You are on page 1of 115

CHAPTER 1

1.1 Background of the Study

Employment and productivity are key issues to the social and economic life of every

country. From time to time, the world experiences technological revolutions which

alter the way people live, interact, communicate, seek operational information, and

generally do business with one another, Onu (2004). Advancements in technology

have provided new opportunities for the delivery of high priority and instant

messages.

The print media and the Internet poses their own sets of challenges to acquiring

timely information, such as access, cost and time. Whereas, text messages (SMS)

yield quicker responses and save significantly in cost and time.

Mobile devices have become an essential part of everyday life. The penetration level

of mobile phones is approaching 100% in well-developed economies and even in

developing economies the number of phones is rising very quickly; From this aspect,

the use of mobile phones for delivering important information is justified (Rantanen

et al., 2009).

The mobile phone has not only transformed the way we communicate with one

another, but has transformed the way we work; seek information, and the way

message is easily conveyed. Agu (2001) as cited by Onu (2004) opines that the

telephone is a very powerful means of communication and information seeking.

As a result of this, this study seeks to use suitable technology to link online portal

(knowledge management information system) and the mobile telephone as

Information technology tools to enhance access to information sources for job

seekers in Nigeria; and to share jobs knowledge amongst the group.

1
The population of Africa's largest country (Nigeria) was estimated at 123,337,822 in

2000 census. This figure represents an increase of 39.36 percent over the 1991

population census figure of 88.5 million, which was hotly debated and widely

believed to have been an undercount

http://www.nationsencyclopedia.com/economies/Africa/Nigeria.html, The United

Nations estimates that the population of Nigeria in 2005 was at 141 million, and

predicted that it would reach 289 million by 2050, http://en-wikipedia.com .

Alanana (2003) emphasises the implication of youth unemployment in Nigeria, for

the third millennium. The implications are both social, economic and political. He

contends in the paper that youth unemployment is potentially dangerous as it sends

disturbing signal to all segments of the society. The rate of youth unemployment in

Nigeria is as high as 11.5% in 1990‟s. Therefore, the advent of information

technology (I.T) and Information systems, together with internet technology, has

helped in developing information system in human resources management domain

(e-HRM), Zang and Wang (2006).

This advancement in technology has made it possible to use mobile Information

systems as infrastructure to enhance job search with the goal of contributing to

providing faster access and response by job seekers. Recruitment consultant

websites and portals are developed providing information on job leads (vacancies).

Such websites are recruiting agents consulting for and acquiring job knowledge from

organizations; it requires job seekers register and submit data in order to assess

candidates‟ suitability for relevant vacancies. Examples of such sites includes:

www.naijajobs.com; www.nairaland.com; www.monster.com;

www.kimberlyryan.com; others are traditional styles of advertising vacancies, for

2
example advertising in the press: daily newspapers, magazines, mass media,

electronic media, organizations contacts, etc.

Galanaki (2002) lists eight traditional recruitment methods: job fairs, selection

consultants-management selection, temporary agencies, advertising in the mass

media, advertisement by television and radio, existing employee contacts, school-

college or Universities and union or professional referrals.

However, this study attempts to include mobile alert messaging system as a

valuable information system that has edge in informing / alerting job seekers „on-

the-go‟ i.e., wherever they are; using mobile telephone short message services

(SMS) facility; messaging client server integrated with the backend online portal

that can be accessed with internet browser(s). The portal will allow the seekers to

assess knowledge and skills required to search and get a job as well, provide

recruiting newsletters to the recipients of the mobile SMS alert.

This study aspires to contribute to job information sources, as far as remote

locations, and providing alternative to job seekers who lack necessary skills to

search appropriately. The motivation of this research is to provide relevant and

timely information for job seekers to easily acquire and respond to information

concerning job seeking and offers.

1.2 STATEMENT OF PROBLEM

Obadan and Odusola (1999) reported that unemployment is a very serious issue in

Nigeria. Unemployment has been categorized as one of the serious impediments to

social progress. Apart from representing a colossal waste of a country's manpower

3
resources, it generates welfare loss in terms of lower output thereby leading to lower

income and well-being.

Graduates are one of the most important aspects of human capital for every country.

When unemployment exists, it means that the country‟s human capital resource is

not used wisely (Department statistics of Malaysia website, 2007).

Large number of job seekers rely on getting information on job leads from

advertisements in daily, or weekly newspapers; many combine the paper based

search with surfing the websites on internet, such as recruiting agents sites, job

forums and social networking sites.

Nevertheless, there are factors that limit afore-mentioned seekers from getting as

much information as desired; such factors include: limited information seeking skills,

poor social (networking) and communication skills, and poor information technology

skills. Hawamdeh (2007) in his study opined that these skills and competencies were

among the highest percentages (73%, 70%, and 67%) that are highlighted in job

descriptions.

As a result, innovative channels should be adopted to improve the situation; hence,

the need for mobile alert information system that is a tradeoff with time, effort,

deprivation and distraction; enhancing information access at finger-tip and

actionable. It is not limited by location constraints compared with other existing job

leads/ channels discuss above.

It is believed that, the unemployed and those who want to change their jobs, as well

as recruitment consultants will find the system useful by getting the information

needed to make better decisions about their time. With that knowledge sharing

4
should be encouraged, where unemployed graduates needs to be motivated in

realizing the importance of skills in searching for jobs or a career, Sulaiman and

Burke (2009).

1.3 OBJECTIVES

The aim of the study is to channel job information to seekers through mobile phone

short message service (SMS).

As influenced by the aim of the study, the primary objective of this study is to

describe the architecture, workflow and design of an alert system within a knowledge

management information system (KMIS).

In this context the main objectives of the research study could be stated as:

1. To design information system for sending alert messages to mobile phones

for instant relevant information, and in real time, regardless of location of

recipients i.e., job seekers;

2. To make job seekers have instant access to up-to-date information, allowing

them to spend less time searching for job leads regardless of choice of

network operator;

3. To design information system that can channel information to the „right‟

people, conveniently, in a way that is meaningful and understood by all;

4. To make the technology accessible to the „community of disabled

individuals, considered as often under-served when job information is

disseminated and;

5. To introduce sms facility to various job sites where a person can easily find

jobs, get Short Message Service (SMS) alert for new jobs and get

confirmation SMS from the sites.

5
1.4 JUSTIFICATION

The goal of this research project is to provide job seekers with the abundance of

information previously available only in the offices, newspapers, and websites.

Around-the-clock access to this crucial information can improve decisions, enhance

time efficiency. This improves the responsiveness of job seekers, thus lowering

costs of job search, and helps keep the information road open. A mobile information

system for job seekers is an essential part of an effective Human Resources

Decision Support System (HRDSS).

 Eppler (2007) has suggested that “knowledge communication has become a

deliberate activity: interactively assigning insights, either verbal or non-verbal.”

If methods of seeking information are not innovated, the traditional ways or

usual practice of passing information inter-personally from one-one, or one –

many would continue to slow down rate at which relevant information are

disseminated; thus the conduit containing the job seekers, representing a

stupendous waste of the country‟s manpower resources would continue to be

heavily laden, and many will be denied job leads that could possibly have

removed them from the growing queue of job seekers. This will continue to

contribute to the profile of unproductiveness of Nigeria. Hence impediments to

social and economic progress.

 Alert management is a utility which is information system application. At any

point during the implementation or after the implementation alert can be

dynamically added or modified.

 It helps prevent delays in the processing of important information, because

the time between discovering and responding to such situations is reduced

considerably. This could help seekers surfing the internet to spend less time,

6
since they already know what to do; unlike doing open browsing which could

be daunting.

 Alert Management forms an integral part of Management Information System

(MIS). Integrated Alert Management applications provides an effective

decision support mechanism. It provides the vital communication between

application and end-users. Mobile alert provides integration of and access to

communication, data- i.e., mashups, on Web and phone.

 Using traditional mail and paper based system was slow, ineffective and

lacking the immediacy required when candidates needed to be contacted at

short notice. Telephone and voice-messages often proved an unreliable form

of communication, especially when working with a very large audience of

people.

 The system will enabled office-based recruitment specialists (e-HRM) to send

text alerts and receive messages through their sites and computers, ensuring

a constantly open communication channel at any time of day with the

candidates.

The fresh graduates, the unemployed, and those seeking to change careers

will find the system beneficial.

 Mobile communication systems have been used to deliver alert messages for

traffics and parking alerts; college information; meetings and appointments;

advertisements; warnings / hazard alert; public alert; sales; SMS based e-

Government and marketing; etc., Hence, the system can be adapted to

alerting job seekers in Nigeria.

1.5 Scope and limitation

7
There are various methods to generate alerts such as manual alerts, event based

alerts, and automatic alerts using communication modes like e-mail, mobile and

application window. This work describes the architecture, workflow and

implementation of a mobile alert system within a Knowledge management

information system to enhance access to job information. Although, online

recruitment has made impact on the human resource field (Bussler & Davis 2002).

This study does not attempt to replace the traditional practices. Crails (2007)

identified that the majority of employers prefer to use online recruitment because it

has good potential for finding the right candidates. This study will link online

recruitment with mobile alert system to motivate job seekers and complement the

existing style.

Existing mobile network operators in Nigeria will be used as channels to reach the

recipients. This will be controlled by a central messaging server integrating the

mobile system and the portal.

Message alerts on job leads will cover job openings within Nigeria; however

recipients outside of coverage areas of local network operators may lose alert

delivery because data error detection and recovery protocol will not be utilized due to

time constraint to this research work

1.6 DEFINITION OF TERMS

The following definitions are provided to ensure a common understanding of the

primary terms used in this study.

Alert: Alert is a notification informing its recipients that a critical or very important

situation has arisen. The situation is as severe that an action must be taken

immediately in order to resolve the situation (Razdan and Cheema, 2009).

8
Information source: a place where one can get information about an, event, jobs, etc.

Internet/web browser: Software that displays hypertext markup language (HTML)

documents on the Internet, e.g. Internet Explorer, Mozilla Firefox, Google chrome,

etc.

I.C.T / I.T: The branch of engineering that deals with the use of computers and

telecommunications to retrieve and store and transmit information.

Information system: Roger (1998) an information system is a set of interacting

artifacts and human activities that performs one or more functions involving the

handling of data and information, presentation and use.

Job seeker: An unemployed person looking for work (esp. someone who needs to

prove they are looking for work in order to obtain benefits)

Job lead: information that cause job seeker to undertake a certain action

Job alert: tip off on job vacancy

Knowledge management: Hawamdah (2007) The process, approach or method on

how to manage the knowledge in organization. Online site/ portal can be considered

as knowledge management systems, since knowledge inside the portal contains the

job searching process itself.

„Mobile‟: generally means portable and personal, like a mobile phone.

Mobile telephone: A hand-held mobile radio telephone for use in an area divided

into small sections, each with its own short-range transmitter/receiver

Unemployed: not engaged in gainful occupation

WAP: Wireless Application Protocol (for example as used to access the Internet from

a mobile phone)

(Web) portal: A site that is interactive with users; and positions as an entrance or

links to other sites on the internet.

9
CHAPTER TWO

2.0 Literature Review


2.1 Introduction
The previous chapter provided the background to this dissertation. This chapter

reviews earlier studies relevant to the present study in public and e-libraries. The

literature which have bearing on the present day study are herein cited. The aim of

this chapter is to provide relevant literature on mobile alert messaging systems and

related topics relevant to the study.

Topics discussed here includes: Firstly, a review of literature that is concerned with

Nigeria population and unemployment; Secondly, a review describing mobile

technological development; Thirdly, a review of the alert technology, and, benefits of

mobile alert information and text messaging (to job seeking); Fourthly, a review of

information systems and types; and lastly, a review of database management

systems and categories.

2.1 Nigeria and Population Projections

The United Nations estimates that the population in 2005 was at 141 million,

whereas, the United States Census Bureau projects that population of Nigeria will

reach 264 million by 2050. Nigeria will then be the 8th most populous country in the

world. Thus, Nigeria inclines towards population explosion.

2.1.1 Age structure

The population projections highlighted in the study conducted by Felix (2006), listed

Nigeria‟s age structure: 0–14 years: 44% (male 27,181,020; female 26,872,317)

10
15–64 years: 53% (male 33,495,794; female 32,337,193)

65 years and over: 3% (male 1,729,149; female 1,722,349).

2.1.2 Nigeria and Unemployment

Unemployment in Nigeria is one of the most critical problems the country is facing.

Nigeria is endowed with diverse and infinite resources, both human and material.

However, years of negligence and adverse policies have led to the under-utilization

of these resources. These resources have not been effectively utilized in order to

yield maximum economic benefits. This is one of the primary causes of

unemployment and poverty in Nigeria (economywatch, 2010).

According to Akinboyo, 1987 and Raheem, 1993 as referred to by Obadan and

Odusola (1999) unemployment has been categorized as one of the serious

impediments to social progress. Apart from representing a colossal waste of a

country's manpower resources, it generates welfare loss in terms of lower output

thereby leading to lower income and well-being, and particularly in Nigeria (Oladeji,

1994 and Umo, 1996).

The World Bank reported the GDP at purchasing power parity of Nigeria was $170.7

billion during 2005. Unemployment in Nigeria is a major problem both economically

and socially. Unemployment in Nigeria has resulted in more and more people who

do not have purchasing power. Less consumption has led to lower production and

economic growth has been hampered. Unemployment also has social consequences

as it increases the rate of crime. The secondary-school graduates consist of the

principal fraction of the unemployed accounting for nearly 35% to 50%. The rate of

11
unemployment within the age group of 20 to 24 years is 40 %. Underemployed farm

labour, also referred as disguised unemployed, makes the rural unemployment

figures less accurate than those for urban unemployment.

Almost 2/3 of the unemployed rural population is secondary-school graduates

(economywatch.com, 2010). As pointed out by Umo (1996), an annual average of

about 2.8 million fresh graduates enter the Nigerian labour market, with only about

10 percent of them getting employment. This, no doubt, portrays unemployment as a

very serious problem in the country.

Economic growth is not the only solution to curb unemployment in Nigeria, as the

official statistics illustrate that previously unemployment did not always decline with

the economic growth. Other solutions such as the provision of right skills to the

people to help them tackle the problem and lead a more prosperous life should also

be given importance. Recently the experts have suggested some techniques, which

can play an important role in curbing Unemployment in Nigeria. These include –

Setting up of provisional work agencies, which provides (recruitment) temporary staff

to small companies (Economywatch, 2010).

Alanana (2003) argued in his paper that youth unemployment is potentially

dangerous as it sends disturbing signal to all segments of the Nigerian Society. The

rate of youth unemployment in Nigeria is high, even at the period of economic

normalcy i.e. the oil boom of the 1970s (6.2%); 1980s (9.8%) and the 1990s (11.5%).

Youth play a central role in the overall survival of Nigeria.

The paper suggests measures for reducing unemployment, but the question

12
remains: how shall Nigeria ensure full employment for its populations and how will

they become aware of information to job leads even in their remotest places?

The paper further sees hope for Nigeria only if youths are mobilized by way of

genuinely socializing them into taking their roles in the employment (recruitment)

system. The development in ICTs in today‟s modern societies is a driving platform

for socializing and disseminating up-to-date information for the unemployed.

2.2 Mobile Technology Development: A view from the developed world

Phones are now the dominant technology with which young people, and urban

youth in particular, now define themselves (The Economist, 2004a).

The mobile phone has rapidly become an integral part of our lives. In many countries

more than half the population uses a mobile phone and, in some developing

economies, mobiles are often people‟s only means of telecommunication. Sir

Christopher Gent cited in Vodafone CSR Report (2003).

The mobile phone dominates our lives. It is more than just a „must have‟ item in

developed, western countries. To many young people, it has become a fashion item.

Uptake in more established markets has now reached saturation point; there are

currently more than 51 million users in the UK (BBC News Online, 2003b). While the

demand for mobile phones seems to be insatiable, it is after all only a technology;

Banks and Burge (2004) emphasize that mobile phones and other ICTs are only

tools, and not a solution in themselves to the problems encountered in the

development arenas such as information divide.

It is equally important to realize that mobile phone applications in the developed

13
world can be adapted to the developing world, and vice-versa, providing there is

commitment, resources, and involvement of local partners. In Europe, there are

projects underway, or being piloted, that use mobile phone technology to support

socioeconomic development and environmental activities (Banks and Burge, 2004).

In this respect, ICTs should be seen as tools of wider strategies, which aim to

rescue from threats to the environment, as well as information divide. There are

always going to be more pressing needs for its use. Nevertheless, it is a technology

that has the potential to have a positive impact in society.

2.2.1 Nigeria and Telecommunications developments

Mobile phone technology is developing at an extraordinarily rapid pace and is being

applied to an increasingly wide range of human activities and the environment in

which we live. It brings both benefits and challenges. This study looks at the

applications of mobile phone technology on development initiatives for accessing

relevant information from sources to users without expending much time and efforts

i.e. 'doing more with less' in the developing world. It takes into account the

integration between mobile phones and other Information and Communication

Technologies (ICTs), this is a unique way in which mobile phones play a role in the

digital divide challenge (Banks and Burge, 2004).

According to Hall (2003) Africans‟ insatiable appetite for cell (mobile) phones has

made the continent a profitable market for the high-tech gadgets, which were

introduced only a decade ago. But in the intervening ten years, the sales figures

have masked a larger social story: how the proliferation of cell phones is changing

Africans‟ relationships with one another.

14
Ndukwe (2009) corroborated the claim that major advances in ICTs and the rapid

growth of global digital telephony networks services have transformed businesses.

They have also empowered individuals and communities with new ways of doing

things, as well as transformed our ways of learning and sharing knowledge. The

digital revolution has progressed to usher in an advanced phase of the information

age with computer solutions that enable resources and information sharing even on

a worldwide basis. The interconnection of computers, based on the internet protocol,

has brought about greater efficiency and better information sharing and

management. This revolution also means that constraints of time and distance have

been virtually eliminated. Clearly, ICT is driving the global economy. People,

businesses and communities with ready access to information technologies are

better equipped to participate actively in the global economy.

In Nigeria, about 68 million telephone lines connected by July 2009. When compared

to a total subscriber level of less than 0.5M in July 2001. The rapid rate of

deployment means faster access to telecommunications facilities and consequently

a faster pace of national economic development and growth. Today there are mobile

signals in all the states of the federation; a number of our major highways are

covered by mobile services; several rural communities have access to one form of

telecom service or the other; the Nigerian economy has been impacted positively

through job creation, improved business performance, and timely information

exchange (Ndukwe, 2009).

In the paper Ndukwe (2009) elicited two major technologies, digital mobile phones

15
and the internet are driving a new level of connectivity that were hitherto unknown

and are enabling various transactions to be carried out over high capacity modern

networks on an anywhere, anytime basis. The content flowing over such modern

networks includes not only e-mails and telephone calls, but also music, movies and

SMS, demanding huge amounts of bandwidth. Broadband enables us to use one

universal network to support any and all media. The mobility and freedom offered by

wireless networks cuts the communications cords tying us to specific locations. Our

ability to economically deliver broadband to locations not connected by fixed wires in

locations such as remote villages, means the network can finally go wherever it‟s

needed. The anywhere network is a seamless network with broadband capacity and

wireless ubiquity.

From above, it suffices to say that the impact of mobile phones has possibly been

more profound in developing countries that have had poor telecommunications

infrastructure. To an extent, mobiles are „leapfrogging‟ the technological gap

between the developed and developing world.

Gent (2003) submitted the mobile phone has rapidly become an integral part of our

lives. In many countries more than half the population uses a mobile phone and, in

some developing economies, mobiles are often people‟s only means of

telecommunication.

ValueFrontera (2009) found Nigeria in her survey as Africa‟s largest telecom market

with active subscribers of over 65.3 million in mid 2009 surpassing South Africa‟s

45million subscribers; in the past eight years, the telecommunications sector in

Nigeria has grown at the fastest rate; between 1997 and 2000 subscribership hit

about 1 million before the issuance of (GSM) unified license in 2001; While GSM

16
subscribers are in the range of 58.3 million, CDMA subscription in Nigeria grew from

just 380,000 in 2007 to more than 7 million in 2009.

With mobile penetration at 42%, Nigeria‟s tele-density grew from 0.73% in 2001 to

about 48% in mid 2009; the current market installed capacity is 120.92 million

(ValueFrontera, 2009).

2.3 Mobile Alert Technology Developments

Naismith et al., (2006, p.3) had noted that,

“The whole world is going mobile. Phones, computers and media devices now

fit in our pockets and can connect us to a variety of information sources and

enable communication nearly everywhere we go. There is considerable

interest in exploiting the almost universal appeal and abundance of these

technologies for their appropriate use”.

Mobile technologies are a familiar part of our social lives the world over today. We

take it for granted that we can talk to other people at any time, from wherever we

may be; we are beginning to see it as normal that we can access information, take

photographs, record our thoughts with mobile telecommunication devices, and that

we can share these with our friends, colleagues or the wider world. Newer

developments in mobile phone technology are also beginning to offer the potential

for rich multimedia experiences and for location-specific resources (Naismith L. et

al., 2006).

The challenge for designers, however, is one of understanding and exploring how

best we might use these resources to support information needs. At the present

time, however, mobile communication applications are being developed and used for

17
diverse purposes such as: learning. This study seeks to look at developments in the

area of instant messaging for job seekers. It moves away from the dominant view of

mobile messaging for social, or other interpersonal activity to explore mobile

application as a rich, collaborative and conversational experience, whether in

classrooms, homes or the streets of a city. It asks how we might draw on existing

theories of learning to help us evaluate the most relevant applications of mobile

technologies in informative activities. It describes outstanding projects currently

under development and in use around the world and it explores what the future might

hold for using mobile technologies (Naismith L. et al., 2006).

In their research work on alert system for hospital information management in India,

Razdan and Cheema (2009) found out that, in a hospital there are numerous

situations where the health provider needs to be alerted so as to take some action.

When such a situation is detected by an automation system, an alert is triggered,

and responsible or concerned parties are identified and informed immediately. Using

alert system, we can create and manage tasks as well as send and receive

corresponding alerts. These alerts can be reminders to accomplish a task, meet a

deadline or perform some corrective action.

Alert system forms an integral part of a hospital management information system

(HMIS). Integrated alert management in heath care applications provides an

effective decision support mechanism. It provides the vital communication between

application and end-users. There are various methods to generate the alerts such as

manual alerts, event based alerts, and automatic alerts using communication modes

like e-mail, mobile and application window. In a hospital there are various critical

18
conditions where alerts need to be sounded. Typical example of these types of

conditions are alerting about notifiable diseases like dengue. Another area of

relevance is providing alerts for enabling decision support. Examples include various

alerts which inform a clinician about allergy, history, drug dosage, etc. There are also

administrative alerts which need to be sent to higher authority for monitoring

purposes like work progress of various user groups, informing about a delay in an

important task, etc.

Basically alert is a message about the state of the system that needs immediate

attention. Some observers highlight that many countries across the African continent

that is now „leapfrogging‟ older technologies, mobile phones and other wireless

technologies are often the preferred options (AllAfrica.com, May 2010). Their impact

has been felt across the board, no less so in rural areas:

"Farmers are using mobile phones to ensure the best prices for their crops,

small-scale entrepreneurs are contacting potential clients, and grandparents

are talking to their children and grandchildren hundreds of kilometers away"

IDRC (2003a).

The Federal Emergency Management Agency (FEMA), aggregates alerts from the

president of the United States, the National Weather Service (NWS), and state and

local emergency operations centers, and then send the alerts over a secure interface

to participating wireless providers. These participating wireless providers will then

distribute the alerts to their customers.

In America for instance, alerts are classified in three categories:

 Presidential Alerts – Alerts for all Americans related to national

19
emergencies, such as terrorist attacks, that will preempt any other pending

alerts;

 Imminent Threat Alerts – Alerts with information on emergencies, such as

hurricanes or tornadoes, where life or property is at risk, the event is likely to

occur, and some responsive action should be taken; and

 Child Abduction Emergency/AMBER Alerts – Alerts related to missing or

endangered children due to an abduction or runaway situation (FCC, 2010).

Therefore, it is important to recognize that mobile phone innovations in the

developed world in support of developmental, environmental and conservation needs

could easily be adapted in the rest of the world, specifically Nigeria.

Georgia Tech‟s Wireless Emergency Communications project researchers tested

the Federal Communications Commission‟s (FCC) Commercial Mobil Alert System

to see how well it met the needs of people with vision and hearing impairments. They

found the following:

• Although 90 percent of participants who are blind or have low vision found the

alert attention signal to be loud enough and long enough to get their attention, only

70 percent of deaf and hard of hearing participants indicated the same regarding the

vibrating cadence. Comments regarding the vibrating cadence suggested that it

would only be effective if the individual were holding the phone in their hand, but

easily missed if in a purse or even in one‟s pocket.

• All hearing participants expressed concern that the early part of the message

was missed because the tone went too quickly into the 90-character spoken alert,

causing the first few words of the message to be missed. The required Commercial

20
Mobile Alert System message format places the event type first (i.e., tornado, flood,

vacancies, etc.) so crucial information may not be heard by blind consumers using

text-to-speech software on their mobile phones to access the alerts. Many suggested

the need for a header such as “This is a…” to allow for more clarity. Such a header is

currently employed by the Emergency Alert System (EAS) messages broadcast on

television, radio and cable systems (even in Nigeria).

• Deaf and hard of hearing participants commented that they would like to see

enhancements such as screen flashes and stronger vibrating cadences. These

enhancements can be addressed by cell phone manufacturers, although, they aren‟t

required to do so by the industry standard (Meldung, 2008).

2.3.1 Mobile Text Messaging in Information Dissemination and Public Alert

According to Sponberg (2009) a lot has been written about the use of cellular text

messaging (SMS) as a viable tool to distribute (hazard) alerts or similarly important

messages to the public. Major disasters such as Katrina and the Indian Ocean

tsunami have stimulated this discussion among government, NGO, and commercial

entities alike. Several countries have very advanced systems relying on cell

broadcast, while others are still testing and struggling to determine how best to

implement mobile messaging systems at both the local and national level. Similarly,

many humanitarian non-profits organizations are using SMS to pass messages

within their organization and to communities in which they work, and some

commercial services are even available to provide subscribers with custom alerts on

varying types.

21
SMS alert system sends notifications to key individuals when the offficial channel

releases a message. Hence, the program is 'watching' for alerts, and in so doing it

provides a basic notification service. The full text of the messages from the offficial

channel cannot be squeezed into the size of a single SMS, so the service is really

intended as a 'heads up' notification to let recipients know that more information is

available through official channels.

The important thing about this service is that the provider targets only contacts who

are officially involved with its service(s). This limitation is self-imposed for a number

of reasons; technical and non-technical. Most technical reasons relate to the cost

and reliability of reaching more than a few hundred individuals in a timely manner.

From a non-technical perspective, the goal of provider is to empower similar entities

by improving communication capabilities. Similarly, the guidance for the massage is

publicly available through its official channel, for instance, a website, meant for

recipients consumption.

The technology used in such alert systems often contains some form of source

verification or a confirmation channel to maintain the overall network (and

information) integrity. The lack of such a confirmation channel within SMS alert

systems is of primary concern. While one can set up a short code, establish a

dedicated number, or even apply a name to the warning authority (in essence

creating a recognizable 'from address'), it seems highly unlikely that most individuals

will know or confirm the sender of information. This is particularly true when an SMS

alert system is used for the general public rather than a closed group or 'club' of

individuals. Unfortunately, this leaves the possibility of faking messages or

22
circulating rumors open. There are numerous anecdotes of rumors being

disseminated via SMS.

It might be argued that because mobile devices are hyper-local (literally held by an

individual) the message sent to each device can be highly targeted geographically

and in terms of content. This is certainly true, and as location based services

increase, so too will these possibilities. However, the reality is that most warning

messages for instance produced by government authorities simply are not this

specific or detailed enough. This limitation may be due to scientific barriers to

provide more detailed information, limits in operational capacity, or even relate to

legally defined roles. Even in the most scientifically and technically advanced

weather services, messages often apply to large regions of a State / Province. Of

course a lot will depend upon the geographic scope of the hazard in question.

Inherently a tornado or localized flash flood message can be more targeted than say

a message regarding a tropical cyclone or tele-tsunami; elections or voters.

2.3.2 Does SMS have a role in Alert and Notification systems?

According to Sponberg (2009) the short answer to this question is yes. As one of

the most pervasive and fastest growing means of connectivity, mobile services (SMS

and other) represent a valuable and powerful tool to quickly disseminate information

to selected groups of individuals and even the public at large. Moreover, mobile

devices are changing expectations on how information is received. Inherently a

mobile phone is an intimate device; even more so than a personal computer one

might use at work or at home. It is reasonable to assume that mobile devices change

the expectation of how information services work. Through a mobile phone,

23
individuals do not expect to seek out information, but rather expect that information

to seek them out. So, not only does mobile text messaging have a role to play in

alert and notification services, the weather services and related authorities provide

their information over these networks.

That said there are some clear limitations that need to be managed and addressed

such as choice of platforms, character limitations, delivery failure, network and

message centers issues. The technical issues improve as network capacities

improve. Warning systems for instance work best when information is disseminated

through multiple platforms and media. Mobile phones represent one of such

platforms. And as noted, issues of security and maintaining trust are best addressed

through dialog and education. This is perhaps not unique to mobile services, but a

necessary part of any end-to-end information dissemination chain (Sponberg, 2009).

2.3.3 Potential Text Messages

Below are several sample messages from a text message alert provider (TCNJ,

http://www.tcnj.edu/pa/critical/textalerts.html) that could be distributed under

appropriate circumstances. The actual message sent in a given situation may vary.

Due to the character limitations associated with text-messaging TCNJ alerts will

frequently direct recipients to another communication channel (TCNJ home page or

e-mail) for more complete information. These sources may not be updated as rapidly

as the text message is delivered, but information is posted or sent as quickly as

possible.

Sample Messages:

24
 TCNJ weather closing. All classes canceled and offices closed today. Visit

www.tcnj.edu for details soon.

 Inclement weather has caused a delayed opening today at TCNJ. Visit

www.tcnj.edu for details soon.

 TCNJ facility closure - (insert facility name here). TCNJ e-mail will provide

details soon.

 TCNJ timely warning of criminal activity. TCNJ e-mail will provide details

soon.

 TCNJ Emergency Alert – Stay away from (insert location here). Visit

www.tcnj.edu for details soon.

 TCNJ Emergency – Potentially dangerous situation on campus. Remain in or

proceed to secure location until further notice.

 TCNJ Emergency Alert – Potential danger has subsided. Visit www.tcnj.edu

or check TCNJ e-mail for more details soon.

The messages as seen from samples above will be very brief and contain vital and

immediate information. More information will be made available through other

communication channels, such as e-mail, Web pages to be created for the purpose

of this study.

2.4 Information System and Types

A review of literature reveals several ways to assess information systems.

According to Beynon-Davies P. (2002) the term information system (IS) sometimes

refers to a system of persons, data records and activities that process the data and

information in an organization, and it includes the organization's manual and

25
automated processes. Computer-based information systems are the field of study for

information technology, elements of which are sometimes called an "information

system".

The concept of Information systems was brought home also by Tiamiyu (2005,

p.67) who noted that Information systems are mechanisms or facilities through

which one or more information activities are performed to satisfy the information and

information processing needs of people or organization.

In similar perspective, Ehikhamenor (2005, p.113) exemplifies information systems

while submitting that it is any system that processes information by the collection of

interrelated and interacting entities intended to meet defined objectives. Information

has emerged as an agent of integration and the enabler of new competitiveness for

today's enterprise in the global marketplace (Dazzler Dude, 2006).

Information Systems is the only discipline with a primary focus to study the

applications of technology by organizations and society; a system that collects and

maintains information and provides it to people (www.thecomputerfolks.com/i.htm),

and likewise Betts (2007) corroborates our various definitions by representing

Information systems as computer systems that support end users, giving them

access to the information. For a large number of systems the information is held in

databases and access is via database management systems. Information systems

perform a variety of tasks. While all of the information processes are represented in

information systems, the emphasis in this study is on the processes or organizing,

storing and retrieving with database systems and hypermedia.

26
Allen Lee tries to distinguish information systems from other disciplines without

presenting too narrow a view. He argues that the IS discipline is distinct in that it:

examines more than just the technological system, or just the social system, or even

the two side by side; in addition it investigates the phenomena that emerge when the

two interact (Lee, 2001, p. iii).

As Lee points out: „This embodies both a research perspective and a subject matter

that differentiate the academic field of information systems from other disciplines‟

(Lee, 2001, p. iii). For the purpose of this study, the term information system will be

defined in line with the definition of Garber (1994). To him, information system

meant,

“Any organized combination of people, hardware, software communications,

networks or data resources that stores, retrieves, transform and disseminates

information in any organization".

He tries to distinguish between Information system and Information technology. The

former as: all components and resources necessary to deliver information and

information processing functions to the organization; and the latter as: various

hardware components necessary for the system to operate such as computer

hardware technology. This includes

 micro computers, mid-size servers, large mainframe systems, the input, the

outputs & the storage devices that support them.

Computer software technology includes:

27
 Operating system software‟s, web browsers, software productivity suites and

software for business applications like customer relationship management

and supply chain.

Telecommunications network technology includes:

 Telecommunications media, processors and software needed to provide wire

based and wireless access and support for the internet and private internet

based networks.

Data resource management technology includes:

 Database management system software for the developing, access, and

maintenance of the database of an organization.

Information system in this research work is the means by which people and

organizations utilize hardware, software, networks and a data resource that stores,

retrieves process and disseminates information to recipients or users. Thus, in

consonance with Gleim (2006) the system design would be able to perform the

following four major functional tasks:

1. Input. The system must be able to capture data.

2. Transformation. Data are converted into knowledge useful for decision making

(information).

3. Output. The ultimate purpose of the system is communication of results to

internal or external users, and

4. Storage. Before, during and after processing, data must be temporarily or

permanently stored, for example, in file or databases.

28
2.4.1 Types of Information Systems

Organizations and individuals use different types of systems for different purposes.

Here are some of the main types of information systems and their uses. Bearing in

mind from our various definitions the components of information systems are:

people, equipment, procedures, and data. The main ones highlighted in this work

agreeing with the classifications of Kelly (2008) are TPS, MIS, DSS, and EIS.

1. Transaction processing system (TPS): A TPS collects and stores information

about transactions, and controls some aspects of transactions. A transaction

is an event of interest to the organization. E.g. a sale at a store.

A TPS is a basic (business) system. It:

 is often tied to other systems such as the inventory system which tracks stock

supplies and triggers reordering when stocks get low;

 serves the most elementary day-to-day activities of an organisation;

 supports the operational level of the business;

 supplies data for higher-level management decisions (e.g. MIS, EIS);

 is often critical to survival of the organisation;

 mostly for predefined, structured tasks;

 can have strategic consequences (eg airline reservation system);

 usually has high volumes of input and output;

 provides data which is summarised into information by systems used by

higher levels of management.

On-line transaction processing: A transaction processing mode in which transactions

entered on-line are immediately processed by the CPU.

29
Sub-Type of TPS:

i. Manufacturing and production systems

ii. Sales and Marketing systems

iii. Finance & Accounting Systems

iv. Human Resources System: Systems that deal with recruitment, placement,

performance evaluation, compensation, and career development of the firm's

employees.

2. Decision support system (DSS):

It helps strategic management staff (often senior managers) make decisions

by providing information, models, or analysis tools. For support of semi-

structured and unstructured decisions (structured decisions can be

automated). It is used for analytical work, rather than general office

support.They are flexible, adaptable and quick. The user controls inputs and

outputs. They support the decision process and often are sophisticated

modelling tools so managers can make simulations and predictions.

Their inputs are aggregate data, and they produce projections. An example

job for a DSS would be a 5 year operating plan.

3. Management information system (MIS) :

Condenses and converts TPS data into information for monitoring

performance and managing an organisation. Transactions recorded in a TPS

are analyzed and reported by an MIS. They have large quantities of input data

and they produce summary reports as output. Used by middle managers. An

example is an annual budgeting system.

30
4. Executive information system (EIS):

Also known as an Executive Support System (ESS), it provides executives

information in a readily accessible, interactive format. They are a form of MIS

intended for top-level executive use. An EIS/ESS usually allows summary

over the entire organisation and also allows drilling down to specific levels of

detail. They also use data produced by the ground-level TPS so the

executives can gain an overview of the entire organisation.

Used by top level (strategic) management. They are designed to the

individual. They let the CEO of an organisation tie in to all levels of the

organisation. They are very expensive to run and require extensive staff

support to operate.

5. Office automation system (OAS) :

OAS provides individual‟s effective ways to process personal and

organisational data, perform calculations, and create documents. e.g. word

processing, spreadsheets, file managers, personal calendars, presentation

packages.

They are used for increasing personal productivity and reducing "paper

warfare". OAS software tools are often integrated (e.g. Word processor can

import a graph from a spreadsheet) and designed for easy operation.

OAS Subtypes:

31
Communication systems: helps people work together by sharing information in many

different forms Teleconferencing (including audio conferencing, computer

conferencing, videoconferencing), electronic mail, voice mail, and fax

Groupware system: helps teams work together by providing access to team data,

structuring communication, and making it easier to schedule meetings. For sharing

information, controlling work flows, communication/integration of work

6. Knowledge work systems (KWS): are used by technical staff. KWS use

modelling functions to convert design specifications into graphical designs.

They may include computer-aided design/manufacture (CAD/CAM).

(Kelly, 2008). http://www.vceit.com//systems/infosystemtypes.htm

2.4.2 Human Resources Information System (HRIS)

Given the avalanche of challenges facing job seeking and recruitment world over, it

is important for this study to take a quick review of the concept of world-class

recruitment approach in Nigeria developing economy.

The Human Resource Information System (HRIS) is a software or online solution for

the data entry, data tracking, and data information needs of the Human Resources,

management, within an organization or business. This is commonly in form of a data

base. Every HRIS has different capabilities. HRIS are carefully based on the

capabilities of the organization.

Typically, a well designed Human Resource Information Systems (HRIS) provide

overall:

• Management of all employee information.

32
• Reporting and analysis of employee information.

• Organization-related documents such as employee handbooks,

emergency evacuation procedures, and safety guidelines.

• Benefits administration including enrollment, status changes, and personal

information updating.

• Complete integration with payroll and other organization financial software

and accounting systems.

• Applicant and resume management.

An effective HRIS provides information on just about anything the organization

needs to track and analyze about employees, former employees, and applicants.

Organizations need to customize a Human Resources Information System to meet

its needs.

With an appropriate HRIS, human resources staff enables employees to do their own

benefits updates and address changes, thus freeing HR staff for more strategic

functions. Additionally, data necessary for employee management, knowledge

development, career growth and development, and equal treatment is facilitated.

Finally, managers can access the information they need to legally, ethically, and

effectively support the success of their reporting employees (Heatfield, 2008).

The website as an information system having components of human resources

management and database management to make available job lead and other

related information, users may now obtain information about vacancies, recruitment

statistics and profile management. The system offers users the opportunity to get

complete information about the flow of information. The information provided, which

33
is categorized in a unified and simple format, includes the categories of career fields,

available positions and recruiting organizations.

This unique channel draws from the knowledge and human resources management

strategy by increasing awareness and providing accurate and up-to-date information

to job seekers, organizations, researchers and others regarding various information

needs, and as part of efforts to improve interaction and communication with job

employers and employees. This will assist in achieving timeliness demanded by the

modern business society; and this will not confine information acquisition to a certain

time, but would rather make it available 24/7.

It will also promote informative integration among seekers, and will decrease the

percentage of error as a result of the reliance on paper based advertisement system

or channel instead of on multi-channel. it will also expand what is being made

available to researchers because they will now be able to obtain an unrestrained

number of data reports.

2.4.3 Applications of information systems

Designing an information system that can deliver on time and speed efficiencies to

job seekers using information technology as a vehicle is strategic and will satisfy the

objective of channeling job information to seekers through mobile phone by short

message service (SMS) facility and other information channels, in this instance, a

web site which will form the informational resource and biggest asset for the whole

system. This is necessary because today`s global (business) environment is

dynamic.

34
In the post-industrial information age, the focus of companies has shifted from being

product-oriented to knowledge-oriented in the sense that market operators today

compete in process and innovation rather than in products: the emphasis has shifted

from the quality and quantity of production to the production process itself--and the

services that accompany the production process. The study of information systems

focus on why and how technology can be put into best use to serve the information

flow within an organization. It is thus concerned with the purposeful utilization of

information technology.

Information Systems and Computer Applications involve the following components:

Information Systems and Office Application Software in Organizations

• Standard office suite tools (word processors, spreadsheets, presentation

packages, end-user database packages)

• Basic user functions of a desktop operating system

• Office systems (electronic mail, conferencing, cooperative work environments)

• Web browsers

• Internet and other online services and methods (World Wide Web, FTP, Web

search engines,)

• Specialized systems (statistical analysis, expert systems, DSS, GIS)

• Electronic Data Interchange

• Enterprise-wide systems (ERP, CRM, SCM)

a) Hardware and Systems Technology

• Devices for processing, storage, input and output, telecommunications, and

networking

35
• Functions performed by computer, telecommunications, and network

hardware

• Digital representation of data for storage and processing (numeric, text,

images, audio, video)

• Concepts of local, wide-area, and enterprise network architectures

• Concept of client/server architectures

• Operating system and network operating system functions and architectures

• Wireless computing/communication devices (cellular, satellite devices, PDA,

GPS)

b) Information Systems Development

• Systems development life cycle concepts

• Project management functions and roles

• User interface design

• Development and purpose of standards

c) Data Management Concepts

• Data concepts, types, and structures

• Database management systems

• Web technologies (HTML, XML)

• Web page development (analysis and design)

• Data warehousing and data mining

d) Social, and Ethical Implications and Issues

 Privacy concerns

36
 Intellectual property rights and legal issues, including open source initiatives

 Effects of information technology on careers (ergonomics, virtual teams,

telecommuting, job design)

 Impact of technology on careers (globalization, outsourcing, insourcing)

 Careers in information systems and information technology

 Knowledge management

 System, application, and personal computer security and controls (The

College Board, 2010).

2.5 Database Management System

Database design is essential to the study due to the fact that the web pages of the

website serving as detailed information channel feeding the server / device

disseminating messages to phones SMS facility for recipients will contain information

that would be housed in a database file.

According to Borysowich (2007) there are two approaches to data storage:

 File-based,

 Database.

For the purpose of this study, database approach is chosen over file based due to

the fact that:

1. Updates to files system may result in inconsistent data.

2. A file-based data storage approach makes it difficult for other applications to

access data not owned by their application. Data owned by other applications may

be stored in a format not consistent with the retrieval capabilities of another

application.

37
3. File-based approaches to data storage are tied to applications rather than the

entities to which the files refer. File-based approaches do not recognize

relationships between entities until such information is needed by an application

(Borysowich, 2007).

2.5.1 Database Approaches

Borysowich (2007) argues that database approaches to data storage support the

sharing of data across multiple applications with multiple users. Databases are

structured in a way that is meaningful to an organization. For example, if an

organization maintains information on suppliers and the geographic areas they

service, there would be a link in the database between the suppliers and geographic

areas.

A Database Management System (DBMS) is the software that handles all database

accesses. A DBMS presents a logical view of the data to the users. It hides how

data is stored and retrieved from the users. A DBMS ensures that the data is

consistent across the database and controls who can access what data (Borysowich,

2007). The main categories of Database Management Systems are:

1. Hierarchical Databases

2. Network Databases

3. Relational Databases

Ramakrishnan and Gehrke (ISBN: 0-07-246535-2) describe a relational database as

a collection of data, describing the activities of one or more related organisations.

38
The relational model for databases provides the basic DBMS characteristics. In

addition, an RDBMS also conforms to Codd‟s model.

2.5.2 Relational Database Characteristics

Codd established 12 rules to which a DBMS must conform to be considered

relational. DBMSs vary in the way in which they comply with these rules; however,

commercial relational databases generally conform to these rules.

Strengths of RDBMS

 Flexible and well-established.

 Sound theoretical foundation and use over many years has resulted in stable,

standardized products available.

 Standard data access language through SQL.

 Costs and risks associated with large development efforts and with large

databases are well understood.

 The fundamental structure, i.e., a table, is easily understood and the design

and normalization process is well defined.

2.5.3 Conclusion

Until recently, jobs searching were not a very easy task. People have to check

newspapers everyday or weekly. Now with the blessings of the Internet technology,

many job sites are giving services to the job seekers (through emailing) from which

they can find job news easily. It‟s now the era of job search online. We can easily

find part time or full time jobs by visiting different job sites of different countries. In

Nigeria we have some sites from where we can easily find our suitable jobs. Many

39
developed countries like UK, and USA and so many have developed their sites for

mobile users.

Considering the rate of technological innovation adoption in Nigeria, alert messaging

system has been established as a strategic medium to quickly channel information

about vacancies and interviews to job seekers via web platforms. The proliferation of

mobile phones with SMS facility would make the service useable by large number of

job seekers.

The technology development and support will enable access to relevant information

from sources without expending much time and efforts

Finally, using SMS for alert has been in use in other parts of the world. So, it is

reasonable to adopt and apply it in Nigeria

In a Malaysian web site named www.jobsmobile.com where a person can easily find

jobs, get Short Message Service (SMS) alert for new jobs, get confirmation SMS

from the sites. Hence user no longer needs to go through difficulties when using the

service. Our country has many job sites but like other developing countries these

sites are not introduced to the SMS facility.

40
CHAPTER THREE

3.0 System Analysis

3.1 Introduction

Our main target is giving SMS facilities to job seekers so that no one misses any

opportunities. Now mobile is a very available handy device to everyone. This study

introduces new features from where applicants easily get the updated information

through cell phones. This system is developed for all job types. It has also the

facilities to submit jobs from any part of the country because the web aspect is

internet driven.

Literature have revealed that SMS messages can be sent and read at any time,

SMS messages can be sent to an offline mobile phone, SMS messaging is less

disturbing while you can still stay in touch, and, SMS messages are supported by

100% GSM mobile phones and they can be exchanged between different wireless

carriers.

Initial Setup of the System requires applicant‟s registration. An applicant must be a

valid member and for that he has to fill up resume forms on the web interface

developed for that purpose.

Companies or Employers need to be registered to post jobs on the site.SMS server

must be on for 24 hours. This server always searches for job updates. Job posting

process requires employer authentication.

An employer must be registered before posting for new jobs. For that the company

has to have agreement procedures fulfilled in order to use the web site. As a result,

this chapter discusses the methods used in the design. Topics covered include:

41
system analysis, method of data collection, design approach, problem of existing

system, feasibility study and, method of testing.

Several literature have shown that unemployment in Nigeria is a major hindrance to

social progress, as it represents a huge waste of the country's manpower resources

(Obadan and Odusola, 1999; Oladeji, 1994; Umo, 1996).

3.2 System Analysis

According to Semprevivo (1982) the process of studying the network of interactions

within an organization and assisting in the development of new and improved

methods for performing necessary work is referred to as system analysis.

System analysis gives insight into the framework of a system. The major

components are:

1. Input,

2. Process and,

3. Output

When the information is taken in as input, it processes the information, stores it and

gives it as output which is called information. A system that process information is

called information system. E.g., web site, database management system, SMS

center. The Information system type adopted in this study is the information

providing system.

Structured system analysis and design method (SSADM) was modeled in this study.

Structured system analysis and design method is a systems approach to the

analysis and design of information systems. SSADM was produced for the central

42
computer and telecommunications agency (now Office of Government Commerce), a

UK government office concerned with the use of technology in government, from

1980 onwards.

SSADM is a waterfall method by which an Information System design can be arrived

at. SSADM can be thought to represent a pinnacle of the rigorous document-led

approach to system design.

SSADM is one particular implementation and builds on the work of different schools

of structured analysis and development methods, such as Peter Checkland's Soft

systems methodology, Larry Constantine's Structured Design, Edward Yourdon's

Yourdon Structured Method, Michael A. Jackson's Jackson Structured Programming,

and Tom DeMarco's Structured Analysis.

3.2 Methods of Data Collection

In order to carry out an in-depth investigation of the existing system, the following

data collection methods were adopted:

3.2.1 Interview Method:

Graduate job applicants were interviewed on the constraints and the current mode of

obtaining information on job leads. The aim of this interview was not to document the

outcome, but to have a good understanding of the current system / method, its

operations, effectiveness and constraints. Their responses served as a good source

of information for designing the new system.

43
3.2.2 Record inspection:

The review of existing publications on the unemployed in Nigeria was carried out

through review of books and journals. Records included reports of the department of

statistics of employment bureau, online publications, and books.

The inspection / reviews were done side-by-side the interview for better

understanding of the existing system.

3.3 Stages of Design

The Structured system analysis and design method (SSADM) involves the

application of a sequence of analysis, documentation and design tasks concerned

with the following.

Stage 1 - Logical design

The logic design is the starting point of every project. In this design, it is been

planned how the works will be done. All the works are summarized and revised.

Conceptual model was built from existing theoretical model in this section. Our main

concern was to select how to send SMS and what class of alerts should be made to

gain the maximum output. The main areas of activity are the definition of the user

dialogues. These are the main interfaces with which the users will interact with the

system. The logical design specifies the main methods of interaction in terms of

menu structures and command structures.

The other activities are concerned with analyzing the effects of events in updating

the system and the need to make enquiries about the data on the system. Both of

these use the events, function descriptions and effect correspondence diagrams

44
produced in this stage is to determine precisely how to update and read data in a

consistent and secure way.

Stage 2 - Technical system options

This stage is the next towards a physical implementation of the new system. In this

stage a large number of options for the implementation of the system are generated.

This is honed down to two or three to present to the user from which the final option

is chosen or synthesized.

However, the considerations are quite different being:

 the hardware architectures

 the software to use

 the cost of the implementation

 the staffing required

 the physical limitations such as a space occupied by the system

 the distribution including any networks which it may require

 the overall format of the human computer interface

All of these aspects must also conform to any constraints imposed by the business

such as available money and standardization of hardware and software.

The output of this stage is a chosen technical system option.

Stage 3 - Physical design

This is the final stage where all the logical specifications of the system are converted

to descriptions of the system in terms of real hardware and software. The logical

data structure is converted into a physical architecture in terms of database

45
structures. The exact structure of the functions and how they are implemented is

specified. The physical data structure is optimized where necessary to meet size and

performance requirements.

The product is a complete physical design which could tell software engineers how

to build the system in specific details of hardware and software and to the

appropriate standards.

3.4 Design Approach

Existing information systems of similar nature and function were also examined, in

order to glean ideas of design methods and approaches. The design methods were

discussed below.

3.4.1 Database System:

A database is a repository designed for organizing and accessing information

(Donahoo and Speegle, 2005). There has to be a systematic approach to structure

these (usually unstructured) real life data or raw facts in such a way that they would

fit into our highly structured database. Raya Fidel (1987) stated that when the

environment of database is unstructured, the designer would have to rely on

commonsense and intuition to determine the user requirements. To successfully

carry out these task, a data entry form would be designed which would

systematically capture all the relevant information on advertised job positions to suit

the information need of the seeker and easy retrieval , and the bio data of the job

seekers for easy processing.

46
Furthermore, the environment of the database was described to get a full

understanding of data and information contained therein. Computers are especially

adept at managing and quickly accessing information.

Software designed to store, manipulate, and retrieve data in a database is called a

database management system (DBMS). Here, this study focuses exclusively on a

specific (and by far the most common) type of DBMS, the relational DBMS. There

are many relational DBMSs. Fortunately, relational DBMSs speak a common

language called SQL. Using SQL, we can define, manipulate, and query our data.

SQL is divided into three major parts. Data manipulation language (DML) is used to

store and retrieve data from the database. This is the part of SQL used by the most

people. Data description language (DDL) is used to define the structure of the data.

Data control language (DCL) is used to restrict access to data by certain users.

The database system approach adopted for this study was built to support

administrative process, thus analysis of information flow captured from the web

interface and information dissemination to recipients; and, to support decision

making in categorizing job class and selecting suitable candidates for specified job

types with certain criteria.

The goal of this project is not to create a real-time hardware but to use the SMS

application to describe precisely the functionality of the system, such as sending

SMS notification from web to phone making up the proposed information system.

Therefore, the learning of web process/ procedures and web to phone SMS

programming is a must for designing the information system in this project. While,

essential to this study design is to discuss the approach and understanding of

program flow before the implementation.

47
Public library, e-library and the internet were used as sources to identify relevant

materials in previous chapter for the study. A web site developed for the purpose of

this study, tagged "jobs.com" to collect data from users (job seeker) and

organizations (employers). The purpose for the data (e.g. phone numbers) was to be

specific on the category of job alert which individual job seeker desires to receive for

his or her career field. This necessitated job alert recipients to register on the website

listing their phone numbers amongst other bio data details.

3.4.2 Web site and SMS Applications

This chapter was a prelude to actual physical design of the web pages and SMS

application. The design of the web interface was to afford users interface and

interact with detail information about job notifications sent to their phones; and the

description of architecture of the WEB- to- SMS application.

Web site is an information dissemination resource having web pages for targeted

users who have information needs, and capable of getting feedback from users

making it a complete information technology system.

Tools used in describing and designing the system includes: Microsoft (MS) front

page web and notepad editor with HTML 4.01. Hypertext mark-up language (HTML)

is a markup language used for instructing the browser how to present the web

pages. A markup language uses a set of markup tags to describe web pages. A

markup tag is essentially a code that instructs a web browser to format and display

text in a specified manner. HTML was employed because it is compatible with almost

all browsers.

48
HTML code is the major language of the World Wide Web. Web sites and web pages

are written in HTML code. HTML code and the World Wide Web allow text, pictures,

sounds, and other document formats to be used together in the same document. So

any document format can be used on the web pages.

This web site was hosted or published on a client web server to enable users‟

access it simultaneously. A Web server is a computer that runs special software that

"serves" HTML pages and associated files when requested by a client, such as a

Web browser.

The web interface was designed to be interactive and user friendly, having menu

tabs for users to register and manage their profiles, upload / submit resumes. The

pages have job category listings for users to choose types and category of jobs in

which alerts should be sent.

The web site backend and the SMS platform being run on the host computer was

managed by system administrator(s) accessing and managing the web content on

the web server, process the information and subsequently disseminate appropriate

alerts to deserving registrants from the remote server referred to as SMS server

which is in synchrony with the database containing phone numbers and users‟ bio

data given on the web page.

The hardware required is a standalone computer with average speed of 1.90 GHZ

dual core processor and minimum of 512mb RAM, necessary for management and

maintenance of the system. As each part of stages gets done, the hardware and

software will be assembled and followed by the project functionality testing and

validation. In the testing portion, some troubleshooting and rework may need to

make sure the project is working properly.

49
Finally, the mechanical models for the information system will be constructed as

propose.

3.4.3 SMS Model

Short Message Service (SMS) is a technology that enables the sending and

receiving of messages between mobile phones SMS platform and from web to

phone. SMS is the only medium that enables almost instantaneous notification of a

targeted group of people, regardless of their location.

As suggested by the name "Short Message Service", the data that can be held by an

SMS message is very limited. According to Developershome (2010) one SMS

message can contain at most 140 bytes (1120 bits) of data, so one SMS message

can contain up to: 160 characters if 7-bit character encoding is used. (7-bit character

encoding is suitable for encoding Latin characters like English alphabets.) 70

characters if 16-bit Unicode UCS2 character encoding is used. (SMS text messages

containing non-Latin characters like Chinese characters use 16-bit character

encoding.)

SMS text messaging supports languages internationally. It works fine with all

languages supported by Unicode, including Arabic, Chinese, Japanese and Korean.

One major advantage of SMS is that it is supported by 100% GSM mobile phones.

Almost all subscription plans provided by wireless carriers include inexpensive SMS

messaging service. Unlike SMS, mobile technologies such as WAP and mobile Java

are not supported on many old mobile phone models.

50
3.4.4 Concatenated SMS Messages / Long SMS messages

One drawback of the SMS technology is that one SMS message can only carry a

very limited amount of data. To overcome this drawback, an extension called

concatenated SMS (also known as long SMS) was developed. A concatenated SMS

text message can contain more than 160 English characters. Concatenated SMS

works like this: The sender's mobile phone breaks down a long message into smaller

parts and sends each of them as a single SMS message. When these SMS

messages reach the destination, the recipient mobile phone will combine them back

to one long message.

SMS messaging applications ranges from:

a. Person-to-Person Text Messaging;

b. Provision of Information messaging service;

c. Downloading service;

d. Alerts and Notifications;

e. Two-way Interactive Text Messaging Applications.

This study employs SMS alert and notifications service because it is a very suitable

technology for delivering alerts and notifications of important events. This is because

of two reasons:

1. A mobile phone is a device that is carried by its owner most of the time.

Whenever an SMS text message is received, the mobile phone will notify you

by giving out a sound or by vibrating. You can check what the SMS text

message contains immediately.

51
2. SMS technology allows the "push" of information. This is different from the

"pull" model where a device has to poll the server regularly in order to check

whether there is any new information. The "pull" model is less suitable for

alert and notification applications, since it wastes bandwidth and increases

server load.

The alert system used in this study is similar to the Stock Market Alerts which is an

example of alert and notification application. In a stock market alert application, a

program is constantly monitoring and analyzing the stock market. If a certain

condition is satisfied, the program will send a text message to the user's mobile

phone to notify him/her of the situation. For example, you can configure the alert

system such that if the stock price of a company is lower than a certain value or

drops by a certain percentage, it will send an SMS alert to you.

3.4.5 SMS CENTER DESIGN MODEL

An SMS center (SMSC) is responsible for handling the SMS operations of a wireless

network. When an SMS message is sent from a mobile phone, it will reach an SMS

center first. The SMS center then forwards the SMS message towards the

destination. An SMS message may need to pass through more than one network

entity (e.g. SMSC and SMS gateway) before reaching the destination. The main duty

of an SMSC is to route SMS messages and regulate the process. If the recipient is

unavailable (for example, when the mobile phone is switched off), the SMSC will

store the SMS message. It will forward the SMS message when the recipient is

available.

Very often an SMSC is dedicated to handle the SMS traffic of one wireless network.

A network operator usually manages its own SMSC(s) and locates them inside its

52
wireless network system. However, it is possible for a network operator to use a

third-party SMSC that is located outside the wireless network system. This is

applicable to this study design, since the SMS center sends SMS to people

subscribed to different networks; therefore I adopted the transmission process of

Inter-operator SMS Messages.

The transmission of an inter-operator SMS message involves one or more SMS

centers. Generally, there are two different ways for the transmission of inter-operator

SMS messages. In the first way, signaling interconnections are set up between two

wireless networks. When the originator SMS center receives an inter-operator SMS

message, it gets the routing information from the recipient wireless network and

delivers the SMS message to the recipient mobile phone directly. The following

figure illustrates the transmission process:

Fig. 3.1

The first way can be used if the two wireless networks involved in the transmission of

the inter-operator SMS message are based on similar technologies. However, if this

is not true, the second way has to be used. For example, when an SMS message is

sent from a GSM network to a CDMA network.

53
In the second way, the originator SMS center and the recipient SMS center are

interconnected through an SMS gateway or with a communication protocol that is

supported by both SMS centers. The SMS message first reaches the originator SMS

center, which will then forward the SMS message towards the recipient SMS center.

The recipient SMS center will be responsible for sending the SMS message to the

recipient mobile phone and storing the SMS message if the recipient mobile phone is

offline. The following figure illustrates the transmission process:

Fig. 3.2

Source: http://www.developershome.com/sms/

The above framework was modified to the concept below because the application

used in this study works from a web based server and not from a mobile network to

another mobile network SMS messaging.

The model is left with the originator‟s SMSC, the recipient SMSC, and recipient

mobile phone.

54
Fig. 3.3

Originator‟s
SMSC.

SMS Message

Recipient SMS Message Recipient Mobile


SMSC phone

The recipient SMSC refers to individual‟s network operator. The recipient SMSC

center is responsible for sending the SMS message to the recipient mobile phone

and storing the SMS message if the recipient mobile phone is offline.

3.4.6 SMS Gateway

The SMS gateway acts as a relay between the two SMSCs. It translates one SMSC

protocol to another one (interoperability). This can be used by two different wireless

carriers to interconnect their SMSCs for purposes such as enabling the exchange of

inter-operator SMS messages.

SMSC SMSC
SMS

SMSC 1 Protocol 1 Gateway Protocol 2 SMSC 2

Fig. 3.4

Different wireless carriers may use different SMSCs from different vendors, which

mean the SMS text messaging application must support multiple SMSC-specific

protocols. (This is illustrated in the following figure).

55
Fig.3.5

SMSC 1

SMSC protocol1

SMSC 2

HTTP(S) SMS SMSC Protocol 2


TEXT
MESSAGING Gateway
SMSC protocol 3 SMSC 3
APPLICATION

Or other protocols

SMSC Protocol 4
SMSC 4

An SMS text messaging application connects to SMSCs through an SMS gateway.

The use of an SMS gateway can greatly shorten the SMS text messaging

application's development time. To connect to an SMS gateway, SMSC protocol

such as SMPP and CIMD can be used. Some SMS gateways support an HTTP /

HTTPS interface (this was used to design the web pages). HTTP / HTTPS is easier

to use than SMSC protocols. The drawback is that there may be fewer SMS features

to use. For example, an SMS gateway may not support the sending of picture

messages through the HTTP / HTTPS interface.

The SMS gateway and messaging centre application for this study was made

available through open source and free SMS gateway software. From figure 3.5

above (figure 3.5), an SMS gateway has a lot of responsibilities in an SMS

messaging system. So, SMS gateway software can be very complex and complex

software is usually expensive. Fortunately, there are open source SMS gateway

56
software packages that were made available and downloaded free for research work

on the web. A high-quality SMS gateway software package used is Microsoft SMS

sender, which is written in the C programming language. It can handle connections

to SMSCs, mobile phones and GSM/GPRS modems. It has an HTTP / HTTPS

interface for the sending SMS messages

3.5 Problem of the existing system

As stated earlier, the paper based and the email approaches efficiencies of the

existing system was noticeably fraught with some set backs. Some are:

 Slow operations

The act of waiting for newspapers advert publications weekly, and checking emails

once in a while or when able are slow and „energy sapping experience‟. this result in

loss of many job opportunities.

 Difficulty in searching for job vacancies

Job seekers often lack skill to accessing sources for jobs leads. Irrespective of the

internet made available, it could be cumbersome process that is not guaranteed to

provide useful information. Accurate and timely retrieval of information is a big

challenge to many.

3.5.1 Alternative to the system

The possible solution to the problems listed above could be attained through

integration of mobile alert system to increase and enhance access to job leads. The

option considered is:

 Web based application

57
This option suggests design of viable and web based mobile alert system. The

system is an information system that uses the infrastructure of the internet and the

World Wide Web to support acquisition and disseminating of job information.

The system will provide relevant information to users online or offline in real time

mode.

3.6 Feasibility study

Feasibility study involves the analysis of the possible alternatives in search of a

suitable system and technology. It is also used to access the workability,

practicability, and probable cost of developing the proposed system.

 Technical feasibility

Technical feasibility relates to how the system will be developed, and implemented.

The software needed for the development of the system is readily available and

sufficient technical know-how exists for the development and implementation of the

proposed alternative to the existing system.

 Operational feasibility

Operational feasibility relates to how the proposed system will be integrated into the

work system of the organization. The web based information system will be

integrated with the SMS messaging system. This will require routine maintenance

operation and a system administrator will have to handle the operations.

 Economic feasibility

58
Economic feasibility is concerned with the availability of financial resources required

to implement and sustain the system. Presented in table 4.1 below is the estimated

development cost associated with the development of the system.

Table 3.1

COST OF UNIT ESTIMATED COST

S/N ITEMS PRICE (N) (N)

1 Windows based setup - 70,000.00

2 Web based system hosting - 30,000.00 (Annual)

3 Management & Maintenance - 50,000.00

4. Internet Service Subscription - 6,000.00

TOTAL N156,000.00

Table 3.1 Based on full licenses for applications

The web based application will offer online and offline access of timely information,

updating, and by users.

This alternative was chosen because of its wider coverage, mobility, affordability and

real time access by job seekers equipped with communications mobility.

3.7 Method of Testing

Sample users from the environment were selected to use the system to see if they

received message alerts on their selected job classes.

The program was also tested to ensure that it was working properly and up to

expectation.

CHAPTER FOUR

59
SYSTEM DESIGN

4.0 Introduction

The previous chapter presented the approach to the research design of SMS

messaging and web based user interface.

This chapter analyzes the architecture and actual design of a Short Message Service

Center (SMSC); and the web site interface of the information system.

In the early nineties, a Short Message Service Center was developed according to

the specifications for text messaging embedded in the GSM standard, Poort et al,

(2009). This study looks back at the conceptual design of sending SMS from WEB

driven application on a computer to mobile devices.

Several modifications and adaptations of SMS technology have been done- from

embedding SMS in GSM standard for messaging in network to network, to

development of applications (by vendors) that can send SMS without being part of

the core GSM standard, but using same standard.

SMS notifications have been used in several fields notably:

 warning systems,

 governance,

 hospitals, etc.,

This study adopts use of SMS notification to route information to seekers because in

the modern information society, mobility is getting more and more important and

therefore there is an increasing demand for communication with the mobile user.

60
The GSM networks provides ideal medium to send short messages and globally to

mobile users or to receive messages from such users.

4.1 Logical Data Modeling

This is the process of identifying, modeling and documenting the data requirements

of the system being designed. The following represent types of data modeling:

4.1.1 Entity –Relationships diagram

The data are separated into entities (things about which a business needs to record

information) and relationships (the associations between the entities).

 Database schema

Entities identified as relevant to the environment of this database are listed with their

attributes as follows:

1. Job site: (URL varchar (20), not null; Bizname varchar (25), location varchar (25));

2. Job Seeker: (Username, varchar (15), Password varchar (12), Address varchar

(30), Email varchar (20), Telephone varchar (15), Gender varchar (6), Age varchar

(2), Job category varchar (20), state varchar (30),CV, blob,Feedback varchar (100));

3. Employer: (Name, varchar (25), Location, varchar (25), Phone varchar (15),

jobvacancies, blob);

4. Vacancies: (VacId, varchar (3), Type varchar (50); Joblocation, varchar (15)

deadlinedate);

5. Employee: (Name varchar (20), Phone varchar (15), Discipline varchar (25),

Experience (2), Age, varchar (2), marital status varchar (10) );

61
 Entity Relationship Diagram

Figure 4.1

62
4.1.2 Web-to-Phone Data Flow Modeling

This is the process of identifying, modeling and documenting how data moves

around an information system. Data flow modeling examines processes (activities

that transform data from one form to another), data stores (the holding areas for

data), external entities (what sends data into a system or receives data from a

system), and data flows (routes by which data can flow).

The data flow can be captured from diagram below

FIG 4.2
START

JOB LISTINGS;
APPLICANT & COMPANY
REGISTRATION ON WEB
DOMAIN

63
NO
SIGN UP
FOR SMS BROWSE JOBS LISTED
ALERT ON WEB PAGES

YES

RECEIVE SMS
Confirmation &
JOB ALERT

SEEKER MODIFY JOB


RESPOND NO SEARCH CLASS
TO ALERT

YES

VISIT WEB
NO PAGE FOR
DETAILS

YES

FINISH Website operation and sending SMS

64
4.2 General information about SMS and Architecture

SMS appeared on the wireless scene in 1991 in Europe, Rahmah (2006). The

European standard for digital wireless, now known as the Global System for Mobile

Communications (GSM), included short messaging services from the outset. In North

America, SMS was made available initially on digital wireless networks built by early

pioneers such as BellSouth Mobility, PrimeCo, and Nextel, among others. These

digital wireless networks are based on GSM, code division multiple access(CDMA),

and time division multiple access (TDMA) standards.

Figure 4.3 represents the basic network architecture for an Information System

SMSC deployment handling multiple input sources, including a voice-mail system

(VMS), Web-based messaging, e-mail integration, and other external short message

entities (ESMEs). Communication with the wireless network elements such as the

home location register (HLR) and mobile switching center (MSC) is achieved through

the signal transfer point (STP).

SMS provides a mechanism for transmitting short messages to and from wireless

devices. The service makes use of an SMSC, which acts as a store-and-forward

system for short messages. The wireless network provides the mechanisms required

to find the destination station(s) and transports short messages between the SMSCs

and wireless stations. In contrast to other existing text-message transmission

services such as alphanumeric paging, the service elements are designed to provide

guaranteed delivery of text messages to the destination.

Additionally, SMS supports several input mechanisms that allow interconnection with

different message sources and destinations.

65
A distinguishing characteristic of the service is that an active mobile handset is able

to receive or submit a short message at any time, independent of whether a voice or

data call is in progress (in some implementations, this may depend on the MSC or

SMSC capabilities). SMS also guarantees delivery of the short message by the

network. Temporary failures due to unavailable receiving stations are identified, and

the short message is stored in the SMSC until the destination device becomes

available.

Integration with the Internet spurred the development of Web-based messaging and

other interactive applications such as instant messaging, gaming, and chatting.

A Short Message Service Center employed in this work is in conformity with the

specifications for text messaging embedded in the GSM standard. This study looks

at the theoretical design phases of some similar projects from literature to adapting it

to fit into the study design conceptual framework.

The SMS Message Center was implemented as service in Windows XP and uses

semi persistent queuing, i.e. ingoing or outgoing messages are inserted into queues;

these queues are implemented in Windows XP as "memory map”. Thus the

messages in the queues cannot get lost during a power failure (which is signaled by

an UPS and the service can be terminated correctly). After starting the service again

the queues are recovered and the messages will be delivered. Every frontend and

backend will also write all messages to a specific log file.

66
FIG 4.3 (Source: Rahman, 2006)

Basic Network Architecture for an SMS Deployment

4.2.1 System requirements

The SMSC‟s key requirements are listed according to first: the primary (functional)

requirements, and then the secondary requirements: divided in secondary functional

requirements and quality requirements.

4.2.2 Primary requirements

Figure 4.4 shows the SMSC system in its primary context.

FIG 4.4

67
Source:

Source:

From the architecture above, this study‟s purpose is to send messages to recipients

using GSM (and CDMA) mobile devices, as a result terminals, voicemail and other

systems are not intended.

The architecture framework for the study is found in FIG 4.5 below as suited

FIG 4.5

GSM Networks

SMSC

68
4.2.3 Secondary requirements

The major secondary functional requirements (SF1) were that a record of every

message that has passed through the system is kept, and there is an interface to

monitor and operate the system, (secondary function 2).

The major quality requirements expected of the system centered around [QR1:]

performance of message throughput, [QR2:] availability of the messaging service

and [QR3:] reliability of message storage. [QR4:] Timeliness in responses to external

systems information feeds was essential.

To understand how the SMS travels from the PC to the SMSC please take a look at

Figure 4.5. On this figure you can see which protocols are used and which GSM

network entities take place in the communication process. As you can see, the

mobile phone (Mobile station) / PC transmit the SMS message to the GSM base

station (BTS) through a wireless link. After this the message goes though the

backbone network of the service provider. The mobile switching center (MSC), the

Home Location Register (HLR) and optionally the Visitor Location Register (VLR) are

used to find out the appropriate short message service center (SMSC) that will store

and forward the message when the receiving party becomes available.

Figure 4.6 - SMS transportation


PC

SMSC HLR
BSC MSC/VLR MS

MS BTS Source: http://www.ozeki.hu/

69
4.3 Input Design

The system receives input at different stages of operation, which includes the

following:

 registration of users on the site

 submission of bio data for data processing

 submission of new jobs by employers

 submission of CV

 updating records in the database

4.4 Output design

The outputs from the system are basically result from users requests, such as

- complete listing of all job vacancies;

- Job categories listed on the web page;

- SMS messages to mobile as indicated upon registration.

4.5 The Mobile Device

The mobile device is the wireless terminal capable of receiving and originating short

messages. Commonly, these devices have been digital cellular phones, but more

recently the application of SMS has been extended to other terminals such as POS,

handheld computers, and personal digital assistants (PDAs).

According to Rahmah (2006) the wireless network-signalling infrastructure is based

on SS7. SMS makes use of the mobile application part (MAP), which defines the

methods and mechanisms of communication in wireless networks and employs the

services of the SS7 transactional capabilities application part (TCAP).


70
An SMS service layer makes use of the MAP signalling capabilities and enables the

transfer of short messages between the peer entities. The capabilities of the terminal

vary depending on the wireless technology supported by the terminal. Some

functionality, although defined in the SMS specification for a given wireless

technology, may not be fully supported in the terminal, which may represent a

limitation in the services that the carrier can provide.

4.6 SMS Applications

SMS was initially designed to support limited-size messages, mostly notifications

and numeric or alphanumeric pages.

While this application is widely used, there are more recent niches that SMS still

make good use of.

Another family of applications that can use SMS as a data transport mechanism is

banking. It is no secret that automated teller machine (ATM) and Internet

transactions are less costly than transactions completed at a branch. Internet

transactions are even cheaper than ATM transactions. Therefore, enabling wireless

subscribers to check their balances, transfer funds between accounts, pay their bills

and credit cards is valuable, not only for the subscriber but also for financial

institutions.

Entertainment applications are also good drivers of SMS usage. Examples of these

are simple short message exchanges between two parties (“texting”) or between

multiple participants (“chat”).

Wireless Web browsing allows the users to search for information without the

physical restrictions of a PC.

71
E-mail continues to be by far the most used wireless data application. However,

handsets are evolving quickly and are including more and more functionality that

supports newer applications at the same time are user friendly increases.

The potential for applications is enormous, and new needs appear to arise

constantly, demanding a solution that may travel over SMS.

4.7 Hardware Requirements

 A GSM/GPRS modem (alternatively a mobile phone can be used as a

modem) connected to a computer, on the system end i.e. service provider.

This is a fast and reliable device to send and receive SMS messages. We can

send plain text SMS messages, Unicode messages, ring tones and other

advanced SMS messages using a GSM modem. To send and receive SMS,

we used the Nokia 2760 phone set and to connect it with the computer and

USB 2.0 Bluetooth device.

We connect our GSM phone to the computer via virtual port. Connection with

serial port or USB data cable is also possible. People usually prefer to use a

dedicated GSM modem rather than a GSM phone, because it is faster.

 Pentium III Windows 700MHZ or greater, desktop or notebook computer that

runs on Microsoft Windows XP ;

 40 GB HDD (minimum) for installation and storage;

 256 MB RAM (or greater) for processor speed;

 14 inch VGA monitor and 1024 X 768 screen resolution and 24-bit colour

display;

 Full-sized QWERTY keyboard can used to write text messages.

 Mouse

72
4.8 Software Requirement

 Microsoft Windows 2003 operating system with service pack, System type: 32

bit operating system;

 Microsoft HyperTerminal: to Send AT Commands to a mobile phone or

GSM/GPRS modem. GSM phones with (HyperTerminal) AT+C modem

command supports GSM phones functionalities. It works similar to GSM

modems.

 Microsoft windows office suites

 Windows notepad

 Corel Draw X3

 Adobe photoshop 7.0

 Microsoft SMS sender

4.9 Control and security

System security consists of all the measures taken to guarantee safety of

organisation information resources from threat or attacks from unauthorised users.

Security here is viewed in two ways: physical and logical security.

In physical security, it is recommended that the computer system be put in a dust

free, air conditioned and burglar proof room to prevent system crash and theft.

In logical security, the first page of the website requires username and password

which gives users different access level to the system.

73
The key to protecting a system through logical safeguard is access control. Access

control mechanisms like user identification and authorisation will serve as the main

system security elements of the new system.

In order to ensure the complete security of the system, only the system administrator

will assign access rights to users of the system by approving the registration, users

of the system will be uniquely identified by their username and password which gives

them different access level.

The system will also provide users and the admin officers‟ access right to change

their password to ensure complete security of the system. Below illustrates the

screenshots of the proposed system security and access control forms.

Fig 4.7 Proposed user Login form page of the web site

74
CHAPTER FIVE

5.0 System development

5.1 Introduction

This chapter is about the development of the programs necessary to implement the

new system designed in the previous chapter. It also looks at the efficiency of the

program and includes a listing of the modules that constitute the web application

developed for the project.

In this section, we divide the total works into three different parts: Database Design,

Website Design and SMS sending.

System development tools

The development of the system was made up of static and dynamic pages. HTML,

CSS, JAVASCRIPT, PHP, ASP were used in the development of the development of

the pages. The computer was first configured as a web server using Microsoft

internet explorer service.

Notepad and Microsoft Expression Web were used to create the website on which

the web pages that serve as various links were created.

75
5.2 Database Design

EMPLOYER /
JOB SEEKER COMPANY

APPLY SUBMITS

JOBS
FOR JOBS

HAVE

SPECIALIZATION WITH
CRITERIA

CHOOSE
SEND SMS SEND

SMS

JOB CATEGORY

 Website operation and sending SMS

76
SEEKER
RECEIVE MATCH Apply APPLICATION
SMS KEYWORD
S

DETAILS CHECKED BY
EMPLOYER

END SEND INTERVIEW


SMS
Fig 5.1

Entity / Relationship table

S/N Entities Attributes


1 JOB SITE URL varchar (20), not null;

Bizname varchar (25),

location varchar (25)

2 Job Seeker Username, varchar (15),


Password varchar (12),
Address varchar(30), Email
varchar (20), Telephone
varchar (15), Gender
varchar (6), Age varchar
(2), Job category varchar
(20), state varchar (30), CV,
blob, Feedback varchar
(100)
3 Employer Name, varchar (25),
Location, varchar (25),
Phone varchar (15),
jobvacancies, blob
RELATIONSHIPS TABLES
4 Vacancies VacId, varchar (3), Type
varchar (50); Joblocation,

77
varchar (15) deadlinedate
5 Employee Name varchar (20), Phone
varchar (15), Discipline
varchar (25), Experience
(2), Age, varchar (2), marital
status varchar (10)
Table 5.1

Proposed Database table Structure of Jobsite. Fig 5.2

78
Proposed Database table Structure of Jobseeker. Fig 5.3

Proposed Database table Structure of Vacancies. Fig 5.4

79
Database table structure of employer fig 5.5

Proposed database table structure of employee fig 5.6

80
5.3 Website Design

5.3.1 Developing the Site

Many job sites were visited at the start of this work to know all features that are

added in their sites. This site tagged: JOBS.COM consists of three active pages,

which work for different purposes: Home, Employers Page and Job Openings.

This WEB-SMS system, serves as a complement to the traditional job-hunt, which is

interactive and with faster access.

This approach is just to provide a good overview. I have developed a personal

database driven website which currently runs on local host. To manipulate the

database we use PHP & MySQL in the back-end.

To build the website we use following development tools.

 PHP 5.2.6

 MySQL 5.0.51b

 Microsoft Expression Web

 MIcrosoft Notepad

 Adobe Photoshop 7.0

 Corel X3

The database designed for the backend of the website will enable it capture inputs

from users.

To make it World Wide Web functional, an internet connection from a vendor would

be deployed for uploading the web content to host server to facilitate full deployment

and access. The web interface was designed using Notepad and Microsoft

81
expression web editors. Hypertext mark-up language (HTML) and cascading style

sheet (CSS), and PHP were used to write instructions and format the web pages to

allow the web pages inputs interact with the database in anticipation of users‟

requests.

The SMS sender application was set up and connected to a stand alone computer

being fed with feedback from the web content to take decision on sending alert

messages.

5.3.2 Home Page

In the home page, there exists log in options, for the job seekers and company or

employers. Also browser of this site can watch the available jobs in different

websites provided by the RSS feeds. The new users can create account in order to

post their resumes. There is a link for the seekers to view jobs listings.

Figure 5.7: Homepage of the website

82
Fig. Homepage of the website

83
5.3.3 Company Section

For Employers: By clicking this link, anybody can move to the company log in page.

This Is where company will log in before going further to submit jobs. Without log-in a

company cannot use the site. The company can update its own information, add a

new job, and see all the applicants that applied for any jobs. The company can easily

decide who will be called for the interview.

Figure 5.8: Company page of the website

5.3.4 New Job page

In this page company put the details for the new job available in the company.

Details contain designation, qualifications, and responsibilities, no of posts

available, deadline to apply, etc.

84
Fig 5.9 New job page of the website

5.3.5 Apply Online

This page seeker can apply online. Seekers need to submit resume to be valid

member of the site. Considering some job sites we have added the same technique

without posting resume seekers can‟t be a regular member. Seeker will post resume

according to the form designed in the software. Through that all relevant information

for the member are gathered.

So that seeker can easily post their resume and click on the “Apply” button. The

resume will be updated in the database.

85
Figure 5.10 Job opening page of the website

Job opening page of the website

86
5.4 Sending and Receiving SMS

Adding SMS capabilities to an application is not a simple matter. It requires

specialized knowledge that might be outside an individual programmer's expertise.

To integrate the SMS capabilities, we rely upon the power, flexibility and reliability of

the Microsoft SMS sender application Software and mobile phone toolkit. With these

toolkits, we can send and receive SMS messages via a:

 GSM modem;

 GSM phone;

 Desktop or Notebook computer.

5.4.1 SMS Server Model

Short Message Server is a powerful, flexible SMS application that enables you and

your applications to send/receive SMS messages to mobile devices with your

computer. It has an easy to use user interface, and an internal architecture which

include built in database. The application can use a GSM mobile phone attached to

the PC with a phone-to-PC data cable or IP SMS technology to transmit and receive

the messages. This gateway message server works on Microsoft Windows XP

operating systems.

FIG.5.11. SMS Gateway System Architecture.

87
Source: http://www.ozeki.hu/

Microsoft Outlook and Microsoft Excel can be used to send hundreds of messages to

clients. The messages and the phone numbers are stored in Excel files and an Excel

Macro initiates the sending process. (The excel macro is included in the software

package of the server.)

The website functionality can be integrated with the SMS messaging applications by

creating a projection of the phone numbers, registered job classes, and vacancies

tables, and then exported to the SMS centre easily. For example if an SMS message

needs to be sent, it can be inserted into a database table used for outgoing

messages. The message server monitors this table and delivers the message.

Figure 5.12 shows how SMS travels from the PC to the cell phones, on this figure

you can see which protocols are used and which GSM network entities take place in

the communication process. As you can see, the mobile phone (Mobile station) or

computer transmits the SMS message to the GSM base station (BTS) through a

88
wireless link. After this the message goes though the backbone network of the

service provider. The Mobile Switching Center (MSC), the Home Location Register

(HLR) and optionally the Visitor Location Register (VLR) are used to find out the

appropriate Short Message Service Center (SMSC) that will store and forward the

message when the receiving party becomes available.

FIG: 5.9 Source: http://www.ozeki.hu/

PC

SMSC HLR
BSC MSC/VLR

5.4.2 Sending SMS Messages from a Computer

A computer can send SMS messages through a mobile phone or GSM/GPRS

modem. A GSM/GPRS modem is a wireless modem that works with GSM/GPRS

wireless networks. A wireless modem is similar to a dial-up modem. The main

difference is that a wireless modem transmits data through a wireless network

whereas a dial-up modem transmits data through a copper telephone line. Most

mobile phones can be used as a wireless modem.

To send SMS messages, a valid SIM card from a wireless carrier was inserted into a

mobile phone or GSM/GPRS modem, which is then connected to a (standalone)

dedicated computer. There are several ways to connect a mobile phone or

GSM/GPRS modem to a computer. For example, they can be connected through a

serial cable, a USB cable, a bluetooth link or an infrared link. But this study preferred

89
to use a bluetooth link that supports a range of 100M. The actual way to use

depends on the capability of the mobile phone or GSM/GPRS modem. For example,

if a mobile phone does not support bluetooth, it cannot connect to the computer

through a Bluetooth link.

After connecting the mobile phone or GSM/GPRS modem to a computer, the mobile

phone or GSM/GPRS modem can be controlled by sending instructions to it. The

instructions used for controlling the mobile phone or GSM/GPRS modem are called

AT commands. Dial-up modems, mobile phones and GSM/GPRS modems support a

common set of standard AT commands. In addition to this common set of standard

AT commands, mobile phones and GSM/GPRS modems support an extended set of

AT commands. One use of the extended AT commands is to control the sending and

receiving of SMS messages.

The following table lists the AT commands that are related to the writing and sending

of SMS messages:

Table 5.2

AT COMMANDS MEANING

+CMGS SEND MESSAGE

+CMSS SEND MESSAGE FROM STORAGE

+CMGW WRITE MESSAGE TO MEMORY

+CMGD Delete message

+CMGC SEND COMMAND

+CMMS MORE MESSAGE TO SEND

90
One way to send AT commands to a mobile phone or GSM/GPRS modem is to use

a terminal program. A terminal program's function is like this: It sends the characters

you typed to the mobile phone or GSM/GPRS modem. It then displays the response

it receives from the mobile phone or GSM/GPRS modem on the screen. The

terminal program on Microsoft Windows used in this study is called Hyper-Terminal.

5.4.3 Using HyperTerminal and AT Commands to Configure Mobile Phone or

GSM/GPRS Modem

Microsoft Hyper-Terminal is a small program that comes with Microsoft Windows.

Before the start of the SMS application programming, it is important to check if the

mobile phone, GSM/GPRS modem and SIM card are working properly first. The MS

HyperTerminal is a handy tool when it comes to testing GSM devices. It is a good

idea to test the GSM devices beforehand. When a problem occurs, sometimes it is

difficult to tell what causes the problem. The cause can be the program, the GSM

device or the SIM card. If the GSM device was tested and SIM card with MS

HyperTerminal and they operate properly, then it is very likely that the problem is

caused by the program.

The lines in bold type are the command lines that should be entered in

HyperTerminal. The other lines are responses returned from the GSM / GPRS

modem or mobile phone.

AT

OK

AT+CMGF=1

OK

91
AT+CMGW="+8033957506" (Press Enter on keyboard)

> A simple demo of SMS text messaging.

+CMGW: 1

OK

AT+CMSS=1

+CMSS: 20

OK

Here is a description of what is done in the above example:

 Line 1: "AT" is sent to the GSM / GPRS modem to test the connection. The

GSM / GPRS modem sends back the result code "OK" (line 2), which means

the connection between the HyperTerminal program and the GSM / GPRS

modem works fine.

 Line 3: The AT command +CMGF is used to instruct the GSM / GPRS modem

to operate in SMS text mode. The result code "OK" is returned (line 4), which

indicates the command line "AT+CMGF=1" has been executed successfully. If

the result code "ERROR" is returned, it is likely that the GSM / GPRS modem

does not support the SMS text mode. To confirm, type "AT+CMGF=?" in the

HyperTerminal program. If the response is "+CMGF: (0, 1)" (0=PDU mode

and 1=text mode), then SMS text mode is supported. If the response is

"+CMGF: (0)", then SMS text mode is not supported.

 Line 5 and 6: The AT command +CMGW is used to write an SMS text

message to the message storage of the GSM / GPRS modem.

"+238033957506" is the recipient mobile phone number. After typing the

recipient mobile phone number, you should press the Enter button of the

92
keyboard. The GSM / GPRS modem will then return a prompt "> " and you

can start typing the SMS text message "A simple demo of SMS text

messaging.". When finished, press Ctrl+z of the keyboard.

 Line 7: "+CMGW: 1" tells us that the index assigned to the SMS text message

is 1. It indicates the location of the SMS text message in the message

storage.

 Line 9: The result code "OK" indicates the execution of the AT command

+CMGW is successful.

 Line 10: The AT command +CMSS is used to send the SMS text message

from the message storage of the GSM / GPRS modem. "1" is the index of the

SMS text message obtained from line 7.

 Line 11: "+CMSS: 20" tells us that the reference number assigned to the SMS

text message is 20.

 Line 13: The result code "OK" indicates the execution of the AT command

+CMSS is successful.

To send SMS messages from an application, you have to write the source code for

connecting to and sending AT commands to the mobile phone or GSM/GPRS

modem, just like what a terminal program does. The source code can be written in C,

C++, Java, Visual Basic, Delphi or other programming languages. However, writing

your own code has a few disadvantages:

 You have to learn how to use AT commands.

 You have to learn how to compose the bits and bytes of an SMS message.

For example, to specify the character encoding (e.g. 7-bit encoding and 16-bit

93
Unicode encoding) of an SMS message, you need to know which bits in the

message header should be modified and what value should be assigned.

 Sending SMS messages with a mobile phone or GSM/GPRS modem has a

drawback -- the SMS transmission speed is low. As the SMS messaging

application becomes more popular, it has to handle a larger amount of SMS

traffic and finally the mobile phone or GSM/GPRS modem will not be able to

take the load. To obtain a high SMS transmission speed, a direct connection

to an SMSC or SMS gateway of a wireless carrier or SMS service provider is

needed. However, AT commands are not used for communicating with an

SMS center or SMS gateway. This means your have to make a big change to

your SMS messaging application in order to move from a wireless-modem-

based solution to a SMSC-based solution.

In most cases, instead of writing your own code for interacting with the mobile

phone or GSM/GPRS modem via AT commands, a better solution is to use a high-

level SMS messaging API (Application programming interface) / SDK (Software

development kit) / library. The API / SDK / library encapsulates the low-level details.

So, an SMS application developer does not need to know AT commands and the

composition of SMS messages in the bit-level. Some SMS messaging APIs / SDKs

/ libraries support SMSC protocols in addition to AT commands. To move from a

wireless-modem-based SMS solution to a SMSC-based SMS solution, usually

requires modification of a configuration file / property file or make a few changes to

your SMS messaging application's source code.

Another way to hide the low-level AT command layer is to place an SMS gateway

between the SMS messaging application and the mobile phone or GSM/GPRS

94
modem. (This has been discussed above under "SMS Gateway" Simple protocols

such as HTTP / HTTPS can then be used for sending SMS messages in the

application. If an SMSC protocol (e.g. SMPP, CIMD, etc) is used for communicating

with the SMS gateway instead of HTTP / HTTPS, an SMS messaging API / SDK /

library can be very helpful since it encapsulates the SMSC protocol's details.

Usually a list of supported / unsupported mobile phones or wireless modems is

provided on the web site of an SMS messaging API / SDK / library or an SMS

gateway software package.

5.4.4 Role of Windows PC in Sending SMS Messages.

Computer (PC) that runs Microsoft Windows XP was used to run the SMSC

application. Sending SMS messages with a mobile phone has a major problem -- it

is time consuming to write a text message using the small keypad of a mobile

phone. As a result, it is better to use a PC (desktop or notebook computer) to send

SMS messages. This way a full-sized QWERTY keyboard can be used to write text

messages.

5.4.5 Requirements

To send SMS messages via a mobile phone using a Windows PC, the following

were used:

 A GSM mobile phone that can be connected to PC (some mobile phones do

not have an interface for connecting to a PC).

 A Windows program that can control the mobile phone to send and receive

SMS messages.

95
Today, most mobile phones support at least one of the following options to connect

to a PC:

 Via infrared (IrDA)

 Via Bluetooth

 Via a USB cable

 Via a serial cable

The infrared and bluetooth option are very useful to many notebook computer users

since nowadays many notebook computers have built-in infrared or bluetooth

support.

The Windows program for sending and receiving SMS messages is provided by

some mobile phone manufacturers. For example, Nokia offers a software package

called Nokia PC Suite to their mobile phone users. A program by Microsoft called

SMS Sender that enables Windows users to send SMS messages via a GSM

mobile phone from a PC was used for the purpose of this study.

To send SMS, I used the Nokia 2760 phone set and to connect it with the SMS

sender, I use enhanced data receiver (EDR) Bluetooth 2.0.

5.4.6 Using Microsoft SMS Sender to Send SMS Messages from a Windows

PC

Microsoft SMS Sender is a Windows program for sending SMS messages from a

PC via a GSM mobile phone. It was made available through open source from

Microsoft's web site for research and development purposes.

96
One major limitation of this Windows program is that it does not support

concatenated SMS messages, flash SMS messages, MMS messages and SMS

messages that contain ring tones or logos. The SMS Sender can only be installed

on Windows XP and Windows Server 2003.

5.4.7 Installing the Modem Driver of a Mobile Phone on a PC.

To use SMS Sender, the modem driver of the mobile phone was installed on the PC

via Bluetooth device. If not, the mobile phone will not be shown in the available

device combo box in the main window of SMS sender. Normally, Windows should

install the modem driver automatically.

Figure 5.10. Modem Driver of a Mobile Phone

5.4.8 SMS Server:

Below is the SMS Server for sending SMS from the GSM device. The SMS server
will run all-time and check the database if there is any new SMS to send.

97
Figure 5.11 SMS SERVER

98
CHAPTER SIX

6.0 System Testing

6.1 Introduction

This chapter is about testing the system that has been designed in this study.

6.2 Unity and Integration Testing.

The software was tested in cell phones by sending SMS repeatedly from the SMS

sender. All the cell phones with GSM support will be able to successfully run the

software.

6.3 System Testing.

First I posted a new job in the website. As soon as the job is saved in the database,

a new job alert SMS is sent to the desired applicants. A dedicated number with

+2348033957506 was used for the SMS server.

FIGURE 6.1 New job alert.

Now suppose applicant want to see the details. Then he/she has to type details and
job id by a space to our server number (+2348033957506). After the mobile server
gets the SMS, it will reply with details to the applicant.

99
ID: 1; Qual:
Graduate; Agent:
DETAILS Uni.Ibadan;
:1
Last Date;
14/08/2010

Salary: N/A
SEND TO 8033957506

Figure 6.2: Get job information details.

send to
8033957506

After getting the details of the job, if anyone wants to apply, then that person types

apply followed by his/her log in username then job id by a space to our server

number (+2348033957506), or go to the web page to apply.

100
APPLY
Ogunkua
1

Figure 6.3: Apply for a job directly by sending an SMS

After all the tasks that are mentioned above are done, the company employer will

check all the CV‟s. Then he/she chooses some applicant and sends SMS to those

applicants for interview.

Interview alert
being sent to
seekers mobile
phone

Figure 6.4: Interview alert being sent to seekers mobile phone

101
After interview, the applicant can be called for 2nd interview or joining.

After all the SMS are sent to the desired applicant, the SMS server will keep a record
(log) of all the SMS that are sent.

=============================================

Sent on: 7/29/2010 at: 7:46:10 PM

Number: 08029501947

Message: sms test

=============================================

Sent on: 7/29/2010 at: 8:57:53 PM

Number: 08034071675

Message: CHEVRON/TEXACO IS RECRUITING. VISIT www.jobs.com for


details. i am testing my thesis research work on job alert sms.

============================================

Sent on: 7/30/2010 at: 10:20:13 AM

Number: 08055363556

Message: INTERVIEW ALERT!!!; POST: ASSISTANT LECTURER; AGENT: UNI


OF IBADAN; DATE: 22/08/2010; VISIT JOBS.COM FOR DETAILS

=============================================

Table 6.1: SMS log sent from database

6.4 Results

The unity and integrity of the system software have been tested. It sends the SMS
properly and properly receives in the server end. I have tested it using several types
of input and have successfully been able to harvest out all the data logs. But I have
considered only one database for testing. For a complete testing we have to test in a
large scale. It took lots of time for studying and testing.

102
6.5 Future Scope and Conclusion

6.5.1 Future Development

Due to lack of time i cannot add some stunning features that i thought to the project.

So, I consider these things as future developments.

 For checking purpose and to keep things simple, members are permitted to

apply from cell phone only by submitting their usernames. This system may

create holes in security issue. This is because any body can send SMS with

any random name and unfortunately resume will be submitted if the name

exists. So, i think to give every member a unique identification number that

must be submitted when he goes to apply for any job.

 In future it will be developed and will be able to test in a large scale for the

large environment.

 The proposed System does not allow searching job using mobile phones. This

issue is also included in our future development to allow the members

searching jobs through SMS. Searching job through mobile makes the system

more efficient and more automated.

6.5.2 Conclusion

Being a part of the growing job market, it is expected that the proposed system will

give great advantage to the job seekers. They will always be up-to-date with the new

job alert in their cell-phone. Getting interview alert will not let them miss any dream

opportunities. Getting job details will help them to check whether they are suitable for

the job and applying by SMS will enable them to apply for any job from anywhere

anytime.

103
REFERENCES

Akinboyo, G.B (1987). Job Creation as a Productivity Measure for Employment

Problems in Developing Countries: The Nigeria and Holland Experience, Increasing

Productivity in Nigeria, National Productivity Centre, Lagos, pp 404-411.

Alanana, O. O. (2003). Youth Unemployment in Nigeria: Some Implications for the

Third Millenium. AFRICAN JOURNAL ONLINE: Global Journal of Social Sciences

Vol. 2 (1). ISSN: 1596-6216.

Banks, K. and Burge, R. (2004). Mobile Phones: An Appropriate Tool for

Conservation and Development? UK. Fauna & Flora International, Cambridge,

17p.

Betts, G. (2007). Information Systems. (Internet),

http://bettscomputers.com/information systems.htm. 13th June 2010.

Borysowich, C (2007). An Overview of Database Management Systems. (Internet),

http://it.toolbox.com/blogs/enterprise-solutions/an-overview-of-database-

management-systems-15615. 13th June 2010.

Ehikhamenor, F.A. (2005). Information Systems Development: Managerial

Strategies and Methods, In: Tiamiyu M.A. Information Science Concept, Models and

Applications. Ibadan: Africa Regional Center for Information Science. pp.113-145.

Galanaki, E. (2002). The decision to recruit online: A descriptive study. Career

development international, 7(4), 243-251.

Gleim. (2006). Overview of information systems and system development and

design. (internet) Gleim publications, inc. www.gleim.com.

104
Heathfield, S. M. (2008). Human Resources Information System. (internet),

http://humanresources.about.com/od/glossaryh/a/hris.htm. 13th June 2010.

International ISCRAM Conference – Gothenburg, 6th, May 2009, Sweden.

Towards an IP-Based Alert Message delivery, J. Landgren and S. Jul, eds.

Kelly, M. (2008). Types of Information Systems. (Internet),

http://www.vceit.com//systems/infosystemtypes.htm. 13th June 2010.

Laura Naismith, Peter Lonsdale, Giasemi Vavoula, Mike Sharples (2006). Mobile

Technologies and Learning (internet), Birmingham. www.futurelab.org.uk/research.

13th March 2010.

Meldung, N.(2008). Mobile Alert System for Cell Phones. (Internet),

http://www.innovationsreport.de/html/berichte/informationtechnologies/researchers_t

est_mobile_alert_system_cell_phones_123768.html. 28th April 2010.

Nächste Meldung. (2008). Researchers Test Mobile Alert System for Cell Phones.

http://www.innovations-report.de/html site accessed 29/01/10.

Obadan, M.I. and Odusola, A.F. (1991). Productivity and Unemployment in

Nigeria, In National Centre for Economic Management & Administration (Ncema).

Ibadan.

Onuah, Felix. (2006). Nigeria gives census result, avoids risky details. (Internet),

Reuters. http://www.alertnet.org/thenews/newsdesk/L29819278.htm. 10th April 2010.

Onu Blessing, C. (2004). The GSM, Internet, Library and Information Service in

Nigeria Public Libraries. The Information Technologist: Journal of Information and

Communication Technology [ICT. Vol.1 (1&2), June & December 2004, 51-58.

105
Ottong, J.G. (2009). Demographics of Nigeria. http://en-wikipedia.com. Site

accessed 25/01/10

Priti Razdan, and Amarjeet Singh Cheema. (2009). Proceedings of ASCNT –

2009, CDAC, Noida, India, pp. 47 – 50.

Ramakrishnan Raghu and Gehrke Johannes. () Data base Management

Systems: second Edition. ISBN: 0-07-246535-2.

Sponberg, K. (2009). Mobile Text Messaging in Information Dissemination and

Public Alert. http://www.ranetproject.net/index.php?q=Mobile Text Messaging in

Information Dissemination and Public Alert. 5th Mar 2009.

Sulaiman, N.I.S and Burke, M (2009). A case analysis of knowledge sharing

implementation and job searching in Malaysia, International Journal of Information

Management. 29(4), 321-325.

Tiamiyu M.A. (2005). Information Systems Development: Managerial Strategies and

Methods, In: Tiamiyu M.A. Information Science Concept, Models and Applications.

Ibadan: Africa Regional Center for Information Science. pp.65-92.

The College of New Jersey, (2008). Text Message Alerts. (Internet),

http://www.tcnj.edu/pa/critical/textalerts.html. 28th January 2010.

The college Board. (2010).Information Systems & Computer Applications.(Internet),

http://www.collegeboard.com/student/testing/clep/ex_isca.html. 13th June 2010.

Umo, J. U. (1996); "Introductory Overview" in J. U. Umoh (ed.) Towards Full

Employment Strategy in Nigeria, National Manpower Board, Lagos.

106
Victor, U. (2009). The Nigerian Telecommunications Industry: Overview of Nigeria‟s

Telecommunication sector. (Internet), www.valuefronteira.com. 25th February 2010.

Zang Li and Wang H (2006). Intelligent information processing in human resource

management: an implementation case in China, The journal of knowledge

Engineering, 23 (5), 356-369.

http://www.nationsencyclopedia.com/economies/Africa/Nigeria.html. Site accessed

25/01/10

107
APPENDICES

Code View of the Web Site.

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">

<html>

<head>

<title>Research work:Jobs text alerts on your Mobile</title>

<meta name="keywords" content="Web solutions Alert mobile alert information


systems job alert jobs.com" />

<meta name="description" content="Job hunting and in a hurry? Let us text you any
new job as it gets published. Jobs straight to your mobile!" />

<link rel="stylesheet" type="text/css" href="css/mystyle.css" />

<link href="rss.xml" type="application/rss+xml" rel="alternate" title="Sitewide RSS


Feed" />

</head>

<body>

<img src="images/Banner.jpg" alt="dependable e-recruit" width="80%" height="100"


/>

<!-- Begin Navigation -->

<table border="2" width="" >

<tr>

<td>

<div id="navigation">

<ul>

<li><a href="index.html">Home</a></li>

<li><a href="about.html">About</a></li>

<li><a href="employers.html">Employers Page</a></li>

<li><a href="jobopenings.html">Jobopenings</a></li>

108
<li><a href="photo_gallery/photo_gallery.html">Photo
Gallery</a></li>

<li><a href="faq/faq.html">FAQ</a></li>

<li><a href="contact/contact.html">Contact</a></li>

</ul>

</div>

</td>

<td><img src="images/newspaper.jpg" alt="traditional job source" width="320"


height="250" /></td>

<td><p><b>JOB SEEKERS</b><div align="right" style="color: red; "> | RSS Feeds |


</div></p>

<h4>Jobs.com can be described by <b>5 easy steps</b>for the Job Seeker:</h4>

<ul>

<li>Register</li>

<li>Pick your Job Category(s)</li>

<li>Receive text alerts instantly when a job is posted in your category</li>

<li>be the first to apply for that dream Job</li>

<li>Manage your profile</li>

<li>Stop Receiving Text Alerts</li>

<li>Send SMS to this number <b>08033957506</b> standard tariff rates may be


applied by networks</li>

</ul>

</td></tr>

</table>

<!-- End Navigation -->

109
<h3>SMS Alerts on your Mobile! - Let Job Info Reach Your Hand!</h3>

<p>

Jobs.com(TM) pledges that the information you enter will not be shared with any
outside party without your expressed consent and that any e-mails you receive from
us will be related to your submissions.

For more information please read our Privacy Policy.

</p>

<form name="input" action="html_form_action.asp" method="post">

<fieldset >

<legend>Register Here</legend>

Username: <input type="text" size="30" /><br />

Password: <input name="Password1" type="password" class="style4"


size="20" maxlength="12"> Max 12 characters!<br />

Confirm password: <input name="Password1" type="password" class="style4"


size="20" maxlength="12"> <br />

Address: <input type="text" size="50" /><br />

Email: <input type="text" size="30" /><br />

Telephone: <input type="text" size="30" /><br />

Male: <input type="radio" name="gender" value="male" /><br />

Female: <input type="radio" name="gender" value="Female" /><br /><br


/>

Age: 20-26 <input type="radio" name="Age" value="Age"

Age: 27-30 <input type="radio" name="Age" value="Age" /><br />

Age: 30-34 <input type="radio" name="Age" value="Age" /><br />

Age: 35-39 <input type="radio" name="Age" value="Age" /><br />

Age:&nbsp; 40-45 <input type="radio" name="Age" value="Age" /><br />

Above 45&nbsp;&nbsp;&nbsp; <input type="radio" name="Age" value="Age"


/><br />

110
<h4><b>PICK YOUR JOB CATEGORIES / TYPE</b></h4>

<p> This is the most important step. Be sure to chose the categories specific to
work you want. These can be added or removed at any time. Ever wanted to work
<br />in a bar but changed your mind to working in a hotel? No problem, simply
unclick one category and re-click another, or click both! You can always log onto
the<br /> website and amend this in the future or CLICK STOP Alert.</p>

Administrator: <input type="checkbox" name=" Discipline" value="Administrator"


/><br />

Engineering: <input type="checkbox" name=" Discipline" value="Engineering" /><br


/>

IT: <input type="checkbox" name=" Discipline" value="IT" /><br />

Computer related:<input type="checkbox" name=" Discipline" value="computer


related" /><br />

Accountancy: <input type="checkbox" name=" Discipline" value="Accountancy"


/><br />

Engineering:<input type="checkbox" name=" Discipline" value="Engineering" /><br


/>

Environmental:<input type="checkbox" name=" Discipline" value="Environmental"


/><br />

Academic research: <input type="checkbox" name=" Discipline"


value="Research/Academic" /><br />

<h4>Choose State</h4>

<select name="States">

<option value=" " selected="selected"> </option>

<option value="Abuja">Abuja</option>

<option value="Oyo ">Oyo </option>

<option value="Ondo"> Ondo</option>

<option value="Kano "> Kano </option>

<option value="Bayelsa ">Bayelsa </option>

<option value="Lagos ">Lagos </option>

<option value="Delta"> Delta</option>

111
<option value="Sokoto ">Sokoto </option>

<option value="Kwara ">Kwara </option>

<option value="Cross River ">Cross River </option>

<option value="Maiduguri">Maiduguri</option>

<option value="Niger.">Niger </option>

<option value="Taraba">Taraba</option>

</select><br /><br />

Upload CV:<br />

<input name="File" type="cv">

<h5 valign="top">Feedback:</h5>

<textarea name="Request" style="height: 75px; width: 200px" >Please submit your


comments here, help us make our site better via our comments section. Best of luck
in your job seeking endeavours!

Thank you</textarea><br /><br />

<input type="Reset" value="Reset" />

<button type="button">STOP Alert!</button>

<input name="submit" type="submit" class="eto" value="submit" />

</fieldset>

</form>

<p>&nbsp;</p>

<h4>TEXT ALERTS SENT TO CANDIDATES</h4>

<p>Once approved by the jobs.com moderator, the job goes live and is immediately
text to anyone subscribed to that category of job.<br /> The job is also placed on the
website and can be reviewed by candidates.</p>

<p>&nbsp;</p>

<div id="content">

<!-- #BeginEditable "content" -->

112
<h2></h2>

<p></p>

<!-- #EndEditable "content" --></div>

<!-- End Content -->

<!-- Begin Footer -->

<div id="footer" align="center">

<p><a href="index.html">Home</a> | <a


href="about/about.htm">About</a> |

<a href="employers.html">Employers</a> | <a


href="jobopenings.html">Job Openings</a>

| <a href="photo_gallery/photo_gallery.htm">Photo Gallery</a> |

<a href="faq/faq.htm">FAQ</a> | <a


href="contact/contact.htm">Contact</a></p>

</div>

<!-- End Footer --></div>

<!-- End Container -->

</body>

</html>

113
Structure of the database: Jobsnaija

Data Dictionary of the database: Jobsnaija

114
115

You might also like