methodology

METHODOLOGY

3.0       INTRODUCTION

This chapter presents the methodology which consists of the research design, area of study, study population, sample population and selection, sampling technique, data collection method, data quality control, data collection procedures and limitations of the study.

3.1 Research design

Qualitative and quantitative research designs will be used. the researcher will use the above methods because many aspects will be covered in the study concerning the impact of information and communication technology on procurement fraud at NSSF given the complex nature of NSSF, qualitative research method will be used because it collects information within a short time while quantitative will be through interview to cross check what has been given.

3.2       AREA OF THE STUDY

The study will be carried out at NSSF located at plot95 Kampala road.

3.3 STUDY POPULATION AND SAMPLE SIZE

The study will target NSSF top evaluation committee, contracts committee, procurement staff, supplier, accountants of NSSF.

3.4       SAMPLING SIZE

According to (Amin, 2005) sampling involves selecting a sample of the population in such a way that samples of the same size have equal chances of being selected.

The sample will comprise of 30 respondents who will include evaluation committee, contracts committee, procurement staff, suppliers, accountants.

While carrying out research, purposive sampling will be applied to the above different categories of respondents.

 

3.5 Data Collection Instruments

The major instruments for data collection will be questionnaires and interview guide. Surveys will be just one part of a complete data collection and evaluation strategy. The major method of data collection for the study will be the survey, which will be done using selected instruments like questionnaires. The questionnaire will provide respondents with ample time to comprehend the questions raised and hence, they will be able to answer factually.

3.5.1 Questionnaires

The questionnaire will be used to collect quantitative data. The researchers will administer the questionnaires to all the respondents, which will be designed basing on study objectives and questions. Respondents who can read and write will fill in the questionnaires themselves. The questionnaires will be close ended.

3.5.2 Interviews

Qualitative data will be collected from the informants using interviews. The interview guide will be structured. The interviews will be held with procurement staffs and accountants, and will take approximately thirty to sixty minutes. This will be used since it’s the best tool for getting first-hand information /views, perceptions, feelings and attitudes of respondents. Both formal and informal interviews will be used to get maximum information from the different respondents to participate in the research.

3.6 Reliability and Validity of data

Data analysis in this study will focus on data validity and reliability. To establish the validity of the questions, pre-testing will be done amongst the selected categories of respondents. Their comments will be incorporated in the final instruments to suit the data requirement of the study. The final amended research instruments will be reviewed jointly by the researcher and the supervisor. Reliability will be checked using the test –retest practice advocated for by Amin (2005). In other words, the questions will be put to course mates and their comments noted, they will then be presented to the respondents and their views will be compared with those of the course mates. On receipt of the questionnaires, manual editing will be done, followed by coding. Frequency count of different variables will be done and this will give the number of occurrences and percentages out of total occurrences.

3. 7 DATA COLLECTION METHODS

Source of data will be from both primary and secondary sources.

  • Primary data

Primary data will be obtained from the questionnaires administered on the target respondents to gain opinions and practices on impacts of Information and Communication Technology on procurement fraud at NSSF.

  • Secondary sources

Secondary data is data which has been collected by individuals or agencies for purposes other than those of a particular research study. It is data developed for some purpose other than for helping to solve the research problem at hand (Bell, 1997). This will comprise of literature related to impacts of information and communication technology on procurement fraud in relation to the case study. Secondary data will be sourced because it yields more accurate information than obtained through primary data, and it is also cheaper.

METHODOLOGY

3.8 DATA COLLECTION PROCEDURES

Upon receiving the University permission to carry out research, the area of study will be visited for purposes of familiarization.  The researcher will seek permission from staff and once allowed to proceed with research, questionnaires will be issued and interviews will be carried out with the selected staff.

3.9 QUALITY CONTROL OF DATA INSTRUMENTS

The instrument will be taken to the supervisor to check its correctness there after pilot study will be carried out to find out if it measures what it is meant to for.

METHODOLOGY

3.10 DATA PROCESSING AND ANALYSIS

The raw data will be coded, edited, and arranged ready for analyzing only completed raw data will be analyzed using statistical tables and graphs.

3.11 LIMITATIONS OF THE STUDY

Financial constraint, cash flow may not flow as   expected but this will not affect the study. Respondents may delay in filling the questionnaire and fear to give information, but they will be persuaded that the information will be kept secret.

Leave a Reply

Your email address will not be published. Required fields are marked *

RSS
Follow by Email
YouTube
Pinterest
LinkedIn
Share
Instagram
WhatsApp
FbMessenger
Tiktok