Nothing Special   »   [go: up one dir, main page]

Academia.eduAcademia.edu

Improving Internship Management in Higher Institutions of learning

This thesis discusses the analysis and implementation of an information system for improving the management of internship program in higher institutions of learning a case study of the University of Kisubi. The system is meant to aid in supervisor allocation of interns, track the student’s internship activities and help in students’ internship evaluation. The study was done at the University of Kisubi (UniK), located 24 Kilometers from Kampala, The Capital City of Uganda, along Kampala-Entebbe Highway Wakiso District. To develop a system that will improve the management of internship program at the University of Kisubi that can help to establish a linkage between students and business organizations for career development opportunities. The Study of current practices of how internship is done at the University of Kisubi (UniK) established that the old internship system was handling each aspect of the internship independent of the other. By providing a common platform for integration of all the internship management aspects within the new system, the University can now utilize the system to access all information on the students’ internship at a central point. The study reviewed copious sources of literature related which resulted in a list of references for the recognition of the different scholars for their tremendous contribution to the overall body of knowledge. Design science paradigm was used together with qualitative research strategy and case study method to conduct the study. The data needed for the research was collected using self-administered interviews, observation and document review methods and questionnaires. An information system was analyzed and designed using HTML5, CSS, JavaScript and PHP and its prototype implemented to address the limitations of the current internship system used at UniK. The system provides different forms for data collection, a central database for storage of data and inbuilt scripts to aid report generation. The study was concluded by pointing out numerous recommendations for a better system.

By Aloyzious IMPROVING INTERNSHIP MANAGEMENT IN HIGHER INSTITUTIONS OF LEARNING: A case study of University of Kisubi (Unik) By SSENTEZA ALOYZIOUS 15MIT011 A RESEARCH DISSERTATION SUBMITTED TO THE SCHOOL OF GRADUATE STUDIES AND RESEARCH IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF THE DEGREE OF MASTER IN INFORMATION TECHNOLOGY OF UGANDA MARTYRS UNIVERSITY (Nkozi). August, 2017 DECLARATION I, Ssenteza Aloyzious, hereby declare that this research titled “Improving Internship Management in Higher Institutions of Learning” is my original work and has never been submitted to any other University for any academic credit. Signed: …………………………………………………… Ssenteza Aloyzious Date: ……………………………………………….. i APPROVAL This Research Dissertation by Ssenteza Aloyzious titled Improving Internship Management in Higher Institutions of Learning: A case study of University of Kisubi (Unik), was done under my supervision and is now ready for submission. Signature ………………………………………… Date: ………………………. Mr. Othieno Joseph Supervisor ii DEDICATION I dedicate this research to my lovely Aunts Sister Josephine Nakaggwa and Nantongo Betty, My Uncle Bro. Deo Mugema, my only brother Matovu J.B and my loving wife Nakabiri Evelyn and our children Austin and Nicole. iii ACKNOWLEDGEMENT I wish to acknowledge that I received counsel, and support from so many people that mentioning names is not possible within the confines of this page. Those mentioned here only represent people whose encouragement and support made this study possible. Special thanks go to my supervisor Mr. Othieno Joseph, the staff colleagues of UniK, Unik students and to all my lecturers for their inspiration and encouragement. I am equally indebted to the participants who volunteered information I needed to complete this study. I especially wish to acknowledge the help of collaboration of UniK students. I also wish to extend my heartfelt gratitude to my family for the moral, material and financial support they accorded me. Special thanks go to my Aunt Sr. Mary Josephine Nakaggwa, Bro. Deo Mugema and Mummy Betty without whose hand and unwavering support this study would have remained but a dream. Together with my wife Evelyn Nakabiri, you have been a source of strength throughout the course. Special thanks to the family of Mr. Matovu Edward and Nakimera Sarah of the United states of America for all their generous contribution towards the success of this research. I thank all my MIT classmates for encouraging me to stay on course. Special thanks go to Fr. Maria Assumpta, Sr. Gatrude, Ssozi Hassane, Mungoma James, Najjingo Victoria, Naboth, and Juliet for your comradeship. iv TABLE OF CONTENTS DECLARATION.............................................................................................................................. i APPROVAL ....................................................................................................................................ii DEDICATION................................................................................................................................iii ACKNOWLEDGEMENT ............................................................................................................. iv TABLE OF CONTENTS ............................................................................................................... v LIST OF FIGURES ........................................................................................................................ x LIST OF ACRONYMS ................................................................................................................. xi ABSTRACT ...................................................................................................................................xii CHAPTER ONE: GENERAL INTRODUCTION ...................................................................... 1 1.0 Introduction ............................................................................................................................. 1 1.1 Background to the Study......................................................................................................... 1 1.2 Problem Statement .................................................................................................................. 2 1.3 Main Objective........................................................................................................................ 2 1.3.1 Specific Objectives .......................................................................................................... 2 1.3.2 Research Questions: ......................................................................................................... 3 1.4 Study Scope ............................................................................................................................ 3 1.4.1 Geographical scope .......................................................................................................... 3 1.4.2 Time scope ....................................................................................................................... 4 1.4.3 Subject Scope ................................................................................................................... 4 1.5 Significance/ Justification of the Research Study................................................................... 4 1.7 Limitation................................................................................................................................ 5 CHAPTER TWO ............................................................................................................................ 7 LITERATURE REVIEW .............................................................................................................. 7 2.0 Introduction ............................................................................................................................. 7 2.1 Problems/ challenges associated with Internship management in higher institutions of learning and how they can be solved. ........................................................................................... 7 2.2 How Internship programs operate in higher institutions of learning and their benefits ......... 8 2.3 Advantages of Internship systems in higher institutions of learning ...................................... 9 2.4 Research approaches ............................................................................................................... 9 2.4.1 Qualitative and quantitative research approaches. ........................................................... 9 v 2.4.1.1 Quantitative approach ................................................................................................... 9 2.4.1.2 Qualitative research approach ....................................................................................... 9 2.5 Research methods ................................................................................................................. 10 2.5.1 Design science ............................................................................................................... 10 2.5.2 Case studies .................................................................................................................... 11 2.5.3 Action research .............................................................................................................. 11 2.6 Data collection and Analysis ................................................................................................ 11 2.6.1 Observation .................................................................................................................... 11 2.6.2 Interviews ....................................................................................................................... 12 2.6.2.1 Types of Interviews..................................................................................................... 12 2.6.3 Document review ........................................................................................................... 13 2.7 Information Management...................................................................................................... 13 2.8 Information Management Concepts ...................................................................................... 14 2.8.1 Databases ....................................................................................................................... 15 2.8.2 Database modeling ......................................................................................................... 16 2.8.2.1 Advantages of the Relational Model........................................................................... 16 2.8.3 Use Case Modeling ........................................................................................................ 16 2.8.4 Data Modeling ............................................................................................................... 17 2.8.5 The Entity-Relation Model (ER) ................................................................................... 17 2.9 Database Systems.................................................................................................................. 18 2.9.1 Database Management systems ......................................................................................... 19 2.9.1.1 Benefits of Database Management Systems ............................................................... 19 2.10 Database System Development Approaches ...................................................................... 20 2.10.1 Prototyping - Chosen ................................................................................................... 22 2.11 Conclusion .......................................................................................................................... 22 CHAPTER THREE ...................................................................................................................... 23 METHODOLOGY ....................................................................................................................... 23 3.0 Introduction ........................................................................................................................... 23 3.1 Research Design.................................................................................................................... 23 3.2 Methods of the research ........................................................................................................ 23 3.2.1 Design science research method. ................................................................................... 23 vi 3.2.2 Case study method ......................................................................................................... 24 3.3 Study population ................................................................................................................... 24 3.4 Sample size ........................................................................................................................... 24 3.4.1 The table below shows the Sample size ......................................................................... 24 3.5 Sampling technique ............................................................................................................... 25 3.6 Data Analysis ........................................................................................................................ 25 3.7 Validity ................................................................................................................................. 25 3.8 Reliability.............................................................................................................................. 26 3.9 Data Collection Methods and Research Instruments ............................................................ 26 3.9.1 Primary Data Sources. ................................................................................................... 26 3.9.2 Secondary Data Sources .................................................................................................... 27 3.10 Data Collection Instrument ................................................................................................. 27 3.10.1 Interview Guide ........................................................................................................... 27 3.11 Questionnaire ...................................................................................................................... 27 3.12 System Development and Implementation ......................................................................... 28 3.13 Conclusion .......................................................................................................................... 28 CHAPTER FOUR ......................................................................................................................... 29 RESEARCH FINDINGS AND ANALYSIS ............................................................................... 29 4.0 Introduction ........................................................................................................................... 29 4.1 Background of University of Kisubi ..................................................................................... 29 4.2 Description of the study respondents .................................................................................... 30 4.3 Problems of the current internship management System ...................................................... 31 4.4 Solution to the problems of the current internship system ............................................... 42 4.5 logical designs ........................................................................................................................... 31 4.5 System Requirement ......................................................................................................... 32 4.5.1 Functional Requirements ............................................................................................... 32 4.5.2 Non-Functional Requirements ....................................................................................... 33 4.5.2 Activity Diagram ................................................................................................................... 44 4.6 Conclusion ............................................................................................................................ 45 CHAPTER FIVE .......................................................................................................................... 46 SYSTEM DESIGN ........................................................................................................................ 46 vii 5.0 Introduction ........................................................................................................................... 46 5.1 Functional Design Specification ........................................................................................... 46 5.2 Database Design.................................................................................................................... 47 5.2.1 Logical Database Design ............................................................................................... 47 5.2.2 Entity Relationship Design ............................................................................................ 48 5.2.3 Entity relationship diagram ............................................................................................ 49 5.2.4 Physical Database Design .............................................................................................. 51 5.2.6 Hardware and Software Specification ............................................................................... 52 5.3 Structure Interface Design .................................................................................................... 53 5.4 User Interface Design ........................................................................................................... 55 5.5 Security Design ..................................................................................................................... 59 5.6 System Implementation and Operation ................................................................................. 59 5.6.1 System Construction and Programming (Coding) ......................................................... 60 5.6.2 Implementation Plan ...................................................................................................... 60 5.6.3 Database and Script Development ................................................................................. 61 5.7 System Testing and Quality Assurance ................................................................................ 62 5.7.1 System Testing ............................................................................................................... 62 5.8 System Installation ................................................................................................................ 63 5.8.1 Hardware installation ..................................................................................................... 63 5.7.2 Software installation ...................................................................................................... 64 5.8 System Deployment .............................................................................................................. 64 5.9 Maintenance and system enhancement ................................................................................. 64 5.9.1 User Interface Implementation. ..................................................................................... 65 5.10 End User Training ............................................................................................................... 69 5.11 Conclusion .......................................................................................................................... 70 CHAPTER SIX ............................................................................................................................. 71 GENERAL SUMMARY, CONCLUSIONS AND RECOMMENDATIONS ......................... 71 6.0 Introduction ........................................................................................................................... 71 6.1 Research Report Summary ................................................................................................... 71 6. 2 General Conclusion of the Study ......................................................................................... 72 6. 3 Challenges ............................................................................................................................ 73 viii 6. 4 Recommendations ................................................................................................................ 73 6. 5 Further Work on the System ................................................................................................ 74 6.6 Conclusion ............................................................................................................................ 74 REFERENCES .............................................................................................................................. 75 APPENDICES ............................................................................................................................... 81 ix LIST OF FIGURES Figure 1: The Systems Activity Diagram ....................................................................................... 44 Figure 4. 1: The current business process of handling internship activities ................................... 43 Figure 4. 2: Context level data flow diagram ................................................................................. 32 Figure 4. 3: Functional decomposition diagram for the new internship management system ....... 35 Figure 4. 4: Event data flow diagram for ims ................................................................................. 38 Figure 4. 5: Activity diagram .......................................................................................................... 44 Figure 5. 1: Entity relationship diagram ......................................................................................... 50 Figure 5. 2: The architectural design of the system ........................................................................ 51 Figure 5. 3: The system structural design for the student ............................................................... 53 Figure 5. 4: The system structural design for the university secretary ........................................... 54 figure 5. 5: The system structural design for the university supervisor .......................................... 55 figure 5. 6: Home page design ........................................................................................................ 56 figure 5. 7: Login interface ............................................................................................................. 56 figure 5. 8: Students’ application forms .......................................................................................... 57 figure 5. 9: Secretary’s panel .......................................................................................................... 57 figure 5. 10: Assigning supervisors by secretary ............................................................................ 58 figure 5. 11: View students assessment .......................................................................................... 58 figure 5. 12: Error message ............................................................................................................. 58 figure 5. 13: Confirmation message ................................................................................................ 59 figure 5. 14: The system’s home page ............................................................................................ 65 figure 5. 15: Login page .................................................................................................................. 65 figure 5. 16: The signup page ......................................................................................................... 66 figure 5. 17: Student registration form ............................................................................................ 66 figure 5. 18: Daily routine form/ logbook page .............................................................................. 67 figure 5. 19: View announcements page ......................................................................................... 67 figure 5. 20: Assessment page ........................................................................................................ 68 figure 5. 21: Secretary add announcement page ............................................................................. 68 figure 5. 22: Allocation of supervisor page .................................................................................... 69 figure 5. 23: View students assignment page.................................................................................. 69 x CSS LIST OF ACRONYMS Cascading Style Sheet DBMS Database Management System GUI Graphical User Interface DFD HTTP Data Flow Diagram Hypertext Transfer Protocol ICT Information Communications Technology KBUC MS Kisubi Brothers University College Microsoft RDBMS Relational Database Management System SQL Structured Query Language IMS PHP SNMP UMU UniK UPS Internship Management System Hypertext Preprocessor Simple Network Management Protocol Uganda Martyrs University University of Kisubi Uninterruptible power supply xi ABSTRACT This thesis discusses the analysis and implementation of an information system for improving the management of internship program in higher institutions of learning a case study of the University of Kisubi. The system is meant to aid in supervisor allocation of interns, track the student’s internship activities and help in students’ internship evaluation. The study was done at the University of Kisubi (UniK), located 24 Kilometers from Kampala, The Capital City of Uganda, along Kampala-Entebbe Highway Wakiso District. To develop a system that will improve the management of internship program at the University of Kisubi that can help to establish a linkage between students and business organizations for career development opportunities. The Study of current practices of how internship is done at the University of Kisubi (UniK) established that the old internship system was handling each aspect of the internship independent of the other. By providing a common platform for integration of all the internship management aspects within the new system, the University can now utilize the system to access all information on the students’ internship at a central point. The study reviewed copious sources of literature related which resulted in a list of references for the recognition of the different scholars for their tremendous contribution to the overall body of knowledge. Design science paradigm was used together with qualitative research strategy and case study method to conduct the study. The data needed for the research was collected using selfadministered interviews, observation and document review methods and questionnaires. An information system was analyzed and designed using HTML5, CSS, JavaScript and PHP and its prototype implemented to address the limitations of the current internship system used at UniK. The system provides different forms for data collection, a central database for storage of data and inbuilt scripts to aid report generation. The study was concluded by pointing out numerous recommendations for a better system. xii CHAPTER ONE: GENERAL INTRODUCTION 1.0 Introduction This chapter focuses on the background of the study which points out the origin of the problem, the problem statement which describes the study problem in a detailed way, main and specific objectives of the research, the research questions which will guide the researcher during the research process, and significance of the study, study scope which defines the boundaries of the study in terms of time, content, theory, context and the sample area (geographical scope). The chapter also includes ethical issues and limitations of the research. 1.1 Background to the Study According to Furco (1996), internships are defined as programmes engaging students in service activities primarily for the purpose of providing them with hands-on experience that enhances their learning or understanding of issues relevant to a particular area of specialization. McMahon and Quinn (1995) noted that internships are supervised work experiences whereby students leave their institutions and get engaged in work related programmes, during which period they are closely supervised by experienced job incumbents. Internships are therefore any carefully monitored piece of work or service experience in which an individual has intentional learning goals and reflects actively on what she or he understood as regard to theories of classroom learning (Cook et al., 2004; Hymon-Parker, 1998). According to Meaghan Haire and Kristi Oloffson, Internship programs have produced several successes: Bill Gates was once a congressional page, Oprah Winfrey worked at a CBS affiliate during her college years, just to name a few. The developments of the computerized management systems are expanding over the past years and most of these systems are increasingly substituting the manual system. For instances, there are the registration system, clinic system, hotel management systems and so on that are widely used. However, despite those technological advancements, the field of Internship management is still unattended to especially in third world countries like Uganda. The Internship process is still manual and inefficient in many institutions of higher learning which renders these institutions a great challenge in allocating supervisors, monitoring of students activities and also handling the 1 growing number of students undergoing internship training. Worse still, when students report for internship training, they need to make a self-report manually by filling in the form in the logbooks. While student undergoing the training, they have to write in the logbooks activities they have carried. Other than that, students’ performance also assessed and recorded in logbooks by supervisors every turn of supervision. Furthermore, logbooks can easily be damaged. Several studies done elsewhere indicate and conclude that a gap really exists between the quality of graduates produced and what the market demands (Mpairwe, 2010). For this and other reasons, training institutions and employers have accepted the need to seek mitigatory steps to bridge the gap. Papers can be misplaced, bias in allocating supervisors, poor monitoring of the internees and luck of efficient means of controlling and management of students’ affairs during the internship. It was on this basis that the researcher carried out this study in order to develop a computerized system that can effectively control and manage industrial training related affairs, and can efficiently complement the management process as compared to the manual system. 1.2 Problem Statement The current system of managing Internship activities in higher institutions of learning in Uganda and other developing parts of the world is still characterized by manual and inefficient processes despite the technological innovations and developments, This renders a great challenge in allocating supervisors, monitoring of students activities, managing internship records and also handling the growing number of students undergoing internship training. This triggered the mind of the researcher to carry out an investigation in order to improve the industrial training management. 1.3 Main Objective To develop a system that will improve the management of internship program at the University of Kisubi that can help to establish a linkage between students and business organizations for career development opportunities. 1.3.1 Specific Objectives 1. To find out the challenges associated with the current internship management system so as to come up with a computerized system as a solution to assist in the management of 2 internship activities at University of Kisubi (Unik) as well as finding out the existing literature in relation to the study. 2. To analyze the requirements of the new internship management system. 3. To develop and test functionality of the new system in order to ensure that it meets the functional and non-functional requirements. 1.3.2 Research Questions: The researcher was guided by the following research questions 1. What are the problems associated with the management of internship at UniK and how can these problems alleviated? 2. What are the requirements and what design technologies are required for the new Internship management system? 3. How should the system functionalities be tested for the developed Internship system to ensure an error free system? 1.4 Study Scope The scope of the study was divided into three: Geographical, time scope and content/subject scope. 1.4.1 Geographical scope The study was conducted in educational institutions particularly higher institutions of learning in Uganda where students are given a chance to go outside classroom environment and gain practical experience in their fields of specialization. UniK was chosen by the researcher to represent other areas facing a similar challenge. The study focused on understanding how Internship is managed in higher institutions of learning particularly at the University of Kisubi. Thus, the researcher put more emphasis on collecting data from various stockholders ranging from teachers/ lecturers, heads of departments, and students undergoing internship exercise at the University of Kisubi. The study took into account understanding the various design technologies including software and programing languages for an improved Internship management system. At the end of conceptualization of all the above aspects, the researcher was able to come up with an 3 appropriate solution that is efficient and flexible and can help to achieve the organization goals mission and vision, and objectives. 1.4.2 Time scope The study was conducted in a period of twelve (12) months between August 2016 and August 2017. 1.4.3 Subject Scope The main function of the system is the allocation of supervisors to interns as well as keeping track of students’ internship activities. The system must be able to allow the secretaries to allocate the students to their supervisors and secured companies once it reaches the time for the internship. Furthermore, the system must be able to save the information and allow secretaries to retrieve and to view the students' secured companies, their supervisors, and their internship progression. A notification module allows the coordinator to inform all the students and supervisors to fill up student evaluation forms before the end of industrial training and any other information that is needed to be communicated to the internship participants. By using this module, secretaries are able to broadcast any message to all the supervisors instead of informing them one by one and by mouth or phone. This function can help to speed up the process and saving time. Before training is started, students must be informed to log in to the system to fill up their company details to allow proper allocation of supervisors to the interns. 1.5 Significance/ Justification of the Research Study The study added knowledge and understanding to the already existing literature so that the strategies for having well restructured and automated online systems are implemented even in other sectors of the economy for example in agriculture, in sports to mention but a few. Furthermore, the study generated insights and information to administrators, industrial companies, and training institutions to offer the best hands-on experience to students undergoing internship exercise. 4 More still, if the system is implemented, it will lead to improved productivity, efficiency and proper timely decision making since there will be improved processes and the use of computerized Internship management system with reliable Security features. Furthermore, the study is now a source of literature for those intending to do further research on Internship. 1.6 Ethical considerations The primary ethical imperative for the researcher is this: “Tell the Truth”. This instructed the researcher to refrain from fabricating data, or from deliberately structuring a research study so that demand characteristics or social pressure will produce the results that the researcher wants for some personal or political reason. It helped the researcher interpret the data objectively, and report all results accurately, whether were good or bad (from the perspective of the researcher). During the research, the researcher considerably reflected on educational professional ethics as follows: The questionnaires were the same to all respondents in order to avoid suspicion and victimization of respondents. The researcher ensured confidentiality to his informants over the information gathered, so as not to harm any respondent. The filled questionnaires were taken away as soon as they were finished. After data collection and even receiving a questionnaire from the respondent, a researcher always appreciated the respondents’ contribution towards the research by thanking them. Very importantly, the issue of plagiarism was well addressed by the researcher through recognizing all the sources where relevant information was acquired and referencing the authors for the job well done in contributing to the body of knowledge. 1.7 Limitation During the study, the researcher faced with the following limitations; More still, the researcher lacked adequate capital to employ the research assistants, meeting transport costs, buying stationary as well as typing and printing expenses. 5 Other than that, there was a likelihood of receiving inadequate information due to the busy schedules, fear and unwillingness to provide relevant information by informants even though the researcher was ready to assure confidentiality and anonymity to the respondents. Two of the questionnaires were not returned by the respondents because they were reluctant and not interested in responding and therefore end up misplacing them thus affecting the results of the study. 1.8 Conclusion To sum-up all, considering the missing gaps in the Internship management in higher institution of learning, with the rate at which technology is growing, the researcher found worth carrying out the study in order to improve on the existing Internship management systems in higher learning institutions. The research questions guided the researcher in order to achieve the stated objectives of the study. Additionally, the study was carried out in consideration of passed researched works related to Internship and the researcher derived the best methodology to be adopted during the research as can be seen in more detail in the next chapter (Literature Review). 6 CHAPTER TWO LITERATURE REVIEW 2.0 Introduction This chapter presents documented evidence and ideas from other researchers’ works that were relevant to the project’s context. It contains reviews of copious sources where the researcher borrowed constructive ideas that are deemed ideal for the fulfillment of this research. It also focuses on summary and synthesis of work products related to this study and various areas that are relevant to the subject area. Literature Review is an extensive search of the information available on a topic which results in a list of references to books, periodicals, and other materials on the topic (Board of Regents of the University System of Georgia, 2008). Reviews included the problem area, application area, Methodological issues, information management, technologies and concepts of information management and database system development approaches. According to the International Centre for Eye Health, London (2007), Furco (1996), internships are defined as programmes engaging students in service activities primarily for the purpose of providing them with hands-on experience that enhances their learning or understanding of issues relevant to a particular area of study. A literature review is an explanation and summary of key studies relevant to a proposed project. 2.1 Problems/ challenges associated with Internship management in higher institutions of learning and how they can be solved. Each university in Uganda and other tertiary institutions all over the world conduct a programme called the Industrial Training Programme for a certain time of period for its students before they can graduate with a degree, diploma or even Masters for some Universities. According to Binti Ismail (2006), the developments of computerized management systems are expanding over the past years and most of these systems are increasingly replacing the manual systems. For instance, there are the registration systems, clinic systems, hotel management systems that are widely used. 7 Ogheneruemu and Tiemo (2007) also emphasize the need to expose trainees to ICT facilities. Despite all those technological advancements, only a few universities have a full computerized system in managing the programme in the whole world. And for the Ugandan case, almost none of the higher institutions have endeavored to design or acquire a fully computerized Internship management system, not even the most famous ones like Makerere and Mbarara Universities. A few researches have been conducted on the industrial training programme management system notwithstanding the numerous advantages of internship training to the human resource capital of an economy. Nevertheless, little or no effort has been taken to improve Internship management in Uganda and in many parts of the developing world even with the technological advancements in many sectors of the economy. Also, Orrell (2004) and Patrick et al., (2008), emphasize that, Instead of building and applying skills through workplace practice, employers are seeking graduates with a range of technical and generic skills that minimize additional on-the-job training by employers. 2.2 How Internship programs operate in higher institutions of learning and their benefits According to NORRAG (2007), internship in manufacturing and hospitality sectors are offering practical training opportunities to students from institutions, colleges and universities. After the liberalization of the economy, Companies like Uganda Breweries Limited, Century Bottling Company Limited, and Kakira Sugar Works are indispensable in the training programmes for technical skills. In addition, Private primary and secondary schools support teacher training programmes through school practice placements. Ministry of Education Science and Technology of Uganda (MoES, 2013) is also supporting skills development in the nonformal sector. Musoke (2007), stresses the fact that changes in demands needs skilled and innovative well trained librarians who can meet the need of users. According to Sheldon & Thornthwaite (2005), the Contemporary debate focuses on employability skills, which expresses a view that graduates must come to workplaces ready to hit the ground running in order to better face increased competition in the graduate employment market. 8 2.3 Advantages of Internship systems in higher institutions of learning According to Tackett et al (2001), internships have taken on an increasingly important role in education over the past decade since they present students with many advantages, ranging from gaining experience and obtaining career-related direction to networking with other students from various institutions as they are at the organization providing the internship (Lubbers, 2008). The learning or parent institutions offering internship programmes have also benefitted through increased cooperation and rapport with the industry (English and Koeppen, 1993), Rothman, (2007); Cannon and Arnold, (1998); Employers have not been left out of the benefits as internships can provide them with inexpensive help, though at times complaints have been raised by employers for treating the interns as cheap labour. 2.4 Research approaches 2.4.1 Qualitative and quantitative research approaches. According to Pope and Mays (1999), the distinction between qualitative and quantitative research has had a remarkable break-through in the social sciences, including psychology. The contrast with quantitative research usually comes as part and parcel of the notion of qualitative research. 2.4.1.1 Quantitative approach It is defined as research that explains phenomena according to numerical data which are analysed by means of mathematically based methods, especially statistics. From a broader perspective, it can be defined as a type of empirical research into a social phenomenon or human problem, testing a theory consisting of variables which are measured with numbers and analysed with statistics in order to determine if the theory explains or predicts phenomena of interest (Creswell, 1994; Gay & Airasian, 2000). 2.4.1.2 Qualitative research approach According to Gay and Airasian (2000) is defined as ‘the collection of extensive data on many variables over an extended period of time, in a naturalistic setting, in order to gain insights not possible using other types of research’. Whereas Creswell (2007), Denzin & Lincoln (1998, 2005); Miles & Huberman (1994); Patton (2002) define it as an emergent, inductive, interpretive and naturalistic approach to the study of 9 people, cases, phenomena, social situations and processes in their natural settings in order to reveal in descriptive terms the meanings that people attach to their experiences of the world. It should be noted that qualitative research is not based on a single methodology and does not belong to a single discipline (Denzin & Lincoln, 2005). According to Brewer (2003), it draws on philosophical ideas in phenomenology, symbolic interactionism, hermeneutics and other traditions to support the attention on “quality” rather than “quantity”. Therefore since the study is aiming at using a number of methodologies and it is not to deal with large quantities of data which requires mathematical and statistical analysis, a quality research approach is found suitable for this kind of research and it is what the researcher adopted for the study. 2.5 Research methods 2.5.1 Design science As Opposed to traditional research approaches which focus on exploring or confirming hypotheses (Bagozzi et al. 1991), the emerging design science research approaches for developing IS research artifacts (Baskervilleet al. 2009 and Gregor 2006) focus on first clarifying the goals of the artifacts (constructs, methods, models, or instantiations) and then on building and carefully evaluating the utility of the artifacts, and to a lesser degree, their reliability and validity (Hevner et al. 2004 and Venable 2006). According to Hevner et al. (2004), One of the defining features of the design science approach is that the evaluation of the new IS artifact involves broadly answering the question ‘How well does it work?’ rather than merely how valid or a reliable it is. Drawing heavily from Kuhn (1996 and first published in 1962) and Lakatos (1978), Research can be very generally defined as an activity that contributes to the understanding of a phenomenon. In the case of design science research, all or part of the phenomenon may be created as opposed to naturally occurring. The phenomenon is typically a set of behaviors of some entities that are found interesting by the researcher. Simon (1996), makes a clear distinction between "natural science and design science": A natural science is a body of knowledge about some class of things, objects or phenomenon in the world (nature or society) that describes and explains how they behave and interact with each other. 10 Design Science, on the other hand, is a body of knowledge about the design of artificial (manmade) objects, and phenomena artifacts that can meet certain desired goals. Therefore, since this kind of research is qualitative in nature and it is aiming at interactions with individuals and groups in an organization setting, action research and case studies are of a great advantage and they were considered by the researcher to derive the findings of the study 2.5.2 Case studies According to Yin (1994), a case study is an empirical inquiry within its real-life context, particularly when the boundaries between phenomena and context are not clearly evident. Case studies can help to understand the influence of variability of context and to gain more general research results. 2.5.3 Action research On the other hand, action research is a process of systematic inquiry that seeks to improve social issues affecting the lives of everyday people (Bogdan & Bilken, (1992); Strringer (2008)). Historically, the term ‘action research’ has been long associated with the work of Kurt Lewin, who viewed this research methodology as cyclical, dynamic, and collaborative in nature. Through repeated cycles of planning, observing, and reflecting, individuals and groups engaged in action research can implement changes required for social improvement. 2.6 Data collection and Analysis Qualitative methods of data collection, such as interviewing, observation, and document analysis, have been included under the umbrella term of "ethnographic methods" in recent years. 2.6.1 Observation MARSHALL and ROSSMAN (1989) define observation as "the systematic description of events, behaviors, and artifacts in the social setting chosen for study". Observations enable the researcher to describe existing situations using the five senses, providing a "written photograph" of the situation under study (Erlandson, Harris, Skipper, & Allen, 1993). DeMUNCK and Sobo (1998) describe participant observation as the primary method used by anthropologists doing fieldwork. According to DeWalt (2001), Observations involve more than just “hanging out.” Planned and self-aware observers use observation systematically. Therefore, Observation is a 11 way of gathering data by watching behavior, events, or noting physical characteristics in their natural setting. 2.6.2 Interviews O’Leary (2004), remarks “Collecting credible data is a tough task, and it is worth remembering that one method of data collection is not inherently better than another.” Therefore, the data collection methods which were used depend upon the research goals and the advantages and disadvantages of each method. Interviewing is a way to collect data as well as to gain knowledge from individuals. Kvale (1996), regarded interviews as “an interchange of views between two or more people on a topic of mutual interest, sees the centrality of human interaction for knowledge production, and emphasizes the social situatedness of research data. Interviews, or question and answer sessions with one or more people, are an excellent way to learn in-depth information from a person for your primary research project. Cohen, Manion and Morrison (2000), explain “the interview is not simply concerned with collecting data about life: it is part of life itself, its human embeddedness, is inescapable.” 2.6.2.1 Types of Interviews There are many types of interviews, which include: Structured interviews: Bryman (2001), structured interview entails the administration of an interview schedule by an interviewer. The aim is for all interviewees to be given exactly the same context of questioning. According to David and Sutton (2004), the strength of structured interviews is “Prompting can be included with the questions and if a question is inappropriate, data on why no response was made can be recorded.” Furthermore, non-verbal cues, such as facial expressions, gestures can be recorded. Semi-structured interviews: semi-structured interviews are non-standardized and are frequently used in the qualitative analysis which is in line with this kind of research. In this type of interview, Questions can be asked and some may be questions that have not been anticipated in the beginning of the interview. Note taking or tape recording documents the interview. This type of interview gives the researcher opportunities to probe for views and opinions of the 12 interviewee. Probing is a way for the interview to explore new paths which were not initially considered Gray (2004). Unstructured interviews: This type of interview is non-directed and is a flexible method. It is more casual than the aforementioned interviews. Non-directive interview: In non-directive interviews there is no preset topic to pursue. Questions are usually not pre-planned. The interviewer listens and does not take the lead. The interviewer follows what the interviewee has to say. The interviewee leads the conversation. The researcher therefore, used interviews and questionnaires as a research instrument and as a means to collect data since they are one way to collect data and to gain knowledge from individuals. 2.6.3 Document review Existing records often provide insights into a setting and/or group of people that cannot be observed or noted in another way. This information can be found in document form. Lincoln and Guba (1985), defined a document as “any written or recorded material” not prepared for the purposes of the evaluation or at the request of the inquirer. Documents can be divided into two major categories: public records, and personal documents Guba and Lincoln (1981). Public records are materials created and kept for the purpose of “at testing to an event or providing an accounting” Lincoln and Guba (1985), Public records can be collected from outside (external) or within (internal) the setting in which the evaluation is taking place. Examples of external records are the census and vital statistics reports, county office records, newspaper archives, and local business records that can assist an Exhibit. Therefore, all these data collection method were adopted by the researcher since they can provide data that is qualitative. 2.7 Information Management According to Wikipedia (2017), information management (IM) is the collection and management of information from one or more sources and the distribution of that information to one or more audiences. Throughout the 1970s this was largely limited to files, file maintenance, and the life cycle management of paper-based files, other media and records. With the proliferation of information technology starting in the 1970s, the job of information management took on a new 13 light, and also began to include the field of Data maintenance (Wikipedia, 2016). Similarly, the internship Management System can be viewed in the perspective of information management. This system aims at collection and management of internship information like internees, internal and external supervisors, placement places and administrators. In short, information management includes organizing, retrieving, acquiring or dissemination and maintaining the information. This proposed system provides means of collection, retrieval, maintenance and management of internship information in relation to the job of information management. No longer was information management a simple job that could be performed by almost anyone. An understanding of the technology involved, and the theory behind it became necessary. As information storage shifted to electronic means, this became more and more difficult. By the late 1990s, information was regularly disseminated across computer networks and by other electronic means. With the latest tools available, information management has become a powerful resource and a large expense for many organizations (Wikipedia, 2017). 2.8 Information Management Concepts According to the Carnegie Mellon School and its followers, information management, i.e., the organization's ability to process information is at the core of organizational and managerial competencies Wikipedia (2016). Consequently, strategies for organization design and technologies must be aiming at improved information processing capability. Therefore to clearly understand the role of information management in organizations, understanding of the underlying technologies, methods and approaches used in achieving the purpose of this job is of paramount importance. The proposed system involves some of these technologies and concepts. Such technologies and concepts include. 1) Databases 2) Database Systems 3) Database management systems and 4) Database system development approaches. 14 2.8.1 Databases According to Connolly, Caroln and Thomas (2002) and Wikipedia (2017), a database is a shared collection of logically related data and a description of that data designed to meet the information needs of an organization. This proposed system will provide a shared collection of logically related data like relationships between internees and supervisors, courses, and faculties and other logical relationships. The system was also designed to meet information needs of University of Kisubi (Unik) in terms managing the internship information. Some of the needs of the proposed system met include proper records management and efficient dissemination of internship information. A database relies upon software to organize the storage of data Wikipedia (2017). In other words, the software models the database structure in what are known as database models (or data models). A data model is a logical map that represents the inherent properties of the data independent of software, hardware or machine performance considerations. The model shows data elements grouped into records, as well as the association around those records (DMReview, 2015). The model in most common use today is the relational model. According to Wikipedia. (2017), the relational model for database management is a database model based on predicate logic and set theory. The relational model uses tables to store data and manage the relationship between tables (Brainbell, 2008). Other models such as the hierarchical model and the network model use a more explicit representation of relationships. The design and implementation of the database for the proposed system will base on the relational model thus making the underlying database relational in nature. A relational database is the collection of data items organized as a set of formally described tables from which data can be accessed or reassembled in many different ways without the need to reorganize the database tables (DMReview, 2015). 15 2.8.2 Database modeling 2.8.2.1 Advantages of the Relational Model According to James Cook University. (1996), Codd in his 1970 paper indicated that there were four major objectives in designing the relational data model. These were: i. Data Independence - to provide a sharp and clear boundary between the logical and physical aspects of database management. ii. Simplicity - to provide a simpler structure than were being used at that time. A simple structure is easy to communicate to users and programmers and a wide variety of users in an enterprise can interact with a simple model. iii. Set-processing - to provide facilities for manipulating a set of records at a time so that programmers are not operating on the database record by record. iv. Sound Theoretical Background - to provide a theoretical background for database management field. If a system supports all relational algebra operators and the two integrity constraints (entity integrity and referential integrity) then the system may be called fully relational (James Cook University, 1996). Similarly, the proposed system will support relational algebra operators and the two integrity constraints making it fully relational. 2.8.3 Use Case Modeling A use case defines a goal-oriented set of interactions between external actors and the system under consideration. Actors are parties outside the system that interact with the system. An actor may be a class of users, roles users can play, or other systems. Cockburn (1997) distinguishes between primary and secondary actors. A primary actor is one having a goal requiring the assistance of the system. A secondary actor is one from which the system needs assistance. Thus, use cases capture who (actor) does what (interaction) with the system, for what purpose (goal), without dealing with system internals. A complete set of use cases specifies all the different ways to use the system, and therefore defines all behavior required of the system, bounding the scope of the system. Generally, use case steps are written in an easy-to-understand structured narrative using the vocabulary of the domain. Use cases are useful in capturing and communicating functional requirements, and as such they play a primary role in product definition. 16 2.8.4 Data Modeling Data modeling is the process of creating a data model by applying a data model theory to create a data model instance. According to American National Standards Institute. (1975), a data model instance may be one of three kinds: A conceptual schema (data model) describes the semantics of a domain, being the scope of the model. For example, it may be a model of the interest area of an organization or industry. This consists of entity classes (representing kinds of things of significance in the domain) and relationships (assertions about associations between pairs of entity classes). A conceptual schema specifies the kinds of facts or propositions that can be expressed using the model. In that sense, it defines the allowed expressions in an artificial 'language' with a scope that is limited by the scope of the model. For generally applicable models, see below under 'Generic data model'. A logical schema (data model) describes the semantics, as represented by a particular data manipulation technology. This consists of descriptions of tables and columns, object oriented classes, and XML tags, among other things. Physical: The physical data model is concerned with the implementation of the data entities. It incorporates optimizations that may include partitioning or merging entities, duplicating data, creating identification keys and indexes. The Entity-Relation Model (ER) is the most common method used to build data models for relational databases. 2.8.5 The Entity-Relation Model (ER) The Entity-Relationship (ER) model was originally proposed by Peter in 1976 as a way to unify the network and relational database views. Simply stated the ER model is a conceptual data model that views the real world as entities and relationships. A basic component of the model is the Entity Relationship diagram which is used to visually represent data objects. Chen (1977) wrote his paper the model has been extended and today it is commonly used for database design For the database designer, the utility of the ER model is:  It maps well to the relational model. The constructs used in the ER model can easily be  It is simple and easy to understand with a minimum of training. Therefore, the model can transformed into relational tables. be used by the database designer to communicate the design to the end user. 17  In addition, the model can be used as a design plan by the database developer to implement a data model in specific database management software. 2.9 Database Systems According to Date & Chris. (1986), a database system is a collection of interrelated and persistent data (usually referred to as the database). According to the same authors, a database system can also be referred to as a set of application programs used to access, update and manage that data (which form the data management system). Therefore, a database system is basically a computerized record keeping system that is, a system whose overall purpose is to maintain information and to make that information available on demand. Also according to the above, a database system is a system with a database in the background. A System is a set of interacting or interdependent entities, real or abstract, forming an integrated whole (Wikipedia, 2016). That means that a Database System is a combination of a database, database management system, user interfaces and processing programs. The internship Management System can be viewed similarly as a database system. This system includes interacting or interdependent components such as a database or the back-end, MySQL database management system, user interfaces or the front-end and the PHP engine for connecting the front-end to database thereby allowing data manipulation in the database. The integrated whole of all these interacting components enable this database system to provide its desired services or functionalities including storage, retrieval, dissemination, maintenance and management of internship information. Examples of the use of database systems include airline reservation systems, company payroll and employee information systems, banking systems, credit card processing systems, and sales and order tracking systems (Medina & Richard, 1998). A major purpose of a database system is to provide users with an abstract view of the data. That is, the system hides certain details of how the data are stored and maintained (Medina & Richard, 1998). Therefore, data can be stored in complex data structures that permit efficient retrieval, yet users see a simplified and easy-to-use view of the data. 18 2.9.1 Database Management systems A database management system is one of the components of a database system (Wikipedia, 2017). According to Palmer. (2008), a database management system (DBMS) is a computer software application suite that is designed to manage databases. The DBMS is responsible for all access to the data stored within its databases such as data input, verification, storage, and retrieval. The DBMS is also responsible for the security of the data by controlling access by only those users that have permission. Since the system has a relational database in the backend, a relational DBMS was used to create, coordinate, define, manage and control access to the underlying database. Examples of Relational DBMSs include Oracle, MySQL, DB2, Sybase Adaptive Server Enterprise, Ingres Informix, Microsoft Access, Microsoft SQL Server, Firebird, PostgreSQL, OpenLink Virtuoso SQLite, FileMaker and many others (Wikipedia, 2017). MySQL DBMS was used in managing the database because it is open source and popularly used for web based applications/systems. MySQL is a multithreaded, multi-user SQL database management system (DBMS) which has more than 11 million installations. The basic program runs as a server providing multi-user access to a number of databases (Wikipedia, 2017). According to Wikipedia.(2017), MySQL is popular for web applications and acts as the database component of the XAMP, MAMP, MYSQL Workbench and WAMP platforms (Linux/Mac/Windows-Apache-MySQL-PHP/Perl/Python), and for open-source bug tracking tools like Bugzilla. Its popularity for use with web applications is closely tied to the popularity of PHP and Ruby on Rails, which are often combined with MySQL. PHP and MySQL are essential components for running popular content management systems such as Joomla!, e107, WordPress, and Drupal. 2.9.1.1 Benefits of Database Management Systems A database management system provides the following benefits (Wikipedia, 2017). i. Improved strategic use of corporate data ii. Reduced complexity of the organization’s information systems environment iii. Reduced data redundancy and inconsistency iv. Enhanced data integrity 19 v. Application-data independence vi. Improved security vii. Reduced application development and maintenance costs viii. Improved flexibility of information systems ix. Increased access and availability of data and information A database management system (DBMS) is designed to manage a large amount of information. Data management involves both defining structures for storing information and providing mechanisms for manipulating the information. In addition, the database system must provide for the safety of the stored information, despite system crashes or attempts at unauthorized access. If data are to be shared among several users, the system must avoid possible anomalous results due to multiple users concurrently accessing the same data. 2.10 Database System Development Approaches According to Wikipedia. (2016), a system is a set of interacting or interdependent entities, real or abstract, forming an integrated whole. A system can also be referred to as a grouping of people, objects and processes (Avison & Shah 1997). Some systems can be implemented more formally than others and there will always be constant arguments about what is the ‘right way’ to implement a system: formal or bureaucratic versus informal or social (Fincham & Rhodes, 1992). Systems analysis is all about getting a detailed understanding of information relating to a proposed system collected previously (Avison & Shah, 1997). It is very important to note that systems analysis and design is only one part of the overall Systems Development. The phases of Feasibility study, Analysis, Design, Implementation, Testing (Review) and Maintenance are paramount to all forms of Systems Development. The above phases of project or system development are the standard phases used more or less in all texts on systems analysis and software engineering. It is generally referred to as the Linear Life Cycle (Pressman, 1992). They are also to be found with minor differences in Business, Marketing, Engineering and many other disciplines. It is important to note that these phases have been used long before the advent of the computer, as Checkland & Holwell (1998) said: 20 "Technology is older than the scientific method, and much technology existed long before the Greeks created the scientific outlook and initiated the process which culminated in the Scientific Revolution of the Seventeenth Century’. There have been many criticisms of the Linear Life Cycle. However, while many other methods of Systems Development have been developed, more often than not they complement the Linear Life Cycle rather than replace it (Avison & Shah, 1997). Thus, the Linear Life Cycle is looked at as way too simplified for the complexities of the real world. The following are some of the alternatives available to the simple Linear Life Cycle model including prototyping, spiral model, object orientation, client server development, joint application development, information engineering, reuse, Business Process Reengineering, and outsourcing. Prototyping is a technique orientated around developing a small working model of a product or its components and getting it correct before pre-releasing it on sample customers to try out. A Spiral Model aims to combine the best elements of the Linear Life Cycle and Prototyping but adding the new element of risk analysis (Pressman, 1992). A spiral model of a prototype and improvements on it goes through 4 phases: planning, risk Analysis, engineering and customer evaluation. Object Orientation (OO) enforces that object orientated systems development requires the developer to think in terms of objects and object classes (Avison & Shah, 1997). Client Server Development: It is important to note that traditional methodologies were not designed for Client Server development. When designing a client server system, this fact must be recognized. Use of client server friendly methodologies (e.g. OO) is wise in such circumstances. Joint Application Development puts emphasis on people rather than data and processes. Users, managers and systems designers specify user requirements, technical options and systems inputs and outputs. Information Engineering is a data driven approach which is intended to be applied across the whole organization or large parts of it. Reuse: In many modern programming languages emphasize reusability. Reusability is something that can also be extended to design and analysis. Prototypes could be built quickly by reusing components of similar previous systems. Time and resources are spared as a result. Business Process Reengineering: Reengineering an information systems process involves reorganizing the system in a new and more efficient way. The major downside, however, is that a very high failure rate exists among 21 reengineered projects. Outsourcing: Handing systems development over to an external company is becoming increasingly popular. It enables cost and time reduction, potentially better-designed systems and the inclusion of up to date technology. 2.10.1 Prototyping - Chosen Depending on this project, prototyping model of development was preferred by the researcher. Continuing development is based on advice from the system users sampled. The main advantages are that a working model is developed early and that users are given the chance to voice what they like best and least about the product. Therefore product rejection is reduced and requirements are identified better. Disadvantages include the potential for a rushed analysis and design leading to a lack of understanding of the problem area, alternatives to the first working prototype may be ignored and it may be harder to change the prototype if necessary later on. A Spiral Model, Object Orientation (OO), Client Server Development, Joint Application Development, Information Engineering, Reuse, Business Process Reengineering and Outsourcing have disadvantages including demand for considerable risk-assessment expertise, Complexity, middleware requirements, extensive co-operation and sacrifice of other commitments, rigidity, larger and less efficient implementations resulting from incorporating component libraries, very high failure rate and fluctuating fees to an outsourcing vendor respectively. 2.11 Conclusion This chapter discussed all the necessary related literature to information systems and how internship management is essential in improving the performance of the University. The next chapter explains the various development and research methodologies that were used to come up with the proposed system. 22 CHAPTER THREE METHODOLOGY 3.0 Introduction This chapter addresses the research approach which was followed during the study; it also provides descriptive information on the methods that were encountered during the research process. It further addresses the methods, procedures, tools and techniques the researchers used to archive the project objectives as presented in the content presented herein. 3.1 Research Design The research mainly followed a qualitative research approach. The study aimed at finding out the facts about the challenges associated with Internship management systems in higher institutions of learning particularly (UniK). The researcher intended to explore the existence of Internship management challenges in order to come up with an appropriate solution. This Exploratory research facilitated the researcher to determine the best research design and data collection method during the research process. A qualitative technique was adopted to observe the phenomenon and this is what qualitative research is all about and this justifies the use of a qualitative research approach. 3.2 Methods of the research 3.2.1 Design science research method. Design science research is a set of analytical techniques and perspectives for performing research in Information Systems (IS) and Information Technology (IT). Since this study involved coming up with innovative artifacts to improve and understand the behavior of aspects of information systems, the researcher got involved in a rigorous process to design artifacts to solve observed problems, to make research contributions, to evaluate the designs, and to communicate the results to appropriate audiences. Such artifacts may include constructs, models, methods, and instantiations. They also included social innovations or new properties of technical, social, and/or informational resources. 23 3.2.2 Case study method Case studies are exhaustive studies of a particular situation rather than a sweeping statistical survey. It was an appropriate method to narrow down a very broad field of research into one easily researchable topic; it gave some indications and allowed further elaboration and hypothesis creation on a subject. The case study research design was also very useful in testing whether scientific theories and models actually work in the real world. It is sometimes important to understand specific cases and ensure a more holistic approach to research that is why the researcher found it fitting to use case study research method. 3.3 Study population The population of the study was obtained from students doing internship, lecturers who carry out the supervision, administrators like secretaries, faculty deans and external supervisors who are at the heart of handling internship activity. 3.4 Sample size The sample size expected was totaling to 30 respondents who included 3 faculty deans, 3 faculty secretaries, 2 ICT technicians, 20 students and 2 supervisors. The twenty students were those on internship and the two supervisors. 3.4.1 The table below shows the Sample size Population Respondents Secretaries 3 Faculty deans ICT Technicians Students Supervisors Total 3 2 20 2 30 24 3.5 Sampling technique The technique that was used in this study is purposive and convenient random sampling techniques because they eradicate favoritism or bias thus the selection based on equal parameters so as to get ideas from students who belong to different faculties and secretaries plus deans of faculties. According to Charles Teddlie and Fen Yu (2007), Random sampling is perhaps the most well-known of all sampling strategies. The faculty deans were chosen because of their informed positions (Enon: 1998). 3.6 Data Analysis The researcher used qualitative methods to analyze data. Collected data from the interviews, observations and questionnaires were analyzed in a thematic form using simple data analysis tools like Microsoft excel through themes developed from the study objectives. The salient themes developed were closely related to internship management in higher institutions of learning. Thematic analysis is one of the most common forms of analysis in qualitative research (wikipidia (2017)). The researcher edited the field notes to ensure accuracy and consistency. Recorded interviews and discussions will be copied and critically examined the respondents’ views in order to accurately record their views. Key ideas will be identified, categorized and then considered for the study. The data was analyzed for instrument completeness basing on how the respondents answer the questions. Collected data was presented inform of; Data-flows and Frequency tables. 3.7 Validity A research instrument is said to be valid if it actually measures what it is supposed to measure, Amin (2005). The instruments were given to the secretaries and interns provided technical guidance and constructive criticism and the researcher revised them according to the given advice. The instruments were tested on some respondents who were in a position to give useful information. The researcher further controlled the validity by avoiding biases during the interviews and record the findings accurately. 25 3.8 Reliability Reliability refers to the ability of the instrument to be consistent. The researcher conducted a pretest to find out whether the instruments are bringing out what they are designed for with minimal interference. The language which was used was at the level of the respondents and clear enough to help respondents give a straight answer. 3.9 Data Collection Methods and Research Instruments Basically the researcher used two data sources during the investigation of the problem these include; primary and secondary data sources. 3.9.1 Primary Data Sources. Primary data consists of original information for the specific purpose at hand by using both qualitative and quantitative methods. The qualitative method mainly the researcher conducted discussions and administered interviews while quantitative involved the use of questionnaires to capture some of the vital information. Surveys Surveys involve interaction between the researcher and the selected respondents where a set of questions are designed by the researcher and answered by the respondents. Surveys can enable collecting verbatim statements from respondents which lead to respondents offering responses within their own unique context, and the value of the information provided can be extremely high. Interviews An interview is a conversation between two or more people (The interviewer and the interviewee) here, the researcher went on ground and asked questions related to the study as the interviewees respond accordingly. Interview guides were used through face to face interactions with the respondents which allowed synchronous communication in time and place. In case the question was not very clear to the interviewee, the researcher always interpreted which helped to collect valid data. Observations Observations assisted in performing qualitative analysis. This is subjective analysis that ascertained the nature of the attributes, behavior, or opinions of the target users. The most 26 significant advantage of active observation is that it shows real-world student interactions in regards to the existing working process. It also reveals the frustrations target users feel about the existing Internship management processes. 3.9.2 Secondary Data Sources Internal and external data is expected to be collected by the researcher in order to give a clear understanding of the challenges associated with the currents Internship management system in higher institutions of learning. Internal sources of data included but not limited to institution’s internship assessment forms for internees, internship program documentations for the selected institution of learning, and student’s internship logbooks. External sources of data included but not limited to Commercial journals, Text books, Research reports, Government publications and Periodicals 3.10 Data Collection Instrument 3.10.1 Interview Guide The researcher used interview guide as the main tool of data collections together with questionnaires. The questions ought to elicit the valid response from respondents. Hoyle, Harris and Judd (2002), comment that questions have “dual goals of motivating the respondent to give full and precise replies while avoiding biases stemming from social desirability, conformity, or other constructs of disinterest.” By use of questionnaires it involves fewer costs and gives a considerable view from the respondents. 3.11 Questionnaire A questionnaire is a data collection instrument consisting of a series of questions and other prompts for the purpose of gathering information from respondents. Wikipedia (2012). They can measure both qualitative and quantitative data, though more appropriate for quantitative data collection. The researcher used questionnaires since they are a good tool for the protection of the privacy of the participants and the validity of data and information depends on the honesty of the respondent. 27 3.12 System Development and Implementation To develop and implement a prototype of the system, the researcher used BitNami Server which is a window’s based apache server that runs the latest PHP and MySQL. Macromedia Dreamweaver cs6 and notepad++ was used as development environments and HTML plus CSS were used for styling the front- end of the system. Additionally, JavaScript programing language was incorporated to provide reliable security of the Internship system. Dreamweaver is available for both Mac and Windows operating systems (Wikipedia, 2008). Recent versions have incorporated support for web technologies such as CSS, JavaScript, and various server-side scripting languages and frameworks including ASP.NET, ColdFusion, JavaServer Pages, and PHP. 3.13 Conclusion This chapter presents the research approach and different techniques and tools that were used in data collection, analysis and presentation and a detailed development methodology of the proposed Internship management system. It further explains why different tools and techniques were preferred to others and end with tools that the researcher used to manage the project. 28 CHAPTER FOUR RESEARCH FINDINGS AND ANALYSIS 4.0 Introduction This chapter generally presents the findings which were obtained from University of Kisubi (UniK). It involves research findings, analysis and discussions of results. It describes the user’s problems, user’s requirements and system requirements for the development of the internship management system that is web-based with a centralized database. The requirements were translated into preliminary and detailed designs. Decisions were made to address how the system will meet functional and non-functional requirements. The Preliminary systems designs emphasizing the functional features of the system were produced as a high-level guide. Then a detailed system design was produced that expanded the design by specifying all the technical details needed to develop the system. More still, this chapter is structured into several sections; Section 4.2 involves the facts which were collected from University of Kisubi internship participants, section 4.3 analyzes the observed typical internship management system of UniK, section 4.4 involves discussion and analysis of the requirements for the new system, section 4.5 involves the design aspects of the new internship management system. 4.6 involves development and testing of the new internship management system to see whether it meets the needs of the user and free from errors, and section 4.6 gives a conclusion on the chapter. 4.1 Background of University of Kisubi University of Kisubi (UniK) [formally known as Kisubi Brothers University College] is a private institution of learning located 24 Kilometers from Kampala, The Capital City of Uganda, along Kampala-Entebbe Highway. In 2004, the Brothers of Christian instructions Uganda province in cooperation with Uganda Martyrs University (UMU) began as an affiliate University College on the Kisubi Campus at Mount St. Teresa. On 27th March 2009, National Council for Higher education authorized the Kisubi Brothers Centre of UMU to become a Constituent College of UMU, known as Kisubi Brothers University College (KBUC). On 29th June 2015, the National Council for Higher Education (NCHE) granted an independence operational license to the University in its new name, University of Kisubi (UniK). 29 The Campus is owned by the Brothers of Christian Instruction, an International Religious Congregation particularly known for its long-standing commitment to the education of the youth. The university’s concern is integral formation and education of persons; preparing professionals so that they are able to impart meaningful knowledge and to bring about overall human development. This goal is achieved through an appropriate religious, social, academic and civic formation. The teaching as well as the auxiliary staff, and the students of UniK including the non-resident members, consider themselves first and foremost as a community or as a single team. Thus, every member is helped to realize his/ her personal rights and responsibilities and to freely act according to one’s enlightened moral judgment. The community is marked by openness, dynamism, and concern for the members to one another as well as to the lager community. In this spirit, the community is open and eager to co-operate with other institutions of learning seeking to open up the truth through research, dialogue and academic excellence. The vision is to provide Holistic, Skills-oriented and Faith-based education for life-long learning that empowers the learners to become transformative leaders. And the mission is to be a University that prepares individuals to become pragmatic professionals of integrity, capable of thinking critically and analytically 4.2 Description of the study respondents The study was conducted at University of Kisubi (UniK), particularly in the department of Business and ICT. The findings were guided by the selected instruments for this study, that is, interviews, observation, document reviews and questionnaires. At Unik, students of various courses are required to complete 6 weeks of internship training during the recession period of the second and third year before they can complete their degree. Qualitative methods were employed for data collection throughout 2016–2017 academic years and various aspects were observed as can be seen bellow. Internship management system was assessed from three perspectives: students, the university and placement organizations. During data collection, 18 questionnaires were administered to 18 students of which 17 were returned with their sub samples as indicated below; (1) Student participants: The research was conducted with (all) 18 students, of whom 3 had completed industrial training and 15 were in industrial training at the time of the study. 30 (2) Organization participants: The research was conducted at UniK particularly in the faculty of business and ICT and faculty of education which combines arts and science students. Within UniK, there are departments with deans and secretaries who are in charge of internship management. 2 faculty deans and 2 secretaries where included from the 2 faculties respectively. These are responsible for writing letters to the students going for internship, allocating them supervisors as well as coordinating all internship activities and sample forms are provided in appendix G. (3) University Internship Supervisors: the different faculties use some of their lecturers to supervise the students on internship. These coordinators take responsibility of traveling to the various places physically to evaluate the students at their placement organizations and at the end forward their assessments to the faculty secretaries or the deans. 4.5 logical designs The logical design is an abstract concept of the data flows, inputs and outputs of the system. Below is a context data flow diagram of the new internship system. Add/ View Supervisor Register for Internship Fill in/ View Log-Book Student View Supervisors View Students Internship Management System Fill in Vie Ev Vie w alu w An atio Stu nou n dennce For ts me m nt Vie w Stu den t's Ev alu atio n Confirm Add View Students Secretary Add/ View/ Maintain Users Supervisor 31 Figure 4. 1: Context Level Data Flow Diagram Context Level Data Flow Diagram describes in details the functional requirements of the new internship management system for UniK. 4.5 System Requirement The data collected were then transformed into system requirements and the features ware refined logical data flow diagram to best capture the functional requirements of the system. 4.5.1 Functional Requirements Students Application Module  The system will allow students to apply for internship by registering their details.  It will allow students to view their supervisor’s details particularly the internal   It will allow students register details of their placement organization. supervisors for proper coordination. It will allow student to view announcements posted by the secretaries or the coordinator. Allocation Module  The system will allow secretaries to allocate students supervisors and to their secured  It will allow coordinators/ secretaries to view, update and delete the supervisors as a need internship organizations. may require. Announcement Modules  The system will allow secretaries to send announcements and notifications to the interns  Report    and supervisors. It will allow coordinators/ secretaries to view and print different types of reports. Query It will allow coordinators/ secretaries to generate query for retrieving data from database to view different set of data. 32 4.5.2 Non-Functional Requirements Security Module  The system will be able to identify authorized users to login to the system.  It will be able to differentiate the authorized level of users.  It will encrypt users' passwords to enhance security. 33 Efficiency Introductory letters will be ready for printing so longer as a student registers in the system. Internship activities will be ready to be viewed or printed after evaluation form and survey form is collected from student and the organization. Notification is will always be ready to update users. Reliability Up-to-date information will be provided to users. Users will do decision-making effectively and produce valuable reports. 4.6 Functional decomposition of the Internship Management System Budd, Timothy A. (2002), defines Functional Decomposition as a process of taking a complex process and breaking it down into its smaller, simpler parts. The internship management system is broken down into the most decomposed pieces of subsystems in order to have manageable parts that are easy to code/ engineer and later be composed into a greater whole internship management system. Below is the functional decomposition diagram for internship management system. 34 1 INTERNSHIP MANAGEMENT SYSTEM Registration Subsystem Allocation Subsystem 2 Registration Process Transaction 2 1 2 3 Generate Reports on Internship Supervision Subsystem Supervision Process Transaction Process Announcement Transaction Allocation Process Transaction 3 Generate Reports on Registration Announcement Subsystem 3 Generate Reports on Announcement Supervision Process Transaction Process Evaluation Reports Figure 4. 2: Functional decomposition diagram for the new Internship Management system 4.6.1 System Events The internship management system has external, temporal and state events which cause triggers in order for the system to generate responses. External agents initiate the external events which result in an input transaction or data flow. The temporal events are triggered on basis of time or anything that happens in the internship system and these are indicated by a control flow. The state events trigger processes based on the changes in a system from one state/ condition to another also indicated by a control flow. Below is the event response list for the Internship management system. 35 Actor/ External Agent Event Registration Enrolls for Internship, Supervision Trigger New student Enrolls program Establish new list of students for evaluation plan. Past evaluation/ new evaluation Activity Record fills in logbook New activity Allocation Establish supervisors lists Past supervisor or new supervisor Evaluation Announcement Establish new evaluation form for evaluation plan Composing the announcement New announcement, Past announcement resubscription New evaluation forms and past evaluation forms Response Generate confirmation for enrollment of student, Create student in database Generate evaluation confirmation, Create evaluation details in database Create Log book activities in database, generate internship activities confirmation Create confirmation for allocation of supervisor, Create supervisor in database. Create evaluation details in database, generate evaluation confirmation report Create announcement in database, Generate announcement confirmation. 36 Time Student Announcement and internship expires Join internship by enrollment. Current date Store start and end date of internship period. New Student enrollment Generate, Student directory update confirmation, Logically delete announcement in database Create Student in database Create Student roles in database. Event Data Flow Diagram The Event data flow diagram is a graphical representation of the flow of data through an information system, and models its process aspects. This is also known as “A level 0” data flow diagram that generalizes the function of the entire system in relationship to external entities. The Event data flow diagram below shows the flow of data within the internship management system. 37 Application Details Figure 4. 3: Event Data Flow Diagram for IMS 38 4.3 Problems of the current internship management System 4.3.1 According Vision, Mission, Goals and objectives of UniK, From the data collected using questionnaires, the current internship management system does not allow secretaries to serve clients in a timely manner because, it is still manual and time consuming despite the increasing advancement in technology. The registration process, monitoring and evaluation plus supervisor allocation are too manual as can be seen in appendix H and it need to be automated if the institution is to achieve its goals. The dean of faculty of business and ICT of UniK, Dr. Kizza James in an interview session explains the point, The current internship system does not expose the learners to different techniques of information exchange. For instance the students have to write in logbooks which are paper based and then submit them manually to their supervisors and secretaries. (Dr. Kizza 12th April-2017) This process restricts students to adopt only one mode of technique yet the technology is growing more advanced options can be used online forms/ electronic logbooks. And this hinders student’s creativity and less analytical which contradicts with UniK’s Vision. 39 4.1.2 Business process/ Activities Registration Procedures The process begins with a registration through the Secretaries where a document/ internship application letter is filled by student defining what course they do, year of study and semester. The students sign in a book upon picking their internship letters and also sign on returning the acceptance letters from the organization/company. Among the information that is captured from the student is as follows; Student Name, Registration Number, Program of Study, Year of study, the name of internship institution, the name and title of work base supervisor and the beginning date of the internship. The sectary then transfers all these details from the book to a computer program like Ms Word or Ms excel. This process aims to assist Secretaries/ Head of Department to allocate appropriate supervisor for internship Supervision. However, the system is too manual and tedious, the allocation of Supervisors is still manual and not systematic which does not only lead to improper allocation of internship supervisors but also it is time consuming Supervisor Allocation Procedures The supervisors are allocated manually after categorizing the students in their respective courses and routs to their placement organizations. This process is not only biased in allocation of supervisors but also tedious as the analysis and categorization of all the students is a manual process. Supervisors some times are allocated to supervise in some places simply because they live along those routes and to make matters worse, some students can be allocated supervisors who are not teaching them, this also leads to an inappropriate assessment of the student doing an internship. Face-to-Face Briefing In case of any communication for example After the allocation of supervisors using the existing manual system, The lists are printed out and displayed on the university notice boards which is not only a wastage of university resources but also time consuming to both the university administrators and students and the new system is intending to be flexible and providing a clear web based lists of students and their internship details. In addition, the students’ activity log books are not standardized; two student respondents from the faculty of education emphasize; 40 Each student has to come up with a way of recording his/ her daily activities on papers. (Students, 14th April 2017). With the new system all these will be integrated and incorporated so that there is a standardized log book for all the interns. In addition, the student evaluation forms are difficult to collect back from company superior at the end of industrial training. Coordinator needs to keep calling and sending email to remind them to fill up and send back the student evaluation forms. Hence, this is wasting time and makes the process slow while collecting the forms back. The new system will provide a supervisors page where they can assess the internees and forward all the data at their convenient time after students have been assessed. 4.3.3 Existing Information Systems During Data collection the researcher found out that the University has a number of information systems which are used to manage some of the business activities. One of the study respondents, Mr. Ndawula Henry, An ICT Technician working in computer laboratory one explains. The University has Information systems: there is a Library Information system called Khoha (for managing the library catalogue and students to access electronic materials), there is a students’ management system (for handling students records including their bio data, and transcripts), there is also the accounts system called financial information management system (for managing finances of students and the university finances at large (Henry, 18 May 2017). Mr. Moses Atwine (the Head of ICT Technical department) adds on more information systems. The university also has an intra-web system which has learning materials and software used for teaching and study purposes. The intra-web works in a way that lecturers post learning materials and students access them, also it has links to 41 various university information systems. He further explains that all these information systems are hosted and managed locally on the university servers. More still, the university has a website which is hosted by Google and an e-mail system also hosted by Google (Moses, 19 May 2017). Despite of all the existing information systems, none of them is used to assist in the management of internship activities at UniK. 4.3.4 ICT Infrastructure of UniK The existing network infrastructure of UniK Covers a relatively small geographical area of and does not extend beyond the campus premises. It comprises of Several V-LANs and wireless access points surrounding the entire campus. The router is the main gateway of the UniK’s physical network residing in the server room of the University. Network switches then tap from the router to various offices and computer labs plus wireless access points. Mr. Ndawula Henry an ICT technician of UniK says’ However, the network is limited by its small coverage and all resources have to be accessed while one is connected to the University network, which confines the users to physically be on campus if they have any material to access from the university systems. (Henry, 18 May 2017). 4.4 Solution to the problems of the current internship system The problems of the current internship system can be solved by applying the following solutions; An online computerized system that handles registration of students and enrolment process with modules that assists in the supervision of interns. A system with a centralized database capable of Allocating Supervisors and can provide recommendations automatically. An online system that can track the progress of each student and generate can generate various reports. A web based system capable of sending notification about internship to all students on internship. 42 Below is a diagram which describes the current business process of handling internship at UniK, Student Face to face Registration for Internship Supervisor Allocation Secretary Face to face/ Noticeboard Announcements Inform student Face-to-Face Briefing Communication between Supervisor and Student Supervising Activity Supervisors Figure 4. 4: The current business process of handling internship activities 43 4.5.2 Activity Diagram It is vital to identify the various objects and their states in the system. The activity diagram below represents the various states of objects in the IMS module and the models of relationships between the various action states of the objects. Actor Process Database Login Login Condition No True Registration View Records Receive Records Add Record Registration Retrieve Records Print Results Edit/ Update Records Generate DB Logs Generate Reports Figure 4. 1: 5: The Activity systems Diagram activity diagram Store Data 44 4.6 Conclusion This chapter looked at the background of the organization (UniK), the current system focusing on the current business process, strengths and weaknesses of the current internship management system, the proposed system looking at the system requirements, target users, data modeling and. The next chapter covers the information system design and implementation. 45 CHAPTER FIVE SYSTEM DESIGN 5.0 Introduction The previous chapter discussed the findings and system analysis. It also set the transition from analysis of the system to its design. This chapter therefore builds from the analysis done to the designing of a system which includes the database design, system architecture, user interface design and structure design. It brings out a clear and complete understanding of how the complete system operates. 5.1 Functional Design Specification Functional design is the aspect of system design concerned with the system's set objectives and functions, rather than its specific components. It’s a level of the design process in which subtasks are specified and the relationships among them defined, so that the total collection of subsystems performs the entire task of the system. The system should allow the users to perform the following functions For the Secretaries and faculty deans, the system should have to perform these functions  Add staff/ supervisor details  View registration details       Add students’ details Allocate supervisors to students going for internship View evaluation details of students Add announcement information Modify details of internship View reports 46 For the students doing/ or going for internship, the system should have to perform the following  Register details in the system  View supervisor allocation details     Print internship introductory letter Fills in internship activities in logbook View evaluation details View announcements For the Supervisor, the system should have to perform the following  View supervisor allocation details  Add evaluation details   View students allocation details View announcements Systems Administrator, the system will do the following  Manage other users  Updates the System software  Backup data 5.2 Database Design Databases and database management systems are important components of modern information systems. Databases provide a common repository for data so that it can be shared by all the system users. Database management systems provide the system designers, developers and end users with capabilities to store, retrieve and manage data. 5.2.1 Logical Database Design This section discusses and shows the attributes of every relation of the database design. This is discussed in relation to the relations/tables and the specific data they are supposed to accept and store. The underlined and bold are primary keys and the simply broken lines underlined are the foreign keys. 47 The details of the logical model for the Internship Management System are shown below; SECRETARY(SEC_ID, SECFNAME, SECLNAME, USERNAME, PASSWORD, DEPARTMENT, MOBILEPHONE, EMAIL, TYPE) STUDENT (STUDENT_ID, STUDENT_FNAME, STUDENT_LNAME, STUDENT_ONAME, EMAIL, MOBILEPHONE, NAME_OFORG, TYPEOFORG, ADDRESS, CONTACT_PERSON, INTERN_STASTUS, DATE_OF_APPLICTION, ASSIGN_ID) SUPERVISOR (SUPERVISOR_ID, SUP_NAME, MOBILEPHONE, EMAIL, DEPARTMENT, ASSIGN_ID, STUDENT_ID, STUDENT_FNAME ASSIGN_ID, SECRETARY_SEC_ID) ANNOUNCEMENT (ANNOUNCEMENT_ID, ANNOUNCER, TITLE, DESCRIPTION, START_DATE, SECRETARY_SEC_ID) User (user_id, email, username, password) 5.2.2 Entity Relationship Design Entity relationship is a technique used in UML to describe how the different relations of the database relate or are connected to each other. The relationships are based on the primary keys and foreign keys of the relations/tables. These are used to link the tables together to form a relational database. Description of entity relationships     Each student is supposed to sign up and before logging into the system On registration, the student Registration number becomes a primary key that uniquely identifies each student. The student continues to register internship details in the system so that a supervisor can be assigned. The secretary logs in the system by entering correct username and password. 48  The secretary proceeds and assigns supervisors to students who have already submitted  The secretary can also create an announcement.   application details. The supervisor signs up into the system and obtains a username and password. The supervisor then can assess the student. 5.2.3 Entity relationship diagram An entity relationship (E-R) diagram is used to visualize the system and represent the user requirements. This is used to represent entities and how they relate to one another. The ER diagram below shows the relationships between the entities and attributes of the Internship management System. 49 Figure 5. 1: Entity relationship diagram 50 5.2.4 Physical Database Design Physical database design translates the logical data model into a set of SQL statements that define the database for a particular database system. It is the process of producing a description of the implementation of the database on secondary storage. The design describes the base relations and the storage structures and access methods used to access the data effectively, along with associated integrity constraints and security measures. MYSQL is a Relational Database Management System (RDBMS) that uses Transact-SQL statements to send requests between a client and the Server. The scripts used for creating the database is attached in Appendix III 5.2.5 System Architectural Design The system architecture design describes the environment in which the system will operate. This section focuses on the architectural framework with the minimum software and hardware specifications for the effective functioning of the system. System architecture User Interface Data Management Application Logic Application Logic Active Database Backup Database Figure 5. 2: The architectural design of the system This system is a web-based Information System that uses 3-tiers architecture where the user interface is the client that sends queries and requires some resource. The server is the data manager which responds to the queries by providing the resources. Client- server technology provides the means for distributing work across machines and coordinating the results. The backup database is used for archiving the database and data ware housing for the historical data. Level 1 the user interface through which users interact with the system Level 2 handle HTTP-request and give the response after the request is processed by web server. 51 Level 3 handle database, directory, mail server, and SNMP (Simple Network Management Protocol) and For the Front end tool, PHP programming language was used for developing the code. The motivation for choosing this language was the need for a platform independent language that could be used to create software to be embedded in various consumer electronic devices. BitNami was used for Back end tool. BitNami is a relational database management system for maintaining the database. BitNami was used to formulate the system database because it offers more reliability, data integrity, scalability and high level security for the stored information and handles the latest php scripting. It is free open source software, easy to use, fast, and accommodates large amounts of data. 5.2.6 Hardware and Software Specification The designed system has a range of specifications needed for its proper functionality. It is very important to have all the specifications in place for the best functionality of the system. More so it makes the system more friendly, easily accessible and interactive. The following are the minimum software requirements;     Windows XP, Linux operating system and Macintosh BitNami database management system, phpmyAdmin for both Windows and open source operating system Antivirus software for the windows platform A web browser like Mozilla Firefox, Google chrome and internet explorer. The following are the minimum hardware requirements;  Computers and printer most preferably with photocopier should be connected to the  RAM of 512MB and above to enable the computer respond fast to the application   computer since some reports will need to be printed. requests CPU Pentium 3 or above for good and reliable performance Monitor with resolution of 800*600 52  Hard disk space of 10GB or more for the computer hosting the database  Uninterruptible Power Supply for the database server and the application host computer  An external hard disk drive, for back up 5.3 Structure Interface Design This section discusses the different links between the interfaces and how they connect to fulfill their functionality. This structure makes the system self-evident, easy to navigate, and visually compelling to the users. In addition it helps the users to understand what is available to be done and how to find it. Structure design for the Student Login/ Signup Wrong Check Username & Password Correct Add Student Details Logout Add Internship Details Announcements Fill in Logbook View Reports Daily & Weekly Reports Figure 5. 3: The system structural design for the student 53 Structure design for the University Secretary. Login Wrong Correct Check Username & Password Add Allocation Logout Student Search Records Supervis or Details Daily Add/ Edit Records Generate Reports Announcements Weekly Monthly Reports Figure 5. 4: The system structural design for the university secretary 54 Structure design for the Supervisor. Login/ Signup Wrong Check Username & Password Correct Evaluate Student View Announcements Generate Reports View Evaluation Logout Daily Reports Weekly Reports Figure 5. 5: The system structural design for the university supervisor 5.4 User Interface Design A most critical aspect of the information system is the quality of the user interface. The design of the user interfaces defines how the user will physically interact with the system. With the differences in the type of users within UniK, the interfaces have been designed to satisfy all the users’ expectations taking care of their diversity in capabilities and needs. Home page design The home page which is the actual dashboard of the IMS was designed basing on planed designs in form of sketches on which the physical design was constructed. The home page has some photos of the University and some students doing practical work. It also contains the login links for all the three users plus the logo of the University as can be seen in the sketch below. 55 Unik Logo Images to show the students In internship. Administration Link (green) Icons representing the links Student Reg Link (blue) Image Image Supervisor Reg Link (green) Application Forms Link (blue) Assessment Link (blue) Figure 5. 6: Home page design Login Statement Username and Password Icons Figure 5. 7: Login Interface Username Password Log In button 56 Unik Logo Supervisor s Link Add Routine/ log View Log Link Announceme nts Link Log Out Link Internship Application Form Add application button Figure 5. 8: Students’ Application Forms Figure 5. 9: Secretary’s Panel 57 Figure 5. 10: Assigning Supervisors by secretary Figure 5. 11: View Students Assessment Figure 5. 12: Error message Login Fail 58 Figure 5. 13: Confirmation message Data Added Successfully 5.5 Security Design This is an important issue to consider when developing a system. This is so because a secure system is an asset to the University and information being a very important resource, its security is vital. There are various forms of securing and protecting the system from any collapse, losses or damage to the system. More still, an encrypted password with dm5 hashing algorithm was used to secure the passwords. Physical security; for the hardware and the system software to be secured, all the computers running the server software shall be locked in the control room to avoid any unauthorized access. For the safety of the database and documents; access to the system is restricted to only authorized. The staff authorization is left to the system administrator, who is responsible for registration and manager of system users. A backup system is put in place to guard against complete loss of very important information in case of system failure. Antivirus software will be installed as soon as the system is operational to protect against malicious files that may corrupt the system. 5.6 System Implementation and Operation Implementation is the actual development and support of the system. This is a stage in system development where codes are written and scripts to come up with the real product/ system with all the functionalities. This explains the overall implementation plan, the outputs (screenshots) of the system design, code used to produce the system and the user guide. The system was tested basing on the objectives and functionality requirements prior set and the lines below explain how the project was implemented. 59 5.6.1 System Construction and Programming (Coding) System construction and programming is the basis of the whole process of system implementation. It is the most important phase in the system construction. The construction and programming enables user interaction with the system and the database using the developed graphical user interfaces (GUI). 5.6.2 Implementation Plan The implementation plan of the system explains the activities that were covered in this phase, the deliverables and the tools that were used to complete the activities. ACTIVITY DELIVERABLE Database Development Testing Working database (internmgtsys) Implemented testing plan System test results Security tests results Usability Pilot system installation results Installation of software needed • Bitnami server • Macromedia studio • Antivirus software(60 Kaspersky) Training manual MS office package User manual System manual MS office package Technical reference guide Coding Installation Training Documentation Graphical User Interfaces Database connection scripts Data manipulation scripts TOOLS USED HTML PHP JavaScript CSS Bootstrap Macromedia studio Notepad++ MYSQL BitNami server, EasyPhp Unit tests System tests Security tests Usability test Running system prototype Working software The system’s implementation 60 5.6.3 Database and Script Development Database The database of the system was developed using MYSQL DBMS. The database has nine tables that are related to each other using the primary and foreign keys. These relationships were implemented to ensure reduction in redundancy of data in the database. These tables are supervisor, secretary, student, app_form, announcement, assessment_form, assign_tb, daily_routine, and login. The implementation of the database was based on the entity relationship diagram created in the design phase. System scripts The entire front end GUI of the system were developed using HTML scripts. HTML was used mainly because it is supported by all web browsers and since the application is web based, the interfaces will all be able to be accessed using any of the web browsers available. The back end interfaces that connect the system to the database were developed using PHP scripts. PHP is very compatible with HTML and is platform independent. CSS was used to fine-tune html elements to bring out intuitive and user-friendly interfaces. Bootstrap was used because it is light-weight and enables faster development of a web based system. Database creation To create the database the following line of code is used <?php $host="localhost"; $user="root"; $password="kasekere"; $dbname="internmgtsys"; $c=”Create database internship” ?> $conn=mysqli_connect($host,$user,$password,$c); if(!$conn) echo "Connection refused" . mysqli_connect_error(); 61 Table creation Database tables were created using the php script as can be seen below; Create table Supervisor(supname varchar(12) not null, contact varchar(13) not null, Email_addresss varchar(50) primary key not null); Data capture To capture data from user interface, php scripting language was used ie; INSERT INTO USERS(user_name, Password, Type) VALUES(‘secretary’, ‘secretary@unik.ac.ug’, ‘1’); Data retrieval To view data stored in database, php codes are used for example; Select * from Students where username=”$user”; 5.7 System Testing and Quality Assurance 5.7.1 System Testing After the generation of codes, testing of all the modules was performed. All modules were then integrated together and system testing and error checking was done. As prior discussed in chapter three, this section shows how the system was tested basing on the different techniques and approaches. Type of testing Validation Authentication Description The system was implemented to accept certain value type preset. The validation test checks if the value entered into the text field matches with the specified type. If the two don‟t match, then an error message warning the user of the different data type appears on the screen This is used to check user logins details. If a user logs in with wrong login particulars, the login fails with Tools used Email text fields validation Date text fields Error messaging User name Password 62 an error message “invalid username or password” and takes the user back to the login page. Performance testing This was done to determine how the system performs on the range of possible environments in which it can be used. System Testing All the programs and functions of the system were brought together to test the system as one complete tests. Unit Testing Each unit of the system was tested individually to discover any errors in the code. Database Testing This testing was done to check connectivity between the database, system function scripts and the user interfaces Functional testing The objective of this test was to ensure that each element of the application meets the functional requirements of the system as stated by the target users Description of how the system was tested • Windows platform using Windows explorer and Google chrome • Ubuntu using Google Chrome and Mozilla Firefox System debugging Script inspection Script inspection Script debugging Database debugging System Inspection Error introduction and detection. 5.8 System Installation Installation was done after the system was developed and tested. The major installations were on the hardware and software installations. 5.8.1 Hardware installation Using the system designs made earlier in chapter five, upgrading of computers will be required, network printers, UPS units, backup utilities, internet connectivity, firewall system to block unwanted programs or access, Application and database Servers needed for host the system, database needed to be installed as well. 63 5.7.2 Software installation To have the new system up and running, there is no addition software needed to be installed onto the UniK’s computers so long as computers have an up-to-date web-browser on their Pcs or mobile devices. However the server will be used to host the IMS will require installation of the following software; Windows 7, 8, or 10 for the operating system but preferably, windows server the latest version. Mozilla Firefox version 40.1 and above, Microsoft Internet Explorer version 5.5 for web browsers and Google Chrome browser. MYSQL Server version 5.0.45 for database management PHP 5.2.5 for script editing notepad++ for interface design and scrip editing, Apache 2.0 for Windows as server software 5.8 System Deployment System deployment started after the application scripts were fully tested for proper functionality. The Bitnami server software was installed and tested first on to the computer that is housing the database. This is because the application using MYSQL database management system for managing the application and MYSQL runs on Bitnami server. After the installation of Bitnami, the application files were copied to the apache htdocs. This is to allow the Bitnami open the system once it starts and a web browser is loaded. The URL http:// http://localhost/sentezarmx/index.php opens directly the index page of the system. 5.9 Maintenance and system enhancement The term maintenance covers virtually everything that happens to a system after delivery except total replacement or abandonment. In this case, it will involve the modification of the internship system after its delivery to UniK and adaptation to the changing user requirements and to fix any errors as they occur. The main activities involved are; The Tracking of request and error reports, Implementation of the changes, Monitoring the system performance and improving the performance or increasing capacity, Upgrading hardware and system software, Updating documentation to reflect maintenance changes. 64 5.9.1 User Interface Implementation. This section presents samples of the screen shots of the system user interfaces that were designed and implemented. The user interfaces were designed in very simple layout to enable users easily navigate through the system HOME PAGE Figure 5. 14: The system’s home page Login page This is the second page to be viewed by all users of the system. It is from this page that the user is validated to allow them access other pages of the system. If the details used are incorrect, log in fails with an error message as shown below Figure 5. 15: Login page 65 The signup page Figure 5. 16: The signup page Student Registration form Figure 5. 17: Student Registration form 66 Daily Routine Form/ logbook page Figure 5. 18: Daily Routine Form/ logbook page View Announcements page Assessment page Figure 5. 19: View Announcements page 67 Figure 5. 20: Assessment page Secretary add announcement page Figure 5. 21: Secretary add announcement page Allocation of supervisor page 68 Figure 5. 22: Allocation of supervisor page View Students assignment page Figure 5. 23: View Students assignment page 5.10 End User Training Training of the end users is one of the most important steps for a successful system implementation. The end users ie (deans, secretaries, supervisors and students) should be utilized during parallel testing, so training will need to be rolled out prior to that. Getting the end users involved at this point is also a good way to get them excited about the system, as many of them may not have been involved with the project prior to training. Their assistance in parallel testing 69 will help them prepare for when the Internship management system goes live. End users are good at using the system in more of a "real world" situation and can judge when process flows are not working. When everyone involved with using the system is included in the training, they will feel more confident about using it as they go into production and the user community will view the implementation as successful. Trainers Using the developer and in this case the researcher to conduct training for the students of various courses. This will allow the students to be better informed about how and why the internship management system was developed. Staff members like the secretaries, the deans and supervisors will also be trained to become more familiar with the system. Design Support Materials The Design of support materials that may be needed for use during training and in this case a separate training guide may be developed to show the navigation paths or the Queries. Finally, Publishing the training document outline and having the team review and finalize. 5.11 Conclusion This chapter discussed the design of the Internship Management system. It covered the functional design, database design, architectural design, user interface design and security design. These were discussed in line with the system’s case study. The chapter has also discussed various aspects of the system implementation process from system construction, testing and installing. Aspects of system maintenance after installation were also discussed. The next chapter concludes the whole research paper giving recommendations and a general conclusion of the study. 70 CHAPTER SIX GENERAL SUMMARY, CONCLUSIONS AND RECOMMENDATIONS 6.0 Introduction This research’s main aim was to study and understand how internship is managed at University of Kisubi (UniK) and establish its associated challenges for an improved internship management system, analyze the functional and non-functional requirements of the new internship management system which resulted into logical designs and prototypes of an improved Internships management system in order to ensure that it meets the functional and non-functional requirements as well as to test whether it is free from errors. This set off with the study and analysis of the current systems followed by the establishment of user and system requirements that aided in specifying the functional and non-functional requirements that were used to design models from which the prototype for a new solution therefore discusses the study’s implementation of the solution. was implemented. This chapter conclusions, recommendations and future plans after the 6.1 Research Report Summary The study report presents the aim of the study, objectives, and methods used to achieve the objectives. The report then concludes discussing the challenges and successes of the study. The study’s focus was at improving internship management through designing and implementing a web-based internship management system. For this to be achieved, objects were set to guide the flow of the study and help understand and analysis the current system being used at the study’s case study institution; UniK. The study was conducted in view of business processes and technologies to establish weaknesses in relation to the institution’s goals and review methodologies to come up with the best approach and methods for executing the project. The study reviewed literature on related works to determine the gaps in the current internship management system and establish the need to bridge the gaps and give a solution to improve internship management. This was carried forward by evaluating the business processes on the information supply side through use of data collection techniques and tools discussed in detail in chapter three of the report. 71 The finding of the study revealed that the current system does not allow secretaries to serve clients in a timely manner because, it is still manual and time consuming, The internship registration process, monitoring and evaluation plus supervisor allocation are too manual, students record their daily activities on papers and physical This stressing process slowly led to the poor reporting culture of students and supervisors in different departments of UniK which affects the performance of various departments. In an attempt to solve these problems, the current internship management was analyzed based on the business processes of the University and the user requirements collected during the study. The details of this analysis were discussed in chapter four of the report After the analysis of the system, it was designed and the solution implemented basing on the project objectives and requirements prior determined. (Chapter five and six). Chapter seven concludes the study giving the challenges faced during the study’s undertaking and gives recommendation for the next similar studies. 6. 2 General Conclusion of the Study The Study of current practices of how internship is done at University of Kisubi (UniK) established that the old internship system was handling each aspect of internship independent of the other. By providing a common platform for integration of all the internship management aspects within the new system, the University can now utilize the system to access all information on the students’ internship at a central point. The analysis of the research finding and system requirements for developing an information system to improve internship management at UniK revealed a need for a system that would provide a central storage space for all the data collected on the internship activity and reduction on the time taken by the University staff to produce periodic reports. As an answer to the requirements analyzed, a system prototype was designed and implemented. This greatly cut back on the time taken to work on internship information. Despite delays in implementation of the internship management system, the UniK staff and students were excited to have a system that eased their work of managing internship data, generating reports and improving the overall management of internship. 72 6. 3 Challenges During the undertaking of this research, several challenges were encountered in the process of studying the current system, designing and implementing the internship management system among which the most pressing included; The researcher had underestimated the complexity of the whole study especially the system implementation part thinking it would take a short time to be done but it ended up taking a longer time and delaying the whole research completion. Secondly, the researcher faced a challenge university schedule which didn’t favor the supervisor to be on ground because the university was in recess period and so many times it was not possible to meet supervisor during. This also greatly caused delays id delivering the project on time. The above challenges coupled with time constraints meant that the scope of the system functionality preplanned had to be reduced to complete the project in the given timeframe of twelve months. 6. 4 Recommendations Recommendations are cautions the administrators of the system should do to keep the system functional and well maintained to achieve the main objective of the system. The university secretaries should take some measures of security such as changing the password to make sure that the person accessing the new system are only the authorized ones. The system should be further developed by adding other functionalities of the internship daily operations like managing companies with internship placements can post them on the system to allow students to apply for them. All the UniK staff and students should be trained on how to correctly use the new system so that it will be understandable to all the staff and students. A systems administrator should be involved to manage and keep the system running effectively. This administrator should be very well knowledgeable about the databases, information systems and programming. A backup system should be put in place and used regularly so as to help recover the information for reference in case of system failure. This can be in form of external hard disks. 73 6. 5 Further Work on the System Due to the limited time and other challenges in which this project was to be accomplished, the researcher was un-able to have an adequate number of trial results by the users. Plans to carry out more trails should be put in place by the UniK stakeholders to gain more acceptances and if it is positively received, then fully launch the system once the necessary infrastructure is in place. The designed system is for improving internship management at UniK and the reviewed literature showed that there are other systems designed to manage students activities and other school based information systems but the area of internships had not been thought of at UniK and Uganda as a whole even in Africa. The implemented prototype runs on ordinary web browsers and networked computers, and mobile devices with web browsers, further work can be done to improve the prototype to implement a mobile application that can be used and compatible with the new technologies of mobile devices like mobile phones and notepad computers. 6.6 Conclusion Timely and better quality services extended to users is an all organizations’ dream in Uganda especially in this error of technology; therefore an improvement in the management of internship system would guarantee every person timely access and almost self-service of user needs pertaining internship at UniK. The development of the internship management information system obviously improves the process of internship management through timely access to student’s data like the log books, supervisor details and how they are progressing with their students on internship. The study has not only produced a system prototype of internship management systems but has also proved the new system to be an efficient way of enhancing performance of students and improve supervisor roles compared to the former system. 74 REFERENCES American National Standards Institute. (1975). ANSI/X3/SPARC Study Group on Data Base Management Systems; Interim Report. FDT(Bulletin of ACM SIGMOD) 7:2. Avison. D, Shah. H. (1997). The Information Systems Development Life Cycle: A First Course in Information Systems, McGraw-Hill International, UK. Bagozzi, R.P., Yi, Y., and Phillips, L.W. 1991. "Assessing Construct Validity in Organizational research," Administrative Science Quarterly (36:3), pp 421-458. Baskerville, R., Pries-Heje, J., and Venable, J. 2009. "Soft Design Science Methodology," Proceedings of the 4th International Conference on Design Science Research inInformation Systems and Technology, Malvern, PA: ACM, pp. 9-20. Benbasat, I. and R. Zmud (1999) Empirical research in information systems: the question of relevance, MIS Quarterly 23 (1), pp. 3-16. Benbasat, I. and R. Zmud (2003) The identity crisis within the IS discipline: defining and communicating the discipline’s core properties, MIS Quarterly 27 (2), pp. 183-194. Binti Ismail (2006). Industrial Training Programme Management. Report on Database management systems. Brainbell. (2008). Php - Php Mysql - Terminology Tutorials. Retrieved 17th-March-2008 from, http://www.brainbell.com/tutors/php/php_mysql/Terminology.html Budd, Timothy A. (2002), An Introduction to Object-Oriented Programming, Boston: Addison Wesley BREWER, J. D. (2003) Qualitative research, in: R. L. MILLER&J.D.BREWER(Eds) The A-Z of Social Research: a dictionary of key social science research concepts (pp. 238– 241) (Thousand Oaks, Sage). Charles Richter (1999). Designing McMillan Technical Publishing. Flexible Object-oriented Systems with UML, USA: Checkland. P, Holwell. S. (1998). Information, Systems and Information Systems - making sense of the field, John Wiley & Sons Ltd., Baffins Lane, Chichester, West Sussex PO19 1UD, England. 75 Cockburn, Alistair, “Structuring Use Cases with Goals”, Journal of Object-Oriented rogramming, Sep-Oct, 1997 and Nov-Dec, 1997. Also available on Connolly, Caroln, Thomas, and Thomas Begg. (2002). Database Systems. New York: Harlow Cook, S. J., Stephen R. Parker and Charles E. Pettijohn (2004). The perceptions of interns: A longitudinal case study. Journal of Education for Business, 79, 179-185. CRESWELL, J. W. (1994)Research Design: qualitative & quantitative approaches (Thousand Oaks, Sage). CRESWELL, J.W. (2007) Qualitative Inquiry and Research Design: choosing among five Traditions (2nd edition) (Thousand Oaks, Sage). DeMunck, Victor C. & Sobo, Elisa J. (Eds) (1998). Using methods in the field: a practical introduction and casebook. Walnut Creek, CA: AltaMira Press. DENZIN,N.K.&LINCOLN, Y. S. (1998).Strategies of Qualitative Inquiry (Thousand Oaks, Sage) DENZIN,N.K.&LINCOLN, Y. S. (2005)Handbook of Qualitative Research (3 rd edition) (Thousand Oaks, Sage). DeWalt, Kathleen M. & DeWalt, Billie R. (1998). Participant observation. In H. Russell Bernard (Ed.), Handbook of methods in cultural anthropology (pp.259-300). Walnut Creek: AltaMira Press. DeWalt, Kathleen M. & DeWalt, Billie R. (2002). Participant observation: a guide for fieldworkers. Walnut Creek, CA: AltaMira Press. Dubé and Paré, G. (2003). Rigor in information systems positivist case research: Current practices, trends, and recommendations. MIS Quarterly, 27, 4, 597-636. Fetterman, D.M. (1989). Ethnography: Step by Step. Applied Social Research Methods Series, Vol. 17. Newbury Park, CA: Sage. Fincham, R., Rhodes, P.S. (1992). The Individual, Work and Organization - Behavioral Studies for Business and Management (Second Edition), Oxford University Press Inc., Walton St.,Oxford OX2 6DP, UK. Furco, A. (1996). Service Learning and School-to-Work. Journal of Cooperative Education , 1, 7-14. International Education Studies November, 2009 53 76 GAY,L.R.&AIRASIAN, P. (2000)Educational Research: competencies for analysis and application (6th edition) (Upper Saddle River, Prentice Hall). Gregor, S. 2006. "The Nature of Theory in Information Systems," MIS Quarterly (30:3), pp611642. Guba, E.G., and Lincoln, Y.S. (1981). Effective Evaluation. San Francisco, CA: Jossey-Bass. Guba, E.G., and Lincoln, Y.S. (1981). Effective Evaluation. San Francisco, CA: Jossey-Bass. Hevner, A., March, S.T., Park, J., and Ram, S. 2004. "Design Science in Information Systems Research," MIS Quarterly (28:1), pp 75-105. Hirschheim, R. and H. Klein (2003) Crisis in the IS field? A critical reflection on the state of the discipline, Journal of the AIS 4 (5), pp. 237-293. Hoyle, R. H., Harris, M. J. & Judd, C. M. (2002). Research Methods in Social Relations. London: Thomson Learning, Inc. International Journal on New Trends in Education and Their Implications January, February, March 2012 Volume: 3 Issue: 1 Article: 13 ISSN 1309-6249 Internship at Greek Universities: An exploratory study. Journal of Workplace Learning , 18, 2841. ITF (2004a). Information and Guideline for Student Industrial Work-Experience Scheme: Reviewed 2004. Industrial Training Fund, Jos, Nigeria. ITF (2004b). Directory of Organisations that Accept students on Industrial Attachment. Industrial Training Fund, Jos, Nigeria. James Cook University. (1996). Advantages of the Relational Model. Retrieved on 17th - March2008 from, http://www.cs.jcu.edu.au/Subjects/cp1500/1998/Lecture_Notes /relational_model/advantages.html Janson, M.A., & Smith, L.D. (1985). Prototyping for systems development: A critical appraisal. MIS Quarterly, December, 305-315. Kuhn, T. (1962/96). The Structure of Scientific Revolutions. Chicago, University of Chicago Press. Lakatos, I. (1978) The Methodology of Scientific Research rogrammes (John Worral and Gregory Currie, Eds.). Cambridge, Cambridge University Press. 77 Leedy, P. D. (Ed.). (1997). Practical research: Planning and design (6th ed.). Upper Saddle River, NJ: Merrill. Lincoln, Y.S., and Guba, E.G. (1985). Naturalistic Inquiry. Beverly Hills, CA: Sage. Lincoln, Y.S., and Guba, E.G. (1985). Naturalistic Inquiry. Beverly Hills, CA: Sage. LINCOLN,Y.S.&GUBA, E. G. (1985)Naturalistic Inquiry(Newbury Park,Sage). McMahon, U., & Quinn, U. (1995). Maximizing the hospitality management student work placement experience: A case study. Education and Training , 37, 13-17. Mihail, D.M., (2006). Medina, Richard. (1998). Doculab's Records Management Systems Benchmark. Inform. Merriam, Sharan B. (1988). Case study research in education: a qualitative approach. San Francisco: Jossey-Bass Publishers. Merriam, Sharan B. (1998). Qualitative research and case study applications in education. San Francisco: Jossey-Bass Publishers. Michael Sweeney, Interactive Graphics for Web Based Applications, International Conference on Web Information Systems Engineering, Vol.1, 2000, pp. 409 MILES,M.&HUBERMAN, M. (1994)Qualitative Data Analysis(2nd ed) (Thousand Oaks, Sage). Musoke, M.G.N (2007). Strategies for addressing the university library users' changing needs and practices in Sub-Saharan Africa. Pre-IFLA Satellite conference paper. O’Leary, A. (2004). The Essential Guide to Doing Research. London: SAGE Publications. Ogheneruemu, A., & Tiemo, P.A (2007). Evaluation of the Internship trainee librarians at Delta State University, Abraka, Nigeria. Library Philosophy and Practice. August. Available: Orlikowski, W. and C. Iacono (2001) Research commentary: desperately seeking the ‘IT’ in IT research: a call for theorizing the IT artifact, Information Systems Research 12, pp. 121134. Orrell, J. (2004). Work-integrated learning programs: Management and educational quality proceedings of the Australian Universities quality forum 2004. Palmer, J. (2008). Technology Definitions. Retrieved 17th-March-2008 from, http://www.jimmy-palmer.com/technologies.php 78 Patrick, C. J., Peach, D., Pocknee, C., Webb, F., Fletcher, M., & Pretto, G. (2008). The WIL (Work-integrated learning) Report: A national scoping study [Australian Learning and Teaching Council (ALTC) Final report]. Brisbane, Australia: Queensland University of Technology. PATTON, M. Q. (2002) Qualitative Research & Evaluation Methods (3rd Edition) (Thousands Oaks, Sage). Patton, M.Q. (1990). Qualitative Evaluation and Research Method, 2nd Ed. Newbury Park, CA: Sage. Pope, C., Mays, N.: Qualitative methods in health research. In: Pope, C., Mays, N. (eds.) Qualitative research in health care, pp. 1–10. BMJ Books, London (1999) Rosenberg, D. and K. Scott (1999). Use Case Driven Object Modeling with UML: A Practical Approach. Reading, Massachusetts, Addison-Wesley. Rumbaugh, J., I. Jacobson, et al. (1999). The Unified Modeling Language Reference Manual. Boston, Addison Wesley. Scott, K. (2001). UML Explained. Boston, Massachusetts, Addison-Wesley. Sheldon, P., & Thornwaite, L. (2005). Employability skills and vocational education and training policy in Australia: An analysis of employer association agendas. Asia-Pacific Journal of Human Resources, 43(3), 404-425. Simon, H. (1996) The Sciences of Artificial, 3rd edn., MIT Press, Cambridge, MA. Walls, J., G. Widmeyer, and O. El Sawy (1992) Building an information system design theory for vigilant EIS, Information Systems Research 3 (1), pp. 36-59. Simon, H. (1996).The Sciences of the Artificial, Third Edition. Cambridge, MA, MIT Press. Stringer, E. T. (2008). Action research in education (2nd ed.). New Jersey: Pearson. Sweetland, S.R. & Hoy, W. K. (2002). School characteristics and educational outcomes: Venable, J. 2006. "The Role of Theory and Theorising in Design Science Research," First International Conference on Design Science Research in Information Systems and Technology, Claremont, CA: Claremont Graduate University, pp.1-18. 79 Weber, R. (1997) Towards a theory of artifacts: a paradigmatic base for information systems research, Journal of Information Systems 1 (1), pp. 3-20. Wikipedia, The Free Encyclopedia, September 2012. http://en.wikipedia.org/wiki/Questionnaire#References Wikipedia, The Free Encyclopedia, September 2017. https://en.wikipedia.org/wiki/Thematic_analysis Yin, R.K. (1989). Case Study Research: Design and Method. Newbury Park, CA: Sage. Yin, R.K. (2002) Case study research: Design and Methods (3rd ed.) Sage Publications. 80 APPENDICES Appendix A: Sample Questionnaire for students doing internship Dear Respondent; I am a student at University of Kisubi pursuing a Masters degree in Information Technology. I am undertaking a research on "improving internship management in higher institutions of learning". I kindly request that you answer the questions below with honesty. The research is carried out purely for academic purposes and all responses shall be treated with utmost confidentiality. Personal Information 1. Gender: Male Female 2. Which course are you doing? 3. Which faculty do you belong? 4. Which office/ department is in charge of internship management? 5. Does the university/ faculty/ department/ office in any way assist students to get internship placements? YES NO 6. Which ways does the university assist to create internship opportunities for its students? (A) Advertisement (B) (C) Collaborations with companies (E) Others Specify Collaborations with various schools (D) Internship enquiries 81 7. Does the university provide you with the necessary materials like activity log books, files, charts, etc to help you smoothly conduct your internship training? YES NO 8. If yes, list the materials provided to internship students. i. …………………………………………………… ii. …………………………………………………… iii. …………………………………………………… iv. …………………………………………………… v. …………………………………………………… 9. Do you register with the office before starting internship? YES NO 10. Does the university have information systems which are accessible outside the local area network for internship management? YES NO 11. How simple is it to access the university online systems? (A) Very simple (B) Quite simple (C) Difficult (D) Very difficult (E) Cannot be accessed 12. Are you able to access internet when you are outside the university network? YES NO 13. How often do you access and use internet outside the university network? (A) Everyday (B) Twice a week (C) Twice a month (D) Not at all 14. How many supervisors are you allocated at the faculty? 15. How many internship sessions are you supposed to do before completing your degree? 16. How long is a single internship session? (A) One month (B)Two months (C) Three months (D) More than three months 17. Are you allocated the same supervisor/ supervisors for all the internship sessions? YES NO 18. How many times does each supervisor supervises a student on internship? 82 (A) One (B) two (C) three (D) more than three 19. Is there a continuous flow of communication between you and your supervisors? YES NO 20. Where do you record your daily/ weekly activities while at internship? (A) Logbooks (B) papers (C) in the head (D) others specify 21. What suggestions or recommendations do you give to University of Kisubi to improve on its internship management? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ………………………………………………………………………………… Thank you very much for your response. 83 Appendix B: Sample Interview Guide to the Faculty Deans Opening: My name is Ssenteza Aloyzious and a student of the same institution (Unik). I am undertaking a research project aiming at improving internship management in higher institution of learning. I thought it would be a good idea to interview you, so that I can better develop an internship system that will help the institution to manage internship activities. I would like to ask you some questions about you’re the university’s ICT infrastructure and the use. I hope to use this information to help the University manage the internship program and also help students build their career opportunities. This interaction is scheduled to take about 45minete to 1hr and I am here purposely to make an appointment with you to ask you some questions about internship management in your institution. Body 1. What is your role in the faculty? 2. What are the objectives of internship in your faculty? 3. Describe activities involved in internship in your faculty. 4. How does the faculty assist students to get internship placements? 5. Describe the problems of internship management in your faculty. 6. Describe the procedure followed by students to do internship. 7. What strategies have you put in place as a faculty to cub the problems associated with internship management at the university? 8. What kind of information do you capture from the students for a proper management of internship exercise? 84 9. How do you allocate supervisors to the interns? 10. What kind of information do you capture from the supervisors for a proper follow up of internship activities? 11. How does the faculty maintain the communication flow between internal and external supervisors and the internees? 12. How does the faculty store and retrieve internship records like the students reports, places where they did internship, supervisors etc? Thank you very much for your valuable time and response. 85 Appendix C: Document review guiding for data collection a) In order to understand the organization where the research is going to take place, a number of documents in form of files, magazines, printed reports, Brochures, organizational structure will be accessed and information such as mission, vision and goals of the organization will be extracted from them which will guide in development of an appropriate solution. b) Print outs from university information systems will be reviewed and possibly find out how they work in terms of how they process the output. c) Documentations of the university network infrastructure will also be accessed to find out the nature of its operation and usage or even its coverage. d) Letters of introduction for students going for internship e) University publications f) ICT security policy document g) Student’s internship reports h) Internship forms and students log books i) Internship Supervisors list j) University handbook k) University intraweb l) Research from textbooks 86 Appendix D: Budget for the development of an improved Internship management system DEVELOPING INTERNSHIP MANAGEMENT SYSTEM FOR HIGHER INSTITUTIONS NO ITEM 1 Stationary 2 Photocopying and Printing 3 Binding 5 Consultancy 6 Laptop 7 Softwares 8 Miscellaneous DESCRIPTION Reams of Paper Compact Discs (CDs) Pens OF LEARNING spiral binding Hardcover binding dell icore 3 Operating System Adobe Master Collection Suit Notepad ++ Bitnami Server QUANTITY UNIT COST(UGX) TOTAL COST 10 18000 90000 5 1000 5000 12 500 6000 100000 6 4 2500 20000 15000 80000 1 1500000 200000 1500000 250000 250000 500000 87 Appendix E: Schedule for Masters Research about improving internship management at UniK. DATA SOURCE DESCRIPTION Designing data collection This will involve designing questionnaires, instruments Document review interview guides, observation guides, and document review guide tools to aid in data collection. This will involve gathering different documents of START DATE 24/02/2017 TARGET DATE PERIOD 10/03/2017 1⅓ weeks 10/03/2017 24/03/2017 2 Weeks 25/03/2017 7/04/2017 3 Weeks 8/04/2017 21/04/2017 2 Weeks the university and accessing electronic documents in order to get the background information of the university. Questionnaire In order to collect primary data from a big administration population, questionnaire will be administered to a 15, 45 number of students to find more information about internship activities. Conducting interviews In order to collect flesh and Sufficient information, interview guides will be administered to specific individuals i.e. faculty deans, secretaries, internees, 88 and ict technicians 3 deans, 3 secretaries, 3 students and 2 technicians Observation Secretaries will be observed serving internees. 22/04/2017 5/05/2017 Ongoing Data analysis At the end of data collection activity, the data will 6/05/2017 25/05/2017 3 Weeks 27/05/2017 20/07/2017 2 months 28/05/2017 20/07/2017 2 months/ on be subjected to analysis as a way of justifying the problem and aiding in the development of internship management system. System Design and Logical data modeling, physical data modeling, Development constriction of database, and codding the system. Report writing Writing of the dissertation going System Test Testing various modules of the system on different 2/07/2017 20/07/2017 ongoing platforms and checking and fixing of bugs 89 Appendix F: Letter of introduction that aided data collection 90 Appendix G: Internship Application Form 91 Appendix H: Supervisor’s Assessment Form 92 Appendix I: Assessment Form for Site Supervisors 93