Professional Documents
Culture Documents
My CBZ project-FINAL - pdf3
My CBZ project-FINAL - pdf3
Alfred Nzombe
[MIG 364]
BMIS 2.2
CBZ Smart lending system.
By
Alfred Nzombe
anzombe@caaz.co.zw [+263773232567]
The manual process of obtaining and granting loans is stressful, inconvenient and
time wasting for lender and borrower as well. There is a need to automate the loan
processing procedure as much as possible. The goal of this project is, therefore, to
design and create loan automation application software that can capture the
required loan data elements only once, keep such information secure throughout the
loan process, convert the previous hand to hand system of obtaining and granting
loans into a computerized less stressful form, keep track of individuals in the
process, monitor and track loans given out to allow better flow and enhance
compliance to conditions, ensure security of information reduce lending life cycle
times, apply appropriate interest to loans and notify the concerned individual on
the progress of their loan. The existing system is a manual system which doesn’t
maintain details with proper security and takes lot of time in verification of the
documents. It is not a user friendly interface. It does allow users to check their
profile and will not provide proper information about the loan process. It takes lot
of time to the bank authority to manage customer information. It required more
paper work. The proposed system provides an easy way to users in applying loan.
Users can apply for a loan from anywhere and at any time and get notifications.
Users can view their profile details and can view all the details of the loan. System
provides download option to download different type of loan form in MS word
document. Using this system bank authority can find users details easily. This
system is a paperless system by which workload is reduced.
DECLARATION
I, Alfred Nzombe, hereby declare that I am the sole author of this project. I
authorize Trust Academy and the Midlands State University to lend this dissertation
to other institutions or individuals for the purpose of scholarly research.
Supervisor:………………………………………………………….
Date:…………………………………………………………………...
ACKNOWLEDGEMENTS
My profound and most sincere gratitude goes to the Almighty God who gave me the
grace and strength through his only begotten son Jesus Christ during my project work. I
would also want to thank my caring parents Mr and Mrs Nzombe for their support.
Special mention goes to Mrs L Kaseke (Project Supervisor) for pushing me, assisting and
mentoring me to successfully complete this project irrespective of her busy schedule,
may God bless her. This task would be incomplete if I don’t acknowledge my wife
Rosemary Shoniwa, my two sons Kudzwaiishe Jayden and Mufarowashe Abisha
Nzombe; ICT Head of Department at Trust Academy, Mrs P Chamanga and also my
lecturers: Mr E. Dzindikwa, Mr J. Makota, Mr T. Mhlanganiso and Mr J. Mapfumo. I
also appreciate the love and support of my cordial friends and fellow classmates.
I would also like to express my profound gratitude to my ever encouraging fellow work
colleagues all from Civil Aviation Authority of Zimbabwe (CAAZ) RFF&EMS
Department for their input in coming up with the system, the documentation, the tips, the
facts and the requirements needed to complete this task.
Finally my gratitude goes to all those who have directly or indirectly contributed to my
success. May the Almighty bless them all.
TABLE OF CONTENTS
ABSTRACT...........................................................................................................................................3
DECLARATION...................................................................................................................................4
APPROVAL...........................................................................................................................................5
ACKNOWLEDGEMENTS..................................................................................................................6
TABLE OF CONTENTS......................................................................................................................7
1.1 Introduction...................................................................................................................................16
1.2.2Organizational Structure............................................................................................................18
1.2.3Vision............................................................................................................................................19
1.2.4Mission Statement........................................................................................................................19
1.5 Objectives.......................................................................................................................................21
2.1 Introduction...................................................................................................................................23
2.6.4 Conclusion...................................................................................................................................35
3.1 Introduction...................................................................................................................................38
3.3.2 Inputs...........................................................................................................................................41
3.3.3 Processes......................................................................................................................................42
3.3.4 Outputs........................................................................................................................................42
3.3.5 Activity Diagram of the existing system....................................................................................42
3.5.1 Outsourcing.................................................................................................................................47
3.5.3 Development................................................................................................................................48
3.7 Summary........................................................................................................................................53
4.1 Introduction...................................................................................................................................54
4.6.3 Pseudocode..................................................................................................................................64
4.12 Summary......................................................................................................................................77
CHAPTER 5: IMPLEMENTATION.................................................................................................79
5.1 Introduction...................................................................................................................................79
5.5 Maintenance...................................................................................................................................91
5.8 Results............................................................................................................................................93
5.8.1 Findings.......................................................................................................................................93
5.8.3 Conclusion...................................................................................................................................94
Appendices...........................................................................................................................................97
Appendix-A..........................................................................................................................................97
Appendix–B........................................................................................................................................100
Appendix-C........................................................................................................................................101
CUSTOMER Questionnaire:............................................................................................................102
Appendix-D........................................................................................................................................107
LIST OF TABLES
The customer who is probably the client fills the basic enquiry form that is provided in
the proposed project website. The user (customer or applicant) sets the user name and
password. The filled form is forwarded to and successfully received at bank server. The
server administrators check the application and analyze it. He/she has authority to accept
or reject the application. So s/he analyze and decides whether the application should be
considered or not. In case s/he approved and forwards the application for further
processing, s/he notifies the customer to go for next step. At this point the customer gets
the approval of stage one. In second stage the customer uploaded his documents (scanned
documents) to the website through login (by the username and password s/he set earlier).
The documents are uploaded and successfully submitted and customer gets the
submission report. The submitted documents are cross verified according to certain set
polices set by administrators. After analyzing documents decision is sent to the customer.
The reply is sent in the form of a message.
It is the need for a computerized system to aid in processing of loan and mortgages
requests that necessitated this study on development of a smart lending system for
Commercial Bank of Zimbabwe (CBZ) customers.
Banking
Group Chief
Legal
Executive Officer
operations
CBZ
DATVEST CBZ BANK Properties
Investment Operations
Banking
Audit
Fig 1.1: Organisational chart for CBZ Holdings.
1.2.3 Vision
Vision of CBZ Holdings
To be the preferred provider of financial solutions in Zimbabwe with a global reach.
Vision of CBZ Bank
To be the bank of choice in Zimbabwe.
1.2.4 Mission Statement
Mission Statement of CBZ Holdings
To bring convenience to our clients through innovation, efficient service delivery,
competence and flexibility whilst adhering to principles of integrity, transparency and
fairness.
Mission Statement of CBZ Bank
To be a progressive, strong bank geared to satisfy the diverse needs of our customers
through innovative financial solutions. This is achieved through efficient service delivery,
competency and flexibility whilst adhering to principles of integrity, transparency and
fairness.
NIC 4 6
The bank recently upgraded the hardware which houses its core banking system. The
system will reside on some of the servers which were made free after the upgrade. The
system will interface with the core banking system which will house many of the details.
This system will handle a few transactions so the hardware and software requirements in
place are more than enough.
COSTS
First Year:
Total benefits: $30 000
Total costs: $20 000
Net benefits = total benefits – total costs
$30 000 - $20 000 = $10 000
Total net benefit in three years: $100 000-$23 300=$76 700.
The above analysis just tells us that by investing USD$23 300 the bank will realize
USD$76 700 in three years’ time. This calculation however does not consider a number
of variables such as interests which is considered in Net Present Value calculation.
The benefits and costs over the period show that total benefits outweigh total costs.
2 10 000 -
3 - -
2.4.1 Technical
The main technical risks are related to hardware and software failure which would affect
the entire project. Technical expertise is another risk that would have affected the project.
There exist backups for the hardware and software which can be used in the event of
hardware malfunction. Also the developers possess the necessary skills to finish this
project within acceptable project timelines.
2.4.2 Testing
Once a system is developed developers have the tendency of forgoing the testing phase
thereby putting the users at risk.
2.4.3 Time
There are fears that the project might not be completed on time if a more urgent problem
requires that the developers be assigned to fix it. This might affect the project plan.
2.4.5 Economic
The project needs money for it to succeed. The bank mail fail to fund the project.
2.5 Project Plan
The system Development Life Cycle (SDLC) is used in the development of this project.
The stages are to be undertaken in their sequence and time frame for completion of the
activities of each stage. The development of the work plan involves the identification of
tasks to be developed and allocation of resources to such tasks. The waterfall model has
been adopted. It offers the means of making the development process more
visible.Advantages of waterfall model are:
Enforces a disciplined engineering approach.
Verification is done at each stage.
Increased visibility.
Feasibility study
Systems analysis
Systems design
Coding, Training
&Implementation
Evaluation &
maintenance
Documentation phase
2.6.4 Conclusion
This chapter mainly focused on carrying out feasibility studies. This was done to assess
the business value of the system to the organization. With the majority of the hardware
already in place this interested management as it meant costs were minimal. This chapter
further highlighted that this project is very much feasible as the costs outweigh the
benefits. A work breakdown structure was also done in this chapter and all project
timelines were set. The proposed system is highly feasible. Thorough analysis of the
feasibility study revealed that benefits significantly outweigh expenses with just a year of
the implementation of the system. A road map was then made to achieving system
development, implementing the system and enjoys the benefits. In the next phase the
researcher will analyze the system backed by sought requirements in preparation for its
development.
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………
CHAPTER THREE: ANALYSIS PHASE
3.1 Introduction
The researcher looked closely at the current system in a bid to scrutinize its flaws and
capabilities. These investigations brought forth reasons why a new system is necessary.
Information was also gathered from CBZ staff, and the banks clients who happen to be
the users for the old system and the new system is intended to serve too. Several
information gathering techniques were employed to try and get data and/or information
on the current system’s performance, actual and expected deliverables as well as other
related concerns. This helps affix the scope of the new system as well as ensure its user
acceptance when the system is finally implemented.
3.2.1 Interviews
Interview is the verbal conversation between two people with the objective of collecting
relevant information for the purpose of research. In-depth interviews can be defined as a
qualitative research technique which involves “conducting intensive individual interviews
with a small number of respondents to explore their perspectives on a particular idea,
program or situation” (Boyce & Neale, 2006). The interviewer carried out interviews as a
way of gathering information about how the manual loan and mortgage application and
verification system worked. Different types of interviews were carried out in gathering
the information which was used.
A list of questions was prepared and used to gather more facts from the users of the
system and the clients enquiring or applying for the loans. Unstructured interviews were
usually the least reliable form of interviews because no questions were prepared prior to
the interview and interview were conducted in an informal manner. Semi-structured
interviews contain components of both structured and unstructured interviews. In semi-
structured interviews, the interviewer prepared a set of same questions to be answered by
all interviewees, however additional questions were asked during interviews to clarify
and/or further expand certain issues. Of the three data gathering techniques used the
interviews provided the greatest depth for a number of reasons.
Generally, the results from the interviews were pleasing as this was a solution which was
more of a benefit to all stakeholders. Majority of those interviewed wanted it extended to
all loan products offered by the bank.
3.2.2 Questionnaires
This is a set of questions to be asked to a number of people usually in order to gather
information or opinions. Questionnaires are designed in a consistent manner so that
respondent would find it easy to answer all questions. Questionnaires were compiled and
sent out to the departments involved with the old system with some for giving out to
clients and the following issues came out as advantages and disadvantages of the
questionnaire information gathering technique.
The researcher was satisfied with the results of the questionnaires as this method was
used to complement the other methods. The response rate was satisfactory from the
external clients but overwhelming from members of staff who completed them.
3.2.3 Observations
This is a technique where the researcher can gather data as an event occurs and hence has
to be present. The researcher was both participant and non-participant in the process. It
allowed first-hand information experience and the person conducting the observation
views exactly what is going on.
As an aid to other data gathering methods, observations served their purpose and the
information that was derived assisted greatly in fact finding.
3.3.4 Outputs
Outputs of the system are:
Successful application and loan or mortgage disbursements
Approval reports, rejected loan or mortgage reports
Yes
No
Yes
Send verified
Reject loan/mortgage form and
details to loans/mortgage
dept.
Yes Yes
Loans/mortgage dept.
Reports Approves/rejects
loan/mortgage
Yes
approval/rejection letter
Loan Officer
1.0
Customer application Completes
application
2.0
Verify Credit Analyst
application
form
Application
Approved
Loan/mortgage
Rejected loan/mortgage
Rejection details
3.0
Loan Officer
Processed Process
application
Development.
3.5.1 Outsourcing
As defined by Chase et al. (2004), outsourcing is an act of moving some of a firm's
internal activities and decision responsibilities to outside providers. The Bank can
outsource and buy already developed off the shelf system and implement it as a solution
to this problem. IT outsourcing occurs when an organization contracts a service provider
to perform an IT function instead of performing the function itself. This approach comes
with its merits and demerits.
Advantages of outsourcing
Buying an already existing results in minimum errors since it is tried and tested
Easy to implement, hence saves time
Automation of processes, hence less paperwork
The company that sells the software, may provide maintenance
3.5.1.1 Disadvantages of outsourcing
The cost associated with outsourcing is that the packaged software is usually expensive to
purchase and will have some licensing fees.
May not address all organizational challenges and requirements
Outsourcing will mean there is no growth in the IT department as they will not be
awarded the opportunity to develop implement and maintain.
Outsourced systems are difficult to do enhancements as the vendor usually do not avail
the source code for anyone but themselves to do enhancements. They usually also charge
extra for such.
3.5.3 Development
The developer can develop the system based on the customer requirements. The
automated system would solve the challenges currently faced.
Advantages of developing the system
The bank already employs a number of highly skilled developers who can develop the
system at no extra cost
An internally developed system is easier to customize and integrate with other systems
like the main/core banking system.
Easy system support and maintenance since the system is documented at the end of the
implementation.
Staff training costs will be minimized as staff will be trained on the use of the system
during the development stages.
The system will be 100% owned by the bank and will not require annual fees for
licencing and maintenance
System upgrades can be done as and when they are required without extra costs.
Disadvantages of developing the system
Custom development can be time consuming.
The developers employed by the bank might not have the expertise and time found in
developers who work in full time system development firms whose main duties are to
develop systems for different markets and testing them.
If the system fails to meet all requirements it will have been a loss in many hours of the
development team.
3.7.4 The selected alternative
After evaluating all the alternatives, developing in-house was found to be the best
alternative. It was chosen because of its advantages of implementing a tailor made system
that is going to address requirements. The system will also be implemented within the
organization’s budget. System developed in-house will encourage user participation;
hence users are likely to accept the system. As a cost reduction measure the organization
is trying to move away from having third party system and thus for any new system
requirements, in house development is first explored so as to cut down on costs.
USECASE SYMBOLS
Actor
Usecase
USE CASE DIAGRAM
verify
process
approve
Loans Officer
Reject
Disburse
Reports
3.6.2 Non-functional requirements
Non-functional requirements are non-visible features but required for an effective
running of an application. Non-functional requirements are often harder to deal with than
functional ones because their impact is generally not localized to one part of the system
but cuts across the whole system.
Non-functional requirements of the system include:
Scalability- This is the ability of the system to handle an increased workload without
significantly increasing the transaction processing time
Availability- The system should be available at all times for use. The system should be
able to meet the service level agreements.
Stability- The system should be stable for users to use it.
Reliability- The system should at all times produce correct results.
Audit and compliance- The system should meet all the audit requirements of the bank.
Performance-The system should perform to expectation of all concerned.
Security- No unauthorized person should be allowed to access to the system. A user must
log into the system using a password and a username.
3.7 Summary
The analysis phase provided us with a complete understanding of the current system, the
processes through effective information gathering methods used while at the same time it
has created an understanding of what the proposed system should be able to do by
analysing also its functional requirements. The description of the current system shows
that the system required to be redesigned so that the system performs according to the
functional and non-functional requirements of the users of the sys
CHAPTER FOUR: DESIGN PHASE
4.1 Introduction
In this chapter the researcher defines the architecture, the interfaces as well as the
components and data for the system. These are the attributes that help satisfy the
requirements. The design phase basically entails how the system is going to work. All the
design for input and output forms, design for system interface as well as the design for
data attributes is done in this phase. The new system should not be found wanting in
terms of its efficiency, effectiveness, reliability and maintainability. These requirements
may change over time and sometimes there will not be any need to update or change the
system as long as it will still be catering for all these conditions.
Registration
Enquiry details
Registration details
Registration
1.0
Customer details Completes registration
Registration
Rejected notification
Rejections 3.0
Verify Salaries Officer
application
Approval notification
Rejection details
4.0
Loan Officer
Approvals Process
application
Rejectedregistration
2.2 2.1
Validates loan Accepts loan
Application application
Completedapplication 3.1
Application verifies salary Salaries Officer
details
Acceptedsalary details
Rejected notification Rejectedapplication
3.2
Rejections
Accepts form
Approvals details
Rejectedapplication Accepted form
4.1
4.2
Checks Loan Officer
Approvedapplication Computes
Approved notification application
application
details
Internet
Terminal
Client
switch
Firewall
Loan Terminal
Officer Servers
USERNAME
PASSWORD
LOGIN
Loan Type
Loan Class
Loan Rate
ACCEPT REJECT
4.5.4 Output Design
ONLINE LOAN APPLICATION AND VERIFICATION SYSTEM
Loan Maintenance Report
Loan Type Loan Class Prev Rate New Rate Prev_Tenure New Tenure Change done
by
Registration
No
Yes
start Is Registered Login
Yes
Guest
No
Is Authenticat ed
Generate Reports
Update Customer
Details
View Reports
Logout End
Clien
Client t Register Login Loan Report
Request to register
Reg approved
Login request
Login authenticated
Requests loan
response
Req report
Report delivered
req login
Login approved
provide details
verified
request approval
approved
request reject
rejected
report provided
Customer Registration
cust_id firstname
firstname surname
surname uname
accno password
gender Add()
Add() Delete()
Delete()
Verification
Application Salariesofficer
cust_id
app_id id
app_id
lnType username
loantype
password
loanamount
Add() Add() login()
Delete() Delete()
Update()
4.6.3.3 Registration
Start Program
Select Registration module
Read input
If customer has an existing CBZ Bank Account Number and input is correct
Accept Registration Otherwise Reject Registration
Display decision
4.6.3.4 Login
If customer is registered
Read login input
Verify login input
If input is correct Accept Login Otherwise
Reject login
Display appropriate message
4.6.3.5 Logout
While logout is not selected remain in program
4.6.3.6 Guest enquiry
If guest is selected display Welcome Guest
Choose option
Read input
While option is not exit
Read details required and select compute
4.6.3.7 Once a client has successfully logged on:
Choose option from menu
If view customer details is selected
Display customer details
Else
If apply for loan is selected
Complete the loan application
Else
If view loan types is selected
Display the loan types screen and options
Else
If track application is selected
Show tracking details if one exists
Else
If update customer details is selected
Show customer details screen and accept input
Else
If logout is selected
Exit the program
4.6.3.8 Bank user logs in
Choose from menu
When manage application is selected go to manage application screen
When generate report is selected go to reports screen
When manage customer details is selected go to customer details screen
When manage loan types is selected go to loan types maintenance screen
When change password is selected change password
When logout is selected log out of the program
4.7 Database Design
Database design describes many different parts of the design of an overall database
system. It is the logical design of the base structures used to store the data. It also
includes the forms and queries used as part of the overall database application within the
database management system. Database design is also the process of producing a
detailed data model of a database containing all the needed logical and physical design
choices and physical storage parameters needed to generate a design of a database. The
objective of database design is to create a complete, normalized, non-redundant and fully
integrated conceptual, logical and physical data models.
Logical/conceptual schema
Logical level
Cust id
views
manages submits Registration
Customer name m
LoanType m
m m Cust Acc #
processes LoanApp
processes
Customer
manages Loanref #
Name
m
Loan 1
1 Management
1 modifies
id
name
ID
Database Server
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
CHAPTER 5: IMPLEMENTATION
5.1 Introduction
This chapter deals with the implementation of the proposed system. This involves dealing
with tasks which lead to a fully operational system. The system was designed in the
previous chapter and the implementation stage results in the building of the system. The
conversion method, the testing of the system, training of users and the system
specifications were all covered in this chapter.
HP Probook 650 laptop Intel® Core™ i5-4210M CPU @260GHz 8GB installed memory
(RAM) Windows 10 Enterprise 64-bit Operating System.
HP Pro3400 Series MT desktop Intel® Pentium® CPU G630 @2.70GHz 4GB installed
RAM Windows 7 Enterprise 32-bit/10 64-bit Operating System
The hardware specifications for the servers used to house the systems are listed below:
HP ProLiant DL380p Gen8 server Intel® CPU e5-2690 @2.9GHz (Dual processors)
192GB installed memory (RAM) running Windows Server 2012 Enterprise Operating
System. MSSQL Server 2014 for Database
Unit Testing-During unit testing each class on the system was tested to see if it
performed as per requirement. Each component of the system was tested
individually to ensure its functionality and integrity.
Module Testing-In this case each module was created separately and tested
separately then linked to form one. This testing strategy was instrumental in the
understanding of all the validation that needed to be coded as per module.
Module testing was rather the test of related unit components of the system.
Execution paths, error-handling paths, normal, abnormal and extreme data were
thoroughly tested.
This method of testing combines dependent components and tests them together. A
collection of procedures and functions were tested together. A single component can be
tested without other system modules. Usually module testing is done using the set
objectives to measure the reliability and functionality of our modules. In this type of
testing modules such as the lost items records were tested for their dependency on results
and found items modules. The idea behind was to check if the system was giving the
appropriate results after the user queries it. The system was capable of producing the
project objectives and therefore concluded to be working properly.
White box testing. This focuses specifically on using internal knowledge of the
software to guide the selection of the test data; it allows to test parts of the program. It is
also known as glass-box testing. White box testing was used for testing levels like unit
testing, integration testing and system testing.
Advantages of white-box testing:
i. It revealed errors in hidden code and hence assisted the programmer to fix the code.
ii. It helped the programmer in optimizing the code by removing the extra lines of code
which could bring in hidden defects.
Disadvantages of white box testing
i. In-depth knowledge about the programming language was necessary for white-box
testing.
ii. It proved not to be realistic to be able to test every single existing condition of the
application and some conditions were left untested.
iii. The test focused on the software as it exists and missing functionality may not be
discovered.
In black box testing, the testers were testing software from the user’s point of view.
Testers included the loan officer, salaries officer and other employees who were testing
on behalf of the bank customer. In white box testing, the programmer (tester) evaluated
the code and internal structure of the programs. The tester tested all programs to see if
they produced results that they were set out to produce. The tester checked to see if an
unsuccessful login (were a wrong password or wrong user login credentials) produced an
error message. The tester also tested to see if when wrong credentials were supplied, no
access was allowed into the system.
Defect testing-This strategy is going to be used to test the system so that defects
are discovered before the system is delivered to the end users .A successful defect
test will cause the system to perform incorrectly hence exposure of the defects.
This test demonstrates the presence and not the absence of the defects, e.g.
entering wrong data types for different variables, if it is accepted then defects are
present thus need to rectify the system for proper execution of tasks.
Test data: input which has been devised to test the system.
Test cases: input and output specifications and the statement of the function under test.
Design cases: improper inputs designed to test for defects
Test results: the outcome attained after testing the test data.
Test reports: final outputs, which reveal the defect test.
Conclusion on System Testing
After the test results are presented to management and the status of all required
documentation is analysed, work on the installation phase will begin. Information
pertaining to detailed time schedules; cost estimates and staffing requirements will also
be presented to management for approval. Their recommendation allows proceeding to
the implementation phase. After the test presentation is approved then a preparation of
the schedule for system installation will be done, and evaluation be established.
In conclusion, the system testing was a success as the system manages to produce results
as expected and as laid out in the system objectives. The system has the capability of
handling large volumes of data as one of the expectations. The system has also the
capabilities of handling all such kinds of error because of validation procedures it has.
5.5 Maintenance
A system that has been implemented will need to be maintained. The main objectives of
maintenance are to provide maintenance and improvements for the new system as well as
support users and help them to obtain value. Most of the time maintenance consumes
more time than the time consumed in the development.
Three maintenance strategies exist
Corrective maintenance
Corrective maintenance involves correcting faults or bugs that did not reveal themselves
during testing. This will be an on-going activity.
Adaptive maintenance
This is modifying the system so that it conforms to changes to the environment
Perfective maintenance
To correct or better or improve on system’s performance by responding to users’
additional or changing needs.
Recovery maintenance
Recovery maintenance involve a plan to fix a damaged information system as quickly as
possible. To achieve a faster recovery process, the same system will be kept at the
disaster recovery site.
5.8 Results
Customers’ ever changing needs resulted in this project becoming a necessity.
Competition in the financial services sector means that organisations should continue to
innovate to stay relevant. The emergence of 24/7 means customers requires services to be
available at any time and from anywhere. One of the bank’s strategies is smoothening of
processes and automation of manual processes is one such way of streamlining processes.
With this in mind the automation of the loan application and verification process was a
worthwhile project whose success is success for all stakeholders.
5.8.1 Findings
During the fact finding mission resistance to change was one of the things
encountered. Even though change improves the ease of doing business, people
generally do not like to change their way of life. Even employees were fearful that
reduction of processes might leave them with little to do and in future might make
them redundant.
Systems project bring their own challenges and assist in exploring new things. The
fact finding also highlighted other developments which need to be planned for and
done in the future.
Efficient utilisation of resources hardware, software or human was an interesting
discovery which if future explored would result in the organisation reducing un-
necessary expenditure.
The project also showed that using technology, organisations can become paperless
and this not only cuts costs but also saves the environment. In this day of technology,
it was observed that manual processes should be reduced to as few as possible.
5.8.3 Conclusion
Although the project took some time due to some software problems, it was an overall
success. It was a fascinating and interesting experience to undertake this project. Many
things were learnt especially implementing the theory part learnt from previous courses
and subjects. It was a long road but to complete such a mammoth task was worthwhile.
The entire project from requirements, analysis, feasibility, design and implementation
was done within the set guidelines to complete this project.
References
1. Boyce, C & Neale, P, 2006, “Conducting in-depth Interviews: A Guide for Designing and
Conducting In-Depth Interviews”, Pathfinder International Tool Series
2. Rodney Overton. (2007). Feasibility studies made simple: Martin Books.
3. Shelly, G. & Rosenblatt, H. (2012). Systems analysis and design, 9th ed. Boston, Mass:
Course Technology.
4. Stephens, R. & Plew, R. (2001). Database design. Indianapolis, Ind: Sams.
5. Accounting for Management. (2017). Payback method - formula, example, explanation,
advantages, disadvantages | Accounting for Management. [online] Available at:
http://www.accountingformanagement.org/payback-method/ [Accessed 11 Aug. 2017].
6. Akerlund, G. (2017). GFS Backups Explained. [online] BackupReview.com. Available
at: http://www.backupreview.com/gfs-backups/ [Accessed 20 Sep. 2017].
7. Architects, I. (2017). SDLC: Seven Phases of the System Development Life Cycle.
[online] Available at: https://www.innovativearchitects.com/KnowledgeCenter/basic-IT-
systems/system-development-life-cycle.aspx [Accessed 10 Aug. 2017].
8. Berman, J. (2007). Maximizing project value. New York: Amacom, American
Management Association.
9. En.wikipedia.org. (2017). Cost–benefit analysis. [online] Available at:
https://en.wikipedia.org/wiki/Cost%E2%80%93benefit_analysis [Accessed 10 Aug.
2017].
10. Khan (2017). Testing (System Analysis and Design). [online] Slideshare.net. Available at:
https://www.slideshare.net/akegoistik/testing-35043847 [Accessed 1 Sep. 2017].
11. Mukherji (2017). Entity Relationship Diagram. [online] Slideshare.net. Available at:
https://www.slideshare.net/rakhimukherji/entity-relationship-diagram-53652398
[Accessed 20 Sep. 2017].
12. Pendharkar (2017). Information system implementation, change management and
control. Available at: https://www.slideshare.net/shrutipen/information-system-
implementation-change-management-and-control-57164249 [Accessed 20 Sep. 2017].
13. Sivaprasanth Rentala (2017). Black box & white-box testing technique. [online]
Slideshare.net. Available at: https://www.slideshare.net/SivaprasanthRentala1975/black-
box-whitebox-testing-technique [Accessed 1 Sep. 2017].
14. Slideshare.net. (2017). Introduction to White box testing. [online] Available at:
https://www.slideshare.net/AliaaMonierIsmaail/introduction-to-white-box-testing
[Accessed 1 Oct. 2017].
15. Slovejoy (2017). Writing Test Cases 20110808. [online] Slideshare.net. Available at:
https://www.slideshare.net/slovejoy/writing-test-cases-20110808 [Accessed 20 Sep.
2017].
16. Software Testing Class. (2017). System Testing: What? Why? & How?. [online]
Available at: http://www.softwaretestingclass.com/system-testing-what-why-how/
[Accessed 20 Sep. 2017].
17. The Economic Times. (2017). Definition of 'Cost Benefit Analysis' - The Economic
Times. [online] Available at: http://economictimes.indiatimes.com/definition/cost-
benefit-analysis [Accessed 10 Aug. 2017].
18. Tameemyousaf (2017). Entity relationship diagram (erd). [online] Slideshare.net.
Available at: https://www.slideshare.net/tameemyousaf/entity-relationship-diagram-erd
[Accessed 20 Sep. 2017].
19. YURI56 (2017). System analysis and design project (Documentation outline). [online]
Slideshare.net. Available at: https://www.slideshare.net/yuri56/system-analysis-and-
design-project-documentation-output?next_slideshow=2 [Accessed 20 Sep. 2017].
Appendices
Appendix-A
a) User Manual
To change password click on change password and the screen below will emerge
Once a client has successfully submitted a loan application the screen like below should
emerge
Only accessible to those with rights for verification
To approve/decline incoming loan requests which have been verified, select processing
and the below screen will emerge. The approval/verification team cannot change any
client details except the loan amount which is approved.
Once a loan has been approved, it will be removed from the incoming requests screen
Appendix–B
b) SAMPLE OBSERVATION GUIDE
OBSERVATION
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………..
CONCLUSION……………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
……………………………………………………………………………………
Appendix-C
c) QUESTIONNAIRE
Dear Sir/Madam
CBZ Bank has recognized the importance of customer convenience in the loan and
mortgage application process. As part of trying to automate these processes, we are
asking customers and internal staff dealing with loans and mortgges to contribute by
filling out a questionnaire on the operations of the current system and what they think
should be done to address any challenges inherent in the system. The results of this
questionnaire will be used as requirements to develop a new automated system. This
questionnaire will take approximately five-ten minutes to complete. There are no right or
wrong answers to these questions. It is your own responses that are important.
Responses to the questionnaire will be kept anonymous and confidential.
Please return completed questionnaires by Wednesday, 10 January 2018.
Return questionnaires to Alfred Nzombe 2nd floor Sapphire Branch, Speke
Avenue/Angwa Street, Harare or by email to anzombe@cbz.co.zw
This questionnaire intends to collect information about the loan application process.
Feel free to answer it as objectively as possible.
INSTRUCTIONS:
Please do not write your name on this questionnaire.
Tick where appropriate and fill in where spaces are provided
1) Gender M F
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
___________________________
Other Comments
Appendix-D
d) Interviews
Interview questions for customers
1. How long have you been banking with CBZ Bank?
2. Have you applied for a loan before? If YES, what kind of loan was it?
2a. briefly describe the experience?
2b. How long was the application process?
2c. Did you supply all the requirements at the time of asking?
2d. in a few words summarise the entire process
3. Do you think all the information on the application form is necessary? If not what do you
think is not necessary?
4. Are you familiar with the loan products offered by the Bank?
5. What areas do you fee need improvement?
6. Would you recommend the Bank to others?
7. Is there anything else you would want to tell the interviewer about the loan process?
8. What are your views about automating the loan process to make it online?
9. Do you feel your information is safe if you supply your details online?
10. Will you be willing to use the new system?
Interview questions for bank employees
1. How long have you been working with the current system?
2. Describe the entire process from when a customer enters the bank to when the loan is
approved or rejected?
3. Briefly describe your experience using the current system?
4. What are the strengths and weaknesses of the current system?
5. In your view what needs to be changed or improved?
6. How do you feel about automating some of the processes?
7. Do you believe if automation? Why?
8. Do you think your customers will like automation?
9. Which processes would you want automated?
10. Do you believe automation will make your job easier and efficient?
……Notes……
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………………………………
………………………………………………………END………………………………………………………………................................