You are on page 1of 19

MIS is the use of information technology, people, and business processes to record, store and process

data to produce information that decision makers can use to make day to day decisions.

MIS is a collection of systems, hardware, procedures and people that all work together to process, store,
and produce information that is useful to the organization.

Types of info system


BASIS FOR CLASSIFICATION OF INFORMATION SYSTEMS
The most common way of classification is based on a four level pyramid model based on the
people who use the systems.
Basing the classification on the people who use the information system means that many of the
other characteristics such as the nature of the task and informational requirements, are taken
into account more or less automatically.

Transaction processing system


Transaction Processing System are operational-level systems at the bottom of the pyramid.

They are usually operated directly by shop floor workers or front line staff, which provide the key
data required to support the management of operations.

This data is usually obtained through the automated or semi-automated tracking of low-level
activities and basic transactions.

TPS are ultimately little more than simple data processing systems
Some examples of TPS
•Payroll systems
•Order processing systems
•Reservation systems
•Stock control systems
•Systems for payments and funds transfers
The role of TPS
•Produce information for other systems
•Cross boundaries (internal and external)
•Used by operational personnel + supervisory levels
•Efficiency oriented

CRS
§​Computerised networks and electronic distribution in tourism emerged in the early 1970s, through
internal CRSs.

§​They became central to the distribution mix and strategy of airlines.

§​CRSs are widely regarded as the critical initiators of the electronic age, as they formulated a new travel
marketing and distribution system.

§​A CRS is essentially a database which manages the inventory of a tourism enterprise, whilst it
distributes it electronically to remote sales offices and external partners.

§​ Intermediaries and consumers can access the inventory and they can make and confirm reservations.

§​Airlines pioneered this technology, although hotel chains and tour operators followed by developing
CRSs.

Characteristics of crs

§​CRSs enable principals to control, promote and sell their products globally, while facilitating their yield
management.

§​In addition, they integrate the entire range of business functions, and thus can contribute to principals’
profitability and long term prosperity.
§​CRSs often charge competitive commission rates in comparison with other distribution options, whilst
enabling flexible pricing and capacity alterations in order to adjust supply to demand fluctuations.

§​CRSs also reduce communication costs, while providing intelligence information on demand patterns or
the position of partners and competitors.

§​Hence, CRSs contribute enormously to both the operational and strategic management of the industry.

Services CRS
§​Computer Reservation Systems (CRSs) satisfy the needs of consumer for convenient access to transparent and
easy to compare information.
§​They cover the entire variety of choices of travel, lodging and leisure services, destinations, holiday packages, as
well as display the actual prices and availability of such services.

§​These services also provide immediate confirmation and speedy documentation of reservations, allowing a greater
degree of flexibility and enabling prospective travellers to book at the "last minute".

§​Experienced travellers are therefore empowered by information and booking systems and increase their personal
efficiency by creating tailor-made products independently.

§​ ITs also assist principals to understand consumer needs through marketing research and loyalty/partnership
schemes.

§​ Improved access to information covering all aspects of tourist activities provides the framework for offering
personalised services at price levels comparable to those of standard packages.

Distributed
LAN
•​Local Area Network is a group of computers connected to each other in a small area such as building,
office.
•​LAN is used for connecting two or more personal computers through a communication medium such as
twisted pair, coaxial cable, etc.
•​It is less costly as it is built with inexpensive hardware such as hubs, network adapters, and ethernet
cables.
•​The data is transferred at an extremely faster rate in Local Area Network.
•​Local Area Network provides higher security.
PAN
•​Personal Area Network is a network arranged within an individual person, typically within a range of 10
meters.
•​Personal Area Network is used for connecting the computer devices of personal use is known as
Personal Area Network.
•​Thomas Zimmerman​ was the first research scientist to bring the idea of the Personal Area Network.
•​Personal Area Network covers an area of ​30 feet​.
•​Personal computer devices that are used to develop the personal area network are the laptop, mobile
phones, media player and play stations.
MAN
•​A metropolitan area network is a network that covers a larger geographic area by interconnecting a
different LAN to form a larger network.
•​Government agencies use MAN to connect to the citizens and private industries.
•​In MAN, various LANs are connected to each other through a telephone exchange line.
•​The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3, ADSL, etc.
•​It has a higher range than Local Area Network(LAN).

WAN
•​A Wide Area Network is a network that extends over a large geographical area such as states or
countries.
•​A Wide Area Network is quite bigger network than the LAN.
•​A Wide Area Network is not limited to a single location, but it spans over a large geographical area
through a telephone line, fibre optic cable or satellite links.
•​The internet is one of the biggest WAN in the world.
•​A Wide Area Network is widely used in the field of Business, government, and education.

Topologies ​The arrangement of a network which comprises of nodes and connecting lines via sender
and receiver is referred as network topology.

MESH

STAR

•​In star topology, all the devices are connected to a single hub through a cable.

•​This hub is the central node and all others nodes are connected to the central node.

•​The hub can be passive ​in nature i.e. not intelligent hub such as broadcasting devices, at the
same time the hub can be intelligent known as active ​hubs.
•​Active hubs have repeaters in them.

•​Advantages of this topology :


–​If N devices are connected to each other in star topology, then the number of cables required to connect them is
N. So, it is easy to set up.

–​Each device require only 1 port i.e. to connect to the hub.

•​Problems with this topology :


–​If the concentrator (hub) on which the whole topology relies fails, the whole system will crash down.
–​Cost of installation is high.
–​Performance is based on the single concentrator i.e. hub.

BUS

•​Bus topology is a network type in which every computer and network device is connected to single cable.

•​It transmits the data from one end to another in single direction.

•​No bi-directional feature is in bus topology.

•​Advantages of this topology :


–​If N devices are connected to each other in bus topology, then the number of cables required to connect them is 1 ​which is known as
backbone cable and N drop lines are required.

–​Cost of the cable is less as compared to other topology, but it is used to built small networks.

•​Problems with this topology :


–​If the common cable fails, then the whole system will crash down.

–​ If the network traffic is heavy, it increases collisions in the network. To avoid this, various protocols are used in MAC layer known as Pure
Aloha, Slotted Aloha, CSMA/CD etc.

RING

•​Advantages of this topology :


–​The possibility of collision is minimum in this type of topology.

–​Cheap to install and expand.

•​Problems with this topology :


–​Troubleshooting is difficult in this topology.

–​Addition of stations in between or removal of stations can disturb the whole topology.

HYBRID

•​​This topology is a collection of two or more topologies which are described above.

•​This is a scalable topology which can be expanded easily.

•​It is reliable one but at the same it is a costly topology.

TRANSMISSION MEDIA
•​In data communication terminology, a transmission medium is a physical
path between the transmitter and the receiver i.eit is the channel through
which data is sent from one place to another.
Hotel MANAGEMENT SYSTEM
¡​A Hotel property management system (Hotel PMS) is a software that helps hotels efficiently
organize, schedule and manage their daily operations.
¡​It enables hotels, both small & independent and groups to handle front office workflow

including booking, guest check-in & checkout, assigning rooms to guests, delegating
housekeeping tasks and billing etc.
¡​Also referred to as a Hotel Software and working as the nerve centre of hotel operations, it

ensures the seamless flow of interdepartmental information.


¡​This helps hotel staff to better coordinate the operational functions across all the departments.

¡​In simple words, a hotel PMS automates and streamlines operations, saves man-hours and

helps serve guests better.


BENEFITS
¡​Centralized Control
§​The hotel manager can regulate all the small hotel software modules easily from a single interface. This helps him govern all
the daily functioning of the hotel. The everyday happening in each unit of the hotel can be observed in real-time and
improved if required.
¡​Dependable System
§​Another main reason for using small hotel management software is that it brings in a dependable system which eliminates
human flaws. All reservations are instantly and digitally documented with hotel reservation management software.
¡​Added Convenience
§​The software can make the procedure of bookings far more appropriate for people looking for rooms. They can check which
rooms are available and then make a reservation. The software helps people pick a room with the facilities they require. It
also allows global guests to make a reservation, without incurring the charges of a trans-national phone call.
¡​Stress-free Generation of Invoices and Reports
§​Cloud based Hotel software records reservations, guests, transactions, invoices, etc. It allows for the safekeeping of records
and accounts, thereby easing the process of generating reports. Hotel software easily produces invoices. Creating accurate
and real-time reports is a breeze with this software.
¡​Easy To Use
§​The software is extremely easy to use, without any need for training. The interface is instinctive, with online booking
systems that are cool for visitors to use. Also, the hotel staff can manage the internal software systems with no trouble.

DRAWBACKS
You might not be informed properly about the operational requirements of the software setup. You might want
¡​

to integrate the hotel management software into your website but not all kinds are able to be fully integrated
into your website system.
¡

Check out for the maximal level of support that the software can give. For example, certain software only
¡​

provide support for small or medium hotels and not for big enterprising ones.
Certain hotel billing software require the installation of additional cables across your hotel. For this, you might
¡​

have to undertake certain structural changes in your hotel and remodel it as it was originally.

TYPES OF E COMMERCE

There are 6 types of e-commerce systems. They are B2B, B2C, C2C, C2B, B2A,
C2A. All these 6 types of e-commerce that are used today are classified based
on the nature of the transaction.

B2B

B2B e-commerce can be simply defined as the commerce between companies. In Business-to-Business
type of electronic commerce system, companies do business with each other. For say, a manufacturer
selling a product to a wholesaler, a wholesaler selling a product to the retailer. Here manufacturer,
wholesaler and retailer all are doing their separate businesses.

B2c

B2C model works as its name suggest. In this model, the company sells their products, goods or services directly to
the consumer online. Here the customer can view products on the website that they want to buy and can order it.
After receiving the order details, the company will process the order and then send the products directly to the
customer. For example, Amazon, Flipkart etc are this type of e-commerce business model which we are using in

our daily life​.


C2c
Here a consumer sells products, goods or services to other consumers using the internet or the
web technologies. The C2C business model helps us to sell our assets or properties like a car,
house, bike, electronics etc via online to other consumers. OLX, Quickr etc are this type of
business model.

C2b
A consumer to the business model is a type of commerce where a consumer or end user
provides a product or service to an organization. It is the reverse model of the B2C or business
to consumer model, where businesses produce products and services for consumer
consumption. In this business model, individual customers offer to sell products or services to
the companies who are prepared to purchase them. For example, if you are a software
developer, then you can show a demo of your software or skills that you have on the sites like
freelancer, fiverretc.
B2a
B2A or business to administration also referred as the business to government (B2G) commerce,it is a derivative of
B2B e-commerce model. in this model, the businesses and government agencies (administration) use central
websites to exchange information and do business with each other more efficiently than they usually can off the
web.
B2G business is also referred to public sector marketing that means marketing products and services to various
government levels. The B2G business network provides a platform to businesses to bid on government
opportunities such as auctions, tenders and application submission etc.

C2a
Consumer to administration or consumer to government e-commerce model helps consumers
to request information or post various feedbacks regarding public sectors directly to the
government authorities or administration. For say, making electricity bill payments through the
website government, making payment of taxes, payment of health insurance etc are C2A type
of business model
Consumer to administration or consumer to government e-commerce model provides an easy
and instant solution or way to establish communication between the consumers and
government..

Components

The technology and infrastructure used to develop the E-commerce


application is the key to its success.
The hardware and software must be selected in such a way that they
can fulfill the needs of the E-commerce application.
1. Hardware:
A Web server hardware platform is one of the major components of the Ecommerce infrastructure on
which the performance of the whole E-commerce application depends.

While selecting Web server hardware, the software that will run on the server of the E-commerce
transactions to be processed must be considered.

The amount of the storage capacity and the computing power required depend on the volume of the
E-commerce transaction to be processed.

If the exact requirements are not known in advance, then the hardware configuration should be highly
scalable so that they can be upgraded to meet the requirements.

2. E - Commerce Softwares
Software is the main component that implements the E-commerce services and
functionality. Software for E-commerce can be categorized in the following two
types
Web server software

E-commerce softwares

Cyber crime

Ò​ ybercrime is any criminal activity that takes place in the ​cyberspace​.


One of the earliest and the most common types of cybercrime activity
Ò​

is hacking. It roughly started in the 1960s.


It involves stealing identities and important information, violating
Ò​

privacy, and committing fraud, among others.


Every country in the world has their varied laws and rules against
Ò​

cybercrime activities.
Types
Hacking involves the partial or complete acquisition of certain
Ò​

functions within a system, network, or website. It also aims to access to


important data and information, breaching privacy. Most “hackers”
attack corporate and government accounts. There are different types of
hacking methods and procedures.
In simple words, hacking is an act committed by an intruder by
Ò​

accessing your computer system without your permission.


Ò​Identify theft is a specific form of fraud in which cybercriminals steal
personal data, including passwords, data about the bank account, credit
cards, debit cards, social security, and other sensitive information.
Through identity theft, criminals can steal money.
Ò​Spamming uses electronic messaging systems, most commonly emails
in sending messages that host malware, fake links of websites, and
other malicious programs. Email spamming is very popular. Unsolicited
bulk messages from unfamiliar organizations, companies, and groups
are sent to large numbers of users. It offers deals, promos, and other
attractive components to deceive users.
Ò​Phishers act like a legitimate company or organization. They use
“email spoofing” to extract confidential information such as credit card
numbers, social security number, passwords, etc. They send out
thousands of phishing emails carrying links to fake websites. Users will
believe these are legitimate, thus entering their personal information.

Ò​Pharming is another scam where a fraudster installs malicious code on


a personal computer or server.
Ò​This code then redirects any clicks you make on a website to another
fraudulent Website without your consent or knowledge.

Ò​Unfortunately, phishing emails are not the only way people can try to
fool you into providing personal information in an effort to steal your
identity or commit fraud. Fraudsters also use the phone to solicit your
personal information. This telephone version of phishing is sometimes
called vishing. Vishing relies on “social engineering” techniques to trick
you into providing information that others can use to access and use
your important accounts. People can also use this information to
assume your identity and open new accounts
Ò​Just like phishing, smishing uses cell phone text messages to lure
consumers in. Often the text will contain an URL or phone number. The
phone number often has an automated voice response system. And
again, just like phishing, the smishingmessage usually asks for your
immediate ​attention.

Ò​DDoS or the Distributed Denial of Service attack is one of the most


popular methods of hacking.
Ò​It temporarily or completely interrupts servers and networks that are
successfully running.
Ò​When the system is offline, they compromise certain functions to
make the website unavailable for users.
The main goal is for users to pay attention to the DDoS attack, giving
hackers the chance to hack the system
Ò
Ò​Cyberstalking involves following a person online anonymously. The
stalker will virtually follow the victim, including his or her activities.
Most of the victims of cyberstalking are women and children being
followed by men and pedophiles.
Ò​The internet is filled with torrents and other programs that illegally
duplicate original content, including songs, books, movies, albums, and
software. This is a crime as it translates to copyright infringement. Due
to software piracy, companies and developers encounter huge cut
down in their income because their products are illegally reproduced.

Safety
Ò​Video Surveillance Systems
Ð​Today, almost every high-end hotel has video monitoring devices
installed in their premises.
Ð
Ò​Alarm Systems
There are different types of alarm systems that can be equipped
in hotels such as local alarms, contact alarms, and remote alarms.
É​Local alarms may serve as deterrents, as they are not hard-wired to a
central monitoring location. An example of a local alarm system that
is integrated with the panic hardware on a fire exit – when the exit
door is opened, the circuit is broken and the alarm gets triggered.
É
É​Contact alarms are hard-wired to a central point. Most silent alarms
are always hard-wired to a central point are usually equipped in
cashier areas, storerooms, and other areas. The alarm is silently
transmitted to the telephone room, a private security service
provider, or the police department. The culprit won’t even realize and
the on-premises personnel will be alerted.
É
É​Remote alarms typically rely on some sort of transmission. For
example, the more elaborate radio waves, microwaves, and
photoelectric light. Microwave detectors are active units designed to
detect motion through the transmission and reception of
electromagnetic energy.
Ò​Sprinkler Systems And Carbon Monoxide Detectors
É​Sprinkler systems are mandatory in establishments that are
four-storeyed or higher. Sprinklers can, to an extent, control the
outbreak of a fire with the help of which the security personnel can
safely direct and lead the guests to safety.
É​Carbon monoxide is most dangerous gas generated in any
combustion. It is generally produced as a by-product of a
malfunctioning water heater, HVAC unit, kerosene heater, coal boiler,
or any other petroleum unit. Its hazardous nature can cause deaths,
hence, installing carbon monoxide detectors becomes imperative in
hotels.
Gds
¨​A global distribution system is a computer network, which empowers
service providers in the travel industry to carry out seamless
transactions. In particular, a GDS is often used by a travel agency, in
order to see real-time information and data about the availability of
hotel rooms, flights and other travel services.
¨​Using that information, travel agents can then sell travel products and
services to their clients.

Why hotels should use gds


¨​Essentially, the GDS can increase hotel bookings and revenue by
placing hotels on more ‘supermarket shelves’ globally. ​This approach is
particularly effective at capturing international corporate travellers.
¨​But there are many reasons why a hotel might need a GDS solution
including:

¨​The number of bookings generated through a GDS generally


outpaces that of direct bookings. While direct bookings are rising, and
they do represent a significant amount of revenue for hotel operators,
there are still more bookings being generated through the GDS than
through h​otel websites.
¨¨A lot of travel agents who specialise in corporate travel use a GDS to
get their clients booked quickly and efficiently.
¨The GDS can help hotel managers uncover new market segments to
promote their products to. In many cases, hotel operators discover
through the GDS that there are traveller market segments interested in
their products that they couldn’t previously reach.

¨Hotels generate more revenue through a GDS because it places the


hotel’s information, availability and rates in prominent locations where
it is easy for travel agents to find. It helps hotels maximise their
bookings during any given time period while also reaching powerful
travel markets that are willing to spend money in order to book the
best room available.

¨​More travel agents are relying on the GDS to find the best places for
their clients to stay. Every year, more agents are realising that this is
the best way to easily connect with hotel properties from around the
world. Through the GDS, the agents have access to live rates and
availability, and they can easily book rooms for their clients.
¨​When you complete your hotel description comprehensively, the GDS
improves search positioning and displays your brand messaging during
the search and booking process, which means travel agents are more
easily able to source your hotel for their clients.
Tps
​In a hotel scenario, a transaction processing system might include basic
business operations such as hotel bookings, purchase orders, receipts,
time cards, invoices, and payroll checks in a hotel.

​Transaction processing produces valuable input into many other
systems in an organization, such as management information systems
and decision support systems.

​A transaction processing system serves as the foundation for these
other systems. A transaction processing system tracks routine
operations but does not provide much support for decision making.

​Two methods that hotels use are Batch and online
1. Batch
It involves processing several transactions, called a batch, at the same
time. Transactions are accumulated for a certain period of time and
updates are made all together.
2. Online
A system where each transaction is processed immediately, saving time
and reduces cost eventually

Trends that have reshapeed hospitality


​#1 - Virtual communities
Social networks and in particular ​TripAdvisor​ have had a profound
impact on customers. This has led to more transparency and,
overall, to an improved quality of the services provided by
hospitality companies.
​#2 - Sharing economy
Airbnb​ represents a major disruption in the hotel industry, making
the competitive landscape tougher than ever. This is further
reinforced by the fact that lodging properties listed on ​Airbnb​ do
not necessarily have to comply with the same rules and regulations
than traditional hotels.
​#3 - Online Travel Agents (OTAs)
They have had at least three major impacts on the hospitality
industry.
First, they have altered distribution channels and consequently
taken value away from hoteliers.
Second, the notoriety of brands owned by ​Booking Holdings​ and
Expedia​ are such that these companies have almost replaced hotel
brands.
Third, they have built solid relations with travelers. Now, hoteliers
have to pay to get access to these customers, thereby leading to a
thinner profit margin for the
​#4 - Digitalized guest experiences
Apps, in particular, are increasingly important in the way hoteliers
manage the services they provide to their customers and can now
control many aspects of the guest cycle and experience.
​#5 - Booming global tourism
Low cost carriers enable more people to travel the world at a
reasonable price. Moreover, several emerging markets have seen their
GDP increase at a rapid pace, thereby enabling their citizens to travel
the world. Customers from South Korea, China, India, and others, now
constitute a large body of potential travelers. Their demand, of course,
has a big impact on the offer.

​#6 - Experience economy
Customers request extreme personalization, unique experiences, and
so on. This could very well lead to ​the death of the travel agent​ and the
rise of the ​independent traveler.​

​#7 - Asset management practices
The asset-light approach has become prevalent in the industry. The
separation between the management of operations and real-estate
assets now allows hospitality companieto focus on their core business,
thus improving efficiencies.
It however induces additional complexity and potential agency
problems, explaining the emergence of new types of jobs, such as
asset managers.
​#8 – Professionalization
As stated above, new job profiles have emerged following the
increasing complexity of the hospitality industry. In parallel, the need
for quantitative competencies (for forecasting, budgeting, etc.) has also
increased.

​#9 - Generations Y and Z
These new generations have different requirements and needs
compared to older generations. A respondent said “​Older generations
think about hotels and car rentals. Younger generations think about
Airbnb and Uber.​”

​#10 – Sustainability
People are becoming increasingly sensitive to environmental and social
issues.

You might also like