0% found this document useful (0 votes)
35 views14 pages

MIS Analysis of Mega Bank, Nepal

Uploaded by

neupanek434
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views14 pages

MIS Analysis of Mega Bank, Nepal

Uploaded by

neupanek434
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Table of Contents

Chapter One: Introduction ................................................................................................................ 1


1.1. Introduction of the Study/Project Work ........................................................................... 1
1.2. Objectives of the Study .................................................................................................... 1
1.3. Methodologies of the Study.............................................................................................. 2
Chapter Two: Organizational Study ................................................................................................. 3
2.1 Introduction of the Organization ...................................................................................... 3
2.2 Information System Department ...................................................................................... 4
2.3 Hardware and Software used in the Organization ............................................................ 4
2.4 Information system used in organization.......................................................................... 5
2.4.1 Types of IS used in the organization ............................................................................ 5
2.4.2 Objectives of using information system ....................................................................... 5
2.5 Types of collaboration tools ............................................................................................. 7
2.6 Ethical and social issue of information system ................................................................ 7
2.7 Data management in the organization .............................................................................. 9
2.8 System Security Tools and Techniques Used in the Organization ................................. 10
2.9 Information System Developments ................................................................................ 11
Chapter Three: Conclusion, Lesson Learnt, Recommendations .................................................... 12
3.1 Conclusion ...................................................................................................................... 12
3.2 Lesson learnt................................................................................................................... 12
References ...................................................................................................................................... 13
Chapter One: Introduction

1.1. Introduction of the Study/Project Work


We students of BBA 3rd semester Group-c Ananta Raj Neupane, Milan Poudel, Ram
Bahadur Ale, Prasunna K.C, Diskhya Nepali were assigned on a project report on “MIS
in Mega Bank”. Thus, this project is related to Information technology currently being
used in Mega Bank, IT System in the bank, Hardware and software used in that bank,
IT department, Collaboration tools used by bank, data management in that bank, social
and ethical issues etc.

We would like to like BBA Program Coordinator Mr. Rishi kanta Parajuli and Subject
teacher Shashi kumar Lamsal for giving a chance to increase our knowledge, concept
and on information systems that are currently in trends of many financial institutions
in Nepal.

Figure 1: Group infront of Mega Bank

1.2. Objectives of the Study


The main objective of this study/report is to have indebt practical knowledge about
Information system in financial institutions, to have interaction with the information
technology to increase our concept and overview towards IT systems, Hardware and

1|Page
software, Security systems and so many topics that burning in present context. The
study covers ensures to have a greater knowledge and a better thinking way towards
the MIS in Nepal.

The objective of project/report/study is also to have our practical examination


evaluation set by BBA Faculty T.U.

Thus, the objective is to have clear concept and overview of Information technology
and Management information system.

1.3. Methodologies of the Study


The methods of study that we used in this project are-
 Questionnaire Method
We directly reached the Mega Bank and got to know from operation in charge Mrs
Bishnu Bhandari. A questionnaire can is a research instrument that consists of a set of
questions to collect information from a respondent. So, we simply ask the questions in
a structured way that was provided by college. We ask a ton of question and result is
present in the report.

Figure 2: Questionnaire with Operation In charge

 Indirect source- Google / Wikipedia


There are a lot of information available on the Google and Wikipedia.
Some of the necessary information about the projects are taken from the indirect
sources. The information basically covers introduction of the bank, its services and
many more. The Knowledge taken from bank website.

2|Page
Chapter Two: Organizational Study

2.1 Introduction of the Organization


Mega Bank Nepal Limited is an ‘A’ class commercial bank licensed by Nepal Rastra
Bank and has branches all across the nation with its head office in Kathmandu which
provides entire commercial banking services. The bank's shares are publicly traded as
an 'A' category company in the Nepal stock exchange under the ticker symbol MEGA.
May 2022, the bank has 208 branches, 25 extension counter and 146 ATMs throughout
Nepal. The bank also has 60 branchless banking centers and more than 2300 remit
agents.

The bank that we studied is Branch of Mega Bank located at Kawasoti Savapati chowk
Nawalpur. The bank has 11 regular staffs. The bank was established in 2066 B.S.
Previously the bank was Gandaki Bikash bank later on merged with Mega Bank.

Bank Nepal Limited is one of the premier Financial Institution of Nepal consistently
living its Service Pledge to conduct business by continually creating mutually
beneficial relationship with all its stakeholders; Customers, Shareholders, Regulators,
Communities and Staff. The Bank realizes that its success is directly correlated with
the pace at which it fosters its relationship with its stakeholders, so that in every step
of its journey, both parties’ benefit, succeed and grow together.

The bank that we studied is Branch of Mega Bank located at Kawasoti Savapati chowk
Nawalpur. The bank has 11 regular staffs. The bank was
established in 2066 B.S. Previously the bank was Gandaki Bikash bank later on merged
with Mega Bank.

Figure 3: Customer Service Department

3|Page
2.2 Information System Department
There is no any separate Information department in bank where we had our research.
The information system is centrally controlled. All the necessary update, problems,
system rebuilding adding removing systems are controlled by the central or main bank
of Mega bank located in Kathmandu. Even the security systems and others system
updated are done centrally.

2.3 Hardware and Software used in the Organization


The software used in the organization are –
 Flash Q
 Antivirus
 Issue Tracker

The Hardware used in the organization are –


 Acer PC’s

The pc’s in the organization is built using a perfect combo of hardware and
software as per the organization need.

 Printer
In computing, a printer is a peripheral machine which makes a persistent
representation of graphics or text, usually on paper.
 Scanner
a device for examining, reading, or monitoring something.
 CCTV
CCTV stands for closed-circuit television and is commonly known as video
surveillance. “Closed-circuit” means broadcasts are usually transmitted to a
limited (closed) number of monitors, unlike “regular” TV, which is broadcast to
the public at large. CCTV networks are commonly used to detect and deter
criminal activities, and record traffic infractions, but they have other uses.
 ATM
An ATM, which stands for automated teller machine, is a specialized computer
that makes it convenient to manage a bank account holder's funds. It allows a
person to check account balances, withdraw or deposit money, print a statement
of account activities or transactions, and even purchase stamps.

4|Page
 Cash counting device
A currency-counting machine is a machine that counts money—either stacks of
banknotes or loose collections of coins. Counters may be purely mechanical or use
electronic components. The machines typically provide a total count of all money,
or count off specific batch sizes for wrapping and storage.

 Cheque writer
A check writer (also known as a "ribbon writer", "check signer", "check protector"
or "check embosser"), is a physical device for protecting a check from
unauthorized alteration of either the amount or the authorizing signature.

2.4 Information system used in organization


Information system are the set of interrelated tools and techniques that create, manage,
process, disseminates and store data and information to facilitates the decision-making
process of the organization. It is a combination of software, hardware, and
telecommunication networks to collect useful data. Every organizations use
information technology to complete and manage their operations, interact with their
customers and stay ahead of their competition.

2.4.1 Types of IS used in the organization


We came to know that following are the types of information system used in the
organization.
1. Transaction Processing System
2. Management Information System
3. Human Resource Information System
4. Accounting System
5. Financing System
6. Executive Information System

2.4.2 Objectives of using information system


First of all, six strategic objectives for using information system are presented
below as:
 Operational Excellence

5|Page
 New products, services and business models
 Customer and supplier intimacy
 Improved decision making
 Competitive advantage
 Survival

The main goal of these systems is to organize all data collected from every level
of the company, summarize it, and present it in a way that facilitates and improve
the quality of the decisions being made to increase the company’s profitability and
productivity.
Recognize and solve organizational and management problems in the
organization.
Understand and solve problems in the process of design, maintenance,
organization and management of information systems with aim to achieve
effective and efficient business of an organization.

Figure 4: Mega Bank View from Highway.

6|Page
2.5 Types of collaboration tools
There are many tools that organizations can acquire to assist with collaboration.
Google offers document sharing with Google Docs and allows employees to chat and
communicate via Google hangout. Microsoft offers outlook messaging for emails,
Skype conversations, and a space for sharing One Drive documents.
Some types of collaboration tools used on MGEA bank are as follow

 File sharing tools:


File sharing tools allow you to transfer files, distribute them and give access to them.
Shared files can be various kinds; software, books, videos, documents, etc.. These tools
avoid transferring everything via email and saturating inboxes with heavy files.

 Video-conferencing:
A method of communicating with a live, visual connection by means of a video with
multiple people across multiple locations. In-person meetings can be replaced with
videoconferences so the team can still get the “feeling” of seeing each other as they
communicate.

 Cloud storage:
Storage can be done within the organization but also in the cloud. Cloud storage
exploits the power of the server’s information storage system which lives in the cloud.
The data is stored remotely via a telecommunications network.

2.6 Ethical and social issue of information system


2.6.1 Ethical issue

 Personal Privacy:
It is an important aspect of ethical issues in information technology. IT facilitates the
users having their own hardware, operating system and software tools to access the
servers that are connected to each other and to the users by a network. Due to the
distribution of the network on a large scale, data or information transfer in a big amount
takes place which leads to the hidden chances of disclosing information and violating
the privacy of any individuals or a group. It is a major challenge for IT society and
organizations to maintain the privacy and integrity of data. Accidental disclosure to

7|Page
inappropriate individuals and provisions to protect the accuracy of data also
comes in the privacy issue.
 Access Right:
The second aspect of ethical issues in information technology is access right. Access
right becomes a high priority issue for the IT and cyberspace with the great
advancement in technology. E-commerce and Electronic payment systems evolution
on the internet heightened this issue for various corporate organizations and
government agencies. Network on the internet cannot be made secure from
unauthorized access. Generally, the intrusion detection system are used to determine
whether the user is an intruder or an appropriate user.

 Trade Secrets:
Trade secrets is also a significant ethical issue in information technology. A trade secret
secures something of value and usefulness. This law protects the private aspects of
ideas which is known only to the discover or his confidants. Once disclosed, trade
secret is lost as such and is only protected by the law for trade secrets. The application
of trade secret law is very broad in the computer range, where even a slight head start
in the advancement of software or hardware can provide a significant competitive
influence.

2.6.2 Social issue

 Culture:
The issues of education, uneven distribution of wealth, multi-ethnic and
multigenerational workforce are commonly discussed in society. The information
systems have made it difficult to learn the latest knowledge for all as this latest
education can be possessed by privileged social class only which is increasing disparity
among society. Therefore, a specific educated class is getting benefit from the
technology in a true sense. Furthermore, the information technology has realized the
generation gap as senior citizens have lack of knowledge about information systems
and new technology.

 Law and Order Issues:


The national and international databases have information about millions and billions
of people for identity purpose. But the cybercrime practices and hacking of these
sensitive websites have laid the foundation for many law and order situations.
Nowadays, it is very easy to access someone’s information through social networking
sites, but the cases of ATM scamming, using fake sim cards and national identity cards
have made it very difficult for law enforcement agencies to main the peace.

8|Page
2.7 Data management in the organization
Data management is a critical business driver used to ensure data is acquired, validated,
stored, and protected in a standardized way. It is essential to develop and deploy the
right processes so end users are confident their data is reliable, accessible, and up to
date. To make sure that your data is managed most effectively and efficiently, here are
seven best practices for your business to consider.

1. Build strong file naming and cataloguing conventions


If you are going to utilize data, you have to be able to find it. You can’t measure it if
you can’t manage it. Create a reporting or file system that is user- and future-friendly—
descriptive, standardized file names that will be easy to find and file formats that allow
users to search and discover data sets with long-term access in mind.

2. Carefully consider metadata for data sets


Essentially, metadata is descriptive information about the data you are using. It should
contain information about the data’s content, structure, and permissions so it is
discoverable for future use. If you don’t have this specific information that is
searchable and allows for discoverability, you cannot depend on being able to use your
data years down the line.

3. Data Storage
If you ever intend to be able to access the data you are creating, storage plans are an
essential piece of your process. Find a plan that works for your business for all data
backups and preservation methods. A solution that works for a huge enterprise might
not be appropriate for a small project’s needs, so think critically about your
requirements.

4. Documentation
Within data management best practices, we can’t overlook documentation. It’s often
smart to produce multiple levels of documentation that will provide full context to why
the data exists and how it can be utilized.

5. Commitment to data culture


A commitment to data culture includes making sure that your department or company’s
leadership prioritizes data experimentation and analytics. This matters when leadership
and strategy are needed and if budget or time is required to make sure that the proper
training is conducted and received. Additionally, having executive sponsorship as well
as lateral buy-in will enable stronger data collaboration across teams in your
organization.

9|Page
6. Data quality trust in security and privacy
Building a culture committed to data quality means a commitment to making a secure
environment with strong privacy standards. Security matters when you are working to
provide secure data for internal communications and strategy or working to build a
relationship of trust with a client that you are protecting the privacy of their data and
information. Your management processes must be in place to prove that your networks
are secure and that your employees understand the critical nature of data privacy. In
today’s digital market, data security has been identified as one of the most significant
decision-making factors when companies and consumers are making their buying
decisions. One data privacy breach is one too many. Plan accordingly.

7. Invest in quality data-management software


When considering these best practices together, it is recommended, if not required, that
you invest in quality data-management software. Putting all the data you are creating
into a manageable working business tool will help you find the information you need.
Then you can create the right data sets and data-extract scheduling that works for your
business needs.

2.8 System Security Tools and Techniques Used in the


Organization
Mega bank is an ‘A’ class commercial bank licensed by Nepal Rastra Bank and has
branches all across the nation with in head office in Kathmandu which provides entire
commercial banking service.
It resembles the general principles of risk analysis, good practices, and standards that
should be followed by banks when established standards for auditing processes. It also
essential that banks cooperate with the relevant law enforcement authorities in the
event of security incidents.
There are important Security Tools and Techniques in the Organization.
 Antivirus Software
 Mobile deposit
 Anti-Spyware Software
 Password Management Software
 Malwarebytes
 Security Vulnerability

Mobile Deposit
Deposit checks as soon as you receive them with mobile Deposit. Not sure If you have
the volume for a Remote Deposit Capture machine, but still longing for the
convenience of deposit without leaving the office.
Antivirus Software

10 | P a g e
This is important tools for banking it can often remove the affected file. Signature
based antivirus software scan files from any sources to make sure that there aren’t any
hide threats. It’s still a critical piece of the cyber security puzzle.
Anti-Spyware Software
As the term implies, Spyware secretly Snoops on victims to see where they go online
and even more so what they type such as usernames and password, and any other
confidential or personal data.
Password Management software
It is the good password management software not only saves a great idea of time but it
strengthens security and prevents major mistakes such as saving password in web
browsers.
Malwarebytes
It is the malicious software, means any software program or code intended to destroy,
interfere with corrupt, cause undesired effects on program files, data or other
information, executable code or application software macros.

2.9 Information System Developments


Information system for Mega bank, have come a long way from developing simple
DBMSs developed on personal database management system for eg; Clipper, dBase,
Fox pro etc. Mega Bank, development of communication tools, the reduction of
information processing time, the develop mechanisms for remote customer service,
and offer a new range of service.

11 | P a g e
Chapter Three: Conclusion, Lesson Learnt,
Recommendations
3.1 Conclusion
Banks play very important roles in the economic development of nations as they, too
large extent, wield control over the supply of money in circulation and are the main
stimuli of economic progress. Economic development is a dynamic and continuous
process which is highly dependent upon the mobilization of resources,
investment, and the operational efficiency of the various segments of the economy.
The performance of bank institution and other financial institution need to be evaluated
because it defined as the reflection of the way in which the resources of a bank
are used in a form which enables it to achieve its objectives. As the banking
sector is considered a vital segment of a modern economy, its efficiency is vital
importance. In order to ensure a healthy financial system and an efficient economy,
banks and other financial institution must be carefully evaluated and analyzed.

3.2 Lesson Learnt


 The IT sector is rapidly growing and organization without it is
unimaginable.
 The Key development of organization is processing, maintaining, and
analyzing data of organization.
 MIS is important sector and we must treat it as a separate concern.
 The Use and knowledge of MIS Must be aware to every organization of
Nepal.
 The Local places of Locality must be aware of IT.

12 | P a g e
References
MEGA bank Kawasoti-08 Nawalpur.
MEGA bank operation incharge Mrs. Bishnu Bhandari.
[Link]

13 | P a g e

You might also like