computer systems that are used for managing of five primary components hardware

Computer systems that are used for managing of five

This preview shows page 14 - 16 out of 37 pages.

computer systems that are used for managing of five primary components: hardware, software,data and information for facilitating decision making, procedures for design, development anddocumentation of data, people in the form of individuals, groups or organization. In the mostbasic term, MIS is the term used to define how individuals, groups and organizations evaluate,design, implement, manage, and utilize systems to generate information to improve efficiencyand effectiveness of decision making. (Amish, 2014)MIS has a number of roles. First, it provides wide information about an organization for acustomer-focused industry like tourism and hospitality, MIS provides a big picture regarding theoverall organization wide information. It ensures updated and strategically important informationin the form of data and reports. Secondly it assists in decision-making process the output of MISis available in the form of reports which can be used extensively in the decision-making in theorganization. It also helps the organization to prepare strategically for the upcoming businessendeavor. Thirdly, it assists in managerial control and analysis. Better formulated, integrated andcentrally consolidated data and information provides a manager with an insight regarding theoverall managerial process of an organization. It enables a manger to have a firm control over themanagerial activities and process. Lastly, MIS being a computer based process enables a tourismand hospitality industry to provide a swift and effective service to its customers. Real timeinformation about the organization is available which enables the organization to cater to theneeds of the customers’ in a prompt and effective way.2.1.2 Digital security systemsThere are various security systems in the front office that are applied in support of IT. Someexamples of these security systems are highlighted below. Segal (2015) discussed some ofsecurity systems applicable in hotels.2.1.2.1 Use of keycards
A key card is a magnetic strip that is inserted into a locking device to unlock a certain door or agroup of doors. These cards often look much like credit cards, with the same size and shape,along with a magnetic strip along the back side. They are as an alternative to mechanical keys.Use of keycards can be monitored and recorded in a system when the card is used. This makes iteasy to track a card and the specifics of the users. (Wikipedia, derived on 11thOctober, 2016)2.1.2.2 Biometric readersThis is an electronic device used to determine a person’s identity by detecting and matching theperson’s physical features like fingerprints to a data base. Employees use biometric readers andthis reduces incidences of suspicious behavior, where an employee can decide to cooperate withan enemy. They can be monitored. Other biometric readers can be used for personalized storagecabinets for guests and employee’s variables. These cabinets may be installed in guestrooms as

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture