You are on page 1of 32

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/337224136

COMPUTING AND INFORMATION TECHNOLOGY IN WORKPLACE

Thesis · November 2019

CITATIONS READS
0 496

1 author:

Alfred Tan Yik Ern


Asia Pacific University of Technology and Innovation
29 PUBLICATIONS   0 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Alfred Tan Yik Ern on 13 November 2019.

The user has requested enhancement of the downloaded file.


COMPUTING AND INFORMATION TECHNOLOGY IN WORKPLACE
GROUP ASSIGNMENT

Group Members:
1. Jasvinder Kaur - TP046438
2. Saiynova Aidana - TP043189
3. Tan Yik Ern - TP046566
4. Lim Keah Hui - TP041206
5. Ho Chee Hau - TP045123

Intake code : UC1F1705IT


Module name : Computing and Information Technology in Workplace
Module code: CT006-3-1-CITW
Assignment Title: Computer & Information Technology in the Workplace
Lecturer Name: Mrs Palvinderjit Kaur A/P Harnek Singh
Date Assigned:
Date Completed:

TABLE OF CONTENTS

CONTENTS PAGE

1. INTRODUCTION 7

2. BENEFITS OF ONLINE BOOKING 8-9

TO ORGANISATI ON
AND CUSTOMERS
3. FUNCTIONALITY OF TRIVAGO 10-11

4. ENHANCEMENT 12

5. SYSTEM LIMITATIONS 13-14

6. RECOMMENDATIONS 15

7. CONCLUSION 16

INDIVIDUAL PART :

i. GREEN COMPUTING 17-19


1. Define sustainability
2. Compare 2 computer specification
3. Recommend 2 renewable energy source
4. 3 methods to promote green computing

ii. CARPAL TUNNEL SYNDROME (CTS) 20-26


1. Explain CTS
2. CTS symptoms
3. CTS healing methods
4. Recommend methods on proper workplace ergonomics for your organization

iv. SECURITY 27-31


1. Explain Malware
2. Malware prevention measures
3. Detect safe and unsafe websites
4. Recommend 2 biometric device

v. INTERNET 32-34
1. 3 rules of Netiquette
2. 2 types of Internet Access Provider
3. Explain purpose of website
4. Recommend one browser

vi. BLOCKCHAIN TECHNOLOGY 35-38


1.) explain blockchain technology
2.) advantages and disadvantages
3.) 2 ways this technology can be used
4.) security measures needed to secure transaction
Performance Criteria
Module Code : CT006-3-1-CITW Module Title – Computing and IT at the
Workplace

Full Partial N Performance Criteria


y ly ot

¨ ¨ ¨ Distinction
¨ ¨ ¨ All credit criteria fully met
¨ ¨ ¨ Produced professional group report with in-depth research
¨ ¨ Group analysis has clear evidence of original ideas
Excellent quality documentation that adheres to Harvard Referencing
¨ ¨ ¨ Credit
¨ ¨ ¨ All pass criteria fully met
¨ ¨ ¨ Citing and referencing are accurate
¨ ¨ ¨ Conforms completely to Report Guidelines
¨ ¨ ¨ Group work has Introduction, Benefits, Functionality, Enhancement,
¨ ¨ ¨ Limitations, Recommendations and Conclusion
¨ ¨ Adequate research undertaken with understanding, analysis and
critical thinking
Group Evaluation and Conclusion shows some thought
Satisfactory documentation with minimal grammatical mistakes and
spelling errors

¨ ¨ ¨ Pass
¨ ¨ ¨ Table of Contents
¨ ¨ ¨ Group discussion on all topics attempted
¨ ¨ ¨ Introduction and Conclusion attempted
Citation and References have been attempted

Name Student Student Student Student Student


Grade 1 2 3 4 5

All areas addressed Fully Partia Fully Partia Fully Partia Fully Partia Fully Partia
lly Not lly Not lly Not lly Not lly Not
Individual Analysis Fully Partia Fully Partia Fully Partia Fully Partia Fully Partia
lly Not lly Not lly Not lly Not lly Not
(understanding)

Original Ideas & Fully Partia Fully Partia Fully Partia Fully Partia Fully Partia
lly Not lly Not lly Not lly Not lly Not
Critical Thinking

Research & Fully Partia Fully Partia Fully Partia Fully Partia Fully Partia
lly Not lly Not lly Not lly Not lly Not
References

Linkage to Fully Partia Fully Partia Fully Partia Fully Partia Fully Partia
lly Not lly Not lly Not lly Not lly Not
Organization

Attends presentation Fully Partia Fully Partia Fully Partia Fully Partia Fully Partia
lly Not lly Not lly Not lly Not lly Not

Additional Comments

Fill in the Team Member particulars


Student Name Individual Topic Group Topic
Student Ho Chee Hau Green Computing Functionality
1

Student Saiynova Aidana Carpal Tunnel Introduction


2 Syndrome

Student Tan Yik Ern Blockchain System Limitation and


3 Technology Recommendation

Student Jasvinder Kaur Security Benefits and Conclusion


4

Student Keah Hui Internet Enhancement


5
INTRODUCTION ON TRIVAGO
Trivago is an information technology and travel company. It was founded by Stephan Stubner,
Peter Vinnemeier and Rolf Schromgens in Dusseldorf, Germany in January 2005. Trivago turned
into a major hotel in Germany and one of the fastest growing business companies in Germany.
Stubner refused as Managing Director in 2006 and Malte Siewert came to the company. Then, the
three founders remain the company. At the beginning, Trivago obtained 1 million EUR from
investors and it was incomes more than 500 million USD in 2015.
In April 2016, Trivago achieved 1000 workers and started constructing another ground in
Dusseldorf. The normal age of a Trivago representative is 28 years old and it has 63 nationalities
working out of its primary office. The workplace space has banners covering the work areas
speaking to where every representative begins from.
In 12th March 2013, procurement of 61.6% of the completely weakened value of Trivago
GmbH by Expedia, a different universe driving on the web travel brands organization, was
declared with paying approximately EUR 434 million .
Trivago business is known as Meta Search Engine as far as plan of action. Its an awesome
stage , where you can look and think about every single significant site for a solitary hotel.
Metasearch is a search engine that, unlike classical search engines , does not have its own database
and is own search index, but it generates search output by mixing and rearranging search results
of other search engines. The metasearch system provided by Trivago is very comfortable, you just
have need to choose the date, food types , children club or playground, swimming pool , sport
facilities, room type and etc.
Trivago's lodging web index was the first of its kind in Germany and has sites in more than 50
nations. Trivago cases to be the world's biggest online lodging seek website, looking at rates from
more than 1 million inns and more than 250 booking locales around the world. The site
incorporates more than 190 million hotel appraisals and 14 million photographs, and reports more
than 120 million guests for each month.

BENEFITS OF ONLINE BOOKING


Online booking is a tool used by organisations like Trivago to manage their business travel
online. Online booking also allows organisation to view real-time data on their business travel
spend,track travellers online and enforce business travel policy else than making bookings. By
using online booking, Trivago can expand their market to national and international markets with
minimum capital investment. The organisation can easily locate more customers, best suppliers
and suitable business partner around the world. It also saves cost and customers can choose based
on their preference. For example in advertising and marketing, organic search engine traffic and
pay-per-click are some of the advertising channels that are cost-effective. Online booking of
Trivago facilitates comparison on hotel, flights and car rental prices. The financial transactions is
also electronic, so conversion is going to be lower on cost.

BENEFITS TO TRIVAGO ORGANISATION

Online booking handles the walk-in,emails and phone bookings, which would make the
employees in Trivago organisation to have all their customers data in a structured system. This is
importa1nt as it allows Trivago organisation to market themselves to their previous customers.
This customer list is a valuable resource in business as they would want the data accessible and
structured.

CRM ( customer relationship management ) allows Trivago to maintain data of their


customer and customers choices or preferences in order to retain customers and increase their
experience level.Trivago can provide better services to customers through improved understanding
of their issues and this in turn decreases customers agitation. In this way, Trivago can receive
continuous feedback from customers regarding on their services.

Trivago can maximize reservations through online booking. Customers who book on their
own are more likely to show up as they have paid. If customers cancels the booking the spot will
be open automatically online, giving other customer the chance to book it. By maximizing
reservations, Trivago won’t have unused activity spot or booking on the table. This also saves time
and cut costs. Availability check and instant confirmations eliminate email exchanges between
guests and reservations department. Time is saved because reservation requests will no longer be
processed. Customers can check availability and book instantly, thus closing a booking without
waiting for the staff to confirm the reservation.

BENEFIT TO CUSTOMERS
Online booking is open around the clock. The customers can do transaction for the booking
provided by Trivago any time from anywhere around the world which is a benefit to customers as
it is open 24 hours a day, seven days a week.

Online booking also equip customers with information. Through online booking in Trivago,
they can provide as much information as they want which would make customers appreciate. For
example, description on the hotel rooms, accommodations and customer reviews is provided. This
reduces burden on the staff where they won’t need to answer questions regarding the information
that is provided and staff will have more time for other tasks at workplace.

It is also easy to compare and find reviews for customers through online booking.
Customers can compare Trivago hotels with the price available and choose the best option that is
provided. Because the competition is high, Trivago provides reviews from other customers and
ratings for that hotel rooms. Good and bad reviews are on every hotel is displayed and reasons
behind the thumbs up or down. Trivago also have combined information like for example booking
flights and hotels together in the same package. It makes easier for customers to make complete
plans for their holidays and choose a package that meets their preferences.

Functionality of Trivago
As the world’s biggest hotel search engine , Trivago have huge amount of resources to
support . Over 50 countries , 250 of websites partners , 1 million of hotels , Trivago has become
the main app for travel user and so much more . But how does it works ? Trivago is an
application which can download from both Playstore and Appstore , and it’s free. By searching
the location you desire or you at , it provides accommodations with price , pictures and
comparisons .If is free, how do trivago earn profit ?

Trivago is a hotel agent platform , hoteliers give their informations and pay for advertising . By
using Trivago , hoteliers can reach out to more customers from different area , increasing their
own popularity and profits. Trivago system allows hoteliers to monitor their pages ,
comment ,reviews , pricing and updates . For additional, Trivago has “Hotel Manager Pro”, which
is required fee to access . This pro version of hotel management allows hoteliers to customize their
own pages and listings , also analytics and advanced rates . These systems has help hoteliers to
compete with each other to improve their rankings on the site , and provides better services to
customers.
How to use trivago as a customer :

(Figure 1 :Trivago hotel search )


(Image Source : https://www.cheaperluxury.com/wp-content/uploads/2015/08/Trivago-
hotel-search-nyc.jpg )

1.Type in the location in the search bar


2.Listings will be appear within second
3.Choose the accommodation
4.After confirmation of selection , it will direct you to partner website for booking and transaction
services.
It is easy and convenient to use Trivago . Also , there are lots of advance function for it , like search
filter , price range , share to social media , etc . Last but not least , Trivago customer services such
as , customers’ comments , ratings , feedbacks , reports , guidances and many.
Trivago did a solid job on each of the area and became the must traveller requirement for current
trend.

Even though , it’s no doubt a complete and great application , but Trivago has it’s limitation and
flaws . If Trivago want to make it further , it has to face the issues and step forward.

ENHANCEMENT
Increase the data and information of the company
-The company should increase the data like have more hotel or new spot
-Compare to other company, it has less info as customer difficult to find hotel
-limited hotel option for one places
-According to the worker review, they can’t have a proper database and network to work with
-The company doesn't have proper documentation, it is not organize, worker having trouble in
searching data
-It should provide a better database and network for worker to work efficiently.

Create a better home page


-It is too plain.
-Doesn’t have enough option for user to choose.
-Don’t have enough graphic to attract users
SYSTEM LIMITATIONS
Trivago is the world's biggest hotel search and data website, and to think about hotel prices
gathered from more than 200 booking destinations around the world. And save money by taking
advantage of hotel discounts for your last minute vacation deal. But Trivago also get reported by
customers frequently, due to some tiny mistakes and shortcoming in Trivago app when the system
help the customer order hotels and travel destination. Below are the most common online customer
complaint the Trivago app’s weak point.
1. Wrong Booking Dates
Most of the customers commented Trivago app’s booking system are bad. Once the
Trivago online users are completed booking a hotel, the system will not display the exact check in
and check out dates. The artificial intelligence on Trivago system are no integrity and have bug.
That make the Trivago users face a big problem, because when the display dates was wrong or get
mistake, Trivago users should have refill the hotel booking form or make a call to hotel to correct
the booking dates.
The Trivago app system automative changed the booking dates become a top complaint on
Trivago. In that case, Trivago users regularly saw that the dates would be changed, and the hotel’s
price increased dramatically. So, if the booking dates went wrong would effects the price increased.
As the Trivago system automatic extend or delay the hotel check in and check out dates. This
situation will raise the hotel’s price lead to the Trivago users have to pay more to the hotel that
they had booked.

2. Unresponsive Customer Services


The other system limitation in Trivago app have many customers encounter the
unresponsive customer service on Trivago app. Maybe the Trivago app is just an aggregator, and
does not provide any hotel deals directly, their customer services department appears to have a
prestige of ignoring emails. Sometimes, the Trivago users contact the customer services to the
hotel, and the customer services not response their phone call and email. This situation lead to the
Trivago user feel anger to Trivago app and will not keep on using Trivago app to booking hotel
again.
Besides that, the customer services on Trivago app are giving the wrong and blurry information
about the details of hotel, and cause the Trivago user confuse with the answer given by customer
services. In case cause the Trivago user have a wrong information to booking hotel on Trivago
app. So, the Trivago users will booking hotel wrongly and do a high cost payment to the hotel.

RECOMMENDATIONS
1. Recommendations Wrong Booking Dates
Suggestion the programmer and research team of Trivago app have to debugging the
Trivago app on hotel booking system. Make systematic accuracy more precise and explicit. The
display system must display the correct hotel booking dates to Trivago users. Moreover, after
Trivago users completed the hotel booking should immediately contact the customer services to
make a further confirmation with the hotel that users had booked. To verify user reservation with
the hotel or not. Trivago system also have to manual check the booking dates from clients that will
reduce the probability of wrong booking dates on Trivago. Once the booking dates was wrong, the
stuff have to do it right immediately and satisfaction the customer to continued use Trivago App
for booking hotel and date of vacation.

2. Recommendation Unresponsive Customer Services


Suggestion all the hotels on Trivago app must provide the hotel contact number and email
for customers to contact the hotel when somethings are necessary to contact. Trivago app have to
force the hotel that want to advertise their hotel on Trivago app must provide available contact
measure. In case, the hotel not provide the contact measure will not advertise that hotel on Trivago
app. Besides that, when Trivago users are making a call or emailing to the hotel, the customer
services in that hotel must make response to the customers. In case, the customer services not reply
their customer in time or give the blurry information to their customer will get ban temporary by
Trivago app.
CONCLUSION
As a conclusion, Trivago uses online booking as a tool for their business travel. They are
quite successful in their business but they should improve their booking system as it is troublesome
for the customers because in the system there is no display check in and check out dates. The
customers also play a very important role because they are supposed to respond to Trivago’s emails
and calls in order to make Trivago’s system more . Trivago can improve their system by following
the recommendations that has been provided. Trivago is one of the best online booking system
because they offer cheap rate hotels and flights which is a benefit to customers around the world.
They also make it an ease to book online rather than customer’s going to the location and then
book it there. Customers service is very important as it will attract more customers if their system
is good. Therefore, the best technology provided combined with good strategy and implementation
will lead to a more successful organisation.

INDIVIDUAL WORK
GREEN COMPUTING
What is Sustainability in Green Computing
Green computing refers to the practice of using computing resources more efficiently while
maintaining or increasing overall performance. Sustainable IT services require the integration of
green computing practices such as power management, virtualization, improving cooling
technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet
sustainability requirements. Recent studies have shown that costs of power utilized by IT
departments can approach 50% of the overall energy costs for an organization. While there is an
expectation that green IT should lower costs and the firm's impact on the environment, there has
been far less attention directed at understanding the strategic benefits of sustainable IT services in
terms of the creation of customer value, business value and societal value.

Difference between Cloud Computing and Green Computing


Cloud computing is an Internet service that provides computing needs to computer users. When
the company uses the computing resources, they pay a fee based on the amount of computing time
and other resources that they consume. Cloud computing allows a company to diversify its network
and server infrastructure. Some cloud computing services automatically add more network and
server capacity to a company’s Web site, as demand for services of the Web site increases.

The network and server capacity may be duplicated around the world so that, for example, a single
outage of a server does not affect the company’s operations. Grid computing combines many
servers and/or personal computers on a network, such as the Internet, to act as one large computer.
As with cloud computing, a company may pay for the use of a grid based on the amount of

processing time that it needs. Grid computing often is used in research environments, such as
climate research and life science problems.

Green computing is that a computer and technology is how much responsible for environmental
change. A typical desktop computer and 17-inch monitor that always are turned on release 750
pounds of carbon dioxide in one year, which is the same amount of carbon dioxide released by a
car driven 820 miles. Power management software helps conserve a computer’s electricity
consumption while maintaining acceptable performance. The programs determine when a
computer is inactive and, in turn, power down the computer. Powering down the computer stresses
critical components, such as the CPU and memory, so does this practice actually result in more
waste because these parts must be replaced?

2 Renewable energy resources


Nuclear Power

Nuclear power is any nuclear technology designed to extract usable energy from atomic
nuclei via controlled nuclear reactions. The only method in use today is through nuclear fission,
though other methods might one day include nuclear fusion and radioactive decay. Proponents of
nuclear energy contend that nuclear power is a sustainable energy source that reduces carbon
emissions and increases energy security by decreasing dependence on foreign oil. Proponents also
emphasize that the risks of storing waste are small and can be further reduced by using the latest
technology in newer reactors, and the operational safety record in the Western World is excellent
when compared to the other major kinds of power plants. Critics believe that nuclear power is a
potentially dangerous energy source, with decreasing proportion of nuclear energy in power
production, and dispute whether the risks can be reduced through new technology.

Compressed Natural Gas


Compressed Natural Gas (CNG) is a fossil fuel substitute for gasoline, diesel, or propane fuel.
Although its combustion does produce greenhouse gases, it is a more environmentally clean
alternative to those fuels, and it is much safer than other fuels in the event of a spill (natural gas is
lighter than air, and disperses quickly when released). CNG is used in traditional gasoline internal
combustion engine cars that have been converted into bi-fuel vehicles (gasoline/CNG). Natural
gas vehicles are increasingly used in Europe and South America due to rising gasoline prices. In
response to high fuel prices and environmental concerns, CNG is starting to be used also in light-
duty passenger vehicles and pickup trucks, medium-duty delivery trucks, transit and school buses,
and trains.

3 Ways to Promote Green Computing

Don't be shy to turn it off


Use the computer only when needed. If you have a laptop, use it more because it is has a lesser
energy consumption compared to your desktop. I am working online but I make it sure to use my
desktop only when needed. Never hesitate to turn your system off. Do not worry if it will easily
be damaged through constant on and off because that is only a myth.

E-cycle used computer equipment


Also, Staples, the office supply retailer, has now started a recycling program. They will accept any
brands of used desktop and notebook computers, monitors, printers, fax machines and all-in-one
devices with a fee of $10. Smaller items like keyboards, mice and speakers are free to drop off.Buy
"Energy Star" labeled monitors, desktops, laptops, and printers The "Energy Star" devices
can be programmed to "power-down" to a low power state when they are not in use, helping you
save energy and run cooler which helps them last even longer. The Energy Star specification for
computers was revised on October 20, 2006 and goes into effect July 20, 2007. The specification
includes new performance requirements to qualify for the Energy Star rating for desktop and
notebook computers, workstations, integrated computers, desktop-derived servers and game
consoles. Now you can feel good about that upgrade!

CARPAL TUNNEL SYNDROME (CTS)


1) Explain CTS
Carpal tunnel syndrome (CTS) is a neurological disease manifested by prolonged pain and
numbness in the fingers of the hand. Refers to tunneling neuropathy. The cause of the disease is
the compression of the median nerve between the bones and tendons of the muscles of the
wrist. Immoderate motion of the wrists or holding the wrists in static positions for drawn out
stretches of time can aggravate the nerves, ligaments, and courses inside a limited arrangement of
tendon and bone at the wrist—the carpal tunnel.
(Figure 2 : Carpal Tunnel Syndrome)
(Image Source:
https://www.google.com/search?q=Carpal+tunnel+syndrome&rlz=1C1CHBD_enMY747MY747
&source=lnms&tbm=isch&sa=X&ved=0ahUKEwjY8pWZrqPVAhVBPJQKHcz2AFgQ_AUICi
gB&biw=1582&bih=745#imgrc=aGLRzbxL2UXdoM )

Carpal tunnel syndrome is most common in older women. This disease is considered
professional in workers performing monotonous flexion-extensor movements of the brush (for
example, when assembling machines). Also, the disease suffers from sign language interpreters
and motorcycle racers, pianists, bowlers, drummers and, often, artists with experience.
The immediate cause of the carpal tunnel syndrome is the compression of the median nerve
in the wrist area, where the nerve passes through the tunnel (carpal tunnel), formed by the bones
of the wrist and the transverse ligament of the wrist. Different situations can lead to inflammation
and swelling within the joint, tendons, and muscles inside the carpal tunnel. Most often, this is a
job that requires frequent repeated movements. Work at the computer, typists, pianists and meat
packers are particularly predisposed. Other states include:
- Wrist injury;
- Occupations that require strong compression or grip;
- A tumor of the median nerve;
- Diabetes;
- Thyroid gland diseases;

2) CTS symptoms
Carpal tunnel syndrome is manifested by pain, tingling and numbness (paresthesia) in the
innervation zone of the median nerve (weakness of flexion of the hand, thumb and index finger,
hyposthenia of their palmar surface). For objective diagnosis of carpal tunnel syndrome, the Tinel
test is used (percussion over the place of passage of the median nerve in the wrist area, in the case
of a positive test accompanied by paresthesia in the fingers and on the palm), as well as the Falen
test (maximal flexion for three minutes causes pain and paresthesia on the palmar Surfaces 1-3 and
partially 4 fingers).
Carpal tunnel syndrome, also called carpal tunnel syndrome, is caused by compression of the
median nerve. Symptomatic manifestations include:
- Weakness of the brush,
- Painful sensations,
- Numbness of fingers,
- Tingling.

(Figure 3: Carpal Tunnel Syndrome symptoms)


(Image Source:
http://www.aidmycarpaltunnel.com/carpal-tunnel-syndrome-injuries/cts-symptoms.php )

One of the first symptoms of a CTS is a gradual numbness in areas whose sensitivity is
determined by the median nerve. After this, pain occurs in the nerve innervation sites. In the brush
there is a feeling of numbness, especially in the early morning after an overnight rest. Patients all
night shaking their hands and rubbing them, which causes some relief.
Pain can spread up the arm in the direction of the shoulder and even reach the neck. With
the progression of this condition, the muscles of the thumb can weaken and atrophy, causing
clumsiness when the brush works, for example, when you need to take a glass or a cup.
The patient is difficult to touch the thumb pad to the tips of the other fingers, to hold various
objects, for example, a rudder, newspaper or telephone. Patients can not fasten buttons or clean
potato.

3)CTS healing methods


Depending on the degree of development of the disease, treatment can be divided into
three streams:
• Conservative;
• Medicamentous;
• Surgical.
The treatment of carpal tunnel syndrome always begins with the observance of a protective
regime, which allows to remove the load from the wrist. In the absence of such measures, therapy
is ineffective.
Treatment of carpal tunnel syndrome should be started as early as possible and under the
supervision of a doctor. Primary causes, such as diabetes or arthritis, should be treated
first. Without treatment, the course of the disease tends to progress.In some cases, various drugs
can alleviate the pain and inflammation associated with carpal tunnel syndrome. Non-steroidal
anti-inflammatory drugs such as aspirin, ibuprofen and other over-the-counter pain killers can
relieve symptoms that have recently appeared or are caused by stressful activities.

In those patients, in whom the symptoms are weakened, exercises aimed at stretching and
strengthening may prove useful. Such exercises can be carried out under the supervision of a
physiotherapist who has training in the use of exercises for the treatment of physical injuries or a
specialist in occupational diseases who is trained in examining patients with physical injuries and
assisting them in acquiring skills to improve their own health and well-being. For example, simple
exercises for CTS;
1. Wrist bend (forward and back)
2. Wrist lift
3. Wrist flex
4. Finger bend
5. Wrist stretch with weight
6. Hand squeeze

(Figure 4 : Hand Exercise)


(Image Source :https://www.pinterest.com/explore/schmerzen-handgelenk/ )

5. Recommend methods on proper workplace ergonomics for your


organization
Ergonomics is a science that comprehensively studies human activity, tools and means
of its activity, the environment in the process of their interaction. The comfort of the office consists
of the ergonomics of the workplace and the rational planning of the office space in general.

(Figure 5: correct distance when using computer at workplace)


(Image Source: http://www.victoriamassagetherapy.ca/ergonomics.html )

Nowadays, everyone are using on computer for working, which brings out that design of
the laptop, computer and all of the gadget is very important to the role of employee , which includes
ergonomic keyboard, ergonomic mouse, ergonomic chair, computer desk, position and distance of
every equipment. As in Trivago, some general provisions for Trivago employees were sitting to
typing on the computer, standing to use the workstation, and to get to do some workspace exercises,
these are also a common posture in most of the workplace.

Most of Trivago worker will be sitting in the office to do all the stuff and working with
computer. For this reason, the distance between the user and the computer screen and the health
of the employee are very important to work a good sitting position.

The user should be seat during operation, hands and feet should be parallel to the floor.
Comfortable arm position is provided by the armrests. If necessary, use the footrest. Place the
keyboard at a distance of 90 degree the edges of the table. The work chair must be adjustable in
height and the forward back inclined forward - to correspond to physiological bends of a backbone.
The user should be need place the monitor directly in front of you, at a distance of 20”-28’’ ,
but not closer than 50 cm. The eye level should be on the upper third of the screen and the user
must to choose a desktop with a working surface height of 25” - 34”and enough legroom.
(Figure 6: correct position for workplace)
(Image Source: http://www.computingcomfort.org/create2.asp )
When working in standing position, as in Trivago that worker needs or wants to stand at
work in his workplace, and they use on leg movements like dynamic activity and static activity
and your monitor should be at eye level, and your keyboard and mouse should be slightly below
the height of the elbow. Most importantly, should be wear comfortable shoes and suitable table
for standing workers. The worker eyes should be 20 - 28 inches from the monitor screen which
computer users.

When we are working hard, we need break time for exercise and just take 3 or 5 minutes
everyday, then do brief exercises like ( for hands, legs, eyes, etc.). Reduce your eyes away from
computer screen at least 25 feet away every 20 minutes. It is most important the health of worker.
So, in Trivago office can use ergonomic furniture and workers can do some exercises and the
made feel like comfortable.

SECURITY

(Figure 7 : Malware )
(Image Source: http://mobileadvertisingwatch.com/wp-content/uploads/2014/09/Threat-Post-
Malware-on-iOS-is-Ad-Thief.jpg )
Malware is the short term for malicious software, it is the software that intends to damage
or disable computer and computer systems. It includes computer viruses, worms, Trojan horses,
and spyware. This malware can steal, delete or encrypt sensitive data, alter or hijack core
computing functions and monitoring user’s computer activity without them knowing. There are
many ways on how we can prevent it. 1.) Do not trust spam e-mails. Approach emails with caution
when the message contains links or attachments. Do not install anything without knowing what is
it. You can also scan email-attachments first before opening them.

(Figure 8: Kaspersky Anti Virus


(Image Source:
http://cdn2.techadvisor.co.uk/cmsdata/downloads/34439/img3File_thumb800.png )
2.) Next, always update anti-virus. Perform a daily scan in order to make sure there is no
virus that escapes the system. Viruses can enter anytime of the day and the only way to reduce the
chances of viruses entering the system is to scan files daily. 3.)Updating Windows is also very
important because some malware uses holes in Internet Explorer and Windows to install
themselves without you knowing. It is important to enable Automatic Update or regularly visit
Windows Update. Users of Windows XP must install Service Pack 2. Before installing any update
like Service Pack you should back up any critical data. 4.) Run SpyHunter regularly to clean up
your browser. To clean up your IE browser:
1. Click the "Tools" menu, and then click the "Internet Options" menu item.
2. On "General," change the "Home page" (the default home page) to your desired home
page.
3. Then click "Delete cookies," "Delete files," and "Delete history." Click "OK" button.

Running SpyHunter on daily basis can save your device from getting infected with malware
especially if you have bad web surfing web habits. 5.) Software Firewall will warn you that
malware has infected your machine. Software Firewalls warnings will aid in finding and removing
the malware. Apply skepticism when using this software like when you look at a drive-by-
download. Scrutinize the program requesting access when you receive a prompt from your
firewall.
(Figure 9: Software Firewall )
(Image Source:
https://screenshots.de.sftcdn.net/de/scrn/61000/61785/pc-tools-firewall-plus-20.jpg)

HOW TO DETECT SAFE AND UNSAFE WEBSITES?


1.) Browse smart. You should always double-check the URL of your banking site, social-
networking site and email sites before logging in. A lot of the browsers like Firefox, Chrome and
Internet Explorer include a colour-change on the left side of the location bar that the site is verified
as legitimate. Google Safe Browsing makes sure the link is safe. As you browse, it will identify
any site that contains phishing or malware that is going to steal your information. It also utilizes
an extra layer of protection with sandboxing so that you are not downloading something that will
steal your information. Check the site you want such as google.com or an IP address in this URL:
“http://google.com/safebrowsing/diagnostic?site=”. It will display if the site has hosted any
malware in the past 3 months.
2.) Check out shortened links in Sucuri SiteCheck. It expands shortlinks and draws upon a handful
of services to determine the link is safe.
(Figure 10: Sucuri SiteCheck)
(Image Source:
http://rottmann.net/wp-content/uploads/2013/01/Sucuri-SiteCheck-Free-Website-Malware-
Scanner.jpg?b264d4 )
3.) Firefox browser. This browser has a collection of security features. It lets you to choose when
to allow sites to follow you and when not to. Firefox allows you set up private browsing so that
other users of your device won’t know what you’re doing online.
LIST OF SAFE WEBSITES:
1. Websites that have “https”
2. GeoTrust
3. VeriSign
4. SSL.com ( Simple Socket Layer )
5. Lock icon on the browser which mean it is secured and legitimate by clicking on it. You
will also be provided with the website’s security details.

LIST OF UNSAFE WEBSITES:


1. 17ebook.com 10. Hdvideoforums.org
2. pronline.ru 11. Ginedis.com
3. Aladel.net 12. likaroake.com
4. Bpwhamburgorchardpark.org 13. purplehoodie.com
5. Clicnews.com 14. qsng.cn
6. Dfwdiesel.net 15. seksburanda.net
7. Divineenterprises.net 16. texaswhitetailfever.com
8. fantasticfilms.ru
9. gardensrestaurantandcatering.com
List of unsafe categories websites:
• Blogs and Web communications
• Hosting and personal hosted sites
• Business and economy
• Education and reference
• Porn
• Entertainment and music
• Automotive
• Health and medicine
• Technology

The infected sites had on average of 18,000 threats and 75% of websites in the list were founded
to spread malware for over 6 months. The websites that do not have “https” but enables you to log
in and transfer important information are unsafe.
Biometric device is a device that secure identification and authentication. This device is used to
verify or recognise the identity of a person based on physiological and behavioral characteristics
like fingerprints, facial images,voice recognition and iris prints (Wayman,2005). Biometric
technology aims to reduce fraud and eliminate risks regarding security (Singhal & Jain,2011).

Trivago organisation can heighten their security by applying fingerprint scanner for
employee’s attendance verification. The advantage of this biometric device over other security
mechanism like passwords and punch-card is that it cannot be faked or stolen. Trivago organisation
is able to protect its sensitive data more by implementing fingerprint biometrics as compared to
passwords. Implementation of this security device in Trivago can significantly increase the
security of electronic device such as personal computer,company’s computers and etc.

Other than that, Trivago organisation can use retina or iris scanner. This scanner identifies
a person by scanning their iris or retina. This scanner is more secured biometric device when
compared to other device because retina or iris cannot be duplicated. Trivago organisation should
do analysis of their system to determine which information needs protection via biometric
technology, example customer’s credit card information.

INTERNET
First of all, there is 3 major rules of the rule of Netiqutte in networking. What is Rule of Netiqutte?
Rule of nettiqutte is a etiquette or manner in networking world. It is like a cyber protocol which
giving out an accepted behaviour. Example, when we want to upload some information in a
website or page, we have to giving out a correct information while cannot insult certain people or
organization. Etiquette means "the forms required by good breeding or prescribed by authority to
be required in social or official life", in other words, Netiquette is a set of rules for behaving
properly online. (Shea, 2017)
First rule: Remember the Human
People nowadays using internet, email, instant message, application to communicate with each
other. There is many ways to contact each other. So, what this is rule want to inform us is that we
cannot simply type anything we want and show it to public. If you want people to respect you,
please respect others first. Fix in the mind, what you send out will be read by real guys, please be
respectful. Before you press "send" or "submit," ask yourself, "Would I be okay with this if
someone else had written it?" (Shea, 2017)
Second rule: Don’t abuse your power
In the real life, there is always difference in power or capability in people no matter at where. Just
like in the cyberspace, there will got difference in power or capability too. The term “power” and
“capability” can be mean by the ability and skill in the technology or the experience they got by
working year to year. There will be a chance that you are the one who acquire all these skill or
knowledge which make you stronger and better other people. Just remember: knowing more than
others do or having more power than others may have does not give you the right to take advantage
of anyone. (Shea, 2017) If you ever forget, please recall what the first rule: remember the human
mean.
Third rule: Make yourself look good online
In real life, there will always people who judge what you have done by giving you evaluation while
in virtual world there will not happen something like this, because it doesn’t have the ability to
judge you weather you is good or bad. For example, if you make some crazy stuff by wearing a
lot of weird clothing and go out in street, first expression people give will be “you are silly” while
in virtual world, no matter how you wear, no one will be interested in you, they only interest in
what you write, the element you write. Remember, before you post something to public, always
ensure your grammar and spelling didn’t have any flaw. Then, knowing the statement you are
mention and be clear with it.
Next, we will be talking about what is two of the internet access provider (ISP and OSP)? An ISP
(Internet service provider) is a company that provides individuals and other companies access to
the Internet and other related services such as Web site building and virtual hosting. (Rouse, 2017)
An ISP has the equipment and the telecommunication line access required to have a point-of-
presence on the Internet for the geographic area served. (Rouse, 2017) For example, different
region has different type of providers to use. Most of the large ISP company have their own high-
speed leased lines which make them capable to provide better internet and more services to the
customer. This make them don’t have to lean on the telecommunication company to get better
speed of leased lines. Among the largest national and regional ISPs are AT&T WorldNet, IBM
Global Network, MCI, Netcom, UUNet, and PSINet. (Rouse,2017)
An OSP (Open Settlement Protocol) is a client-server protocol that manages access control,
accounting, usage data and inter-domain routing to make it easier for Internet service providers
(ISPs) to support IP telephony. (Rouse, 2017) It is basically a supporting protocol which giving
out data and information to make the internet service provider works more easy and smooth.
Besides, we going to talk about the purpose of website. Website is a multipurpose place to do
anything you want, it is merely depending on what the users want to use for, what is the objective
of the audience. It can be classified in many ways, like searching for information, buy and sell
product, use for entertainment like games, movies and so on.
Therefore, we going to discuss few purpose of using website. First of all, the most common things
we use in website is searching for information. These websites have all be input with different kind
of information and knowledge from different users. So, the audience can use the search engine to
find different information and research from different website and link.
Next, we will be talk about the entertainment website. As you all know, entertainment website is
a lot, for example, youtube.com, dailymotion.com, y8.com and so on. We can find movies and
games from these websites and use to fill up the free time we have got or rest time. Entertainment
website also can be categorized as online gossip news, online magazines, or some hilarious website.
We can use all these websites to update our information, at the same time to cover our extra time.
Lastly, we going to tell about the e-commerce website which is also a very commonly use
nowadays. For example, lazada.com, e-bay.com, Alibaba.com and so on. All these websites
provides a platform for those who want to sell things to upload their products in there. Then the
audience can search for the products they want and purchase it. This make the people life easy and
convenience while the website boss able to make profit.
These are the purpose of website in networking, the company we are researching right now,
Trivago. It is also a website which can be classifies as service-based business website. Trivago
provides service to the audience by helping the audience to booking hotel and transport for their
trip.
For the browser part, any kind of browser would able to log onto the trivago.com, because this
company enable any type of browser to log in. But ensure it is completely stable for using this
trivago.com, I would likely choose Internet Explorer as a main browser, because it is thee most
old and stable browser.

BLOCKCHAIN TECHNOLOGY
What is Blockchain Technology?
Blockchain is a conveyed database that is utilized to keep up a consistently developing
rundown of record, called pieces. That database is in the storage devices are not all attached to a
common processor. Blockchain also known as peer-to-peer network collectively adhering to a
protocol for validating new blocks. peer-to-peer could direct sharing files and document between
personals computer or device. For example, Bluetooth and Bitcoin transactions are a typically
peer-to-peer connection. Blockchain could keep the track of the creation and modification time of
a document. Security here implies that nobody – not even the proprietor of the archive – ought to
have the capacity to transform it once it has been recorded given the timestamper's intergrity is
never compromised.
Designing the blockchain are inherently resistant to modification of the data. When the
data have been record and saved, the data in any given block cannot be altered retroactively without
the alteration of all subsequent blocks and the collusion of the network. Blockchain are built from
3 technologies, there are private key cryptography, peer-topeer network and program (the
blockchain’s protocol).
Blockchain Technology known as a public ledged of all Bitcoin transactions that have ever
been executed. The Bitcoin network prove as a great deal of transaction activity. Retaining a record
of the transactions helps clients track what was paid to and from whom.

Advantages
Basically the blockchain technology could help us to secure our website, privacy document
and data, online transaction.
Other than that blockchain technology also can disintermediation and trustless exchange.
What if there have two parties are able to make an transaction or exchange without the oversight
or intermediation of a third party, the blockchain will increase the trustworthy to keep their
transaction or exchange in safe situation. Blockchain technology are strongly reduce or even
eliminate counter party risk. For example, a client need to make online transaction money to
another client, between this process of instant transfer will not though the third party. So the online
transaction is secure, because blockchain technology is peer-to-peer.
Durability, reliability, and longevity are included in advantage of blockchain technology.
As the decentralized network, blockchain does not have a central point of failure and is better able
to withstand malicious attacks. So blockchain store data across its network, its will eliminates the
risks that come with data held centrally. Blockchain is using the cryptography to keep the
information.
Blockchain technology can faster the transactions between the client and client. For
example, most of the time banking system need to take up to a few day for clearing and final
settlement, especially outside of working hours. But blockchain technology could reduce the
transaction times to minutes and are processed 24/7. The reason is every single transaction are
peer-to-peer transaction that not link to any third party to proceed the transaction between client
and client.

Disadvantages
The biggest disadvantages in blockchain are always perform slower than centralized
databases. For instance, the transactions is being processed, a blockchain has to do all the same
things just like a regular database does.
Signature verification. The blockchain transaction is a public-private cryptography that
make all the transactions propagate between nodes in peer-to-peer. But the centralized databases,
once a connection has been established, there is no need to individually verify every single request
that comes over it.
Consensus mechanisms. Blockchain is a distributed database, the effort must be expended
in ensuring that nodes in the network reach consensus. But blockchain technology very less in
process the transactions are queued and processed in a single location.
Redundancy. Blockchain technology need to do a lot of work than centralized databases to
done a thing for the same end result. The reason is blockchain must be processed independently
by every node in the network.

2 way this Technology can be used in Trivago


First of all, the blockchain technology could executed in the transactions computer
system. Make the transactions computer system more better and more secure. Launch the
blockchain technology in the transactions of trivago between the client and client. During the
online transaction, blockchain will secure all the transaction between client and client. Once the
customer have to make transactions Trivago that will become two parties deal only and not
included the third party or more. The customer making transaction on Trivago, all the currency
and money will go through the blockchain database server and web server then direct receive all
the money and currency by merchant’s account. Trivago transactions ’system are peer-to-peer
could direct transaction between personal and personal.
Apart than that, on Trivago application and website implant the blockchain technology on
transactions’ history Blockchain technology also could record all the transactions’ history between
two parties efficiently and in a verify and permanent way. To handle all the transactions’ history
with blockchain will keep them in blockchain databases. As making digital transactions are
incredibly easy to reproduce that known as the spending the same unit of value more than once.
So creating the blockchain technology to save the transacions’ history only two parties know the
records. Once after the transactions between the customer and merchant that all the transactions
will save and display the transactions’ history to two parties only and will not share to third party
and other.

Explain the security measures needed to secure transactions


1. Used the virtual keyboard. As using the physical keyboard are easier to decryption
password. When users are entering the sensitive data always use virtual keyboard. Virtual
keyboard prevented from “Spyware” and “Trojan program”, because the keyloggers will
detect every single word typing on physical keyboard. To enhance the transactions using
online virtual keyboard for internet banking to click your username and password on screen.
2. Used updated and genuine antivirus software in machine. The antivirus software keeps the
machine safe and secure because the antivirus program prevented from Trojan horse, virus
and worm. Meanwhile protected your internet transactions security to keep away from
hackers.
3. Avoid public area doing transactions. For instance making the online transaction in cyber
café or used public machines. As these machines are used by a lots of pepple in a day. What
if the machines have installed the malicious program would directly effect to your
transaction. So do not do anything are related with transaction at the place like these.
4. Safe login screen. Doing the transactions should on a security page, make sure you are on
the secure website and at the URL have a “lock” symbol. Hackers are easy to spy and track
you when you are on a unsafe website. Finally, you need to access on the safety protocol.

Total word count : 7625 words


REFERENCES
1. Remove Spyware & Malware with SpyHunter - Enigma Software Group USA LLC.
(2017). Important Steps to Prevent Malware Infection - Remove Spyware & Malware
with SpyHunter - Enigma Software Group USA LLC. [online] Available at:
https://www.enigmasoftware.com/support/steps-to-prevent-malware-infection/ [Accessed
30 Jul. 2017].
2. Baratz, A. (2017). Malware: what it is and how to prevent it. [online] Ars Technica.
Available at: https://arstechnica.com/security/2004/11/malware/6/ [Accessed 30 Jul.
2017].
3. CNET. (2017). How to check if a Web site is safe. [online] Available at:
https://www.cnet.com/how-to/how-to-check-if-a-web-site-is-safe/ [Accessed 30 Jul.
2017].
4. Tucker, L. (2017). How to Check If A Website is Safe for Browsing. [online] Make Tech
Easier. Available at: https://www.maketecheasier.com/check-if-a-website-is-safe-for-
browsing/ [Accessed 30 Jul. 2017].
5. En.wikipedia.org. (2017). Biometric device. [online] Available at:
https://en.wikipedia.org/wiki/Biometric_device [Accessed 30 Jul. 2017].
6. The Economic Times. (2017). 100 most dangerous websites for your PC. [online]
Available at: http://economictimes.indiatimes.com/100-most-dangerous-websites-for-
your-pc/articleshow/4915390.cms [Accessed 30 Jul. 2017].
7. Cbsnews.com. (2017). What are the most dangerous websites?. [online] Available at:
http://www.cbsnews.com/news/what-are-the-most-dangerous-websites/ [Accessed 30 Jul.
2017].
8. Donovan, D. and Donovan, D. (2017). How to Identify a Secure Website. [online] Dun &
Bradstreet. Available at: https://www.dandb.com/smallbusiness/how-to-identify-a-secure-
website/ [Accessed 30 Jul. 2017].
9. Pathela, A. (2017). The Advantages and Disadvantages of Online Booking Systems.
[online] ZOZI Advance. Available at: https://www.zozi.com/advance/blog/the-
advantages-and-disadvantages-of-online-booking-systems [Accessed 5 Aug. 2017].
10. SRL, O. (2017). Benefits of Online Booking System Software | Online Booking Manager.
[online] Onlinebookingmanager.com. Available at:
http://www.onlinebookingmanager.com/benefits.php [Accessed 5 Aug. 2017].
11. Techwalla. (2017). Advantages and Disadvantages of an Online Booking System |
Techwalla.com. [online] Available at: https://www.techwalla.com/articles/advantages-
and-disadvantages-of-an-online-booking-system [Accessed 5 Aug. 2017].
12. Anon, (2017). [online] Available at: https://www.blockchain.com/ [Accessed 3 Jul.
2017]. [Accessed 9 Aug. 2017].
13. Anon, (2017). [online] Available at: http://www.coindesk.com/information/what-is-
blockchain-technology/ [Accessed 3 Jul. 2017]. [Accessed 9 Aug. 2017].
14. Anon, (2017). [online] Available at:
http://www.investopedia.com/terms/b/blockchain.asp [Accessed 4 Jul. 2017]. [Accessed
9 Aug. 2017].
15. Anon, (2017). [online] Available at: http://www.coindesk.com/information/what-is-
bitcoin/ [Accessed 4 Jul. 2017]. [Accessed 9 Aug. 2017].
16. Anon, (2017). [online] Available at: http://www.investopedia.com/terms/b/block-bitcoin-
block.asp [Accessed 4 Jul. 2017]. [Accessed 9 Aug. 2017].
17. Deloitte Nederland. (2017). Blockchain technology: 9 benefits & 7 challenges | Deloitte.
[online] Available at:
https://www2.deloitte.com/nl/nl/pages/innovatie/artikelen/blockchain-technology-9-
benefits-and-7-challenges [Accessed 9 Aug. 2017].
18. McKinsey & Company. (2017). Page not found. [online] Available at:
http://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/using-
blockchain-to-improve-data-management-in-the-public-sector [Accessed 9 Jul. 2017].
[Accessed 9 Aug. 2017].
19. Anon, (2017). [online] Available at:
https://blockchaintechnologycom.wordpress.com/2016/11/21/advantages-disadvantages/
[Accessed 10 Jul. 2017]. [Accessed 9 Aug. 2017].
20. Anon, (2017). [online] Available at: http://techdelve.com/essential-security-measures-for-
secure-online-transactions/ [Accessed 12 Jul. 2017]. [Accessed 9 Aug. 2017].
21. Business.org. (2017). Home - Business.org. [online] Available at:
http://www.businessbee.com/resources/technology/security/online-payment-security-5-
steps-to-ensure-safe-transactions/ [Accessed 12 Jul. 2017]. [Accessed 9 Aug. 2017].
22. En.wikipedia.org. (2017). Trivago. [online] Available at:
https://en.wikipedia.org/wiki/Trivago [Accessed 9 Aug. 2017].
23. Research, Z. (2017). Expedia Acquires Stake in Trivago. [online] Zacks Investment
Research. Available at: https://www.zacks.com/stock/news/94714/expedia-acquires-
stake-in-trivago [Accessed 9 Aug. 2017].
24. Anon, (2017). [online] Available at: http://Expedia, Inc. [Accessed 9 Aug. 2017].
25. Anon, (2017). [online] Available at: http://Expedia Inc "Expedia Announces Agreement
To Acquire Majority Of trivago [Accessed 9 Aug. 2017].
26. Anon, (2017). [online] Available at:
http://file:///C:/Users/Lenovo/Desktop/CAP_Ergo_Guide.pdf Workplace Ergonomics
Reference Guide 2nd Edition A Publication of the Computer/Electronic Accommodations
Program [Accessed 9 Aug. 2017].
27. Content.statefundca.com. (2017). ErgoMatters. [online] Available at:
https://content.statefundca.com/safety/ErgoMatters/StandingGuidelines.asp [Accessed 9
Aug. 2017].
28. Anon, (2017). [online] Available at: http://umpir.ump.edu.my/8321/1/cd8225_78.pdf
[Accessed 9 Aug. 2017].
29. Anon, (2017). [online] Available at: Anon, (2017). [online] Available at:
http://file:///C:/Users/Lenovo/Desktop/1.pdf [Accessed 9 Aug. 2017]. [Accessed 9 Aug.
2017].
30. Anon, (2017). [online] Available at: http://file:///C:/Users/Lenovo/Desktop/6.pdf
[Accessed 9 Aug. 2017].
31. Anon, (2017). [online] Available at: http://file:///C:/Users/Lenovo/Desktop/7.pdf
[Accessed 9 Aug. 2017].
32. Dohrmann Consulting. (2017). What is Ergonomics? - Dohrmann Consulting. [online]
Available at: http://www.ergonomics.com.au/what-is-ergonomics/ [Accessed 9 Aug.
2017].
33. D'Ambra, S. (n.d.). What is the Purpose of a Website? Retrieved from Cleart.com:
https://www.cleart.com/what-is-the-purpose-of-a-website.html
34. D'Ambra, S. (n.d.). What is the Purpose of a Website? Retrieved from Cleart.com:
https://www.cleart.com/what-is-the-purpose-of-a-website.html
35. Rouse, M. (n.d.). What is ISP (Internet service provider)? - Definition from WhatIs.com.
36. Anon, (2017). [online] Available at: Retrieved from
SearchWinDevelopment: http://searchwindevelopment.techtarget.com/definition/ISP
[Accessed 9 Aug. 2017].
37. Rouse, M. (n.d.). What is Open Settlement Protocol (OSP)? - Definition from
WhatIs.com. Retrieved from SearchUnifiedCommunications:
http://searchunifiedcommunications.techtarget.com/definition/Open-Settlement-Protocol-
OSP
38. Shea, V. (n.d.). The Core Rules of Netiquette. Retrieved from
https://learning.colostate.edu/guides/guide.cfm?guideid=4
39. Trivago Reviews - Is it a Scam or Legit?. [online] HighYa. Available at:
http://www.highya.com/trivago-reviews [Accessed 21 Jul. 2017].

View publication stats

You might also like