0% found this document useful (0 votes)
13 views

Computerized Guest Information Tracking System..

Uploaded by

NWAOBI DANIEL
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Computerized Guest Information Tracking System..

Uploaded by

NWAOBI DANIEL
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 31

COMPUTERIZED GUEST INFORMATION TRACKING

SYSTEM

By

NWAOBI DANIEL CHUKWUFUMNAYA


FOS/20/21/265634

A SEMINAR WORK SUBMITTED TO THE DEPARTMENT


OF COMPUTER SCIENCE, FACULTY OF SCIENCE, DELTA
STATE UNIVERSITY, ABRAKA IN PARTIAL FULFILLMENT
OF THE REQURIEMENTS FOR THE AWARD OF DEGREE
OF BACHELOR OF SCIENCE (B.Sc.) IN COMPUTER
SCIENCE
TABLE OF CONTENT
Cover page
Table of content
Abstract
1.0 Introduction
1.1 Aim and Objectives
2.0 Computerized Guest Information Tracking System
2.1 Advantages and disadvantages of Computerized Guest
Information Tracking System
3.0 Technical implementation of Computerized Guest
Information Tracking System
4.0 Application Areas of Computerized Guest Information
Tracking System
4.1 Computerized Guest Information Tracking System in area
of Computer security
5.0 Conclusion
6.0 Reference
1.0 INTRODUCTION
Information technology is an essential tool to guest tracking.

The faster and more effectively it works, the safer our business

management is. Information system (IS) refers to a system that

comprises of persons, data records and activities that process

data and information in an organization, and it includes the

organization’s manual and automated processes. In a narrow

sense, the term information system refers to the specific

application software that is used to store data records in a

computer system and automates some of the information-

processing activities of the organization. The term information

technology has ballooned to encompass many aspects of

computing and technology, and the term has become very

recognizable. The information technology umbrella can be quite

large, covering many fields. IT professionals perform a variety of

duties that range from installing applications to designing

complex computer networks and information database.


Since the first wave of computerization in the 1970‟s, the

implementation of information technology within policing has

been questioned and often met with resistance. The

development of an information technology strategy must be

viewed in the context of increasing expectations and pressure

for reform within organizations.

1.1 AIM AND OBJECTIVES

The aim of this study is to design software that will serve as an

electronic register to keep record of daily guest to the bank.

The software will maintain a centralized database system for

the purpose of information sharing

1. To provide an electronic register to keep record of guest visit

to the bank

2. To produce a system where information and output report

will be produced much faster, more accurately and more

detailed.
3. Keeping record of total number of guests coming to the bank

on daily basis.

4. Keep track of old guest in case of any security breach.

5. Provide password to prevent unauthorized users from


accessing and manipulating information.

2.0 COMPUTERIZED GUEST INFORMATION TRACKING


SYSTEM
The introduction of computer into information technology has

massively improved the information need of organization; the

success of this machine is dependent on the knowledge base.

Therefore, one can be prompted to ask aloud

“What is a computer”. Funk, E.C. (1980) defined a computer as

an electronic device that can perform automatically and at a

high speed a sequence of logical operations according to

instructions given to it inform of a pre-arranged program.

Another author, Anigbogu, S.O. (2000) defined a computer as

an electronic device capable of accepting data and instructions,


processing the data based on the instructions to generate

results or output in such a manner that is yet to be equaled by

any other known machine to mankind.

Similarly, another author, Chimezie, F.O. (1990), defined it by


saying that

“Computers are looked upon as obedient servants who are ever

ready to free man from tedious procedures and produce results

as compared with human computing time”.

Yet another author, Obilikwu, P. (1995), defined computer as a

machine that is capable of accepting input data, store and

process the data based on

instructions given by the computer user and in this way

produce expected results, generally called output.

These definitions of computer would lead us to answer the

question “what is a program”. In his definition, Obilikwu, P.

(1995) defined a program as a sequence of instructions given to

the computer to perform a specific operation. From Encarta


Encyclopedia, computer program is a set of instructions that

directs a computer to perform some processing function or

combination of functions.

The above definitions of computer clearly demonstrated the

limitless area of operations of computer in as much as such task

is programmable. Computer is applicable in virtually all areas of

human endeavor ranging from Agriculture, Education, Business,

Sports, Entertainment, Medicine, Construction and Military etc.

French, C.S. (1992), in his book titled” computer Science” fourth

edition, he relates the relevance of computer to management

and stated that “a company needs information in which to base

decisions concerning the current operations and future plans. It

requires the information to be timely and accurate”. He then

cited the example of the use of computer in the area of

management control to production and stated “production

must be able
to production and stated “production must be able to respond

quickly to changes in demand and other circumstances. To do

so requires the provision of up-to-date information which is

accurate and timely”. Aluko, A.O. (1991) in a paper stated that

“in virtually any job whether clerical, technical, business, or

professional; whether it is a banking, medicine, education etc.

computers are useful tools” and that “computers are tools with

which we calculate, measure, assess, store, retrieve, regulate

and monitor information”. Hence, the blood and life – wire of

any system is information. A typical system (Education,

Management etc.) cannot survive without good management

information system (MIS).

Management information system (MIS) are information

systems, typically computer- based, that are used within an

organization. The concept of management information system

is a complex variable although Murdick,


R. (1971) simplified it when he said “there is probably no more

challenging and diversified subject than management theory,

system theory and computer science”.

Contact management system is typical information processing

system or organizational information system on people‟s

contact information. World Net describes an information

system (I.S) as “a system consisting of the

network of all communication channels used within an

organization, and includes software and hardware”. It may also

be defined as “a system that collects and processes data

(information) and provides it to mangers at all levels that use it

for decision making, planning, program implementation and

control.

The aim of information system in universities is improving the

quality and accuracy of information provided to all involved as

well as assisting universities in compiling and reporting

information.
Computerization is a social process for providing access to and

support for computer equipment to be used in activities such as

teaching, accounting, writing, designing, circuits, file processing

etc. computerization entails social choices about the levels of

appropriate investment and control over equipment and

expertise, as well as choices of equipment.

Dunlop and Kling (1991), by the early 1990s, computing and

telecommunications accounted for half of the capital

investments made by private firms. However, paper (1980),

Feigenbaum and McCorduck (1983) and Yourdon (1986) stated

that the most fervent advocates of computerization have

argued that the actual pace of computerization in schools,

factories and homes is too slow.

network of all communication channels used within an

organization, and includes software and hardware”. It may also

be defined as “a system that collects and processes data

(information) and provides it to mangers at all levels that use it

for decision making, planning, program implementation and

control.
The aim of information system in universities is improving the

quality and accuracy of information provided to all involved as

well as assisting universities in compiling and reporting

information.

Computerization is a social process for providing access to and

support for computer equipment to be used in activities such as

teaching, accounting, writing, designing, circuits, file processing

etc. computerization entails social choices about the levels of

appropriate investment and control over equipment and

expertise, as well as choices of equipment.

Dunlop and Kling (1991), by the early 1990s, computing and

telecommunications accounted for half of the capital

investments made by private firms. However, paper (1980),

Feigenbaum and McCorduck (1983) and Yourdon (1986) stated

that the most fervent advocates of computerization have

argued that the actual pace of computerization in schools,

factories and homes is too slow.


Papert (1979) argues that in a new computer – based school

cultivate, students will no longer simply be taught mathematics.

These visions portray an enchanted social order transformed by

advanced computing technologies. Other advocates are a bit

less romantic, but not less enthusiastic.

For example, cole (1972) argues:


Because of--- the insatiable desire of students for more

and more information at a higher level of complexity

and more sophisticated level of utilization… more

effective means of communication must be used…

Computers can provide a unique vehicle for this

transmission.

King (1986), others emphasize a labor-market pragmatism that


we label
“Vocational matching”. In this view, people will need computer

skills, such as programming, to compete in future labor markets

and to participate in a highly automated society; a responsible

school will teach some of these skills today. Kling (1986),

advocate of computer- based education promote a utopian


image of computer- using schools as places where students

learn in a cheerful, cooperative setting and where all teachers

can be supportive, enthusiastic mentors.

Hence, it is important to note that computer- based education

goes a long way in helping the students as well as the staff to

effectively make use of the computerized contact management

system. It also helps in convincing the stakeholders of the

importance and need for adopting the computerized contact

management system as it provides effective and accurate

handling of contact’s files.

Therefore, a computerized contact management system is

usually a system, which is implemented with a computer to

achieve the utmost efficiency and desired goals.

Russell, M. (1987) dealt extensively on the need for the use of

computers on such database system like contact management

system. In the words of Dimorji, David (2003).


At the center of any information system is a database,

which is any collection of related information grouped

together as a simple item. The term can also apply to

the ways in which information is catalogued, analyzed,

stored and used manually.

Russell was also of the view that without a computer, effective

handling of Contact‟ records cannot be achieved effectively.

According to him, “The oxford

University has more than ninety- six thousand student’s


records. No person
would precisely remember the details of these records”. The

computer is the most possible application to retain an unlimited

number of records with the utmost current updating

possibilities. This is true as can be seen as posited by Eloba, P.C.

(1992), Computer in school record keeping, Technical Education

Today, Vol. 3 No 182. “That at a department with over a

thousand candidates, with the use of computer, all qualified for

admission only 100 candidates need to be chosen. With the


ranking of the scores or grades of the candidates, the

management is in position to choose best candidates with the

best results with ease and on time” with the use of computer.

Again, many computerized systems have become more than

tools-they are environments that people sometimes find hard

to change and so on.

Kling and Suzanne Iacono, (1988) in a book “understanding


possible futures by
Acknowledging the past and present” argue that we have much

to learn about future uses and consequences of

computerization by carefully examining past and present

experiences. Knowing fully well how the University program is

being run (manually), studying the past and present

experiences energize the idea of computerization of the board

or the program.

Also, Rob Kling, (1994) illustrates that systems being

computerized offers exciting possibilities of manipulating large

amount of information rapidly with


little effort to enhance control, to create insights, to search for

information, and to facilitate cooperative work between people


2.1 ADVANTAGES AND DISADVANTAGES OF
COMPUTERIZED GUEST INFORMATION TRACKING
SYSTEM
ADVANTAGES
a) Sharing: In an organization, information from one department

can be readily shared with others.

b) Security: Users are given passwords or access only to the kind

of information they need to know. Thus, the Payroll department

may have access to employees‟ pay rate, but other

departments would not.

c) Fewer Files: With several departments having access to one file,

there are fewer files. Therefore, excess storage or what is called

„redundancy‟ is reduced.

d) Data Integrity: Older filing systems many times did not have
„integrity‟.

DISADVANTAGES
(a)The speed of processing data manually is low and prone to
errors.

(b) So many files, papers, drawers, filing cabinets are

employed. These occupy space and makes data transfer

cumbersome.
(c)There are no adequate security measures employed in any

manual system of data processing and storage. As a result

of this, some confidential files and documents could

consciously or unconsciously be exposed and these files are

not properly checked and restricted.

(d) Slow and inefficient database system which lacks cohesion

and consistency.

3.0 TECHNICAL IMPLEMENTATION OF COMPUTERIZED


GUEST INFORMATION TRACKING SYSTEM
An information specialist, Lucey (1991:141) defines computer-

based management information system as:

The combination of human and computer-

based resources that results in the

collection, storage, retrieval, communication

and use of data for the purpose of efficient

management of operations and for business

planning.
Computer-based information system is a feature of all

large organizations nowadays. The literature identifies

four kinds of computer-based information system:

Transaction Processing System (TPS), Management

Information System (MIS), Decision Support System

(DSS), and Executive Support System (ESS). Some

systems record routine activities: employees hired,

material purchased or produced, and the like. Such

recorded events are called transactions. Other systems

use these recorded events to help managerial planning

and control. The systems form a pyramid, each

primarily supporting one another level of management.

a) Transaction Processing System (TPS): This system records

day-to-day transactions such as customer orders, bills, inventory

levels, and production outputs. The TPS helps supervisors by

generating database that act as foundation for other

information system.
b) Management Information System (MIS): MIS summarizes the

detailed data of the transaction processing system standard

reports for middle-level managers. Such reports might include

production schedules and budget summaries.

c) Decision Support System (DSS): The DSS provides a

flexible tool for analysis. The DSS helps middle-level

managers and others in the organization analyze a wide

range of problems, such as effects of events and trends

outside the organization. Like the MIS, the DSS draws on

the detailed data of transaction processing system.

d) Executive Support System (ESS): The ESS is an easy-to-use

system that presents information in a very highly summarized

form. It helps top-level

management oversee the company’s operations and develop


strategic plans. The
ESS combines internal data from TPS and MIS with external data.
4.0 APPLICATION AREAS OF COMPUTERIZED GUEST
TRACKING SYSTEM
 Computerization in banking
Computerization has been a revolution in the banking industry.
The advent the usage of computers has enormously increased the
banking capabilities of the banks and they are able to offer better
and wider range of services to their customers. Internet banking,
mobile banking, ATM‟s etc. are all frits of computerization of the
banking industry. Banks are able to expand at a great rate and
offer services to more and more customers because of the use of
computers
 Computer Security

In computer security, access control includes authentication,


authorization and audit (Thomas, 2007). It also includes measures
such as physical devices, including biometric scans and metal
locks, hidden paths, digital signatures, encryption, social barriers,
and monitoring by humans and automated systems.

In any access control model, the entities that can perform actions
in the system are called subjects, and the entities representing
resources to which access may need to be controlled are called
objects (see also Access Control Matrix). Subjects and objects
should both be considered as software entities and as human
users (Thomas, 2007). Although some systems equate subjects
with user IDs, so that all processes started by a user by default
have the same authority, this level of control is not fine-grained
enough to satisfy the principle of least privilege, and arguably is
responsible for the prevalence of malware in such systems.

4.1 COMPUTERIZED GUEST INFORMATION TRACKING


SYSTEM IN AREA OF COMPUTER SECURITY
In computer security, access control includes authentication,
authorization and audit (Thomas, 2007). It also includes
measures such as physical devices, including biometric scans
and metal locks, hidden paths, digital signatures, encryption,
social barriers, and monitoring by humans and automated
systems.

In any access control model, the entities that can perform


actions in the system are called subjects, and the entities
representing resources to which access may need to be
controlled are called objects (see also Access Control Matrix).
Subjects and objects should both be considered as software
entities and as human users (Thomas, 2007). Although some
systems equate subjects with user IDs, so that all processes
started by a user by default have the same authority, this level
of control is not fine-grained enough to satisfy the principle of
least privilege, and arguably is responsible for the prevalence of
malware in such systems.

In some models, for example the object-capability model, any


software entity can potentially act as both a subject and object.
Access control models used by current systems tend to fall into
one of two classes: those based on capabilities and those based
on access control lists (ACLs) Harris, (2005). In a capability-
based model, holding an unforgettable reference or capability
to an object provides access to the object (roughly analogous to
how possession of your house key grants you access to your
house); access is conveyed to another party by transmitting
such a capability over a secure channel. In an ACL-based model,
a subject's access to an object depends on whether its identity
is on a list associated with the object (roughly analogous to
how a bouncer at a private party would check your ID to see if
your name is on the guest list); access is conveyed by editing
the list. (Different ACL systems have a variety of different
conventions regarding who or what is responsible for editing
the list and how it is edited.)

Both capability-based and ACL-based models have mechanisms


to allow access rights to be granted to all members of a group
of subjects (often the group is itself modeled as a subject).

Access control systems provide the essential services of


identification and authentication (I&A), authorization, and
accountability where:
Identification and authentication determine who can log
on to a system, and the association of users with the
software subjects that they are able to control as a
result of logging in;

Authorization determines what a subject can do;

Accountability identifies what a subject (or all subjects


associated with a user) did.

Identification and authentication (I&A) is the process of


verifying that an identity is bound to the entity that makes an
assertion or claim of identity. The I&A process assumes that
there was an initial validation of the identity, commonly called
identity proofing. Various methods of identity proofing are
available ranging from in person validation using government
issued identification to anonymous methods that allow the
claimant to remain anonymous, but known to the system if they
return. The method used for identity proofing and validation
should provide an assurance level commensurate with the
intended use of the identity within the system. Subsequently,
the entity asserts an identity together with an authenticator as
a means for validation. The only requirements for the identifier
are that it must be unique within its security domain.
Authenticators are commonly based on at least one of the
following four factors:

Something you know, such as a password or a personal


identification number (PIN). This assumes that only the
owner of the account knows the password or PIN needed
to access the account.

Something you have, such as a smart card or security


token. This assumes that only the owner of the account
has the necessary smart card or token needed to unlock
the account.

Something you are, such as fingerprint, voice, retina, or


iris characteristics.

Where you are, for example inside or outside a company


firewall, or proximity of login location to a personal GPS
device.

Authorization applies to subjects. Authorization determines


what a subject can do on the system.
5.0 CONCLUSION
The role of guest tracking information management has
become an integral part of an establishment set up in Nigerian
society that intended to keep good relationship between the
organization and her clients. The results of this study coupled
with the relative observation in similar organizations in this
country have shown an indication that guest information
management, as oxygen is to human lungs, is a function that
cannot be under-estimated and over ruled in any organization
where efficiency of operation is a matter of consideration. The
workforce or manpower resource of an organization is the most
valuable asset and as such, this aspect of managerial role
requires urgent and special attention.

Therefore, for an organization to run effectively, it must


have adequate finance, utilize its resources effectively and also
has to take care of its guest information in order that they could
contribute their quotas towards achieving individual and
organizational goals
6.0 REFENCES
Aluko, A.O.(1991). Personnel management theory and practice.
Lagos: Bencos Publisher.

Anigbogu S.O.(2000). Computer application and Operation 1st


Edition. Awka, Anambara: Optimum press.

Chimezie, F.O. (1990). The Quality and Depth of Customers


Relationship. Newyork: Smith and Sons Publishers.

Cyert, L. (1984). How to use Java 1st Edition. U.S.A: Macmillian


Publishers.

Dimorji, D. (2003). Introduction to Research Methodology. Lagos:


Ekon Press.

Dunlop,K.,& Kling, S. (1991). Service Management and Marketing.


Toronto,
Canada: Lexington Books.

Eloba, P.C. (1986). Computer in School Record Keeping Technical


Education.
Makurdi, Benue: Aveco Publishers.

Feigenbaum, L. & McCorduck, S. (1983). Management


information System. New jersey: Prentice - Hall inc.

French, C.S. (1992). Computer Science, 4th Edition. London: DP


Publication Ltd.
Funk, E.C. (1980). Data Models, Database Languages and
Database Management Systems. Newyork: Adison-
Wesley Publishing.

Harris, S. (2005). All in One CISSP Exam Guide, 3rd Edition.


California: McGraw Hill Publishers.

Kling, L., & Suzanne, I. (1988). Understanding possible futures by


Acknowledging the past and the present. New Delhi: Pearson
Education.

Lucey, T. (1991). Management Information System. London: ELBS, DP

Publishers.

Microsoft Co-oporation (1993). Microsoft Visual Basic


Programming System for windows. U.S.A: Microsoft Press.

Murdick, L. (1971). Management theory of computer. Kenya:


Zamani Publishers.

Olikwu, P. (1995). The Cost of Quality in Service Oriented Companies.


Benin: Zico Publishing.

O'Leary, Q. & O'Leary, P. (1996). Integrated Security Systems Design.


Butterworth, Heinemann: Delsell Publishing.

Rusell, M. (1987). I Genetics. New York: Benjamin Cummings.


Taylor, H. (1980), Data Models, Database Languages and
Database Management Systems. U.S.A: Adison-Wesley
Publishing Company.
.
is

You might also like