952 resultados para hotel transactions
Resumo:
Digital Image
Resumo:
Digital image
Resumo:
This research examines how a tourist’s degree of psychological entitlement (sense of deservingness) influences their responses to hotels that differ in cultural distance. Using a visit to China by Western tourists as a context, an experiment shows that entitled tourists respond more negatively to high cultural distance hotel environments compared with low cultural distance environments. Results are mediated by tourist irritation. Research contributions include demonstrating how entitlement moderates cultural distance effects, revealing tourist irritation as a mechanism that explains these effects, and showing how psychological entitlement influences how tourists react to hotel environments when visiting a foreign destination.
Resumo:
Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.
Resumo:
Three different types of consistencies, viz., semiweak, weak, and strong, of a read-only transaction in a schedule s of a set T of transactions are defined and these are compared with the existing notions of consistencies of a read-only transaction in a schedule. We present a technique that enables a user to control the consistency of a read-only transaction in heterogeneous locking protocols. Since the weak consistency of a read-only transaction improves concurrency in heterogeneous locking protocols, the users can help to improve concurrency in heterogeneous locking protocols by supplying the consistency requirements of read-only transactions. A heterogeneous locking protocol P' derived from a locking protocol P that uses exclusive mode locks only and ensures serializability need not be deadlock-free. We present a sufficient condition that ensures the deadlock-freeness of Pprime, when P is deadlock-free and all the read-only transactions in Pprime are two phase.
Resumo:
With the emergence of service-oriented computing technology, companies embrace new ways of carrying out business transactions electronically. Since the parties involved in an electronic business transaction (eBT) manage a heterogeneous information-systems infrastructure within their organizational domains, the collaboration complexity is considerable and safeguarding an interorganizational collaboration with an eBT is difficult, but of high significance. This paper describes a conceptual framework that pays attention to the complexities of an eBT and its differentiating characteristics that go further than traditional database transactions. Since the eBT is a framework that comprises separate levels, pre-existing transaction concepts are explored for populating the respective levels. To show the feasibility of the described eBT framework, industry initiatives that are aspiring to become business-transaction standards, are checked for eBT compatible characteristics. Since realizing an eBT framework raises many tricky issues, the paper maps out important research areas that require scientific attention. Essentially, it is required to investigate how the business semantics influences the nature of an eBT throughout its lifecycle.
Resumo:
This study owes its inception to the wisdom and experience of the staff of the Northeast Fisheries Science Center who, after several decades of surveys in the New York Bight, recognized a unique opportunity to capitalize on the decision to stop ocean dumping of sewage sludge and designed an innovative field study to evaluate effects on living marine resources and their habitats. For decades ocean dumping was viewed as a cheap and effective means for disposal of wastes generated by urbanized coastal areas. Even after the 12-mile site was closed, sewage sludge continued to be dumped at Deepwater Dumpsite 106. The 6-mile site off the NewJersey coast is still used as a dumpsite for dredged material from New York Harbor areas. Discussions continue on the propriety of using the deep ocean spaces for disposal of a variety of material including low level radioactive wastes. Consequently, managers are still faced with critical decisions in this area. It is to be hoped that the results from the 12-mile study will provide the necessary information on which these managers can evaluate future risks associated with ocean waste disposal. (PDF file contains 270 pages.)
Resumo:
The FIDAWOG workshop held from 29 March to 1 April 1999 in Jinja was the third major stock assessment workshop attended by most of the participants during the project. It followed two workshops, each of which lasted three weeks, held in 1998.
Resumo:
Urteko kontuen analisia eta etorkizuneko urteko kontu probisionalak lantzea. Euskera.
Resumo:
El objeto del presente Trabajo Fin de Grado (TFG) es realizar un Plan de Marketing para el Hotel López de Haro de 5 estrellas, perteneciente a la cadena Ercilla y ubicado en Bilbao. Para ello, se ha analizado tanto el entorno interno como el externo, detectándose una serie de fortalezas entre las que destaca el excelente trato personal que ofrecen los empleados a sus huéspedes y que es un factor clave sobre el que cimentar su futuro. Asimismo, se han detectado debilidades, oportunidades y amenazas sobre las que hay que trabajar. Con ese diagnóstico y con una orientación al cliente se han definido objetivos de marketing alcanzables y que permitieran, mediante diferentes estrategias y acciones satisfacer las necesidades de la clientela. En este sentido, se han investigado también las tendencias del mercado y, teniendo en cuenta estas y la realidad del hotel, se ha aportado una visión externa que les permita mejorar el funcionamiento del hotel.
Resumo:
En la actualidad, el éxito de los establecimientos hoteleros está influido por numerosos factores que hacen del hotel un negocio difícil de gestionar. Nos encontramos en un sector, el turístico, en el que la demanda aumenta año tras año en San Sebastián y el principal inconveniente es la competencia del sector. Una competencia feroz. Nos enfrentamos ante una estructura de empresa muy costosa y difícil de gestionar en la que el capital humano es el activo más importante. El valor añadido es una de las ventajas competitivas más destacadas de este negocio y la calidad de los servicios prestados es la clave del éxito. El objetivo del presente trabajo de fin de grado, se centra en analizar la situación por la que atraviesa el sector turístico en la capital guipuzcoana, y conocer y examinar la gestión diaria de un establecimiento hotelero para realizar una previsión fiable. Básicamente, se trata de estudiar la viabilidad de un nuevo hotel boutique en el casco histórico de San Sebastián.
Resumo:
In the above entitled paper (ibid., vol. 55, no. 11, pp. 3001-3011), two errors were noticed after the paper went to press. The errors are corrected here.