Preview

Hotel Management System

Powerful Essays
Open Document
Open Document
2911 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hotel Management System
PROJECT PROPOSAL 1. INTRODUCTION
Hotel reservation system plays a great role and has a potential effect on day to day performance measures, this type of system have highly evolved from decades due to high demand for their use, effective and efficiency in any given institutions. Due to the rapid change of technology the use of such system has become a necessity to any given high learning institution for better performance and be used with quite a large number of users at the same time but it can save time, resources and creates awareness of the evolving technology.
1.1 PROBLEM STATEMENT
Although technology is rapidly changing almost at the speed of light, some Hotels are still using manual reservation system to check in/out customers, Hotel facilities , management, share ideas and passing of information, for instance Staff performance assessment, customers roomt are done manually hence providing: * Providing untimely assessment information’s. * Consumes a lot of time, * Waste and use lots of resource such as forms.
The sub-objective are to identify the requirement and design the Hotel reservation system that will resolve the above problem of manual reservation system, by designing and implementing the proposed system successfully it will benefit many parties; firstly by providing staff with access of easy view form.

1.2. SYSTEM GOAL AND OBJECTIVE
1.3. GOALS
The main goal is to develop a Hotel reservation system to replace the paper based Hotel reservation. 1.4. OBJECTIVES: * To ease staff and admin with facilities for reservation process. * To enable sharing of ideas, harmonize and provide timely useful information on how best to enhance performance. * To ease decision making, save time and resources and utilize opportunities of new technology

1.5. SIGNIFICANCE OF THE SYSTEM * Encourage adherence to internationally accepted Hotel performance standards. * Ease reservation and management process and much easier to administer. * To



References: Als A., & Greenidge C. (2003), The Spiral Model, Adrian Als & Charles Greenidge[online], Available from: http://scitec.uwichill.edu.bb/cmp/online/cs22l/spiralmodel.htm [Accessed 20 January 2008] Basu A., Muylle S. (2003). Authentication in E-Commerce. Communication of the ACM [online], 46(12), 159-166. Available from: http://delivery.acm.org/10.1145/960000/953496/p159basu.pdf?key1=953496&key2= 5275191611&coll=portal&dl=ACM&CFID=2974689&CFTOKEN=61934647 [Accessed 27 September 2006] Basu A., Muylle S. (2003). Authentication in E-Commerce. Communication of the ACM [online], 46(12), 159-166. Available from: http://delivery.acm.org/10.1145/960000/953496/p159basu.pdf?key1=953496&key2= 5275191611&coll=portal&dl=ACM&CFID=2974689&CFTOKEN=61934647 [Accessed 27 September 2006] Bennet, D. (2000), Authorisation and Security Systems for E-Commerce, Murdoch Research Center [online], 1(3), 3-26. Available from: http://www.it.murdoch.edu.au/~smr/jour%/info/security/paper.html [Accessed 15 December 2004] Boehm B, W. (1998). A Spiral Model of Software Development and Enhancement. TRW Defense System Group [online], 61-72. Available from: http://www.sce.carleton.ca/faculty/ajila/4106-5006/Spiral%20Model%20Boehm.pdf [Accessed 15 November 2006] Cambridge University (2003). University Cambridge Smart Card [online]. Available at: http://www.admin.cam.ac.uk/offices/misd/univcard/ [Accessed 27 May 2005] Carrigan R., Milton R. (2005). Education Security. 2005 Computerworld Honors Case Study [online], 1-4. Available from: http://delivery.acm.org/10.1185/960986/951226/p159basu.pdf?key1=998496&key2= 7775190311&coll=portal&dl=ACM&CFID=2449723&CFTOKEN=61286847 [Accessed 29 January 2006]

You May Also Find These Documents Helpful

  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is a hot topic in today 's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Exam Final ECOM 320

    • 3983 Words
    • 11 Pages

    Lesson 7: E-commerce security and controls Access control: Mechanism that determines who can legitimately use a network resource. Active tokens: Access token Authentication: Process to verify the real identify of an individual, computer, computer program, or EC website. Authorization: Determines whether a buyers card is active and whether the customer has sufficient funds. Biometric systems: Authentication systems that identify a person by measurement of biological characteristic, such as fingerprints, iris patterns, facial features, or voice. Biometric control: An automated method for verifying the identity of a person based on physical or behavioral characteristics. Botnet: A huge number of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet. Business continuity plan: A plan that keeps the business running after a disaster occurs. Each function in the business should have a valid recovery capability plan. Certificate authority (CA): Third parties that issue digital certificates. Ciphertext: a plaintext message after it has been encrypted into a machine-readable form. Confidentiality: Assurance data privacy and accuracy. Keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes. Cybercrime: Intentional crimes carried out on the Internet. Cybercriminal: A person who intentionally carries out crimes over the Internet. Crackers: A malicious hacker who may represent a serious problem for a corporation. Cryptography: is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Data breach: A security incident in which sensitive, protected, or confidential, data is copied transmitted, viewed, stolen, or used by an individual unauthorized to do so. Denial-of-service (DoS) attack: An attack on a website in which an attacker uses specialized software to send a…

    • 3983 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    LaRoche, G. (2008). Fingering Transactional Strong Authentication. Security: Solutions for Enterprise Security Leaders, 45(3), 110-112.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Bibliography: Kim, David and Michael G. Solomon. “Fundamentals of Information Systems Security.”, 15-42. Sunbury, MA: jones and Bartlett Learning, 2012.…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Sanhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    In this document I am going to explain the security issues that every e-commerce possible faces and how to overcome them.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Hussein, Handbook of Information Security ( I, 38-64). Hoboken, New Jersey: John Wiley & Sons,…

    • 483 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The software, held by Hotel SystemsPro, LLC is one of lodging’s industry most significant technology developments in past ten years. According to Hotel ServicePro (2012), It is a Computer Maintenance Management System (CMMS) which automates the communicating, scheduling, tracking and reporting of safety requirements, preventive maintenance, guest requests, equipment management, capital expenditure and property improvement. As it offers various solutions, I will introduce guest request solution.…

    • 1163 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Strategic Planning

    • 3430 Words
    • 16 Pages

    Greenstein, M & Vasarhelyi, M. (2002) Electronic Commerce: Security, Risk Management, and Control. The McGraw-Hill Company…

    • 3430 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Nowadays in this generation every work is required to be done in an easy way to efficiently use time and effort yet still having a productive report. An example of this is upgrading Femar Garden hotel and resort existing manual reservation system to online reservation system. Having this implemented, the administrator/head organizer and the receptionist will have the ability to conveniently access customers within and outside the vicinity of Antipolo. Thus giving them ease and less burden of encoding, recording and generating reports manually. Also with this online reservation system femar’s customers will have the convenience of reserving a room or booking an event whenever they want at the comfort of their own home.…

    • 1713 Words
    • 6 Pages
    Good Essays
  • Best Essays

    Hotel Online Reservation

    • 2549 Words
    • 11 Pages

    In today’s world of business in which technology has a part to play on where small or large business are slowly blooming and this particular business is in where leisure and relaxation is being presented the business of Hotel Management. On this kind of business they are always other competitor, so this is where technology will come they want a system and android base of application where they can make their business efficient so they want a reservation system on where it can book or reserve a room in where if they are vacancy or not, and notify on in coming events or news of their stay.…

    • 2549 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Hotel management system as an automated system will enable hotels provide all round services to their various customers or stakeholders through digital or electronic means. The system will assist management in its day-to-day business activities, make decisions.…

    • 1755 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    This project Online Hotel Management System is to design a web based system. Which facilitates online reservation of hotel accommodations from anywhere in the world. In this project there are two modules. They are:-…

    • 303 Words
    • 2 Pages
    Satisfactory Essays