Comparative Analysis between Document-based and Model-based Compliance Management Approaches

Author(s):  
Sepideh Ghanavati ◽  
Daniel Amyot ◽  
Liam Peyton
2021 ◽  
Author(s):  
SHUVAM ROUTRAY ◽  
Kranthi Nidubrolu ◽  
Abhisha Chauhan ◽  
Chinmay Ashok Kirtane ◽  
Lohit Dhamija ◽  
...  

2015 ◽  
Vol 10 (4) ◽  
pp. 436-445 ◽  
Author(s):  
P. Bubeck ◽  
H. Kreibich ◽  
E.C. Penning-Rowsell ◽  
W.J.W. Botzen ◽  
H. de Moel ◽  
...  

Author(s):  
Victoria-Ann Verkerk

AbstractSince 2020, the tourism industry worldwide has been devastated as a result of the COVID-19 pandemic. Governments across the globe imposed strict national lockdowns in order to curb the spread of the pandemic, with negative effects on tourism. This forced many tourism companies and organizations to turn to virtual reality (VR) to survive. As a consequence, numerous tourism scholars began to question whether VR would replace conventional tourism after COVID-19. The study aims is to address this concern and to determine if VR will be a substitute for conventional tourism or whether it can be considered as a tourism niche. It is a conceptional study which adopts a comparative analysis of conventional tourism models and VR. It uses two popular conventional tourism models, namely N. Leiper’s (1979) tourism system model and R.W. Butler’s (1980) destination life-cycle model. Based on this analysis, this paper suggests that VR will never be a substitute for conventional tourism, but should rather be considered a future tourism niche.


2019 ◽  
Vol 8 (2) ◽  
pp. 40-43
Author(s):  
Sheik Saidhbi

Internet working security has become one of the biggest uprising points of concern now days. People are getting attached more and more to the internet in order to fulfill their demands. Not only customers but also the IT based companies are also getting themselves relying on up growing technology called as cloud computing. Cloud is a branch of computer science that provides the services on lease. In this paper we will make a comparative analysis of various technical security issues towards cloud computing, cloud deployment based security and model based security issues. A comparative analysis has been made at the end of the paper.


Desalination ◽  
2018 ◽  
Vol 446 ◽  
pp. 83-93 ◽  
Author(s):  
Shenhan Wang ◽  
Qiping Zhu ◽  
Chang He ◽  
Bingjian Zhang ◽  
Qinglin Chen ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document