Professional Documents
Culture Documents
N5 Insurance Managment System Final Project N5 Revised1
N5 Insurance Managment System Final Project N5 Revised1
By
Name ID No.
1. Biruk Fisseha UU71554R
2. Abenezer Mesfin UU70276R
3. Amanuel Girma UU70282R
4. Eyob Awoke UU71819R
5. Melaku Abebe UU65225R
6. Haileeyesus Elias UU71530R
September 1 2021
Insurance Management System
Final project document
By
Name ID No.
1. Biruk Fisseha UU71554R
2. Abenezer Mesfin UU70276R
3. Amanuel Girma UU70282R
4. Eyob Awoke UU71819R
5. Melaku Abebe UU65225R
6. Haileeyesus Elias UU71530R
Our system is web and app-based Insurant management system, that will help to facilitate the overall service
that is given by insurance companies. This digital insurance management system can be used for both the
insurance companies and clients. Our system enables clients to register and manage their profile either from
their pc or mobile phone.
Insurance management system project is implemented in html php css and python platform using flutter as backend
application. Main aim of this project is to develop an online application for insurance company to atomize work
procedure, using this system both the insurance company and clients will get a smooth environment for their needs
and services.
In existing system manual procedure is followed where records are used to maintain data which is a time taking
process and require more man power and calculating commissions dues etc. are done manually.
In present system there is no need of a full-time human interference, humans are needed partially. Total work is done
using management system except first time registration which will save time and less paper work and even human
resource.
Acknowledgement
First and for most, we would like to express my special and heartfelt gratitude to God for allowing us to be a part of
this graduating class and be able to present our work. We would like to express our deep gratitude for our advisors, Fikru
Amanuel, for their unreserved support on the development of this project. We would like to also acknowledge our families
for their continuous support that enabled us to work diligently and without fail. We would like to acknowledge our school
mates and friends who helped us in their own ways.
List of Tables
Table 1.7: schedule ---------------------------------------------------------------------------------------8
Table 2.3.2: Material planning Equipment and S.W Financial Plan ---------------------------19
Table 2.3.3: Software Requirements -------------------------- ----------------------------------------19
Table 2.3.4: Services -----------------------------------------------------------------------------------20
Figure 3.4.1.1: Use Case Diagram for the New System ------------------------------------------------------ 42
List of abbreviation…………………………………………………………………………………………………………………………………………………………115
Chapter 1 - Introduction
1.1 Background Information
The theory of insuring an item that is possessed has always been engraved in society. Since before roman
time “law recognized the insurance contract in which an article of agreement was drawn up and funds were
deposited with a money changer…” This practice then stemmed throughout time and diversified its reach to
encompass a multitude of sectors. From Ancient Rome to England, the United States and many more the
forming of contractual agreement to insure goods, products and property is still practiced to this day.
The goal of insurance management is the objective of insurance is to financially guard against
unpredictable life occurrences. In short, when you buy an insurance policy, you make monthly payments, called
premiums, to purchase protection from monetary repercussions related to things like accidents, illness or even
death.” The business aspect of insurance management takes into consideration the loss from insuring and works
on building assets in other companies.
The history of insurance management in Ethiopia stems from the first insurance company in Ethiopia
called The Imperial Insurance Company (1). ‘’The emergence of insurance business in Ethiopia was closely
linked to expatriates and foreign insurance companies Those foreign insurance companies were operating in
the country thought their agents. In addition, expatriates and foreign companies operating in Ethiopia
Participated actively in establishment of the first domestic insurance company.” (1)
The insurance management industry has changed over time and in this day of technological advancement,
the changes that have been introduced the beginning has since are night and day. With the same business model
in mind, insurance companies generate revenue in two ways: Charging premiums in exchange for insurance
coverage, then reinvesting those premiums into other interest-generating assets”, and with the development of
technology, considering moor’s law which “is the observation that the number of transistors in a dense
integrated circuit (IC) doubles about every two years. Moore's law is an observation and projection of a
historical trend. Rather than a law of physics, it is an empirical relationship linked to gains from experience in
production”, the ability to connect and commercialize connectivity has only become more efficient and diverse.
Due to this development, the business of management, specifically insurance management has become a
thriving business. (2)
The efficiencies due to technological development and availability introduced a new wave of possibilities
that can be exploited for the benefit of any company that decides to embrace the new path towards profit. In
the Ethiopian market, there are improvements that can be made available in accordance to the law and norms
1|Page
of the businesses at work in Ethiopia at this moment. To this end the goal of this proposal is to develop the
infrastructure of the business activities from the perspective of the consumer and the clerk for the best and
most efficient use of the advantages acquired from the technological advancement of the day.
This system was designed with the intent of presenting a welcoming figure to show that the organization
can be trusted. That the possessions of the customer are being insured by a trust worthy body; so, to speak.
The problem lies with the inefficient use of the technology available today. Our team will use this to our
advantage to develop and deploy a system that will be presentable, reliable and efficient.
1.3 Objectives
1.3.1 General Objective
General objective of the project is to design and implement Digital Insurance management system
1.3.2 Specific Objectives
Developing a graphical user interface for the use of clerks in their work
• For connecting to a server that will manage the registered users in terms of new
registrations, already registered users and canceling of registration.
• For managing the subscriptions of the users in regards to status, premium values, and
renewals h. For managing pre-registrations for inspection
2|Page
insurances available at the company. To accommodate these, we will be developing a graphical user interface
as a front end with Java and Firebase as a primary database and SQL as a backup database in the back end for
the management body of the company. The client will be able to use a website and mobile application
developed for Android and IOS for their convenience. The team will not be developing a method of payment
for the clients purchases. The available payment methods, which are through direct deposit at a bank or direct
payment at the clerk’s desk of the company.
1. Interviews: will allow us to gauge the day-to-day processes that take place with the regards to the
working environment of an insurance company.
2. Observations: will allow us to understand the flow of information from the customer to the clerk
and the direct correspondence.
From these we can deduce the information that is required from the customer, understand the requirement
of the clerk in the management of his duties, study the market of insurance in regards to focusing our attention
to the vital
aspects of said company.
Object-oriented (O-O) analysis and design is an approach that is intended to facilitate the development of systems that must
change rapidly in response to dynamic business environments what object-oriented systems analysis and design is, how it
differs from the structured approach of the SDLC, and when it may be appropriate to use an object-oriented approach.
3|Page
Object-oriented techniques are thought to work well in situations in which complicated information systems are undergoing
continuous maintenance, adaptation, and redesign. Object-oriented approaches use the industry standard for modeling object-
oriented systems, called the unified modeling language (UML), to break down a system into a use case model.
Object-oriented programming differs from traditional procedural programming by examining objects that are part of a
system. Each object is a computer representation of some actual thing or event. Objects may be customers, items, orders, and
so on. Objects are represented by and grouped into classes that are optimal for reuse and maintainability. A class defines the
set of shared attributes and behaviors found in each object in the class.
The phases in UML are similar to those in the SDLC. Since those two methods share rigid and exacting modeling, they
happen in a slower, more deliberate pace than the phases of agile modeling. The analyst goes through problem and
identification phases, an analysis phase, and a design phase as shown in the figure below. Although much of the specifics are
discussed in Chapters 2 and 10, the following steps give a brief description of the UML process.
4|Page
5. Begin systems design by modifying the UML diagrams. Then complete the specifications.
Systems design means modifying the existing system and that implies modifying the diagrams drawn in the
previous phase.
These diagrams can be used to derive classes, their attributes, and methods (methods are simply operations).
The analyst will need to write class specifications for each class including the attributes, methods, and their
descriptions. They will also develop methods specifications that detail the input and output requirements for the
method, along with a detailed description of the internal processing of the method.
6. Develop and document the system.
UML is, of course, a modeling language. An analyst may create wonderful models, but if the system isn’t
developed there is not much point in building models. Documentation is critical. The more complete the
information you provide the development team through documentation and UML diagrams, the faster the
development and the more solid the final production system.
WordPress (WP, WordPress.org) is a free and open-source content management system (CMS) written in PHP
and paired with a MySQL or MariaDB database. Features include a plugin architecture and a template system,
referred to within WordPress as Themes. WordPress was originally created as a blog-publishing system but has
evolved to support other web content types including more traditional mailing lists and forums, media galleries,
membership sites, learning management systems (LMS) and online stores. WordPress is used by more than
40.5% of the top 10 million websites as of March 2021, WordPress is one of the most popular content
management system solutions in use. WordPress has also been used for other application domains, such as
pervasive display systems (PDS). As it is a common thing in the world most of websites in the world uses html
and php at least once.
It is developed by Google and is used to build mobile, desktop, serve, and we applications. Dart is a n
object-oriented, class-based, garbage collected language with C-style syntax. Dart can compile to either native code
or JavaScript. It supports interfaces, abstract classes, reified generics and type interference.
Dart is the programming language used to code Flutter apps. Dart is another product by Google and released
version 2.1, before Flutter, in November. Dart is not only used for mobile app development but is a programming
language. Approved as a standard by ECMA (ECMA-408), it’s used to build just about anything on the web,
5|Page
servers, desktop and of course, mobile applications. Dart, when used in web applications, is transpired to
JavaScript so it runs on all web browsers. The Dart installation comes with a VM as well to run the .dart files
from a command-line interface. The Dart files used in Flutter apps are compiled and packaged into a binary file
(.apk or .ipa) and uploaded to app stores.
Firebase - Firebase is a platform developed by Google for creating mobile and web applications.
It was originally an independent company founded in 2011. In 2014, Google acquired the platform and
it is now their flagship offering for app development. The Firebase platform has 18 products split into three
groups: Develop, Quality, and Grow. Firebase Realtime Database
The Firebase Realtime Database is a cloud-hosted database. Data is stored as JSON and synchronized in
real time to every connected client. When you build cross-platform apps with our iOS, Android, and JavaScript
SDKs, all of your clients share one Realtime Database instance and automatically receive updates with the
newest data.
• Realtime: Instead of typical HTTP requests, the Firebase Realtime Database uses data
synchronization— every time data changes, any connected device receives that update within
milliseconds. Provide collaborative and immersive experiences without thinking about
networking code.
• Offline: Firebase apps remain responsive even when offline because the Firebase Realtime
Database SDK persists your data to disk. Once connectivity is reestablished, the client device
receives any changes it missed, synchronizing it with the current server state.
6|Page
• Accessible from client devices: The Firebase Realtime Database can be accessed directly from
a mobile device or web browser; there’s no need for an application server. Security and data
validation are available through the Firebase Realtime Database Security Rules, expression-
based rules that are executed when data is read or written.
• Scale across multiple databases: With Firebase Realtime Database on the Blaze pricing plan,
you can support your app's data needs at scale by splitting your data across multiple database
instances in the same Firebase project. Streamline authentication with Firebase Authentication
on your project and authenticate users across your database instances. Control access to the data
in each database with custom Firebase Realtime Database Rules for each database instance.
SQL SERVER
SQL server is a client/server relational database management system (RDBMS) that uses transact-SQL
to send request between a client and SQL server. SQL server can work with thousands of client application
simultaneously. The server has features to prevent the logical problems that occur if a user tries to read or
modify data currently being used by others. While SQL server is designed to work as a server in a client/server
network. It is also capable of working as a standalone database directly on the client. The scalability and ease
of-use features of SQL server allows it to work efficiently on a client without consuming numerous resources.
SQl server efficiently allocated the available resources, such as memory, network bandwidth and disk I/O,
among the multiple users.
Visio
Microsoft Visio (formerly Microsoft Office Visio) is a diagramming and vector graphics application and
is part of the Microsoft Office family. The product was first introduced in 1992, made by the Shapeware
Corporation. It was acquired by Microsoft in 2000.
1.6 Beneficiaries
The beneficiaries of this project include but not limited to insurance companies, managers, clerks, and
customers of the insurance industry. Companies that is willing and able to expand into this technological
advancement are able to with a few modifications to their work structure.
7|Page
1.7 Schedule
Schedule
8|Page
Chapter 2 - Project Management
2.1 Introduction
A project is temporary in that it has a defined beginning and end in time, and therefore defined scope
and resources. And a project is unique in that it is not a routine operation, but a specific set of operations
designed to accomplish a singular goal. So a project team often includes people who don’t usually work
together – sometimes from different organizations and across multiple geographies. The development of
software for an improved business process, the construction of a building or bridge, the relief effort after a
natural disaster, the expansion of sales into a new geographic market — all are projects. And all must be
expertly managed to deliver the on-time, on-budget results, learning and integration that organizations need.
Project management, then, is the application of knowledge, skills, tools, and techniques to project activities
to meet the project requirements. Project management processes fall into five groups initiating, planning,
executing, monitoring, controlling, and closing. Project management knowledge draws on ten areas
integration, scope, time, cost, quality, procurement, human resources, communications, risk management,
stakeholder management. Project management is the process of leading the work of a team to achieve goals
and meet success criteria at a specified time. The primary challenge of project management is to achieve all
of the project goals within the given constraints. This information is usually described in project
documentation, created at the beginning of the development process. The primary constraints are scope,
time, budget. The secondary challenge is to optimize the allocation of necessary inputs and apply them to
meet pre-defined objectives.
The objective of project management is to produce a complete project which complies with the client's
objectives. In many cases the objective of project management is also to shape or reform the client's brief to
feasibly address the client's objectives. Once the client's objectives are clearly established, they should
influence all decisions made by other people involved in the project – for example project managers,
designers, contractors and subcontractors. Ill-defined or too tightly prescribed project management
objectives are detrimental to decision making.
A project is a temporary endeavor designed to produce a unique product, service, or result with a defined
beginning and end (usually time-constrained, and often constrained by funding or staffing) undertaken to
meet unique goals and objectives, typically to bring about beneficial change or added value. The temporary
9|Page
nature of projects stands in contrast with business as usual (or operations), which are repetitive, permanent,
or semipermanent functional activities to produce products or services. In practice, the management of such
distinct production approaches requires the development of distinct technical skills and management
strategies. All management is concerned with these, of course. But project management brings a unique
focus shaped by the goals, resources and schedule of each project. The value of that focus is proved by the
rapid, worldwide growth of project management.
10 | P a g e
• 1.1.2.2.1 check on available insurance policies
• 1.1.2.2.2 check quotes on specific insurances
• 1.1.2.2.3 check status of insurance
• 1.2 Clerk/Manager
• 1.2.1 GUI
11 | P a g e
5 1.1.1.1.1 New registration Any new registrations for clients containing their
personal information.
5 1.1.1.1.2 Change account information Enables the changing of information about the
client
5 1.1.1.2.2 Check on Available insurance Enables clients to find out about the availability
policies of insurance policies
5 1.1.1.2.3 Check on quotes on specific Enables clients to find out about the premiums of
insurances insurances with the client’s specific information
5 1.1.1.2.4 Check on status of insurance Enables clients to view their insurance purchases
to check for validity, and renewal times as well
as the purchased policy
12 | P a g e
5 1.1.2.1.1 New registration Any new registrations for clients containing
their personal information.
5 1.1.2.1.2 Change account information Enables the changing of information about the
client
5 1.1.2.2.1 Check on available insurance Enables clients to find out about the availability
policies of insurance policies
5 1.1.2.2.2 Check quotes on specific Enables clients to find out about the premiums
insurances of insurances with the client’s specific
information
5 1.2.1.1.2 Delete client information Delete the account and information about the
client
5 1.2.1.1.3 Review client information Review the account and information about the
client
13 | P a g e
5 1.2.1.1.4 Change client information Change the account and information about the
client
5 1.2.1.2.1 Receive and validate insurance Review and confirm the validity of any
applications information applied to the company by the
client
5 1.2.1.2.2 Renew client Purchases Renew the purchases of the client with any
updates on premiums.
5 1.2.1.2.3 Verify purchase documents Review and confirm the validity of any
purchases made by the client
5 1.2.1.2.4 Check available insurance Enables management body to find out about the
policies availability of insurance policies
5 1.2.1.2.5 Check available quotes on Enables management body to find out about the
insurances premiums of insurances with the client’s
specific information
14 | P a g e
Weeks Week 1 Week 2 Week 3 Week 4
Months
1st Introduction of Understanding Requirement Study of Project related website and
Month Definition – Project Definition – Gathering– collecting related Da
All Team members All Team members All Team members – All Team member
2nd Analysis of Website, Dart and Website, dart, and Layout designing
Month project SQL SQLcontrols, design - Haileyesus El
requirements – All fundamentals development - Biruk Fisseha
Team members learning – All learning
Team members – All Team members
3rd Data Flow diagram Activity Use-case diagram Class diagram preparation
Month preparation diagram preparation - Eyob Awoke
- Eyob Awoke preparation - - Eyob Awoke - Abenezer
- Abenezer Eyob - Abenezer Mesfin
Mesfin Awoke Mesfin
- Melaku Abebe - Abenezer - Melaku Abebe
- Amanuel Mesfin
Girma - Amanuel Girma
4th Data dictionary object oriented State transition Project GUI preparation
Month preparation diagram preparation diagram -Biruk Fisseha
- Biruk Fisseha - Biruk Fisseha - Biruk Fisseha -Eyob Awoke
- Eyob Awoke - Eyob Awoke - Eyob Awoke -Haileyesus Eli
15 | P a g e
2.2.1: work breakdown structure (WBS)
16 | P a g e
2.3 Resource Planning
Resource planning is the major foundational infrastructure for a efficient and successful project.
The resources used consist of human resources and material resources, each individually important but
bring about a better outcome together.
17 | P a g e
Website 2 • BSc. In Computer Science • Identifying coding errors and
Developer • Proficient in JavaScript, CSS, fixing them
Firebase, WordPress, HTML,
• Develop a website in
MySQL accordance to the project
deliverables
System Tester 2 • Knowledge of System Testing • Test and find bugs in the
scope of testing criteria
Total 7
Professionals
18 | P a g e
2.3.2 Material Planning, Equipment, and Software Financial Plan
Hardware Requirements
Item Quantity Specification | Minimum Requirements Justification
19 | P a g e
MySQL or Oracle MySQL 8.0 or Oracle 18c. Database management
20 | P a g e
System tester 2 2 2,500 5,000
TOTAL 7 40 489,000
NetBeans 4 - - -
TOTAL 25 26,200 2,110 196,670
Total 686,570
21 | P a g e
manager in self managing teams determines the overall purpose or goal of the team, the team is at
liberty to manage the methods by which to achieve that goal. This can cause conflict with people whose
career path expectations include a promotion, which may not be available within the organization due
to its flat structure. However, alternative "horizontal" career paths may be available, such as
developing greater expertise in a role or mastery of a craft, and/or receiving pay raises for loyalty.
An absence of middle managers does not preclude the adoption and retention of mandatory work
procedures, including quality assurance procedures. However, due to the fact that significant
responsibilities are given to the team members themselves, if a team collectively arrives at the view
that the procedures it is following are outdated, or could be improved, it may be able to change them.
Such changes may, in some cases, require the approval of executive management and/or customers
(consider, for example, a digital agency producing bespoke websites for corporate clients). If executive
management is not involved in the decision, or merely rubberstamps it, this might be an example of
consensus decision-making or workplace democracy at the level of a team - or group of teams, if
multiple teams are involved in the decision.
This structure is generally possible only in smaller organizations or individual units within larger
organizations. Having reached a critical size, organizations can retain a streamlined structure but
cannot keep a completely flat manager-to-staff relationship without affecting productivity. Certain
financial responsibilities may also require a more conventional structure. A company would not have
to give a raise or promotion, based on service length but on greater productivity. Also eliminating
certain departments from the payroll means saving money. Some companies theorize that flat
organizations become more traditionally hierarchical when they begin to be geared towards
productivity. The flat organization model promotes employee involvement through decentralized
decision-making processes. By elevating the level of responsibility of baseline employees and
eliminating layers of middle management, comments and feedback reach all personnel involved in
decisions more quickly. Expected response to customer feedback becomes more rapid.
22 | P a g e
phases. Each phase is designed for performing specific activity during the SDLC phase. Our project
will use waterfall process model. We choose this process model because all the work will be done
sequentially providing clear view of work completed while keeping track of dependencies. It also
simplifies control over the project since it requires clear milestone to be defined at the end of each
phase, so progress and success can also be checked comparing the stated milestone with our
deliverables. To explain more directly from our project perspective the reason behind why we choose
waterfall process model is because of our project Requirements. Requirements in our project are not
changing frequently and we decide to do our project by this way “Before the next phase of
development, each phase must be completed”.
Software process models often represent a networked sequence of activities, objects,
transformations, and events that embody strategies for accomplishing software evolution. Such models
can be used to develop more precise and formalized descriptions of software life cycle activities.
23 | P a g e
Mitigation Plan • Strictly follow a schedule and highly minimize resource
loose.
Contingency Plan
• Raising new fund for purchasing loose resource
R3 Unexpected project scope Schedule Low Critical
expansion.
Mitigation Plan • Limit the functional and geographic scope of the project.
Contingency Plan
• Redefine the scope or adjust if we can
R4 Inaccurate budget Budget Medium Critical
estimation.
Mitigation Plan • Study the current market and adjust the budget when
a new change is appearing.
24 | P a g e
Contingency Plan • Negotiate with customer and adjust the project fund
R6 Currency fluctuation Budget High Critical
Mitigation Plan • Giving Priority for issues that require more attention
25 | P a g e
Monitoring Plan • Update the priority of activities
Contingency Plan
• Allocate resource to address changes that need
priority
Monitoring Plan
• Prepare team member meeting schedule and follow it
Contingency Plan
• Replace team leader with mature leadership
Mitigation Plan
• creating a good data recovery
Monitoring Plan • recording data management problems
Contingency Plan • Creating a manageable and easily accessible data
storage.
• having a backup.
26 | P a g e
Monitoring Plan • Allocate resource to address changes that need priority
Contingency Plan • Update the resource plan and rise additional fund for
resource purchase
Mitigation Plan
• keeping system up to date.
Monitoring Plan
• Regularly repairing parts of the system and design.
Contingency Plan • having a backup machine. For example, a backup
server.
27 | P a g e
Monitoring Plan • Study and identify policy and regulations that affect our
project and prepare resolution method
Contingency Plan
• experimenting with ways of generating revenue.
R17 Global pandemic Programmatic low Low
Mitigation Plan
• by adapting to the demand of the circumstance.
Monitoring Plan
• Prepare and Save extra budget
Contingency Plan • Ask the customer to invest additionally
• Find sponsors or loan
Budget Risk: is the potential for the estimates or assumptions built into a budget to turn out to be inaccurate.
28 | P a g e
- Inaccurate budget estimation.
- Project scope expansion. - Currency fluctuation.
Operational Risk: is the risk of loss from inadequate or failed internal processes.
Technical Risk: is the risk associated with the failure of the design or the function of the system.
Programmatic Risk: is risk associated with action or inaction from outside the control of the program. This are beyond
the limits of the program.
29 | P a g e
Chapter 3 - System Analysis
3.1 Introduction
Insurance development always follows the changes takes place in the political, technological,
legal, economic and social aspects of the society. All changes have significant impact on its
development. (3)
World Vision Ethiopia (2014) stipulated the Ethiopian financial sector in the rural area consists
of formal, semi-formal and informal financial service providers. Formal providers include commercial
banks and MFIs while semi-formal providers are saving and credit cooperatives. (3) Informal providers
consist of social groups that provide savings and lending functions, private money lenders, friends and
relatives as well as trade partners. Modern institutionalized financial service provision in Ethiopia has
very short history. For long the people had been getting financial services through informal means,
Iqqubs, Iddirs and Mahbers are classic examples of informal financial service providers in which
people joined neighborhood or affinity group in order to save and access borrowings through a pool of
funds and to cover emergent needs of finance. Even though their role in the urban areas is declining
such institutions have pivotal role in the life of rural community. Axco (2017) reported that insurance
in its modern form was first started in Ethiopia as far back as 1905 when the bank of Abyssinia which
was owned by the bank of Egypt began to transact insurance as an agent of a foreign insurance
company began to underwrite fire and marine insurance policy. In 1923, the Swiss insurer Balois set
up a Branch office in Addis Ababa and soon followed by other foreign companies working on an
agency basis. During the Italian occupation from 1936 to 1941 only Italian insurance companies
operated in the country. When Italians left, insurance companies from other European countries are
restarted to operate insurance activities in Ethiopia. Belay (2001) described that as per the survey
conducted in 1954 by the Ministry of Commerce and Industry, Insurance activities was being taking
out by 18 foreign insurance companies’ branches or agents and one domestic insurance company called
Imperial Insurance established in 1951. The insurance market was governed like any commercial
30 | P a g e
goods and a service by Civil Code 1960 from the year1950s up to 1960s insurance companies has
increased to 33. The numbers of local companies were established reaching a total of 13 in number.
Belay (2001) further, asserts that due to mal practice of the insurance companies, for the second time
other study was conducted by the Addis Ababa Chamber of Commerce in 1967. The study found that
there were 306 foreign insurance branches and agents and 10 domestic companies in Ethiopia. (1) Still,
it was administered by the provision of Ethiopian commercial code, 1960 except the marine insurance
by marine code of Ethiopia. The minimum capital requirement was 12,500
Ethiopian dollars. In 1970 promulgation of proclamation no 281/1970 was issued to control
and regulate the insurance business in Ethiopia. It was peculiar in that it created an Insurance Council
and an Insurance. (1)
Controller’s office to ensure the soundness of the sector. Hailmichael (2011) also disclosed that
insurance market in Ethiopia was not regulated until 1960.The first proclamation was enacted in 1970
as a result of which foreign companies were prohibited directly or indirectly from transacting insurance
business in Ethiopia based on this some companies converted to domestic companies in line with the
requirement of the law. Surprisingly, some of the nationalized companies were accepting business
from other foreign countries, accepted business from Australia and was liable to pay its share of the
famous Darwin Claims.
Pursuant to the proclamation of 1970, regulation number 383/1971 was issued by the Ministry
of Commerce, Trade and Tourism on matters which help to create conductive insurance market. The
controller of insurance license for 15 domestic insurance companies, 36 agents, 7 brokers, 3 actuaries
and 11 assessors has been licensed in accordance with the provision of the proclamation immediately in
the year after the issuance of the law (Hailu, 2007). (1)
In 1975 all insurers were nationalized by the communist government and the Ethiopian insurance
corporation (EIC) was formed and the communist government was overthrown in 1991. In 1994 new
monetary and banking proclamation no 83/1994 was issued to supervise banks and insurance but
allowed for local insurers only. Axco (2017) described the communist government was overthrown in
1991and in 1994 legislation allows private insurance companies to be formed and compete with state
owned Ethiopian Insurance
31 | P a g e
Corporation, but foreign shareholders were barred. The logic behind the prohibition was that
the local industry was weak and needed time to build up its capital reserves; rapid opening of the
market would expose Ethiopian companies to domination by financially much stronger foreign
insurers. The most recent legal basis for the insurance industry in Ethiopia is proclamation number
746/2012, which was issued on 22 August, 2012 and directive SIB/34/2013 issued to set up a
Supervisory organ for Insurance Business and come in to force affective from 15 April, 2013. Hence
minimum paid up capital requirement become to birr 60 million for non-life and 15 million for life and
75 million for both Life and Nonlife for insurers. And local insurers are required with minimum
subscribed capital requirement of birr 2 billion of which 50% of the subscribed is paid up capital. The
local Reinsurance establishment directive no SIB/44/2016 issued by the national bank of Ethiopia
(Belay, 2001).
In Ethiopia there are 17 insurance companies, 9 of them are composite insurance means
transacting both general insurance and long-term insurance). (1) out of the 17 insurance companies
one is state owned and 16 is private owned insurance companies, while eight of them are transacting
general insurance business. The total assets reached 11.3 billion, total capital reached 2.97 billion and
Gross premium 6.99 billion. The number of branch offices has reached 424 showing a 13% growth
over last year same period. Moreover, over 1,950 insurance sales agents, 53 insurance brokers, 97 loss
assessors and two surveyors are operating in the market. There are two reinsurance companies in
Ethiopia these are Africa-Re and Ethion-Re. Moreover, we are also micro insurance companies
established to provide to the low-level income societies. Micro insurance service is entitled to provide
by insurance companies and by micro finance banks (NBE, 2016).
As can be discussed EIC (2016) Strategic management report, 94.82% of Gross Written
premium is contributed from non-life insurance products. (4) The remaining 5.18% is contributed from
life insurance products. Out of 45 Non-life insurance products in the market 54.31% GWP is
contributed from Motor class of Business only. The remaining 40.51% GWP is contributed from the
remaining 44 non-life insurance products. In 2016, 2.61% and 4.21% of GWP is contributed from
workmen’s compensation and from Aviation class of Business respectively. Workmen’s compensation
is the lowest contribution to the production next to aviation .79.44% production is derived from 5 (five)
32 | P a g e
non-life (motor, marine, fire, W.C and aviation) products, 20.55% derived from other 50 (fifty) non-
Life products. As can be articulated in NBE (2016) retention ratio is 76% in non-life and 87% life this
means out of the total premium earned 76% is retained by the primary insurer 24% is ceded
(transferred) to reinsurance companies. Regarding life 87% is retained by primary insurer 23% is ceded
(transferred) to reinsurance companies. While an average loss ratio is 69% and 51% in non-life and
life insurance respectively.
The performance of insurance sector can be universally assessed with reference to two
parameters; insurance penetration and insurance density. Insurance penetration explains the growth of
premium with the growth of the gross domestic product in the economy. It is measured as ratio of
premium to GDP of premium with the growth. Insurance density is known as per capita premium and
measured as ratio of premium to total population. As evidence shows that 0.5% is the market
penetration; this is very low level as compared with Kenya market 3.5% market penetration, with 45
million populations. Increasing awareness is a condition precedent to penetration of insurance.
Distribution is the key development of insurance and achieving penetration. Increasing awareness is a
condition precedent to penetration of insurance. Distribution is the key development of insurance and
achieving penetration.
According to Africa-Re (2015) Africa’s insurance and reinsurance markets, with the exception
of South Africa, Namibia and Mauritius are likely to remain relatively underdeveloped for many years
to come, although are growing rapidly. (4) Sustainable economic growth has seen poverty reduce,
increasing the potential customer base for insurance. Nevertheless, even among Africa’s 18 largest
countries’ economy, poverty is still a major obstacle to a more rapid insurance market development.
In eight of these countries more than 10% of the population has to live on less than US$ 1 per day.
Currently there are nine African countries that have more registered mobile money accounts than bank
accounts according to Africa- re (2015) total premiums from the seven biggest markets (South
Africa, Morocco, Nigeria, Egypt, Kenya, Algeria and Angola) accounted for 90 % of Africa’s
insurance volume in 2013.In all African countries with the exception of South Africa, Namibia and
Mauritius, the non-life market is bigger than the life sector. According to Africa-Re, 2015, in the past
33 | P a g e
five years Nigeria and Kenya were by far the fastest growing insurance markets in Africa with annual
average growth rates well above 15%.
Out of the 18 largest African countries Ethiopia, Nigeria and Sudan are equally the lowest
insurance penetration level next to DR Congo and Libya that is 0.5%, 0.4% and 0.3% respectively As
evidence shown in the above table 41.51% African insurance market penetration share level is
accounted to only one country which is South Africa and the remaining 58.49 % insurance penetration
share level is accounted to other seventeen largest
African countries. Out of the 18 largest African countries, 18% of insurance penetration level is
accounted to Eastern African (Tanzania (0.9%, Zambia (1.4%), Sudan (0.5%), Ethiopia (0.5%), Kenya
(3.1%) and Uganda (0.6%) countries.
Moreover, of the six largest eastern African countries the highest market penetration level is
Kenya that is 3.1% of GDP and the lowest penetration level is 0.5% of GDP Ethiopia and Sudan. In
other words 51.6% portion of the eastern African region penetration level is accounted to Kenya. The
remaining 48.4% portion of the insurance penetration level is to other five largest eastern African
countries. The African comparison of penetration level evidenced that the insurance penetration in
Ethiopia which stands at 0.5% this is highly below the African average of 1.8 % in 2012. Insurance
density in Ethiopia is the least next to DR Congo in the selected African countries (Africa-Re, 2015).
The same discussion on Africa-Re (2015) Ethiopia with GDP (USD 48bn), an average of 89
million population, with GDP/Capita (USD 542), insurance market penetration and insurance density
level, 0.5% and 3 in 2013, is positioned at a very low level as, compared with Kenya with GDP (USD$
45bbn) an average of 44 million populations with GDP/capita (USD 1’016). Insurance market
penetration and insurance density level 3.5% and 35 respectively. Besides of this, East African region
comparison of insurance penetration level showed that insurance penetration level in Ethiopia which
stands 0.5 % is well lower than the region’s average penetration level of 1.08%. In East African region
the lowest insurance penetration level 0.5% are registered in Ethiopia, Sudan, and Eritrea each. The
lowest insurance density registered in Uganda, Ethiopia and Eritrea as birr four, three, and three in
number respectively.
34 | P a g e
As it can be observed from the above historical development, after the market liberalization in
Ethiopia, the number of insurance companies have been growing, Nonlife insurance segment of the
market also growing. However, the insurance sector contribution to the Ethiopian economy and
insurance consumption per capita is very low. This low level of insurance penetration is caused partly
because of the insurance sector itself. This low level of the insurance consumption may also be caused
due to the lack of understanding by the policy makers, low level of insurance awareness, low level of
insurance product savings and investment are among the most critical factors that have affected the
market penetration of the insurance market.
35 | P a g e
pay the benefits at the end of the end of the selected term of years and at the same time making
the benefits available for his dependents if the assured died.
c) Term life, this type of life insurance product provides insurance coverage against death within
the specified period of time, the sum amount specified in the policy to the beneficiary, and
nothing being paid in case of survival.
d) An annuity, an annuity is a contract whereby the assured, receives a guaranteed income, usually
for the remainder of his life after retirement from his job. The main purpose of life annuity is
to provide a lifetime income that cannot be outlived to an individual.
General insurance
a) Fire insurance, this policy is designed to indemnify to the insured’s own buildings and their
contents (household goods and personal effects) with in this building against loss or damage
due to fire, lighting, thieves, escape of water from tanks or pipes, oil leakages from fixed
heating systems, storm, flood, riot, or malicious acts, explosion, impact by aircraft or vehicles
or animals, falling trees, subsidence and earth quake Downey (1991). The main object of fir
insurance is to reinstate or replace property damaged or destroyed or to compensate an insured
person for such person so that he is placed in the same financial position after a loss as he
occupied immodestly before it and the insured can be also compensated for the interruption of
business loss of profits due the specified risks if purchased for additional cover by paying
additional premium, the additional cover is called consequential loss.
b) Motor vehicle insurance: This policy has developed into an important form of contract arising
from its compulsory nature and increasing public demand for coverage .it provides indemnity
against loss of, or damage to or arising out of or in connection with the use of motor vehicle
including third party risks. The nature of the protection afforded here, permits development of
three different types of the motor insurance market as; third party only policy, third party, fire
and theft policy, and comprehensive. Third party covers limited amount only for damages for
third party persons and property only, if the insured is legally liable for that fault
Comprehensive, covers for third party damage and indemnified for own vehicle too. If the
36 | P a g e
purpose of the vehicle is uses for commercial purpose the cover can be extended for the cargo,
passengers if the motor vehicle is busses.
c) Marin and aviation insurance: this type of insurance the difference is transport on sea and on
air, similar risks are faced both for aviation transport and faced by marine transport. Therefore,
insurance product is developed to provide coverage for marine and aviation hull, container and
cargo against loss or damage due to the risks such as loss of ships, collision, and fire due to
internal and external perils specified in the specific policy.
d) Engineering Insurance: under engineering insurance includes property or business income
protection against physical damage by all risks of loss except for those specifically excluded,
cover for contractors’ plant and equipment of cover are contractors all risk (CAR), Erection all
risk (EAR) and machinery break down (MB) and Boilers& pressure plant. Engineering policies
can also cover industrial all risks such as a multiline package policy which can include fire,
marine and liability.
e) Liability insurance provides coverage for bodily injury or property damage arising out of the
insured’s ownership, maintenance, or use of the insured himself. There are different types of
liability insurance classifies depends on the nature of the business nature such as product
liability provides coverage any loss of third party or purchaser of the product due to the inherent
risk of the product. Professional liability insurance product can be covered any loss arises due
the professional negligence. Public liability insurance coverage to any public damage or injury
arises due the insured own property defect.
f) Surety policy (bond): insurance Bond is not an indemnity insurance it is contact of guarantee.
A main object of contract of guarantee is to enable a person to obtain an employment, or a loan,
or some goods or services on credit. Contract of guarantee is to perform the promise, or
discharge the liability, of third person in case of default. Bond insurances are mainly given to
cover frailer of contractual agreement made between two
or more parties. In surety there are three parties the surety or guarantor’ is the insurer and the
‘creditor’ is the contractor to whom the guarantee is given and the ‘principal debtor’ is the
37 | P a g e
principal who will be entitled to be compensated in case of the default of the performance of
the project.
38 | P a g e
a later time. The clerks and admins will have mandatory 2 factor authentication. This is
dependent on (a, b, and c).
f) System shall display all available insurances. The system will display the available
insurances for purchase as well as previously purchased insurances. The website and
application will directly send queries to the database and collect information regarding the
previously purchased insurances. The other information is on a static.
g) System shall allow client to request a quote. The client will be able to receive a quote on the
product they would like to insure. This will allow them the information regarding the price of
premiums. This will be made available through the database query. If they request a direct
consultation, contact information will be provided. This service is not dependent on any
requirement.
h) System shall allow the system admin to search records in the system. At any given time,
the system shall allow the system admin to search for records of the clerk. The admin will filter
and retrieve the record of the clerk. This is not dependent on any requirement.
i) System shall calculate total payment. If and or when the client makes a purchase, the system
will save and display the total cost and payment made by the customer. The system will make
available for clients and clerks the pertinent information. It is dependent on (a, b, and e).
j) System shall send a summary of purchase report to the client. Once the transaction has
been completed, the system will send a receipt to the client’s email address. This system is
dependent on (a, b, and f).
k) Proof of purchase will be saved to the database and the clients account will be updated.
After the transaction is complete, the system will send a query to the database to save the
information of the client and in doing so the account of the client will be updated. This system
is dependent on (a and g).
l) System shall allow the system admin to set the price of available insurances for purchase.
The system will give access privileges to the admin to set the prices of premiums. The prices
will be saved on the database ready for any queries. This is not dependent on any requirement.
39 | P a g e
m) System shall allow client to view the clients profile. After successfully logging in to the
system, the system shall display client’s profile and allow client to edit the profile. The system
will load and update the client’s data on the database. Is dependent on (a).
n) System shall allow clerks to view and update his/her profile. After successfully logging in
to the system, the system shall display system admin’s profile on the web app and also allow
him/her to update profile.
The system will load and update the clerk’s data on database. Is dependent on (b).
o) System shall allow clerk to view real-time purchased insurances of the clients. The system
will give the privilege to the clerks to view the purchased insurances of the clients. The clients
may request assistance therefore this is necessary. The database will load the pertinent
information about the client. This is dependent on (b).
p) System shall allow System Admin to view real-time purchased insurances of the clients.
The system will give the privilege to the Admin to view the purchased insurances of the clients.
The clients may request assistance therefore this is necessary. The database will load the
pertinent information about the client. This is dependent on (c).
q) System shall allow system admin to generate summary report. At any given time, the
system shall allow the clerk to generate summary report about the client’s purchases as well as
the viewed insurances of customers to view which type of available insurance is getting more
attention. The clerks filter and retrieve the data from database. Is not dependent on any
requirement.
r) The system shall regurgitate the 3rd party liability price points to the end user. At any
given time, the system shall allow the customer, clerk and admin to view the 3rd party liability
prices for their usage. The client, clerk and admin will choose their preferred choice of vehicle
and its purpose. This will allow the system to display the relevant information. The system is
dependent on (a, b, and c).
s) The system shall display estimated the premium prices of a product. This purpose of this is
to give a rough estimate
40 | P a g e
a) Security: The secure system shall implement log in and logout mechanisms to maintain the
security and identify the role of the person who is currently logging in.
b) Availability: The system should be accessible 24 hours a day, 7 days a week as dependent on
the servers being up and running correctly.
c) Portability: The system should allow users to access it from any location with both their
mobile device and through their computers.
d) Error handling: The system helps in maintaining normal flow of program execution by
anticipating, detecting and resolving application and communication errors.
e) User friendly: The system is easy to use and understand, user interfaces are not complex rather
they are straightforward, and the interface is well organized.
f) Response time: The system requires minimum time to react to given input, to process input
provided and to produce desired output.
41 | P a g e
3.4.1.1 Use Case Diagram
Registe
r
Logi
n
Cler
Request k
Clien quote
t
View
Profile
`
Set
Price
Generate
Report
Filter
Data
Logou
t
System
Admin
42 | P a g e
3.4.1.2 Use Case Documentation
Registering client
Name
Identifier UC-001
Description Registering a new client
Actor client
Pre-condition None
Post condition The client will be registered in the system
Basic Course of Action:
1. Client open the app.
2. New client will be welcomed using “PUI001: start”.
3. Client will start the operation using “PUI001: start”.
4. Client provide basic information using “PUI003: signup”.
5. System verify the validity of provided information.
6. Client press next button using “PUI003: signup”.
7. Client will be asked the verification code from phone number using “PUI004: verify”.
8. Client provide verification code using “PUI004: verify”.
9. The system verifies the verification code. 10. Client will be asked the verification code
from email using “PU1005: verify” 11.
Client will provide verification code using “PU1005: verify” 12.
The system verifies the verification code.
13. Client will see terms and policy using “CUI001: terms and policy”.
14. Client check the “I agree to terms and policy” box using “PUI003: signup”.
15. Client will be welcomed to the system using “PUI005: welcome”.
Alternative Course of Action A: Data validation fails
1. The system determines the data in invalid.
2. The system informs the client to enter valid data.
3. The use cases resume at step 4 of the basic course of action.
Alternative Course of Action B: Verification code is invalid 12 The
1. system determines verification code is invalid.
2. The use cases resume at step 10 of the basic course of action.
register client essential use case documentation
43 | P a g e
Actor System Administrator
Pre- Condition None
Post Condition The new clerk will be registered in the system
Basic Course of Action
1. The system promotes for username and password.
2. System admin will provide user name and password using “AWUI001: Login”.
3. The system verifies the credential provided
4. The System Admin will send a link to new Clerks and Admins
5. The system admin will navigate to Generate Link.
6. Clerk or Admin navigates to the link and registers information
7. System checks the validity of credential.
8. System creates the account.
Alternative Course of Action A: Incorrect credentials
1. The system determines the credential is invalid.
2. The system informs the system admin the credential in invalid.
3. The use cases resume at step 1 of the basic course of action.
Alternative Course of Action B: Incorrect clerk information
1. The system determines the information is invalid.
2. The system informs the system admin the provided credential in invalid.
3. The use cases resume at step 6 of the basic course of action.
44 | P a g e
Name Clerk login
Identifier UC-004
Description Verifying clerk’s identity to allow login
Actor Clerks
Pre-condition Clerk must have an account
Post condition Clerk will login to the system
Basic Course of Action
1. System promotes for username and password using “OWUI001: login”.
2. Clerk will provide user name and password.
3. system verifies the credential provided and prompts a code.
4. System redirect the clerk to dashboard using “OWUI002: dashboard”.
Alternative Course of Action A: Incorrect clerk credentials
4 The system determines the credential is invalid.
5 The system informs the clerk the credential in invalid.
6 The use cases resume at step 1 of the basic course of action.
clerk login essential use case documentation
Name Logout
Identifier UC-011
45 | P a g e
Description Logging out user that has logged in previously
Actor Admin, Clerk, Client
Pre-condition Actors must login
Post condition Actors will logout of the system
Basic Course of Action
1. The actor will navigate to setting.
2. Actor chose to logout.
3. The system verifies the logout request
4. The system destroys session and cookies started.
5. System redirect the actor to login.
Alternative Course of Action A: logout request fail 1.
The system determines the request is canceled.
2. The actor will be redirected to home.
logout essential use case documentation
46 | P a g e
Alternative Course of Action A: Incorrect credentials
1. The system determines the credential is invalid.
2. The system informs the client the credential in invalid.
3. The use cases resume at step 1 of the basic course of action.
calculate payment essential use case documentation
47 | P a g e
Actor Clerk, Admin, Client
Pre-condition Logged in Account
Post condition Profile will be edited from the web application
Basic Course of Action
1. The system promotes for username and password using “OWUI001: login”.
2. Clerk will provide user name and password.
3. The system verifies the credential provided.
4. System loads map using “OWUI002: dashboard”.
5. The clerk will navigate to setting from dash board.
6. System display profile information of clerk using “OWUI004: profile”.
7. Clerk write changes to profile using “OWUI004: profile” 8. System update the change
made in the database.
Alternative Course of Action A: Incorrect clerk credentials
1. The system determines the credential is invalid.
2. The system informs the clerk the credential in invalid.
3. The use cases resume at step 1 of the basic course of action.
clerk edit profile essential use case documentation
48 | P a g e
3.4.2 Essential UI Prototype
3.4.2.1 Client Mobile Application UI Prototype
49 | P a g e
50 | P a g e
3.4.2.3 Website UI Prototype
51 | P a g e
Fig 3.4.2.5 login page
52 | P a g e
Fig 3.4.2.6 client home page
53 | P a g e
3.4.3 User Interface Flow Diagram
54 | P a g e
c) ID: BR003 Name: Insurance of Liability for Damages
Description: Article 685 of the commercial code states “the insurer who insured a
liability for damages shall not pay compensation until a claim is made against the
insured person with a view to amicable or judicial settlement” Here if one person is
insured against liability for damages, their party who claims to be injured by this person
must appear to pay the insurance. Some employers may insure their employees against
liability for damages they caused.
3.4.4.2 Constraints
Every project is constrained in different ways, often by its scope, time, and cost goals.
To create a successful project, a project manager must consider constraint and balance its goals.
The basic constraint in our project are the following:
1. Internet access: Cheetah ambulance is a real time ambulance service, it needs fast and
continues internet access. According to our country network this may be a challenge for this
project.
2. Scope: Change in geographical or functional scope in the project requires extra financial and
other resource. So, the project manager must control the scope change.
3. Cost: Financial cost is one of fundamental element in project success. The project may require
additional cost in case of scope change, increment of resource price and time change. The
project sponsor and project manager must be controlling the cost constraint.
4. Resource: The tools, equipment, software, materials and team members that will be used
during project works are considered as a project resource. The availability of required resource
is mandatory to complete the project on the schedule. Therefore, the project manager must
manage the resource constraint.
5. Time: Every task and process takes time. Our project is a year scheduled. So, to complete the
project in the schedule time the project manager must be control the project
55 | P a g e
3.4.4.3 Change Case
a) Online payment becomes available
The system will automatically insure renewals without input from client.
The system will prompt the client before the transaction is complete, and
only if the client chooses to stop this transaction will be terminated.
b) System integration with vehicle inspection and bolo renewal services.
The system’s integration with the countries inspection and bolo renewal
services will significantly decrease the time wasted during this season of
work. The total time spent on the act of renewing vehicle inspection and
bolo renewal services depends on the sole least efficient factor, humans. The
average time spent on this act is 3 – 5 hours depending on your locality and
working speed of the service renewing officers at each location, which are
4. The vehicle inspection area, road fund payment office, printing and copy
office, finally bolo renewal office. Once this efficiency draining factor is
removed, the transaction process will be from vehicle inspection to online
payment to bolo service office to pick up vehicle bolo.
c) System integration with postal service
The system will send 3rd party coverage papers to the post of the client and
the insurance transaction will become fully automated. The postal service
will send the client a tracking ping when the insurance papers arrive.
56 | P a g e
3.5 System Models – Analysis
3.5.1 System Use case Modeling
Register
Login
Clerk
Request quote
Client
View Profile
Set Price
Generate Report
Filter Data
Logout
System Admin
57 | P a g e
3.5.1.2 Use Case Documentation
Registering client
Name
Identifier UC-001
Description Registering a new client
Actor client
Pre-condition None
Post condition The client will be registered in the system
Basic Course of Action:
16. Client open the app.
17. New client will be welcomed using “PUI001: start”. 18. Client will
start the operation using “PUI001: start”.
19. Client provide basic information using “PUI003: signup”.
20. System verify the validity of provided information.
21. Client press next button using “PUI003: signup”.
22. Client will be asked the verification code from phone number using “PUI004: verify”.
23. Client provide verification code using “PUI004: verify”.
24. The system verifies the verification code.
25. Client will be asked the verification code from email using “PU1005: verify”
26. Client will provide verification code using “PU1005: verify”
27. The system verifies the verification code.
28. Client will see terms and policy using “CUI001: terms and policy”.
29. Client check the “I agree to terms and policy” box using “PUI003: signup”.
30. Client will be welcomed to the system using “PUI005: welcome”.
Alternative Course of Action A: Data validation fails
4. The system determines the data in invalid.
5. The system informs the client to enter valid data.
6. The use cases resume at step 4 of the basic course of action.
Alternative Course of Action B: Verification code is invalid 12 The
1. system determines verification code is invalid.
2. The use cases resume at step 10 of the basic course of action.
58 | P a g e
Table 3.1 register client essential use case documentation
59 | P a g e
Alternative Course of Action A: Incorrect credentials
4. The system determines the credential is invalid.
5. The system informs the system admin the credential in invalid.
6. The use cases resume at step 1 of the basic course of action.
Alternative Course of Action B: Incorrect clerk information
4. The system determines the information is invalid.
5. The system informs the system admin the provided credential in invalid.
6. The use cases resume at step 6 of the basic course of action.
60 | P a g e
Alternative Course of Action A: Incorrect clerk credentials 7 The
system determines the credential is invalid.
8 The system informs the clerk the credential in invalid.
9 The use cases resume at step 1 of the basic course of action.
Table 3.4 clerk login essential use case documentation
Name Logout
Identifier UC-011
Description Logging out user that has logged in previously
Actor Admin, Clerk, Client
Pre-condition Actors must login
Post condition Actors will logout of the system
Basic Course of Action
6. The actor will navigate to setting.
7. Actor chose to logout.
8. The system verifies the logout request
9. The system destroys session and cookies started.
10. System redirect the actor to login.
61 | P a g e
Alternative Course of Action A: logout request fail 3.
The system determines the request is canceled.
4. The actor will be redirected to home.
Table 3.6 logout essential use case documentation
62 | P a g e
Basic Course of Action
7. System asks the client for credential using “PUI002: sign in”.
8. Client provide credentials.
9. System verifies the provided credential.
10. System loads to the map with the API configured using “PUI006: home map”.
11. Client goes to navigation menu using “CUI004: navigation menu”.
12. Client views profile using “PUI011: profile”.
Alternative Course of Action A: Incorrect credentials
4. The system determines the credential is invalid.
5. The system informs the client the credential in invalid.
6. The use cases resume at step 1 of the basic course of action.
Table 3.8 client view profile essential use case documentation
63 | P a g e
Table 3.9 clerk edit profile essential use case documentation
64 | P a g e
3.5.2 Sequence Diagram
1. Client Registration
65 | P a g e
2. Clerk Registration
66 | P a g e
3. Admin Registration
67 | P a g e
4. Login
68 | P a g e
5. Logout
69 | P a g e
6. View
70 | P a g e
7. Edit Profile
71 | P a g e
8. Quote
72 | P a g e
9. Claim registration
73 | P a g e
10. Claim View
74 | P a g e
11. Remove Client/Admin
75 | P a g e
3.5.3 Activity Diagram
1. Client Registration
76 | P a g e
.
2. Clerk Registration
77 | P a g e
3. Admin Registration
78 | P a g e
4. Login
79 | P a g e
5. Logout
80 | P a g e
6. View and Edit Profile
81 | P a g e
7. Generate Report
82 | P a g e
8. Get a Quote (Client)
83 | P a g e
9. Delete Client account
84 | P a g e
10. Claim registration (Client)
85 | P a g e
11.Claim registration (Clerk/Admin)
86 | P a g e
12. Claim View
87 | P a g e
13.View Client Information
88 | P a g e
14. View Clerk Information
89 | P a g e
15. Give quote (Clerk / Admin)
90 | P a g e
16. Remove clerk
91 | P a g e
Chapter 4 - System Design
4.1 Introduction
System design is the process of defining elements of system like modules, architecture,
component and their interfaces and data for the system based on the specified requirement. It is the
process of defining, developing and designing system which satisfies the specific needs and
requirement of a business or organization.
A systemic approach is required for a coherent and well-running system. Bottom-Up or
TopDown approach is required to take into account all related variables of the system. A designer
uses the modelling languages to express the information and knowledge in a structure of system
that is defined by a consistent set of rules and definitions. The designs can be defined in graphical
or textual modelling languages. Some of the examples of graphical modelling languages are
A. Unified Modelling Language (UML): To describe software both structurally and behaviorally with
graphical notation.
B. Flowchart: A schematic or stepwise representation of an algorithm.
C. Business Process Modelling Notation (BPMN): Used for Process Modelling language.
D. Systems Modelling Language (SysML): Used for systems engineering.
Design methods:
A. Architectural design: To describes the views, models, behavior, and structure of the system.
B. Logical design: To represent the data flow, inputs and outputs of the system. Example: ER
Diagrams (Entity Relationship Diagrams).
C. Physical design: Defined as a) How users add information to the system and how the system
represents information back to the user. b) How the data is modelled and stored within the
system.
D. How data moves through the system, how data is validated, secured and/or transformed as
it flows through and out of the system. Or System design can be described as a phase that
92 | P a g e
bridges the gap between problem domain and the existing system in a manageable way.
These will identify qualities that the system must focus on, so that design decisions can be
based on a specific set of criteria. In our documentation we have used UML the modelling
languages to express the information and knowledge in a structure of our system.
4.2 Design Goals
Design goals are targets for design work. These are typically agreed up on by stakeholders
as the criteria for comparing design alternatives and evaluating design outcomes.
The following are our design goals.
A. Delivery time: The system will be completed and delivered on the agreed date with agreed
requirements
B. Customer need: Meeting our patients need to get fast ambulance service.
C. Performance: Fast patient request processing and response providing time.
D. Portability: The mobile app runs on all version of android mobile devices.
E. Productivity: Our system targets to increase productivity of
a. Patients by improving the traditional ambulance requesting method.
b. officers by improving ambulance managing and tracking system.
F. Functionality: Our system will address all requirements we agreed up on the beginning of this system.
G. Learnability: Our goal is to design system that is easy to learn and use for novice users.
H. Fit to Purpose: The system is designed to address the issues mentioned in the statement of problem
without any unnecessary addition to quality.
93 | P a g e
If we could not implement all the performance requirement on all versions of
targeted devices, first we will work on addressing the preferred device versions then we will
gradually adopt on the rest versions.
C. Security vs. functionality
We will always make sure the functionalities we will be introducing in our system
wouldn’t distort the security or create a hole in the system.
94 | P a g e
4.5 Design Phase Models
4.5.1 Class Modeling
<<Claim>>
<<Quote>> -carRegID:int
-policeReport:varBinary(n)
-nameofCar:string
-carRepairEstimate:date
-importedyear:int
-driversLiscence:varBinary(Max)
-damagePremium:int
+claimValidationRequest ()
-locationofinport:string
-ageofCar:date
+ quoteValidationRequest ()
95 | P a g e
4.5.2 Persistent Model
4.5.2.1 Mapping Class Diagram to Relation
I) user (fname, lname, gname, age, sex, user_ID, phone_number, user_email, car_Reg)
II) clerk (Emp_gname, Emp_fname, Emp_lname, Emp_age, Emp_sex, Emp_dob, Emp_jobtitle,
EMP_id, Emp_email, Emp_phone, Emp_profile_photo,
Emp_public_ID_Photo, Emp_HomeNo, Emp_Woreda,
Emp_emergency_contact_name, Emp_emergency_contact_number)
III) Admin (Emp_fname, Emp_lname, Emp_age, Emp_sex, Emp_dob, Emp_jobtitle, MAN_id,
EMP_id, Emp_email, Emp_phone, Emp_profile_photo, Emp_public_ID_Photo,
Emp_HomeNo, Emp_Woreda,
Emp_emergency_contact_name, Emp_emergency_contact_number,)
IV) Employee_login( EMP_id, MAN_id, Enc_Password) V) User_Login (user_id,
Enc_Passowrd)
VI) Quote (cartype, Y_import, own_Damage, claim_bonus, discount, liability, Y_car, car_RegNo,
Car_ChassisNo)
VII) Claim (Car_ChassisNo, CarRegNo, policeReport, Car_Repair_Estimate,
drivers_liscence_ID)
4.5.2.2 Normalization
I) user (fname, lname, gname, age, sex, user_ID, phone_number, user_email, car_Reg)
96 | P a g e
Emp_public_ID_Photo, Emp_HomeNo, Emp_Woreda,
Emp_emergency_contact_name, Emp_emergency_contact_number)
1NF: No multivalued attribute
2NF: No partial dependency
3NF: No transitive dependency
VI) Quote (cartype, Y_import, own_Damage, claim_bonus, discount, liability, Y_car, car_RegNo,
Car_ChassisNo)
1NF: No multivalued attribute
2NF: No partial dependency
3NF: No transitive dependency
97 | P a g e
3NF: No transitive dependency
98 | P a g e
99 | P a g e
100 | P a g e
Website Design
101 | P a g e
Fig 3.2 Website client Sign up Page
102 | P a g e
Fig 3.3 Login Page
103 | P a g e
Fig 3.13 Clerk Claims list
104 | P a g e
Fig 3.14 Client Claims list
105 | P a g e
Fig 3.16 Not Signed in Contact us Page
106 | P a g e
4.5.4 Deployment Diagram
107 | P a g e
4.5.5 Network Design
108 | P a g e
Chapter 5: Implementation and Testing
5.1 Introduction
For the best optimal use of the code, we developed two sets applicable systems. These systems have been
developed with the intention of allowing the user to have an experience that will encourage said user to be a
repeat customer. With the ability to interact with the insurance purchases, get notified when their purchases are
about expire, and get quotes on items they wish to insure allows for a direct easy to use and compelling experience.
$data=mysqli_query($conn, $query);
$total=mysqli_num_rows($data);
?>
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<body>
<div class="container">
109 | P a g e
<div class="title">CUSTOMER REGISTRATION</div>
<div class="employee-detail">
<div class="input-box">
</div>
<div class="input-box">
</div>
<div class="input-box">
</div>
<div class="input-box">
<span class="details">Email</span>
</div>
<div class="input-box">
<span class="details">Password</span>
</div>
<div class="input-box">
110 | P a g e
<div class="input-box">
<span class="details">Address</span>
LOG OUT
<?php
session_start();
if(isset($_SESSION['aname'])){
session_destroy();
echo "<script>location.href='login.php'</script>"; }
else{
echo "<script>location.href='login.php'</script>";
}
if(isset($_SESSION['uname'])){
session_destroy();
echo "<script>location.href='login.php'</script>"; }
else{
echo "<script>location.href='login.php'</script>";
}
if(isset($_SESSION['ename'])){
session_destroy();
echo "<script>location.href='login.php'</script>"; }
else{
echo "<script>location.href='login.php'</script>";
}
?>
111 | P a g e
Chapter 6 Conclusion and Recommendation
6.1 Conclusion
we believed to be the best implementation of insurance management. We focused on the user’s experience. The
system was developed to have the user experience well enough for a second, third and even more visits to the
website and mobile application.
With this in mind we developed a means in which the user can find the necessary information they require with
as little hindrance as possible. The website was developed with feedback from multiple end users of both websites
and insurances. The need we found and tried our utmost to quench was for the insurance information of new
purchases, renewals and documentation regarding these items be clearly displayed.
The system will allow users who are joining for the first time to view the available purchasable items and
direct by their input to find the quotes given by any given insurance company that chooses to incorporate our
system with theirs. A user that is a continuous user will no longer have to rummage through their drawers to find
their previous insurance items. They already have all they need to renew their purchases, if they choose so, via
mobile banking which is becoming readily available as we speak, they will be able to. The user can visit stores for
purchases related to the quotes they received from the system.
Overall, the users experience is the top goal for the development system. We have strived to achieve that
and have developed two methods for this outcome.
6.2 Recommendation
There are four recommendations that need to be addressed for the gap that we have found in the insurance management
field.
we have is the reviewing, rectifying and finalization of the project. Firstly, by reviewing the project, the
stakeholders will understand the basis of our work and the reasoning behind the developed project. Secondly by
rectifying the project, the stakeholder will directly state the areas in which the project needs to be improved. If
the project requires extra work, the stakeholders will direct the team to add or remove aspects of the project that
are not favorable for the Implementation of the project. Lastly, finalizing the project takes into consideration the
previous factors and gets approval for the implementation of the project.
stakeholders to the project such as the insurance company, banks, user, road fund, and transport authority.
These stakeholders will receive information regarding the purchase of the client. This information will give them
the go ahead in regards to getting things ready for the client in their respective sections. For example, when a
client uses a banking system to pay for an insurance, the company, upon verification of payment, will make ready
the items for the client to put on their car. The road fund will send notification for the user that their road fund is
due and provide methods of payment and the amount required (The road fund authority has already implemented
banking payment method). The transport authority will acknowledge these purchases and make ready the items
112 | P a g e
ready for purchase. The communication between these stakeholders will make more efficient the structure and
make ready all requirements.
sensitize the population and implement a means of directing users to use this system for benefits such as
monetary benefits…etc. This will allow the users to be sensitized to non-paper-based system that will inevitably
help the world in the long run. Users who want to have a clear understanding of the insurance policies they have
purchased will have a clear understanding of what they have purchased and this will encourage all those will use
this system to use this more and more.
promote the website and mobile application to end users through the launching of the project and through
media. The media will be the top advertising platform for the availability of the system. The media will encourage
people to use this item more and more. The launching of this project will guide users to take a first-hand approach
to their purchases and this, we believe, will be a selling point for advertising.
113 | P a g e
REFERENCE
114 | P a g e
List of abbreviation
OO - - Objected Oriented
115 | P a g e
116 | P a g e