Introduction The purpose of this thesis is to investigate the use of information technology as a destination marketing tool for the present and future challenges prospects to the tourism industry in Ghana..This has become important because of the fact that the world has become a global village due to the liberalization of the internet. Tourism can be defined as travel and lodging by a person from another city, town, country or place. People have reasons to travel to other places and the reasons could be to see a friend, travel for leisure, business, education or health. It is very hard for the tourist destination marketing institutions to maintain the evolution of the new technologies. The emerging innovative advertisement strategies, the …show more content…
The reservations of hotels in tourist destinations can be easily done with basic knowledge about the use of the internet (Satir, 2005; Bill Anckar, 2001).The use of different online reservation methods through the internet were introduced (WTO (2014) in various countries mostly in Ghana. The reason was to make tourism products and tourist destination more easy, secured and flexible to obtain in developing countires. Suppliers such as hotels, airlines, travel agents and customers such as tourists and visitors need information technology (IT) in order to obtain information about desired tourist destinations. Life without information tecnology would have been very difficult to sell tourism product at destinations easily. Travel and tourism are inescapably influenced in the tourism business processes by the technological revolution. As information is the most important element of the travel industry, effective use of information technology tools is the central point for obtaining information about the tourism destination markets (Esther Meng-Yoke Tan, 2009;Russell Williams, 2004). As a result all IT systems are spreading fast among a large number of people in everyday life and part of the tourism industry, most especially in Ghana which is still developing. Unlike goods and services that can be seen by consumers, tourism products on the internet are intangible and cannot be checked or touched physically before buying. They are purchased before their period of use and far from their location of consumption. They rely on the representation and description given by the travel trade such as information, secured websites and brochures, so their capability to charm and attract consumers is therefore very important. The provision of correct information through secured websites that are relevant to customers’ needs is the most significant element in
For the first phase of this project, I started by contacting the company to find out who could provide me the view of what the company environment looks like. I wanted to get a holistic view so I could understand all the components and how they function together. Starting from the beginning at the website, this is where customers can log into their account to retrieve their information and move or withdraw money. I learned that this process works by redirecting the user to the FIS validation login page and FIS authenticates the user in their system. There is nothing that is performed on the company website; just think of a police officer standing in the middle of the street pointing to where you need to go.
The website exuded an air of elegance and professionalism while at the same time being highly user-friendly. One of the most notable aspects of the website was its ability to provide clients with in-depth
Target must maintain the customers’ confidence of the company’s ability to protect information or they could lose a huge portion of the
The protocol sets out how e-commerce websites structure the customer information on their checkout forms. This allows accurate and easy inputting of customer information into different website's checkout forms without repeated input of the same data. Billing, shipping and payment information are all examples of the types of information that can be transferred between merchant websites. d.) When conducting business dealings with people with special needs it is first important to understand their needs and requirements and be able to adapt your approach to meet these needs.
This also includes system and application owners, their contractors and their training coordinators. The success of the awareness and training program, and the overall awareness of secure business practices, depends upon the ability of all users to work toward a common goal of protecting the information and technically related
This includes information provided at the time of registering an account on our Website, subscribing to any service which we provide, searching our Website, placing an order on our Website, participating in discussion boards or other social media functions on our Website, creating wish lists on our Website, or requesting further services. We may also collect and process information when you enter a competition or promotion, and when you report a problem with our Website. The information you give us may include without limitation your name, postal address, e-mail address, password, telephone number, financial and credit card information, age, occupation, personal description, photograph, product interests and style
Data breaches can lead to negative publicity and damage a company’s reputation. Improving data security can help small businesses protect their reputation by preventing data breaches and protecting their customers’ data. By implementing this plan, the IT department of our company will be better equipped to provide the technology infrastructure and support necessary for the company to operate efficiently and effectively. The plan will also help to reduce costs and improve customer service, leading to increased productivity and
Introduction Tourism in Hawaii has expanded widely throughout the years and has affected Native Hawaiians and their culture in many ways. According to Business Insider, Hawaii is number ten on their most popular states to visit list. It also ranks as sixth in the world in tourist visits according to the Environmental Justice Atlas on their topic of “Tourism and Indigenous”. However, there have been reports from Native Hawaiians that Hawaii is not the paradise state many tourists claim it to be. In a survey, 60% of Native Hawaiians disagreed with the quote, “[tourism] helps to preserve Native Hawaiian language and culture”(Garcia).
For operational purposes, the company collects and stores confidential information about their customers, employees, suppliers, and vendors. For purposes of their rewards program, the company collects sensitive and confidential consumer information. Although security measures and information technology systems have been put in place to ensure secure transmission and storage of confidential information, security breaches, computer viruses, or even human error can occur. Any of these events could cause data to be lost or stolen, as well as disclosed and used with malicious intent. Such occurrence could lead to litigation, fines, increased security costs, and damage to
These risks should be examined within the confines of the business needs, mission statement, and legal obligations. Classification of potential risks allows the organization to prioritize efforts in a granular manner to close security gaps based on cost, effectiveness, and potential loss of business as well as the sensitive information they manage. This should also include security efforts that conform to business requirements, laws, regulations, and follow the organization’s mission statement. It should identify the policy scope, definitions, roles, procedures, team members, points of external contact, organizational groups, services offered, contact lists, tools, applications, system diagrams, custody chains, organizational dependencies, and performance metrics as well as reporting, contact, and evidence documentation
Also, people are advised only to use secure websites to make online financial transactions (Giles, 2010). Organizations are legally required to protect people’s personal information. Proper corporate diligence standards, such as shredding confidential information before disposing of into dumpsters and ensuring sufficient network security, are
The definition of the word “Tourism” is different source by source, person by person. There is no specific definition for it. Each institution defines “Tourism” in a varied way. Firstly, tourism is related to several groups which involving in or are affected by tourism industry. Their perceptions are crucial to the development for the definition of tourism.
According to UNWTO “over the decades, tourism has experienced continued growth and deepening diversification to become one of the fastest growing economic sectors in the world.” In Belize, tourism is one of the growing industries that has to a large extent, a great influence on the economy. The tourism industry has demonstrated success and commitment to maintain the authenticity of its attractions fostering attractive platforms for investors looking to cater the growing number experience-Based tourist. Yet tourism is not the only successful industry in Belize, there is the citrus industry, sugar industry, banana industry and also the marine industry which help the economy. Therefore tourism does indeed help the development of Belize because it provides jobs, nevertheless tourism is seasonal, therefore it only provides jobs for certain season such a summer, Easter and Christmas.
A time before the introduction of Internet, the consumer would visit a travel agency to review the tourist information, usually conveyed through the travel brochure, and select the options that most interested him. Today, one can no longer speak of this kind of tourism. The growing world population, evolution of tourist behavior and introduction of the internet has expanded the
Therefore, Tourism in Oman need to be better promoted to the whole world through the different marketing tools available nowadays such as,