There is a need for quicker transactional means in the tourism industry as there is in any other model of business. Business people all around the world have invested in technologies that can get their business working faster and much efficiently. This need for quicker transactional means can be explained through the following tourism scenario.
Consider a situation, where an expectant Canadian woman seeks to go on a Safari in India or Africa; on top of her luggage that most probably contains personal items and presumably personal laptop, what else would she need to carry with her? Money is a formal means of payments that can be accepted all over the world by every type of business or organization. Besides, a wide range of acceptability, transactions in the digital world do not take a barter trade form; this demands actual money represented by an international currency like the dollar or the euro. In the case of the woman, there is the need to have money to carter for hotel bookings or any other expenses that may require instant payments in her Safari.
Considering the above scenario, this woman, and any other person, would hate to carry his or her luggage and fill his or her wallet/purse with currency notes. On another level, the same person may hate it, if he/she must make a stop at every ATM to withdraw money. In this case, a solution will be needed desperately to solve this issue. Card Reader on the Go is a new technology that is pushing the e-business transactions to a whole other level. Card Reader on the Go technology has provided vendors with the ability to integrate this technology with mobile phones to ease the hustle. Normally, people would like to carry in their pocket or with them, a mobile phone hoping that they could keep their business active through mobile video conferencing or through push emails. In this case, the number of items in an individual’s pocket can be limited to 3: a mobile phone, a credit card and mobile card on the go connection device (Al-Qirim, 2006).
Leading technological giants like Apple Inc. targeting their IOS operating system and Google targeting the wide market of the Android operating system have introduced the mobile card on the go device in the market. This technology involves a small gadget, the size of a broadband modem that requires to be connected to the audio jack of the supported platforms. The smartphone market has presented customers with mobile phones that can practically do anything that involves the exchange of information. Considering that people from all over the world are concerned with the features of every smartphone entering the market; those with spectacular and outstanding features make a better sale than the rest. In this case, a 3mm audio jack is a requirement that the mobile card on the go technology relies on demands. Practically, all smartphones, running the IOS and the Android Operating Systems with the 3 mm audio jack, can connect with this technology. Like the ordinary network modems, these gadgets are preinstalled with a standard application that acts as the driver for the hardware. The application is automatically installed to allow an interaction between the connected hardware with the mobile phone. In this case, the e-business protocol is established and the only thing an individual is expected to do is use a login ID on the phone, swipe his or her credit card and a transaction is made.
The above procedure seems easier from fast hand perspective than somebody hearing this from a third part. Business people who assume that it is either easy to install or to use technologies lag behind in terms of providing security and have a defective management side. The reason this technology is suggested as an IT solution is due to its high security and fast transactional means. Once an individual has logged in with his ID on the application that automatically launches after the plugin of the card reader device, an individual is able to access services and products and services over the application, as it connects to the internet, and to pay for his or her items by simply swiping his card. The best part about this device in terms of security is that, after a transaction has been completed, the user unplugs his or her device. This activity allows any active login information to be wiped out and the session to be terminated automatically. On the other hand, the usability of the card reader is not limited to only one user. This is because, unless a user enters his ID and swipes his card, sessions will not be initiated. In terms of convenience, one phone and one card reader can serve a family of 20 people (the extended type of family); however, all must have their credit cards (Books LLC, 2010).
The tablet computer is a technology that tries to integrate compactness with user experience satisfaction. The corporate world relies on transacting various business deals through the networks, while others require to process large amounts of data or to engage in some complex math problems. Typically, the use of desktop computer is limited to the tasks that require fixed office setting and permanent locational deployment. However, around the world, hotels and tourist resorts do not have fixed hotel rooms or locations that belong to certain tourists; hence, the impossibility of using the desktop computer. On the other hand, a tourist leaving his room to site see the countryside may not require to tag along with his massive personal laptop computer; something more compact is needed for this case.
The tablet computer is amongst the technological devices that have been given a high priority in terms of production and packs of features. In this case, a tourist can take photos, using these devices, can chart with friends and business partners, and can transact business over the internet. The convenience of the tablet computer is to present a remarkably large screen as compared to the smartphones and the ability to process a large quantity of data and information. However, vacations, which happen to be the business, of many tourists seek to undertake do not involve a lot of data processes and information synthesis. Tourists seek comfort by relaxing at various places, doing recreational activities. However, these recreational activities, despite the comfortability aspect, are not free. To pay for services and products does not require an individual to hand out his credit card to some stranger caterer or to carry with him a phone alongside his tablet computer.
At this point, the tourism industry needs to focus attention to the integration of technologies that cater for all services and those that can be integrated with nearly all devices. A tablet computer plugin is a useful device that is connected to the tablet computer to offer e-business solutions. The protocol for usage is similar to that of the smartphone; however, these tablet computers can threaten the personal information of a user. In this case, the bigger screens, normally 7 inches diagonally, present pages and applications supporting flash players. The flash players are convenient for login details’ entry, in that login details can be spread across a variety of fast-generated pages to separate login requirements. Therefore, an individual in a public place can connect his card reader on the go with his tablet computer and safely login to his account. After this phase is completed, the user can select the number of payments he wants to settle and swipe his card to have the transactions completed.
Scenarios that are handled or that require handling through the Card Reader on the Go technology include the unnecessary hand over of credit cards to service providers, giving out of personal credit card information to organizations that run the tourism industry and personal information storage in risk prone online clouds. Cloud computing enables people to store information online through various agents and organizations. This risks the individual’s information as it can be accessed by hackers or can be lost if the clouds are attacked by malicious activities. It is there the responsibility of a tourism organization to give power to the service payers and limit the amount of personal data they keep for their client. The tourism industry is a fast growing sector whose stability, or otherwise, will be determined by the clients. In addition, to achieve positive feedback, organizations should precisely deal with planning activities, while the customer should be able to process his or her bills at the convenience of his smartphone, tablet computer and/or personal computer (Books LLC, 2010).
Personal Computer Peripheral
A personal computer is defined as a computer platform that has a physical integrated keyboard, a touchpad, a display panel, and all other hardware components, housed in one frame. Individuals may confuse a personal computer with a computer that is used by one person. The former allows a user to make distance displacement with these computers – they are classified as laptops. A peripheral device is any device that is not connected to the computers motherboard or considered a component of the computer. Headphones, USB speakers, external webcams, data modems, and memory card readers are all considered peripheral integrations. The card reader on the go, on the hand, does not work the same way on personal computers as it does on mobile devices like the smartphones and tablet computers. The workmanship depends on the make of the card, the operating system of the computer, the availability of compatible software, and necessary plugin mini applications required.
The platform for the installation and running of card reader on the go may not be as safe as on handheld devices. This is because computers are likely to connect to various sessions through a large number of running applications, hence, limiting the security assurances that may be embedded on the card’s safety guarantees. Spyware programs or key logger applications can spy on the information through an open email account, word processor connects to the internet, or a data modem connected to the computer through an adjacent USB port. As an IT solution to the tourism industry, card readers on the go present the best solution and, therefore, security issues can be overcome through the use of https protocols (discussed later in this report) for all websites accessed. These risks can be limited, using improvised applications that freeze the activities of any other application, unless they were allowed to run concurrently.
The application of the card reader on the go technology on a personal computer platform is open for all environments but is more convenient for executives and top managers, whose tight schedules might be inconvenienced with carrying mobile phones and tablet computers in conference rooms and boardrooms. At the comfort of their offices, a lot of people can make bookings with tourism organizations; secure a tour destination; can pay for the services and product packages expected instantly without handing their personal details to the organizations’ management or purchase and service ordering departments.
Banking is the coordinated activity of an individual posting deposits, withdrawing deposits, and transferring funds form one particular account to another. M-banking is the ability to do the above named activities and more through a mobile device. A mobile device is any device, only in this case study, that can pick up network signal through a SIM card; examples include phones, tablet computers, and PCs with the ability to read SIM cards. In other words, mobile banking takes the form of integrating bank services with a mobile service provider.
The ID Login Mechanism connects a user with his bank account through the mobile service provider in order to initiate a transactional session. This way, an individual is able to transfer funds from his or her account to the account of another individual or an organization. The payer and the paid are connected to one another through the networks linking them. These networks include the banking networks, which allow one bank to be connected to millions of other banks, and one mobile service provider connected to any other banks. This way, a tourist in need to settle a transaction swiftly would transfer funds of the agreed amount from his bank account to that of organization or the tourist caterers.
Fast and secure is the purpose why IT solutions are sought and presented in this report. The mobile banking technology addresses these aspects at the user’s level. Principally, the user applies a special pin or password and username or code to login to the service. Once the necessary details are provided, a list of services offered is presented on the screen; at this point, a user can select what he/she would like to do as the system prompts him or her on what to do. On the matter of security, the client or the customer does not give out his or her personal information to the service vendor. In terms of swiftness, the client makes the transaction without congestion and delays and the client, as well as the organization he is paying, all receive confirmation messages or emails from the bank and their respective service providers.
The tourism industry and organizations, involved with the arrangement of tourist information, require clients to register their details with them so that they can process it and deliver the expected results. A client with a certain amount of money in his or her bank account is likely to be worried about how much from his bank account would be used to cater for expenses. In cases like these, an organization arranging the tour should estimate a certain amount of money to be the range of expenditure for the client. Second solution would be to cater for the expenses that the client incurs and have the client settle the bills in one transaction at a later date.
To pull off the above solutions, a client through the internet or through a phone call would conduct an action, and select a package that he would like to purchase. The organization performs a registration process at its physical database and recognizes the client. The client is, therefore, given login details, which would include a username and password or a secret word. This information would be used by the client any time he decides to change his earlier requests on tour packages or when he is purchasing anything outside the agreed package. The login details would implicate the organization every time the details are entered. This IT solution would work in the same manner as PayPal payment format; the entry of the information would not recognize the client as the payer of bills and the physical tourist resort but will process a transaction between the organization and the resort. Funds would be transferred from the organizations vault to the resort’s account, and the organization gets a notification that implicates the client with a certain amount of money spent on a certain commodity. On the other hand, the organization gets an electronic receipt, which it may choose to forward to the client or to accumulate until the client is ready to evaluate his expenditure collectively. The importance of this IT solution is to limit the constraints imposed on today’s client by their planning organizations. A client would have the flexibility he/she may require to change any certain part of a deal and avoid too much handling of the bills every time he/she requires to settle a bill.
Bank Information Access
Identity theft is a problem that faces the tourism industry as well as the financial sector as a whole. Clients all over the world complain that, one time in their life had their accounts drained of money or their healthcare plans have been hijacked by other people. The tourism industry cannot be any different from the scenarios that have been witnessed over the period since technology started influencing everyone’s life. The fact that organization gives clients a promise that their personal information will not be dispatched to any other party is not satisfying enough and clients with doubts need to have an alternative. The alternative is to integrate a mechanism that actively engages the clients’ banks in order to keep track of banking activities, taking place in real time. This undertaking comes as a collaborative task between the tourism industry and the banking system; it is similar to the protocol, followed by banks and telecommunications organizations to deliver m-banking services to clients. In this case, an organization, accessing the bank deposits of a client, should be primarily recognized by the bank, this would detail the reason it is requesting a transaction with the clients personal details.
The client, on the other hand, logs in, either to the organization’s website or to the online services, offered by the bank to confirm the processing of a request. Phishing is a cybercrime, where an organization’s website or online services can be mimicked by another website titled under the same name. This may be confusing to customers, but when a transaction of real life situation is requested, a client can confirm and authorize it accordingly. This method is not only a safe way to transact business but also a convenient way to have banks cater for expenses in incidents, where a client has run short of deposits in his or her account. The applicability of this IT solution is the assurance that it would give to clients that malicious activities are not taking place on their bank accounts as well as keeping bank information close.
ID Tracking Capability
The fact that the world is advancing in terms of secure networks and security provision in e-business platforms does not mean that the world is safe, when it comes to cybercrimes. The better the technology becomes for one sector, the better it gets for another sector and, therefore, the technology development ratio between these sectors can be estimated to be 1:1. The banking industry, which falls under the category of financial sector, is one of the most targeted industries by online hackers and identity thieves. In this case, the tourism industry does not need to put clients’ financial deposits at the risk of unauthorized access, hence, the need for ID Trackers. An organization with the details of a client would know that the client would be touring Qatar, and this can be communicated to the bank through the integration mechanism. If the client is at Qatar, and his ID is traced to be used in another destination, like Latin America, the organization and the bank terminates that transaction or they request the client to confirm his details and knowledge of a transaction taking place at a certain traced region.
The ID tracker is used by the organization and the bank to produce a detailed report on the client’s expenditures at various destinations. Considering that a client is either using a card reader on the go, using ID login mechanism, or using the m-banking services; he or she is presented with a detailed report, regarding where and when a certain transaction was processed. Any likelihood that a client does not account for some activity, he/she and the bank can reset his/her private data and deactivate a lost credit cards or active sessions. The importance and relevance of this IT solution is to limit the chances of identity theft in case a client loses his/her personal data or file. It also makes sure that transparency between the tourism industry and the organizations they transact business with is maintained. An organization has the right to inform a client of any expense that may be incurred, and that may fail to be accounted for; at the same time, a client has the right to sue an organization that engages in unlawful billing of non-requested packages (Baase, 2008).
Trackers are web-based programs that are used to access the traffic of a site in terms of most frequently accessed data and search keywords. In regards to the project at hand, trackers would be enabled in on client devices or logins to predict word entry and lessen the time, taken to accessing data. Given the nature of e-business, clients take time to be of essence, and frequently accessed data should be made available with fewer clicks than non-frequently accessed data. With the GPS system, different nations and regions have various cultures and their preferences are different in terms of tourism needs. In this case, it is easy for the system to configure the type of packages people from a certain country prefer and, therefore, present results, concerning their preferences. A tracker program is a web-marketing tool for services and products, whereby, its form and design is meant to serve clients, using any type of platform, and not Americans or the British alone. In this case, the use of trackers in the system would be to enable users to find relevant information and locate the most relevant data. With the different languages and meanings of words for different people and cultures, an individual, searching for a tourist resort, called Enigma, may get irrelevant search results if he/she is in Japan. For this case, the trackers are meant to specify and clarify the needs of a client in terms of keywords and relevance in regards to the country he/she resides. Popular searches are triggered by phenomenal events like the launch of a new tourist resort by a popular organization offering outstanding packages. When this happens, multiple users flock to the program or sites to search for the resorts or the organizations’ packages; with a tracker, the most accessed or the popular search is made available for users to access with one click – this saves time and traffic, enabling flexible and fast transaction
In this report, the use of trackers is to reduce the number of commands sent to the system at the same time. This is achieved by offering the popular searches at a glance to the users and, therefore, limiting the clicks needed to get the same content accessed by others. Every click that is made on a site occurs as a request for results and the databases or the servers take these as commands; to service one command may take unnoticeable period of time. However, in a case, where users are engaged in searching, selecting and sending purchase requests, the number of clicks is higher in this case and traffic is likely to be higher as well. As a measure of proficiency and effective rendering of pages and web results, trackers are used to limit the number of visits to a particular page (König, Dengel & Hinkelmann, 2011).
uLink is a technological tool that offers IT storage for online business sites. The service is aimed at providing users with a fast user experience in regards to their needs. E-business involves clients and service providers, whose needs are different from each other. Business choices are made in regards to the desires of parties and the needs they tend to serve. The service providers promote their businesses in order to make profits and be able to compete with rivals effectively. uLink enables service providers and clients to connect through an interface that offers storage tests to fasten user experience. The use of uLink for in the tourism industry is to promote fast and reliable customer experience in regards to the changing market and the nature of the Operating System platforms. Computers are considered to be highly prioritized in transaction processing in terms of speed and rendering of pages. In this regard, an application, accessing data through a computer, would inconvenience users if slow exchange speeds are registered at the service providers’ level (Choo, Detlor & Turnbull, 2000).
Popup Website Blocker
Information is the most important requirement every business model and adherent seeks to attain in both relevance and certainty. Organizations that deal with the tourism and clients who seek good organizations to book vacancies all rely on information. Information, rendered by an organization, is not always as safe as some clients would like to assume. On the other hand, clients, who access information from a certain database, use means available to other individuals, therefore, increasing the level of insecurity. Hackers and cyber criminals use websites to attack their victim and send commands that corrupt various information systems. These information systems are managed by the organization and, therefore, classify information according to the organization’s settings. A client with clear knowledge on the appearance of a genuine organization’s website may be tempted to supply private data on replica websites. In this case, a secure website rendering mechanism by the abbreviation ‘https’ is used as a secure connection and website rendering IT solution.
Secure Hypertext Transfer Protocol is a mechanism that increases the security modules of a website by providing an embedded activity tracker and associated websites. With https, popup websites or advertisements are blocked from appearing to the window a client is using. Besides the security, provided by the embedded security module, blocking these popup windows increases the efficiency of rendering relevant information as well as limiting the client’s focus to the main information source. This IT solution would entirely be focused on website blocking in cases, where no commands requested, coming from a client’s platform are sent. The effectiveness of the secure hypertext transfer protocol is realized through the limiting of data network traffic and the buffering time for large data websites. The amount of data that requires to be transacted between a client’s platform and the organization’s website depends on the nature and form of device used. By form, a smartphone would render a full website much slower than a personal computer; this is because the processing power in mobile phones is less than in personal computers (Holbrook & Reynolds, 1998).
Secure Web Page Resizing Technology
Information technology deals with information processing as well as the machines that are involved in the processing of the information. Assuming that there are over 200 types of gadgets that can access the internet in both form and make, it is notable that these platforms require a mechanism that renders information, according to their capabilities to save time and to serve a client reliably. Considering a client using a smartphone and a client using a personal computer to search for information on the internet, regarding tour-planning organizations, one with a mobile phone and requiring processing a one-megabyte webpage size would take longer than another individual, using a personal computer to access the same size of a web page. In this case, it means that a personal with the time to power on his laptop computer may have time to wait for a large web page to load. However, if circumstances do not allow the dragging of time, when finding information from the internet, a mechanism to address this issue would have to be applied. At this point, page resizing technology is applied to limit the amount of traffic per page as well as to deliver relevant information securely.
Resizing of web pages does not mean taking away the quality of the information or doing away with some images or texts; it rather defines the amount of data that is necessary for displaying, while filtering the amount of data that is not necessary. These protocols are applied at the internet browser level; they can be embedded on the browser or installed to the browser as plugins. With large pages displayed with minimum use of traffic, a website would load faster and the CPU or processor other device used would be left with minimal processing power. On the other hand, if a mobile phone loads the same website as a personal computer does; therefore, resizing in this case would be done at the web gate to specify and supply information formatted to fit or resemble a mobile handset. The resizing of these websites aims at reducing the amount of traffic, thus, fastening the processes of loading, information rendering, and quick location of the desired information (Books LLC, 2010).
PageRank algorithm is a technology that purely delivers results to search queries, depending on the number of pages residing under any particular website. Take Google, for example, relevance and reliability of a webpage determines which search result will appear first on the results page. Relevance is found through the number of links found on a certain website in regards to the accuracy of the search query. Search engines are not the only application. As a solution to address the fast access of information, the PageRank Algorithm is used in the tourism industry to filter information in regards to clients’ queries as well as their recent search behaviors. The organizations, dealing with the tourism activities, deploy knowledge to their staff through the implementation of information systems that are both informative and innovative. The innovation used by organization that purely deals with technological platforms like Google, needs to utilize this technology to depict a uniform growth of the e-business sector.
As a question to point out the relevance of PageRank algorithm in the tourism industry websites; why a client would require such technology or capability, relies heavily on the overloaded databases. The internet is the main source of information for many people and organizations; organizations, on the other hand, use the internet to disseminate information to their customers. With this as a factor, a client’s time wasted, while searching for a particular item on the organization’s website would be blamed on the organization’s lack of coordination and management of information. On the search engines, an organization’s information may fail to show despite the many attempts that a client tries. On another circumstance, a random search string may keep implicating a certain particular website as the most relevant. The two instances may be confusing to a client; therefore, PageRank algorithm should be applied primarily at the organization level, therefore, using trackers to present relevant search results on search engines. In this case, websites that carry out e-business practices like filetube.com can be emulated for the benefit of the tourism industry to increase the relevance of information, ease of searching and acquisition of results, and to allow clients enough time to select websites that appear to be relevant (Rekhter, et al., 2002).
Active Control Plugins and Technologies
The business world can be viewed through two perspectives: the first one, it is a world of thieves trying to get as much as they can to survive; and the second, it is a world of opportunists to outshine each other. There is a reason client does not trust his or her bank with his or her personal information. On the other hand, there is a reason that an organization would demand to be paid first before it can deliver services and goods that are considered high-risk products. On another level, there is a reason the bank does not trust transactions made by the organization with claims of client authorization. Referring back at the two perspectives, it is evident that an organization, a bank, and client work closely but mostly have trust issues that can be traced back to money. The client sees the organization as a potential thieve or opportunist, the organization sees the client as a potential thieve or opportunist, and the same trend passes on to the banks. However, these three players are strictly bound by ethics (with factors of ruthless employees and con artists kept constant) and fourth player come in with the ability to reap money and funds from the 3 of these players (the public).
The public domain is made up of organization managers, tourists, criminals, prisoners on parole, and most dangerously to this industry, hackers. Hackers can be categorized to one million categories, but cyber spies are mostly associated with identity theft, draining of people’s accounts, and posing as genuine bank representatives. Active Control Plugins and associated technologies are the perfect solution to cyber spies. The information, available in banks and organizations, should be limited to the bank and the organization’s use only and, therefore, accessible by only these. The social media are a creator of chaos, when it comes to the sharing of personal information. Consider the predictably of passwords and pins through people’s birthdays and remarkable events. Then consider a publicly visible email included on the information section of a social site like facebook. A bank and tourism organization should be able to scan the web to trace such security holes and scrap it out of the public domain. As a precautionary measure, the systems can provide a mechanism that would prompt clients to change their passwords after every few months. A better idea would be to preprogram the system in a manner that personal login details change automatically after a specified period of time, and prompting a user to authorize the change via a network or by a secret code. These mechanisms address security and most importantly the relationship between service providers, banks, and clients; this is to scarp the thief-opportunist perspective of business involvement.