Top-Rated Free Essay
Preview

Log in Log Out Payroll System

Good Essays
858 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Log in Log Out Payroll System
CHAPTER I A.INTRODUCTION
In modern time, we live though in the actuality of rapid growth of technology. Since 1990s, Information Technology has been widely used in many industries. Particularly, Information Technology has modified the way of people doing their job and has changed the process and nature of work both in the public & private sectors and commercial organizations. Today it is widely recognized that most organizations need information systems to survive and succeed in the competitive business environment. Predominantly, a business such as food franchising largely affected by the lift of information technology that extends their business range to far-away locations, offer new products and services, reform organization structure and work flows, and perhaps significantly change the way they operate business.
As the impact of advanced technology, in 1997 Biometrics emerge in the field of information technology. Biometrics used to sustain identification encryption purposes, which meet the criteria of

reliability, uniqueness, collectability, convenience, longevity, universal, and acceptability. As a result, various forms of industry use Biometrics under two circumstances, voluntarily for things like, employment, access to special services, information or protection, and involuntarily for criminal identification and border control.
Some business companies are experiencing the following: manual time entry encoding that takes a lot of time, endless complaints and adjustments employees, no database of past payroll history for the previous years. Interpreting observations, the researcher conceptualize Payroll System: Log in Log out using Biometrics, a combination of two systems that use the application of Biometrics. This kind of system, is widely use by today’s business organization meant for succeeding competitive business environment. Log in Log out system is use for timekeeping, while the payroll system includes the process of calculating the salary or wages of employees up to supervisory level. And a mixed of two said system can reduce company’s operation length and cost. This system provides the administrator to the privileges to access, add, remove and modify information about the employees.
Greenwich SM Bicutan branch is the subject of the study. Greenwich is a small entrepreneurship that made an extraordinary leap to the big league and now the Philippines` biggest pizza chain. The store has existing login-logout system that uses a Bundy clock which recognizes the accumulated hours of each worker and transcribes it in a time card. In a recent study it was observed that in the existing system, still the manager manually computes the salary of the worker based on the written hours in the time card then a manager will encode it to a database. A manual computation of worker’s salary may result to some risk such as inaccurate calculation and time consuming exertion.
Many food chains like Greenwich SM Bicutan branch use to compute worker’s salary contingent on the accumulated hours of each worker which can be counted from the time a worker is in to the time a worker is out. Apropos of the current situation, a log in- log out system can be possibly attached with biometrics devices. That with human contact to a certain biometric device it is possible to verify the employees’ attendance. A profound exigent of the study is combining a glance of payroll system and log in- log out system that incorporates the notion of biometrics.

B. HISTORICAL BACKGROUND
Greenwich pizza is one true Filipino pizza chain- a small entrepreneurship that made an extraordinary leap to the big league. What started out as a small over the counter pizza store in Greenhill’s commercial center in 1971 is now the Philippines` biggest pizza chain. The initial steady growth of its business is credited to the entrepreneurial spirit of Mrs. Cresida Tueres by 1994; her store counter grew to 50 branches. It was then that fast food giant Jollibee foods corporation saw the great potential in Venturing into the growing market of pizza and decisively obtained a deal, Acquiring 80% of Greenwich shareholding. The new company became, known As Greenwich Pizza Corporation and went through exciting rapid developments with the mobilization of experienced marketing and operation teams. Successive innovations happened for the company immediately after the Acquisition. In September 8, 1994, Greenwich opened its first store at ever Gotesco Commonwealth Shopping Mall, sporting the new and vibrant image of Greenwich. New packaging designs were introduced in June 1995 and 7 Different pizza flavors were launched in July of the same year. The Greenwich Social Pizza, with 7 toppings, became the classic favorite of costumers.
In October 1995, the Greenwich marketing campaign went into full swing. With the young and the young- at- heart as the target market, a tri media campaign was launched to reveal Greenwich’s new image. By year end, Greenwich had more than doubled the previous year’s sales from 100 million to 200 million pesos with a base of only 53 stores.
The ensuring years saw a remarkable boom in Greenwich’s operations and revenues. In 1996, launching local actor and personality Rico Yan as the image model proved to be a successful campaign strategy. By the end of that year, the number of stores had grown to 80 and sales to nearly 500 million pesos.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The use of biometric data has created some security concerns. Biometric data is an array of information stemming from minimally non-invasive such as a fingerprint or iris scan to invasive such as a blood sample, taken to collect DNA. This data is not only very personal, but a single biometric can obtain a subjects biographical data, such as name, address, social security number, telephone number, e-mail address, booking and/or border crossing photos, gender, race, date of birth, immigration status, length of time in the United States and unique identifying numbers (i.e. driver’s license number). If one were willing to give their data to be used by the government, they want to ensure their information is protected. How can you convince someone that their information is secure and unable to become compromised? The most efficient way to protect biometric data from unauthorized users is encryption.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    A. Main Idea: The original use of Biometric Technology was for prisoners, police took a sample of their fingerprints to have their identity but their are plenty of other ways to have identification such as iris scans, facial scans, and others.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Answer: Biometric authentication uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users. Biometric authentication provides strong authentication, but the required equipment is expensive. Often, too, users resist biometric identification because they feel it is invasive. Biometric authentication is in the early stages of adoption. Because of its strength, it likely will see increased usage in the future. It is also likely that legislators will pass laws governing the use, storage, and protection requirements for biometric data.…

    • 4641 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Home and business user alike are using biometric security. Through a biometric identifier, such as a fingerprint biometric devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Biometric systems are technologies that can scan physiological, chemical or behavioral characteristics of a subject for the sake of verifying or in other words authenticating their identity. It is the latest weapon in the fight against computer crime and identity theft. These technologies work with the help of sampling distinctive biological features, such as tracing patterns of blood vessels in the retina, voice recognition or fingerprinting. Later biological features are extracted and then converted into mathematical codes which are then stored as a biometric template. In order to confirm the identity of the user, they will be required to interact with the system scanner which will process the users identitywith the help of an iris or fingerprint scan. This sample is then compared with the template for a positive match and therefore, access is either granted or denied accordingly.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Biometrics is where facial recognition can categorized. According to the Criminal Investigation text book, biometrics is: "the statistical study of biological data and means to positively identify an individual by measuring the person 's unique physical or behavioral characteristics"…

    • 2694 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Biometrics is a unique and effective security technology that authenticates a person’s identity by verifying personal characteristics. Biometric devices grant users access to programs, systems, or rooms by analyzing some biometric identifier, such as a fingerprint or eye pattern. Two commonly used types of biometric security devices are fingerprint readers and iris recognition systems.…

    • 264 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Employee Payroll System

    • 13777 Words
    • 56 Pages

    This to certify that this report titled Employee Management System embodies the original work done by NAME OF STUDENT in partial fulfillment of his course requirement At NIIT…

    • 13777 Words
    • 56 Pages
    Powerful Essays
  • Powerful Essays

    The purpose of this study is to design and implement a payroll system that should accept employee hours, worked, compute net pay and record all the payroll data for succeeding processing.…

    • 1139 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    This Computerized Payroll System program allows the monthly payroll schedule to be calculated accurately. Just by having all employees’ information such as name, rate per hour, working hours, etc to enter to its database. Therefore, payroll can be done with the guide of the program. The system is good in for its specialty in the fields of accurate computations. It is easy to use, effective and efficient in organizing and calculating the payroll. In addition, this study aims to develop a reliable computerized payroll system for Ministop Convenient Store for a better manageable of a business. The Proposed Computerized Payroll System will give a big relief of the employee and employers as well.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    automated payroll system

    • 926 Words
    • 4 Pages

    In order to solution this problem, the professionals developed thealternative solutions using the advance technology, by merging the software and hardware technology. It is a Computerized Payroll System.…

    • 926 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Payroll System

    • 775 Words
    • 4 Pages

    Payroll System is the heart of any Human Resources System of an Organization. The solution has to take care of calculation of salary as per rules of the Company. This Payroll System is a full-featured system that manages financial information of every employee in an organization. It computes and processes the payroll in the certain payroll period.…

    • 775 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Ch 1 Payroll System

    • 1391 Words
    • 6 Pages

    As computer technology changes at such fast phase, many businesses sectors try to cope up by upgrading computer system constantly in order to stay competitive. The multi function ability of technology for its advance system is also an important factor for an institution to use software. It makes efficient use of the advance technology and has ambition to discover more. Computers have the great impact on the profession of accounting. With the rapid growth of technology today, there is no doubt that computer will become a common asset in all profession. The program also allows the monthly payroll schedule to be calculated accurately. Just by having all employees’ information like name, working hours, wages etc. to enter in the database. Therefore, payroll can be done with the guide of the program. The system is good in for its specialty in the fields of accounting. It is easy to use, effective and efficient in organizing and calculating the payroll. In addition, this study aims to develop a reliable and manageable computerized payroll system for the contractual employee’s of ISCC service. The proposed computerized payroll system will give a big relief of…

    • 1391 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Finally, this study aims to develop a reliable and manageable computerized payroll system for the contractual employee’s of Rumtec Engineering.…

    • 578 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Login/Logout System

    • 3554 Words
    • 15 Pages

    Due to the problems observed, the proponents were encouraged to develop a “Log-in/Log-out and Payroll System Integrated with Biometrics Using Fingerprint” proposed as a replacement for the manual process. The system is capable of computing and monitoring daily attendance of the personnel who report in Quezon- Roxas High School. This proposed system will help the employees to log-in/log-out faster and easier with the use of the said proposed system. The payroll clerk will compute the total hours worked every fifteen (15) days easier and accurately.…

    • 3554 Words
    • 15 Pages
    Best Essays