Professional Documents
Culture Documents
DEPARTMENT OF ISM
PROJECT PROPOSAL
Submitted by
MAZIMPAKA YVES
Submitted to Lecturer
Introduction....................................................................................................................................4
Main objective........................................................................................................................5
Specific Objectives..................................................................................................................5
Current System...............................................................................................................................6
3. Expected Outcome/Deliverables.....................................................................................7
Proposed System....................................................................................................................7
Functional specifications........................................................................................................8
Non-functional specifications.................................................................................................8
Feasibility Study............................................................................................................................10
Economic Feasibility.............................................................................................................10
Technical Feasibility..............................................................................................................10
System Requirements...................................................................................................................10
Hardware..............................................................................................................................11
1
Software...............................................................................................................................11
4. RELATED RESEARCH.............................................................................................................12
LITERATURE REVIEW.....................................................................................................................12
Traditional Systems..............................................................................................................12
Current System.....................................................................................................................13
5. METHODS.............................................................................................................................15
RESEARCH METHODOLOGY..........................................................................................................15
Primary data.........................................................................................................................15
Secondary data.....................................................................................................................17
System Design..............................................................................................................................18
Context Diagram...................................................................................................................18
Database Design.......................................................................................................................20
Coding..................................................................................................................................22
Frontend...............................................................................................................................22
Backend................................................................................................................................22
7. RESOURCES REQUIREMENT.........................................................................................23
Budget estimate....................................................................................................................23
2
8. GANTT CHART..............................................................................................................24
Conclusion....................................................................................................................................25
References....................................................................................................................................27
3
1. INTRODUCTION AND BACKGROUND
Introduction
Personal documents are very important to the owner, when they are lost, it causes
headache to the owner and to recover those lost documents may not be easy because here in
Rwanda we don’t have lost and found agencies, that’s why in this project, I wish to develop and
document a web-based facility that enhances easier recovery of lost personal documents. Such
documents may include a driver’s license, national identity card, immigration documents, travel
documents such as passports, birth/death and marriage certificates. This document reports the
design, analysis, implementation and testing of the system
There are hundreds of lost national identification cards and other such documents lying
around the country. We don’t have a central ‘lost and found’ location where their owners can
visit to collect them. Instead, they go to the police station for an abstract and straight to the
IREMBO platform to apply for new ones. Meanwhile, there are some crooks using their identity
cards to commit criminal activities including forging of documents . Applicants of lost
identification cards will have to make numerous trips to the issuing offices before being re-
issued with the replacements.
It is rather frustrating when one loses, say, their travel documents. This could result in
cancelled or delayed plans (say, if one lost their passport, this would mean that if they were to
travel somewhere for any reason, be it business or pleasure, they would either cancel such plans
or delay them). People often lose these documents and lack a way to find them. They will wonder
where they could have misplaced them and end up never recovering them. In such cases,
recovering lost personal documents becomes tedious and mostly futile. Most of the time,
individuals who lose their personal documents end up going through the process of renewing the
same all over….which is both time and money consuming.
Such are the reasons for development of a simple, efficient and toll-free web-based application
that allows holders of such lost documents to have the convenience of at least having a link up
facility to help them recover their lost and found documents. Though not optimally, this project
will by far provide an excellent solution to this problem.
4
2. Aim and Objectives
Main objective
1) To enhance and upgrade the existing system by increasing its efficiency and effectiveness,
through web responsive approach and automation.
Specific Objectives
1) To develop a modern state-of-the-art document recovery management system to
automate and save time using web technology.
2) To provide users with quick response and accurate information regarding their lost
documents and recovery of such.
3) To help Kenyans acquire an easier, more effective and toll-free way to re-acquire their
lost personal documents.
4) To develop a system with a very user-friendly interface.
5
Current System
Businesses recover customer valuables that are left/lost in their premises but in some cases
fail to share information of found items either online or on print media due to the lack of a
convenient system to announce such or fear of illegal claims, as a result found items accumulate
This inducted the idea of enhancing such a system by expanding the system’s functionality
to not only address loss of identity cards but other personal documents as well. The system will
also ensure authenticity and security of details and information posted on the site. The current
system mostly focuses on lost national identity cards. There’s numerous documents one can lose
besides national identity cards:
6
3. Expected Outcome/Deliverables
Proposed System
7
Limitations of the Proposed System
• The system is not a portable application i.e. it will be hosted on the internet.
• The user must be computer literate.
• For you to access and use the system, you must be connected to the internet. It can’t
work in offline mode.
• The system requires constant maintaining and updating whenever a new entry is to be
made, which means as frequently as recovered/lost documents are reported.
• The system will only help individuals recover their lost documents but not optimally: it
will only work in favor of those whose documents have been recovered since it won’t
have the capability to track/trace lost personal ID documents.
Functional specifications
Functional specification define the capabilities and functions that a system must be able to
perform successfully. They specify the behavior of the system.
• The system shall enable the customer to view list of lost items after registration, create
an account, log-in to the system and make searches or requests.
• The system shall display details of all lost items and provide a forum for reclaiming such.
• The system shall provide visual confirmation of requests and searches.
• The system shall enable the manager/admin to view, create, edit and delete items and
descriptions.
• The system shall allow generation statistical information according to the number of
found items.
• The system shall allow generation of item/document reports for the items
recovered/found.
• The system shall allow the manager to update additional information (description,
holder details, etc.) for a given movie.
• The system shall provide a method of determining the legitimacy of available data.
Non-functional specifications
• Reliability: The system should be reliable, that is it can carry its specific operations
under all conditions.
8
• Security: The system must be secure, allowing only authorized users to access
information.
• Extensibility & Expandability: The system should be easily upgradeable without any
undesired results or effects and needs to be future proof.
• Speed: The system should be able to process transactions in good time.
• Usability: The system should be easy to use such that the user should gain competency
in the use of the system with minimal training.
• Survivability – Perform under adverse conditions
• Availability – should be available for use at all times and available for all those lost
their documents and those who need to post found documents.
• Maintainability – should be easy to maintain and update.
9
Feasibility Study
Economic Feasibility
These are the financial returns/benefits the system is expected to have.
• The system will reduce the cost of making numerous trips to and fro the issuing
departments, and still due to the fact that corruption is still prevalent in Kenya, it will
curb the tradition of paying officials for favors regarding such issuances of renewed
documents, as is mostly the case.
• The system will definitely reduce the operational cost in terms of reduction of paper
work e.g. form filling, customer travel cost and time. It will only be a case of someone
going to collect their document(s) and leaving.
Technical Feasibility
The technology necessary for development and running of this system is currently
available e.g. HTML, JavaScript and Php languages. There will be need of hiring expertise
technicians immediately the system is installed to maintain the system and database.
Operational Feasibility
System Requirements
The system will have the following requirements:
10
Hardware
Recommended Processor
For mobile devices, minimum requirements would include compatible web browsers,
1GB RAM and an effective operating system such as android or IOS.
Software
• Windows 8
Browsers
• Google Chrome
11
4. RELATED RESEARCH
LITERATURE REVIEW
Traditional Systems
Some time ago, though even currently, people have had to go through the scrupulous
process of going to issuance of identity documents to get new ones due to the fact that they lost
their previous ones and couldn’t recover them. Corruption is still a scourge in Kenya and many
are the times citizens will be asked to offer a certain fee to earn the favor of quicker services, or
so at times they are told.
Such a system is time consuming and takes advantage of individuals who’ve lost their
documents, while at the same time encouraging discrimination at a point. Those who aren’t able
to negotiate replacement of their documents through devious means conceived by the issuing
officials, will have to wait a while longer. Someone somewhere may have found an ID but didn’t
have the facility to reach the owner. For example, according to the National Registration
Board, processing of ID’s takes approximately 4 to 6 weeks from the date of
application/reapplication. One will have to bring with them the following:
• A copy of a police report stating how they lost their identity card
• A copy of the applicant’s valid Kenyan passport if any
• A copy of their original birth certificate
• A copy of their ID card if any
One will also have to answer numerous questions and fill in equally numerous forms for
proof of identity which could otherwise be reduced with a less time consuming method.
Lost documents could also mean that an individual is the victim of identity fraud. This is
unlawful identity change. It indicates unlawful activities that use the identity of another person
or of a non-existing person as a principal tool for merchandise procurement. As such a new
system can be implemented to assist the law to warrant investigations into areas where such
fraud is prevalent.
12
The whole process of re-application and issuance of identity cards, passports and other
such documents, according to KNHRC (2007) is faced with a number of complaints from the
politicians and citizens lodged at departments such as National Registration Bureau
(NRB) concerning time taken to produce these documents especially during electioneering
period in the case of national identity cards because one has to have an identity card so that one
can register as a voter. Numerous complaints are lodged at the National Registration Bureau
claiming that registration officials routinely asked for bribes in order to issue Identity Card to
the applicants. A research paper by Ethel Mwacharo, a student of Masters of Arts Degree in
Project Planning and Management in the University of Nairobi, about Factors Influencing
Effective Production and Issuance of Identity Cards in Nairobi County, Kenya,
stated that there were complaints that the process of re-issuance was characterized with
debilitating and unnecessary delays resulting in inability to travel, to register as voters and
harassment by police on account of lack of an Identity Card.
According to KNHRC (2007) the whole process of application and collection of Identity
Card cards is impeded by unnecessary delays. An Identity Card is a right and there is a need for a
paradigm shift from the colonial objectives of identification to new paradigm of seeing
identification as a form of enhancing one’s opportunities to enjoy human rights and freedoms.
The inference made from such ways give reason to facilitate an easier way for people to regain
Current System
Nairobi; Kenya: There are hundreds of lost national identification cards lying around the
country. We don’t have a central ‘lost and found’ location where their owners can visit to collect
them. Instead, they go to the police station for an abstract and straight to the IREMBO platform
to apply for new ones. Meanwhile, there are some crooks using their identity cards to commit
criminal activities including forging of documents.
13
noted Kevin Maina, a student who came up with an application that enables Kenyans to easily
recover their lost identity cards.
Kamuzu Banda reported that the app has a central database that can be fed information
on lost IDs, which can then be made available to people using the right codes. The app was
developed using basic html and Php systems combined with USSD technology.
USSD is Unstructured Supplementary Service Data, which is a Global System for Mobile
(GSM) communication technology that is used to send text between a mobile phone and an
application program in the network. Such applications may include prepaid roaming or mobile
chatting. Kenyans may be familiar with USSD technology because there are so many services
that one can access by pressing a number like *144# and clicking send on a mobile phone.
Kevin’s USSD system can be used on even the most basic of phones.
The application functioned this way: If you have lost your ID, all you will do is enter a
USSD code on your phone (say *321*600#) and you will be prompted with options to report
your ID number, name, mobile number and the town where it was lost. This information will be
sent to a central database and stored there. Similarly, if someone found an ID, they will also
enter USSD code *321*600# on their mobile phone and they will get an option to enter the ID
number, name on the ID and also the town where the ID has been found and a contact number.
This will not only be stored on the database but the person who had entered the ID as lost would
receive a message notifying them that it has been found.
There is a website that serves that help those lost their documents to recover them:
Zipate, (a REFERENCE HERE Lost and found online application project by Umoja ICT youth
funded by the Kenya Youth Development Fund in 2014) offers a solution to post found items
and to search for lost items. The module for posting found items has no clear method of
determining the legitimacy of the item posted. Customers can search for the lost items but the
system displays the results of the person who has posted the item. This is a major weakness as
any person can claim to be the owner of that item. This was inferred from a paper posted by
(Githinji, 2015): Designing Lost and Found Web Applications Based on Trusted Third
Party (TTP) Model, on Academia.
14
Another site: Lost and Found Documents Center (a web application for lost and found
items services whose aim is getting lost items back to their rightful owners) has modules to post
lost and found items and incorporate SMS (Short Messaging Service) to report lost items or to
search for found items. The database has very few reported lost and found items and there is no
method of determining the legitimacy of the item being posted.
Social media is another commonly used avenue to post lost and found items, Facebook
and twitter allows members to join groups where they able to post lost and found items. In most
cases, the social media channel is insecure and may be prone to fraud and other uncouth ways.
According to (Githinji, 2015)Designing Lost and Found Web Applications Based on
Trusted Third Party (TTP) Model, current systems make it very difficult to search for found
or lost items and there is also no privacy of personal information of the person who posted lost
and found items.
5. METHODS
RESEARCH METHODOLOGY
Research methodology shows the methods that were used to collect data. The methods
used were both primary and secondary methods of data collection.
Primary data
The following are the methods used to collect primary data:
1) Interviews
Interviewing allows the analyst to collect or gather the information from the individual or
group who are generally the current users of the existing system or potential users of the
proposed system. They may be students or the general public who provide the data for the
proposed system and who will be affected by it. As far as interview is concerned, it is a time
consuming process. It is a basic source of qualitative information. It allows the analyst to
discover areas of misunderstanding, indication of resistance to the proposed system.
15
User interviews were conducted to determine the qualitative information. These interviews,
which were unstructured interviews, provided opportunity to gathered information from
respondents who are involved in the process for a long time.
Advantage
Oral interviews are flexible in the manner that the interviewer can open more
perspectives to the topic and also give additional information.
2) Questionnaires
A questionnaire is a set of printed or written questions with a choice of answers, devised for
the purposes of a survey or statistical study. It is also defined as a research instrument consisting
of a series of questions and other prompts for the purpose of gathering information from
respondents.
Questionnaires are used in the case where one is not able to physically interact with the other
individual as is the case of interviews. Questionnaires can be sent through e-mail or over social
media such as WhatsApp or Facebook. They are also applicable where the other party is busy
and intends to respond to queries later.
The use of questionnaires contributed greatly to the implementation of this project, while
still inducting new perspective and aspects into the project through new ideas and rectifications.
16
Advantages
Close ended questions have the advantage of collecting viable quantitative data while
open-ended questions allow the respondents freedom of answering questions and the
chance to provide in-depth responses. Questionnaire is preferred because it is
efficient, cheap and easy to be administered. The questionnaires will be administered
through drop and pick to identify respondents with a brief explanation on their
purpose and importance.
3) Consultation
This is a conference between two or more people to consider a particular question. During
the preliminary stages of the project, I consulted my project supervisor. Such consultation gave
insight to how to navigate the whole project from conception to completion. Several of these
consultations guided me in eliminating the various errors therein.
4) Observation
It was observed that too many Kenyans end up losing their personal documents, mostly their
national identity cards. They either forgot, dropped or lost their cards among other belongings. I
identified the major challenges and it was clear to me that there is great need of coming up with
a system to cub these challenges.
All information and details needed in order to aid the development of the system were being
collected. The information will act as a reference point to be used while developing the system.
Observation gives the analyst the opportunity to go behind the scenes to learn the inside
story and to discover the flaws of the current system.
Secondary data
The data and information was collected from the internet and a few books on
programming. I also reviewed some of the projects that are related to my project.
The internet is the best source of information for any field of study. It contains online
encyclopedias and different sites on various subjects to gather information. You can actually find
17
information about anything you want to know about from the internet; whether about science,
technology, mathematics, history, countries etc. I also reviewed some of the projects that are
related to my project.
Books are an inexpensive method to use because they can easily be borrowed from the
library. They contain various detailed information and can easily and efficiently be used for
research.
System Design
Context diagram
Data flow diagram
Context Diagram
This is a brief structure which depicts the environment in which a software system exists
and helps in communicating about what lies outside the system boundary.
18
Data flow diagram
It is a two-dimensional diagram that explains how data is processed and transferred in a
system. The graphical depiction identifies each source of data and how it interacts with other
data sources to reach a common output.
19
Database Design
The system’s platform will employ the use of a database where users will be publishing
their documents’ information into, searching for documents and also where user relevant
information such as login details will be held.
The most suitable database to be used is MYSQL because of the following reasons:
Coding
Various system tools will be used in developing both the frontend, backend and other
components of the project.
21
Frontend
Implemented using Html, CSS and JavaScript which is used to design the interactive interfaces.
CSS is a style sheet language used for describing the look and formatting of a document written
in a markup language.
Java Script
Backend
Implemented using PHP and MySQL which is used to create the form validation and database
respectively.
PHP is a server-side scripting language designed for web development but also used as a
general-purpose programming language. PHP code is interpreted by a web server with a PHP
processor module, which generates the resulting web page: PHP commands can be embedded
directly into an HTML source document rather than calling an external file to process data.
MYSQL
MySQL is the world’s second most widely used open-source relational database management
system (RDMS). The SQL phrase stands for structured query.
7. RESOURCES REQUIREMENT
Budget estimate
The following is the estimated financial plan for which funding is required. This includes
all expenses that will be incurred and inclusive of the implementation cost. It also includes all
22
indirect costs that allow the project to bear a portion of the administrative costs of the day-to- day
operations.
AMOUNT (RWF)
8. GANTT CHART
A Gant chart below shows the system time schedule to its successful completion. The
Gant chart will help in the development, implementation and testing of the system as it will guide
on when and how long the system development is supposed to take.
23
ACTIVITY 22th Sep 10th Oct 20th Oct 18th 28th 12th 19th Mar
2021 2021 2021 Nov Dec Jan- 2022
2021 2021
1 Requirements
analysis and
gathering
2 Logical Design
3 Physical Design
(UI)
4 Coding
5 Testing
6 Documentation
and Presentation
Conclusion
24
requirements to assist individuals who lose their documents regain such without unnecessary
impediments.
With this system, the registration of person boards and other departments that this
project may pertain can have a lesser workload and be facilitated with a more effective way to
reissue lost documents. With this system being developed, I hope to reduce time wasting, avoid
misunderstandings, and provide easy data flow and less hard work. I believe that the pertinent
departments, such as agencies such as NIDA will find this system highly convenient and reliable
in order to accomplish their goals.
Most importantly, the proposed system will solve the problems experienced by the
current system.
25
References
Kenya National Bureau of Statistics. (2012) Kenya Facts and Figures 2012. Government
Printers. Nairobi.
Kenya National Human Commission of Rights. (2007) .An Identity Crisis? A Study on the
Issuance of National Identity Cards In Kenya. Kenya National Commission on Human Rights.
Nairobi FIND ARTICLE ON ID AND LOST DOCUMENTS
Mugenda, O. M. and Mugenda, A.G. (2003) Research Methods. Laba graphics services. Nairobi.
Mwanatongoni, M. (2011) Improving public service delivery using ICT. Retrieved on 10th
September, 2015 from www.i-policy.org.
Kamuzu Banda, (2014) An App to Find Your Lost ID. Retrieved on 1oth September, 2015 from
www.standardmedia.co.ke.
National Registration Bureau. (2008) National Registration Bureau policies, Procedures and
Practices. Government Printers. Nairobi. NIDA
26
Nyataya, J. (2009) Kenyans to get new ID cards from January. Sunday, August 9 2009.
Retrieved on 1st October, 2015 from www.nationnews.com [IREMBO AND NIDA TO GET NEW
ID/REPLACEMENT)
Sunden, S. and Wicander, G. (2006): Information and Communication Technology Applied for
developing Countries in a Rural Context. Faculty of Economic Sciences, Communication and IT,
Information Systems, Karlstad University.
Stanley Githinji (2015) Designing Lost and Found Web Application. Retrieved on 21st
September, 2015 from kemu.academia.edu
References
Githinji, S. (2015, September 21). Designing Lost and Found Web Application. Retrieved from academia.edu:
https://www.academia.edu
27
28