Get free samples written by our Top-Notch subject experts for taking online Assignment Help services.
There are a huge number of applications which are being used in different organizations. And in the current days it is surely known to everyone that technology has taken a huge part in the current generation as well as in the current society. So without wasting the time the designer should briefly discuss the current research and the research topic. The main target of this project is to make a visitor management application system with the help of some programming languages. All the procedures to make the entire research and the software work will be discussed part by part in the below sections.
Since September, 2000, several companies and government organizations have boosted security employees by adding clearances and visitor paperwork. In Beslan as well as Russia, in 2014, the most defining event highlighting the necessity to strengthen campus security throughout the world occurred. Since then, several novel computerized visitor security technologies have been introduced to meet this demand. In relation to function hurdles regulating access to one area, organizations have highlighted the need to tighten their method for tracking whomever enters and departs the facility. Even though it is slow and only provides name and information, the basic document technique is restricted .
The aim of this project is to make such a kind of application where the visitors visit through the application. In a smaller approach this can be said that basically a visitor management system application is being created through the project and research.
And the objectives of the project can be defined as
To make such kind of application like the visitor management systems or something like this huge application a huge sets of questions might occur in the mind of the designers like;
Q1. What are the possibilities that the software will be done within the provided time?
Q2. What are the error possibilities for what will happen if the project is not completed?
Q3. How much will the customers be satisfied after getting the application for using?
Q4. What will be total expenses and how much labor will be required to make the application?
These are generic questions which are coming into the mind of the designers.
Some of the hypothesis can be conducted like;
h2: The software will be done within the provided time
H0: The software will not be done within the provided time.
H2: There will not be any error in the software and it will run fluently
H0: There will be huge errors in the software and it will not run fluently.
H3: Customers will be satisfied after using such kinds of applications.
H0: Customers will not be satisfied after using such kinds of applications.
H4: The project will be completed within the estimated expenses and labors
H0: The project not will be completed within the estimated expenses and labors
What is the issue?
The main issue of the project is in some organizations the visitors cannot be managed with the manpower and this is being too much time consumed while the gatherings of visitors are having. So to remove the problems and to make the process in a good way an application is being created by the designers to manage the visitors.
Why is the issue?
The issue is mainly coming up in this research just because it being impossible to manage the visitors to the organization, and the members of that organization are unable to keep the records of those visitors in the hand written log book. To make a solution of this problem this step has been taken by the designers.
What will be the probable result?
Some positive consequences are being taken about the project so the designers can think about some good responses from the outcomes of the code. A huge probability is occurring about the outcome of the software work and as the entire research will be conducted by the positive approaches so, this is also sure that there will be the positive outcomes about the software.
Data breaching is an activity where the data of the users are hacked (Solís-Radilla et al, 2019). A data breach occurs when an owner of the system does not know or consent to the theft or removal of data from the system. A data breach may happen to any corporation, no matter how big or small [Refer to appendix 2].
There are several types of visitors to software. Such as the job interview candidates, the delivery person as well as messenger, vendors for a project as well as contractor, people who attend the business meeting. At the time of the pandemic situation which was caused by the outbreak of COVID-19, most of the work was done online to maintain the social distancing. So, it is very important to check as well as monitor the visitors in a system. The main purpose of creating a visitors management system is to check the visitor flow in the system. In the area of business-to-consumer which is also known as B2C, the experience of the visitors is an important aspect of a business (Hong et al, 2020). The B2B market which is also known as the business-to-business market needs human contact more than ever in this age of digital change, with an emphasis on the unique experience of the visitor as well as the satisfaction of a customer.
Although there are several disadvantages of having a visitor’s management system for a company. One of the most important disadvantages is the high startup cost. The cost of having software is very high. The hidden cost of the software is also very high.
The interface is linked to the cloud, which collects the data as well as presents the data entered by visitors on the other end of the front end in a visitor’s management system for simple administration. As a result, a visitor management system that is based on the cloud may be easily integrated into current systems without the need for a costly as well as time upgrade. Using a SaaS solution that is based on the cloud provides the best approach to tracking visitors. One of the biggest advantages of the cloud-based visitor's management system is that a company can buy the storage for the visitor's management system (Kim et al, 2019).
This part has been discussed a little bit while the starting of the previous part of the chapter, as it has been said that the members of the organizations are facing some problems to keep the proper details of the visitors as well as the employees. To reduce the problem, designers have taken the target to make the application of the visitor management system with help of some programming languages and MySQL will be working on keeping the details of those employees and the visitors.
A small conclusion about the chapter can be conducted in the way like, a small introductory speech has been provided through the introduction part in the chapter. In that part about the entire working procedure has been discussed. Some background able be defined about the technology and the application. Some of the objectives are discussed and the occurring questions of the research are classified as well as some positive and negative points in the form of hypotheses have been discussed about the work. And the project issues, and the probable result also discussed in the rationale part of the chapter. And the rest of the parts of the research will be conducted in the upcoming pages. Before that a research framework will be provided to easily understand the project.
This chapter is quite interesting in the dissertation because all the research will be conducted and discussed in the current chapter. There are many authors who have written some important notes about the current topic and there are many articles having a direct relation with the current project. Some of the journals, articles and websites will be visited to gather the data about the current research and according to the research paper the designers will make the discussion about their findings through this chapter. Some theories and models which are based on the current topic of the visitor management system. In the very next part of the chapter a conceptual framework will be drawn. And the empirical study will contain the report of the all gathered result of the journals. As it has been discussed that the theories and the models which are based on the related topic will also be discussed through the chapter. A gap of literature will be provided and finally a conclusion will be made about the happenings of the entire chapter literature review.
A visitor management system is the framework that keeps track of visitors' actions at a company or public institution. It can quickly give the appropriate output and knowledge, as well as track arriving and outgoing visitors. However, VMS has the potential of streamlining the registration process and providing visitors with accurate and comprehensive data. Many organizations and schools still use a paper documents log called guest book to track visitor access. Once the number of calls exceeds the maximum, this automated technique takes lengthier. Nevertheless, an increase in visits suggests that security concerns in the organizational system should have been addressed. This is mostly due to the managers' shortage of information to verify each visitor's documentation when there are a large number of people approaching the facility [Refer to appendix 3].
Furthermore, a paper record is insufficient to provide appropriate people though it can be kept or accessed easily and after many years. Due to the aforementioned conditions, VMS provides a good solution to the challenges that arise in the traditional technique. An integrating VMS that uses the Malaysian Identity Card, or Details pertaining, as the credential to enter the building provides a simple approach for identifying and preserving the personally identifiable characteristics of visitors. This authentication scheme also aids the patrol officer in determining is not whether the customers have authority to enter the building. In this article, a computerized VMS is planned and implemented at UMP Pekan in order to ensure that the enrolling procedure is simplified prior to accessing the facilities.
VMS Support is a web application that works in conjunction with a computerized visitor management system (CVMS). The program receives visitor notifications, responds to CVMS, and updates the current location. The visit notice was created utilizing a portable offline text message, which eliminates the need for the company to buy in an internet connection or pay for a commercial push messaging system. The operator can reply to a visit notice by sending a clear message to both the CVMS and updating its present position to properly lead the visitor. Computerized Visitor Management Systems were never a new concept in current computer time, as many of them are previously in use in many industries including hospitals, schools, and other organizations. The CVMS serves as the first line of defense against intruders who may disrupt the company's normal service. These programs, on the other hand, normally automate just the collecting of public documents and metadata. Some people may send SMS notifications, but they will just get tabular information and will not be able to react toward the transmitter. To summarize how the software runs, that becomes a subscriber of visitor notifications, which reveal characteristics on the visitors and specifics about the journey, such as with the purpose of the visit. If somehow the organization provides a guest hospital room, it can also refuse or admit the visitor. Finally, if a company's representative is able to install his or her relocation in order to effectively lead a visitor if there is still an unexpected change of position owing to causes such as a presentation, office repair, etc, the visitors may very well be able to install their or her present position.
A visitor guide and tracking system is for visitors who are visiting a big organizational area such as a company, school, or other such facility. These guests are unfamiliar with the university or the surrounding region. They must also get an admittance pass at the industry's entry; this method is time consuming because most of the visitor's information must be filled out. During working hours, no one will be present to serve as a guide to assist guests in reaching their goal entirely. Because the visiting guidebook assists us in tracking the target by providing instructions, we save time asking questions and seeking for a certain location. This concept also contains a guest tracking system. Visitors are monitored at the security cabin on the property map on site, but there is absolutely need to keep an eye on them. This technology also alerts visitors if they are approaching a limited location. The tourist guidance and monitoring system includes primarily a single transportable gadget that serves as both a visitor’s guidebook and a protection cabin monitoring system. This minimal portable unit has features such as a touchscreen for setting destinations, audible alerts, and Screen instructions. As a consequence, it is simple though and a great guidebook for tourists. This would be the wireless communication technology universe. Wireless communication mediums have displaced a set of technologies and businesses that used wired data and operations. This technology is being developed for large establishments such as institutions, institutions, and enterprises. Our goal is to leverage these wireless techniques to develop a tourist guide and surveillance app. A guest will be issued one single unit by security guards at the entry to the grounds. The guest will type in the location he wishes to visit or indeed the contact he wishes to encounter. This custom device will direct him toward his goal. He is not required to consult anybody.
According to Hughes et al, 2019, ICT which is also known as the communication as well as information technology is the focus of this study, which aims to speculate on how current, as well as upcoming developments in ICT, might transform the approach to tourist firms connect as well as manage their visitors (Pakhalov et al, 2020). An analysis of present methods of tourism management is carried out using components of predictions as well as innovative systems to uncover key intersections between the choices of the visitor as well as the tactics of the management. The five aspects of connection, compliance, choice, customization, as well as co-creation, were explored via the lens of fictional trip narratives. Tourism managers must keep an eye out for these tales, which have been examined to uncover shifting trends as well as reveal possible changes in paradigm. This is the combination of the rising complexity of the material, the need for suitable linkages, as well as the key element of collaboration as well as coordination in prospective travel systems. There has been a lot of debate about how tourism firms, as well as travelers, utilize technology, but there is very little indication of practitioners as well as researchers using traditional possibilities thinking to tourism as well as ICT. Storytelling, as well as design thinking, were used in this research to forecast as well as show how technology may be integrated into tourist services as well as experiences in the future. Technology has the potential to profoundly alter the way the author of the following research journal handles visitors as well as their interactions, according to this study (McKeever, 2020).
According to Kim et al, 2019, it was the goal of this research to learn about the factors that influence hotel choice in Korea's competitive hotel market, as well as to see whether the findings had any effect on the development of performance expectancy. Seven dimensions were found to include 16 tangibles as well as 17 intangibles in total. Intangible traits were considered to be more significant but less satisfying, while physical attributes were found to be more important but more satisfying. A visual representation of each attribute's satisfaction ratings as well as relevance was also provided via the grid of importance-performance analysis. Intentions had a b correlation with all of the study's intangible variables.
According to Pakhalov et al, 2020, based on online evaluations, the authors of the following research journal want to gauge the influence of new techniques on the escape room experience of the visitors in this study. Escape mechanisms from rooms have grown in popularity as a tourism destination in several European locations during the past years. The increasing rivalry among escape room companies has prompted them to look for innovative ways to enhance the customer experience. Using new technology, such as virtual reality as well as special effects, is among the new techniques. Claustrophobia, a major European producer of technologically sophisticated escape rooms, provided evidence for this research. There is also an interview session that was semi-structured with the co-founder of the company as well as an analysis of 746 user reviews on Trip Advisor included in the empirical portion of the research (Luká? et al, 2021).
Because of the rapid expansion of internationalization, businesses now see a steady influx of people dropping by regularly. Clients, suppliers, possible recruits, sales associates, officials of the government, guests, families of the workers of an organization as well as sometimes even strangers are among the visitors. They visited the website of a company (Koh et al, 2021). The appropriate, as well as the complete screening of every visitor to the website of a company, is a significant task for every firm. Keeping track of everyone leaving as well as entering the website of a company is critical for the safety of the workers as well as the safety of the company as a whole. On a website of a company, several private, as well as important data, are stored. So, it is very essential to maintain security. There are a variety of visitors to businesses, some of which are regular and others which are rare. Furthermore, manually entering visitor data just makes things more difficult as well as increases the likelihood of a mistaken database being created. As a result, visitors' manual entrance should be substituted with a computerized method (Shaila et al, 2019). The visitor management system is very important to check the status of the visitors. Fortunately, software for Visitor Management was created to handle these issues in a methodical as well as professional manner without sacrificing productivity, security as well as hospitality. The Software for the visitor management system streamlines the registration of guests, the issuing of passes, as well as the collection of visitor data in a matter of seconds (Ding et al, 2021).
There are several advantages of having a visitor management system in the company. The advantages of having an effect as well as efficient visitor management system are as follows:
The technology acceptance model which is also known as TAM is the model which will help to develop the following software. The technology acceptance model which is also known as TAM aims to predict how people will use as well as embrace new technologies in the future. The real system's final point is represented by the following technology. Behavioral Intention is what entices consumers to this approach. By utilizing the technology acceptance model it is easy to make predictions for the new data resources. The perspective of the software is influenced by external factors such as societal pressure. People are more likely to incorporate technology if these items are in place. Because everyone is unique, perceptions may shift with age and gender. Using the framework of the technology acceptance model, one can see how the capabilities of business software are integrated into deployable as well as identifiable apps. There is a universal language in the framework of the technology acceptance model for the many groups that deal with system procurement, design as well as sale. It organizes software into logical categories before going into detail about the features of each one. Thus, it is a realistic, daily working reference to define as well as manage the complicated environment of the management system (Sagnier et al, 2020).
Simulation models for developing software are used to assess as well as anticipate the effectiveness of a digital version for a working prototype. Software engineers, as well as scientists, benefit from the characterization of the model of simulation, which helps them to better understand the failure of a load as well as component. It is easy to determine the risks related to software development. This process helps the software developer to mitigate the risks at the time of software development. It is safe as well as effective in dealing with real-world issues (Ajibade, 2018). The model of simulation for software development provides a valuable analytical approach that is simple to comprehend, analyze as well as convey. A model which is based on a computer is used instead of a physical model, including a machine copy, to create a model which is generated by a computer. A computer simulation employs a genuine model as well as a mathematical representation of the systems in question. In operation, the system produces mathematical movements identical to those of the existing system, as well as the results are shown as a consequence.
This project employs probability theory to develop the software for the visitor's management system. This is a data mining theory. The main objective of the theory of probability is to make decisions at the time of developing the software. The inductive databases may be used for data analysis.
There are different reasons for having a visitor’s management system (Scherer et al, 2019). The visitor's management system is used to track the experience of the visitor. The following software will only check the period of checking in as well as checking out of the customer. The following software is attached to the social networking website. One of the disadvantages of the digital visitor's management system is the huge initial cost. Manual visitor management methods are less expensive, while electronic systems of visitor management are more expensive. Both entail the use of identification badges. It is also necessary to have printers as well as software to run the electronic visitor control system. The personal data of the visitors is private and therefore must be protected. The identities of the visitors may be stolen if the data is not safeguarded properly. Encryption is required for cloud storage. Backups of data are also required. Visitors' personal information must be kept safe by the institution.
This is the second chapter of the research. In this chapter, the academic justification is made for the research. The importance of keeping a visitors management system is properly provided in the segment of empirical study. All the variables of the project such as the independent variables as well as the dependent variables are properly justified in the variable declaration part. The required models as well as the theories for the project are properly created. The literature gap is properly designed in this phase.
In this following research, positivism research philosophy is required to be used. Positivism research philosophy is based on the specific theory as well as models. For the study to be successful, it is necessary to gather scientific data. Qualitative data as well as quantitative data will be used to determine the outcome of the study. Positivism research philosophy advocates that only data generated from empirical observation as well as sensory input, like as experiments, and may be believed. Positivism restricts the role of the researcher to data collection and unbiased interpretation alone. This is the visitor management system.
Both the qualitative as well as quantitative research approach is required to utilize to do the research. For this research, it is required to collect the data dataset from the different sources. It is required to use the numeric data for the research. With the help of the developed software, it is required to create a visitor management system. Quantitative approach helped to gather primary data and qualitative approach helped to gather secondary data connected with this research.
In this following research, it is required to use both the primary method as well as the secondary method. The datasets are collated from secondary sources (Jafari et al, 2019). For this research study, the mixed method played an important role to develop the project.
Both the primary as well as secondary mode of data collection are required to use in this following research. The secondary data are collected from the relevant online sources. It is required to use the secondary data for the primary research. From the existing literature review the data and information has been collected and for that it was needed to go through the process discussed in the research papers. In case of creating a visitor management system all the primary and secondary information were needed to collect for enhancing the chance of the creation.
To understand the plan of the project, it is very essential to understand the software lifecycle. The life cycle of software is the series of phases that software goes through as it moves from beginning to end. The software's life cycle refers to the total process of developing software (Min et al, 2019). There are a lot of steps involved in this process, from beginning to end. The order, as well as the duration of the software, are determined by the management as well as many other elements, such as the objectives of the development of software, applications of the following software in other fields, as well as the design phase of the software. Stages have a beginning, an end, as well as a PowerPoint presentation. The life span of software must be established following the needs of the companies as well as the demand for developing the following software. The successful completion of the software for the visitor's management system necessitates the completion of several phases. Several phases are involved at the time of the creation of software for business use. The different phases of the process of developing software are the phase of initiation, the planning stage of the software, the execution phase of the software as well as the design phase of the software. The stages of developing software are as follows:
The phase of initiation as well as the initial phase: This is the first step of developing software. In this following phase, it is required to determine the initial requirements of developing the software for the visitor's management system. Every stage of the software's life cycle is accompanied by a description of the project's requirements as well as the project's goal. In this following research, the software is required to monitor the visitor's management system in an effective as well as an efficient way (Hu et al, 2019). The software framework may face difficulty or perhaps an opportunity as a result of the requirements of the software. A strategic plan that incorporates the recommended alternatives is a reasonable response to the current situation. A feasibility assessment is carried out because each option of the project is required to satisfy the main goal of creating the following software as well as required to provide a proper solution for software development. Practicality, as well as rationality, are also important considerations in this initial phase of software development.
The planning stage of the software: At this point, the solution to the problem has been developed to increase the working capacity of the software as well as the required steps to meet the goal of the project (Alhashmi et al, 2019). The main goal of developing the software for the visitor's management system is to check the status of the visitors for a company. This software will also allow the visitors to write a note in the software. The designer of the software is in charge of deciding what tasks should be carried out during this phase of the software development. There are calculations involved in determining the necessary resources for the software. it is required to determine a plan for the execution of the software. This stage of the software development is also called the scope monitoring step. The main task of the software, activities, dependencies as well as the software timetable is stated in this phase of the software development.
The execution phase of the software: The main concept of the software and also the effort are developed and carried out at this stage (Dutot et al, 2019). At the time of software implementation, the criteria of the following software as well as the restrictions of the software development process must be interacted with as well as retained. As the software progresses as well as appropriate adjustments are made as well as documented as alterations to the original software timeline.
The closing phase of the software: The last deliverables of the software, the software related documents, vendor agreements as well as the software services provided as well as the software is tightly organized by all stakeholders will be the main point of the final step of the software development. The last step is to verify that everything has been completed appropriately or not. After the development of the software, it is required to test the software to check its efficiency as well as its effectiveness of the software (Joo et al, 2018). Using this technique of research, the software developer would gain knowledge that would aid future software development.
It is required to check the effectiveness of the software by doing a proper software testing approach. Primary research has a number of drawbacks. Primary research has the following drawbacks: There are situations when the information gathered is not relevant to the subject at hand. In the following research, it is required to create visitor management system software. It is very important to collect the relevant dataset for the software. Without relevant dataset, it is not possible to create the software. it is required to check the front end as well as the backend of the software. The solutions to research questions may not always be found in quantitative information. One of the drawbacks is the inaccuracy as well as irrelevance of the data. In certain cases, secondary information is both inaccurate as well as incomplete. A lot of secondary data is necessary before researchers begin collecting primary data, but it seldom provides all of the information that is needed. Correctness as well as the Validity of secondary data need extensive analysis (Swanepoel, 2021).
The following study has a number of ethical considerations. In this research, it is required to develop a visitor management system. The primary data has to be collected with care. it is required to do proper testing of the software to check the flaws in the software. Honesty must be maintained throughout the whole data gathering, reporting, and application process. Every stage of the investigation must preserve its impartiality. Integrity in research is a must at the time of developing the software. During the development of the software, it is important to maintain a level of openness. Respect for intellectual data is a must needed thing at the time of software development. Responsibility must be taken at the moment of the publication of the software. Besides that honesty, clarity, openness, dedication, etc. have been maintained properly during the development of the software program.
The application in this current project is going to be created on a visitor management system. Basically, this is going to be a mini project not a huge project to work on. The application will contain the record and the data of employees and the admins. Admin will be able to manage all the details of the employees, the admin will be able to make the report and also can make changes to the employee list and all the functions. All the happenings as well as the procedures will be shown in the software part of this study.
CSS or the cascading sheet language is used to design the software. CSS is used to fill the color in the software. It is used for the purpose of software presentation. The alignment of the software as well as design for the software are done with the help of the Cascading style sheet (Saeedi et al, 2021).
HTML is used to function the software. It is used to structure the software. HTML is the “hypertext markup language”. A bunch of tables, lists, points are created with the help of HTML (Yeng et al, 2020).
This is the final chapter of the following dissertation. In this research, software is developed for a visitor management system. In this segment is required to link the objectives of the research properly with the research dissertation. The recommendation for the software is required to be made for the betterment of the software. It is required to discuss the future works related to the software (CHORO? et al, 2020).
In this segment, the objectives of the research are linked with the dissertation to evaluate the effectiveness as well as efficiency of the software.
The objectives of the research are as follows:
It is required to provide data security to protect the data of the software from digital hackers. Data security is an integral part of a software. As the personal data of the users are stored in this software, it is required to strengthen the data security approach. It is required to employ the process of end-to-end data encryption. This is the best process to protect the data from the data hackers. It is required to enhance the front end of the software as well as the back end of the software (Abakar, 2018).
In the future, it is required to increase the user interface of the software. Increasing the user interface will make a software more effective as well as efficient. It is required to update technology in the following software. The range of the database of the following software is required to increase to increase the effectiveness of the software. It is required rto introduce more features in the software to attract more customers.
In this section, all the research goals are linked to the dissertation. The software's recommendations are created in order to improve the quality of the software. The future work of the software is discussed for the purpose of better performance of the software. The data security of the software is required to improve to protect the private data of the user of the software.
Abakar, A.C., 2018. Agile software development methodologies: A comparative study (Master's thesis, Fen Bilimleri Enstitüsü).
Adem Esmail, B. and Suleiman, L., 2020. Analyzing evidence of sustainable urban water management systems: a review through the lenses of sociotechnical transitions. Sustainability, 12(11), p.4481.
Ajibade, P., 2018. Technology acceptance model limitations and criticisms: Exploring the practical applications and use in technology-related studies, mixed-method, and qualitative researches. Library Philosophy & Practice, 1941.
Alhashmi, S.F., Salloum, S.A. and Mhamdi, C., 2019. Implementing artificial intelligence in the United Arab Emirates healthcare sector: an extended technology acceptance model. Int. J. Inf. Technol. Lang. Stud, 3(3), pp.27-42.
CHORO?, K. and MAJEWSKI, M., INFORMATION SYSTEM AND SOFTWARE DEVELOPMENT METHODOLOGIES AND METHODS IN SMALL AND MEDIUM IT COMPANIES. Information Systems Architecture and Technology, p.179.
da Silva, S.L.C. and Amaral, F.G., 2019. Critical factors of success and barriers to the implementation of occupational health and safety management systems: A systematic review of literature. Safety science, 117, pp.123-132.
Denis, S., Bellekens, B., Weyn, M. and Berkvens, R., 2020. Sensing thousands of visitors using radio frequency. IEEE Systems Journal, 15(4), pp.5090-5093.
Ding, C., Smith, B., Bassi, D., Conner, S., Fu, Y., Mohamedally, D., Molyneux, G., Roberts, G. and Sebire, N., 2019. 72 Development of a simple visitor management app for GOSH DRIVE.
Dutot, V., Bhatiasevi, V. and Bellallahom, N., 2019. Applying the technology acceptance model in a three-countries study of smartwatch adoption. The Journal of High Technology Management Research, 30(1), pp.1-14.
Giannaros, A., Kotsopoulos, K., Tsolis, D. and Pavlidis, G., 2020. Creating a Personalised Experience for Libraries’ Visitors. In Strategic Innovative Marketing and Tourism (pp. 491-498). Springer, Cham.
Henri, J., A Review of Risk Management in Different Software Development Methodologies.
Hong, Y., Cai, G., Mo, Z., Gao, W., Xu, L., Jiang, Y. and Jiang, J., 2020. The impact of COVID-19 on tourist satisfaction with B&B in Zhejiang, China: An importance–performance analysis. International Journal of Environmental Research and Public Health, 17(10), p.3747.
Hu, Z., Ding, S., Li, S., Chen, L. and Yang, S., 2019. Adoption intention of fintech services for bank users: An empirical examination with an extended technology acceptance model. Symmetry, 11(3), p.340.
Hughes, K. and Moscardo, G., 2019. ICT and the future of tourist management. Journal of Tourism Futures.
Jafari, S.M., Yousefi, M. and Hosseinifadaki, S., 2019. Identifying Social Criteria for the Evaluation of Software Development Methodologies: A Systematic Literature Review. In Proceedings of the 2nd Symposium on Information Technology and Applied Mathematics (SITAM 2019).
Joo, Y.J., Park, S. and Lim, E., 2018. Factors influencing preservice teachers’ intention to use technology: TPACK, teacher self-efficacy, and technology acceptance model. Journal of Educational Technology & Society, 21(3), pp.48-59.
Kamal, S.A., Shafiq, M. and Kakria, P., 2020. Investigating acceptance of telemedicine services through an extended technology acceptance model (TAM). Technology in Society, 60, p.101212.
Ke, Y., 2019. Assessing various software development methodologies and matching software development methodologies with projects (Doctoral dissertation, Massachusetts Institute of Technology).
Kim, J.J., Lee, Y. and Han, H., 2019. Exploring competitive hotel selection attributes among guests: An importance-performance analysis. Journal of Travel & Tourism Marketing, 36(9), pp.998-1011.
Kim, M.J. and Hall, C.M., 2019. A hedonic motivation model in virtual reality tourism: Comparing visitors and non-visitors. International Journal of Information Management, 46, pp.236-249.
Kim, S., Kang, S., Ryu, K.R. and Song, G., 2019. Real-time occupancy prediction in a large exhibition hall using deep learning approach. Energy and Buildings, 199, pp.216-222.
Koh, W.S. and Hassim, Y.M.M., 2021. Hotel Reservation Management System. Applied Information Technology And Computer Science, 2(2), pp.973-992.
Kovavisaruch, L.O., Sanpechuda, T., Chinda, K., Wongsatho, T., Wisadsud, S. and Chaiwongyen, A., 2020. Incorporating time constraints into a recommender system for museum visitors. Journal of information and communication convergence engineering, 18(2), pp.123-131.
Luká?, M., Kupec, V., Písa?, P. and Štarcho?, P., 2021. THE INTERACTION BETWEEN THE MARKETING COMMUNICATIONS AUDIT AND VISITORS IN MUSEUM FACILITIES. Communication Today, 12(1).
Ma, R. and Kongjit, C., 2019. Marketing Strategy Creating Process for Chiangmai Local Cafe to Chinese Visitors. In International Conference on Management and Information Systems September (Vol. 29, p. 30).
Martinez-Caro, J.M., Aledo-Hernandez, A.J., Guillen-Perez, A., Sanchez-Iborra, R. and Cano, M.D., 2018. A comparative study of web content management systems. Information, 9(2), p.27.
McKeever, S., 2020. Understanding Web content management systems: evolution, lifecycle and market. Industrial management & data systems.
Min, S., So, K.K.F. and Jeong, M., 2019. Consumer adoption of the Uber mobile application: Insights from diffusion of innovation theory and technology acceptance model. Journal of Travel & Tourism Marketing, 36(7), pp.770-783.
Mushashu, E.T. and Mtebe, J.S., 2019, May. Investigating Software Development Methodologies and Practices in Software Industry in Tanzania. In 2019 IST-Africa Week Conference (IST-Africa) (pp. 1-11). IEEE.
Narayan, R., 2021. Study of Various Software Development Methodologies. EPRA International Journal of Multidisciplinary Research (IJMR).
Pakhalov, A. and Rozhkova, N., 2020. Escape rooms as tourist attractions: Enhancing visitors’ experience through new technologies. Journal of Tourism, Heritage & Services Marketing (JTHSM), 6(2), pp.55-60.
Pereira, J.C. and de FSM Russo, R., 2018. Design thinking integrated in agile software development: A systematic literature review. Procedia computer science, 138, pp.775-782.
Rafique, H., Almagrabi, A.O., Shamim, A., Anwar, F. and Bashir, A.K., 2020. Investigating the acceptance of mobile library applications with an extended technology acceptance model (TAM). Computers & Education, 145, p.103732.
Riungu, G.K., Peterson, B.A., Beeco, J.A. and Brown, G., 2018. Understanding visitors’ spatial behavior: a review of spatial applications in parks. Tourism Geographies, 20(5), pp.833-857.
Saeedi, K. and Visvizi, A., 2021. Software development methodologies, HEIs, and the digital economy. Education Sciences, 11(2), p.73.
Sagnier, C., Loup-Escande, E., Lourdeaux, D., Thouvenin, I. and Valléry, G., 2020. User acceptance of virtual reality: an extended technology acceptance model. International Journal of Human–Computer Interaction, 36(11), pp.993-1007.
Scherer, R., Siddiq, F. and Tondeur, J., 2019. The technology acceptance model (TAM): A meta-analytic structural equation modeling approach to explaining teachers’ adoption of digital technology in education. Computers & Education, 128, pp.13-35.
Shaila, I., Nahar, K., KASHEM, M.A. and Ahmad, S., 2019. Understanding urban tourism in Baldha Garden and Bahadur Shah Park of Dhaka City (Bangladesh) by studying the interactions between visitors and plants.
Solís-Radilla, M.M., Hernández-Lobato, L., Callarisa-Fiol, L.J. and Pastor-Durán, H.T., 2019. The Importance of Sustainability in the Loyalty to a Tourist Destination through the Management of Expectations and Experiences. Sustainability, 11(15), p.4132.
Swanepoel, F., 2021. The development of a hybrid Agile Software Development Methodology through the integration of Agile Software Development Methodologies with Project Management Methodologies (Doctoral dissertation, North-West University (South Africa)).
Tegegne, E.W., Seppänen, P. and Ahmad, M.O., 2019. Software development methodologies and practices in start-ups. IET Software, 13(6), pp.497-509.
Tsao, W.Y., 2018. Building the long bridge between visitors and customers through online general reviews. Online Information Review.
Wichmann, J. and Leyer, M., 2021. Why do Visitors intend to use Indoor Navigation and Indoor Localization Systems in Hospitals? A Quantitative Survey from Germany.
Yeng, P.K., Wolthusen, S.D. and Yang, B., 2020. COMPARATIVE ANALYSIS OF SOFTWARE DEVELOPMENT METHODOLOGIES FOR SECURITY REQUIREMENT ANALYSIS: TOWARDS HEALTHCARE SECURITY PRACTICE. Information Systems (Sofia).
Get Better Grades In Every Subject
Submit Your Assignments On Time
Trust Academic Experts Based in UK
Your Privacy is Our Topmost Concern
Copyright 2023 @ Rapid Assignment Help Services
offer valid for limited time only*