+"$3 1)$#& 4()5 1() +2& 9)(9('&6 '.'+&#
6)
Database
HR A9930*$+0(%
Eocal Client Eocal Client
-erhaps the most important component in any organi@ation is data and thus it has got to
be used =handled> with care.
(he figure abo)e shows a graphical conceptual representation of the new system and the
relations between its components. 1irst of all the researcher would need a database,
which would constitute the bac.bone of the system. (he database would hold all the
information needed for such a company to e6ist ? /ob, employee upgrade and conduct and
staff details. (he design and implementation of a database for an online company was
comple6 and time consuming but the researcher implemented it as efficient as possible.
(he database would ser)e the local clients that the system had. (he BR +pplication
would be operated by the BR managers who were able to post the application forms to
the local clients and handle whate)er information the feed into the system. (he
application forms would be containing all details of the desired persons and spaces from
where the applicant could fill in the details and submit to the database.
CHAPTER TWO
LITERATURE REVIEW
:0 I%+)(6"*+0(%
6)i
(he aim of this chapter was to e6plore the in depth of the concept of a shared computer
based database system. (he purpose was to find out and suggest procedures that were
recommended to build and operate such a system. (his information had been mainly
e6tracted from published database system boo.s, internet and pre)iously published
/ournals and dissertations for e6ample =Eong, !9$9>, Butchinson et al, 3"""> et al.
:1 S*(9& (1 +2& 30+&)$+")& )&80&4
(he literature about the system de)eloped would duel so much on information systems
that ma.e use of databases =Eong, !9$9,p.329>, .nowledge from boo.s about how to set
and operate networ.s and in particular 8thernet cabled E+Ns. (he re)iew put into
consideration related systems that had pre)iously been de)eloped. It dug deep into how
databases could be designed, how an interface could be created, and how such system
could be put into use and maintained.
It also co)ered problems anticipated and how they could be troubleshot.
It further loo.ed at how the client ser)er networ. could be set up and the technology that
could be used to share the different resources. It also co)ered the .ind of computers and
other de)ices that could be reliably used in setting up a networ. that would enable
sharing of the database.
It suggested the different areas where such a system could be applied and the problems
that such a system cable used to sol)e. (he re)iew further tac.led the different techni;ues
that could be used in collection of data, how to analy@e the data, how to de)elop the
system itself by suggesting )arious methodologies and tools that can be used =Eaudon,
3""3>.
1inally it loo.ed at different de)elopment tools such as different operating systems,
programming languages and Database *anagement System =DB*S>.
: D$+$ #$%$-&#&%+ '.'+&#
+ccording to Eong =!9$9>, Data management, encompasses the storage, retrie)al, and
manipulation of data. *any e6isting information systems were designed using traditional
approaches to data management but the trend has shifted to the use of database approach
6)ii
to de)elop new information systems. (he database is the resource for all computer based
information systems. + database, FIs a collection of files that are in some way logically
related so that data redundancy is minimi@edG =Eong, !9$9, p.329>.
::1 B&%&10+' (1 6$+$,$'& &%80)(%#&%+
0reater access to information, the structure of an integrated database pro)ides enormous
fle6ibility in the type of reports that can be generated and type of online in;uiries that can
be made.
Better control. + database management system allows data to be centrali@ed for impro)ed
data security. By centrali@ing data, ad)anced data structures can be used to control
redundancy. Data structures,G refers to the manner in which the data elements and records
are related to each otherG =Eong, !9$9, p.379>.
*ore efficient software de)elopment and programming techni;ues are more readily
a)ailable and data are independent of the application programs.
:: A99)($*2 +( 6$+$,$'& #$%$-&#&%+
+ccording to Eong =3""3>, there are three fundamental approaches to design database
system namelyC
Bierarchical approach
Networ. or C<D+SHE DB*S approach
(he Relational DB*S approach.
:::1 H0&)$)*20*$3 DBMS $99)($*2
+lthough networ. and relational DB*S technologies are considered superior to the
hierarchical DB*S technology, the hierarchical approach remains the most commonly
used.
(his is more as a result of momentum than choice. Information management system a
hierarchical product was by !9#$ the game on shel)es and this made it become more
popular. It can be run on today4s hardware.
6)iii
It does not ha)e the scope of features of more sophisticated networ. and relational
DB*S4. Ne)er the less, all new de)elopments in the area of database management
system use networ. or relational technologies.
Bierarchical DB*S is based on three data structures, actually an uprooted tree turned
upside down. (hey are easy to understand and conceptuali@e.
::: N&+4()5 () CODASYL DBMS
(his approach to data management carries the hierarchical approach to the ne6t le)el of
sophistication by permitting children to ha)e more than one parent. (his approach
minimi@es redundancy and therefore allows for more ;ueries to be made.
:::; R&3$+0(%$3 DBMS
(he relational approach to database management systems has been gaining momentum
through the !9$"4s. In contrast, to the networ. DB*S, here data is accessed by content
rather than by address. (his approach uses the computer to search the database for the
desired data rather than accessing data through a series of indices and physical addresses,
as with both hierarchical and networ. DB*S.
Bere the data structures are defined in logical rather than physical attempts until recentlyC
relational DB*S ha)e been slow to be effecti)e in the real world, especially in
transaction oriented en)ironments.
Bowe)er, for applications where the transaction )alue is low and the need for fle6ibility
is high, relational DB*S out perform networ. DB*S because Frelational structure
pro)ides greater fle6ibility in accessing informationG. +nd pro)ide companies with
greater opportunities to increase producti)ity.
:; A68$%+$-&' (1 "'0%- *(#9"+&) ,$'&6 6$+$,$'&'
R&6"*&6 6$+$ )&6"%6$%*.@ In file management systems, some of the same data files are
repeated in different filesC in databases, by contrast the information appears /ust once but
information is made a)ailable to different users more o)er concurrently and this lowers
down the e6penses of space.
6i6
I#9)(8&6 6$+$ 0%+&-)0+.@ Reduced redundancy increases the chances of data integrity.
Data that is accurate, consistent, and up to date because each updating change is made in
only one place.
M()& 9)(-)$#' 0%6&9&%6&%+@ Aith a database, the program and file formats are the
same, so that one programmer or e)en se)eral of them can spent less time maintaining
files.
I%*)&$'&6 "'&) 9)(6"*+080+.@ Database management systems are fairly easy to use, so
that users can get their re;uests for information answered without ha)ing to resort to
technical manipulations.
I%*)&$'&6 '&*")0+.@ +lthough )arious departments may share data in common in, access
to specific data information can be limited to selected users. (hus, through the use of
passwords, a client financial, medical, and wor. information in a company is made
a)ailable only to those who ha)e a legitimate need to .now.
+lthough there are clear ad)antages to ha)ing databases, there are still some
disad)antagesC
C('+ 0''"&'@ Installing and maintaining a database is e6pensi)e particularly in a large
organi@ation.
D$+$ 8"3%&)$,030+. 0''"&'@ +lthough a database can be restricted access, it4s always
possible unauthori@ed users will get passed the safeguards.
P)08$*. 0''"&@ + database may hold unsanctioned information that may be used for
unintended purposes this puts peoples li)es at a ris.. =Butchinson and Sawyer, 3""">
:= A)&$ (1 $9930*$+0(%
Database management systems are applied in all corners of de)elopment. It is mainly
used in financial institutions for e6ample ban.s, corporate institutions and educational
institutions name it all.
:=:1 A**")$*. $%6 *(#93&+&%&'' (1 6$+$
66
Databases including public databases such asC Ee6is, Dialog, and Dow ,ones
NewsRetrie)al can pro)ide you with more facts and faster facts but not always better
facts. -enny Ailliams, professor of broadcast /ournalist at Buffalo state College in New
Hor. and formerly a tele)ision anchor and reporter, suggests there are fi)e limitations to
beat in mind when databases for research. +nd these areC
Hou can4t get the whole story. 1or some purposes, databases are only a foot in the door.
It4s not the gospel' ,ust because you see some thing on the computer screen it doesn4t
mean all is accurate. Numbers, names, and facts may need to be )erified in other ways.
Know the boundaries' <ne database ser)ice doesn4t ha)e it all.
1ind the right words' you ha)e to .now which .ey words to use when searching a
database for data.
Bistory is limited' *ost public databases, Da)is says, ha)e information going bac. to
!9$", and a few into the !9:"s, but ha)e information earlier.
:> D&8&3(9#&%+ M&+2(6(3(-.
System analysis and design is a si6 phase problem sol)ing procedure for designing an
information system and impro)ing it. (he si6 phases ma.e up what is system
de)elopment life cycle. (he system de)elopment life cycle =SDEC> is defined as F(he
step by step process that many organi@ations follow during systems analysis and designG
=Ailliams, et al, !999, p.2:#>.
(he number of phases may )ary from one company to another, and e)en the name of the
process may differ =application de)elopment cycle, structured de)elopment life cycle, for
instance>.(he si6 phases of systems analysis and design may be said to be as follows'
-reliminary in)estigation' Conduct preliminary analysis, propose alternati)e solutions,
and describe the costs and benefits of each solution. Submit a preliminary plan with
recommendations. If you are doing a systems analysis, and design, it4s safe, e)en
preferable to assume that you .now nothing about the problem at hand. In the first phase,
it4s your /ob to mainly as. ;uestions, do research and try to come up with a preliminary
plan.
66i
S.'+&#' $%$3.'0'@ 0ather dataC analy@e the data using tolls of written documents,
inter)iews, ;uestionnaire, obser)ations, and sampling. +naly@e the data using %*E
diagrams, data flow diagrams, systems flow charts, connecti)ity diagrams, grid charts,
and decision tables and write a report.
S.'+&#' 6&'0-%@ *a.e a preliminary design and then a detailed design using %*E
diagrams, prototyping tools and pro/ect management software among others. Do a
detailed design, defining re;uirements for output, input, storage, and processing and
system controls and bac.up, finally write a report.
S.'+&#' 6&8&3(9#&%+@ +c;uire the hardware and software and test the system. In the
ma.e or buy decision, you decide whether you ha)e to create a program or ha)e it custom
written or buy it meaning simply purchase a system software pac.age. If you decide to
create a new program, then the ;uestion is whether to use the organi@ation4s own staff
programmers or higher outside contract programmers =<utsource it>. Ahich e)er way
you go, the tas. could ta.e many months. Ba)ing made a decision, the hardware to run it
must be ac;uired or upgraded or buy new hardware.
S.'+&#' 0#93&#&%+$+0(%@ Con)ert the hardware, software, and files to the new system
and train the users. Con)ert using any of the following con)ersionsC parallel, phased or
pilot. Compile final documentation and train the users.
S.'+&#' #$0%+&%$%*&@ +udit the system, re;uest feedbac. from its users, and e)aluate it
periodically.
:6 L0+&)$+")& C(%*3"'0(%
Basing on the literature from other writers, the system would impro)e the firms4 day to
day acti)ities easing its managerial status and outlining the usefulness of web based
applications in recent business communities when implemented under correct principles
that pro)ide web security.
66ii
CHAPTER THREE
METHODOLOGY
;:0 I%+)(6"*+0(%
(his chapter pro)ides the methodology that was used to de)elop a shared database
system. It co)ered the following .ey areas of pro/ect de)elopment organi@ation units that
were studied, the population that was used, sample si@e, research instruments and fact
finding methods that were used to establish the present set of users and system
re;uirements, )arious techni;ues of data collection, design techni;ues and tools that were
used.
;:1 T2& 9(9"3$+0(% '+"6.
+dministration' the director of the firm and two managers were inter)iewed. (hree of
clientele =recruited> were inter)iewed.
1rom the BR department, the information collected includedC Recruitment, selection and
training of employees, /ob e)aluation, conditions of employment and welfare of
employees.
;: S$#93& '&3&*+0(%
(he researcher selected fi)e respondents from the firm staff and three of clientele.
Bowe)er, for the directors and managers, it was by )irtue of the positions that they held.
In each of the departments, at least one respondent was ta.en and inter)iewing was the
main data collection techni;ue used.
Iuestionnaire approach helped to fact find rele)ant customers within the sample space.
;:; R&'&$)*2 9)(*&6")&
-rior to the study, a letter was submitted to N1( Consults see.ing permission to carry out
the study. (his was done in order to establish a good relationship with the company in
addition to showing the urgency of the study. + wee. after the deli)ery of the letter the
researcher was ready to .now whether the re;uest was granted.
66iii
;:= C(33&*+0(% (1 D$+$
Data was gathered from the sample gi)en abo)e. (he ma/or techni;ues used included
inter)iews with limited ;uestionnaires. (he choice of the method depended on the
information needed and the time that was a)ailable for the )arious respondents.
1rom the director and manager, inter)iews were used e6clusi)ely, from the accountant,
both inter)iews and document re)iew were used, and from the rest of respondents,
;uestionnaires were used e6clusi)ely. Inter)iews were conducted one on one where as for
those that used ;uestionnaires, they were gi)en four days to complete the documents.
+fter that period of time, the researcher collected the documents that were ta.en for
analysis.
Data was collected using the following techni;ues'
;:=:1 I%+&)80&4
+n inter)iew is an oral administration of a ;uestionnaire or an inter)iew schedule.
Inter)iews are face to face encounters. (o obtain accurate information through inter)iews,
a researcher needs to obtain ma6imum cooperation from respondents. (hus, one must
establish a friendly relationship prior to conducting an inter)iew. Inter)iews, offer the
following ad)antages'
(hey pro)ide in depth data which is not possible to get using a ;uestionnaire.
It is possible to obtain data re;uired for specific ob/ecti)es.
(he researcher can clarify on certain ;uestions and thus they are more fle6ible
compared to other methods.
%nli.e ;uestionnaires, the inter)iewer can get more complete and honest
information.
Bigh response since the respondents can refuse to answer completely.
Bowe)er, demerits such as high cost, need for high le)el of interpersonal s.ill, bias, small
sample si@e, responses being influenced are always e6pected.
Ei.e ;uestionnaires, inter)iews are also of two types that is structured inter)iew and un
structured inter)iew where, structured ;uestions usually categories and the inter)iewer
66i)
simply chec.s the respondent4s response while unstructured ;uestions , the inter)iewer
as.s ;uestions or ma.es comments intended to lead the respondent towards gi)ing data to
meet the study ob/ecti)es.
;:=: Q"&'+0(%%$0)&'
Iuestionnaires are commonly used to obtain important information about the population.
8ach item in the ;uestionnaire is de)eloped to address specific ob/ecti)e. +nd therefore, a
;uestionnaire must be well thought of so as to a)oid cases such asC
Confusing respondents as to the nature of information re;uired.
+lso a bad ;uestionnaire discourages respondents to the e6tent of discarding the
;uestionnaire and this may lea)e out important information re;uired in the study.
Iuestionnaires can be of two types that areC open ended and closed ended ;uestionnaires.
Closed ended ;uestionnaires carry with them the following ad)antages'
(hey are easier to analy@e since they are in an immediate usable form.
(hey are easier to administer since each ;uestion is followed by possible answers
and they are economical in terms of space, time, and money.
Bowe)er, they are more difficult to construct and normally responses the limited and
respondents compelled to answer according to the researcher4s choice.
<pen ended ;uestionnaires on the other hand gi)e the respondent complete freedom to
answer the way heshe wants, permit greater depth of response, and it is easy to formulate
compared to closed ended ;uestionnaire, and really gi)es ones feelings about a gi)en
study.
Bowe)er, there4s a tendency of respondents gi)ing information that does not answer the
;uestions at hand and responses are difficult to analy@e and can be time consuming and
e6pensi)e compared to closed ended ;uestionnaires.
Due to the fact that the researcher was interested in specific data from respondents than
closed ended ;uestionnaires were used to ease data analysis.
66)
;:> D&8&3(9#&%+ #&+2(6(3(-. AS.'+&#' 6&8&3(9#&%+ 301& *.*3&B
(he following steps were used to de)elop the system under study.
P)&30#0%$). 0%8&'+0-$+0(%' this phase conducted for the purpose of determining the cost
of operation on the old systems and the cost e6pected for the new system. (he problems
with the old system were identified through inter)iews and ;uestionnaires. 1inally, a
suggestion to de)elop the computeri@ed system was made and a report submitted to
management.
S.'+&#' $%$3.'0'' the data gathered from the abo)e phase was arranged and prioriti@ed.
1rom the findings of the study, a system4s specification was made stating what the system
should do to meet the company goals.
S.'+&#' 6&'0-%' Defining of the architecture, components, modules, interfaces,
and data for the system to satisfy specified re;uirements were fulfilled.
L(-0*$3 6&'0-%' (his too. an abstract representation of the system4s data flows, inputs
and outputs of the system.
P2.'0*$3 6&'0-%' Shown were the actual input and output processes relating to the system
proposed.
;:6 C(%*3"'0(%
(he system de)eloped structured on a constructi)e well defined system methodology and
reliable fact finding techni;ues.
66)i
CHAPTER FOUR
DATA PREPSENTATION, ANALYSIS, DESIGN AND IMPLEMENTATION
=:0 I%+)(6"*+0(%
(his chapter focused on the presentations of the data generated during the course of the
field study. (he field results were achie)ed by descripti)e statistics and presented using
computer based Statistical -ac.age for the Social Sciences =S-SS>
=:1 D$+$ 9)&'&%+$+0(%
*ost significant data presented and illustrated below was analy@ed from !7 respondents4
;uestionnaires gathered from the sur)ey at company.
=:1:1 S*(9& )&-$)60%- (**"9$+0(% (1 )&'9(%6&%+'
(he respondent4s scope comprised of $ employees, 5 of clientele, a manager and other
personnel as illustrated in the table below
Occupation
1 6.7 6.7 6.7
8 53.3 53.3 60.0
3 20.0 20.0 80.0
3 20.0 20.0 100.0
15 100.0 100.0
Manager
Employee
Clientele
Others
Total
Valid
Fre!en"y #er"ent Valid #er"ent
C!m!lati%e
#er"ent
T$,3& 1@ '2(40%- +2& )&'9(%6&%+'C (**"9$+0(%
S(")*& (1 9)0#$). 6$+$ "'&6@ )&1&) +( $99&%60D A '2(40%- E"&'+0(%%$0)&
1rom the table abo)e, the sample selection co)ered respondents who interfaced the
manual system and were critical in accelerating the design and implementation of the
proposed system.
66)ii
=:1: R&'9(%6&%+'C '+)$0%&6 (% 2(4 +( )&*)"0+ &#93(.&&'
(he figure below represents respondents and their strains on how N1( Consult recruits
their employees.
F0-")& @ S2(40%- R&'9(%6&%+'C '+)$0%&6 (% 2(4 +( )&*)"0+ &#93(.&&'
&trained on ho' to re"r!it employees(
)o *es
C
o
!
n
t
12
10
8
6
+
2
S(")*& (1 9)0#$). 6$+$ "'&6@ )&1&) +( $99&%60D A '2(40%- E"&'+0(%%$0)&
+ccording to the research conducted, ma/ority accepted that the company was strained on
how to recruit employees, a cause that more so resulted from the e6isting system of wor..
66)iii
=:1:; R&'9(%6&%+' 80&4 $,("+ )&$'(%' 1() 9(() )&*)"0+#&%+ '9&*010*$+0(%
+ table below shows respondents )iews about reasons for poor recruitment specification
at the company.
Reasons for poor recruitment specification exist?
7 +6.7 +6.7 +6.7
3 20.0 20.0 66.7
3 20.0 20.0 86.7
2 13.3 13.3 100.0
15 100.0 100.0
&trongly agree
,gree
)e!tral
-isagree
Total
Valid
Fre!en"y #er"ent Valid #er"ent
C!m!lati%e
#er"ent
T$,3& @ '2(40%- )&'9(%6&%+'C )&$'(%' 1() 9(() )&*)"0+#&%+ '9&*010*$+0(%
S(")*& 1@ 9)0#$). 6$+$ 1)(# $99&%60D A '2(40%- E"&'+0(%%$0)&
1rom the table abo)e, the study conducted re)eled that ma/ority of the respondents
agreed that poor recruitment specification e6isted at the company. 3 were neutral about
the specification while the rest disagreed.
-oor recruitment specifications resulted from the company hiring the wrong personnel
that added costs to business. +lso a lac. of communication within the company
engineered a mo)e to design, test and implement a new system for N1( Consults. Source
of primary data usedC refer to appendi6 B showing Inter)iew guide.
66i6
=:1:= R&'9(%6&%+' 80&4 $,("+ +&*2%(3(-0*$3 9)(,3&#' 0% +2& *(#9$%.
+ table that shows respondents )iews whether technological problems e6ist in the
company or not.
Do Technological problems exist?
+ 26.7 26.7 26.7
8 53.3 53.3 80.0
3 20.0 20.0 100.0
15 100.0 100.0
&trongly agree
,gree
)e!tral
Total
Valid
Fre!en"y #er"ent Valid #er"ent
C!m!lati%e
#er"ent
T$,3& ;@ S2(40%- )&'9(%6&%+'C 80&4' $,("+ &D0'+&%*& (1 +&*2%(3(-0*$3 9)(,3&#'
S(")*&@ 9)0#$). 6$+$ 1)(# $99&%60D A '2(40%- E"&'+0(%%$0)&
+ccording to the table abo)e, ma/ority of respondents =$> generally agreed that the
company faced technological problems regarding their recruitment system. (his
illustrated why the recruitment conditions were too hard for the company, why a
consultancy firm was re;uired to boost recruitment procedures and why there was need to
integrate a computeri@ed recruitment system.
=: S.'+&# $%6 )&E"0)&#&%+ $%$3.'0'
=::1 S.'+&# )&E"0)&#&%+'
In order for the system to perform as e6pected, the following system specifications for
hardware and software, security and operations were re;uired.
666
=::1:1 H$)64$)& )&E"0)&#&%+'
0eneral hardware re;uirements to the system
H$)64$)& M0%0#"# S.'+&# )&E"0)&#&%+
-rocessor Intel -entium III 9""*h@ or higher for des.tops.
Random +ccess *emory 37# *B of R+* or higher.
Bard Dis. space 3" 0B and abo)e for des.top, $" 0B and abo)e for
ser)er.
Display + resolution of !"32 6 :#$ Bigh colors? 53 bit.
T$,3& =' S2(40%- 2$)64$)& )&E"0)&#&%+' 1() +2& '.'+&#
=::1: S(1+4$)& )&E"0)&#&%+'
Software re;uirements of the new system
Software *inimum re;uirements
<perating system for the ser)er Aindows 3""5
<perating system for normal user Aindows J-
Database management system *icrosoft +ccess 3""5
T$,3& >' '2(40%- '(1+4$)& )&E"0)&#&%+' 1() +2& 9)(9('&6 '.'+&#
=:; P)(<&*+ 0#93&#&%+$+0(%
Bere, parts of the new system were brought in gradually. 86perts were in)ol)ed and
issues arose were dealt with at the timeC it4s an e6ercise that too. a period of two wee.s to
de)elop the recommended system. +t this point, ma6imum cooperation with the
authorities was considered so that implementation was done appropriatelyC it was a tas.
of the researcher.
=:;:1 C('+
Cost or economic feasibility was put in place to determine whether the management of
N1( Consult had the ability to fund the pro/ect.
666i
=:;: T&*2%0*$3
(echnical feasibility was aimed at finding out whether the company had technical
e;uipments to house the proposed system in coupled to whether users .now how to use
and integrate with the system. It was found out that the users needed further training and
sensiti@ation on how to use the system and further more some of the technical e;uipments
were a)ailable for implementation of the new system.
=:;:; O9&)$+0(%
<perational feasibility was aimed at studying the en)ironment where the current system
wor.s. (his was important to ensure that the non functional re;uirements of the system
would be applicable these includedC a)ailability of space, electricity and safety of the
system e;uipments.
=:;:= S&*")0+.
It was made possible that only those users with legitimate access rights are allowed to use
the system. It means that authentication was defined through use of user names and
passwordsC also addition of more users and elimination of users especially those who left
the company were defined to be performed e6plicitly by the administrator.
=:= S.'+&# 6&'0-%
(he system design e6hibited the flow of the proposed system of N1( Consult Company.
(he researcher concentrated on system program flow and architectural design.
666ii
=:=:1 S.'+&# 9)(-)$# 13(4
F0-")& ;@ '2(40%- +2& 9)(-)$# 13(4 (1 +2& &%+0)& '.'+&#
666iii
Y&'
S+$)+
U'&) A"+2&%+0*$+0(%
A**&'' NFT C(#9$%.
R&*)"0+#&%+ S.'+&#
I1
OKF
N(
L(-0%
L(-("+
S+(9
1rom the figure, when users start the system program, they are first chec.ed for
authentication in order for them to login to the system menu where one can browse
through re;uired user interfaces. If successful with wor., the users logout of the system.
=:=: A)*20+&*+")$3 6&'0-%
(his ga)e a high le)el re)iew of the system with the main system and ser)ices they
pro)ide and how they communicate within the system.
+t this stage of the system de)elopment, the focus was put on the definition of central
architecture of the system. <ne of the ma/or interests was the identified with their
respecti)e interface. (he product at this stage is the architectural model identifying the
different components of the system. (he figure below shows the architectural design of
the system to be designed.
666i)
F0-")& =@ '2(40%- +2& $)*20+&*+")$3 C(%+&D+ 6&'0-% (1 9)(9('&6 '.'+&#
1rom the figure abo)e, system users first access a welcome screen where by they can log
into the system pro)ided the authentication is accepted. Aithin the system, )arious tas.s
can be done such as ,ob specifications and application, managing of employee conducts
and retirement information. (he system allows the administrator to update the database
and manage staff records and delete where necessary.
666)
W&3*(#& NFT C(#9$%.
U'&) L(-0%
C(%+$*+
A9930*$+0(%
E#93(.&& S+$11
S.'+&# M$0% M&%"
R&+0)&#&%+ C(%6"*+ ?(,
L(-("+ () ED0+
DATABASE
R&9()+'
=:=:; C(%*&9+"$3 6&'0-%
=:=:;:1 C(%*&9+"$3 6$+$ #(6&3
(he conceptual data model pro)ides for de)eloping a structure from the top to down to
the low le)el. In this section )arious entities, their attributes and relationship are
identified as well as the relationship among entities. (hese help the researcher build the
data model for each user.
=:=:;: O8&)80&4 (1 +2& 6$+$,$'& &%+0+0&'
(he database is based on the following tablesentities which were produced indicating the
description, data type and si@e of the field of the data to be used in the program.
=:=:;:; C(%6"*+ &%+0+.
1I8ED N+*8 D+(+ (H-8 D8SCRI-(I<N
StaffId (e6tcharacter Staff Identification number
Name (e6tcharacter Name of Staff
Conduct (e6tcharacter Conduct at hand
Comment (e6tcharacter +ny other comment
+ction (e6tcharacter +ction ta.en on staff
T$,3& 6@ '2(40%- *(%6"*+ &%+0+. 9$)+0*"3$)'
(his stores all employeestaff conduct information. N1( Consult Company data entered
from the conduct interface form is logically stored in the database table Conduct.
=:=:;:= E#93(.&& U9-)$6& &%+0+.
1I8ED N+*8 D+(+ (H-8 D8SCRI-(I<N
666)i
StaffId (e6t Staff identification number
Name (e6t Name of staff
Department (e6t Surname
Designation (e6t Designation
Salary Currency Salary
New Department (e6t New department assigned
New Designation (e6t New designation
NewSalary Currency New salary
+llowance(ype (e6t (ype of allowance
+mount Currency +mount to be recei)ed
Deductions Currency Deductions
(otal Salary Currency (otal salary
T$,3& G@ '2(40%- E#93(.&& U9-)$6& &%+0+. 9$)+0*"3$)'
N1( Consult Company data entered from the 8mployee %pgrade interface form is
logically stored in the database table 8mployee %pgrade. (his stores data about the
employees and their respecti)e upgraded information.
=:=:;:> S+$11D$+$ &%+0+.
1I8ED N+*8 D+(+ (H-8 D8SCRI-(I<N
StaffId (e6t Staff identification number
666)ii
Name (e6t Name of staff
Se6 (e6t Se6
*arital Status (e6t *arital status
Date<fBirth Date(ime Date of birth
Date<f8mployment Date(ime Date employed
Iualification (e6t Iualification at hand
Department (e6t Department assigned
HearsInSer)ice Number Hears of ser)ice
Designation (e6t ,ob designation
Ee)el Number ,ob le)el
Category (e6t ,ob Category
Salary Currency Salary
Country (e6t Country of origin
District (e6t District of origin
Killage (e6t Killage
+ddress (e6t Staff address
-hone Number -hone number
T$,3& 8@ '2(40%- S+$11D$+$ &%+0+. 9$)+0*"3$)'
(his database table stores data regarding staff details for the company. (he primary .ey is
StaffId representing a specific staff. <ther fields are illustrated in the table below.
=:=:;:6 R&+0)&#&%+ &%+0+.
1I8ED N+*8 D+(+ (H-8 D8SCRI-(I<N
StaffId (e6t Staff identification number
Name (e6t Name of staff
+ge Number +ge
CurrentSalary Currency Current salary
Hear<fRetirement Date(ime Date of retirement
HearsInSer)ice Number Hears in ser)ice
666)iii
Retirement-ac.age (e6t Retirement pac.age
T$,3& H@ '2(40%- )&+0)&#&%+ &%+0+. 9$)+0*"3$)'
(his database table stores information regarding staff retirement details entered from the
retirement interface form for the company. (he primary .ey is StaffId representing a
specific staff. <ther fields are illustrated in the table below.
=:=:;:G S",#0+ &%+0+.
F0-")& >@ '2(40%- S",#0+ &%+0+. 9$)+0*"3$)'
666i6
1igure 7 abo)e refers to the database table that stores information regarding employee
applications for a specific /ob re;uired entered from the submit user interface. +ll
necessary data re;uired from a new person see.ing recruitment in a company is stored in
this entity.
=:=:;:8 R&3$+0(%'209'
(o properly maintain the integrity of data and facilitate the process of wor.ing with other
ob/ects in the database, relationships among the table were created. (his was
accomplished using the relationship windows as shown below.
F0-")& 6@ '2(40%- +2& E%+0+. R&3$+0(%'209 D0$-)$# 1() +2& 6$+$,$'&
6l
6li
=:=:= U'&) I%+&)1$*&'
(his part of the system de)elopment lifecycle was concerned with the actual construction
of the proposed designed system. (he system was designed using Kisual basic and
connected to a *icrosoft +ccess 3""5 database. +fter the system has loaded, it pro)ides
the login interface where an authori@ed user accesses other interfaces pro)ided the user
was authenticated.
F0-")& G' '2(40%- $ 3(-0% 1()# 1() '.'+&# $"+2&%+0*$+0(%
(he +dministrator in this case logs in as the system user with a username and password
to access the system menu.
6lii
=:=:> I%9"+ 0#93&#&%+$+0(%
<ther interfaces that enable day today tas.s to be run are shown as follows'
=:=:>:1 C(%6"*+ 1()#
F0-")& 8@ '2(40%- '+"6&%+' 1()#
(his interface allows users to input staff conducts information that is stored in the
database.
6liii
=:=:>: E#93(.&& U9-)$6& 1()#
F0-")& H@ '2(40%- E#93(.&& U9-)$6& 1()#
(his interface allows users to input employee upgrade information that is stored in the
database.
6li)
=:=:>:; S+$11 D$+$ 1()#
F0-")& 10@ '2(40%- 9$.#&%+ 1()#
(his interface allows users to manipulate staff information that is stored in the database.
6l)
=:=:>:= R&+0)&#&%+ 1()#
F0-")& 11@ '2(40%- R&+0)&#&%+ 1()#
(he retirement form interface is used to manipulate staff retirement information that is
stored in the database.
=:> S(1+4$)& +&'+0%-
(his stage was carried out to chec. whether what was done wor.ed efficiently and
effecti)ely as it was planned. It too. the forms belowC
=:>:1U%0+ +&'+0%-
Bere the components were reali@ed as programs =test plans> and prepared test data, the
path has a number of test runs li.e )alid paths through out the programs. + list of
conditions is tested for each program to determine their correctness, the forms obser)ed
in the system were chec.ed against these test plans and conditions as well as the data
base sub/ect to the enforced rules.
6l)i
=:>: S.'+&# +&'+0%-
(his is a testing of the whole system by integrating all the modules. It in)ol)es'
G)$920*$3 "'&) 0%+&)1$*& +&'+0%- L (hroughout the system design, interfaces were
designed and they met written specifications of the system. (he product4s graphical user
interfaces where tested by allowing company administrators to mo)e through the run
graphical user interfaces in form of clic.ing )arious interface ob/ects li.e combo bo6es.
P&)1()#$%*& +&'+0%- ? that is how long the system ta.es to respond to a user4s re;uest.
(he system application was run on company computers and generally the rate at which it
loads was tested =speed> in addition to system data )alidation and user security
authentication.
V(3"#& +&'+0%- ? In)ol)ed chec.ing whether the system can handle the e6pected load.
Sample N1( Consult Company users where allowed to feed in test data in the system.
(he system uses a *icrosoft access database that can handle up to ma6imum 3 0B si@e
per access database which is good for the company.
A**&9+$%*& +&'+0%- / (he operational users chec.ed if the system met what was stated in
the specification document, the test data was replaced with actual data pro)ided by the
clientele. 1atal errors were disco)ered for e6ample when users entered unsupported
operators and data of different types in sections where they weren4t needed. Bere the
system should be wor.ed on to accept )alid data in respecti)e data fields. (he system
should return system errors in case the wrong type of data is entered warning the user.
0enerally, the system met customer e6pectation.


6l)ii
CHAPTER FIVE
RECOMMENDATIONS AND CONCLUSIONS
>:0 I%+)(6"*+0(%
(his chapter concludes the report and it outlined recommendations on how to use the
system in addition to conclusion of the pro/ect report.
>:1 R&*(##&%6$+0(%'
In future user re;uirements should ta.e a more central consideration. %sers should be
trained on how to use and customi@e the system proposed by the researcher in order to
facilitate the company4s recruitment procedures.
It was also recommended that incase the company needs to further upgrade the system to
fully optimi@e it to the company satisfaction and enhance more functionality,
rede)elopment using other robust programming tools would be used.
>: C(%*3"'0(%'
1inally, the study has not been easy at all. (he researcher has ac;uired s.ills in pro/ect
management and at least can ma.e claims of ha)ing a minimal e6perience designing
database systems and graphical user interfaces. (his system is fully recruitment based and
thus customi@ed for all users within human resource departments of companies.
6l)iii
APPENDICES
APPENDII A
A E"&'+0(%%$0)& $%'4&)&6 ,. )&*)"0+#&%+ 9)(#(+&)'
D&$) )&'9(%6&%+,
I .indly re;uest you to fill this ;uestionnaire below to facilitate the research study to a
success and helpful to the company.
-lease feel free and gi)e the important information as re;uired to ma.e the pro/ect
feasible.
Hour information will be treated and .ept with a lot of confidentiality, great care and will
be highly appreciated.
M"*2 )&-$)6'' =please tic. where appropriate>
!> Hour occupation
Director
*anager
8mployee
Clientele
<thers
3> +ge brac.et
!7 L 3" , 3" L 37 , 37 L 5" , 5" and abo)e
0ender
*ale
1emale
5> Ba)e you e)er been strained on how to recruit employees beforeD
Hes
No
6li6
If yes, which specific
areaD....................................................................................................................................
2> Is your recruitment running as plannedD
Hes No
7> +re there reasons for poor recruitment specificationD
Strongly agree
+gree
Neutral
Disagree
Strongly disagree
#> +re there reasons for unrealistic timescalesD
Strongly agree
+gree
Neutral
Disagree
Strongly disagree
:> +re there reasons for poor condition of acti)itiesD
Strongly agree
+gree
Neutral
Disagree
Strongly disagree
$> +re there technological problems in the company regarding recruitmentD
Strongly agree
+gree
Neutral
Disagree
Strongly disagree
l
-lease state any if they e6ist'
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
9> Ahat are the problems related to the handling of your recruitmentD
1ailure to handle user e6pectations
1ailure to handle the change re;uired
Inappropriate staff
1ailure to handle people4s relationship in the recruitment
!"> +re the recruitment conditions too hard for your companyD
Hes No
If yes, howD
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
!!> Is your recruitment paying the re;uirement as agreedD
+lways
1re;uently
Sometimes
Ne)er
!3> Is need from a consultancy firm re;uiredD
Hes No
If yes, what .ind of assistanceD
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
!5> Is there need to integrate a computeri@ed recruitment system other than the e6isting
systemD
Strongly agree
+gree
Neutral
Disagree
Strongly disagree
Hour support is highly appreciated.
(han.s.
li
APPENDII B
A '$#93& NFT C(%'"3+ 0%+&)80&4 E"&'+0(%' 1() 60)&*+() $%6 #$%$-&)
I%+&)80&4 G"06& 1() 5%(43&6-& $*E"0'0+0(%
8stablishing whether N1( Consult would be comfortable with change of old to
new system or needs no change of system.
Determine the minds of employees towards the new system to be implemented.
Determine the s.ill of computer use among the employees in the recruitment
sector.
8stablish the security of records pro)ided by the system currently used by the
company.
Is communication a .ey while recruitment procedures are handledD
Bow does the management carry out its management acti)ities regarding
employee recruitmentD
Bow many employees does the company ha)e and how does it maintain their
recordsD
Isn4t there a route of hiring the wrong personnel within the companyD
(han.s.
lii
APPENDII C
S$#93& '*)&&%'2(+'
W&3*(#& '*)&&%
(his is the form where that welcomes users to the N1( Consult System lin.ing them to
different tas.s of the system.
F0-")& 1@ '2(40%- +2& 4&3*(#& '*)&&% +( NFT C(%'"3+ '.'+&#
liii
F0-")& 1;@ '2(40%- $ 1()# 1() <(, '&3&*+0(%
F0-")& 1=@ '2(40%- $ 1()# 1() *(%+$*+' *(33&*+0(%
li)
F0-")& 1>@ '2(40%- $ 1()# 1() '",#0++0%- <(, '9&*010* 0%1()#$+0(%
l)
F0-")& 16@ '2(40%- #$0% #&%" +( +2& '.'+&#
l)i
F0-")& 1G@ R&9()+ 1() G&%&)$3 )&*)"0+#&%+ 0%1()#$+0(% '",#0++&6
l)ii
R&1&)&%*&
!. Eary Eong and Nancy Eong. =!9$#>. Computers $
th
8dition.
3. C. Aest Churchman. =!9:!> (he Design of In;uiring Systems' Basic Concepts of
Systems and <rgani@ation. Basic Boo.s, New Hor., SBN 2#7?"!#"$?!
5. +ngelo S. DeNisi and Ric.y A. 0riffin. =3"":>. Buman Resource *anagement.
2. ,ohn *. I)ance)ich. =3""!>. Buman Resource *anagement $
th
8dition.
7. Kenneth C. Eaudon and ,ane -. Eaudon. =3""">. *anagement Information
Systems #th 8dition, -rentice?Ball International.
#. Sarah 8. Butchinson and Stancey C. Sawyer. =3""">. Computers Communications
Information, *c0raw Bill Irwin -ublishers.
:. Ailliam Sawyer Butchinson. =!999>. %sing information technology, a practical
introduction to computer and communication.
$. http'en.wi.ipedia.orgwi.iDatabaseMmanagementMsystem
9. http'en.wi.ipedia.orgwi.iSystemsMdesign
!". http'en.wi.ipedia.orgwi.iAebMapplication
END
l)iii

Вам также может понравиться