Professional Documents
Culture Documents
RRL Na Laging Nawawala
RRL Na Laging Nawawala
RRL Na Laging Nawawala
Lal-lo Campus
Academic Requirement
By:
Agcaoili, Monica
Calucag, Adrian
Newland, Arjay
June 2021
Chapter 1
INTRODUCTION
The literature review ofthis project covers previously researched material from different scholars
on loan security and management. Through researchers’ attempts, various theories on how loan
management has been; propagated. These theories produce systems to assist managers in loan
management, managing information systems in Microfinance institutions, existing information
reporting systems, improving management, reporting and the use of data warehousing efficiently
to improve management reporting.
On the basis of extensive literature survey related to loan management system has been taken
into consideration in this section.
Jay Chaudhari et. al. 2021, In the daily transmuting scenarios of the financial world, lenders and
students are searching for new, modern and digital techniques to manage their loans through an
automated management system that can ease their effort. The need of this system is to make the
process flexible, scalable, agile and fast while being more affordable and reliable. Student Micro
Loan Management System is an application which will provide users information with different
types of loan available for students. This application gains the headway of an understudy and
moneylender simple in giving the confirmed data about student micro loan. This project provides
the information about various details of Student micro (Tuition and facilities) loans which are
allocated for students. This task accumulates all the data of the advances. This project provides
the information about various details of education loans and makes it available to users in user-
friendly website/app.
Hao Wang, et. al., 2019, Current financial loan management systems are usually deployed in a
singleservice mode, also the transactions are not transparentand traceable to most of the roles
participating in theprocess. Their data privacy protection mechanisms are not robust enough
Akhil Sahota et. al. 2018, Today’s market is progressing with a great pace. The people are
lacking the time to accomplish all their tasks. The technology that saves time is always
appreciated whether it an automated machine in a factory or a bank providing a loan to its
customers. Most of the times, banks deal with a delay in the process due to inappropriate loan
processing system. This in some cases leads in the loss of their prospective customers. A suitable
loan management system allows the bank to provide their customers with quick loan approvals,
while at the same instance, the banks are allowed to disburse the loan amount in a fast pace
which further results in happy and satisfied customers. The key aspects of the loan management
system include reduced processing time and turnaround, ability to improve the performance
throughout and inquire in a much lesser time, tracking of status online and better document
management, minimization of errors, details required and unwanted information requirements
and better customer satisfaction with new product offerings and thus, impacting the minds of the
customers. The financial sector is growing and grooming as each day passes and thus,
introducing efficient new technologies in this sector will surely result in development of agencies
and customers. With appropriate steps and efficient technologies, the customers and the agencies
can bond together, and the financial sector can gain more foothold.
Julian VASILEV et. al., 2017, A loan management information system (for transaction
processing in credit institutions) records data for given loans, returned sums for principal,
interest and taxes. The purpose of this article is to accept or reject our assumption that the more
loans are given, the more sums are returned by customers. The main methodology used is time
series analysis. Data are analyzed in SPSS. The main proved conclusion is that incoming money
flows in credit institutions do not depend on the amount of given loans. This article is published
for the first time. This article gives notes for extending existing loan management information
systems for loan management in credit institutions and banks in the direction of business
analysis.
S. M. AKTERUJJAMAN, et. Al., 2016, SMEs all over the world have been playing a crucial
role in promoting economic development as well as industrial production. SME financing has
been identified as a major obstacle to SME growth. Unfortunately, the issue seems to be as
unresolved as it always has been. Though the majority of the issues are with the SME
themselves, the banks also have major issues in designing financial products for the SMEs. This
study tries to find out the underlying problems from the bank’s perspective. The major findings
are related to the high interest and loan duration rates, reasons for SMEs relatively informal way
of doing business in contrast to bank’s formal procedures and prerequisites, bank’s relative
inexperience in this field. They are also related to the bank’s lack of perspective, the viability and
benefits of cluster unity, approach to informal loan takers and non-usage of modern technology
and accounting procedures. The recommendations were provided based on the analysis and
findings.
Financial System :The financial system refers to a set of complex and interconnected
components that aims to regulate the flow of money in an economy through the use of financial
institutions, financial markets, financial instruments, and financial services (Das, 2018).
According to (Agarwal, 2017), the five parts of the financial system are 1. Money – the medium
to buy services and goods. 2. Financial Instruments – are formal obligations that require a party
to receive payments, examples include bonds, loans, and stocks. 3. Financial Markets – a place
where financial instruments can be sold. 4. Financial Institutions – firms that connect entities to
financial instruments and markets. 5. Central Banks – financial institutions that regulate the
supply of money and handle the overall government finances.
According to (IndaStra Global, 2016), the five basic functions of a financial system are: 1.
Savings Function – regulation of savings to control the growth of investments. 2. Payment
Function – provide a convenient way to pay goods and services, examples include credit card
payment. 3. Liquidity Function – financial institutions give investors the opportunity to liquidate
their investments. 4. Policy Function – create policies to control the macroeconomic variables
like interest rates or inflation. 5. Risk Function – provide protection using insurance.
Financial Accounting :Financial Accounting is the branch accounting that deals with generating
a company’s financial statements (Smith, 2019). The methods that can be used are the accrual
method and cash method. The accrual method records transactions when the transactions have
occurred, whereas the cash method records transactions only upon the exchange of cash (Kenton,
2020). According to (Franklin et al., 2019), the ten elements of financial statements are 1.
Revenue – income generated from selling or service by the organization. 2. Expenses – costs to
provide the goods or services by the company. 3. Gains – increase in income other than the main
revenue. 4. Losses – decrease in income outside of normal operations. 5. Assets – all the
resources the organization owns 6. Liabilities – the money the organization must pay to creditors.
7. Equity – the net worth of the organization. 8. Investment by owners – assets provided to the
organization to buy a part of ownership. 9. Distribution to owners – assets provided to owners.
10. Comprehensive income – organization’s net assets from non-owner sources.
According to (Browne, 2019), the four types of financial statements are: 11 1. Income statement
– all revenues and expenses are recorded here to calculate the net income. 2. Balance sheet – all
the financial transactions in the whole accounting life cycle are recorded here. 3. Statement of
retained earnings – shows a breakdown of a company’s earnings over a period. 4. Cash flow
statement – shows the amount of cash into and out of a company over a period. Proper
organization of financial records is vital for the long-term success of an organization (M. Martin,
2019). Improper record-keeping of financial related records can significantly affect a company’s
finances (E. J. Martin, 2019).
Financial Reporting: System Financial reporting is the act of releasing overall financial
information including financial statements, annual reports, or any financial information that the
organization wants to share with stakeholders and the public (Bragg, 2020). The International
Financial Reporting Standards (IFRS), the reporting standard used worldwide issued by
International Accounting Standards Board (IASB), are the set of common rules so all financial
statements will be consistent, transparent, and comparable around the world (Palmer, 2020). A
local version adopted from IFRS called Philippine Financial Reporting Standards is implemented
to ensure the consistency of financial reports in the country (Funa, 2018). All companies required
by law to pay taxes are mandated to file financial statements audited by an independent certified
public accountant (Isla Lipana & Co., 2020).
Financial reporting automation not only reduces potential human error by minimizing manual
intervention, it also reduces the time and cost for key processes such as billing, management,
reporting, budgeting, and general accounting by 46% (Asavin, 2019). Furthermore, automated
financial reporting can help you make crucial business decisions by giving you an overview of
your overall financial health (Shackelford, 2020).
Loan Management System A loan is a sum of money that individuals or organizations borrow
from financial institutions, that will be repaid in the future. Most of the time, there is an added
interest and/or finance charges that should be repaid in addition to the principal balance (Kagan,
2020).
According to (Corporate Finance Institute, n.d.), the following are the types of loans: 1. Secured
and Unsecured Loans – a secured loan is backed by collateral, while an unsecured loan has no
collateral backing (Majaski, 2020) 2. Open-End and Closed-End Loans – open-end loans have no
restriction of use or duration; examples include credit cards. On the other hand, closed-end loans
have a specific purpose and amount that must be repaid within a specific period of time
(Majaski, 2019) 3. Conventional Loans – a loan that is backed by private lenders, not insured by
the government (Ramsey, 2018).
Loan Management System (LMS) an application that helps in the organization and processing of
loans for clients and institutions (Al-Harbi, 2018). Lenders need a loan management system
because of the following reasons: it improves loan organization, helps mitigate errors, and
increases customer satisfaction (Salesforce, 2019). According to (Kuhlman, 2019), the benefits
of using a Loan Management System are 1. Improved Speed to Completion – automation
significantly improves the processing of loan applications and loan decisioning by eliminating
tedious, repetitive manual steps. 2. Scalability and Growth – because of the manual steps in the
loan process are eliminated, more loan volume can be processed by the organization. 3. Better
Tracking and Transparency – the system can provide a comprehensive overview of all the loans
in different stages; moreover, advanced reporting capability enables the organization to instantly
see the financial related reports of the organization 4. Better Loan Processes and Results – only
one system will handle the complete loan processing, so it is faster and easier to process multiple
loan applications.
According to (Synarion IT Solutions, 2020), the key features of an LMS are 1. Contract
management 2. Finance remittance facility 3. Extensive reporting 4. Payment collection 5. Entity
management 6. Managing information 7. Collecting and accounting for payments 8. Facility to
direct debit handling 9. Direct functionality of credit 10. Offer several tools for loans
management.
Loan Restructuring : Loan restructuring is a process used by companies to reduce interest rates
or extend due dates to avoid the risk of default on existing loans (Kopp, 2020). Usually, the
creditors change the terms of the loan agreement to keep borrowers from defaulting the loan.
(Denicola, 2020). Both the creditors and the borrower must agree on how much the borrower can
pay back the loan (O’Connell, 2017). This is an extreme option that occurs only when the
borrower is at risk of default due to different reasons (Malhan, 2020). It is projected that there
will be a wave of loan restructuring because of the enhanced community quarantine implemented
by our government to stop the spread of COVID-19 (Dumlao-Abadilla, 2020). Moreover, banks
are urged to allow borrowers to structure loans in the country (Casayuran, 2020). Also, Pag-IBIG
Fund offers a loan restructuring program to its borrowers (Kabagani, 2020).
Data Security: Data security involves putting policies, controls, and procedures to protect data
from issues including unauthorized access, accidental loss, and destruction (Mustoe, 2019). Data
protection techniques include tokenization, two-factor authentication, data encryption, access
control, and standards to limit unauthorized access (Tunggal, 2020). The three core elements of
data security are availability, confidentiality, and integrity (Buckbee, 2020).
Data is a valuable resource for organizations. Data breaches cost companies more than $3.8
million on average (Bonderud, 2019). Data must be protected from the following security threats
(Lin, 2020): 15 ● Spyware – malicious software installed on a computer installed without the
user’s knowledge ● Adware – software that displays ads through pop-ups ● Computer worms –
malicious software that automatically replicates itself in a network with the intention of opening
ASP.Net MVC :The ASP.Net MVC is a web development framework created by Microsoft
(Guru99, n.d.). It is built on top of the .Net Framework. Moreover, the framework uses an MVC
(Model-View-Controller) Design Pattern where there is a separation of concern for each of the
components (Dot Net Tutorials, n.d.). Advantages include better support for Test Driven
Development, highly maintainable code, easier management of code because the application is
separated into three parts (model, view, controller), and it offers more control over the behaviour
of the application.
Originally, web services use SOAP (Simple Object Access Protocol) to transfer data over the
internet; however, nowadays, most web services use REST (Representational State Transfer) –
another architectural style for sending data over the internet (Freeman, 2019). Furthermore, API
provides a layer of security because your 19 data is not fully exposed to the server (MuleSoft,
n.d.-b). According to (Red Hat, n.d.), the three approaches to API release policies are ● Private –
API for internal use ● Partner – shared for specific business partners ● Public – available to
everyone.
ASP.Net Web API: The ASP.NET Web API is a framework built on top of ASP.Net(Tutorials
Teacher, n.d.-b) for building cross-platform HTTP based services that can be accessed by a wide
range of applications (Mani, 2020). Applications include web, mobile, IoT, and desktop
applications (Jaiswal, n.d.).
REST API :REST is an acronym for Representational State Transfer. It is an architectural style
for APIs that was developed by Roy Fielding in his PhD dissertation in 2000 (Avraham, 2017).
REST can return JSON, XML, and YAML (MuleSoft, n.d.- a). The request is made up of four
components (Liew, 2018): ● Endpoint o URL of the request ● Body o The data you want to send
to the server ● Headers o Provide information about the request ● Method o Type of request you
send to the server o Five types of request methods: ▪ GET ▪ POST ▪ PUT ▪ PATCH ▪ DELETE.
Javascript :According to (MDN web docs, 2020), Javascript is scripting, interpreted language
mainly developed for web pages. Scripting is a program that runs directly and does not need to
HTML 5 :HTML or HyperText Markup Language is the standard markup language for web
documents to be displayed in a web browser. It is not a programming language, but rather a
markup language that provides means to create structured documents and create web elements
(Wood, n.d.). HTML5 is the fifth and latest version of HTML 21 (Marshall, 2017). New features
include new page structuring, new inline elements, dynamic pages support, and new form types
(Kyrnin, 2019).
Bootstrap :According (Bootstrap, n.d.), Bootstrap is the most popular front-end development
framework for building web and mobile responsive websites. Bootstrap can significantly
improve the speed of development time by avoiding repetitive coding; you can reuse the code
within the framework so you won’t have to reinvent the wheel (Thapliyal, 2018).
JQuery : JQuery is a Javascript library designed to simplify HTML DOM manipulation, event
handling, animation, and creating asynchronous web applications. With the use of easy-to-use
API, versatility, and extensibility, JQuery has changed the whole web development process (The
JQuery Foundation, n.d.). As of May 2019, jQuery is the most widely used Javascript library; it
is being used by 73% of the 10 million most popular websites (W3Techs, 2019).
Microsoft is helping developers create the next generation of applications. At the Build 2016
conference, Microsoft announced that it is open-sourcing Xamarin command-line tools, libraries,
runtime, and the software development kit. Xamarin capabilities and services will also be added
to Microsoft DevOps and development tools offerings to provide a comprehensive solution in all
the phases of the mobile development life cycle; (Taft, 2016).
Data Privacy Act (RA 10173) :The Data Privacy Act of 2012, the first comprehensive law about
data privacy in our country, was passed by Congress in 2012, but the implementing Rules and
Regulations (IRR) were only issued in 2016 and became enforceable on September 9, 2016
(Mundin, 2020). This act aims to protect the rights of customers’ personal information to
confidentiality by creating a set of rules and regulations for companies to regulate the collection,
handling, and disposal of all personal information (Yulo, 2018). The National Privacy
Commission (NPC) is the branch of government assigned to implement this law (Mundin, 2017).
According to (Wall, 2017), RA 10173 appliesto all individuals and legal entities that process
personal information. Moreover, the law has extraterritorial application, even if the data is to be
processed outside of the Philippines if the equipment used for the processing of personal
information is based in the Philippines. Furthermore, the act applies to all the processing of
Filipinos’ personal information regardless of where they live.
ISO/IEC 25010 The quality model is the cornerstone of a product quality evaluation system. The
quality model determines which quality characteristics will be considered when evaluating the
properties of a software product. The quality of a system is the degree to which the system
satisfies the stated and implied needs of its various stakeholders, and thus provides value. Those
stakeholders' needs (functionality, performance, security, maintainability, etc.) are precisely what
is represented in the quality model, which categorizes the product quality into characteristics and
sub-characteristics. Figure 6. Eight Quality Characteristics.
Functional Suitability: This characteristic represents the degree to which a product or systems
provides functions that meet stated and implied needs when used under specified conditions.
This characteristic is composed of the following sub characteristics: ● Functional completeness.
Degree to which the set of functions covers all the specified tasks and user objectives. ●
Functional correctness. Degree to which a product or system provides the correct results with the
needed degree of precision. ● Functional appropriateness. Degree to which the functions
facilitate the accomplishment of specified tasks and objectives.
Performance efficiency: This characteristic represents the performance relative to the number of
responses used under stated conditions. This characteristic is composed of the following sub
characteristics: ● Time behaviour. Degree to which the response and processing times and
throughput rates of a product or system, when performing its functions, meet requirements. ●
Resource utilization. Degree to which the amounts and types of resources used by a product or
system, when performing its functions, meet requirements. ● Capacity. Degree to which the
maximum limits of a product or system parameter meet requirements.
Compatibility: Degree to which a product, system or component can exchange information with
other products, systems, or components, and/or perform its required functions, while sharing the
same hardware or software environment. This characteristic is composed of the following sub
characteristics: ● Co-existence. Degree to which a product can perform its required functions
efficiently while sharing a common environment and resources with other products, without
detrimental impact on any other product. ● Interoperability. Degree to which two or more
systems, products or components can exchange information and use the information that has
been exchanged.
Usability Degree to which a product or system can be used by specified users to achieve specific
goals with effectiveness, efficiency, and satisfaction in a specified context of use. This
characteristic is composed of the following sub characteristics: ● Appropriateness
Reliability : Degree to which a system, product or component performs specific functions under
specified conditions for a specified period. This characteristic is composed of the following sub
characteristics: ● Maturity. Degree to which a system, product or component meets needs for
reliability under normal operation. ● Availability. Degree to which a system, product or
component is operational and accessible when required for use. ● Fault tolerance. Degree to
which a system, product or component operates as intended despite the presence of hardware or
software faults. ● Recoverability. Degree to which, in the event of an interruption or a failure, a
product or system can recover the data directly affected and re-establish the desired state of the
system.
Security: Degree to which a product or system protects information and data so that persons or
other products or systems have the degree of data access appropriate to their 27 types and levels
of authorization. This characteristic is composed of the following sub characteristics: ●
Confidentiality. Degree to which a product or system ensures that data are accessible only to
those authorized to have access. ● Integrity. Degree to which a system, product or component
prevents unauthorized access to, or modification of, computer programs or data. ● Non-
repudiation. Degree to which actions or events can be proven to have taken place, so that the
events or actions cannot be repudiated later. ● Accountability. Degree to which the actions of an
Maintainability :This characteristic represents the degree of effectiveness and efficiency with
which a product or system can be modified to improve it, correct it or adapt it to changes in
environment, and in requirements. This characteristic is composed of the following sub
characteristics: ● Modularity. Degree to which a system or computer program is composed of
discrete components such that a change to one component has minimal impact on other
components. ● Reusability. Degree to which an asset can be used in more than one system, or in
building other assets. ● Analysability. Degree of effectiveness and efficiency with which it is
possible to assess the impact on a product or system of an intended change to one or 28 more of
its parts, or to diagnose a product for deficiencies or causes of failures, or to identify parts to be
modified. ● Modifiability. Degree to which a product or system can be effectively and efficiently
modified without introducing defects or degrading existing product quality. ● Testability. Degree
of effectiveness and efficiency with which test criteria can be established for a system, product or
component and tests can be performed to determine whether those criteria have been met.
Portability : Degree of effectiveness and efficiency with which a system, product, or component
can be transferred from one hardware, software or other operational or usage environment to
another. This characteristic is composed of the following sub characteristics: ● Adaptability.
Degree to which a product or system can effectively and efficiently be adapted for different or
evolving hardware, software or other operational or usage environments. ● Installability. Degree
of effectiveness and efficiency with which a product or system can be successfully installed
and/or uninstalled in a specified environment. ● Replaceability. Degree to which a product can
replace another specified software product for the same purpose in the same environment.
Likert Scale: Likert Scale is a rating scale that measures people's sentiment on a certain topic. An
effective Likert scale has 5-7 balanced responses people can choose from that have 29 a neutral
midpoint to measure the level of agreement (Liedke, 2020), each of the answers has an
equivalent value so that all the answers can be analyzed quantitatively (Bhandari, 2020).
Relational databases make storage and retrieval of data easier by using rows and columns
(Christensson, 2017). SQL is the main language for data manipulation in an RDBMS (Rouse,
2019b).
SQL (Structured Query Language) :SQL is a standard language for accessing and manipulating
databases. In 1986 and 1987, SQL became the standard of ANSI and ISO respectively
(W3Schools, n.d.). E.F. “Ted” Codd, a computer scientist at the IBM San Jose Research
Laboratory, was the first one who worked out the theory of relational model in the 1960s and
published it in 1970, his paper will later become the theoretical basis for relational databases
(Heller, 2019). According to (SQLCourse, n.d.), some common relational database 31
management systems that use SQL are Microsoft SQL Server, Oracle, Access, etc. Here are the
basic SQL commands based on (Carnes, 2020): ● SELECT ● UPDATE ● DELETE ● INSERT.
Kingsley O. et al. (2013) state that the concept of automation has been variously applied in most
computing fields. This involves utilization of computing or electronic devices to undertake the
tasks that are being handled by people. It is a pertinent factor in a profitable and soundly run
financial institutions. Financial transactions through manual system of operation are prone to
errors and unimagined complexities, making it so difficult a task maintaining all entries of users
account, search records of activities, handle loan deduction errors and generate reports.
Computers running automated system are targeted towards eradicating the menace-hence making
the underlying activities efficient and providing the fast response needed.
In addition to, Green et al. (2003) also said that an automated system and method for
reviewing and assessing compliance with legal compliance requirements for loan applications.
Loan application data is extracted from client loan origination systems and transmitted as a loan
information file over a secure communication network to an automated compliance assessment
system server where the loan information file is audited for compliance with Federal, state and
local legal compliance requirements. The loan information file is reviewed for legal compliance
requirements imposed by Federal, State, and Local jurisdictions, as well as licensing
requirements that the client loan company and related personnel must satisfy.
SUMAN JAIN (Ethiraj College for Women) ”A study on personal loan of HDFC” In the year of
2008-2009. To identify loan’s type and disbtarsement by HDFC and concluded personal loans
are disbursed without complex procedures, mechanism in such a way it earns can good return,
where there are no defaulters. To make the customer aware of the schemes and the offers, the
bank should position its brand, market analysis and the customer research. The bank must
manage its working sometimes they need a loan for medical emergency and car repairs to makes
the aware of the offers and schemes, personal loan as well as better response of people as today
Personal loan is required for fulfil the requirement of life.
JASVEEN “ICICI Financial Personal Loan” its helpful marriage related expenses or child higher
education. ICICI competitors like HDFC, reliance etc. There might have been a tendency among
the respondents to amplify or filter to their response under the testing condition.
Strength ofthe existing management system. Paper based system is cheap and easy to implement.
It is cheap in terms of costs because the staff does not spend a lot of money to purchase paper
and files compared to purchasing hardware, software and maintaining them.
Weakness of the existing management system. The existing management system has a lot of
weakness, these include: Retrieval of clients’ record is difficult and time wasting as it takes a lot
of time to search for a particular file as they are very many. Updating of client’s record is hard
and at times impossible. Clients’ records can easily be misplaced and lost due to the large
number of files. There is also space wasting since files are kept in a store that needs a lot of
space. This process is problematic because ofthe vulnerability for incorrect data entry. Clients’
information can only be accessed while at the premises ofthe Micro Finance -I-
Related Research The expenses incurred by the borrower in complying with the directed credit
program monitoring and proposing Requirements entailed in managing multiple lines of credit
boost these costs. Costs include opportunity costs of time spent in navigating cumbersome
borrowing procedures, transportation costs on monitoring, costs of providing acceptable
collateral and in some cases bribes to influence lending, Desai and Mellor (1993). There is
therefore need to build a system that can help to minimize this costs through the web technology.
Web overview: The world wide web started in 1990 at the counsel European pour le Recherché
Nuclear (CERN) in Switzerland’s in that time the laboratory was facing difficulties while they
Web Research :This study included conducting web research on the different MFIs and articles
on pride Microfinance.
Web application: Casals (2005) defined the web application as a software application that will
deliver its thnctionality to a user from a web sewer, through a network such as the World Wide
Web or intranet. A web application is a collection of logically connected web pages managed as
a single entity, a web site, on the other hand, will contain one or more that will result from
different contracts with the customer (Auckland, 2004). The fhndamental purpose of the web
application is to thcilitate the completion of one more task (Baxley 2003). The software and
database exit on a central sewer rather than being installed on the desktop system is accessed
over a network .web-based application are the ultimate way to take advantage of today’s
technology to enhance efficiency, and give the opportunity to access information from anywhere
at any time saving money and improving interactivity.
Web Loan management System According to Securities Exchange Act of 1934, security is property,
which is pledged as collateral for a loan. It is a binding pledge made by lender to the borrower
to make a loan usually at a stated interest rate within a given period of time for a given purpose, subject
to the compliance of the borrower to stated conditions. Collateral security is an additional security
supplied by the borrower to obtain a loan. Most commonly used to mean some security in addition to the
personal obligation of the borrower to repay a loan. There are two kinds of loans that the groups are
getting. First is agricultural loan and second is term loan. Presently most of the loans disbursed to SHGs
are agricultural loans that are of oneyear duration. A SHG can get a loan from the bank if it has saving of
minimum of 50000 Ugandan shillings. Generally SHO takes six to twelve months to reach the required
Pride Management Information: System The microfinance sector is also quite diverse in its use
of information systems. Generally there are the following three types:
Manual System: Some MFIs still rely on manual systems, which involve maintenance ofrecords
in forms and ledgers. Organizations having manual systems are either small Micro-credit
programs or NGOs.
Semi- Automated System :More than 50% of IVIFIs are operating in a semi automated mode.
Within this category, the spreadsheet is the common tool being used either in conjunction with a
manual system or with an MIS application that does not fhlfill the information requirements of
the MFI. The majority of non-regulated MFJs will semi automated systems.
Fully Automated System :Few MFIs are fortunate enough to have a ffilly automated and
integrated MIS fUlfilling the whole information requirements ofthe organization. Such systems
will be existent with banks or regulated MFIs.
Loan Management System :The L M System is a complete multi-user loan management system.
It was created to be used to control the day to day transactions as well as offer comprehensive
management information. This will be specifically designed to meet the unique requirements of
organizations with Installment Debtors. The system can be used by banking institutions, micro-
lenders, financiers as well as retail institutions using installment sale type transactions e.g.
Furniture companies, computer companies. The system was designed to cater for the tracking of
a deal from the quoting stage right through to the settlement or natural expiry. It will handle all
the unique requirements ofthis industry such as repossessions, electronic payments, structured
collections. radiances etc.
Ever First Loan Corporation Loan Management System: According to Cerquit Loans Developer
(2013).Application of loans, managing receivables, financial assistance, collections, and creating
reports. It aims to promote productivity, efficiency and convenience to not just collection
officers, but to the managers, executives and business owners. Ever first has been providing short
term pension loans to SSS pensioners in the Philippines, and in this short span of time, they have
grown to thirty-five branches with more than one-hundred service-oriented employees. We are
inspired by their mission to provide financial assistance to our fellow Filipinos with such
integrity and dedication.
Mortech Loan Management System: According to Lincoln, Nebrasca (2011). Mortech launches
all-inclusive front-end loan management system by using bull’s eye solution a mortgage
technology software company which offers full automated underwriting system and credit and
document management platforms to speed entire loan closing cycle. They use Mortech Loan
Management System to allow their loan officer the freedom to price scenarios with instant result
in an easy to use interface. Also it allows the freedom to customize down to a very detailed level
Conceptual Framework
IPOO diagram
Definition of Terms
Chapter 2
Project Design
System Architecture
Use Case Diagram
Context and Data Flow Diagrams
Database Schema [with Table Attributes and Domains]
Wireframes (User Interface)
Data Analysis