The Case of Pervasive Environments

نویسندگان

  • Eleonora Pantano
  • Rocco Servidio
چکیده

The increasing competition among territories forces the tourism industry to develop new marketing strategies capable of spreading the touristic potentiality of the territory, in order to attract more touristic flows (Dwyer et al., 2009; Zhang et al., 2009; Pantano & Naccarato, 2010). Form a tourists point of view, the industry tries to develop the offer which best fits consumers’ needs, whereas from a managerial standpoint, the industry tries to develop new strategies capable of maximizing the profitability of local business, of optimizing the impact of tourism by ensuring a sustainable balance between economic benefits and socio-cultural and environments effects, of improving the quality of life of the local population (Buhalis, 2000). ABSTRACT

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Discovery and Composition of Services for Context-Aware Systems

We consider the challenge of dynamically adapting services to context changes that occur in ubiquitous computing environments (e.g., changes in a user’s activity) and propose the Context-Aware Service Enabling (CASE) platform for that purpose. The CASE platform combines context-aware service discovery with service composition, acting as an enabler for the development of adaptive context-aware a...

متن کامل

Design of Service-Oriented Pervasive System for Urban Computing in Cali Zoo (OpenZoo)

The increasing popularity of wireless technologies and mobile computing devices has enabled new application areas and research. One of these new areas is pervasive systems in urban environments, because urban environments are characterized by high concentration of these technologies and devices. In this paper we will show the process of pervasive system design in urban environments, using as us...

متن کامل

The Relationship Between Management Information System Deployment with Conflict Management Styles in Educational and Executive Sports Managers (Case Study: Tehran municipality)

 Organizational conflict is a fundamental and pervasive part of our organizational life. Organizations generally fail in competitive environments if there is less conflict. Managers can use Conflict to increase the effectiveness of the organization. The purpose of this study was to investigate the relationship between management information system (MIS) deployment with conflict management styl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017