scholarly journals WHAT INFLUENCES BUSINESS TRAVELERS BEHAVIORAL INTENTIONS OF TRAVEL BOOKING: A STUDY OF THE BOTTLENECKS OF ONLINE TRAVEL PORTALS

2021 ◽  
Vol 37 (3) ◽  
pp. 929-933
Author(s):  
Bivek DATTA ◽  

This study aims to explore the bottlenecks of the Online Travel Portals while catering to business travelers. Data collection was done from Online Travel Portals and 379 foreign tourists using varied scales to determine their comprehensive perceived experience, technology adoption perception, the bottlenecks encountered and the ability to adapt while selecting online travel portals. Findings revealed that building trust is a major bottleneck for business travelers as they are skeptical of online transactions, cases of online thefts and internet security issues is another bottleneck. Safe and secure payment gateway is a big hurdle. Hotels booked through Online Travel Portals are sometimes not up to the mark and quality is a major bottleneck Online Travel Portals felt that expected tour components by the business travelers was the most problematic factor for them. Another problem was the unfavourable payment terms with the suppliers as well as non-availability of right accommodation demanded by the business travelers. Another bottleneck included not meeting the special needs of Business Travelers.

Author(s):  
Md Equebal Hussain ◽  
Mohammad Rashid Hussain

security is one of the most important concern on cloud computing therefore institutions are hesitating to host their data over cloud. Not all data can be afforded to move on the cloud (example accounts data). The main purpose of moving data over cloud is to reduce cost (infrastructure and maintenance), faster performance, easy upgrade, storage capacity but at the same time security is major concern because cloud is not private but maintained by third party over the internet, security issues like privacy, confidentiality, authorization (what you are allowed to do), authentication (who you are) and accounting (what you actually do) will be encountered. Variety of encryption algorithms required for higher level of security. In this paper we try to provide solution for better security by proposing a combined method of key exchange algorithm with encryption technique. Data stored in cloud can be protected from hackers using proposed solution because even if transmitted key is hacked of no use without user’s private key.


2013 ◽  
Vol 756-759 ◽  
pp. 3039-3042
Author(s):  
Chen Zhang ◽  
Shi Jie Jiang ◽  
Bin Huang

Online payment is apparently the key for the online transactions, so its security issue becomes the center of focus in the e-commerce development. In China, however, the information leakage, transaction fraud and other security issues have occurred so frequently that they have severely affected the customer confidence, and have become one of the major blockages in the e-commerce development. This article intends to have an in depth discussion of online payment security issues, examining current situations and problems in security technology, corporate social responsibility, and also propose appropriate strategic recommendations.


2018 ◽  
Vol 24 (3) ◽  
pp. 342
Author(s):  
Sri Haryati

ABSTRACTThisi study was aimed at to constructed the actual issues of national resilience ini thei developmenti of educational content of civici educationi as a description of knowledge about the actual issue of citizenship in the national resilience studies asi thei content of civici educationi in school.The research used qualitative descriptive approach. Source of informant data with purposive sampling technique, relevant document and literature study. Data collection was done throughi in-depthi interviewsi, FGD, iobservation, and documenti studyi. The validity of data was done by triangulation process of source and method. iData analysisi was done byireduction, data ipresentation, and iconclusion.Thei resultsi showedi thati the description of the content of civic education was based on the actual issues of national resilience concerning ideological, political, economic, socio-cultural and security issues in the form of basic competence study which translated into indicators to achieved the objectives of basic competence. Based on idataianalysis, it wasiinecessary to studiedi theiactual issue of national resilience to supported the content of civic education education in schoolABSTRAKPenelitian ini bertujuan untuk mengkonstruksi isu aktual bidang ketahanan nasional dalam pengembangan isi pendidikan kewarganegaraan persekolahan berupa deskripsi pengetahuan tentang isu aktual kewarganegaraan bidang ketahanan nasional sebagai isi pendidikan kewarganegaraan persekolahan.Penelitian menggunakan pendekatan deskriptif kualitatif. Sumber data informan dengan teknik purposive sampling, dokumen dan kepustakaan yang relevan. Data dikumpulkan dan diolah dengan cara wawancara mendalam, FGD, observasi, dan studi dokumen. Validitas data dilakukan melalui proses trianggulasi sumber dan metode. Data dianalisis melalui reduksi data, pemyajian data, dan penarikan kesimpulan.Penelitian ini menemukan rumusan tentang deskripsi isi pendidikan kewarganegaraan berdasarkan isu aktual bidang ketahanan nasional yaitu tentang isu-isu ipoleksosbudhankam berupa kajian kompetensi dasar yang diterjemahkan menjadi indikator-indikator untuk mencapai tujuan dari kompetensi dasar tersebut. Berdasarkan analisis data, diperlukan kajian isu aktual ketahanan nasional untuk mendukung isi pendidikan kewarganegaraan persekolahan


2016 ◽  
Vol 11 (1) ◽  
pp. 31-45
Author(s):  
Fernandes Anthony Jovial ◽  
Alex Emy

Increase in accessibility to the internet and consumer’s faith in conducting online transactions, have paved way for a steady change in how consumers plan and buy their holidays. The role of traditional travel agents and online travel portals, as sources most knowledgeable about holiday destinations is on the wane due to the emergence of online reviewing platforms, and easily accessible and first-hand information from the service producers. Consumers today prefer to approach service producers such as resorts, restaurants, transport providers and guides to book their services. Given this scenario, this paper attempts to determine the catalyst for the changing trends in tourist buying behavior, the role of the internet and whether travel agents are aware of the said changes. The paper also looks at possible opportunities for travel agents to expand their products’ portfolio to maintain or increase their revenue in tandem with the changes in the industry. The study takes into consideration responses received from 75 tourists and structured interviews conducted with sixteen travel agents.


Author(s):  
P. Lalitha Surya Kumari

This chapter gives information about the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by big data applications. Big data is one area where we can store, extract, and process a large amount of data. All these data are very often unstructured. Using big data, security functions are required to work over the heterogeneous composition of diverse hardware, operating systems, and network domains. A clearly defined security boundary like firewalls and demilitarized zones (DMZs), conventional security solutions, are not effective for big data as it expands with the help of public clouds. This chapter discusses the different concepts like characteristics, risks, life cycle, and data collection of big data, map reduce components, issues and challenges in big data, cloud secure alliance, approaches to solve security issues, introduction of cybercrime, YARN, and Hadoop components.


2022 ◽  
pp. 19-38
Author(s):  
Jeffrey S. Zanzig ◽  
Guillermo A. Francia III

Tremendous improvements in information networking capabilities have brought with them increased security risks resulting from the deterioration of the ability of a physical layer of computer security to protect an organization's information system. As a result, audit committees have had to deal with new security issues as well as the need to understand the cyber perpetrator and ensure the proper training of employees to consider cybersecurity risks. Standard setters including the Institute of Internal Auditors and the American Institute of Certified Public Accountants have issued guidance about lines of defense and reporting on an entity's cybersecurity risk management program and controls, respectively. Each of these topics is considered along with how cybersecurity guidance from COBIT, the National Institute of Standards and Technology, and the Center for Internet Security can be mapped into five cyber infrastructure domains to provide an approach to evaluate a system of cybersecurity.


Author(s):  
Roumaissa Khelf ◽  
Nacira Ghoualmi-Zine ◽  
Marwa Ahmim

The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of IP-enabled wireless sensor networks (WSNs), the landscape of IoT is rapidly changing. Nevertheless, this technology has exacerbated the conventional security issues in WSNs, such as the key exchange problem. Therefore, Tiny Authenticated Key Exchange Protocol for IoT (TAKE-IoT) is proposed to solve this problem. The proposed TAKE-IoT is a secure, yet efficient, protocol that responds to several security requirements and withstands various types of known attacks. Moreover, TAKE-IoT aims to reduce computation costs using lightweight operations for the key generation. The proposed protocol is validated using the automated validation of internet security protocols and applications (AVISPA) tool. Hence, results show that TAKE-IoT can reach a proper level of security without sacrificing its efficiency in the context of IoT.


2016 ◽  
Vol 4 (1) ◽  
pp. 90-103 ◽  
Author(s):  
Michael Adu Kwarteng ◽  
Michal Pilík

Abstract The advent of the Internet continues to open new frontiers in digital marketing. One visible impact of the Internet in marketing has been the growing increase in online transactions which profits marketers and seemingly satisfies customers. However, in developing countries, the potential of online shopping has not been fully explored, and in some cases, are just non-existent. Lack of online infrastructure has often been attributed to the slower growth in online transactions in Africa, however, the customers’ preparedness and inclination to use the service is ignored. .Against this backdrop, this study seeks to analyze consumers’ propensity to engage in online transactions with a focus on demographic attributes such as age, gender and education. Using customers in Ghana as a case study, key reasons as well as the demographics that fancy online transactions are revealed. The results indicate that delivery problems, poor internet connection, privacy and security issues are some of the reasons preventing customers to shop online


Sign in / Sign up

Export Citation Format

Share Document