Research consultancy

CHAPTER THREE

RESEARCH METHODOLOGY

3.1 INTRODUCTION

This chapter covers research design, study population, sampling design, sources of data collection, methods of data collection, procedure of data collection, data quality control, data processing, presentation, and analysis and finally limitations anticipated.

3.2 Research design

The study used descriptive research design. The researcher employed descriptive research design since it provided the opinion of people about the subject knowledge on the impact of information and communication technology on procurement fraud. The design availed the researcher with comprehensive information about the research study as away to get solutions. Descriptive approach, in this case was used because the study seeks descriptive analysis of information.

3.3 Study population

The population of the study was 25 people which included; the staffs of cooper motors from different departments. The researcher chose to take the above study population due to insufficient resources to manage a large number of respondents.

 3.4 Sampling design.

 

Sampling design consisted of the sampling size and   sampling techniques.

3.4.1 Sampling size

The population under consideration was 25 staffs from different department of Cooper Motors, like Procurement department, stores department, finance department, marketing and other department. The researcher considered members of staff who have worked for at least six months and above in the organization.

3.4.2 Sampling technique.

The sampling technique was purposive sampling and this was used to select workers form Procurement department, stores department, finance department, marketing. Simple random sampling was also used to select respondents from other department.

 

Random sampling was also used in order to give equal chance to population of the study and business firms to be selected. The method was chosen to save cash and time.

3.5 Sources of data collection

This included both primary and secondary sources

3.5.1 Primary sources

The primary data was obtained through questionnaires. This involved distributing questionnaires to chosen respondents. Primary data was used to compare whether what was in the literature matches with respondent’s views.

3.4.2 Secondary data

The researcher obtained data from written documents like reports which had already been compiled by other persons; was obtained from journals, text books, magazines, and various documents through review of related literature from 1990 up to date. This was to supplement on primary data and also to compare primary data with literature review.

3.6 Methods of data collection

This included questionnaires and interviews that were used to gather data on the impact of information and communication technology on procurement fraud in Cooper Motors (U) Ltd.

3.6.1    Questionnaires

The researcher formed close ended and open ended questionnaires designed to collect data on the impact of information and communication technology on procurement fraud in Cooper Motors Ltd that was sent to respondents for them to answer. The researcher collected questionnaires back for analysis; data was then coded into understandable and meaningful information. This method was chosen because it was easier to gather information; it gave the respondents enough time to answer the questions since questionnaires was dropped to the respondents and then collected after 10 days.

3.6.2 Observation

This involved a researcher going to the field, and observe critically what was in the field, recorded the finding and then conclusion was drawn. The method gave more reliable and accurate information. It gave first-hand impression that removes doubt, it enabled researcher to clarify some questions on the spot.   

 

3.7 Research variables

The variables of the study were independent and dependent variables. Information and communication technology was independent variable while procurement fraud was a dependent variable.

3.8 Procedure for data collection.

The researcher acquired an introductory letter from the University and was presented to the organization where the research was conducted from.

3.9 Data quality control

The detailed information concerning the study was analyzed in a way that reflected what was answered by the respondents. This helped the researcher to come up with accurate and correct results about the study variables.

 3.10 Data analysis and presentation

The findings of the data were presented by use of tables, by arranging describing data in relation to the objectives of the study. Editing was done to ensure completeness of questioner and to eliminate misrepresentation of questionnaires.

3.11 Ethical consideration

The information got was kept confidential and strictly used academic purpose in writing the report.

3.12. Anticipated limitations.

The researcher faced the following limitations in the process of conducting the study;

  • Limited time to conduct the study because of other activities however this was solved through proper planning and time budgeting.
  • Language barrier between the researcher and the respondents and this problem was solved through encouraging respondents to guide them in terms of narrating.
  • Limited financial support to the study this was solved through borrowing from fellow students.
RSS
Follow by Email
YouTube
Pinterest
LinkedIn
Share
Instagram
WhatsApp
FbMessenger
Tiktok