114,635 research outputs found

    Marketing Particularities in Tourism and Services

    Get PDF
    The marketing has as an essential objective the orientation of firms’ activities based on the market needs. This presupposes, necessarily, the existence of an informational system very well established, that observes any rapid changing market environment: the consumer, distributor and competition. Marketing services is a marketing specialized domain, autonomous, clearly differentiated, in the process of consolidation and development. The services characteristics such as: immateriality, inseparability, variability, inability of storage, they normally lead to a discussion on whether the marketing of services is similar to or different from that of physical goods.marketing services, market environment, immateriality, inseparability

    Marketing Particularities in Tourism and Services

    Get PDF
    The marketing has as an essential objective the orientation of firms’ activities based on the market needs. This presupposes, necessarily, the existence of an informational system very well established, that observes any rapid changing market environment: the consumer, distributor and competition. Marketing services is a marketing specialized domain, autonomous, clearly differentiated, in the process of consolidation and development. The services characteristics such as: immateriality, inseparability, variability, inability of storage, they normally lead to a discussion on whether the marketing of services is similar to or different from that of physical goods

    Corruption and firm behavior

    Get PDF
    This paper investigates how corruption affects firrm behavior. Firms can engage in two types of corruption when seeking a public service: cost-reducing "collusive" corruption and cost increasing "coercive" corruption. Using an original and unusually rich dataset on bribe payments at ports matched to firrm-level data, we observe how firms respond to each type of corruption by adjusting their shipping and sourcing strategies. "Collusive" corruption is associated with higher usage of the corrupt port, while "coercive" corruption is associated with reduced demand for port services. Our results suggest that firms respond to the opportunities and challenges created by different types of corruption, organizing production in a way that increases or decreases demand for the public service. Understanding how firms respond to corruption has important implications for how we conceptualize, identify and measure the overall impact of corruption on economic activity

    Agricultural Value Chain Development: Threat or Opportunity for Women's Employment?

    Get PDF
    This document presents information on how agricultural markets are rapidly globalizing, generating new consumption patterns and new production and distribution systems. Value chains, often controlled by multinational or national firms and supermarkets, are capturing a growing share of the agri-food systems in developing regions. They can provide opportunities for quality employment for men and women, yet they can also be channels to transfer costs and risks to the weakest nodes, particularly women. They often perpetuate gender stereotypes that keep women in lower paid, casual work and do not necessarily lead to greater gender equality

    DIP: Disruption-Tolerance for IP

    Full text link
    Disruption Tolerant Networks (DTN) have been a popular subject of recent research and development. These networks are characterized by frequent, lengthy outages and a lack of contemporaneous end-to-end paths. In this work we discuss techniques for extending IP to operate more effectively in DTN scenarios. Our scheme, Disruption Tolerant IP (DIP) uses existing IP packet headers, uses the existing socket API for applications, is compatible with IPsec, and uses familiar Policy-Based Routing techniques for network management

    SLAng: A language for defining service level agreements

    Get PDF
    Application or web services are increasingly being used across organisational boundaries. Moreover, new services are being introduced at the network and storage level. Languages to specify interfaces for such services have been researched and transferred into industrial practice. We investigate end-to-end quality of service (QoS) and highlight that QoS provision has multiple facets and requires complex agreements between network services, storage services and middleware services. We introduce SLAng, a language for defining Service Level Agreements (SLAs) that accommodates these needs. We illustrate how SLAng is used to specify QoS in a case study that uses a web services specification to support the processing of images across multiple domains and we evaluate our language based on it

    Duration-differentiated Energy Services with a Continuum of Loads

    Full text link
    As the proportion of total power supplied by renewable sources increases, it gets more costly to use reserve generation to compensate for the variability of renewables like solar and wind. Hence attention has been drawn to exploiting flexibility in demand as a substitute for reserve generation. Flexibility has different attributes. In this paper we consider loads requiring a constant power for a specified duration (within say one day), whose flexibility resides in the fact that power may be delivered at any time so long as the total duration of service equals the load's specified duration. We give conditions under which a variable power supply is adequate to meet these flexible loads, and describe how to allocate the power to the loads. We also characterize the additional power needed when the supply is inadequate. We study the problem of allocating the available power to loads to maximize welfare, and show that the welfare optimum can be sustained as a competitive equilibrium in a forward market in which electricity is sold as service contracts differentiated by the duration of service and power level. We compare this forward market with a spot market in their ability to capture the flexiblity inherent in duration-differentiated loads

    A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems

    Full text link
    We present a taxonomy and an algebra for attack patterns on component-based operating systems. In a multilevel security scenario, where isolation of partitions containing data at different security classifications is the primary security goal and security breaches are mainly defined as undesired disclosure or modification of classified data, strict control of information flows is the ultimate goal. In order to prevent undesired information flows, we provide a classification of information flow types in a component-based operating system and, by this, possible patterns to attack the system. The systematic consideration of informations flows reveals a specific type of operating system covert channel, the covert physical channel, which connects two former isolated partitions by emitting physical signals into the computer's environment and receiving them at another interface.Comment: 9 page
    corecore