Information Security

1978 words 8 pages
4. Implementation
4.1 mobile website or application
When we are planning to establish a mobile presence for PAAC one of the first considerations that will likely come to mind is whether we want to create a mobile application for users to download (app) or a mobile website, or perhaps both. Mobile websites and apps can look very similar at first-glance, and determining which is most suited to PAAC’s needs will depend upon a number of factors, including target audiences, available budget, intended purpose and required features.

Both applications and mobile websites are accessed on handheld devices such as smartphones (e.g. iPhone, Android and Blackberry) and tablets.

Mobile websites
A mobile website is similar to any other website
…show more content…

So we decide to develop a SMS system for the non-smart phone users. The users can access PAAC Trip Assistant via a cell phone or a PDA by sending an SMS text message. The arrival predictions for you bus will then be texted back to the user. The user can even have the system alert you when your bus is a specified number of minutes away.

The 5-digit text message address is XXXXX. The syntax of the message is "PAAC stop number/address/saved stop name" such as "PAAC 12345" or "PAAC 417 South Craig".

Specifying a stop
There are four ways to specify the stop.
1. Via Menus
If the user does not specify a stop in the text massage then the user will be presented with a list of routes. The user then specifies which route he is interested in. The user will then be presented with a list of directions and then a list of stops to select from. Once the user has selected his/her stop, the corresponding predictions for that stop will be displayed.
2. Specifying a Stop Number:
Every PAAC bus stop has a unique number, which is displayed on the sign or in the shelter at the stop. The users simply SMS the bus stop number to XXXXX for up-to-the-minute timetable and bus arrival information for services that operate from your stop.
3. Specifying an Address:
The user can also enter an address or an intersection and predictions for the stops nearest the intersection. This is especially


  • Comparisons of Information Security Management Frameworks
    1202 words | 5 pages
  • Principles of Information Security Chapter 3 Review
    1297 words | 6 pages
  • Cmgt 441 Week 2 Information Security Paper
    1054 words | 5 pages
  • Cmgt 400 Week 2 Common Information Security Threats
    1028 words | 5 pages
  • Security Information Affecting Investment Decision: a Case Study on Eastern Bank Limited
    3277 words | 14 pages
  • Vlt 2 Task 4
    4005 words | 17 pages
    1422 words | 6 pages
  • Health Body
    1148 words | 5 pages
  • Wgu Capstone
    8762 words | 36 pages
  • General Security Policy
    4699 words | 19 pages