Preview

Hotel Management System

Powerful Essays
Open Document
Open Document
2911 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hotel Management System
PROJECT PROPOSAL 1. INTRODUCTION
Hotel reservation system plays a great role and has a potential effect on day to day performance measures, this type of system have highly evolved from decades due to high demand for their use, effective and efficiency in any given institutions. Due to the rapid change of technology the use of such system has become a necessity to any given high learning institution for better performance and be used with quite a large number of users at the same time but it can save time, resources and creates awareness of the evolving technology.
1.1 PROBLEM STATEMENT
Although technology is rapidly changing almost at the speed of light, some Hotels are still using manual reservation system to check in/out customers, Hotel facilities , management, share ideas and passing of information, for instance Staff performance assessment, customers roomt are done manually hence providing: * Providing untimely assessment information’s. * Consumes a lot of time, * Waste and use lots of resource such as forms.
The sub-objective are to identify the requirement and design the Hotel reservation system that will resolve the above problem of manual reservation system, by designing and implementing the proposed system successfully it will benefit many parties; firstly by providing staff with access of easy view form.

1.2. SYSTEM GOAL AND OBJECTIVE
1.3. GOALS
The main goal is to develop a Hotel reservation system to replace the paper based Hotel reservation. 1.4. OBJECTIVES: * To ease staff and admin with facilities for reservation process. * To enable sharing of ideas, harmonize and provide timely useful information on how best to enhance performance. * To ease decision making, save time and resources and utilize opportunities of new technology

1.5. SIGNIFICANCE OF THE SYSTEM * Encourage adherence to internationally accepted Hotel performance standards. * Ease reservation and management process and much easier to administer. * To



References: Als A., & Greenidge C. (2003), The Spiral Model, Adrian Als & Charles Greenidge[online], Available from: http://scitec.uwichill.edu.bb/cmp/online/cs22l/spiralmodel.htm [Accessed 20 January 2008] Basu A., Muylle S. (2003). Authentication in E-Commerce. Communication of the ACM [online], 46(12), 159-166. Available from: http://delivery.acm.org/10.1145/960000/953496/p159basu.pdf?key1=953496&key2= 5275191611&coll=portal&dl=ACM&CFID=2974689&CFTOKEN=61934647 [Accessed 27 September 2006] Basu A., Muylle S. (2003). Authentication in E-Commerce. Communication of the ACM [online], 46(12), 159-166. Available from: http://delivery.acm.org/10.1145/960000/953496/p159basu.pdf?key1=953496&key2= 5275191611&coll=portal&dl=ACM&CFID=2974689&CFTOKEN=61934647 [Accessed 27 September 2006] Bennet, D. (2000), Authorisation and Security Systems for E-Commerce, Murdoch Research Center [online], 1(3), 3-26. Available from: http://www.it.murdoch.edu.au/~smr/jour%/info/security/paper.html [Accessed 15 December 2004] Boehm B, W. (1998). A Spiral Model of Software Development and Enhancement. TRW Defense System Group [online], 61-72. Available from: http://www.sce.carleton.ca/faculty/ajila/4106-5006/Spiral%20Model%20Boehm.pdf [Accessed 15 November 2006] Cambridge University (2003). University Cambridge Smart Card [online]. Available at: http://www.admin.cam.ac.uk/offices/misd/univcard/ [Accessed 27 May 2005] Carrigan R., Milton R. (2005). Education Security. 2005 Computerworld Honors Case Study [online], 1-4. Available from: http://delivery.acm.org/10.1185/960986/951226/p159basu.pdf?key1=998496&key2= 7775190311&coll=portal&dl=ACM&CFID=2449723&CFTOKEN=61286847 [Accessed 29 January 2006]

You May Also Find These Documents Helpful

  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is a hot topic in today 's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Exam Final ECOM 320

    • 3983 Words
    • 11 Pages

    Lesson 7: E-commerce security and controls Access control: Mechanism that determines who can legitimately use a network resource. Active tokens: Access token Authentication: Process to verify the real identify of an individual, computer, computer program, or EC website. Authorization: Determines whether a buyers card is active and whether the customer has sufficient funds. Biometric systems: Authentication systems that identify a person by measurement of biological characteristic, such as fingerprints, iris patterns, facial features, or voice. Biometric control: An automated method for verifying the identity of a person based on physical or behavioral characteristics. Botnet: A huge number of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet. Business continuity plan: A plan that keeps the business running after a disaster occurs. Each function in the business should have a valid recovery capability plan. Certificate authority (CA): Third parties that issue digital certificates. Ciphertext: a plaintext message after it has been encrypted into a machine-readable form. Confidentiality: Assurance data privacy and accuracy. Keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes. Cybercrime: Intentional crimes carried out on the Internet. Cybercriminal: A person who intentionally carries out crimes over the Internet. Crackers: A malicious hacker who may represent a serious problem for a corporation. Cryptography: is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Data breach: A security incident in which sensitive, protected, or confidential, data is copied transmitted, viewed, stolen, or used by an individual unauthorized to do so. Denial-of-service (DoS) attack: An attack on a website in which an attacker uses specialized software to send a…

    • 3983 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Bibliography: Kim, David and Michael G. Solomon. “Fundamentals of Information Systems Security.”, 15-42. Sunbury, MA: jones and Bartlett Learning, 2012.…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    In this document I am going to explain the security issues that every e-commerce possible faces and how to overcome them.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Better Essays

    LaRoche, G. (2008). Fingering Transactional Strong Authentication. Security: Solutions for Enterprise Security Leaders, 45(3), 110-112.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Sanhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    The software, held by Hotel SystemsPro, LLC is one of lodging’s industry most significant technology developments in past ten years. According to Hotel ServicePro (2012), It is a Computer Maintenance Management System (CMMS) which automates the communicating, scheduling, tracking and reporting of safety requirements, preventive maintenance, guest requests, equipment management, capital expenditure and property improvement. As it offers various solutions, I will introduce guest request solution.…

    • 1163 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    ROAR! And there goes Beorn through the meadows and into his own home as he gets his head stuck through the door, right after the party enters! There is a small hobbit named Bilbo Baggins, who is invited, by a wizard named Gandalf, to a journey where there are many dangers that are encountered with some characters.There are little to no characters who help and support the party throughout the remaining part of the journey. One of those type of characters, is named Beorn. Beorn is a character that appears in the novel named The Hobbit by J.R.R. Tolkien. There is a remake of the book in a movie version called The Hobbit and it is directed by Peter Jackson. The book was originally published during the year 1937. The movie of The Hobbit was released in the year 2012. In the movie, Gandalf, Bilbo, and the dwarves meet Beorn in a dramatic way in which Beorn chases them to his own home, while in the novel Gandalf tells the party to go in pairs to make it as interruptions to make Beorn more interested in the story and if they were to be sent off at once then they would seem like suspicious beggars. Also, in the movie, the party slept in on hay while in the novel Beorn’s beds are described as beautiful-looking and rich-looking. Otherwise, the book is more effective than the film.…

    • 1176 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Hussein, Handbook of Information Security ( I, 38-64). Hoboken, New Jersey: John Wiley & Sons,…

    • 483 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Strategic Planning

    • 3430 Words
    • 16 Pages

    Greenstein, M & Vasarhelyi, M. (2002) Electronic Commerce: Security, Risk Management, and Control. The McGraw-Hill Company…

    • 3430 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    A hotel is a building where travelers can pay for lodging, meals and other activities. Hotel Management involves combination of various skills like management, marketing, human resource development, and financial management, inter personal skills, dexterity, etc. Hotels are a major employment generator in tourism industry. Hotel management can be a very lucrative field, both in terms of annual revenues Furthermore, hotels are big attractions to businesses and associations looking to hold events. Booking an event means additional revenue for the use of a conference or banquet room, in addition to overnight guests who may use laundry and other concierge services. Work in the area of Hotel Management involves ensuring that all operations, including accommodation, food and drink and other hotel services run smoothly. Hotel management system goes a long way to assist hotels in achieving its aims.…

    • 1755 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    This project Online Hotel Management System is to design a web based system. Which facilitates online reservation of hotel accommodations from anywhere in the world. In this project there are two modules. They are:-…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Hotel Online Reservation

    • 2549 Words
    • 11 Pages

    In today’s world of business in which technology has a part to play on where small or large business are slowly blooming and this particular business is in where leisure and relaxation is being presented the business of Hotel Management. On this kind of business they are always other competitor, so this is where technology will come they want a system and android base of application where they can make their business efficient so they want a reservation system on where it can book or reserve a room in where if they are vacancy or not, and notify on in coming events or news of their stay.…

    • 2549 Words
    • 11 Pages
    Best Essays