IT in the current case
Currently, the Health Management System of Hajj utilizes mobile applications in managing the pilgrim, as shown in figure 1 below. As pointed out by Yamin et al. (2018), large crowds draw visitors from different parts of the world. Some end up getting lost. The mobile devices can be used to detect their locations. In the current case, it is used to observe the travel points in real-time, as shown in the diagram below. The technology is used to identify the location of pilgrims using the ID tags. The tags enable the addition of more information about the pilgrims (Yamin et al., 2016). In particular, data related to the health of individuals is added. Further, the technology enables the pilgrims to raise alarms whenever they need help. The mobile software is used in both processes. That is in managing movement and health services.
Figure 1: Hajj Management System
(Source: GIS Innovation Center, n. d., http://www.gistic.org/hajj-management-system/)
Problems existing in the current processes
The problem with the current functions is controlling the number of pilgrims attending the ritual. Even though the organizers plan to permit less than 2 million people to attend, there are occasions pilgrims have exceeded that number. For example, in 2012, over 3.65 million Muslims performed Hajj at the place (Yamin, 2015). The organizers of the event are expected to adhere to the international standards limiting the number of people who should gather in a place at any given time. Unfortunately, that is not the case with Hajj management. The system used is mostly manual. It becomes a challenge to monitor and keep the data of attending pilgrims. Most often, the event ends up being crowded. At times, stampedes have occurred, leading to several deaths. The stampedes happen because of a lapse in systems used to manage the movement of people. It is an indication that the persons attending are vulnerable to contagious disease since they are overcrowded. From the onset, the systems fail to plan and account for the people attending the event. Possibly, the mobile applications used are not sufficient in manning the process (Yamin et al., n. d.). For instance, the systems allow the fitting of the devices to the vehicles used by the pilgrims. That is a limitation since it is not easy to monitor the movement of pilgrims from Jeddah city to Mecca where the stampedes main occur. Don't use plagiarised sources.Get your custom essay just from $11/page
Additionally, the health services management process is facing the problem of contagious viral diseases which continue to occur. The disease like Swine flu, Ebola, SARS and Corona Virus have caused havoc to the world. There is no guarantee that they will not reoccur. The continued re-emergence of the virus poses a significant threat to Hajj and its entire health services management process. In the past, illegal pilgrims have entered the venue (Yamin, 2015). Unfortunately, they have infected the crowds. Notably, the current technology of mobile applications used by the management has not been effective. It is only used on the persons officially permitted to attend. In that regard, it is not feasible that the tech as it will offer a comprehensive solution. The health risks will persist. It is a call that the Hajj management team think of a more elaborate technology to collaborate the two process; the movement of people and managing health services.
How Information Technology can be used to improve the processes
Most of the functions within the Hajj management process are done manually, something that is resulted in increased incidents of stampedes and health risks. Information Technology bears a solution to the problems experienced in the processes (Yamin et al., 2016). Other than the use of mobile applications, the Radio Frequency Identification (FFID) can be used to improve the two processes.
The RFID technology is used to transmit data to a tag using a wireless signal, as shown in figure 2 below. Once the attached tag is activated, it transmits the data therein to the reading instrument (Haddara & Staaby, 2018). That triggers interpretation and action on the information generated.
Figure 2: RFID technology functioning process
(Source: Shutterstock, n. d., https://www.shutterstock.com/search/rfid+tag)
One good thing about this technology is the distance and speed. The frequencies generated can be read in distances exceeding 150 miles. Also, it can be of any range between 100-500 kHz (Yamin et al., 2016). Depending on the frequency band used, a signal can be traced in real-time.
On the other hand, mobile applications currently used by the system are not sufficient. Its success depends on the information that has been captured. Although it is an affordable and readily available strategy, it is not easy to control its use (Yamin et al., 2016). The strategy can also be incorporated with social media use to make it more effective. The number of people on social platforms, as shown in figures 3 and 4 below, has continued to increase. That is making the social media, and mobile use approaches preferred for management in organizations. Perhaps the only challenge to deal with this technology is the synchronizing of data. In most cases, data is generated randomly (Haddara & Staaby, 2018). That makes it difficult to act promptly.
Figure 3: Graph showing the number of people using social media platforms globally
Figure 4: Global facts about social media use
(Source: Yamin et al. 2016)
The two technologies have applied by various organizations to facilitate the management of various processes. For example, RFID is used to track and collect data in various industries, including manufacturing, pharmaceutical, retail and logistics, among others. The technology is considered a significant innovation in the healthcare sector (Haddara & Staaby, 2018). It is helping to increase operational efficiency and organizational safety. The technology allows the tagging of inventory, assets and data about the patients. In the current case, the technology will allow the managers of Hajj to incorporate all relevant information about the pilgrims (Yamin et al., 2016). The information could be used to control movement and initiate appropriate health interventions.
Further, the technology of social media and mobile applications will also suit the health management system of Hajj (Yamin et al., 2016). Research has shown that the technology is used to create a network of communication, as shown in figure 5 below. For example, in the case of human trafficking, traders link utilizing the technology. They discuss their transactions through the platforms (Sarkar, 2015). They even go a step further, to encrypt their hosting devices, making it difficult for the police to investigate. Most probably, in the current case, the technologies will be used to develop a communication network. Potentially, it will enable the members to interact among themselves.