GOOD GOVERNANCE VIA E-PROCUREMENT SYSTEM NOVRIYANTO UNIVERSITI TEKNOLOGI MALAYSIA

advertisement
GOOD GOVERNANCE VIA E-PROCUREMENT SYSTEM
NOVRIYANTO
UNIVERSITI TEKNOLOGI MALAYSIA
iii
My beloved father H. Syafril Mahmud
and my mother Hj. Ratnawilis,
two persons who I most want to present this thesis.
The ones I love most in this life, my wife Shirley, S.Sos.,
with my beloved children,
Linov Zhafran Ramadhan,
this is a milestone in my responsibility to bring you a better life.
My brothers,
Andri, ST
iv
ACKNOWLEDGEMENT
I would like to express my sincere appreciation to my supervisor Assoc. Prof.
Dr. Naomie Salim, for encouragement, guidance, critics, advices, motivation and
friendship from the start until finish this project. Without her continued support and
interest, this thesis would not have been the same as presented here.
My thanks go to Esa Firmansyah, Fariz Rahman Bey and Eko Budi Prasetyo
who provided in valuable help by teaching the nature PHP programming and English
editing for improvement.
My fellow postgraduate students should also be recognized for their support.
My sincere appreciation also extends to all my colleagues, friends and others who
have provided assistance at various occasions. Their views and tips are useful indeed.
Unfortunately, it is not possible to list all of them in this limited space.
v
ABSTRACT
Public procurement in government context involved complicated processes
and too budget-consuming. Inadequate and not transparency information are the
main factors that cause corruption and data manipulation. However, to avoid such
problems, the development of web-based e-procurement system gives priority to
integrity, transparency, accountability, fairness, economy, and efficiency is needed.
The e-procurement system mentioned involved five main modules such as vendor
management system, announcing the acquisition of good and services, electronic
access to tender documents, tender submission document, and tender selection. This
e-procurement system gives privileges to all of the committee members in
calculating marks to determine the winners based on their committee position.
Moreover, this e-procurement system can automatically alert important events such
as the due date of registration, the marking date, and the date of winner
announcement. By using this e-procurement system, three stakeholders can see the
benefits. First, in term of government side where reducing procurement cost,
transparency, time saving, access to new supplier, and blacklist vendor. Second, in
term of vendor’s side where reducing cost, accessing to new buyers and increasing
sales. Third, in term of public society where adequate information, and public trusts.
Hopefully, good governance can be achieved by implementing this e-procurement
system.
vi
ABSTRAK
Pemerolehan umum di dalam konteks kerajaan melibatkan proses yang rumit
dan menelan belanja yang besar. Maklumat yang tidak mencukupi dan telus adalah
faktor
utama
yang
mengakibatkan
manipulasi
data
dan
sogokan.
Walaubagaimanapun, bagi menghindari masalah ini, pembangunan sistem eprocurement secara web yang memberi keutamaan terhadap aspek integriti,
ketelusan, kebertanggungjawapan, keadilan, ekonomi dan kecekapan adalah amat
diperlukan. Sistem e-procurement ini melibatkan lima modul utama seperti system
pengurusan penjual, pengumuman perolehan produk dan perkhidmatan, dan
pemilihan tender. Sistem ini memberi keistimewaan kepada semua ahli jawatankuasa
dalam mengira markah bagi menentukan pemenang berdasarkan jawatan yang
disandang. Seterusnya, sistem ini juga mampu memberi makluman mengenai acaraacara penting secara automatik seperti tarikh luput pendaftaran, tarikh pemarkahan,
dan tarikh pengumuman pemenang. Dengan menggunakan system ini, tiga pemegang
taruh boleh melihat faedah-faedahnya. Pertamanya, faedah kepada pihak kerajaan
adalah seperti mengurangkan kos pemerolehan, meningkatkan nilai ketelusan,
menjimatkan masa, capaian kepada pembekal-pembekal baru dan menyenarai
hitamkan penjual. Keduanya, faedah kepada pihak penjual adalah seperti
mengurangkan kos, capaian kepada pembeli-pembeli baru dan meningkatkan tahap
jualan. Memberi maklumat yang mencukupi dan kepercayaan daripada masyarakat
umum adalah faedah penting yang perlu disampikan. Diharapkan, pentadbiran yang
baik boleh dicapai dengan menggunakan sistem e-procurement ini.
TABLE OF CONTENTS
CHAPTER
1
2
TITLE
PAGE
DECLARATION
ii
DEDICATION
iii
ACKNOWLEDGEMENTS
iv
ABSTRACT
v
ABSTRAK
vi
TABLE OF CONTENT
vii
LIST OF TABLE
xii
LIST OF FIGURES
xiii
LIST OF APPENDICES
xiv
PROJECT OVERVIEW
1
1.1 Introduction
1
1.2 The Background of The Study
4
1.3 Problem Statement
7
1.4 Objective of The Study
7
1.5 Scope of The Project
8
1.6 Important of Project
8
1.7 Chapter Summary
9
LITERATURE REVIEW
10
2.1 Introduction
10
2.2 Supply Chain Management and Procurement Management 12
2.3 Definition of e-Procurement
2.3.1 Government Readiness to e-Procurement
13
14
2.3.1.1 Authentication
14
2.3.1.2 Interoperability
14
2.3.1.3 Open Standard
15
2.3.1.4 Security and Privacy
16
2.3.2 Vendor/ Supplier Readiness to e-Procurement
16
2.3.3 Advantages and Disadvantages Using
e-Procurement
17
2.3.3.1 Advantages
17
2.3.3.2 Disadvantages
18
2.4 Module of e-Procurement
18
2.4.1 e-MRO (Maintenance, Repair, and Operating)
19
2.4.2 e-Sourcing
19
2.4.3 e-Tendering
20
2.4.4 e-Reverse Auctioning
20
2.4.5 e-Informing
20
2.5 Requirement For e-Procurement
21
2.5.1 Security Requirement for e-Procurement
21
2.5.2 Technical Realization of Security Requirement
22
2.6 Legal Context of Public Procurement in Indonesia
24
2.6.1 Presidential Decree No. 18 of 2000
24
2.6.2 Presidential Decree No. 80 of 2003
25
2.6.3 Addendum Presidential Decree No. 80 of 2003
26
2.7 Benchmarking Study
27
2.7.1 Challenges and Successes of Benchmarking
28
2.7.2 Best Practice in e-Procurement
30
2.7.2.1 University of Pennsylvania
30
2.7.2.2 Hewlett Packard
32
2.8 Technology Analysis
35
2.8.1 Three Tier Client Server Architecture
35
2.8.2 Web Database Construction
37
2.8.2.1 The Front End : Web Pages
37
2.8.2.2 The Back End : Database
38
2.8.2.3 Middleware
38
2.8.2.4 The Benefits and Challenges of The Web
Database Construction
2.8.3 Hypertext Markup Language
3
39
2.9 Discussion
40
2.10 Chapter Summary
43
METHODOLOGY
44
3.1 Introduction
44
3.2 Project Methodology
44
3.2.1 Planning Phase
46
3.2.2 Analysis Phase
46
3.2.2.1 Organization
46
3.2.2.2 Requirement Gathering
46
3.2.2.3 Literature Review
47
3.2.3 Design
47
3.2.4 Implementation
47
3.3 System Development Methodology
3.3.1 The Unified Process
4
39
51
51
3.3.1.1 Inception Phase
51
3.3.1.2 Elaboration Phase
52
3.3.1.3 Construction Phase
52
3.3.1.4 Transition Phase
52
3.3.2 Justification of Chosen Methodology
53
3.3.3 Object Oriented Approach
53
3.3.4 UML Notation
54
3.4 System Requirement Analysis
55
3.4.1 Hardware Requirement
55
3.4.2 Software Requirement
55
3.5 Project Schedule
57
3.6 Chapter Summary
57
ANALYSIS AND DESIGN
58
4.1 Introduction
58
4.2 Organization Analysis
58
4.2.1 Organization Structure
4.3 As-Is Process
61
4.3.2 Post Qualification
63
65
4.4.1 Functional Requirement
66
4.4.2 Non Functional Requirement
66
4.5 To-Be Process and Data Model
67
4.5.1 Use Case Diagram
67
4.5.1.1 Use Case Description
6
61
4.3.1 Pre Qualification
4.4 User Requirement
5
60
72
4.5.2 Class Diagram
72
4.5.3 CRC Card
74
4.5.4 Sequence Diagram
74
4.6 System Architecture
74
4.7 Tender Evaluation
76
4.7.1 Failed System Evaluation
76
4.7.2 Merit Point System Evaluation
76
4.8 Window Navigation Diagram
77
4.9 Chapter Summary
81
IMPLEMENTING AND TESTING
82
5.1 Introduction
82
5.2 System Implementation
82
5.2.1 Database Design
83
5.2.2 Coding Approach
85
5.3 Test Result/ System Evaluation
85
5.3.1 Black Box Testing
85
5.3.2 Integration Testing
90
5.3.3 User Acceptance Test
90
5.4 Chapter Summary
91
ORGANIZATIONAL STRATEGY
92
6.1 Introduction
92
6.2 Implementation Strategy
92
6.3 Change in Management
97
6.4 Installation of Infrastructure Process
97
6.5 Training
98
6.6 Expected Organization Benefits
99
6.6.1 Impact Toward Organization
7
REFERENCES
Appendices A - I
99
6.6.2 Impact Toward Vendor
100
6.6.3 Impact Toward Public
100
6.7 Contingency Plan
101
6.8 Chapter Summary
101
DISCUSSION AND CONCLUSION
102
7.1 Achievement
102
7.2 Constrains and Challenges
103
7.3 Aspirations
103
7.4 Future Work for the System
104
7.5 Chapter Summary
104
105
108 - 247
xii
LIST OF TABLES
TABLE NO.
TITLE
PAGE
2.1
Security Requirement
23
2.2
Best Practice Summary
41
3.1
Detail Every Phase In Project Methodology
Framework
48
3.2
Software Requirement for Developing the System 56
4.1
System Improvement
65
4.2
Functional Requirement for Project
66
4.3
Non-Functional Requirement for Project
67
4.4
Failed System Evaluation
76
4.5
Merit Point System Evaluation
77
5.1
List of Black Box Testing
85
6.1
Implementation Strategy
93
6.2
Parallel Implementation
97
6.3
Installation of Infrastructure
98
6.4
Training Design
99
xiii
LIST OF FIGURES
FIGURE NO.
TITLE
PAGE
2.1
Literature Review Structure
11
2.2
Benchmarking Wheel
27
2.3
The Three Tier Client Server Architecture Model
35
2.4
Web Base Construction Model
37
3.1
Project Methodology Framework
45
4.1
Organization Structure
60
4.2
Activity Diagram for Prequalification
62
4.3
Activity Diagram for Post qualification
64
4.4
Admin Use Case Diagram
68
4.5
Committee Use Case Diagram
69
4.6
Vendor Use Case Diagram
70
4.7
Public Use Case Diagram
71
4.8
Class Diagram
73
4.9
System Architecture
75
4.10
Window Navigation Diagram
78
4.11
Administrator Window Navigation Diagram
79
4.12
Committee Window Navigation Diagram
80
4.13
Vendor Window Navigation Diagram
81
5.1
Entity Relationship Diagram
84
xiv
LIST OF APPENDICES
APPENDIX
TITLE
PAGE
A
Use Case Description
108
B
CRC Card
146
C
Sequence Diagram
158
D
User Manual
171
E
Database Design
195
F
Snapshot PHP Code
202
G
User Acceptance Test Questionnaires
223
H
Technical Documentation
232
I
Activity Diagram
247
CHAPTER 1
PROJECT OVERVIEW
1.1
Introduction
Procurement good and services in government of Riau Province is conducted
every year. Source of budget procurement goods and services come from National
General Revenue and Expenditure Budget (Anggaran Pendapatan Belanja Negara/
APBN) and Regional General Revenue and Expenditure Budget (Anggaran
Pendapatan Belanja Daerah/ APBD). Procurement in government involves
supplier/vendor of goods and services and must be announced to public by local
news paper.
Some regulation and legislation of procurement goods and services have been
issued before, but the latest one is Presidential Decree No. 80/2003 (Keputusan
Presiden No. 80/2003). This Presidential Decree’s focus more on procurement goods
and services in government that source budget from National General Revenue and
Expenditure Budget (Anggaran Pendapatan Belanja Negara/ APBN) and Regional
General Revenue and Expenditure Budget (Anggaran Pendapatan Belanja Daerah/
APBD) and also non budgeter resources. This presidential decree’s also encourages
globalization and liberalization procurement in Indonesia. The main goal of this
presidential decree’s is to reduce corruption, collusion and nepotism and make fair
competition in procurement.
Nowdays, government try to improve public procurement by using internet
media. With internet services, the government hope to get good prices by transparent,
open and fair competition. This mean that the public is also involved to control this
procurement processes.
2
A good criteria of procurement must contains :
1. Integrity
Integrity means that the procurement processes are honest and in
compliance with the respective laws, that the best available, most suitable
technical expertise is employed in a non-discriminatory manner, that fair
and open competition leads to a quality product at a fair price, and that the
product takes into account the legitimate aspirations and concerns of all
the stakeholders.
2. Transparency
Transparency means that laws, regulations, institutions, processes, plans
and decisions are made accessible to the public at large or at least to
representatives of the public so that processes and decisions can be
monitored, reviewed, commented upon and influenced by the
stakeholders, and decision makers can be held accountable for them.
3. Accountability
Accountability
means
that
governments,
public
institutions
or
corporations and individual officials, and companies or other individuals
acting on behalf of companies, must be accountable for the correct and
complete execution of their tasks and duties and for the decisions and
actions being made in their area of responsibility. Procedures enabling
full accountability should be systematic and dependable.
4. Fairness, economy and efficiency
Contract award decisions should be fair and impartial. Public funds
should not be used to provide favors to specific individuals or companies,
standards and specifications must be nondiscriminatory, suppliers and
contractors should be selected on the basis of their qualifications and the
merit of their offers, there should be equal treatment of all in terms of
deadlines, confidentiality.
3
Procurement should be economical. It should result in the best quality of
goods and services for the price paid, or the lowest price for the
acceptable, stipulated quality of goods and services, not necessarily the
lowest priced goods available; and not necessarily the absolutely best
quality available, but the best combination to meet the particular needs,
and the published specifications.
The procurement process should be efficient. The procurement rules
should reflect the value and complexity of the items to be procured.
Procedures for small value purchases should be simple and fast though
not at the expense of integrity, fairness or transparency, but as contract
values and complexity increase, more time and more complex rules will
be required to ensure that principles are observed. Decision-making for
larger contracts may require complex committee and review processes.
However, bureaucratic interventions should be kept to a minimum.
Public Procurement is the biggest state expenditure budget in Indonesia and
also the highest level of bribery specially public work and construction sector. Lack
of information about public procurement can easily hide corrupt manipulation. The
problem of public procurements in Indonesia are :
a. Mark Up Price.
b. Double Receipt, Fake Receipt, Blank Receipt.
c. Bad Quality within high price.
d. Arranged Bidding.
e. Not Transparent and Unaccountable.
f. Lower Ethics by apparatus.
g. Bribery.
In this study, researcher proposes a prototype electronic procurement (eprocurement) by using web base technology that give priority to integrity,
transparency, accountability, fairness, economy and efficiency that is in accordance
to presidential decree No. 80/ 2003.
4
In order to capture data and information about procurement processes,
researcher choose Riau Government to be the case study, specifically department of
Regional Planning and Development Agency of Riau Province (Badan Perencanaan
dan Pembangunan Daerah Provinsi Riau) which is located in Pekanbaru.
The remaining part of the study is divided into three chapters. The second
chapter presents the literature review; while the third presents the research
methodology. The initial findings and analysis are discussed in chapter four.
1.2
The Background of the Study
Procedures of public procurement are often complex. Transparencies of the
processes are limited, and manipulations are hard to detect. Acquisition goods and
services processes in government are complicated, and often occurs corruption
action. Marginally, procurement in government has the followings steps.
1. Need Assessment Phase/ Demand Determination.
2. Preparation Phase/ Process Design And Bid Documents Preparation.
3. Contractor Selection And Award Phase.
4. Contract Implementation Phase.
5. Final Accounting And Audit.
From each phase above, there are possible corruptions that inflict a financial
loss. Possible corruptions in every phase on procurement can be identified as:
1. Need Assessment Phase/ Demand Determination. Possible Corruption are
:
a. The investment or purchase is unnecessary. Demand is induced so that
a particular company can make a deal but is of little or no value to the
society.
5
b. Goods or services that are needed are overestimated to favor a
particular provider.
c. Old political favors or kickbacks are paid by including in the budget a
“tagged” contract (budget for a contract with a “certain”, pre arranged
contractor).
d. Conflicts of interest (revolving doors) are left unmanaged and
decision makers decide on the need for contracts that impact their old
employers.
2. Preparation Phase/ Process Design And Bid Documents Preparation.
Possible Corruption are :
a. Bidding documents or terms of reference are designed to favor a
particular provider so that in fact, competition is not possible.
b. Goods or services needed are over- or underestimated to favor a
particular bidder.
c. Unnecessary complexity of bidding documents or terms of reference
is used to create confusion to hide corrupt behavior and make
monitoring difficult.
d. Design consultants prepare a design that favors a particular bidder.
e. Grounds for direct contracting are abused.
3. Contractor Selection And Award Phase. Possible corruption are :
a. Decision makers are biased (bribes, kickbacks, or conflicts of interest
are involved).
b. Selection criteria are subjective in ways that allow biases to play a
role and remain unattended.
c. An advantage to a particular bidder is granted through the exchange of
confidential information before bid submission or during the
clarification period. Clarifications are not shared with all the bidders.
d. Confidentiality is abused and extended beyond legally protected
information making monitoring and control difficult.
6
e. The grounds for the selection of the winner are not made public
(transparency of bid evaluation).
f. Excessive (unnecessarily high) price as a result of limited or nonexistent competition.
4. Contract Implementation Phase. Possible corruption are :
a. Winning bidders/contractors compensate bribes and other extra
payments with poor quality, defective or different specifications than
those contracted. Faulty or sub-specification work execution,
requiring early repairs or expensive correction.
b. Contract renegotiation or change orders introduce substantial changes
to the contract, often in small increments that can be decided by site
engineer.
c. Price increases during execution through change orders reflecting
changes in specifications or cost increases, facilitated often by
collusion between corrupt contractor and corrupt control official.
d. Contract renegotiation is allowed or performed introducing substantial
changes that render the bidding process useless.
e. Contract supervisors or monitors are not independent and willing to
justify false or inexistent claims.
5. Final Accounting And Audit (When Applicable). Possible corruption are :
a. Accountants doing final accounts and Auditors are biased and willing
to support false certificates
In recent years, government emphasizes to use the internet for public
procurement processes. The main objective here is to have better value for money by
fostering access, competition, impartiality, transparency and allowing control by civil
society. By using e-procurement government, it is hoped that we can achieve the
following :
a. Increased efficiency.
7
b. Enhanced transparency.
c. Public access.
d. Better risk management.
e. Higher levels of integrity and ethics.
f. Significantly better access to government procurement for Small and
Medium Size Enterprises (SMEs).
g. Better access for non-local (provincial) bidders.
h. Corruption avoidance.
The proposed of this project is to develop a web base procurement or eprocurement to give priority to integrity, transparency, accountability, fairness,
economy, and efficiency. Researcher also hope to reduce corruption and financial
lose in procurement services and goods on government.
1.3.
Problem Statement
The problem statement from this project is :
“How to design and develop a prototype of e-procurement that is in accordance to
Presidential Decree (Keputusan Presiden RI)
No. 80/2003 with web base
technology”.
1.4.
Objective of the project
The objective of this project are :
1. To study current procurement processes.
2. To design and develop a prototype of e-Procurement system.
8
1.5.
Scope of the project
Procurement have complexity processes, therefore researcher will be focus on
the following area :
1. Design and develop Vendor Management System to record vendor or
supplier data.
2. Announce the acquisition of good and services in government and with
the entire requirement.
3. Notification, include the electronic access to tender documents. This
implies that suppliers can download the tender documents from the
website.
4. Tender submission document, the vendor can submit all tender documents
via website.
5. Winner information will be publishing via internet. This will show who
won the procurement and project specification.
6. Tender Selection, e-Procurement will be generate winner candidate each
tender.
1.6.
Importance of project
By implementing internet media to conduct procurement in government,
especially e-procurement services and good, Researcher hope that it can increase
public trust in government for acquisition goods and services. Some benefit of using
e-procurement for government, vendors/supplier and public are :
1. Government
a. Lower transaction costs – streamlined transaction processing
b. Transparency – greater openness on the publication and award of
public contracts
c. Access to new suppliers – internet access removes geographical
barriers and provides for a more competitive marketplace
d. Time savings – provides faster approval, ordering processes and
potentially delivery.
9
e. Blacklist vendor databases – Government have database that contain
blacklist vendor for procurement, and band the vendor for 2 years.
2. Vendors/ Supplier
a. Reduced costs – electronic trading enables faster processing costs, and
can help to minimize errors often associated with paper based systems
b. Access to new buyers and markets – e-procurement provides a new
sales channel opening up many new opportunities for suppliers.
c. Increased sales – with access to a wider public sector market,
suppliers have the potential to increase revenue.
3. Public
a. Adequate procurement Information – Public can monitor and control
procurement processes through official website.
1.7
Summary
In this first chapter a brief introduction about the project and how the project
is going to be implemented has been discussed. The problem background and
statement has also been discussed in this chapter to give an introduction of the
project and to explain why this project has been proposed. The objective, scope and
the importance of this project have also been pointed out. Hopefully, by developing
the project successfully, the objective and aim of the project can be achieved.
CHAPTER 2
LITERATURE REVIEW
2.1
Introduction
This chapter covers the areas that are of interest to the research study. Deep
knowledge and understanding on research area will let the researchers conduct and
present the research study more easily. The main essentials such as definitions,
concept, policy, procedure, technology, best practices and the case study of existent
system have been analyzed and explained. All sources are obtained by doing
literature review from various sources such as books, journals, conferences, research
reports and theses, the internet and so on. The aim is to broaden the understanding of
the details of the uncovered areas in literature which the study attempts to make a
useful contribution. The essentials that are covered in this topic are shown in Figure
2.1.
Figure 2.1
Literature review structure
2.2
Supply Chain Management (SCM) and Procurement Management
SCM has become more visible as a major managerial concern over the last
few years. This has been driven by the exploitation of new information and
communication technologies, in particular the Internet, and their potential to
revolutionize, streamline, and enhance supply chain operations has flourished
(Patterson et al., 2003). By definition, SCM is the integration of key business
processes from the end user through original suppliers that provides products,
services, and information that add value for customers and stakeholders (Stock and
Lambert, 2001).
The performance of an existing supply chain needs to be measured and
evaluated in order to identify threats and opportunities for a business. While many
SCM
aspects
(customer
service
and
satisfaction,
cycle
times,
delivery,
responsiveness, costs, etc.) contribute to supply chain performance it is argued that
the key link, the one that sets the foundation for the others, is the performance of
supply management on the input end of the chain (Dobler and Burt, 1996).
Recent literature in SCM, e-Commerce, and procurement has advocated the
benefits of e-procurement (Davila et al., 2003; Kheng and Al-Hawamdeh, 2002;
Lancioni, et al., 2003; Presutti, 2003). The potential benefits can make the often
overlooked purchasing function into a competitive weapon, contributing to the
overall corporate strategy (Knudsen, 2003). Procurement management refers to the
coordination of all those activities involved in the process of purchasing goods and
services necessary to accomplish the mission of an enterprise. Radstaak and Ketelaar
(1998) suggested that e-commerce purchasing would enhance supply chain
efficiency by providing real-time information about product availability, inventory
level, shipment status, and product requirements.
e-Procurement has been identified as an important element of e-business
operational excellence for large firms (Barua et al., 2001). e-Procurement is defined
as any information and communication technology designed to facilitate the
acquisition of goods by a commercial or a governmental organization over the
Internet (Davila et al., 2003). This interconnected world allows organizations
(employees, suppliers and customers) to conduct transactions via a single point for
commerce and information, creating a global web of digital markets and corporate
exchanges. e-Procurement can transform the whole purchasing process as it pervades
all the major components of the purchasing process such as definition of product
design/requirements,
production
scheduling,
suppliers’
search/
selection,
negotiation/contracting agreements/transactions, supplier evaluation, supply chain
management and collaboration (Lancioni et al., 2003).
e-Procurement has evolved to the point where the objective is to reward the
business on a total-cost, not low-price, basis. By automating and streamlining the
laborious routines of the purchasing function, purchasing professionals can focus
more on strategic purchasing and corporate goal achievements. The goal of eProcurement is not to make a supplier drop their prices or lower their margins but to
achieve savings through management of material and administration costs. The
potential of these savings can be realized by both the organizations that purchase the
commodities and the vendors who supply these commodities to the organization.
2.3
Definition of e-Procurement
E-procurement refers to the electronic acquisition of goods and services in a
firm (Turban, et al., 2006). By automating the tactical processes and workflows
associated with purchasing, the firm expects to increase the productivity of its
purchasing agents, lower purchase prices of different types of goods and services,
streamline the information flow, business processes, and workflows involved in
purchasing, eliminate maverick buying (i.e., buying from unauthorized vendors),
reduce order fulfillment and processing times, reduce the number of suppliers the
firm is dealing with, streamline invoice reconciliation and dispute resolution, reduce
the administrative processing cost per purchase order, integrate budgetary controls
into the procurement process, minimize human errors in the buying and shipping
processes, and monitoring and regulating buying behavior (Turban, et al., 2006).
2.3.1 Government Readiness to e-procurement
Lack of organizational (internal) readiness has been shown to inhibit IT
adoption in organizations where readiness is defined as the availability of needed
organizational resources (Baura et al., 2005).
2.3.1.1 Authentication
Authentication is the process of ascertaining the identity of a party that has
sent or received a message, and/or determining that the message received is accurate
(Yang and Papazoglou, 2000). Authentication is a critical component of eProcurement as it involves the electronic transactions of significant number of
documents including purchase orders, request for quotation/tender and invoices. The
questions such as who originated these messages, how the integrity in transmission
and storage of these messages and their confidentiality will be assured of, and why
the originator intended to enter into the binding relationship are always important in
regards to e-Procurement transactions.
2.3.1.2 Interoperability
The interoperability framework describes a base set of policies and standards
that reduces the need for trading partners to join several marketplaces by allowing
them to interoperate using various technologies and allow seamless provision of
information and services between Government agencies. (AGIMO, 2004).
Interoperability is essential to conduct procurement electronically between industry
and government, and between agencies. As e-Procurement increasingly focuses on
inter organizational communications and business transactions, the need to
harmonize business models, processes, and representation formats rises rapidly.
Yang and Papazoglou (2000) note that transactions in the B2B e-commerce are
usually long-lived propositions involving negotiations, commitments, contracts,
floating exchange rates, shipping and logistics, tracking, varied payment instructions,
exception handling, and customer satisfaction. Furthermore, interoperability in the
context of such e-commerce propositions is driven by a number of factors including
business process compatibility, adaptability of business process, leveraging legacy
assets, support for business transactions; and, network security services. The types of
atomic protocols associated with business transactions and thus with interoperability
has been discussed by Tygar (1998). According to the author, payment-atomic
protocols effect the transfer of funds from one party to another whereas goods
atomicity protocols allow an exact transfer of goods for money. Similarly, whereas
deliver-atomic protocols allow both transacting parties to prove exactly which goods
were delivered, contract atomicity protocols are governed by ecommerce protocols
that include the exchange of financial information services and the exchange of bills
and invoices.
2.3.1.3 Open Standards
Standards guide the trading partners in implementing interoperable eProcurement technologies and manage G2B business-to-business exchange. Since
the open standards use a common/general system architecture instead of the
proprietary software to enable smooth business-to-business e-commerce transactions
on the Internet, it can integrate into the existing procurement systems (computerized)
and IT infrastructure. The open standards also support simple or complex
procurement and can link the variety of e-Procurement technologies and inventory
systems implemented by the trading partners (Tian et al., 2000). Some of the key
standards for data that can be used to support e-Procurement include Open Buying on
the Internet (OBL) and Extensible Markup Language (XML). Other new and
evolving standards include the organization for the Advancement of Structured
Information Standards (OASIS) proposed by the United Nations, electronic business
Extensible Markup Language (ebXML), and the Universal Description, Discovery
and Integration (UDDI) initiative. (APCC).
2.3.1.4 Security and Privacy
Security refers to the confidentiality, integrity, access and availability of data
during its transmission and its storage in all formats whereas privacy concerns the
rights of individuals who may be concerned that the privacy of provided information
may not be adequately protected (APCC, 2002). The Internet offers easy
communication between individual computers; it also opens up the possibility of
outsiders breaking into computer systems and stealing valuable information such as
credit card numbers. Any information transmitted over the Internet can be
intercepted at any point if appropriate security precautions are not taken.
Organizations, therefore, have a responsibility to ensure that trading partners
maintain appropriate levels of security (AGIMO, 2004). Like security, privacy is also
related to confidentiality which refers to the use of encryption for scrambling the
information sent over the Internet and stored on servers so that eavesdroppers cannot
access the data (Yang and Papazoglou, 2000).
2.3.2 Vendor/Supplier Readiness to e-procurement
Assessing the suppliers’ e-Business is important for successful e-Procurement
assimilation because of the dyadic nature of e-Procurement which must interface
with the organization’s suppliers. Needless to say, even if an organization has the
necessary e-Procurement infrastructure to conduct procurement with the suppliers, a
lack of readiness on part of the suppliers will hinder the assimilation of the eProcurement. The intensity of e-Procurement assimilation of an organization depends
not only on its own efforts to incorporate e-Commerce technologies in its
procurement functions, but also on the readiness of its suppliers and trading partners
to engage in electronic interactions and transactions. Suppliers may be concerned
about the technical barriers and the investment
required to e-enable their processes. Furthermore, they may need to be educated on
the new medium of business and their security concerns must be addressed. Barua et
al. (2005) argue that supplier readiness should be considered as an enabler that
requires a proactive commitment of an organization’s resources even though it is
regarded as an external to the organization. Barua et al. (2005) suggest the firms to
design certain incentive mechanisms such as subsidy or guaranteed business to
encourage business partners to get connected. The authors further suggest to invest in
resources to help increase the capability of their partners to do business
electronically, such as providing training. NePP (2004) cautions that forcing
suppliers to adopt the preferred trading method can be problematic and manifest
itself through supplier non-compliance by way of not quoting or quoting incorrect
purchase order numbers, incorrect routing of invoices, backdated invoices and
invoices details not matching order details. This line of reasoning is consistent with
(Barua et al., 2005) who argue that a firm needs to rely on its suppliers’ readiness to
actively adopt and assimilate its online initiatives
2.3.3 Advantages and Disadvantages Using e-Procurement
E-procurement
play quite an important role in the world today. Most
organizations are interested in using e-Procurement in order for them to be more
competitive advantage.
However, there are some advantages and some disadvantages in eprocurement.
2.3.1.1 Advantages
An e-procurement process running over the Internet has several advantages,
e.g. for companies :
1. Better and faster access to private and public procurement (e.g., by easy
search via a search engine)
2. Digital offer transmissions (e-Tendering)
3. Financial savings (no need for expensive printouts, less administration
effort)
4. No media conversions (e.g., from a digital document to a paper output)
The advantages for the governments are moreover:
1. Administration modernization (e.g., by less administration effort and
faster processing)
2. Price advantages for buying authorities or institutions for several reasons:
3. More competition between suppliers
4. By collecting volumes a high or higher volume purchase becomes
possible
5. By an adequate supply daily consumables can be procured easily and the
process cost are as low as possible
2.3.1.2 Disadvantages
The disadvantages of e-Procurement are :
1. Implementation Problems. User expectations/change management can be
difficult. Thirty-two percent of those interviewed for the Forrester study
said that they wrestled with getting employees to use the new software.
2. Loss of direct relationship between the Buyer and the Seller. Eprocurement relationships are reduced to electronic transactions with no
personal interaction. Companies must choose whether this is the way they
want to conduct business between the different entities that sustain them.
2.4
Modules of e-Procurement
e-Procurement can be defined as using Internet technology in the purchasing
process. It is important to note that this definition is tight in the sense that it excludes
old applications like ordering by telephone or by fax. On the other hand, this
definition is relatively wide, because it not only encompasses the use of Internet
applications in the purchasing process, but it also includes the use of intranet and
extranet applications. For example, ordering office supplies by using a supplier
catalog on a website is a form of e-procurement
Based on the definition of e-procurement a large number of forms of eprocurement can be distinguished. Some of these forms have received a lot of
attention already, which has led to a situation that these forms are quite well-defined
and relatively well-developed. Other forms of EP are still quite young and immature.
Some of them will mature, others will never reach that state. In the following focus
on the forms of e-procurement that are quite well-defined and relatively welldeveloped.
2.4.1 e-MRO (Maintenance, Repair and Operating)
e-MRO as well as web-based ERP is the process of creating and approving
purchasing requisitions, placing purchase orders and receiving goods and services
ordered, by using a software system based on Internet technology. In the case of eMRO the goods and services ordered are maintenance, repair and operation (MRO)
supplies (i.e., non-product related). The supporting software system (an ordering
catalog system) is used by all employees of an organization. In the case of web-based
ERP the goods and services ordered are product related. Usually only the employees
of the purchasing department (or the planning department) are using the supporting
software system (a web-based ERP-system (Enterprise Resource Planning)).
2.4.2 e-Sourcing
E-sourcing is the process that identifies new suppliers for a specific
purchasing category, using Internet technology (usually the Internet itself). By
identifying new suppliers a purchaser can increase the competitiveness during the
tendering process for this purchasing category. E-sourcing is also a way of
decreasing the supply risk associated with this purchasing category (Kraljic, 1983).
2.4.3 e-Tendering
E-tendering is the process of sending RFI (Request for Information) and RFP
(Request for Proposal) to suppliers and receiving the responses of suppliers, using
Internet technology. Sometimes within e-tendering the analysis and comparison of
responses is also supported. E-tendering does not include closing the deal with a
supplier. As a matter of fact, e-tendering smoothens a large part of the tactical
purchasing process (according to (van Weele, 1988)), without focusing on the
content of that process.
2.4.4 e-Reverse Auctioning
A reverse e-auction is a time-bound event, usually enabled by a third party
auction facilitator, and is typically of one to two hours duration (Grieger, 2003;
Smeltzer and Carr, 2003). The auction commences with the buyer posting the initial
contract price, often at a value that is lower than the historical figure, already
representing a unit cost reduction. Suppliers proceed to bid against unknown
competitors under a downward price mechanism until the price-floor is reached. At
this point, the auction concludes and the contract is awarded, theoretically to the
lowest bidder.
2.4.5 e-Informing
E-informing is a form of e-procurement that is not directly associated with a
contract or a transaction, whereas the others are. E-informing is the process of
gathering and distributing purchasing information both from and to internal and
external parties, using Internet technology. For example, publishing purchasing
management information on an extranet that can be accessed by internal clients and
suppliers is a way of e-informing.
2.5
Requirement For e-Procurement
When employing e-Procurement solutions in the public sector, both the
buyers and suppliers security requirements must be taken into account. Furthermore,
the legal implications stemming from laws including public procurement, digital
signature and privacy laws must be considered. Only a few of the current eProcurement projects in the public sector consider such requirements.
Secure e-procurement can be defined as an e-procurement process that fulfills
the security requirements of entities participating in a bidding scenario. More
specifically, a secure e-procurement process should ensure that the competitive
information is protected and secured against unauthorized access and modification.
In open computing environments like the Internet, the application of digital
signatures plays a significant role in order to ensure the security requirements with
respect to authenticity, integrity and legal liability.
2.5.1 Security Requirements for e-Procurement
This section describes security requirements for the public procurement /
award procedures. In the following, will describe security requirements of the public
e-procurement process during the work flow of award procedures. Requirements of
the buyer (e.g., public authority) are:
1. Availability of bid invitations
2. Authenticity and integrity of received tenders
3. Legal binding ness of received tenders
The supplier or vendor on the other hand has the following security
requirements ensuring that his offer and other sensitive information associated with
his offer are protected:
1. Confidentiality of the supplier’s actions (e.g., which are the bid
invitations of his interest)
2. Confidentiality of submitted tenders until the date of opening
a. Tenders cannot be opened until the corresponding deadline has been
reached
3. Integrity and authenticity of submitted tenders and received documents
4. Legal bindingness of awarded contracts
5. Receiving authenticated confirmations of timely placed offers and tenders
During the steps of e-procurement processes, the following has to be
guaranteed :
1. Notification (accessing tender documents)
a. Accessibility of the system to publish and receive bid invitations
b. Confidentiality
2. e-Tendering (offer submission)
a. Authenticity
b. Confidentiality
c. Integrity
d. Legal bindingness
e. Time stamping of confirmation notices
3. e-Awarding
a. Restrict access to tender documents until opening deadline regarding
public buyer and other vendor
4. All steps
a. Securing storage, e.g., respecting privacy laws and keeping records
b. Traceability (documenting the progress of the award procedure)
2.5.2 Technical Realization of Security Requirement
Public Key Infrastructures (PKI) is the prevalent and the most commonly
used systems for fulfilling the requirements of both the supplier and the buyer.
Digital signatures, which require a PKI, are the most suitable technique which
guarantees liability and legally binding electronic transactions as well as authenticity
and integrity.
Examples for realization possibilities for implementing the security requirements
described above are shown in Table 2.1.
Table 2.1 : Security requirement
Security Requirement
Realization Technique
Accessibility/ Availability
Open Flatform
Authenticity
Credentials over secured channel (e.g.,
SSL)
Digital signatures and certificates
Confidentiality
Encryption (of connection data, payload)
by using PKI
technologies or a secured channel (e.g.,
SSL)
Four Eye Principle/ Dual Control
Double encryption
Key split-up / fragmentation
Integrity
Hashing
Digital signatures
Checksum over secured channel (e.g., SSL)
Legal
Biddingness/
Repudiation/
Non
Qualified
signatures
using
certificates
provided by a official
certification authority
Restrict Access (deadline)
Protected
location
for
used
storage
hardware
Third party platform
Encryption but decryption key transmission
on deadline
Secure Storage
Protected administrative location for used
storage hardware
Building up data logging and auditing
structures
Time Stamping
Digital signing by third party
Traceability
Logging (by secure storage) of all relevant
messages and
data for documenting the progress of the
award procedure
2.6
Legal Context of Public Procurement in Indonesia
The effort to reform the public procurement system was initiated at the
beginning of President Soeharto’s regime, New Order regime I. In 1999, legislators
passed Law No. 18 on Construction Services and Law No. 5 on the Ban of Monopoly
Practices and Unfair Competition Practices.
2.6.1 Presidential Decree No. 18 of 2000
These laws were then clarified with Presidential Decree No. 18 of 2000 on
Public Procurement. The underlying principle of this presidential decree was to
facilitate effective and efficient budget spending, and to encourage fair competition
and transparent, accountable and nondiscriminatory public procurement.
On a practical level, however, Presidential Decree No. 18 of 2000 contained several
weaknesses:
1. Inconsistencies and contradictions with other laws and regulations.
2. Opportunities for ambiguous interpretation. This creates conflicts when
local governments implement rules in their province, regency, or district,
since the law requires further explanation. This fuzzy situation facilitates
unfair competition and rampant corruption, collusion, and nepotism.
3. License requirement. Before bidding on tender, a bidder must obtain a
license from a senior public official. This rule creates an opportunity to
extort money from the bidder.
4. Designation of the bidding committee based on nepotism and collusion.
This can result in incompetent parties’ winning bids.
The issue of corruption in public procurement caught the attention of the
Consultative Group on Indonesia (CGI) during their regular meetings for loan
discussion with the Indonesian government. The Memorandum of Understanding
noted that more transparent, accountable, participatory, and non-discriminatory
public procurement processes were required for a loan covenant.
2.6.2 Presidential Decree No. 80 of 2003
President Megawati then issued Presidential Decree No. 80 of 2003 on Public
Procurement. This decree aims to regulate public procurement procedures, and
encourages liberalization and opening up of the public procurement system in
Indonesia.
Presidential Decree No. 80/2003 contributed to more efficient state spending.
It has also helped reduce the amount of unaccountable funds in the state budget and
has significantly lowered costs in some provinces and regencies.
Presidential Decree No. 80/2003 stipulates important rules on corruption
prevention:
1. Defines the local government budget user as a goods and service.
2. Requires government (including local governments) to announce and
publish an annual public procurement plan at the beginning of the year.
Also mentions sanctions or punishment for the off ending public official
and vendor.
3. Requires government (including local governments) to assign an officer
in charge of procurement in all procurement processes worth over IDR 50
million.
4. Requires procurement user and committee to have necessary skill
certificates.
5. Consulting services must be awarded before a tender is called for
development of a project.
6. Categorizes vendors on the basis of their size, to make the tender process
fairer.
7. Eliminate license requirement for bidder (as previously required under
Presidential Decree No. 18 of 1999).
8. Allows the multiplication of auction documents, to maximize disclosure
policy.
9. Opens bidding processes and tenders to all parties.
10. Reduces conflicts of interest by forbidding supervisory officials and
project officers to be committee members, and forbids public
servants/officials from being vendors.
11. Promotes post-qualification rather than pre-qualification.
12. Prevents procurement committee from adding qualification requirements,
such as area limitations or association certificates.
13. Require procurement process committee if contract value exceeds IDR 50
million, and committee must consist of at least three members or another
odd number of members.
14. Facilitates the pre/post qualification process by encouraging qualification
and the use of statement letters to minimize the practice of delivering
documents directly. This process aims to deter bribery. Before, the bidder
and committee could meet directly before a tender was organized and
Require parties to enter into an Integrity Pact
2.6.3 Addendum Presidential Decree No. 80 of 2003
Presidential Instruction No. 5 of 2004 concerning the Acceleration of
Corruption Eradication, in particular the sixth addendum, is a further development.
This additional text requires all government institutions to implement Presidential
Decree No. 80/2003.
The government has actively reformed the stipulations of Presidential Decree
No. 80/2003. In 2005, the Indonesian government issued Governmental Regulation
No. 70/2005, which was intended to simplify and accelerate the public procurement
processes during the Aceh reconstruction. Another change came in the form of
Presidential Regulation No. 8/2006.
2.6
Benchmarking Study
Benchmarking can somewhat philosophically be defined as follows (APQC,
1993) :
“Benchmarking is the practice of being humble enough to admit that someone
else is better at something, and being wise enough to learn how to match
them and even surpass them at it”.
This definition captures the essence of benchmarking, namely learning from
others. The core of the current interpretation of benchmarking is:
1. Measurement, of own and the benchmarking partners'performance level,
both for comparison and for registering improvements.
2. Comparison, of performance levels, processes, practices, etc.
3. Learning, from the benchmarking partners to introduce improvements in
your own organization.
4. Improvement, which is the ultimate objective of any benchmarking study.
Benchmarking is conducted in separate projects whose individual objective is
to improve one of the organization'
s business processes. There are a number of
models describing the different steps that constitute a benchmarking study. One such
model is the so-called benchmarking wheel, as portrayed in Figure 2.2 (Andersen,
1995).
Figure 2.2
benchmarking wheel, as portrayed (Andersen, 1995)
2.7.1 Challenges and Successes of Benchmarking
The challenges, possible remedies, and success factors are listed below. In
terms
of challenges and pitfalls, the main elements were :
1. Finding benchmarking partners willing to participate in the benchmarking
studies. This was by far the single most difficult of all tasks, which is
quite usual in benchmarking. Identifying companies that seem to be
comparable in terms of size, market conditions, industry, etc., that are
believed to be sufficiently better, to have something to teach others, and
at the same time are willing to share their best practice information, is
difficult. The normal way to overcome this obstacle is to run company
searches through many different channels, e.g. the company'
s own
network, industry associations, area experts, etc.
2. Getting acceptance for the use of both quantitative and qualitative
benchmarking information. The information sought in benchmarking
normally consists of two parts:
a. quantitative performance data used to determine the differences in
performance levels among companies comparing; and
b. qualitative business process descriptions used to create learning
among them.
Since the numerical performance data often involve financial information, the
willingness among the consortium and benchmarking partners to surrender this type
of information was rather low:
1. Lack of business process understanding. Although the term business
process has been known in academic circles for a few years, it is not as
widespread in industry. While some of the benchmarking partners had
modeled their business processes and could give us flow charts depicting
these, many of them did not. Thus, it required much more work to
establish the flow of goods and information and model the processes.
2. Limited duration of each interview. During interviews, we were limited
by time. In order to go into each individual process in depth it would have
required more time, both during the interview and for the preparation. If
we had been able to perform longer and more specific interviews we
would have been able to get a deeper understanding of the processes and
their performance.
3. Comparability of companies and processes. The benchmarking partners
were all chosen because they had a similarity to or relationship with the
industrial partner. This did not, however, ensure comparability of their
processes. Even though not all information was comparable the visit
could still generate new ideas for the industrial partners.
These are all pitfalls and challenges prospective future benchmarkers should
be aware of and try to counteract. Some possible solutions to these challenges are:
1. In general, solving the very difficult issue of finding relevant and willing
benchmarking partners can be attempted through different approaches:
a. Applying a systematic procedure whereby a large number of potential
benchmarking partners are scanned for relevance and high
performance.
b. Seeking aid and support from sources and institutions that might be
able to point to and convince potential partners, e.g. industry
associations, area experts, media, etc.
c. Making sure the offer made to the companies is attractive, for instance
by informing about processes the benchmarking company is
particularly good at and offering return visits.
d. Requesting initial performance information about the process in
question before selecting a benchmarking partner, to make sure the
performance is sufficiently good to offer new insights.
2. All challenges pertaining to poor data collection after actually having
found willing benchmarking partners can be counteracted by a number of
remedies:
a. Exchanging all possible background information beforehand, thus
being able to start covering the interesting parts right away.
b. Sending the questionnaire in advance to allow time for data gathering
and preparations.
c. Meeting for a social gathering the night before the benchmarking visit
to break the ice and build up trust before starting the meeting.
d. Offering to pay for the time spent by the benchmarking partner in
preparations for and during the benchmarking visit.
e. Making sure to bring along someone fluent in the local language if the
benchmarking partner finds it difficult to conduct the interviews in an
international language.
2.7.2 Best Practice in e-Procurement
Best practice in e-procurement performers has long-term, well-thought-out
strategies for e-procurement implementation. Many such systems have been
implemented in phases, with each new phase building off the successes and lesson
learned of prior phases. (Aberdeen Group, 2005)
2.7.2.1 University of Pennsylvania: Purchasing ‘Sells’ E-Procurement to End
Users
Business Challenge
The Purchasing Department at the University of Pennsylvania sought to
increase campus-wide compliance with financial policies, approved buying methods,
and preferred contract suppliers. The university also was looking to gain procure-topay process efficiencies, reduce the cost of products, and eliminate off-contract
(“maverick”) buying.
Penn is a decentralized procurement environment in which authorized
purchasing system users make supplier sourcing decisions at the point of demand.
Purchasing was faced with the daunting challenge of selling adoption of a new
system to research scientists and other end users who were accustomed to buying
from their own choices of suppliers.
Solution Selection and Deployment
The university formed an e-procurement team made up of representatives
from the comptroller’s office, purchasing, and the information technology group.
This team evaluated the university’s business requirements and selected Oracle as an
e-procurement partner along with SciQuest for content-hosting services. Oracle
Financials, (including the General Ledger, Purchasing, iProcurement, and Payables
modules), was deployed campus-wide in July 1996. The SciQuest Incorporated
Spend Director solution, which went live in January 2004, hosts Penn’s private
electronic supplier exchange, which is integrated into Oracle Purchasing. Since then,
several enhancements
have been made to the solution, resulting in new features and functionality for the
approximately 1,750 system users.
Currently, out of a purchasing system database of 30,000 approved suppliers,
136 have been made available in the private electronic exchange, called Penn
Marketplace, through which approximately 70% of all purchase order transactions
flow. Use of these marketplace-enabled preferred contract suppliers has doubled
since Penn Marketplace was deployed, when only about 35% of transactions were
with these suppliers. Eventually, Penn plans to enable 175 to 200 suppliers in Penn
Marketplace. The SciQuest Spend Director solution, a hosted application; enabled all
content from 122 suppliers with hosted content and 14 through punch-out.
In 2005, approximately 18% of Penn’s total procurement spend has been
managed via the e-procurement system, which handles all spend categories. User
acceptance and adoption were keys to system success, and the university’s
purchasing group was involved deeply in this, as well as change management.
Purchasing’s focus was to make the e-procurement system and processes as easy to
use as possible and to continually reinforce to end users the value of buying through
the system.
Results
Penn attributes $77.4 million in total product cost savings to the eprocurement system; this includes improved contract and pricing compliance, which
purchasing estimates at $7.7 million resulting from the enablement of Penn
Marketplace suppliers. Purchasing also has identified significant administrative
efficiencies, though the university does not report such “soft dollar savings.”
Since the system was deployed, Penn has seen a 484% improvement in
contract compliance. Also,average cycle time (online purchase order creation to
electronic order transmission to supplier) has fallen from 18 days to less than one for
more than 92% of all purchase orders.
Penn has also improved administrative processes and reduced the number of
full-time employees needed to process transactions.
Lessons Learned
Maier stresses the importance of engaging the user community for product
evaluation, testing, and implementation. He adds that there should be a good deal of
collaboration among the user community, business units, and the IT organization. He
believes it’s important to proactively “sell” an e-procurement initiative to end users,
and that Purchasing should have a clear and concise marketing strategy for that.
2.7.2.2 Hewlett-Packard: e-Procurement Handles Nearly All of Indirect Spend
Business Challenge
Hewlett-Packard is a Fortune 11, global manufacturer of technology products,
with annual sales of $80 billion. HP is the largest information technology company
in the world, and has 140,000 employees in more than 170 countries.
Annual spend is a staggering $60 billion. Of this total, $13 billion is spent on
indirect materials, the rest on direct materials and services.
Purchasing at HP is addressing non-compliant spend, local sourcing and
strategic procurement activity, strategic global sourcing, and other initiatives. In
addition, the indirect procurement group is working across business units and
geographies to drive down the total cost of ownership by attacking spend across
such horizontal commodities as print supply chains, labor and software.
To achieve aggressive savings and spend reduction objectives, Indirect
Procurement must be able to direct spend to preferred suppliers, enforce compliance
to purchasing policy and have visibility to spend globally.
E-Procurement Strategy
Larry Welch, VP Indirect Procurement for HP, notes that there have been
several milestones in HP’s e-procurement strategy.
HP selected Ariba Buyer as the company’s procurement platform, way back
in 1998, very early in the evolution of e-procurement solutions. HP saw Ariba as an
early leader in spend management technology.
When HP merged with Compaq, the company took another look at available
solutions and decided to stick with the Ariba platform because of its comprehensive
functionality that supported HP’s worldwide deployment, the fact that the Ariba
platform already was integrated into other critical “go-forward” systems within HP,
and because HP’s platform was more highly developed than the technology platform
that Compaq used.
Solution Selection and Deployment
More recently, purchasing at HP had to evaluate possible solutions to deploy
for its go-forward platform for strategic procurement. HP once again chose Ariba as
its solution provider. HP purchasing sought global capabilities in its solution
provider, a clear technology roadmap and vision, superior functionality, and the
strong desire to partner with customers. Ariba met all these criteria, in addition to
HP’s desire for a speedy implementation, reasonable solution cost, extent of platform
integration, and the presence of many existing installations. Currently deployed are
Ariba Buyer, Ariba Category Procurement, and OB10 (for invoices). HP is in the
process of planning deployment across all procurement functions (direct, indirect,
services) of Ariba Analysis, Ariba Category Management, Ariba Sourcing, Ariba
Contract Workbench, Ariba Compliance, and Ariba Supplier Performance
Measurement. HP calls this initiative “Enterprise Strategic Procurement,” and the HP
procurement team expects this broad adoption of the Ariba’s solution to provide
numerous opportunities for cost savings and process efficiency improvements.
Ariba solutions are now deployed for indirect procurement in 46 countries
where HP operates. Ariba Buyer is available to nearly all of HP’s 140,000
employees. Approximately 10,000 users purchase through the system each month,
and approximately 50,000 HP personnel have used the system since it was
implemented. When the strategic procurement solution is implemented, there will be
about 1,500 procurement professionals who use the system. HP’s indirect supply
base is 45,000 suppliers, but 82% of HP’s indirect spend is with 265 suppliers.
A staggering 95% of HP’s annual indirect spend of $13 billion flows through
the Ariba e-procurement system. Various spend categories flow through the system,
including software, outsourced IT services, IT consulting, R&D supplies, marketing
materials, real estate and workplace services, and travel and meetings expenditures.
From 1999 through 2003, Ariba Buyer was deployed across HP’s worldwide sites,
including premerger Compaq sites. From 2003 through 2005, HP built out additional
capabilities of the system. Full Ariba platform rollout and implementation will be
done in 2006 and 2007.
Results
HP has realized significant quantitative benefits:
1. Through 2005, Indirect Procurement has achieved over $1.8 billion total
negotiated savings and spend reduction. These results are due to its total
spend management strategy, including creation of strategic procurement
capabilities, workforce expertise and implementation of a standardized eprocurement platform.
2. Operation expense was reduced from 0.95% of total spend in 2002 to
0.75% in fiscal year 2005.
3. Implementation onto a standardized platform has resulted in the
retirement of over 100 legacy systems with estimated savings of $7
million annually.
4. Contract compliance has reached approximately 80%
HP also gained qualitative benefits from use of the system.
1. The supply base was decreased significantly and more expenditure was
directed to preferred suppliers.
2. The spend management solution has enabled HP procurement professionals
to address more corporate expenditure and focus more on strategic supply
initiatives.
Lessons Learned
1. Executive-level support is crucial to e-procurement success. Active
support from top management will drive system use and compliance with
approved systems and processes. Adoption should be facilitated with
strong focus on system ease-of-use.
2. Seamless integration of the spend management system with the overall
technology platform is a major undertaking, especially for a very large
organization like HP. Creation of a long term technology roadmap can be
very valuable.
3. A robust support/operations infrastructure is needed to ensure success.
4. Users will naturally desire to customize spend management applications.
HP recommends that a formal process and structure be created to evaluate
customization proposals. Only essential customizations should be
approved.
2.8
Technology Analysis
2.8.1 Three Tier Client Server Architecture
The three tier model refer to multitier architecture, was develop to overcome
the limitations of two-tier architecture. In the three tier model, a middle tier
(Application Logic) is added between the client environment and the database
management server environment. There are variety of ways of implementing the
middle tier, such us transaction processing (TP) monitors, message servers, and
application servers. The three tier client server model can be shown in figure 2.3.
Figure 2.3
The Three Tier Client Server Architecture model
The first tier is the Client Environment (user interface) tier. This tier manages
the input/output data and their display. With the intention of offering greater
convenience to the user, the system is prototyped on the Internet. The users are
allowed to access the system by using any existing web browser software. The user
interface tier contains HTML components needed to collect incoming information
and to display information received from the application logic tiers. The web visitors
communicate with the web server via application protocols, such as HTTP and SSL,
sending requests and receiving replies.
The application logic tier is the middle tier, which bridges the gap between
the user interface and the underlying database, hiding technical details from the
users. Components in this tier receive requests coming from the interface tier and
interpret the requests into apropos actions controlled by the defined work flow in
accordance with certain pre-defined rules.
The database (data store) tier is responsible for modeling and storing
information needed for the system and for optimizing the data access. Data needed
by the application logic layer are retrieved from the database, then the computation
results produced by the application logic layer are stored back in the database. Since
data are one of the most complex aspects of many existing information systems, it is
essential in structuring the system. Both the facts and rules captured during data
modeling and processing are important to ensure the data integrity.
Advantages of A Three-Tier Architecture
The following are some of the advantages of a three-tier architecture :
1. Clear separation of user interface control and data presentation from
application logic. Through this separation more clients are able to have
access to a wide variety of server applications.
2. Quicker development through the reuse of pre-built business-logic
components and a shorter test phase, because the server-components have
already been tested.
3. Re-definition of the storage strategy won’t impact the clients.
4. Dynamic load balancing: if bottlenecks in terms of performance occur,
the server process can be moved to other servers at runtime.
5. Servers are "trusted" systems. Their authorization is simpler than that of
thousands of
untrusted client-PCs. Data protection and security is
centralized and simpler to obtain.
6. Modifications to business process are isolated from the client and
database.
7. Modifications to the database are isolated from the client and business
layers.
8. Change management: is more efficient.
2.8.2 Web Database Construction
Web database construction maximizes the power of two complementary
technologies that are integrated, the web and the database. The web portion of
construction called the front end allows dynamic interchange between the customer
and the business. The portion of the construction that links the web and the database
is called middleware. Web database construction model is shown in figure 2.4.
Figure 2.4
Web Database Construction Model
2.8.2.1 The Front End : Web Pages
The front end is the first experience a customer has with a business and is the
foundation on which the customer form attitudes and perceptions. The element of the
web are communication standards that allow the different hardware and software
platforms to communicate with each other. They are TCP/IP, HTML, and HTTP
The strength of the web is base on the concept of hypertext. Hypertext is the
logical connectivity between computers and text, allowing computer to interface with
the through a system of cross references to be followed in a non linier way.
Hypermedia, an extension of hypertext, includes graphics, audio, and other
multimedia forms. The web is made up of hypertext and hypermedia that can
understand the numerous information retrieval protocols in use on the internet.
2.8.2.2 The Back end : Database
The back end of the e-procurement design consist of the database, which
must be updated, queried, and modified according to the interaction with the
customer and the dynamic data needed by the front end. The back end must support
three main functions :
1. Gathering Information
2. Storing Information
3. Processing Information
The database, usually an RDBMS (Relational Database Management System),
provides an efficient way for the e-procurement construction to implement these
functions.
2.8.2.3 Middleware
The key link between the web and the database is called middleware. In the
web database construction, the middleware is the general term to describe the
programming that glues the construction together. Windows Common Gateway
Interface, Windows CGI, is one type of middleware that define how a web server and
the external program of the customer communicate with each other. Specifically,
CGI determines how information will be transferred between the web server and the
CGI program. It also define what information will be supplied by the web server to
the CGI program as well as what information can be returned to the web server. The
CGI program can be written in any programming language, most often in C++, C#,
Perl, Java, PHP, or Visual Basic.
2.8.2.4 The Benefits and Challenges of Web Database Construction
The benefits of web database can be immediately accessible from anywhere
in the world and can aid businesses in overcoming performance and scalability
limitation associated with traditional two tier client server application. Since
RDBMS is centrally located on the business web or application server, ongoing
maintenance and enhancements can be considerably reduced. And since RDBMS
logic resides on the server rather than on the client, the cumbersome and often
complex task for the business of deploying information to many clients is
significantly reduce in time, and often eliminated completely. In certain business
environments, the web database construction can be run to the business advantage on
thin client, network devices that utilize older and less powerful client workstations
reducing hardware and software cost to the organization.
Major challenges involve in utilizing web database construction include
scalability, where businesses can encounter highly variable and potentially huge
transaction peak loads. The evolving nature of web technology is a constant
challenge. Both customers and businesses alike is the challenge of security. Also,
when web database construction are needed to work with existing legacy system, the
challenge of creating interface can add both complexity and cost to the development
process.
2.8.3 Hypertext Markup Language
HTML (Hypertext Markup Language) is the set of markup symbols or codes
inserted in a file intended for display on a World Wide Web browser page. The
markup tells the Web browser how to display a Web page'
s words and images for the
user. Each individual markup code is referred to as an element (but many people also
refer to it as a tag). Some elements come in pairs that indicate when some display
effect is to begin and when it is to end.
HTML is a formal Recommendation by the World Wide Web Consortium
(W3C) and is generally adhered to by the major browsers, Microsoft'
s Internet
Explorer and Netscape'
s Navigator, which also provide some additional non-standard
codes. The current version of HTML is HTML 4.0. However, both Internet Explorer
and Netscape implement some features differently and provide non-standard
extensions. Web developers using the more advanced features of HTML 4 may have
to design pages for both browsers and send out the appropriate version to a user.
Significant features in HTML 4 are sometimes described in general as dynamic
HTML. What is sometimes referred to as HTML 5 is an extensible form of HTML
called Extensible Hypertext Markup Language (XHTML).
2.9
Discussion
From literature review above, e-procurement has been used in several
companies. As seen in benchmarking study, many companies have succeeded using
e-procurement as shown in table 2.2 below. Many vendors offer e-procurement
application that ready to use, but not all e-procurement products are suitable for
government. This happen because the law and policies are different between each
government department.
This is the challenge of this study, researcher has to design and develop eprocurement for Indonesian government in Regional Planning and Development
Agency of Riau Province that accordance to government law in procurement goods
and services.
Table 2.2 : Best Practice summary
Feature
Hewlett Packard
University of Pennsylvania
Business
Annual Spend is $60 billion
Gain procure-to-pay
Challenge
Spend to preferred supplier
Process efficiency
Enforce compliance to
Reduce cost of products
purchasing policy
Eliminate off-contract
Visibility to spend globally
“Maverick” buying.
Solution
Clear technology roadmap
The University formed an e-
Selection
Vision
procurement team.
Superior functionality
The team made up of
Strong desire to partner with
representatives from the
customers
comptroller’s office,
Speed Implementation
purchasing, and IT group.
Reasonable solution cost
The team evaluated the
Extend of platform integration
university’s business
requirement.
Vendor
Ariba
Oracle as Procurement
partner
SciQuest for content-hosting
service
Strategy
Selected Ariba Buyer as the
Marketplace (Private
company’s procurement
electronic exchange)
platform.
Private electronic exchange,
Ariba as an early leader in
which is integrated into
spend management
Oracle purchasing.
technology.
Features
Ariba Buyer
General Ledger
Ariba Category Procurement
Purchasing
Ariba Sourcing
iProcurement
Ariba Contract Workbench
Payables Modules
Ariba Compliance
Ariba supplier performance
measurement
OB10 (for Invoice)
Benefit
Reduce operation expense
Cost saving
0.95% of total spend in 2002
Significant administrative
and 0.75% in fiscal year 2005
efficiencies.
Saving $ 7 Million annually
Improvement in contract
Contract compliance has
compliance.
reached approximately 80%
Reduce cycle time
purchasing
Improve administrative
processes.
Reduce the number of
fulltime employees needed
to process transaction.
Technology
Web base technology
Web base technology
Lesson
Executive level support is
Stresses the importance of
Learned
crucial to e-procurement
engaging the user
success.
community for product
Creation of longterm
evaluation, testing, and
technology roadmap can be
implementation.
very valuable.
Should be a good deal of
A robust support/operations
collaboration among the
infrastructure is needed to
user community, business
ensure success.
units, and the IT
Only essential customizations
organizations.
Environment
should be approve.
2.10
Chapter Summary
This project is done with some literature review from some resources such as
internet, books, conferences and journal. Useful informative such as what are the best
practices has been covered. Good understanding for each field is very important in
order to develop effective e-procurement.
CHAPTER 3
METHODOLOGY
3.1
Introduction
An appropriate methodology, models and techniques must be defined to fit
the system that will be developed according to user requirements. To develop the
prototype of e-Procurement system, the Object Oriented Approach has been chosen.
In this chapter, the requirement of hardware and software also discussed.
This chapter describes the proposed framework briefly and all the steps and
stages that have been implemented in this project. It discussed the approaches as well
the system development tools and techniques. The proposed framework is hoped to
be able to guide for every phases in project development and provide a solution to
the problem statement and to fulfill the project objectives.
3.2
Project Methodology
Project methodology is a guideline to ensure that all project activities is well
organized. By the implementation of some methodologies, programs, documents, and
data can be achieved as a result of activities and task that are included in the
methodology.
In order to get some information about the e-Procurement, some observations
are carrying out. The required methodology for this project development is began
from planning, analysis, design and implementation. Lastly, application testing will
be executed. Figure 3.1 shows the framework view of overall project development
methodology.
Figure 3.1
Project Methodology Framework
3.2.1 Planning Phase
Initial planning phase is the beginning of the project. First of all, the title of
the project is discussed with supervisor. The objective of project development is
analyzed and defined based on the problem statement. Besides that, project scope is
identified to draw the boundary of this project. After that, some researches of project
background have been done in order to decide the methodology of the project.
3.2.2 Analysis Phase
The analysis phase answers the question of who will use the system, what the
system will do, and where and when it will be used. In this phase, few activities are
carrying out such as literature review, study current e-procurement software and also
investigates any current system. This phase has three steps :
3.2.2.1 Organization
Before going to requirement gathering, Important to understanding about
organization is important thing. In this phase, will be identify organization issue,
organization profile, organization structure, job and functions.
3.2.2.2 Requirements Gathering
Requirement gathering is activity in analysis phase to gathering data and
information. This activity has steps; Understanding the As-Is system, Identifying
improvement, and developing a To-Be system concept.
3.2.2.3 Literature Review
In literature review, the essential things such as definition, types of eprocurement, best practice and guideline, legal context procurement in Indonesia,
technology analysis and other related studies are identified and analyzed.
3.2.3 Design
After obtain user requirement in analysis phase, now is the phase to justify on
how it will meet the identified requirements. In this stage, system’s interfaces for the
prototype are designed. Besides that, database design for the system by graphically
represents the organization’s data also been done.
3.2.4 Implementation
After the prototype is done, it will be implemented and tested. The user
acceptance test expected result is the proposed system application will support the
user requirements and fulfill project objective.
Table 3.1: Detail every phase in Project Methodology Framework
Phase
Planning
Activities
1. Project Initiation
Identify and select projects.
Task
Deliverables
1. Discuss with supervisor and choose an appropriate
1. Project objective
2. Project scope
project title.
Make system request and
2. Project Designing e-Procurement has been chosen.
3. Project methodology
the system that support the
3. Identify
4. Project proposal
business value
the
background
problem
current
5. Project schedule
procurement.
4. Determine project scope, objective and importance.
5. Produce the work plan to schedule the project using
Gantt Chart
Analysis
1. Organization
a. Organization Issue
2. Identify organization structure, job and functions.
b. Organization Structure
3. Identify
c. Organization Profile
1. Initial Findings Report
1. Identify organization issue, organization profiles.
administration
current
procurement
processes.
4. Identify problem with current procurement.
2. Requirements Gathering
a. Understanding the AsIs system
b. Identifying
5. Identify the common features required by user.
6. Develop a list of features for e-procurement.
7. Identify Best Practice in e-procurement.
8. Identify
and
find
literature
review
for
e-
procurement
Improvement
c. Developing a To Be
9. Transform analysis data and models in Object
Oriented method using UML.
system concept
10. Produce Use Case Diagram, Class Diagram, and
3. Literature Review
Sequence Diagram by using UML.
a. Best Practice
11. Understand system interface issues.
b. E-procurement concept
12. Identify and study the user interface to design eProcurement.
c. Technology analysis
d. Legal Context
Design
1. Identify system requirement
2. Prototype Development
1.
Identify the hardware and software needed to
1. Conceptual design.
design e-Procurement.
2. System prototype.
2. Identify the system requirements.
3. Design the interface of e-Procurement by using
Macromedia Dream Weaver, Photoshop, and flash.
4. Design the database e-Procurement by using
MySQL Server to represent the data.
5. Review the user requirements.
6. Design documentation of e-Procurement.
Implementation 1. Prototype
Implementations
1. Using PHP programming to implement the analysis
and designs.
2. Applications Testing
2. Discuss with user and test the system.
3. User Acceptance
3. Install the prototype of e-Procurement.
4. Conduct training e-procurement system.
5. Document the implementation steps
6. Produce questionnaire to get the feedback according
to the system prototype.
1. Implementation report.
2. User manual.
3.3
System Development Methodology
A system development methodology refers to the framework that is used to
structure, plan, and control the process of developing an information system. The
Unified Process has been chosen as the development strategy or methodology for this
project.
3.3.1 The Unified Process
The unified process is specific methodology that maps out when and how to
use the various UML techniques for object oriented analysis and design. The UML
provides structural support for developing the structure and behavior of an
information system, the unified process provides the behavioral support.
The phases of Unified Process support an analyst in developing information
system in an iterative and incremental manner. The phase describes how an
information system evolves through time.
3.3.1.1 Inception Phase
Inception phase is very similar to the planning phase of a traditional SDLC
approach. In this phase, a business case is made for the proposed system. The project
management and environment supporting workflows are very relevant to this phase.
The primary deliverables from the inception phase are :
1. A vision document that sets of the scope of the project, identifies the
primary requirement and constrains, set up an initial project plan, and
describe the feasibility of and risks associated with the project.
2. The adoption of the necessary environment to develop the system.
3.3.1.2 Elaboration Phase
The analysis and design workflows are the primary focus during this phase.
The elaboration phase continues the developing the vision document, including
finalizing the business case, revising the risk assessment, an completing a project
plan in sufficient detail to allow the stakeholders to be able to agree with
constructing the actual final system. The primary deliverables of this phase include ;
1. The UML structure and behavior diagram
2. An executable of a baseline version of the evolving information
system.
3.3.1.3 Construction Phase
This phase is heavily focused on programming the evolving information
system. As such, it is primarily concerned with the implementation workflow.
However, the requirement, analysis, and design workflows also are involved with
this phase. The configuration and change management workflow, with its version
activities, becomes extremely important during the construction phase. At times, an
iteration may have to be roll back. Without good version controls, rolling back to a
previous version (incremental implementation) of the system is nearly impossible.
The primary deliverable of this phase is an implementation of the system that can be
released for beta and acceptance test.
3.3.1.4 Transition Phase
The transition phase addresses aspect typically associated with the
implementation phase of a traditional SDLC approach. Its primary focus is on the
testing and deployment workflows. From a managerial perspective, the project
management, configuration and change management, and environment are involved.
The primary deliverable is the actual executable information system. The other
deliverables include user manuals, a plan to support the users, and a plan for
upgrading the information system in the future.
3.3.2 Justification of Chosen Methodology
The unified process is chose because of the reasons as stated below:
1. This methodology is flexible and can improve communication between
system developer and user.
2. An iterative, requirements-driven, architecture-centric approach to
software development.
3. Particularly applicable to larger software development teams working on
large projects.
3.3.3 Object Oriented Approach
On of the main principles in the object oriented (OO) approach is that of
abstraction, not of data structures and processes separately but both together. An
object is a set of data structures and the methods or operations needed to access those
structures.
Compared to the structured approach, the object-oriented is more datacentric-it evolves around class models. In the analysis phase, classes do not need to
have operations defined-only attributes. The growing significance of use cases in
UML shifts the emphasis slightly from data to functions.
Specific objects in a system can inherit characteristics from the global
instance of an object. For example, many types of objects may have a name and a
creation date. Specific objects can inherit these global characteristics from parent
objects that include only global characteristics. Objects can inherit characteristics
from more than one parent object. Inheritance attempts to avoid the redundant
definition of similar characteristics that can be embodied at higher levels in the
system.
3.3.4 UML Notation
In this project, the chosen modeling language is Unified Modeling Language
(UML). UML is a graphical language with sets of rules and semantics. The rules and
semantics of a model expressed in English, in a form known as object constraint
language (OCL). OCL is a specification language that uses simple logic for
specifying the properties of a system.
The Unified Modeling Language (UML) is an object-oriented language for
specifying, visualizing, constructing, and documenting the artifacts of software
systems, as well as for business modeling. The UML was developed by Rational
Software and its partners. It is the successor to the modeling languages found in the
Booch, OOSE/Jacobson, OMT and other methods.
The UML, a visual modeling language, is not intended to be a visual
programming language. The UML notation is useful for graphically depicting objectoriented analysis and design models. It not only allows you to specify the
requirements of a system and capture the design decisions, but it also promotes
communication among key persons involved in the development effort. The
emphasis in modeling should be on analysis and design, focusing on front-end
conceptual issues, rather than back-end implementation issues, which unnecessarily
restrict design choices.
These techniques are using diagramming technique such as use case
diagram, sequence diagram, activity diagram and class diagram. Use case diagram
explains about the system, environment and the association between the system and
its environment. Use case diagram is presented through actors whereby the actors are
modeling the processes that involved in the system and to give a view about overall
system functions.
Sequence diagram explains the scenario of the use case, the actor actions and
the sequences of the cases. Meanwhile, collaboration diagram presents the
interactions which are occurred among objects in the system. Class diagram is a view
of classes and objects involved in the system.
3.4
System Requirements Analysis
Some hardware and software are required to support the project development
and execution efficiently, systematically, and effectively. Table 3.2 shows the
software that needed to develop the system and the purpose or function of it.
3.4.1 Hardware Requirements
Hardware justification is a basic necessity which needed in developing a
system. The hardware is included input and output devices, storage devices and data
processor. The identified hardware which are needed in this system development are
as below:
1. Personal computer with Intel Pentium 4
2. 512 MB RAM
3. Hard disk with 60 GB capacity
4. Monitor
5. Printer
6. Network card or modem
3.4.2 Software Requirements
Choosing the right software is vital to ensure that the developed system
fulfills user requirements. There are few important aspects in choosing the right
software:
1. The software must be able to handle a lot of data.
2.
The software must have good user interface.
3.
The software must be able to interact with database.
4.
The software must be easy to use without any complex syntax.
5.
The software must support 4 generation programming language.
th
Below is the software requirement for this system:
Table 3.2 : Software required for developing the system.
Software
Microsoft Project 2002
Purpose
Microsoft project used to generate Gantt and
Pert chart that used as a tool to schedule the
project development.
Rational Rose Enterprise Edition
Rational Rose is software for UML modeling.
This software will be used as a helping tool to
model the system.
Example: Use case diagram, Class Diagram,
Sequence Diagram and etc.
Microsoft Office Visio 2003
Microsoft Visio is used to draw diagrams.
Macromedia Dream weaver 8
This software is used to create some, coding,
animation features that will be included in
system.
Adobe Photoshop 7.0
This software used to create and edit images.
PHP
This is a programming language that will be
used to program and develop the system.
Apache Server
As a web server will be used for running the
system.
Microsoft Windows XP
As a window of the system.
MySQL database
To store all data using by the system.
Microsoft Words 2003
As a platform to do all documentation work.
3.5
Project Schedule
Project schedule is very important to make sure that the system development
activities of this project are on following the schedule. Project schedule scheduled all
the activities that will be done to develop the project according to the development
phase. The project schedule covers the planning phase, literature review and system
analysis and design that are executed in the first study session 2007/2008 for Masters
Project 1. Meanwhile, Masters Project 2 will proceed the next phase of project
schedule which is developing the prototype.
3.6
Chapter Summary
In this chapter has identified the project development methodology and
methods or approaches to develop the system. The prototype methodology is chose
with evolutionary approach as it is appropriate methodology for this system
development. Hope that the identified methodology will serve as a guide to develop
intangible information asset valuation system prototype. The requirement of software
and hardware is stated in this chapter to clarify the system functions and features.
Furthermore, the project schedule is also has been designed in this chapter as a guide
in development the system in effective and systematic way.
CHAPTER 4
ANALYSIS AND DESIGN
4.1
Introduction
This chapter covers the analysis of current situation of the case study, the
analysis of the to-be process and all related use case, sequence diagram and also the
class diagram. At the same time, the user requirement is also identified. The case
study for this project is the Regional Planning and Development Agency of Riau
Province in Pekanbaru.
4.2
Organizational Analysis
Before proceeding with any analysis, it is very important to understand about
the case study- Regional Planning and Development Agency of Riau Province.
Regional Planning and Development Agency is organization under governor, which
is formed to manage and control regional continuity development.
Regional Planning and Development Agency in Riau province was the first
one that built with accordance to presidential decree No. 15 of 1974 and followed by
Riau governor decree No. 94/VII/75 of which been signed on July 23, 1975 that
stated the formed Regional Planning and Development Agency of Riau Province.
This decree been signed by Arifin Ahmad whose the government of Riau Province at
that time, and he assign Drs. Ravaei Rachman as a head of Regional Planning and
Development Agency.
Regional Planning and Development Agency has main work plan which is
helping Riau government in deciding and review a policy. In general Regional
Planning and Development Agency has the following job :
1. Prepare for regional long term planning and development.
2. Prepare for regional medium term planning and development (Regional
development strategy, general policy).
3. Prepare for RKPD (Rencana Kerja Perangkat Daerah).
4. Coordinate arrangement plan RKPD.
5. Arrange final RKPD and followed by government decree.
6. Arrange and evaluate working performance.
7. Help government to implement regional planning and development.
4.2.1 Organization Structure
Figure 4.1: Organization structure
4.3
As-Is Process
Procurement services and goods in the government must follow presidential
decree No. 80 of 2003. Until now, procurement in Regional Planning and
Development Agency of Riau province still using manual (paper base work). There
are two methods to conduct procurement, Pre Qualification and Post Qualification.
4.3.1 Prequalification
Pre qualification is process competency assessment, capability, and
completed regulation from vendor before submitting tender offer letter. On figure 4.2
shown pre qualification flow.
Committee
Announce the
pre qualification
Evaluate the pre
qualification document
Decision for pre
qualification result
Vendor
Take the pre qualification
document
Submit the pre
qualification document
Yes
Announce the pre
qualification result
Invitation for pas s pre
qualification
Com plaint/
Expostulation
No
Take Tender
Document
Clarification the
tender docum ent
Tender Docum ent
with addendum
Submit Tender
Document
Open and review
tenderer document
Evaluate Tender
Document
Yes
Decision for the
winner
Com plaint/
Expostulation
Annouce the
winner
Letter of Ass ignm ent to
the winner
The Signing of
the contract
Figure 4.2
Activity Diagram for Prequalification
No
4.3.2 Post Qualification
Post qualification is process competency assessment, capability, and
completed regulation from vendor after submitting tender offer letter. On figure 4.3
shown post qualification flow.
Committee
Vendor
Annouce the
tender
Register to attend
the tender
Clarification the
tender document
Take Tender
Document
Tender Document
with addendum
Submit Tender
Document
Open and review
tenderer document
Evaluate Tender
Document
Yes
Decision for the
winner
Complaint/
Expostulation
Annouce the
winner
Letter of Assignment to
the winner
The Signing of
the contract
Figure 4.3
Activity Diagram for Post qualification
No
4.4
User Requirements
The User requirements are divided into two types. There are functional
requirements and non-functional requirements. Table 4.1 shows the major system
improvements that will be done to the existing system:
Table 4.1: System improvements
Weaknesses of the existing system
System improvements
Procurement notice done manually with
Procurement announcement will be open
announcement board and news paper.
widely through the internet.
Do not have enough data of vendor
Have database vendor and blacklist
specially the blacklisted vendor
vendor
Distribution of tender document done by
Distribution of tender document done by
photocopy.
uploading at the official website.
Winner announced manually from the
Winner will be announcing widely from
announcement board with limited access.
internet and others can look through it.
Expostulation letter or complaint letter
Expostulation letter or complaint letter
send manually with no respond.
can be send through internet and can be
accessed by public.
4.4.1 Functional Requirement
Functional requirement shows the process of the system or information it
needs. Following table shows the functional requirements for project.
Table 4.2: Functional requirements for project
Function
Functions
Project Functional Requirement
1. The system will enable vendor to download and upload tender
document (PDF, doc, jpg).
2. The system will enable tender committee to publish tender
document and announcement.
3. The system will be able to record vendor data.
4. The system will be able to selection tender member.
5. The system will be able to publish blacklist vendor.
6. The system will be able record complaints from tender
member
7. The system will be able to generate report.
8. The system will be able to printing report
4.4.2 Non - Functional Requirement
Non-functional requirement refers to behavioral properties that the system
must have, such as usability and performance. Table 4.3 shows the non-functional
requirement for project.
Table 4.3: Non-functional requirement for project
Function
Operational
Project Non-Functional Requirement
1. The system should be accessed from everywhere.
2. The system should be able work on any web browser.
Performance
1. The system should be available for use 24 hours per day
and 365 days per year.
2. The Database must be updated in real time.
Security
4.5
1. All the users of the system have their login id.
To-Be Process and Data Model
All the activities and process that are involved in the proposed system have
been modeled using Use Case Diagram, Sequence Diagram and Activity Diagram.
Data that are involved in each process or activity is illustrated using Class Diagram
and Sequence Diagram.
4.5.1 Use Case
There are fifty nine use case and four actor involved in this project. The use
case shown figure 4.4, 4.5 4.6, and 4.7 below.
<<extend>>
edit tender
view committee
login
<<extend>>
view tender
delete tender
create tender
<<extend>>
view user
create user
edit user
<<extend>>
Administrator
delete user
(from Use Case View)
<<extend>>
create committee
<<extend>>
create term and condition
add committee
<<extend>>
view weight criterion
delete committee
create weight criterion
<<extend>>
view news
add news
<<extend>>
edit committee
logout
view registered company
delete weight criterion
Figure 4.4 Admin Use Case Diagram
edit weight criterion
<<extend>>
create vendor point
edit tender document
<<extend>>
login
view tender document
delete tender document
<<extend>>
edit vendor point
upload tender document
<<extend>>
view vendor point
delete vendor point
Committee
view attendance to tender
<<extend>>
(from Use Case View)
view blacklisted vendor
<<extend>>
list of complaint
create blacklist vendor
list of question
<<extend>>
logout
<<extend>>
<<extend>>
edit blacklist vendor
delete blacklist vendor
<<extend>>
detail question
view vote all committee
detail complaint
generate winner candidate
answer complaint
Figure 4.5 Committee Use Case Diagram
answer question
login
<<extend>>
view company profile
download tender document
edit company profile
Vendor
(from Use Case View)
<<extend>>
delete register to tender
register to tender
view register to tender
<<extend>>
create complaint
print certifate of attendance
create question
Figure 4.6 Vendor Use Case Diagram
logout
view question and answer
view complaint and answer
view announcement
Public
view winner candidate
(from Use Case View)
register new vendor
view blacklisted vendor
Figure 4.7 Public Use Case Diagram
4.5.1.1 Use Case Description
There are fifty nine use cases in this system and every use case has its use
case description. Please refer to Appendix A for user case description.
4.5.2 Class Diagram
Class diagram represent the classes that are involved in the system. There are
eleven classes that have been identified in this system. They are tender, tender_doc,
weight_criterion, question, complaint, user, committee, vendor, tender_selection,
blacklist_vendor, and register_ to_tender. Class diagram shown figure 4.8 below.
Tender
tender_id
tender_name
description
start_date
end_date
end_registration_date
doc_submission_date
opening_doc_date
candidate_announcement_date
complaint_date_start
complaint_date_end
method
insert( )
delete( )
update( )
download( )
register_to_tender
tender_id
npwp_number
code_register
date_register
complaint
tender_id
npwp_number
complaint
date_complaint
answer
date_answer
weight_criterion
tender_id
bobot_doc
bobot_price
bobot_methodology
bobor_experience
bobot_staf f
insert( )
delete( )
update( )
calculate( )
question
tender_id
npwp_number
question
date_question
answer
date_answer
insert( )
update( )
answer( )
Figure 4.8
Class Diagram
insert( )
delete( )
update( )
login( )
v iew()
generate( )
insert( )
v iew( )
update( )
delete( )
insert( )
delete( )
update( )
v iew()
tender_doc
tender_id
tender_document
user
NIP
nama
user_name
password
kode_hak_akses
date_created
tender_selection
tender_id
npwp_number
nip
document
price
methodology
expertise_staf f
experience
register( )
delete( )
print( )
v iew()
Insert( )
update( )
answer( )
blacklist_v endor
npwp_number
description
date_of _banned
end_of _banned
insert( )
delete( )
update( )
v iew( )
committee
nip
tender_id
position
sk_number
weight_v ote
insert( )
delete( )
update( )
v endor
npwp_number
company _name
user_id
password
address
director_name
director_IC
pkp_number
ty pe_of _company
email
telp
no_akta_pendirian
tanggal_
pengesahan
no_akta_perubahan
tanggal_perubahan
tdp_number
siup_number
situ_number
name : ty pe = initv al
register( )
update( )
4.5.3
CRC Card
Class-Responsibility-Collaboration (CRC) cards are created to point out the
responsibilities and collaborations of a class. Please refer to Appendix B for CRC
card.
4.5.4 Sequence Diagram
There are twenty six sequence diagrams for this project. Please refer to
Appendix C for sequence diagram.
4.6
System Architecture
This system will be built in a web based environment to allow users to access
the system anywhere and anytime. The identified main users are committee, vendor,
admin and public. The users have different roles when using the system and they will
be connected to the database by interface. This interface will make the process of
system user’s activities easier and practical.
Figure 4.9 System Architecture
4.7
Tender Evaluation
There are two methods to evaluate the winner of procurement. Failed system
evaluation and merit point system.
4.7.1 Failed System Evaluation
Failed system has two step evaluations; there are administration and technical
aspect. The winner is vendor who has competitive price and passed both steps. The
Failed system evaluation is shown in table 4.4 below.
Table 4.4 Failed System evaluation
Step
Requisite
Evaluation
Result
Method
1
Administration Aspect
1. Document Relevancy
Complete
and
1. Pass
valid document
2. Failed
Complete
1. Pass
2. Legalities
2
Technical Aspect
1. Depend
on
and
committee valid document
2. Failed
team specification
4.7.2 Merit Point System Evaluation
Merit point system is based on the weight point. There are many criteria on
merit point system, and each criterion has weight point. the winner of this method is
vendor who has the highest point. The merit point system is shown in table 4.5
below.
Table 4. 5 Merit Point System evaluation
Step
1
Requisite
Administration Aspect
1. Document
Evaluation Method
Result
Complete and valid
1. Pass
document
2. Failed
2. Legalities
3. Specifications
2
Technical Aspect (80%)
Weight of Criterion :
The
1. Methodology
Methodology = 30%
vendor who has the
2. Expertise Staff
Expertise Staff = 50%
highest point both
3. Experience
Experience = 20%
Technical
winner
is
Aspect
and Price Aspect
3
4.8
Price Aspect (20 %)
Window Navigation Diagram
Window navigation diagram is used to show how all the screen, form, and
reports used by the system are related and how the user moves from one to another.
The window navigations diagram is shown in figure 4.10, 4.11, 4.12, and 4.13 below.
Figure 4.10
Window Navigation Diagram
Figure 4.11 Administrator Window Navigation Diagram
Figure 4.12 Committee Window Navigation Diagram
Figure 4.13 Vendor Window Navigation Diagram
4.9
Chapter Summary
In conclusion, this chapter covers all the design of the proposed system.
Besides that, initial findings indicate the problems occurred in the organization. All
the results of the analysis will give a clear picture for the implementation stage. Tobe process and data model are represented in the proposed system. The proposed
system embraces the user requirements and improvement matters.
CHAPTER 5
IMPLEMENTING AND TESTING
5.1.
Introduction
In this chapter, will describe more about the result from design phase whereas
it is used as an input for the implementation and testing process before implement the
new system, must complete the detail planning to ensure the developed system can
be functioning well and complete. The end result which is a prototype system which
is e-Procurement System will undergo certain implementation steps which will
explained in the following part.
5.2
System Implementation
The design of e-Procurement System is user-friendly and easy for the users to
directly apply this system usage. This system has been developed using PHP as
programming language MySQL as database. A complete user manual is included in
this report. It contained user interface screen with the explanation. The user manual
can be a guide for the users to apply the system accordingly. Please refer to
Appendix D for user manual.
5.2.1 Database Design
E-Procurement system has been uses MySQL Server as database. Please refer
to Appendix E to view the database design. The Relational table can be seen as
figure 5.1 below.
Figure 5.1 : Entity Relationship Diagram
5.2.2 Coding Approach
System developer must ensure that the all the functions of this system is free
from errors or bugs in order for the system to work properly. Every coding must free
from syntax error and also logic error. Please refer to Appendix F to view the
snapshots of PHP programming code.
5.3
Test Result / System Evaluation
The system must be tested in order to detect any error or mistake after the
system design have been developed. There are some of testing levels that have been
executed which are black box testing, integration testing and user acceptance test.
5.3.1 Black Box Testing
Black box testing has been executed based on the units in the system
modules. This testing used a top-down concept.
Table 5.1: List of black box testing
Modules
Register New Vendor
Testing
Expected Result
Register new vendor with Error
existing NPWP number
Create Tender
Create User
Insert
new
user
existing NIP
Create Committee
Insert
new
is valid
displayed.
Insert new tender id with Error
existing Tender ID
Message
Result
message
is Valid
displayed.
with Error
message
is valid
displayed.
committee Error
message
is Valid
with existing NIP and displayed.
existing Tender ID
Click Add Committee to New
committee Valid
add committee member member
into Project(tender)
has
been
inserted into database,
and will be shown on
screen
Click Delete to delete Committee
member valid
committee member from has been deleted from
project (tender)
database,
and
committee member is
disappearing
from
screen
Create
Weight Insert
Criterion
criterion
new
weight Error
message
is Valid
with existing displayed.
Tender ID
View Tender
Click Edit to edit data Data
tender
and
UPDATE.
has
been Valid
click updated into database,
and will be shown on
screen.
Click Delete to delete Data tender has been Valid
tender
deleted
from
database. And tender
is disappearing from
screen.
View User
Click Edit to edit user and Data
click UPDATE.
has
been Valid
updated into database,
and will be shown on
screen
Click Delete to delete User has been deleted Valid
user
from database. And
user is disappearing
from screen.
View Weight Criterion
If today’s date < opening Edit and Delete are Valid
document date.
allowed
Click Edit to edit Weight Data
has
been Valid
Criterion
and
click updated into database,
UPDATE.
and will be shown on
screen
Click Delete to delete Weight Criterion has Valid
Weight Criterion
been
deleted
from
database. And user is
disappearing
from
screen.
If
today’s
date
>= Edit and Delete are Valid
opening document date
Upload
Tender Insert
Document
new
Not Allowed
Tender Error
message
is Valid
document with existing displayed.
Tender ID
Create Vendor Point
If
today’s
date Insert vendor point Valid
>=opening document date are
allowed
AND today’s date <= committee
winner
candidate are
announcement date.
tender.
by
member
involved
Depend
to
on
login committee.
View
Document
Tender Click Edit to edit tender Data
document
and
UPDATE.
has
been Valid
click updated into database,
and will be shown on
screen
Click Delete to delete Tender document has Valid
tender document
been
deleted
from
database. And tender
document
disappearing
screen.
is
from
View Vendor Point
If
today’s
date Edit and Delete are Valid
>=opening document date allowed.
AND today’s date <=
winner
candidate
announcement date.
Click Edit to edit vendor Data
point and click UPDATE.
has
been Valid
updated into database,
and will be shown on
screen
Click Delete to delete Vendor
vendor point
been
point
deleted
has Valid
from
database. And vendor
point is disappearing
from screen.
If today’s date >= winner Edit and Delete are Valid
candidate announcement Not allowed.
date.
View
Vote
All Login
Committee
Committee
and View
position as chairman
vote
committee
all Valid
will
be
shown.
Login
Committee
and View
position as not chairman
vote
all Valid
committee will Not
be shown.
Create
Blacklist Insert vendor who will be Blacklist vendor will Valid
Vendor
blacklisted.
be shown in public
menu,
and
automatically will be
banned.
View Blacklist Vendor
Click Edit to edit blacklist Data
vendor
UPDATE.
and
has
been Valid
click updated into database,
and will be shown on
screen
Click Delete to delete Blacklisted
vendor Valid
black listed vendor
has been deleted from
database. And vendor
is disappearing from
screen.
Generate
Winner If today’s date >= winner Winner candidate will Valid
Candidate
candidate announcement be shown
date
Answer Question
Click Answer to Answer Answer
the question from vendor
Question Valid
module
will
be
displayed
Answer Complaint
Click Answer to Answer Answer
Complaint Valid
the
will
complaint
from module
vendor
Register To Tender
If
be
displayed
today’s
date
registration
date
>= Vendor
is
allowed Valid
AND register to attend the
today’s date <= End of tender.
registration date.
If today’s date > End of Vendor
registration date.
is
allowed
Not Valid
register
to
attend the tender.
View Company Profile
Click
Edit
to
edit Data
has
been Valid
company profile and click updated into database,
UPDATE.
and will be shown on
screen
View
Register
Tender
To Click Delete to Cancel Attendance has been Valid
attend the tender
deleted
from
database. And attend
to
tender
disappearing
is
from
screen.
Click
Print
to
attendance certificate
Create Question
Insert
a
question
print Attendance certificate Valid
will be printed
to Question
will
be Valid
committee
displayed on public
menu.
Create Complaint
If today’s date >= start Vendor is allowed to Valid
complaint
today’s
date
date
<=
AND insert complaint.
end
complaint date.
If today’s date >= end Vendor
is
complaint date.
to
Allowed
Not Valid
insert
complaint
5.3.2 Integration Testing
After completing the black box testing, integration testing will take place. It
is a test which involved two or more modules or related application. The purpose of
this testing is to verify application works with other applications. This means, an
output from one module can be used as an input for other module.
5.3.2 User Acceptance Test
By conducting user acceptance test, it can assist in verifies the new system
works with actual data. It is executed by giving a questionnaire form and gives a user
test. This questionnaire is prepared to get a feedback regarding this system and fixing
the weaknesses. Please refer to Appendix G for user acceptance test questionnaires
and result.
5.4
Chapter Summary
In conclusion, e-Procurement System can be executed easily. There are two
type of testing has been executed which are black box testing and integration testing.
Some improvement has been made to ensure the objectives are successfully
achieved. Steps of implementation towards organization and strategy to ensure
successfulness of this system will be discussed in the following chapter.
CHAPTER 6
ORGANIZATIONAL STRATEGY
6.1
Introduction
Regional Planning and Development Agency of Riau province conducting
procurement through traditional methods like tender notice on board or local news
paper, provide tender document. To implement the e-Procurement system, a detail
plan should be done especially about the steps that should be taking during the
changes is made. Generally, it should focus on technical aspect as well as integration
process. Vendors involvement also important for a successful implementation of a
system.
6.2
Implementation Strategies
E-Procurement system has been tested then it is ready is be implemented into
the working environment, replacing the original system. There are four strategies that
can be used : direct; phased; pilot or parallel running.
Table 6.1 : Implementation Strategies
No
1.
Strategies
Direct Implementation
Description
Advantage
Disadvantage
The changeover is done in one • The most rapid of all the • Most stressful for the
operation, completely replacing
the old system in one time.
users - the old system
strategies.
• Less risk of confusion
between
systems.
old
and
new
has gone so no going
back
if
they
have
difficulties.
• Most difficult to train
staff on as the new
system was not in place
to learn on before the
change over.
• Most stressful for the
developers - all the data
and files from the old
system will have to be
converted ready for use
on the new one.
• Most risky - if the new
system does not work
properly then there is
nothing to fall back on.
2.
Phased Implementation
If each phase is successful then • Very structured, each
the
next
phase
is
started,
phase can be fully
eventually leading to the final
evaluated before moving
phase when the new system fully
onto the next one.
replaces the old one
• Lower risk, a well planned
• Slower than direct
implementation.
• Although each phase is
easy to evaluate, we
have to wait until all the
and controlled
phases are complete
introduction of the new
before we can evaluate
system.
the whole change over.
• Easy to train staff by
letting them learn new
skills on each phase as it is
introduced.
3.
Pilot Implementation
The new system replaces the old • Easy to control, the pilot
one in one operation but only on
a small scale.
can be halted at any time.
• Easy to evaluate because
• It can be slow to get a
pilot to completely
replace the old system.
the new and old systems
are both running.
• Low risk, if a small-scale
• A pilot may not show up
problems that a fullscale implementation
pilot fails then not too
would. This is because a
much has been lost.
system can work fine as
• Easy to train staff by
a small-scale pilot but
letting them learn new
has difficulties when it
skills on the pilot system.
is scaled up to a full
operating system with
more realistic volumes
of data to be processed
for example.
4.
Parallel Implementation
The old and the new system are • If there are initial
• Expensive - both
both used alongside each other,
problems with the new
systems are being run as
both being able to operate
system then the old one
fully operating versions
independently. If all goes well,
can still be used.
so both are doing the
the new system gradually takes • Both systems can easily be
same job. This may
over.
mean duplication of staff
compared.
• Easy to train staff by
and hardware.
letting them learn new
• Some risk - there is a
skills on the parallel
greater chance of
system.
confusion or errors if the
• Easy to evaluate because
two different systems
the new and old systems
are being run side-by-
are both running.
side.
After comparing the implementation strategy, parallel implementation
strategy is the most suitable strategy in Regional Planning and Development of Riau
Province. This is a safe strategy: since the old system continues for one or more
procurement processes to operate there will be no data loss if there are problems with
the new system.
Table 6.2 : Parallel Implementation
Running System
Month
I
II
Old Procurement Processes
III
Continues Month
Stop Using Old System
e-Procurement System
6.3
Change in Management
During the beginning phase of system implementation, there are few people
playing important role. Firstly, Administrator is the person who responsible to
manage the whole system. Secondly, Committee is person who involves in
procurement processes. Committee consist a chairman of committee and committee
member. Each committee has an authority to assess vendor. Thirdly, vendor directly
involve into the system. They must register to attend the tender via system and
download tender document. Lastly, public that can monitor procurement process
from the tender announcement until winner candidate are announced transparence.
Please refer to Appendix I for activity diagram.
6.4
Installation of Infrastructure Process
This system was developed under web base. The implementation can be
connected to the internet or intranet. Therefore for the next step equipping the
infrastructure process can be completed by server and internet connection devices.
By using the internet or intranet, the e-Procurement system can be accessed by the
employee of Regional Planning and Development Agency, vendor and public where
ever they are, anyway, anytime and any places. Please refer to Appendix H for
technical documentation.
Table 6.3 : Installation of Infrastructure
No
1.
Item
Local Server
Description
Server with specification :
-
Processor Pentium IV or Higher
-
Memory 1 Gb
-
Harddisk 80 GB
2.
Network
Local network
3.
Dedicated Internet Connection
Internet connection to hosting e-procurement
online to internet and can be accessed by
public and vendor.
4.
Software
5.
Printer
6.5
Trainings
Software that installed in server and client :
•
Windows Server
•
Windows XP/ vista
•
Apache
•
MySql Server
•
PHP
•
Web Browser
To print document
E-procurement system has been developed with user-friendly interfaces. The
processes in this system are likely traditional procurement, so that, transfer
knowledge to the user and training are easier. Training users with running system is
the best choice, it is often more effective to show participants how to do it rather than
trying to explain it. It is also good to let the participants practice doing it themselves,
so that when they return to really procurement, they already have some experience
with it.
After installation and training to user, Regional Planning and Agency of Riau
province must campaign to vendors to use this e-procurement system.
Table 6.4 : Training Design
No
1.
Activity
Introduction
Participant
the e-procurement
system
2.
Introduce
4.
5.
Practice
1 hour
- Committee
the
role
of
e-
procurement system
3.
- Administrator
Duration
Using
- Administrator
- Committee
e-procurement
- Administrator
System
- Committee
Using e-procurement system with
- Administrator
scenario
- Committee
(real
1 hour
procurement
2 hour
3 Hour
processes and real data)
- Vendor
Introduce how to maintenance
- Administrator
2 hour
- Administrator
1 hour
database and server
6.
Closing and conclusion
- Committee
- Vendor
6.6
Expected Organizational Benefits
The e-Procurement system is developed to give integrity, transparency,
accountability, fairness, economy, and efficiency. Hopefully, this system has good
impact to organization and vendor.
6.6.1 Impact Towards Organization
By implementing e-Procurement System, hopefully it will ensure the
government conducting procurement processes become more efficient and improve
public trust. There are impact for organizational :
1. Reduce paper for tender document. Because all tender document can be
downloaded in e-Procurement system.
2. Winner candidate automatically generated by e-procurement system without
interrupted by committee or administrator.
3. System automatically block each activity depend on date procurement
activity.
4. Committee member has authorization to assess each vendor.
5. System automatically block for editing point or weight criterion if today’s
date is greater than equal opening document date.
6. Blacklisted vendor automatically blocked by system.
6.6.2 Impact Towards Vendor
By implementing e-procurement system, there are few impacts toward
vendor:
1. Tender document can be downloaded via e-procurement system.
2. Vendor will be competitive and more professional.
3. All vendor data recorded into database.
4. Vendor can access all tender information.
5. Registration to attend the tender directly via e-procurement system.
6.6.3 Impact Towards Public
By implementing
e-procurement
system, there are few impacts toward
public :
1. Public can monitoring all tender processes via e-procurement system.
2. Achieving public trust to the government.
6.7
Contingency Plan
Usually, most of the system will face some problems whether it is critical or
not. One of the critical problem is data loss or damaged and uncertainty of proven
output. Therefore, it is very important to prepare a system continuity plan as an
organizational strategy. The plans are:
1. Data may be affected by the virus. New viruses will appear every time. There
is possibility that the data might be attacked by virus. Backup utility must be
prepared to ensure the data would not lost. This utility must be put in another
server.
2. For the all online system, server down is another common problem. Every
process will be delayed for a certain time. If seriously, it may temporarily
unavailable. If the user wants to continue the process, an application server
and backup database should be developed.
3. Regular Maintenance is needed to ensure internet connection, local network,
server, database working properly.
6.8
Chapter Summary
This chapter has described organizational strategies to implement e-
Procurement system in Regional Planning and development Agency of Riau
Province. Direct Implementation strategy has guide the organization to convert
traditional procurement processes to e-Procurement system. All the problem and
challenges can be well settled if it gets full support from the whole part in that
organizations especially support from the high level management.
CHAPTER 7
DISCUSSION AND CONCLUSION
7.1
Achievement
After going through processes such as finding information from internet, refer
books or journal and etc., a basic concept and theory of the research has been
identified. Below are some main findings of the project:
i.
Make fully transparent the processing cycle of procurement
transactions. All invitations, timetables, qualification conditions,
questions & answers, bidding documents, and the event logs of
transactions can be made publicly available through the Internet.
ii.
Using digital technology for government procurement may raise
issues around security, privacy, authentication, confidentiality,
and data integrity.
iii.
Moving public e-procurement requires the re-engineering of the
traditional procurement process which includes a lot of manual
and paper-based work. The process of writing a procurement
notice and posting it on the web by hitting one button replaces the
traditional processes of writing the notice, sending it to a
newspaper, and printing it.
7.2
Constraints and Challenges
There were some constrains and challenges that had been faced during the
early phase of this system development especially when conducting the research
process for the analysis phase. The identified constraint and challenges as below:
i.
It is hard to meet expertise in government procurement. Because
there is no procurement department in the government.
The
procurement is conducted by tender committee and it will be
changes every procurement.
ii.
Traditional laws, regulations, and guidelines may hamper
innovative e-procurement approaches in government agencies. If
the procurement law requires signed papers as part of the
procurement process, it will not be possible to develop a fully
integrated e-procurement system until a legal framework is being
developed which validates the digital signature.
iii.
The limited time to do more in depth research and study is another
challenge to gather the complete information and understanding
for this study area. Better result will be achieved if the project
period is lengthened.
7.3
Aspirations
Although there are challenges and constraints being faced during early phase
of this system development, the literature review about the project and initial finding
to develop the project has been done successfully. Therefore, at the end of project II,
the achievement of this project can be done as below:
i.
All the objectives of this project that has been pointed out in the
beginning of the project will be successfully achieved.
ii.
All the user requirements will be fulfilled according to the system
plan.
iii.
The system can help all users to conducting procurement
processes in the government.
7.4
Future Work for the System
This system could be upgraded to enhance its capability to obtain much more
fulfillment of the user. The enhancements should be:
1. Make fully digital e-procurement system.
2. Integration with Regional General Revenue and Expenditure Budget
Information System to identify planning and development that should
be conduct by tender.
3. Integration with Human Resource Information System to make
connection user of e-procurement system.
7.5
Chapter Summary
In conclusion, all the activities that should be completed in Project I and II
have been complete successfully. What can be concluded here is e-procurement
system is an initiative taken in purpose to help government of tender committee in
conducting public procurement in integrity, accountable, transparent, and fair
competition. The expected result of this project is hopefully could give the overall
benefits to all the users of the e-procurement system.
REFERENCES
Aberdeen Group, (2005). Best Practices in E-Procurement. Aberdeen Group, Inc.
Boston, Massachusetts.
AGIMO, (2004). Outlining a Process for Building the Next Stage of the Australian
Government’s Eprocurement Strategy. June, Commonwealth of Australia.
Andersen, B. (1995), ``The results of benchmarking and a benchmarking process
model'', PhD dissertation, Norwegian Institute of Technology, Trondheim,
Norway.
Antonio Davila, Mahendra Gupta, Richard Palmer, (2003). Moving Procurement
Systems To The Internet: The Adoption And Use Of E-Procurement Technology
Models, European Management Journal Vol. 21, No. 1, Pp. 11–23, February
2003.
APCC, (2002). Government Framework for National Cooperation on Electronic
Procurement. Australian Procurement and Construction Council.
APQC (1993), Basics of Benchmarking, American Productivity and Quality Center.
Houston.
Barua, A., Konana, P., Whinston, A.B., Yin, F., 2001. Driving e-Business excellence.
Sloan Management Review 43 (1), 36–44.
Bjùrn Andersen, Tom Fagerhaug, Stine Randmñl, Juèrgen Schuldmaier, Johann
Prenninger, (1999). Benchmarking Supply Chain Management: Finding Best
Practices. Journal Of Business & Industrial Marketing, Vol. 14 No. 5/6 1999, Pp.
378-389.Mcb University Press.
Daniel Knudsen, (2003). Aligning corporate strategy, procurement strategy and eprocurement tools. International Journal of Physical Distribution & Logistics
Management Vol. 33 No. 8, 2003 pp. 720-734.
Davila, A., Gupta, M., Palmer, R., (2003). Moving procurement systems to the
Internet: the adoption and use of e-Procurement technology models. European
Management Journal 21 (1), 11–23.
Dobler, D.W., Burt, D.N., (1996). Purchasing and supply management. McGrawHill Higher Education, New York.
E. Ponce; A. Durán (2003), Characterization of the Security Implications of
Alternative E-procurement Topologies. ICCSA 2003, LNCS 2669, pp. 114-122,
2003. Springer-Verlag Berlin Heidelberg.
Elaine Curran, Andrea Bernert, Anke Wiegand,(2004). Electronic procurement in the
public sector Factsheet on latest developments in e-procurement in the EU and
106
its Member States. A joint product of the EIC Working Groups Public
Procurement and Information Society.
Frank Homann, Yücel Karabulut, Marco Voss, Falk Fraikin, (2005). Security And
Trust In Public E-procurement, Technical Report No. Tud-Cs-20054,07/26/2005.
Helle Zinner Henriksen, Volker Mahnke, Jens Meiland Hansen,(2004). Public
eProcurement adoption: Economic and political rationality Proceedings of the
37th Hawaii International Conference on System Sciences. Hawaii.
Kheng, C.B., Al-Hawamdeh, S., (2002). The adoption of electronic procurement in
Singapore. Electronic Commerce Research 2 (1–2), 61–73.
Kishor Vaidya, A.S.M. Sajeev, Junbin Gao,(2005). e-Procurement Assimilation: An
Assessment of E -business Capabilities and Supplier Readiness in the Australian
Public Sector. ICEC’05, August 15–17, 2005, Xi’an, China. ACM.
Knudsen, D., (2003). Aligning corporate strategy, procurement strategy and eprocurement tools. International Journal of Physical Distribution & Logistics
Management 33 (8), 720–734.
Kotharia Tanvi, Clark Hub, Wesley S. Roehlc, (2006). Adopting e-Procurement
technology in a chain hotel: An exploratory case study. Elsevier.
Kraljic, P., (1983). Purchasing must become supply management. Harvard Business
Review, September-October, 109-117.
Lancioni, R.A., Schau, H.J., Smith, M.F., (2003). Internet impacts on supply chain
management. Industrial Marketing Management 32 (3), 173–175.
Luitzen De Boer, Jeroen Harink, Govert Heijboer, (2001). A Model For Assessing
The Impact Of Electronic Procurement Forms, The 10th International Annual
Ipsera Conference 2001.
M.L. Emiliani, (2000). Business-to-business online auctions: key issues for
purchasing process improvement. Supply Chain Management: An International
Journal Volume 5 . Number 4 . 2000 . pp. 176±186. MCB University Press .
Miami-Dade County, (2000). E-Procurement: Working Group Report of Findings.
Miami, Office of the Chief Information Officer, Miami-Dade County.
Patterson, K.A., Grimm, C.M., Corsi, T.M., (2003). Adopting new technologies for
supply chain management. Transportation Research Part E: Logistics and
Transportation Review 39 (2), 95–121.
Presutti Jr., W.D., (2003). Supply management and e-procurement: creating value
added in the supply chain. Industrial Marketing Management 32 (3), 219–226.
107
R. Tassabehji, W.A. Taylor, R. Beach and A. Wood, (2006). Reverse e-Auctions and
supplier-buyer relationships: an exploratory study, International Journal of
Operations & Production Management Vol. 26 No. 2, 2006 pp. 166-184.
Emerald Group.
Radstaak, G., Ketelaar, M.H., (1998). Worldwide logistics: the future of supply chain
services. Holland International Distribution Council, Hague, Netherlands.
Rebecca Angeles (2006), Business-To-Business E-Procurement Corporate Initiative:
A Descriptive Empirical Study. Icec 2006 Conference, Fredericton, Nb, Canada.
Smeltzer, L. and Ruzicka, M., (2000). Electronic Reverse Auctions: Integrating the
Tool with the Strategic-Sourcing Process. Practix, June 2000.
Stock, J.R., Lambert, D.M., (2001). Strategic Logistic Management. McGraw-Hill
Companies, Inc., New York.
The World Bank (2003), Electronic Government Procurement (E-Gp).World Bank
Draft Strategy Procurement Policy & Services Group. Washington, D.C.
Thomas Puschmann, Rainer Alt,(2005). Successful use of e-procurement in supply
chains. Supply Chain Management: An International Journal 10/2 (2005) 122–
133. Emerald Group.
Tian Z., Ho. L.J., Chung J-Y, Lin K-J., Liu L., Li J. and Guttmukkala V. (2000). A
study and implementation of business-to-business e-commerce with the OBI
standard. Netnomics: Economics Research and Electronic Networking 2, (3) 293308 Baltzer Science Publishers BV.
Transparency International (2006). Handbook For Curbing Corruption In Public
Procurement. Transparency International.
Turban, E., King, D., Viehland, D., and Lee, J, (2006). Electronic Commerce: A
Managerial Perspective 2006. Pearson-Prentice Hall, Upper Saddle River, NJ.
Tygar, J.D. Atomicity in electronic commerce. ACMMixed Media. Apr
Weele, A. van, 1988, Inkoop in strategisch perspectief. Samsom, Alphen ad Rijn
Yang J. and Papazoglu P. (2000). Interoperation Support for Electronic Business.
Association for Computing Machinery. Communications of the ACM, 43 (6)
pp.39-47.
Yongjie Chen, Jeff H. Rankin, (2006). A Framework for Benchmarking EProcurement in the AEC Industry. ICEC’06, August 14–16, 2006, Fredericton,
Canada.
Appendix A :
Use Case Description
1. Use Case Description for Login
Use case name : Login System
ID : 1 Importance Level : High
Primary Actor : Vendor, Committee, Use case type : Detail, essential
Administrator
Stakeholders and Interest :
Vendor - Login the system by using their own id
Committee - Login the system by using their own id for security
Administrator - Login the system by using their own id for security
Brief Description - This use case describes the login process for all the users.
Trigger : The users entry their user name and password to using the system
Type : Internal
Relationships :
Association : Vendor, Committee, Administrator
Include : Extend : Generalization : Normal Flow of Events :
1. The users insert their id and password.
2. if their id and password has been recorded in database, the user can access the
system, else the user can not use the system,
Sub flows: Alternative/Exceptional Flows : -
2. Use Case Description for Logout
Use case name : Logout System
ID : 2 Importance Level : High
Primary Actor : Vendor, Committee, Use case type : Detail, essential
Administrator
Stakeholders and Interest :
Vendor - Logout the system.
Committee- Logout the system.
Administrator - Logout the system
Brief Description - This use case describes the logout process for all the users.
Trigger : The users exit the system
Type : Internal
Relationships :
Association : Vendor, Committee, Administrator
Include : Extend : Generalization : Normal Flow of Events :
1. After finishing access the system, the users will logout the system. It
is more for the security.
2. After Log out, the user back to main menu.
Sub flows: Alternative/Exceptional Flows : -
3. Use Case Description Register New Vendor
Use case name : Register New Vendor
Primary Actor : Public
ID : 3 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Public – Register to the system.
Brief Description - This use case describes the register process. First time, before use
the system, public must register their company.
Trigger : public register their company to get user id and password.
Type : Internal
Relationships :
Association : Public
Include : Extend : Generalization : Normal Flow of Events :
1. Enter to main page
2. if they do not have user id and password, they must register by click
Register New Vendor in the main page.
3. Enter their data to complete registration.
4. Enter submit button to register
Sub flows: Alternative/Exceptional Flows : -
4. Use Case Description for Create Tender
Use case name : Create Tender
Primary Actor : Administrator
ID : 4 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Administrator – Create tender information for e-procurement.
Brief Description - This use case describes administrator creates tender information
for procurement processes and publish the information to the e-procurement system.
Trigger : Create tender information and publish
Type : Internal
Relationships :
Association : Administrator
Include : Extend : Generalization : Normal Flow of Events :
1. Administrator login the e-procurement system as Administrator
2. Choose Create Tender menu
3. Fill all tender information
4. Submit tender information
Sub flows: Alternative/Exceptional Flows : -
5. Use Case Description for View Tender
Use case name : View Tender
ID : 5 Importance Level : High
Primary Actor : Administrator, Public Use case type : Detail, essential
Stakeholders and Interest :
Administrator – view tender information for e-procurement.
Public - view tender information for e-procurement.
Brief Description – tender information for the procurement can be access in the eprocurement system.
Trigger : View tender
Type : Internal
Relationships :
Association : Administrator, Public
Include : Extend : Edit Tender, Delete Tender
Generalization : Normal Flow of Events :
1. Enter to Main Page
2. User id and Password not required to enter this menu
3. Choose View Tender
Sub flows: Alternative/Exceptional Flows : -
6. Use Case Description for Create Tender
Use case name : Create User
Primary Actor : Administrator
ID : 6 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Administrator – Create user for e-procurement.
Brief Description - This use case describes administrator creates user to the eprocurement system.
Trigger : Create user
Type : Internal
Relationships :
Association : Administrator
Include : Extend : Generalization : Normal Flow of Events :
1. Administrator login the e-procurement system as Administrator
2. Choose Create User menu
3. Fill all user
4. Submit tender information
Sub flows: Alternative/Exceptional Flows : -
7. Use Case Description for Create Committee
Use case name : Create Committee
Primary Actor : Administrator
ID : 7 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Administrator – Create committee for tender in e-procurement system.
Brief Description - This use case describes administrator creates committee for each
procurement processes to the e-procurement system.
Trigger : Create committee
Type : Internal
Relationships :
Association : Administrator
Include : Extend : Add Committee, Delete Committee, Edit Committee
Generalization : Normal Flow of Events :
1. Administrator login the e-procurement system as Administrator
2. Choose Create Committee menu
3. Fill all committee data
4. Submit committee
Sub flows: Alternative/Exceptional Flows : -
8. Use Case Description for Weight Criterion
Use case name : Create Tender
Primary Actor : Administrator
ID : 8 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Administrator – Create weight criterion each tender for e-procurement.
Brief Description - This use case describes administrator creates weight criterion
each tender for procurement processes to the e-procurement system.
Trigger : Create weight criterion
Type : Internal
Relationships :
Association : Administrator
Include : Extend : Generalization : Normal Flow of Events :
1. Administrator login the e-procurement system as Administrator
2. Choose Create Weight Criterion
3. Fill all point criterion
4. Submit weight criterion
Sub flows: Alternative/Exceptional Flows : -
9. Use Case Description for Term and Condition
Use case name : Create term and condition ID : 9 Importance Level : High
Primary Actor : Administrator
Use case type : Detail, essential
Stakeholders and Interest :
Administrator – Create term and condition for e-procurement.
Brief Description - This use case describes administrator creates term and condition
for procurement processes and publish the information to the e-procurement system.
Trigger : Create term and condition
Type : Internal
Relationships :
Association : Administrator
Include : Extend : Generalization : Normal Flow of Events :
1. Administrator login the e-procurement system as Administrator
2. Choose Create term and condition menu
3. Fill term and conditions
4. Submit term and condition data
Sub flows: Alternative/Exceptional Flows : -
10. Use Case Description for Add News
Use case name : Add News
Primary Actor : Administrator
ID : 10 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Administrator – Create News for Regional Planning and Development Agency of
Riau Province.
Brief Description - This use case describes administrator creates news for
procurement processes and publish the information to the e-procurement system.
Trigger : Create news
Type : Internal
Relationships :
Association : Administrator
Include : Extend : Generalization : Normal Flow of Events :
1. Administrator login the e-procurement system as Administrator
2. Choose add news menu
3. Fill news
4. Submit news
Sub flows: Alternative/Exceptional Flows : -
11. Use Case Description for View Committee
Use case name : View Committee
Primary Actor : Administrator
ID : 11 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Administrator – View Committee.
Brief Description - This use case describes administrator view committee for
procurement processes from the e-procurement system.
Trigger : view committee
Type : Internal
Relationships :
Association : Administrator
Include : Extend : Generalization : Normal Flow of Events :
1. Administrator login the e-procurement system as Administrator
2. Choose view committee menu
3. Select Tender Id
4. e-Procurement will display list of committee
Sub flows: Alternative/Exceptional Flows : -
12. Use Case Description for View User
Use case name : View User
Primary Actor : Administrator
ID : 12 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Administrator – View User.
Brief Description - This use case describes administrator view user from the eprocurement system. The list of user can be edited and deleted.
Trigger : view committee
Type : Internal
Relationships :
Association : Administrator
Include : Extend : Edit User, Delete User
Generalization : Normal Flow of Events :
1. Administrator login the e-procurement system as Administrator
2. Choose view user menu
3. e-Procurement system will display list of user.
4. click Edit to edit user
5. click delete to delete user
Sub flows: Alternative/Exceptional Flows : -
13. Use Case Description for View Weight Criterion
Use case name : View Weight Criterion
Primary Actor : Administrator
ID : 13 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Administrator – View Weight Criterion.
Brief Description - This use case describes administrator view weight criterion from
the e-procurement system. If today’s date < opening document date, weight criterion
are allowed to edited and deleted.
Trigger : view weight criterion
Type : Internal
Relationships :
Association : Administrator
Include : Extend : Edit weight criterion, Delete weight criterion
Generalization : Normal Flow of Events :
1. Administrator login the e-procurement system as Administrator
2. Choose view weight criterion menu
3. e-Procurement system will display weight criterion
4. click Edit to edit user
5. click delete to delete user
Sub flows: Alternative/Exceptional Flows : -
14. Use Case Description for View Registered Company
Use case name : View registered company
Primary Actor : Administrator
ID : 14 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Administrator – View registered company.
Brief Description - This use case describes administrator view registered company to
the e-procurement system.
Trigger : view registered company
Type : Internal
Relationships :
Association : Administrator
Include : Extend : Generalization : Normal Flow of Events :
1. Administrator login the e-procurement system as Administrator
2. Choose view registered company menu
3. e-Procurement system will display list of registered company.
Sub flows: Alternative/Exceptional Flows : -
15. Use Case Description for View news
Use case name : View News
Primary Actor : Administrator
ID : 15 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Administrator – View news.
Brief Description - This use case describes administrator view news from the eprocurement system. The list of user can be edited and deleted.
Trigger : view news
Type : Internal
Relationships :
Association : Administrator
Include : Extend : Generalization : Normal Flow of Events :
1. Administrator login the e-procurement system as Administrator
2. Choose view news menu
3. e-Procurement system will display list of news.
Sub flows: Alternative/Exceptional Flows : -
16. Use Case Description for Upload Tender Document
Use case name : Upload tender document
Primary Actor : Committee
ID : 16 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Committee – upload tender document.
Brief Description – Upload tender document to the e-procurement system that
contain specification, requisite and procedure.
Trigger : Upload tender document to the e-procurement
Type : Internal
Relationships :
Association : Committee
Include : Extend : Generalization : Normal Flow of Events :
1. Login as Committee
2. Choose Tender Document menu
3. fill the data and choose file to upload
4. Enter submit button to complete
Sub flows: Alternative/Exceptional Flows : -
17. Use Case Description for Create Blacklist Vendor
Use case name : Create Blacklist Vendor
Primary Actor : Committee
ID : 17 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Committee – Vendor who has bad record on project will be blacklist by committee.
Brief Description – Vendor who has bad record on project will be blacklist by
committee and will be publish to e-procurement system. And the vendor will be band
for few years.
Trigger : Vendor blacklist
Type : Internal
Relationships :
Association : Committee
Include : Extend : Generalization : Normal Flow of Events :
1. Login as Committee
2. Choose Blacklist vendor menu
3. Enter the blacklist vendor data
4. Enter submit button to finish this transaction
5. The vendor will automatically can not attend the procurement for few
years.
Sub flows: Alternative/Exceptional Flows : -
18. Use Case Description for List of Question
Use case name : List of Question
Primary Actor : Committee
ID : 18 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Committee – Answer all questions about procurement procedure
Brief Description – Committee can answer all question from vendor who attend the
procurement.
Trigger : Answer Questions
Type : Internal
Relationships :
Association : Committee
Include : Extend : Answer Question, Detail Question
Generalization : Normal Flow of Events :
1. Login as Committee
2. Choose Question Menu
3. All Question will be display
4. Check list the Question that want to be answer
5. The answer form will be show
6. Enter the answer
7. Enter submit button to finish
Sub flows: Alternative/Exceptional Flows : -
19. Use Case Description for List of Complaint
Use case name : List of Complaint
Primary Actor : Committee
ID : 19 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Committee – Answer all complaint about procurement procedure
Brief Description – Committee can answer all complaint from vendor who attend the
procurement.
Trigger : Answer complaint
Type : Internal
Relationships :
Association : Committee
Include : Extend : Answer complaint, Detail complaint
Generalization : Normal Flow of Events :
8. Login as Committee
9. Choose complaint Menu
10. All complaint will be display
11. Check list the complaint that want to be answer
12. The answer form will be show
13. Enter the answer
14. Enter submit button to finish
Sub flows: Alternative/Exceptional Flows : -
20. Use Case Description for Generate Winner candidate
Use
case
name
:
Generate
Winner ID : 20 Importance Level : High
Candidate
Primary Actor : Committee, public
Use case type : Detail, essential
Stakeholders and Interest :
Committee – view winner candidate who won the procurement
Public – view winner candidate who won the procurement
Brief Description – The winner candidate automatically calculate by the system. If
today’s date >= winner candidate announcement date, the list of winner candidate
automatically displayed to the e-procurement system.
Trigger : Announce the winner candidate
Type : Internal
Relationships :
Association : Committee, Public
Include : Extend : Generalization : Normal Flow of Events :
1. Login as committee
2. Choose generate winner candidate menu
3. Winner will be display
Sub flows: Alternative/Exceptional Flows : -
21. Use Case Description for View Blacklist vendor
Use case name : View Blacklist Vendor
Primary Actor : Committee
ID : 21 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Committee – View blacklist vendor, and automatically can not attend next
procurement.
Brief Description – Blacklist vendor will be publish in the e-procurement system.
Committee can edit and delete blacklist vendor.
Trigger : view vendor blacklist
Type : Internal
Relationships :
Association : Committee
Include : Extend : Edit Blacklist Vendor, Delete Blacklist Vendor
Generalization : Normal Flow of Events :
1. Committee login the e-procurement system as Committee
2. Choose view Blacklist Vendor menu
3. e-Procurement system will display Blacklisted Vendor
4. click Edit to edit blacklist vendor
5. click delete to delete blacklist vendor
Sub flows: Alternative/Exceptional Flows : -
22. Use Case Description for View Tender Document
Use case name : View Tender Document
Primary Actor : Committee
ID : 22 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Committee – View tender document.
Brief Description – The use case describe committee can view tender document from
the system. Committee also can edit and delete this data.
Trigger : view tender document
Type : Internal
Relationships :
Association : Committee
Include : Extend : Edit tender document, Delete tender document
Generalization : Normal Flow of Events :
1. Committee login the e-procurement system as Committee
2. Choose view tender document menu
3. e-Procurement system will display tender document
4. click Edit to edit tender document
5. click delete to delete tender document
Sub flows: Alternative/Exceptional Flows : -
23. Use Case Description for View Attendance to Tender
Use case name : View Attendance to ID : 23 Importance Level : High
Tender
Primary Actor : Committee
Use case type : Detail, essential
Stakeholders and Interest :
Committee – View attendance to tender
Brief Description – The use case describe committee can view attendance the tender
from the system.
Trigger : view attendance to tender
Type : Internal
Relationships :
Association : Committee
Include : Extend : Edit tender document, Delete tender document
Generalization : Normal Flow of Events :
1. Committee login the e-procurement system as Committee
2. Choose view attendance to tender menu
3. e-Procurement system will display attendance to tender
Sub flows: Alternative/Exceptional Flows : -
24. Use Case Description for Create Vendor Point
Use case name : Create Vendor Point
Primary Actor : Committee
ID : 24 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Committee – Each Committee will evaluate each vendor and enter their point
Brief Description –
Each Committee will evaluate the vendor who attend this
procurement, and give point to each vendor.
Trigger : Create vendor point each committee member.
Type : Internal
Relationships :
Association : Committee
Include : Extend : Generalization : Normal Flow of Events :
1. Login as committee
2. Choose create vendor point menu
3. Enter point the vendor
4. Enter submit button to finish this transaction
Sub flows: Alternative/Exceptional Flows : -
25. Use Case Description for View Vendor Point
Use case name : View Vendor Point
Primary Actor : Committee
ID : 25 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Committee – Each Committee will view each vendor point.
Brief Description – The system will automatically calculate and display the vendor
list order by high point. If today’s date >=opening document date and < Winner
candidate announcement date, vendor point are allowed to edited and deleted.
Trigger : View vendor point each committee member.
Type : Internal
Relationships :
Association : Committee
Include : Extend : Edit vendor point, Delete vendor point
Generalization : Normal Flow of Events :
1. Login as committee
2. Choose view vendor point menu
3. Enter submit button to finish this transaction
4. e-Procurement system will display vendor point
5. click Edit to edit vendor point
6. click delete to delete vendor point
Sub flows: Alternative/Exceptional Flows : -
26. Use Case Description for View Vote All Committee
Use case name : View Vote All Committee ID : 26 Importance Level : High
Primary Actor : Committee
Use case type : Detail, essential
Stakeholders and Interest :
Committee – Only committee who has position as chairman can enter this system.
Brief Description – The system will automatically calculate and display the vendor
list order by high point.
Trigger : View vote all committee member.
Type : Internal
Relationships :
Association : Committee
Include : Extend : Generalization : Normal Flow of Events :
1. Login as committee (only position as chairman)
2. Choose view vote all committee menu
3. e-Procurement system will display vendor point
Sub flows: Alternative/Exceptional Flows : -
27. Use Case Description for Download Tender document
Use
case
name
:
Download
tender ID : 27 Importance Level : High
document
Primary Actor : Vendor
Use case type : Detail, essential
Stakeholders and Interest :
Vendor – download tender document that uploaded by tender committee.
Brief Description – Vendor who attend this procurement, can download all tender
document that uploaded by tender committee.
Trigger : Download tender document
Type : Internal
Relationships :
Association : Vendor
Include : Extend : Generalization : Normal Flow of Events :
1. Login as vendor
2. Choose Download document
3. Download tender document
Sub flows: Alternative/Exceptional Flows : -
28. Use Case Description for View Company Profile
Use case name : View Company Profile
Primary Actor : Vendor
ID : 28 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Vendor – View their company data.
Brief Description – Vendor can view and edit their data.
Trigger : View and Edit vendor data
Type : Internal
Relationships :
Association : Vendor
Include : Extend : Edit Company Profile
Generalization : Normal Flow of Events :
1. Login as Vendor
2. Choose View Company Profile
3. Company profile will be displayed.
4. Choose edit button to update data
5. Enter Submit button to finish update data.
Sub flows: Alternative/Exceptional Flows : -
29. Use Case Description for Create Question
Use case name : Create Question
Primary Actor : Vendor
ID : 29 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Vendor – Vendor can create questions to the committee about procurement procedure
Brief Description – Vendor possible create any question about procurement
Trigger : Create Questions
Type : Internal
Relationships :
Association : Vendor
Include : Extend : Generalization : Normal Flow of Events :
1. Login as vendor
2. Choose Create Question menu
3. Enter the question
4. Enter Submit button to finish this transaction
Sub flows: Alternative/Exceptional Flows : -
30. Use Case Description for Create Complaint
Use case name : Create Complaint
Primary Actor : Vendor
ID : 30 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Vendor – vendor can complaint with tender result and ask for result.
Brief Description – vendor who involve the procurement, can complaint and ask to
the committee about tender result.
Trigger : if today’s date >= start of complaint date and <= end of complaint date,
vendor can create complaint
Type : Internal
Relationships :
Association : Vendor
Include : Extend : Generalization : Normal Flow of Events :
1. Login as vendor
2. Choose Create Complaint menu
3. Enter the complaint
4. Enter Submit button to finish this transaction
Sub flows: Alternative/Exceptional Flows : -
31. Use Case Description for Register To Tender
Use case name : Register To Tender
Primary Actor : Vendor
ID : 31 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Vendor – Vendor can register to attendance to tender
Brief Description – Vendor must register to attendance to tender by e-procurement
system.
Trigger : Register to Tender
Type : Internal
Relationships :
Association : Vendor
Include : Extend : Generalization : Normal Flow of Events :
1. Login as vendor
2. Choose Register to Tender menu
3. Fill the menu
4. Enter Submit button to finish this transaction
Sub flows: Alternative/Exceptional Flows : -
32. Use Case Description for View Register To Tender
Use case name : View Register To Tender
Primary Actor : Vendor
ID : 32 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Vendor – Vendor can view register to attendance to tender
Brief Description – Vendor view register to attendance to tender by e-procurement
system. And vendor can print and delete the data
Trigger : View Register to Tender
Type : Internal
Relationships :
Association : Vendor
Include : Extend : Delete Register to Tender, Print Attendance Certificate
Generalization : Normal Flow of Events :
5. Login as vendor
6. Choose view Register to Tender menu
7. List of registered tender will be display
8. Delete to cancel attend to tender
9. Print to print attendance certificate
Sub flows: Alternative/Exceptional Flows : -
33. Use Case Description for View Winner candidate
Use case name : View Winner Candidate
Primary Actor : public
ID : 33 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Public – view winner candidate who won the procurement
Brief Description – The winner candidate automatically calculate by the system. If
today’s date >= winner candidate announcement date, the list of winner candidate
automatically displayed to the e-procurement system.
Trigger : Announce the winner candidate
Type : Internal
Relationships :
Association : Public
Include : Extend : Generalization : Normal Flow of Events :
1. In Main menu
2. Choose Winner info menu
3. Winner will be display
Sub flows: Alternative/Exceptional Flows : -
34. Use Case Description for View Blacklist vendor
Use case name : View Blacklist Vendor
Primary Actor : Public
ID : 34 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Public – View blacklist vendor, and automatically can not attend next procurement.
Brief Description – Blacklist vendor will be publish in the e-procurement system.
Trigger : view vendor blacklist
Type : Internal
Relationships :
Association : Public
Include : Extend : Generalization : Normal Flow of Events :
1. In Main menu
2. Choose Blacklist Vendor menu
3. Blacklisted vendor will be display
Sub flows: Alternative/Exceptional Flows : -
35. Use Case Description for View Complaint
Use case name : View Complaint
Primary Actor : Public
ID : 35 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Public - View the complaint and answer
Brief Description – Complaint and answer will be publish in the e-procurement
system, and public can monitor the procurement.
Trigger : view complaint
Type : Internal
Relationships :
Association : Public
Include : Extend : Generalization : Normal Flow of Events :
1. From main page
2. All Complaint will be display
3. user id and password are not required
Sub flows: Alternative/Exceptional Flows : -
36. Use Case Description for View Question
Use case name : View Question
Primary Actor : Public
ID : 36 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Public - View the question and answer
Brief Description –
question and answer will be publish in the e-procurement
system, and public can monitor the procurement.
Trigger : view question
Type : Internal
Relationships :
Association : Public
Include : Extend : Generalization : Normal Flow of Events :
1. From main page
2. All question will be display
3. user id and password are not required
Sub flows: Alternative/Exceptional Flows : -
37. Use Case Description for View Announcement
Use case name : View Announcement
Primary Actor : Public
ID : 37 Importance Level : High
Use case type : Detail, essential
Stakeholders and Interest :
Public - view tender information for e-procurement.
Brief Description – tender information for the procurement can be access in the eprocurement system.
Trigger : View Announcement
Type : Internal
Relationships :
Association : Public
Include : Extend :
Generalization : Normal Flow of Events :
1. From main page
2. All question will be display
3. user id and password are not required
Sub flows: Alternative/Exceptional Flows : -
Appendix B :
CRC Card
1. CRC for vendor
Front:
Class Name: vendor
ID: 1
Type: Concrete, Domain
Description: Register to every vendor to Associates Use Cases:
attend
the
procurement
and
record their data in the database
Responsibilities
Collaborators
Register
Question
Update
Blacklist Vendor
View
Block
Back:
Attributes
Company_name
NPWP_number
User_id
Password
Address
Director
Director I/C
PKP_number
Type_of Company
Email
Telp
No_akta_pendirian
Tanggal_pengesahan
No_akta perubahan
Tanggal_perubahan
Tdp_number
SIUP_number
SITU_number
Relationships:
Generalization (a-kind-of): User
Aggregation (has-parts): Other associations: -
2. CRC for Tender Doc
Front:
Class Name: Tender Doc
ID: 2
Type: Concrete, Domain
Description: Provide tender document and all Associates Use Cases:
requisite
Responsibilities
Insert
Delete
Update
view
Back:
Attributes
Tender_id
Tender_document
Relationships:
Generalization (a-kind-of): Tender
Aggregation (has-parts): Other associations: -
Collaborators
3. CRC for Tender
Front:
Class Name: Tender
ID: 3
Type: Concrete, Domain
Description: Provide tender information and Associates Use Cases:
invite
vendor to attend the
procurement
Responsibilities :
Collaborators :
tender_selection
Insert
Delete
Update
view
Back:
Attributes
Tender_id
Tender_name
Description
Start_date
End_date
End_registration_date
Doc_submission_date
Opening_doc_date
Candidate_announcement_date
Complaint_date_start
Complaint_date_end
Method
Relationships:
Generalization (a-kind-of): -
Aggregation (has-parts): Tender_doc, weight_criterion, question, complaint
Other associations: -
4. CRC for Committee
Front:
Class Name: Committee
Description: Committee
ID: 4
that
involve
Type: Concrete, Domain
the Associates Use Cases:
procurement
Responsibilities :
Collaborators :
Tender selection
Insert
Delete
Update
view
Back:
Attributes
Tender_id
NIP
Position
SK_number
Weight_vote
Relationships:
Generalization (a-kind-of): User
Aggregation (has-parts): Other associations: -
5. CRC for Question
Front:
Class Name: Question
ID: 5
Type: Concrete, Domain
Description: Vendor can ask question to Associates Use Cases:
committee
about
tender
document and requirement
Responsibilities :
Collaborators :
Vendor
Insert
Update
view
Back:
Attributes
Tender_id
NPWP_number
Question
Date_question
Answer
Date_answer
Relationships:
Generalization (a-kind-of): Tender
Aggregation (has-parts): Other associations: -
6. CRC for Complaint
Front:
Class Name: Complaint
ID: 6
Type: Concrete, Domain
Description: Vendor can complaint about Associates Use Cases:
result of procurement.
Responsibilities :
Collaborators :
Insert
Tender
Update
Register to tender
view
Back:
Attributes
Tender_id
NPWP_id
Complaint
Date_complaint
Answer
Date_answer
Relationships:
Generalization (a-kind-of): Tender
Aggregation (has-parts): Other associations: -
7. CRC for Blacklist Vendor
Front:
Class Name: Blacklist Vendor
ID: 7
Type: Concrete, Domain
Description: Vendor who has bad record on Associates Use Cases:
procurement will be listed at
blacklist vendor.
Responsibilities :
Collaborators :
Vendor
Insert
Update
Delete
view
Back:
Attributes
NPWP_number
Description
Date_of_banned
End_of_banned
Relationships:
Generalization (a-kind-of): Aggregation (has-parts): Other associations: -
8. CRC for Tender Selection
Front:
Class Name: Tender Selection
ID: 8
Type: Concrete, Domain
Description: Calculate point that given by Associates Use Cases:
committee and generate with
weight criterion and announce
who won the procurement.
Responsibilities :
Collaborators :
Generate
Tender
Insert
Register to tender
Update
committee
Delete
Back:
Attributes
Tender_id
NPWP_number
NIP
Document
Price
Methodology
Expertise_staff
experience
Relationships:
Generalization (a-kind-of): Aggregation (has-parts): Other associations: -
9. CRC for Weight Criterion
Front:
Class Name: Weight Criterion
ID: 9
Type: Concrete, Domain
Description: Calculate point each point with Associates Use Cases:
weight criterion.
Responsibilities :
Insert
Collaborators :
Tender
delete
Update
view
Back:
Attributes
Tender_id
Bobot_Document
Bobot_Price
Bobot_Methodology
Bobot_Expertise_staff
Bobot_Experience
Relationships:
Generalization (a-kind-of): Tender
Aggregation (has-parts): Other associations: -
10. CRC for Register To Tender
Front:
Class Name: Register To Tender
Description: Vendor
must
ID: 10
register
Type: Concrete, Domain
to Associates Use Cases:
attendance each tender.
Responsibilities :
Collaborators :
Insert
Complaint
delete
Tender_selection
view
Vendor
Print
Back:
Attributes
Tender_id
Npwp_number
Code_register
Date_register
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts): Other associations: -
11. CRC for User
Front:
Class Name: User
ID: 11
Type: Concrete, Domain
Description: User is the person who have Associates Use Cases:
authentication
to
enter
the
system
Responsibilities :
Collaborators :
Insert
Committee
Delete
Vendor
Update
view
Back:
Attributes
Nip
Nama
User_name
Password
Kode_hak_akses
Date_created
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts): committee, vendor
Other associations: -
Appendix C :
Sequence Diagram
159
1. Sequence Diagram for Create Tender
Login : user
CreateNew
Tender : Tender
: Admin
login ( )
insert ( )
2. Sequence Diagram for Create User
Login : user
: Admin
CreateNewUser : user
login ( )
insert ( )
160
3. Sequence Diagram for Create Weight Criterion
Login : user
: Admin
View : weight_
criterion
login ( )
view()
update ( )
delete ( )
4. Sequence Diagram for Create Committee
Login : user
: Admin
CreateNew :
committee
login ( )
insert ( )
update ( )
delete ( )
161
5. Sequence Diagram for View Committee
Login : user
: Admin
View :
committee
login ( )
view()
6. Sequence Diagram for View Tender
Login : user
: Admin
View : Tender
login ( )
view()
update ( )
delete ( )
162
7. Sequence Diagram for View User
Login : user
: Admin
CreateNew :
user
login ( )
view()
update ( )
delete ( )
8. Sequence Diagram for View Weight Criterion
Login : user
: Admin
View : weight_
criterion
login ( )
view()
update ( )
delete ( )
163
9. Sequence Diagram for View Registered Company
Login : user
: Admin
View : vendor
login ( )
view()
10. Sequence Diagram for Upload Tender Document
Login : user
: Committee_
Upload : tender
_doc
login ( )
insert ( )
11. Sequence Diagram for View Attendance to Tender
Login : user
: Committee_
View : register_
to_tender
login ( )
view()
164
12. Sequence Diagram for Create Vendor Point
Login : user
: Committee_
CreateNew :
tender_selection
login ( )
insert ( )
13. Sequence Diagram for Create Blacklist Vendor
Login : user
: Committee_
CreateNew :
blacklist_vendor
login ( )
insert ( )
14. Sequence Diagram for Generate Winner Candidate
Login : user
: Committee_
: weight_
criterion
: tender_
selection
login ( )
calculate ( )
generate ( )
165
15. Sequence Diagram for View Tender Document
Login : user
: Committee_
View : tender_
doc
login ( )
view()
update ( )
delete ( )
16. Sequence Diagram for View Vendor Point
Login : user
: Committee_
View : tender_
selection
login ( )
view ( )
update ( )
delete ( )
166
17. Sequence Diagram for View Vote All Committee
Login : user
: Committee_
View : tender_
selection
login ( )
view ( )
18. Sequence Diagram for View Blacklist Vendor
Login : user
: Committee_
View : blacklist_
vendor
insert ( )
view ( )
update ( )
delete ( )
167
19. Sequence Diagram for List of Question
Login : user
: Committee_
ListOf : question
login ( )
view()
answer ( )
20. Sequence Diagram for List of Complaint
Login : user
: Committee_
List Of :
complaint
login ( )
view()
answer ( )
168
21. Sequence Diagram for Download Tender Document
Login : user
: Vendor_
View : tender_
doc
login ( )
download ( )
22. Sequence Diagram for Register To Tender
Login : user
: Vendor_
Register : register
_to_tender
login ( )
register ( )
23. Sequence Diagram for View Company Profile
Login : user
: Vendor_
View : vendor
login ( )
view()
update ( )
169
24. Sequence Diagram for View Register to Tender
Login : user
: Vendor_
View : register_
to_tender
login ( )
view()
delete ( )
print ( )
25. Sequence Diagram for Create Question
Login : user
: Vendor_
CreateNew :
question
login ( )
insert ( )
170
26. Sequence Diagram for Create Complaint
Login : user
: Vendor_
CreateNew :
complaint
login ( )
Insert ( )
Appendix D :
User Manual
172
1. Public Page
Open Web Brower and type http:/localhost/eproc/ . The interface is shown in
as the following. Click on the left menu that we want to go :
a. View Announcement
From the left menu, click View Announcement to view detail tender
information tender. The interface is shown as the following.
173
b. View Winner Information
From the left menu, click View Winner Information to view winner detail
candidate. The interface is shown as the following.
c. View Black List Vendor
From the left menu, click View Blacklist Vendor to view blacklisted vendor.
The interface is shown as the following.
174
d. View Question And Answer
From the left menu, click View Question. There are several list of question.
The interface is shown as the following.
To view the answer of each question, click “detail” . The interface is shown as the
following.
175
e. View Complaint
Procedure to view complaint is the same with to view question. Please refer
to View Question procedure.
f. Register New User
Vendors who did not have user id and password, must register to eprocurement system. To register new vendor, they have to fill all correct information
about their company. The interface is shown as following.
176
2. Administrator Page
From the main menu, click “login” and enter User Name and Password. If we
have an authority to enter as administrator, the interface is shown as following.
If the user name and password are accepted, the interface is shown as following.
177
a. Create tender
Click “Create Tender” in the left menu to create new tender information.
Administrator has to fill all tender information. The interface is shown as the
following.
b. Create User
Click “Create User” in the left menu to create new user. Administrator has to
fill all user information. The interface is shown as the following.
178
c. Create Committee
Click “Create Committee” in the left menu to create new committee.
Administrator has to fill all user information. To Add committee click “Add
Committee” button. To delete committee in a tender, click “delete” from the table.
To edit committee data, click “Edit” from the table. The interface is shown as the
following.
d. Create Term and Conditions
Click “Create Term and Conditions” in the left menu to create new term and
condition. Administrator has to fill term and conditions. The interface is shown as the
following.
179
e. Create Weight Criterion
Click “Weight Criterion” in the left menu to create new weight criterion for
each tender. Administrator has to fill each weight criterion for each tender. The
interface is shown as the following.
f. Add News
Click “Add News” in the left menu to create new news. Administrator has to
fill news that will be publishing to public. The interface is shown as the following.
180
g. View Tender
Click “View Tender” in the left menu to view tender information. To edit
each tender data, click “Edit” from the table. To delete each tender, click “delete”
from the table. The interface is shown as the following.
h. View User
Click “View User” in the left menu to view User. To edit each user data, click
“Edit” from the table. To delete user, click “delete” from the table. The interface is
shown as the following.
181
i. View Committee
Click “View Committee” in the left menu to view committee each tender.
The interface is shown as the following.
j. View Weight Criterion
Click “View Weight Criterion” in the left menu to view weight criterion. Edit
and Delete weight criterion are allowed before opening document date. If today’s
date >= opening document date, edit and delete are not allowed. To edit each weight
criterion data, click “Edit” from the table. To delete weight criterion, click “delete”
from the table. The interface is shown as the following.
182
k. View Registered Company
Click “View Registered Company” in the left menu to view all vendors that
recorded into database. To view detail of each vendor, click “detail” from the table.
The interface is shown as the following.
183
3. Committee Page
From the main menu, click “login” and enter User Name and Password. If we
have an authority to enter as committee, the interface is shown as following.
If the user name and password are accepted, the interface is shown as following.
184
a. Upload Tender Document
Click “Upload Tender Document” in the left menu to upload tender document
information. Click “Browse” to find out document that want to upload. The interface
is shown as the following.
b. View Attendance to Tender
Click “View Attendance to Tender” in the left menu to view all vendors that
register to attendance the tender. The interface is shown as the following.
185
c. Create Vendor Point
Click “Create Vendor Point” in the left menu to give point to a vendor. The
interface is shown as the following.
d. View Tender Document
Click “View Tender Document” in the left menu to view tender document.
To edit each tender document data, click “Edit” from the table. To delete tender
document, click “delete” from the table. The interface is shown as the following.
186
e. View Vendor Point
Click “View Vendor Point” in the left menu to view vendor point. Edit and
Delete vendor point are allowed between opening document date until winner
candidate announcement date. If today’s date >= winner candidate announcement
date, edit and delete are not allowed. To edit each vendor point data, click “Edit”
from the table. To delete vendor point, click “delete” from the table. The interface is
shown as the following.
f. View Vote All Committee
This menu is only for chairman position in a tender. Click “View Vote All
Committee” in the left menu to view vote all committee. The interface is shown as
the following.
187
g. View Blacklist Vendor
Click “View Blacklist Vendor” in the left menu to view blacklisted vendor.
To edit blacklisted vendor data, click “Edit” from the table. To delete blacklisted
vendor, click “delete” from the table. The interface is shown as the following.
h. Generate Winner Candidate
This menu will be active if today’s date >= winner candidate announcement
date. Click “View Generate Winner Candidate” in the left menu to view the winner
and their point. The interface is shown as the following.
188
i. Answer Question
From the left menu, click Answer Question. There are several list of question.
The interface is shown as the following.
To answer of each question, click “Answer”. The Committee has fill the answer. The
interface is shown as the following.
189
j. Answer Complaint
Procedure to answer complaint is the same with to answer question. Please
refer to Answer Question procedure.
k. Create Blacklist Vendor
Click “Create Blacklist Vendor” in the left menu to create blacklist vendor.
The interface is shown as the following.
190
4. Vendor Page
From the main menu, click “login” and enter User Name and Password. If we
has been registered as vendor, the interface is shown as following.
If the user name and password are accepted, the interface is shown as following.
191
a. Download Tender Document
Click “Download Tender Document” in the left menu to download tender
document. Right Click in the document field and “Save Target As” or “Save Link
As” the document. The interface is shown as the following.
b. Register To Tender
Click “Register To Tender” in the left menu to register to attend the tender.
Vendor have to click “are you agree to register ?” checklist . The interface is shown
as the following.
192
c. View Company Profile
Click “View Company Profile” in the left menu to vendor’s profile. To edit
vendor’s profile, click “Edit” button. The interface is shown as the following.
d. View Register To Tender
Click “View Register To Tender” in the left menu to view registered tender.
To cancel attend the tender, click “Delete” from the table. The interface is shown as
the following.
193
To print certificate of attendance, click “Print” from the table. The interface is shown
as the following.
194
e. Create Question
Click “Create Question” in the left menu to create question about tender. The
interface is shown as the following.
f. Create Complain
Procedure to create complaint is the same with to create question. But, create
complaint menu will be active if today’s date between start of complaint date until
end of complaint date for each tender. Please refer to Create Question procedure.
Appendix E :
Database Design
196
1. Table Tender
!
$
% &
!
$
"#
"#
"#
"#
'$
&
"#
& $#
$$ &
"#
&%
' &
"#
&#
& %
$
"#
& %
"#
&
(!
"#
$ #$
# )!)) ) " # ) )
* +,
-. / + 0 + &1 1 2
3
4
"#
0
5
2. Table Register
%6 % #
& % 7
#$
% $$6 &
$$
&
& 9%
%9% #
7% &" & %
%
& 9 %
'' %
& 9 %
'' %
% #
$ #% #
$ # #
* +,
-.
/+ 0 +
'$
(!
8!
!!
(!
"#
"#
"#
8!
(!
"#
7
(!
"#
!
"#
' $
#
#
(!
(!
(!
%6 % #
&1 1 2
"#
!
"#
"#
!
"#
"#
"#
"#
"#
3
4
0
5
197
3. Table Access List
9 9$ $
9&
* +,
/+
9
9
-.
0+
9$ $
9$ $
- 9&
&1 1 2
!
"#
9 9$ $
3
4 0
5
4. Table Menu
#
#
7
8
#&
!
"#
"#
%
7 8
"#
$ :#
7 8
"#
" ' &'
# ) ))!) " # ) )
* +,
-. #
/ + 0 + &1
+
,
08 1 2
3
4 0
5
#
5. Table User
#$
%
(!
!
#$
% $$6 &
9&
9 9$ $
* +,
/+
!
!
-. %
0 + &1 1 2
!
3
4
0
5
198
6. Table Committee
&
&
&
#&
%
!
%&$ &
(!
"#
$9 #
8!
"#
6 '
&
"#
* +,
-. &
&
. . . %
%
4
+
&
"9
2
2
4
1
4 1
*1
4 1
4
+
&
"9 ( 2
2
4
#$
%
1
*1
4 1
/ + 0 + &1 1 2
3
4 0
+/
. -
+/
. 4 1
%
5
7. Table Tender Document
&
& #
!
* +,
-. 4
+
2.
2
4
*1
4 1
/ + 0 + &1 1 2
"#
&
2
+/
. 1
3
4
0
5
8. Table Term and Condition
&
&
&
& ' ;
* +,
-. / + 0 + &1
+
3
4 0
5
&
#&
,
0
4
1 2
1
199
9. Table Weight Criterion
& &
& &
& &
& &
& &
& &
* +,
4
2
*1
/+
&
%
"#
"#
& & &'7
"#
;%
"#
$ ""
"#
-. +
2.
& & 2
+/ . 4
1
4 1
0 + &1 1 2
3
4 0
5
4
10. Table Register to Attend The Tender
'$
&
%6 %
&
'$
#
(!
'$
"#
* +,
-. %6 % #
. - 2.
'$
&
%6 % #
4
+
2.
'$
&
2
+/ . 2
4
1
4 1
*1
4 1
4
+
2.
'$
&
2
+/ . %6 % #
2
4
'$
%6 % #
1
4 1
*1
4 1
/ + 0 + &1 1 2
3
4 0
5
1
200
11. Table Selection
$
$
&
&
#&
%
!
%6 % #
& #
%
!!
& & &'7
;%
$ $ ""
;%
. . - 2.
$
&
4
+
2.
2
4
*1
4 1
4
+
2.
%6 % #
2
1
4 1
/ + 0 + &1
3
4 0
5
(!
!!
"#
"#
!!
"#
!!
"#
!!
"#
%6 % #
& 2
+/
$
$
&
4
*1
+
2
,
. 1
+/ . '$
%6 %
4 1
0 1 2
4
1
#
12. Table Question
:# $ &
:# $ &
#&
%6 % #
(!
:# $ &
& ' ;
:# $ &
"#
$6
& ' ;
$6
"#
$ #$
# )!)) ) " # ) )
* +,
- . - :# $ &
. - 2.
:# $ &
. - 2.
:# $ &
%6 % #
4
+
2.
:# $ &
2
+/ . 2
4
1
4
*1
4 1
4
+
2.
:# $ &
2
+/ . %6 % #
2
4
'$
%6 % #
1
4 1
*1
4 1
/ + 0 + &1 1 2
3
4 0
5
1
201
13. Table Complaint
& %
& %
%6 %
#&
#
& %
(!
"#
& %
$6
& ' ;
& ' ;
$6
"#
$ #$
# )!)) ) " # ) )
* +,
-. & %
. - 2.
& %
. - 2.
& %
%6 % #
4
+
2.
& %
2
+/ . 2
4
1
4 1
*1
4 1
4
+
2.
& %
2
+/ . %6 % #
2
4
'$
%6 %
1
4 1
*1
4 1
/ + 0 + &1
+
,
0(1 2
3
4 0
5
#
14. Table Blacklist Vendor
9 $
9 $ &
#&
%6 % #
!
"#
$ % &
!!
"#
&"
"#
&"
"#
$ #$
# )!)) ) " # ) )
* +,
-. 9 $ &
. $ % &
%6 % #
4
+
2.
9 $ 2
%6 % #
2
4
1
4 1
*1
/ + 0 + &1 1 2
3
4
+/ . '$
%6 %
4 1
0
5
#
Appendix F :
Snapshot Functions PHP Code
203
1. Function Connection to MySQL
!"
'
"*
,
(
/ 0(
#$% & #
# () #
# #
#+#
# - (#
$% & (
(
1
() ( 23
5
6
$% &
( 78
'
.
.
"*
4
,
2. Function Login Process
( 7
( 7
( #9
9
: ; 789
-)-#
( #9
9
:/ (
4 8 9
-)-#
7
&
&9
&9
&9
&9
&9
7
=
5
/
"
"
&<7
&" =7
# >
(
?
#
#@$. 9
; 7 ) ; ; .89
/4 4 . 9
$ #
#A
8
#
#> A B < 8 $
8
9
;7 ); ;
897 $
#* '
9
$
7#
#,
9
- = 7 - C
" ! D#
$% & & % &
$% & / ()
%
7
@$
(; 8 (;
4
= E + FF 5
+ 1
) 7 # (
G
9
9
: 7 59
-)-H
5
7
4
+#
6
1
<
7
<
/4 4
7
<
7
) 7 # (
G
9
9
: 7 59
-)-#
I
6
$
/4 4
;7 ); ;
#
204
3. Function Block Blacklist Vendor Login
/ (
4 8
(; 8 (;
4
71
(
& # >
(
?
& 9 #* '
9-=& 9 #,
9
7
@$ A
8
$8
89-=7,
89
$% & & % &
$% & / ()
%
8 (;
%
%- )
8 (;.
5
8 (; I @$
4
. 8 8 (;
$8 #
+#
=
=
5
6
4. Function Format Date to Database
/ (
/ $
4 ) 1
/ 4 )
FF 4 )
::
4 )
IIII2II2II
1
5
- :. 4 )
4
5I
8
5+
)
5D
4 )
)9
#2#98 9
#2#9 4
/ 4 )
22
4 )
6
4 )
6
5. Function Format Date From Database
/ (
/ $
A $
4 ) 1
5
- 2. 4 )
4
5D
8
5+
)
5I
4 )
49
#:#98 9
#:#9 )
/ 4 )
:: FF 4 )
II:II:IIII
4 )
4 )
6
8#
205
6. Function List Tender ID
/ (
4 8
7
7 1
(
&
# >
?A
8
$% & & % &
= $% & / ()
7
=
=)
7 *'
(
+#
1
7
7
6
7
6
7. Function List Tender ID for Winner Candidate Form
/ (
4 8
7
7=
( 77
1
(
4
7 #!2$27#
& # >
?A
8
7
& 9 #* '
4 3 ( 77
7
=)
=
$% & &
%
#
($
7 #
% &
$% & / ()
7
=
(
1
7
7
6
7
6
8. Function List Tender ID for Insert Point Form
/ (
4 8
7
7
-
4
7 #!2$27#
& # >
?A
8
& 9 #* '
4 3 & 9 #,
4 E ( 77
7
=)
=
$% & &
%
7
7 #
4 7 (7
($
% &
$% & / ()
7
=
6
6
1
(
(
1
7
7
#
7 #
206
9. Function List Tender ID For Insert Weight Criterion Form
/ (
4 8
4
&
7
7
88
1
(
7
#
#!2$27#
>
?A
$% & &
%
7
=)
=
8
7 *'
4 E -
4 7 (7
% &
$% & / ()
7
=
(
1
7
7
6
7
6
10. Function List Tender Name
/ (
4 8
7
$
7
71
(
& # >
& 9 #* '
7
7
$ A
7
7
8
7
7#
#
$% & & % &
$% & / ()
%
7
7
7
$
6
11. Function List NIP
/ (
4 8
- 1
(
&
# >
?A
$% & &
=)
=
6
=)
;7 ); ;
% &
$% & / ()
=
6
8
(
-
1
E3 J #
#
207
12. Function List Name
/ (
4 8
$
-1
(
&
# >
$ A
8
*'
-
-#
$% & & % &
$% & / ()
%
7
7
$
6
13. Function List NPWP Number
/ (
4 8
-=- 1
(
&
# >
?A
$% & &
=)
=
8
4
#
% &
$% & / ()
-==
(
-=-
1
$8
6
-=6
14. Function List Company Name
/ (
4 8
( $- %
& # >
& 9 #* '
( $- % $ .7 ( A
-=- $8
-=- #
$% & & % &
$% & / ()
%
7
7
6
-=- 1
(
( $- %
$
8
4
#
208
15. Function List NPWP Number That Register To Attend The Tender
/ (
4 8
-=-
4
/4
7
1
(
& # >
9-=- $8 A
8 4
& 9 #8 4
7 8#
& 9 #* '
9-=- $8 89-=- $8
& 9 #,
89 7 7 / 4
7 #
$% & & % &
= $% & / ()
-==
=)
(
-=-
.#
#
1
$8
6
-=6
16. Function Update Blacklist Vendor Status
function update_status_blacklist() {
global $conn,$_POST;
$tgl
$cek_status
(;
= date("Y-m-d");
= "UPDATE tbl_blacklist SET status ='0' #
9 #WHERE end_of_banned <= '$tgl' ";
$hasil
}
= mysql_query($cek_status);
17. Function Check Before Insert Into Table Register
/ (
4 8
&
&
7
(; 8 /
( . "
# >
9 #* '
@$
-=- 1
(
? @$ A
8
-=- $8
-=- #
$% & & % &
$% & / ()
%
7
6
4
4
#
209
18. Function Insert Into Table Register
/ (
4 8
4
(
.
1
"
( $- %
-=$
- = 7
77
7 (
7 ( ;-;- $8
( %- ( $- %
$
; - 7
44 - 4 )
/ $
; - 8)
44 - 8 )
/ $
$8
- $8
7- $8
"
"
"
"
"
"
"
"
"
"
"
"
( $- %
-=$
- = 7
77
7 (
7 ( ;-;- $8
( %- ( $- %
$
; - 7
"
"
;
"
"
"
"
-
44 - 4
8)
44
$8
- $8
7- $8
-
8)
(; (; 8 /
4
-=/ (;
I 1
& #<
<
8 4
( $- % $ . -=- $8
& 9 #- = 7. 77 .7 ( .7 ( ; -.-;- $8 . #
& 9 #%- /( $- %. $ . -.
; - 7
.#
& 9 # 44 - 4 ) .
; - 8 ) . 44 - 8 )
&9#
$8 . - $8 . 7- $8 #
& 9 # ,>
( $- %. -=-.
$ . - = 7. #
& 9 # 77
. 7 ( . 7 ( ; -. -;- $8 . #
&9#
( %- ( $- %.
$ .
-.
; - 7
&9#
44 - 4 ) .
; - 8) .
44 &9#
$8 .
- $8 . 7- $8 #
$% & &
)
.
7. #
.#
.#
8) . #
% &
4 7 #!2$27#
& #<
<
8
-. $ .
& 9 #; 7 ) ; ; .7 (
7#
& 9 # ,>
-=-. ( $- %.
&9# 4 #
$% & & % &
6
(;
6
$ .- = 7. #
$ . - = 7. J. #
210
19. Function Check Before Insert Into Table Tender
/ (
4 8
(; 8 /
( . "
& # >
& 9 #* '
7
7
(
7
7
? @$ A
7
7
71
8
7#
7 #
$% & & % &
$% & / ()
%
7
@$
6
20. Function Insert Into Table Tender
/ (
4 8
7
(
.
1
"
7 7
7
$
7 (7
/ $
7
/ $
- 4 7 (7
/ $
( 77
($
/ $
( $7
/ $
( $7
7
/ $
77
/ $
( $ )7
7(
"
"
"
7 7
7
$
7 (-
"
7
8$
(; (; 8 /
/ (;
I 1
& #<
<
&9#
7 .7 (
& 9 #( 77
& 9 #( $7
"
7(
"
-
8$
7
4 7 (7
7
"
( 77
"
( $-
7
"
( $-
7
"
7
7
77
"
7
($
7
( $ )7
7
8
7
7 7. 7
$ .7 ( 8$
7 . 4 7 (7 . #
($
7 .( $7
.#
7. 7 7 .$ ) 7 #
.#
211
&
&
&
&
9
9
9
9
# ,>
#
7
# ( 77
# ( $-
$% & &
7 7.
7
$ . 7 (.#
. 7 ( 8$
7 . - 4 7 (7 . #
($
7 . ( $7
.#
7
7.
77 .
( $ )7 #
% &
&
# " ,
&9#
7
& 9 #* '
$% & &
8
4
7
7 #
7
,
7
7 7#
,
7 .K #
% &
6
(;
6
21. Function Check Before Insert Into Table User
/ (
4 8
&
7
(; 8 /
( . "
# >
(
?
$% & & % &
$% & / ()
%
7
6
-1
@$
@$ A
8
*'
-
-#
212
22. Function Insert Into Table User
/ (
4 8
1
(
.
"
$
"
"
"
"
"
/ $
$
- = 7
( ((
7
$
$
- = 7
( ((
"
7
(
7
(; (; 8 /
/ (;
I 1
& #<
<
8
-. $ .
$ .- = 7. #
& 9 #; 7 ) ; ; .7 (
7#
& 9 # ,>
-.
$ .
$ . - = 7. #
&9#
( (( . 7
#
$% & & % &
6
(;
6
23. Function Insert Into Table Committee
/ (
4 8
(
7
;
.
( $$
"
7
"
"
"
"
$8
& #<
& 9 # ,>
$% & &
6
1
% &
<
7
(
(
;
8 ( $$
7. -. -
7
-
7
$8
7
.
7. -.; $8
. ;
#
$8
#
213
24. Function Check Before Insert Into Table Bobot
/ (
4 8
(; 8 /
( . "
& # >
& 9 #* '
7
7
(
7
= 4)
? @$ A
7
7
7
71
8 88 #
7#
$% & & % &
$% & / ()
%
7
@$
6
25. Function Insert Into Table Bobot
function insert_tender_weight() {
global $conn,$_POST;
$tender_id
$bobot_doc
$bobot_price
$bobot_methodology
$bobot_staff
$bobot_experience
=
=
=
=
=
=
$_POST['select_tender_id'];
$_POST['bobot_doc'];
$_POST['bobot_price'];
$_POST['bobot_methodology'];
$_POST['bobot_staff'];
$_POST['bobot_experience'];
$cek = cek_before_insert_tender_weight($tender_id);
if ($cek == '0') {
$sql = "INSERT INTO tbl_bobot(tender_id,bobot_doc,bobot_price, #
& 9 #bobot_methodology,bobot_staff,bobot_experience) #
& 9 #VALUES('$tender_id','$bobot_doc','$bobot_price', #
& 9 #'$bobot_methodology','$bobot_staff','$bobot_experience') ";
mysql_query($sql);
}
return $cek;
}
214
26. Function Check Before Insert Into Table Selection
/ (
4 8
(; 8 /
( . "
& # >
& 9 #* '
7
7
(
7
(
? @$ A
7
7
7
8
7
7.
-=- 1
(
#
7 -=- $8
-=- #
$% & & % &
$% & / ()
%
7
@$
6
27. Function Insert Into Table Selection
/ (
4 8
7
(
.
(
1
"
7 7
-=7 ($
- (
$ ) 7 4%
// 5(
( $- % 5(; (; 8 /
/ (;
I 1
"
"
"
"
"
"
"
(
7
(
7 7
( -=7 ($
- (
$ ) 7 4%
// 5(
( $- % 5(
(
7
7.
-=-
& #<
<
8
(
7 7. -=- $8 .7 ( $
& 9 #- ( .$ ) 7 4%. 5//. 5( #
& 9 # ,>
7 7. -=-. 7 ( $ . - ( . #
& 9 # $ ) 7 4%.
// 5( . ( $- % 5( #
$% & & % &
6
(;
6
.#
215
28. Function Insert Into Table Blacklist
/ (
4 8
(
.
-=7 (7
/8
7 /8
8 (;
"
L 7
1
"
"
/ $
/ $
7
7
( -=7 ("
"
& #<
<
8 8 (;
-=& 9 #7
/8
7. 7 /8
7#
& 9 # ,>
-=-. 7 ( . 7
& 9 # 7 /8
7 #
$% & &
7
/8
7 /8
$8 .7 ( /8
7. #
% &
6
29. Function Check Before Insert Into Table Tender Document
/ (
4 8
(; 5
47(
( . "
& # >
& 9 #* '
7
7
@$
71
? @$ A
7
7
$% & & % &
$% & / ()
%
7
6
(
7
8
7#
7
7 (#
.#
7
7
216
30. Function Insert Into Table Tender Document
function upload_dok() {
global $conn,$_POST,$_FILE;
$pict = $_FILES['userfile_1']['name'];
$uploaddir = $_SERVER['DOCUMENT_ROOT']."/eproc/file/";
$uploadfile = $uploaddir.$pict;
if (move_uploaded_file($_FILES['userfile_1']['tmp_name'], $uploadfile)) {
$tender_id
= $_POST['select_tender_id'];
$sql = "INSERT INTO tbl_tender_doc(tender_id,document) ";
$sql .= "VALUES('$tender_id','$pict') ";
mysql_query($sql);
}
else {
print "Possible file upload attack! Here's some debugging info:\n";
print_r($_FILES);
}
}
31. Function For Generate Winner Candidate
include_once "function.php";
if (!isset($_POST['flag_tender']))
$_POST['flag_tender'] = '';
if (!isset($tender_name))
$tender_name ='';
$flag_tender =
$_POST['flag_tender'];
$arr_tender = list_tender_id_winner_candidate();
if ($flag_tender != '')
$tender_name = list_tender_name($flag_tender);
217
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
= "SELECT d.company_name, ";
.= "ROUND(sum( ((a.document * b.bobot_doc) / 100) * ";
.= " (c.weight_vote) /100 ),2) as company_doc,";
.= "ROUND(sum( ((a.price*b.bobot_price) / 100) * ";
.= " (c.weight_vote) /100 ),2) as company_price,";
.= "ROUND(sum( ((a.methodology*b.bobot_methodology) / ";
.= "100) * (c.weight_vote) /100 ),2) as company_method,";
.= "ROUND(sum( ((a.expertise_staff*b.bobot_staff) / 100) * ";
.= " (c.weight_vote) /100 ),2) as company_staff,";
.= "ROUND(sum( ((a.experience*b.bobot_experience) / 100) * ";
.= " (c.weight_vote) /100 ),2) as company_experience, ";
.= "ROUND(sum( ((a.document * b.bobot_doc) / 100) * ";
.= " (c.weight_vote) /100 ) +";
.= "sum( ((a.price*b.bobot_price) / 100) * (c.weight_vote) /";
.= "100 ) +sum( ((a.methodology*b.bobot_methodology) / ";
.= "100) * (c.weight_vote) /100 ) + ";
.= "sum( ((a.expertise_staff*b.bobot_staff) / 100) * ";
.= " (c.weight_vote) /100 ) +";
.= "sum( ((a.experience*b.bobot_experience) / 100) * ";
.= " (c.weight_vote) /100 ),2) as company_total ";
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
.= "FROM tbl_selection a ";
.= "LEFT JOIN tbl_bobot b ON a.tender_id = b.tender_id ";
.= "LEFT JOIN tbl_committee c ON ";
.= " (a.tender_id = c.tender_id) AND (a.nip = c.nip) ";
.= "LEFT JOIN tbl_register d ON ";
.= "a.npwp_number=d.npwp_number ";
.= "WHERE a.tender_id = '$flag_tender' GROUP BY ";
.= "a.npwp_number ORDER BY company_total DESC";
$hasil
= mysql_query ($sql_tampil) or die ("Invalid query!");
218
32. Function View Vote All Committee
include_once "function.php";
if (!isset($_POST['flag_tender']))
$_POST['flag_tender'] = '';
if (!isset($_POST['flag_npwp']))
$_POST['flag_npwp'] ='';
if (!isset($tender_name))
$tender_name ='';
if (!isset($company_name))
$company_name ='';
$flag_npwp = $_POST['flag_npwp'];
$flag_tender = $_POST['flag_tender'];
$arr_tender = list_tender_id_view_point_all();
if ($flag_tender != '') {
$tender_name = list_tender_name($flag_tender);
$arr_npwp = list_npwp_register($flag_tender);
if ($flag_npwp != '')
$company_name = list_company($flag_npwp);
}
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
$sql_tampil
";
$sql_tampil
$sql_tampil
= "SELECT d.nama,e.position_name,c.weight_vote, ";
.= "ROUND(((a.document * b.bobot_doc) /100),2) as doc, ";
.= "ROUND(((a.price * b.bobot_price) /100),2) as price, ";
.= "ROUND(((a.methodology * b.bobot_methodology) /100), ";
.= "2) as method, ";
.= "ROUND(((a.experience * b.bobot_experience) /100), ";
.= "2) as experience, ";
.= "ROUND(((a.expertise_staff * b.bobot_staff) /100), ";
.= "2) as staff ";
.= "FROM tbl_selection a ";
.= "LEFT JOIN tbl_bobot b ON a.tender_id = b.tender_id ";
.= "LEFT JOIN tbl_committee c ON ";
.= " (a.tender_id = c.tender_id) AND a.nip = c.nip ";
.= "LEFT JOIN tbl_user d ON c.nip=d.nip ";
.= "LEFT JOIN tbl_position e ON c.position_id=e.position_id
$hasil
= mysql_query ($sql_tampil) or die ("Invalid query!");
.= "WHERE a.tender_id = '$flag_tender' AND ";
.= "a.npwp_number='$flag_npwp' ";
219
33. Function Insert Into Table Question
/ (
4 8
(
.
&
"
1
7 7
-=- $8
&
"
"
"
4 7 #!2$27#
& #<
<
8 &
& 9 #7 &
. = #
& 9 # ,>
-=- $8 .
& 9 #*
4
, =
#
$% & &
(
-=&
-=7
7 7
$8
$8 .
7. &
7
7.&
.
.#
4.#
% &
6
34. Function Insert Into Table Complaint
/ (
4 8
(
.
( $"
-=- $8
7 7
( $-
1
"
"
"
-=(
( $-
$8
7 7
4
7 #!2$27#
= + #*
4
, = #
& #<
<
8 ( $-=- $8 . 7 7.( $& 9 #7 ( $. = #
& 9 # ,>
-=- $8 .
7 7. ( $.#
&9 # 4.
= + #
$% & &
6
% &
.#
220
35. Function Get User Date From User Login
/ (
4 8
4
(
4
%
& # >
?A
= $% & & % &
$% & / ()
4
%
%- )
4
<
8
4
%
71
*'
7
7#
=
.
4
6
36. Function Cek Before Insert Into Table Register To Tender
/ (
4 8
(; 8 /
( . "
&
# >
(
?
& 9 #* '
7 7
& 9 #,
-=- $8
7
$% & & % &
$% & / ()
%
7
6
@$
4
7
@$ A
8 4
7 7#
-=- $8 #
7
7.
-=7 #
$8
1
221
37. Function Insert Into Table Register To Tender
/ (
4 8
4
(
.
7
1
"
(7
4
7 7
-=- $8
"
"
"
(7
4
7 7
$8
(
-=-
(; (; 8 /
4
/ (;
I 1
4 7 #!2$27#
& #<
<
8 4
& 9 # -=- $8 .7
4
& 9 # ,>
(7 4
.
7
7
7.
7 (7
#
7
7.
-=-
-=-
4
.
$8
7
7. #
$8 .
4 #
7
7#
$% & & % &
6
(;
6
38. Function List Tender ID for Complaint Form
/ (
4 8
7
7 ( $-
1
(
4
7
& #
&9#
#!2$27#
( ?/ $ 8
7 *'
*
( $7
,
$% & & % &
7
%
=)
=
$% & / ()
7
=
6
7
6
(
1
7
7
4 #
( $-
222
39. Function List Tender ID for Register To Attend Tender Form
/ (
4 8
7
7
4
1
(
4
7
& #
&9#
#!2$27#
( ?/ $ 8
*
7 *'
7 ,
4 #
4
7
7 #
$% & & % &
7
%
=)
=
$% & / ()
7
=
(
1
7
7
6
7
6
40. Function List Tender Name
/ (
4 8
7
& # >
& 9 #* '
7
7
7
7
$ A
7
$% & & % &
$% & / ()
%
7
6
$ L 7
71
(
7
$
7
8
7
7#
#
Appendix G :
User Acceptance Test Questionnaires
User Acceptance Test
Application Name
:
E-Procurement System
Company Name
:
Regional Planning and Development of Riau Agency
Category User
:
1.
Administrator
2.
Committee
3.
Vendor
4.
Public
System Performance Rating :
5 – Very Good
4 – Good
3 – Fair
2 – Poor
1 – Very Poor
No
Questions
1.
Is the e-Procurement system interface interesting?
2.
Is the e-Procurement system easy to use?
3.
Does the e-Procurement system produce the valid information
for each process?
4.
Does the error message that is produced by the system can help
the user?
5.
Does the interface of e-Procurement system fulfill the user
requirement ?
Answer
6.
Does the database system up-to-date?
7.
Is the system security performance good?
8
Has the overall database system manipulated by the authority
user?
9
Does this system help the overall management to conduct
procurement processes ?
10
Has the overall system processes give priority to transparency ?
11
Has the overall system processes give priority to accountability ?
12
Has the overall system processes give priority to integrity ?
13
Has the overall system processes give priority to open and fair
competition ?
Base on survey, there are fiftheen respondend that answer the quistionaries. The
result from respondend for each question are :
1.
Is the e-Procurement system interface interesting?
Interface
9
8
Total Responden
8
7
7
6
5
4
3
2
1
0
0
very poor
0
poor
0
fair
Criteria
2.
Is the e-Procurement system easy to use?
good
very good
Total Responden
Easy to Use
10
9
8
7
6
5
4
3
2
1
0
9
5
1
0
0
very poor
poor
fair
good
very good
Criteria
Does the e-Procurement system produce the valid information for each process?
Valid Information
8
7
7
Total Responden
3.
6
6
5
4
3
2
2
1
0
0
very poor
0
poor
fair
Criteria
good
very good
4.
Does the error message that is produced by the system can help the user?
Total Responden
Error Message
10
9
8
7
6
5
4
3
2
1
0
9
6
0
0
very poor
poor
0
fair
good
very good
Criteria
Does the interface of e-Procurement system fulfill the user requirement ?
Fullfil Requirement
Total Responden
5.
10
9
8
7
6
5
4
3
2
1
0
9
5
1
0
0
very poor
poor
fair
Criteria
good
very good
6.
Does the database system up-to-date?
Up-to-date Data
9
8
Total Responden
8
7
7
6
5
4
3
2
1
0
0
very poor
0
poor
0
fair
good
very good
Criteria
Is the system security performance good?
Security performance
9
8
8
Total Responden
7.
7
7
6
5
4
3
2
1
0
0
very poor
0
poor
0
fair
Criteria
good
very good
8
Has the overall database system manipulated by the authority user?
Total Responden
User Authority
10
9
8
7
6
5
4
3
2
1
0
9
5
1
0
0
very poor
poor
fair
good
very good
Criteria
Does this system help the overall management to conduct procurement
processes ?
Management
12
10
10
Total Responden
9
8
6
4
2
0
0
very poor
2
1
poor
fair
Criteria
good
2
very good
10
Has the overall system processes give priority to transparency ?
Total Responden
Transperancy
10
9
8
7
6
5
4
3
2
1
0
9
5
1
0
0
very poor
poor
fair
good
very good
Criteria
Has the overall system processes give priority to accountability ?
Accountability
12
11
10
Total Responden
11
8
6
4
4
2
0
0
0
very poor
poor
0
fair
Criteria
good
very good
12
Has the overall system processes give priority to integrity ?
Integrity
12
10
Total Responden
10
8
6
5
4
2
0
0
0
very poor
poor
0
fair
good
very good
Criteria
Has the overall system processes give priority to open and fair competition ?
Open Fair Competition
Total Responden
13
10
9
8
7
6
5
4
3
2
1
0
9
5
1
0
0
very poor
poor
fair
Criteria
good
very good
Appendix H :
Technical Documentation
233
1. Introduction
This technical documentation will show the administrator how to install Apache and
PHP and MySQL on Windows XP, as well as how to set up a nice working
environment.
2. Install Apache
Double-click on the installer. Read the agreements and information, clicking
next to move through each screen. On the fourth screen, we will see the following:
The explanation of each of these settings directly from the Apache
documentation:
•
Network Domain. Enter the DNS domain in which your server is or will be
registered in. For example, if your server's full DNS name is
server.mydomain.net, you would type mydomain.net here.
•
Server Name. Your server's full DNS name. From the example above, you
would type server.mydomain.net here.
234
•
Administrator's Email Address. Enter the server administrator's or
webmaster's email address here. This address will be displayed along with
error messages to the client by default.
•
For whom to install Apache Select for All Users, on Port 80, as a Service Recommended if you'd like your new Apache to listen at port 80 for
incoming traffic. It will run as a service (that is, Apache will run even if no
one is logged in on the server at the moment) Select only for the Current
User, on Port 8080, when started Manually if you'd like to install Apache for
your personal experimenting or if you already have another WWW server
running on port 80.
Here you have a few options:
•
If we are going to be using Apache only for testing scripts on your own
machine, you can enter localhost for the first two values and anything you'd
like for the email address (e.g. admin@localhost). If you're only going to be
using Apache sometimes and only when you are logged on, it does not make
sense to run it as a service, because it will eat up system resources and
potentially pose a security risk. Select "only for the Current User, on Port
8080, when started Manually". Press "Next" and skip ahead.
•
If we would like to install Apache to be used as a local area network server,
you should set your router to assign the computer you are installing Apache
on to have a static LAN ip address (if it does not already have one. This issue
is beyond the scope of this article; refer to your router's documentation, or
consult the person in charge of your network). Enter either this IP address, or
a network name that you will use to access the server from within your
network in the first two boxes (if you choose a name, you will need to update
the Hosts file of the users on your network so that when they type the name in
a browser, it maps to your computer's IP address). Enter an appropriate email
address in the third box, and choose "for All Users, on Port 80, as a Service Recommended". Press "Next" and skip ahead.
•
If we would like your server to be accessible through the internet, you will
need your computer to either have a static internet IP address and set up a
domain name server (DNS) to point your domain name to your computer's IP
235
(this is beyond the scope of this article). If you do not have a static IP, you
can set up your computer to have a static local IP as described in the last
paragraph, and use a dynamic DNS service such as dyndns.com to keep your
current IP up to date on the DNS. A good router will allow you to
automatically update the dynamic DNS when the router acquires an IP
address. You will also need to set up port forwarding so that all incoming
traffic on port 80 is forwarded to your computers static local IP address. Enter
the dynamic DNS domain name, e.g. mysite.dnydns.org, for the first two
entries, and an appropriate email address for the third. choose "for All Users,
on Port 80, as a Service - Recommended". Press "Next" and skip ahead.
The next screen is following:
Choose "Custom" and press "Next". On the following screen we will see the default
path Apache installs to:
236
Click the "Change..." button (boxed in red in the picture), and choose the WebServer
folder (or whatever other name you chose) you made when you created the directory
structure above. Click "Next".
On the next screen click "Install". After it installs click "Finish". we just installed
Apache. It is located in WebServer folder in the Apache2 directory.
Let's make sure it worked. Go to your programs folder in the Start menu and find the
Apache HTTP Server folder. Go to the Control Apache Server folder, and start
Apache
If you installed Apache as a service, we can also start it by double-clicking on the
Apache Service Monitor tray icon (which looks like:
) and pressing the "Start"
button in the window that appears. If we did not install it as a service, you will see a
blank command prompt window appear while Apache is running. This is normal.
The first time we run Apache, you will probably see a security warning pop up:
237
This is because windows has detected that Apache is opening a port on your
computer, and it is checking with you about whether it should let Apache continue.
Click the "Unblock" button to allow Apache to function.
Now, let's open up a web browser and make sure Apache is running. Type in the
name of your server (e.g. localhost, or your domain name or IP address) in the
location bar of the browser. Apache is working, we should see a page that looks like
238
3. Download and Install PHP 5
Place PHP files in folder WebServer\PHP directory. For PHP to work with
Apache and to make the CLI available from any command prompt window, we need
to add the PHP folder to the PATH environment variable. To do this, right click on
your "My Computer" icon (either on your desktop or the start menu) and select
"Properties." In the window that pops up, select the advanced tab, and click on the
"Environment Variables" button.
In the window that appears, select the "Path" variable line from the "System
Variables" menu, and click edit:
239
At the end of the "Variable Value" field, type a semicolon (;) and the type in
the full path to your PHP folder. For me, this means typing the following at the end
of the "Variable Value" field ;D:\Web\WebServer\PHP.
Hit OK in each window until they have all closed, and restart your computer. Pick up
back here when you've restarted.
Now open PHP folder, and change the name of the file php.inirecommended to php.ini. The settings in this file are all pretty much exactly as they
should be.
240
Make the following changes to the file:
Line 512: doc_root = D:\Web\WebServer\Apache2\htdocs
Line 519: extension_dir = D:\Web\WebServer\PHP\ext
Save the php.ini file and close it.
4. Configuring Apache
Now we have got PHP and Apache working separately, we need to get them
to work together. Go to your Apache2/conf folder, and open up the httpd.conf file
in a text editor. You can get Apache to run PHP as either a CGI binary, or an Apache
Module. Generally speaking, it is faster and more secure to do the latter, which you
do by adding the following to your httpd.conf file:
a. At the top of the LoadModule section, starting around line 130, add
the line
LoadModule php5_module "D:/Web/WebServer/PHP/php5apache2.dll"
b. In the AddType section around line 754, add the following line:
AddType application/x-httpd-php .php
You can add other extensions besides .php if you want PHP to parse other
file types as well. For example, if you want to be able to include PHP in
.html documents:
AddType application/x-httpd-php .php .html
c. Add the following line, somewhere that seems sensible to you:
PHPIniDir "D:/Web/WebServer/PHP/"
Save the httpd.conf file, and start Apache as discussed above (or restart it if it is
running).
241
Open your Apache2 htdocs folder. This is the root folder for all of your web server
documents that you will view in your web browser. Make a file called phpinfo.php
that contains the following:
<?php phpinfo(); ?>
and save it in your htdocs folder. Now open a web browser and go to
http://localhost/phpinfo.php. You should see a page that looks like
242
5. Setting up a development environment and installing MySQL
Open up your php.ini file again, and go to about line 620. There are a whole
bunch of lines that look like :
;extension=php_mbstring.dll
;extension=php_bz2.dll
;extension=php_curl.dll
;extension=php_dba.dll
;extension=php_dbase.dll
;extension=php_exif.dll
;extension=php_fdf.dll
;extension=php_filepro.dll
;extension=php_gd2.dll
;extension=php_gettext.dll
;extension=php_ifx.dll
;extension=php_imap.dll
;extension=php_interbase.dll
;extension=php_ldap.dll
;extension=php_mcrypt.dll
;extension=php_mhash.dll
The semicolon (;) is the comment symbol in the php.ini (don't confuse it with the # in
the httpd.conf), and thus these lines are commented-out, and the extensions are not
running. To enable any extensions, just remove the semicolon at the beginning of the
line.
6. Installing MySQL Server
Make a MySQL folder in your WebServer directory. Run Setup.exe. Click
"Next" at the first screen. At the second screen, choose "Custom" for the installation
type and click "Next". Click on the "Change" button in the lower left to change the
installation directory, and point it to the MySQL folder you just created:
243
Then click "Install" and let it do its thing. When it's done, you can sign up for a
MySQL.com account if you want to. Otherwise, choose "Skip Sign-Up" in the
bottom left and press Next, and then press Finish on the next screen.
The MySQL Server Instance Configuration Wizard will pop up. Click
"Next". Choose "Detailed Configuration" and click "Next". Answer the questions
according to what kind of machine your computer is. The instructions are fairly
straight forward. On the Windows Options Page, you may want to un-check the
"Launch MySQL Server automatically" option, and check the Include Bin Directory
in Windows PATH so that you can use the MySQL server from the windows
command line. It is easiest to Run MySQL as a Windows service.
244
On the next screen, pick a root password. This is the main "superuser" password for
your server:
Finally, click the "Execute" button to configure your MySQL server:
245
Have a look at phpinfo.php file. If you sucessfully set up MySQL, it should have a
section that looks like this:
246
7. Installing e-Procurement System
Copy e-procurement system (eproc) folder to Apache2 httdoc folder. The
following show the folder.
After copying eproc folder, open web browser to check the system :
Type : http://localhost/eproc/
Appendix I :
Activity Diagram
248
1. Activity Diagram for Conducting New Tender
Head Department
Administrator
Committee
Vendor
Public
Start
Create Tender
Instruction
List of
Committee
Create New
Tender
Tender
Announcement
Create
Committee
Set Weight
Criterion
Download Tender
Document
Upload Tender
Document
Register To Attendance
The Tender
Give Mark each
Vendor
Print Certificate
of Attendance
Submit Physical
Document
Winner Candidate
Announcement
List of Winner
Candidate
End
249
2. Activity Diagram For Question
Vendor
Committee
Public
Start
Create
Question
List of Question
Answer
Question
View Question
End
250
3. Activity Diagram For Complaint
Vendor
Committee
Public
Start
No
Today's Date >= Complaint date
AND <= end of complaint date
Yes
Create
Complaint
List of
Complaint
Answer
Complaint
View Complaint
End
Download