Implementation of A Data Driven Transaction Proces
Implementation of A Data Driven Transaction Proces
net/publication/308193324
CITATIONS READS
0 869
2 authors, including:
Ibrahim Inuwa
American University of Nigeria
20 PUBLICATIONS 32 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Ibrahim Inuwa on 05 May 2019.
9
International Journal of Computer Applications (0975 – 8887)
Volume 149 – No.6, September 2016
tactical usage is lowest [24]; [12]. These findings support the those of [12]. They found that the most highly utilized
notion that most restaurants use technology as a data software packages were office products (word processing and
processing tool to process sales and accounting data; spreadsheets) and accounting packages (over 80%). Less than
integration with other processes such as ordering from half of the independents used POS systems, time and
vendors is limited; and strategic use of systems is attendance systems, and recipe costing. Even fewer operators
underutilized. According to Oronsky and Chathoth as cited by used more advanced applications such as employee
[5], recent trends of information technology in the restaurant scheduling (28.9%) or food production forecasting (21.1%).
industry are customer feedback systems (e.g., customer
relationship management (CRM), social media activity Information technology can enable managers to make tactical,
integrated into CRM platform, and real-time, web-based operational, and strategic decisions. A foodservice
reporting), repeat business management applications (e.g., management consultant reported, all stages of the restaurant
e- reservation systems, POS integration into online ordering), production and service chain must act in concert to deliver
marketing management systems (e.g., POS software and quality products at the right prices to the right guests at the
handheld terminals), operational restaurant systems (e.g., right times. Restaurant technology can monitor and coordinate
wireless credit card authorization or mobile POS and revenue these activities in timely and focused manner. Failure to do so
management system, accounting/financial software, and can result in excess inventory, poor food and service quality,
integrated cost control software or inventory management underutilized capacity, and excess costs. The most common
tools), human resources management systems (e.g., labour use of systems is the use of POS. POS applications eliminate
management systems, labour screening and recruitment arithmetic errors, improve guest check control, increase
systems, and company intranet), and Back of House average guest check, reduce labor costs, improve reaction to
management systems (e.g., kitchen technologies, kitchen trends, reduce credit card expenses, and reduce undercharges.
management systems, kitchen displays, and kitchen printers). Theorize that these applications improve profitability. Firms
Chien, et al. [9] cited by [13] steered that self-governing that do not fully utilize the applications available to them are
restaurants in Iowa (n=144), and stated comparable results to losing opportunities to increase their profitability as shown in
Figure 1.
10
International Journal of Computer Applications (0975 – 8887)
Volume 149 – No.6, September 2016
kitchen or bar department to give the order because the order systems [16]. This is an integrated device to the main POS
lists will be display to the department's screen [20]. system, made of magnetic stripe readers, which are used for
credit card authorization and printing receipts to be signed [6].
According to [2] the applications used in restaurants are According to [19] integrating credit card payment into POS
classified into two: we have applications that are used in Front has increased the efficiency of the employee. Another piece of
of House (FOH) operations and the ones that are in Back of user-friendly POS hardware is the handhelds POS terminal,
House (BOH) operations. The FOH operations are done by which is also known as mobile POS device or tableside
taking orders and delivering food to guests and completing ordering device. A handheld POS terminal is a portable device
with payment process (2). There are numerous technology which has all the capability of the main functions of a pre-
applications that are used in the restaurant business processes. check POS system, as well as integrated tableside ordering
Most of the important technologies that are used in Front of and payment devices [16].
House are: point of sale systems (POS), POS integrated
modules, POS integrated payment applications and some Although the handheld terminals date back to the late 1970s
emerging technologies used in FOH [5]. POS system is “a [6] updated versions are still commonly used and are
network of cashiers and server terminals that typically handles increasing in popularity in the restaurant industry [18].
food and beverage orders, transmission of orders to the However, a passionately debated conversation about the
kitchen and bar, guest-check settlement, timekeeping, and advantages and disadvantages is still on-going even into the
interactive charge posting to guest folios” [7]. The core present [5]. Even though most of the literatures reviewed in
system for FOH & BOH processes is the POS application [2]. this paper, which most researchers developed systems for use
POS systems date back to the early 1980s. They make it in the restaurant business processes, most of which are based
possible to update prices, change menu items, and track sales on the use of POS. In this paper, the researchers have
data through POS systems, all in a simple and quick way [3]. developed a DD-TPS with integrated modules for POS,
A POS system has mainly two components, which are POS payroll management, credit card and inventory controls.
hardware and POS software [16] cited by [5].The POS
hardware systems are installed on computers and provide the 3. METHODOLOGY
capability of connecting any piece of equipment or device to According to [1] the system methodology in operations
the POS such as: touch screen terminal, integrated credit card research has generated widespread discussion in academic and
swipe device and table side ordering devices such as handheld practitioner circles. System methodology and design in
terminals [6]. [16] argued that the POS hardware is worthless operations research is pitching its tent towards system design
itself and cannot work for the purpose of the restaurants, so and methodology in information system. There is various
there should be some POS applications installed into POS method of developing a Data-Driven Transaction Processing
hardware to instruct to what to do, how to do it and when to System (DD-TPS) application for an organization. The
do it. development of the restaurant system/application involves
having a complete understanding of its design architecture.
Advancement in POS technology results in user-friendly POS The design has two phases (Front-end and Backend).
hardware such as touch 24 screen terminals which are very
informative and easy to use [11]. The eZee Burrp is another 3.1 System Design and Analysis
restaurant application that uses the POS system which was The Logical Model of DD-TPS: Having investigated the
fully integrated and spontaneous Restaurant/Bar POS business profile of AUN’s restaurant which describes overall
Software, the system is suitable to manage restaurant, bar, functions, processes and functions of the business, the
quick service restaurant, delivery, and take away outlets. It is researcher’s uses these facts as basic input requirements for
a simple approach system that is capable of supporting all the development of the logical models. In this study the
languages, easy to use, and comprises rock-solid security [20]. logical model of the System shows what the system must do
A touchscreen terminal is made of a flat screen and regardless of how it will be implemented. The modeling tool
microprocessor to control it [16]. It is a flexible device used to represent the external behavior of the system is Data
providing ease to data entry and meal selections, and Flow Diagram (DFD). We graphically describe the movement
eliminating incomplete orders [16]. Additionally, [3] state that of data through the DD-TPS System at various stages which
touch screen terminals decrease the number of staff working helps Users, Managers, and Non-technical users to understand
on the front line and decrease customers’ wait time. the design of the proposed DD-TPS. The DFD applied in this
Moreover, advanced touch screen terminals reduce the burden study is hierarchical, with a single top level. The Context
of employee training and increase employee effectiveness and Diagram in Figure 2 shows the highest level represented as a
efficiency [11]. In 2012, 81% of the bill payments in fine single process called context diagram. Also each of the entity
dining restaurants were processed through credit, debit and/or such as POS, Payroll, ATM Card payment, and Inventory is
pre-paid cards [21]. Therefore, an integrated credit card swipe indicated in context diagram.
device is now an inseparable part of the advanced POS
11
International Journal of Computer Applications (0975 – 8887)
Volume 149 – No.6, September 2016
Levels Zero Diagrams: Each of the entity (POS, Payroll, diagram in Figure 2 is further decomposes into level zero as
ATM Card payment, and Inventory) indicated in context shown in Figure 3.
Figure 3: Levels Zero Diagrams for POS, Payroll, ATM Card payment, and Inventory.
The researchers have used the eclectic blend of Newsvendor represent the system. The adopted inventory models
models from operations research and data flow diagram from (Newsvendor model) is used to build an inventory module of
information system. A combination of mathematical model the system, while data flow diagram was used to represent the
and pictorial or graphical models was also utilized to system at various stages of development which can help users,
12
International Journal of Computer Applications (0975 – 8887)
Volume 149 – No.6, September 2016
managers and non-technical users to understand the design of database-driven application with SMS (Short Messaging
the system. It shows how data moves through the system but Services) alert components. The back –end (Database) is
not the program logic or processing steps. created with SQL. Figure 4 is the structure and relationship
between the tables used for Payroll System.
Database Design for the System: This is the graphical model
that depicts the relationship among the table that store user’s
information within the database. The constructed DD-TPS is a
13
International Journal of Computer Applications (0975 – 8887)
Volume 149 – No.6, September 2016
data from the user or administrators. The system output The reason for adding Data Access Layer to the adopted 3 –
present information to the user either as a single query or in tier architecture is to provide security for the confidential data
report format. The system output varies from search results, and information of the organization. We assume that TDE
query reports, login authentication message, exception (Transparent Data Encryption) that came with MS-SQL
messages, etc. The system output is the most important Server to encrypt the entire database can be decrypted by any
component of a working system because the interactivity of data base administrator. In order to prevent the records in the
the system depends on its output. This is the main reason why database being hacked by intruders we introduce Data Access
the output of an information system determines the Layer with encryption algorithms to transform the incoming
effectiveness and efficiency of the system. and processed data (Information) into Cipher-text. The
client/server design (see Figure 6) style is adopted and modify
3.2 System Requirements with the inclusion of data access layer to execute the proposed
The development tools used for the system are: DD-TPS. It has four different layers with various specific
functions performed by each of the layer:
Visual Studio 2008 (VB.NET): This tool is used for
front-end coding and component building. i. User services: This is the visible or external layer where
Reporting Tools (Crystal Report 11v): A reporting users (Staff, Management Staff, and Supervisors) can
engine used to generate report from the dataset for interact with the system. It is also called presentation
users’ need. logic. It is a user interface which handles data entry, data
MS-SQL Server: An enterprise database engine query, report generation etc. Each of the modules (POS,
used to store all data from the front – end. Payroll, ATM Card Payment, and Inventory) integrated
The minimum requirement for running this information into this system DD-TPS has its own user interface
system called DD-TPS is as follows: which allows various users to enter their data for
processing. It is a graphic user interface, characterized
Software requirement: Operating System such as any window with the following features: Mouse click event, Pop-up
version OS like window 7, 8, and window server 2003, 2008, menu, Confirmation dialog box for execution of
2012, Web browser (Google chrome, internet explorer and commands and Tool tips message. In this design, the user
Mozilla) Visual-Studio 2008, SQL Server 2008 and Crystal interface only runs on the client’s side.
Report 10v.
ii. Business Services: This is the middle layer or business
Hardware requirement: Processor of 1.7 GHz clock speed, logic or business logic server or application logic. Any
RAM (Random Access Memory) of 1 Gigabyte, Hard drive form of request made by users from the user interface
size of 20 Gigabyte free space, Four Client system (monitor will be handled in this layer and the request passed to the
and system unit) and Printer HP. Please use a 9-point Times server for processing. Some requests will either be
Roman font, or other Roman font with serifs, as close as passed to the Data Access Layer to be encrypted or to the
possible in appearance to Times Roman in which these database server to be stored. This is the power house of
guidelines have been set. The goal is to have a 9-point text, as all the layers where programming codes reside. There is
you see here. Please use sans-serif or non-proportional fonts a link among the data access layer and database server in
only for special purposes, such as distinguishing source code order to enhance thorough communication from the
text. If Times Roman is not available, try the font named front-end and back -end.
Computer Modern Roman. On a Macintosh, use the font
iii. Data Access Layer: This layer is purposefully introduced
named Times. Right margins should be justified, not ragged.
to secure incoming data before getting to the database
3.3 System Development Process server. There is a need to provide enough security for the
users’ ATM card passwords, staff payroll slip, inventory
According to [22] the goal of a system developer is to deliver
detail etc. An encryption algorithm is executed on every
the best possible information system, at the lowest possible
confidential data that is passed to this layer, and
cost, in the shortest possible time. Due to the fact that
decryption of Cipher- text information into plain text is
information system affect people throughout the organization,
also performed in this layer.
the researcher used the team-oriented approach called Rapid
Application Development (RAD) as the most appropriate Data services: This layer is called database server which
approach to be used for the development of the system. RAD stores the data and provides data access and database
provides a fast-track approach to a full spectrum of system management function to all the organization’s information:
development tasks including planning, design, construction, The database server in this layer processes SQL statements
and implementation. Also it speeds up information systems used in manipulating, processing and managing data.
development and produces a functioning information system Database components like tables, triggers, store procedures,
with reduced cost and increase the probability of success. and user-defined functions created for this system stored in
this layer.
3.4 Proposed System Architecture
A client-server design style is used in this study. In this SMS Alert Components: This component sits on the database
design, the database server processes individual SQL having its interface at the front-end of ATM card payment
commands, the transaction server handles a set of SQL module and Payroll module. On every transaction in any of
commands; the object server exchanges object messages with the modules the DD-TPS push the short message service alert
clients and a web server sends and receives internet based via internet connectivity to the SMSC to the client’s mobile
communication. A 3 – tier architecture is used with additional phones. The push SMS technology is adopted for this system,
security layer called data access layer. The proposed DD-TPS which allows short message service to be sent in form of alert
is a type of information system that integrates four different and never allows responses from the users. So it is one
modules together on a single platform i.e. Model- driven directional flow of message. In summary, the major reason for
Inventory System, Payroll – System, POS and ATM Card using the three – tier architecture for the development of DD-
Payment Transaction. TPS is simply because of the following facts:
14
International Journal of Computer Applications (0975 – 8887)
Volume 149 – No.6, September 2016
Enhancement of overall performance of the DD- It provides easy maintenance of each layer because
TPS by reducing the data server work load. the DD-TPS is developed on each layer with
specific components.
15
International Journal of Computer Applications (0975 – 8887)
Volume 149 – No.6, September 2016
ii. Search button: On clicking the button after the staff iv. Display: It helps to display all records from the
identification number is provided, the details about database
that particular employee is displayed on the screen. v. Update: This button helps to modify employee’s
iii. Delete: On clicking the button, it requests for the details.
staff identification number of the employee’s record
to be deleted with confirmation dialog box. It Print: It is used to print employee’s pay slip.
deletes the record permanently.
16
International Journal of Computer Applications (0975 – 8887)
Volume 149 – No.6, September 2016
17
International Journal of Computer Applications (0975 – 8887)
Volume 149 – No.6, September 2016
18
International Journal of Computer Applications (0975 – 8887)
Volume 149 – No.6, September 2016
19
International Journal of Computer Applications (0975 – 8887)
Volume 149 – No.6, September 2016
[2] AH&LA 2006. Food and Beverage Systems Retrieved [14] Huo, Y. H. 1998. Information technology and the
from performance of the restaurant firms. Journal of
http://www.ahla.com/uploadedFiles/AHLA/Members_O Hospitality and Tourism Research, 22(3), 239-251.
nly/_Common/technology_primers_pdf/88126NEI01EN [15] Ibrahim, I. and Oye, N. D. 2016. Modelling and
GE.pdf. Simulation of a Decision Support System Prototype Built
[3] Ansel, D., & Dyer, C. 1999. A framework for restaurant on an Improved Data Warehousing Architecture for the
information technology. The Cornell Hotel and School of Postgraduate, MAUTECH, Yola – Nigeria.
Restaurant Administration Quarterly, 40(3), 74-4. Information and Knowledge Management: 6 (1), 88-103.
[4] Arun, S. and Atish, P. S. 2005. A Comparison of Data [16] Kasavana, M. L. 2011. Managing Technology in the
Warehousing Methodologies Communications of the Hospitality Industry (6th Ed.). Lansing, MI: The
ACM. 48, 3. American Hotel and Lodging Educational Institute.
[5] Cavusoglu, M. 2015. An Analysis of Technology [17] Kuo, T. P. 2004. An Analysis of the Typology of
Applications in the Restaurant Industry. Department of Customer Satisfaction, Service Failure and Recovery in
Hospitality Management College of Hospitality and Restaurant Industry: A Study of Restaurants in Taiwan,
Technology Leadership University of South Florida, Journal of Tourism Studies, 10(2), 69-9.
USA. [18] Manion, C., and DeMicco, F. J. 2005. Handheld wireless
[6] Collins, G., Cobanoglu, C., & Bilgihan, A. 2013. point of sale systems in the restaurant industry. Journal
Hospitality Information Technology: Learning How to of Foodservice Business Research, 7(2), 103-111.
Use it (7th Ed.) Kendall Hunt. [19] Mastroberte, T. 2014. What's new in POS hardware for
[7] Collins, G and Malik, T. 1998. Strategic planning and 2014? Hospitality Technology. Retrieved from
firm performance: A synthesis of more than two decades http://hospitalitytechnology.edgl.com/news/What-s-New-
of research. Academy of Management Journal, 37, (6), in- POS-Hardware-for-201495084.
1649-1665. [20] Nur, H. B. I. 2011. Restaurant Ordering System Using
[8] Chang, B. and Hoffman K. D. 1998. Critical Incidents. Mobile Application Faculty of Computer System and
Cornell Hotel and Restaurant Administration Quarterly Software Engineering Universiti Malaysia Pahang.
June: 66-71. [21] Satran, J. 2013. Credit Cards and Restaurants: Industries
[9] Chien, C., C. H. C. and Hsu, J. H. 1998. Computer Use Mull 'Cashless' Dining Consequences. Retrieved from
in Independent Restaurants. Journal of Hospitality & http://www.huffingtonpost.com/2013/01/23/credit-
Tourism Research, 22(2): 158-173. cardsrestaurants- cashless-dining_n_2482242.html.
[10] Cho, W., and Olsen, M. D. 1998. A case study approach [22] Shelly, C. & Roseublatt, S. 2010. System Analysis and
to understanding the impact of information technology Design. ISBN- 10: 0338474432 pg. 12 – 13.
on competitive advantage in the lodging industry. [23] Temitope, A. O. and Raufu, O. O. 2011. Design of Data
Journal of Hospitality and Tourism Research, 22(4), Warehouse and DSS: A case study of a Retail Industry.
376-394. School of Computing, Blekinge Institute of Technology,
[11] DeMicco, F., Cobanoglu, C., Dunbar, J., Grimes, R., Karlskrona, Sweden.
Chen, C., & Keiser, J. R. 2015. Restaurant Management: [24] Whitaker, M. 1986. The diffusion of information
A Best Practices Approach. Dubuque, IA: Kendall/Hunt. technology across the hotel and catering industry.
[12] Ellison, M. B. and Mann, L. 2000. Food Service International Journal of Hospitality Management 5(2):
Information Technology Assessment: A Foundation for 95-96.
Strategic Planning. International CHRIE, New Orleans,
LA.
IJCATM : www.ijcaonline.org
20