Tuesday, May 13, 2014

Case study- The impact of ICT on hospitality industries
















As with almost every industry, ICT applications have an enormous impact on different industries. From social media to smart phones and automatic check-ins, Information and Communication Technology effects even the smallest areas of the industry. ICT applications are evolving at an ever quicker pace and industries have to adapt quickly to keep ahead of the curve, or else risk falling behind the competition.
Over the years ICT has affected hospitals industries, it improved the efficiency of work, it made the work quicker and more accurate and even easier to use. It helped to diagnose many diseases that were hard to treat, example using endoscopes to get access to the patient's digestive system, X-ray's to see broken bones, etc.
Many important documents can be saved easily and retried later without typing those details again, since everything is saved in a database.
With the development of ICT and hospitals, the patients can see if the doctor is available at a certain time, and book appointments online. This decreases the pressure on the workers and even reduce the mistakes and errors.
Even in hospitals, sometimes they are using biometric devices for security for example iris recognition, fingerprints recognition and signature recognition.


ICT has a great effect on all industries not only hospitals, and year by year it is developing and improving the facilities of different types of industries in different aspects. 

Monday, May 12, 2014

The Digital Divide & Information Literacy


*Define digital divide.
The Digital Divide, or the digital split, is a social issue referring to the differing amount of information between those who have access to the Internet (specially broadband access) and those who do not have access. The term became popular among concerned parties, such as scholars, policy makers, and advocacy groups, in the late 1990s.

*Identify the main effects of digital divide on society.
·      Information literacy
·      Poor countries are not able to buy ICT devises since they are expensive therefor they can't learn the new technology
·      There will always be a gap between the people who knows how to use ICT devices and whose don’t, example the old generation and the younger generation.

*Explain a real case study on bridging the digital divide gap.
In this century, people should learn how to use the internet and the technology, therefore many work institutions are giving free courses to their employers, so they can know more about the technology and ways to use them, as well as the importance of ICT in today’s life. Teaching the employers the ICT skills make it easier for them to do their work efficiently and also it tries to bridge the digital divide gap between them and other workers in other companies.

References : https://answers.yahoo.com/question/index?qid=20090226034744AAlj7cH

Monday, April 21, 2014

Online Services And Health And Safety

1- Identify the main health issues with online services.

1.   Eye Irritation And Eye Strain.
Caused by glare from the screen, poor positioning of the screen and poor lighting.

2.  Repetitive Strain Injuries:
·       Carpal Tunnel Syndrome.
It is a condition cause's pain in the forearm and wrist.

·     Cubital Tunnel Syndrome.
It is a condition cause's pain in elbow.

Solution:
The user has to sit in a proper way and a proper angle while he/she is working on a computer.
·     Head is up
·     Shoulders relaxed
·     Back erect and supported by a good quality seat
·     Feet's should be on the ground
·     Hands should be in line with the forearm
·     The monitor should be at the eye level
·     Avoid bad lighting

2- Identify the main safety issues

·     Electrocution – It occurs wherever there are a lot of computers, sockets and electric cables. Solution:
1.  Avoid overloading the sockets
2.  Electrical equipment's should be placed away from water supplies
3.  The workers should have a background on knowledge of electrical safety
4.  Disallow drinks near the electrical equipment's

·     Fire – It is happens when a computer over-heat or a wire fray.
Solution:
1.  Always place carbon dioxide fire extinguishers in the rooms/offices.
2.  Fire exists must be clear.
3.  Water supplies must be far from the electrical equipment's.

·     Tripping hazards – When the wires and cables are lying around, people can trip over them.
Solution:
1.  Cabling must not trail on the floor.
2.  Additional equipment's must be placed in the store or any place that it will not result in trailing cables.

·     Danger caused by heavy equipment falling
Solution:
1.  Make sure that the benches can withstand high weight.



Friday, February 21, 2014

Data security and legal issues

·      What is Data Protection Act?
The Data Protection Act controls how personal/customer information is used by organizations or by government bodies. The Data Protection Act has rules which require everyone who collects data to follow strict guidelines and data and privacy policies, whilst also keeping information safe. The Data Protection Act's rules are very thorough and cover rules around sharing of data, and data security.

·      Who is the information commissioner?
He is the man who has the authority to enforce that data protection act on the people of his respected country
·      Who is the data controller?
a person who determines the purposes for which and the manner in which any personal data are, or are to be, processed.
·      Who are the data subject?
Data subjects are the people who the data refers/ relates to them.

·      Who are the data users?
People who use the information

·      What is personal data?
Any information that is related to an individual who can be identified from this data, he can be identified by a number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity.

o  Find and list all eight points of the data protection act
1.   The data shall not be processed fairly and lawfully
2.   Personal Data shall be obtained for a lawful purpose and nothing else
3.   Personal data shall be equated, relevant and not excessive in relation to the purpose for which they are processed
4.   Personal data shall be accurate and where necessary kept it up to date
5.   Personal data processed for any purpose shall not be kept for longer than is necessary for that purpose
6.   Personal data shall be processed in accordance with the rights of data subject
7.   Appropriate technical and organizational measures shall be taken against unauthorized or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
8.   Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.

References:


Thursday, February 20, 2014

Online Services And Security And Privacy Of Data

Identify The Main Data Security Aspects In The Below Categories:

Need to protect confidentially of data
·    Encryption  - confidentiality is maintained through encryption of the data after it is processed.

Shop Security
·    Public Key Systems - It is used to ensure the protection of data for online payment and code services.

Online Banking -

The data is protected by three methods:

·    Transaction numbers (TANs) : it is defined as one-time passwords.
·    Entering parts of the passwords: The user is asked to fill in only parts of his/hers password.
·    Chip and Pin devices: It is a method to ensure that the data entered is correct.

Online Shopping

When you are using online shopping you have to make sure that the data entered is secured by using :

·    Secure Socket Layer (SSL) Protocol
·    Transport Layer Security (TLS) Protocol



Online Services

  • Definition:

An online service refers to any information and services provided over the Internet. These services not only allow subscribers to communicate with each other, but they also provide unlimited access to information. Online services can range from simple to complex. A basic online service may help subscribers gain needed data through a search engine, while a complex one might be an online mortgage application from a bank. Online services may be free or paid.

  • Effects of Online Services on the society:

Online services makes the life much easier and quicker, no need for the customer or the user to go to that specific area to book or buy etc. something, he simply can do this action online.
Sometime it is cheaper so less money is spent.
Users can go to any place on the world just by clicking few buttons.


Wednesday, February 12, 2014

Online Shopping

Online Shopping is an electronic commerce application that businesses can use with each other or they can offer services or goods directly to the customers.
Online Shopping has benefits to the shop and even to the customer. Customers can visit different stores by using their PC's or any ICT device that can be connected to the Web, and they can easily compare the prices of different stores and even they can reserve the products. No need for them to stand in a queue to reach to the cashier, and they can shop around without spending time or money by travelling around different stores.
The pressure on the employee is less, because customers can shop online instead of going to the shop and waste time. It makes the stock and money control easier, there is no need to pay staff to price goods or to order stock.
To shop online, you have to:
1.      Choose an online store
2.      Create an account
3.      Choose the product(s) you want to buy
4.      Checkout
5.      Choose the method of payment
6.      Choose the delivery options
7.      Confirm the order
8.      Log off
Customers should be aware from the site they are using, they have to make sure that it is safe in order to prevent been stolen or hacked. To prevent this from happening the personal details should be encrypted (encoded) when they are transferred over the internet, and the shop network server will decrypt (decode) the data using the encryption key.