REFERENCES
[1]
L. Rohida, “Pengaruh Era Revolusi Industri 4.0 terhadap Kompetensi Sumber Daya
Manusia,”
J. Manaj. dan Bisnis Indones.
, vol. 6, no. 1, pp. 114–136, 2018, doi:
10.31843/jmbi.v6i1.187.
[2]
K. Nam, C. S. Dutt, P. Chathoth, and M. S. Khan, “Blockchain technology for smart
city and smart tourism: latest trends and challenges,”
Asia Pacific J. Tour. Res.
, vol.
26, no. 4, pp. 454–468, 2021, doi: 10.1080/10941665.2019.1585376.
[3]
N. Azis, M. Amin, S. Chan, and C. Aprilia, “How smart tourism technologies affect
tourist destination loyalty,”
J. Hosp. Tour. Technol.
, vol. 11, no. 4, pp. 603–625, 2020,
doi: 10.1108/JHTT-01-2020-0005.
[4]
R. H. Tsaih and C. C. Hsu, “Artificial intelligence in smart tourism: A conceptual
framework,”
Proc. Int. Conf. Electron. Bus.
, vol. 2018-December, pp. 124–133, 2018.
[5]
N. Wise and H. Heidari, “Developing smart tourism destinations with the internet of
things,”
Big Data Innov. Tour. Travel. Hosp. Manag. Approaches, Tech. Appl.
, pp. 21–
29, 2019, doi: 10.1007/978-981-13-6339-9_2.
[6]
S. Gong
et al.
, “Toward Smart Wireless Communications via Intelligent Reflecting
Surfaces: A Contemporary Survey,”
IEEE Commun. Surv. Tutorials
, vol. 22, no. 4, pp.
2283–2314, 2020, doi: 10.1109/COMST.2020.3004197.
[7]
W. Wang
et al.
, “Realizing the Potential of Internet of Things for Smart Tourism with
5G and AI,”
IEEE Netw.
, vol. 34, no. 6, pp. 295–301, 2020, doi:
10.1109/MNET.011.2000250.
[8]
A. Khalajmehrabadi, N. Gatsis, and D. Akopian, “Modern WLAN Fingerprinting
Indoor Positioning Methods and Deployment Challenges,”
IEEE Commun. Surv.
Tutorials
, vol. 19, no. 3, pp. 1974–2002, 2017, doi: 10.1109/COMST.2017.2671454.
[9]
R. Kurniawan, “Analisis Dan Implementasi Desain Jaringan Hotspot Berbasis
Mikrotik Menggunakan Metode NDLC (Network Development Life Cycle) Pada BPU
Bagas Raya Lubuk Linggau,”
J. Ilm. Betrik
, vol. 7, no. 01, pp. 50–59, 2016, doi:
10.36050/betrik.v7i01.12.
[10] S. S. Hermawan and R. R. Saedudin, “Design of Cooling and Air Flow System Using
NDLC Method Based on TIA-942 Standards in Data Center at CV Media Smart
Semarang,”
Int. J. Adv. Data Inf. Syst.
, vol. 1, no. 1, pp. 34–39, 2020, doi:
10.25008/ijadis.v1i1.179.
[11] J. A. Coca-Stefaniak, “Marketing smart tourism cities – a strategic dilemma,”
Int. J.
Tour. Cities
, vol. 5, no. 4, pp. 513–518, 2019, doi: 10.1108/IJTC-12-2019-163.
[12] C. Koo, S. Shin, U. Gretzel, W. C. Hunter, and N. Chung, “Conceptualization of Smart
Tourism Destination Competitiveness,”
Asia Pacific J. Inf. Syst.
, vol. 26, no. 4, pp.
561–576, 2016, doi: 10.14329/apjis.2016.26.4.561.
[13] F. L. Aryeh, M. Asante, and A. E. Y. Danso, “Securing Wireless Network Using
pfSense Captive Portal with RADIUS Authentication – A Case Study at UMaT *,”
Ghana J. Technol.
, vol. 1, no. 1, pp. 40–45, 2016.
[14] H. Kjellberg, J. Hagberg, and F. Cochoy, “Thinking market infrastructure: Barcode
scanning in the us grocery retail sector, 1967–2010,”
Res. Sociol. Organ.
, vol. 62, pp.
Ruci Meiyanti
/
J
OURNAL
TECH-E
-
V
OL
.
5.
N
O
.
2
(2022)
113
207–232, 2019, doi: 10.1108/S0733-558X20190000062013.
[15] H. Kuswanto, “Sistem Autentikasi Hotspot Menggunakan Radius Server Mikrotik
Router,”
Informatics Educ. Prof.
, vol. 2, no. 1, pp. 43–50, 2017.
[16] Y. Li, C. Hu, C. Huang, and L. Duan, “The concept of smart tourism in the context of
tourism information services,”
Tour. Manag.
, vol. 58, pp. 293–300, 2017, doi:
10.1016/j.tourman.2016.03.014.
[17] F. Mehraliyev, I. C. C. Chan, Y. Choi, M. A. Koseoglu, and R. Law, “A state-of-the-
art review of smart tourism research,”
J. Travel Tour. Mark.
, vol. 37, no. 1, pp. 78–91,
2020, doi: 10.1080/10548408.2020.1712309.
[18] T. Sanjaya and D. Setiyadi, “Network Development Life Cycle (NDLC) Dalam
Perancangan Jaringan Komputer Pada Rumah Shalom Mahanaim,”
Mhs. Bina Insa.
,
vol. 4, no. 1, pp. 1–10, 2019, [Online]. Available: http://ejournal-binainsani.ac.id/.
[19] I. P. A. E. Pratama, “OPTIMASI RADIUS SERVER UNTUK PENGATURAN
ALOKASI BANDWIDTH ( JUSS ) Jurnal Sains dan Sistem Informasi ISSN 2614-
8277,”
( JUSS ) J. Sains dan Sist. Inf.
, vol. 2, no. 2, pp. 18–24, 2019.
[20] R. D. H. Ontoseno, M. N. Haqqi, and M. Hatta, “Limitasi Pengguna Akses Internet
Berdasarkan Kuota Waktu Dan Data Menggunakan Pc Router Os Mikrotik,”
Tek. ng.
Sains J.
, vol. 1, no. 2, p. 125, 2017, doi: 10.51804/tesj.v1i2.134.125-130.
[21] R. Novrianda, “Implementasi authentication Captive Portal pada Wireless Local Area
Network PT. Rikku Mitra Sriwijaya,”
Regist. J. Ilm. Teknol. Sist. Inf.
, vol. 4, no. 2, p.
67, 2018, doi: 10.26594/register.v4i2.1245.
[22] A. U. Shelton, M. Wolf, N. Franz, and P. W. Brummond, “Assessment of technician
barcode scanning verification compared to pharmacist verification,”
Am. J. Heal.
Pharm.
, vol. 76, no. 3, pp. 148–152, 2019, doi: 10.1093/ajhp/zxy018.
[23] M. T. KURNIAWAN, A. NURFAJAR, O. DWI, and U. YUNAN, “Desain Topologi
Jaringan Kabel Nirkabel PDII-LIPI dengan Cisco Three-Layered Hierarchical
menggunakan NDLC,”
ELKOMIKA J. Tek. Energi Elektr. Tek. Telekomun. Tek.
Elektron.
, vol. 4, no. 1, p. 47, 2018, doi: 10.26760/elkomika.v4i1.47.
[24] H. Ma, “Smart Tourism City: Developments and Transformations,”
Complexity
, vol.
2020, pp. 1–15, 2020, doi: 10.1155/2020/8842061.
[25] J. Dorcic, J. Komsic, and S. Markovic, “Mobile technologies and applications towards
smart tourism – state of the art,”
Tour. Rev.
, vol. 74, no. 1, pp. 82–103, 2019, doi:
10.1108/TR-07-2017-0121.
[26] K. A. Farly, X. B. N. Najoan, and A. S. M. Lumenta, “Perancangan Dan Implementasi
Vpn Server Dengan Menggunakan Protokol Sstp (Secure Socket Tunneling Protocol)
Studi Kasus Kampus Universitas Sam Ratulangi,”
J. Tek. Inform.
, vol. 11, no. 1, 2017,
doi: 10.35793/jti.11.1.2017.16745.
Ruci Meiyanti
/
J
OURNAL
TECH-E
-
V
OL
.
5.
N
O
.
2
(2022)
114
|