3,901 research outputs found

    Progress in information technology and tourism management: 20 years on and 10 years after the Internet—The state of eTourism research

    Get PDF
    This paper reviews the published articles on eTourism in the past 20 years. Using a wide variety of sources, mainly in the tourism literature, this paper comprehensively reviews and analyzes prior studies in the context of Internet applications to Tourism. The paper also projects future developments in eTourism and demonstrates critical changes that will influence the tourism industry structure. A major contribution of this paper is its overview of the research and development efforts that have been endeavoured in the field, and the challenges that tourism researchers are, and will be, facing

    U.S./European Summit on Missing & Exploited Children

    Get PDF
    In October 2005, representatives from 20 countries, the United Nations, European-Union institutions, and the Council of Europe participated in the first-ever U.S./European Summit on Missing and Exploited Children. They discussed, compared, and assessed the effectiveness of: national and international legal instruments enacted to combat child abduction and the sexual exploitation of children;national and supranational initiatives that address the increasingly complex moral, societal, and legal challenges; andcurrent private and non-governmental initiatives and practices that support the protection of children. Specifically, participants sought to provide a common, universally agreed upon definition of the problem of child sexual exploitation

    Emerging Trend of E-Commerce in India: Some Crucial Issues, Prospects and Challenges

    Get PDF
    Since 1991, after economic reforms explicitly took place in India as a result of opening-up of the economy with a view to integrate itself with the global economy, the need to facilitate international trade both through policy and procedure reforms has become the foundation stone of India's trade and fiscal policies. Electronic commerce (e-commerce) as part of the information technology revolution became widely used in the world trade in general and Indian economy in particular. With advancements in technology, there have been changes in the methodology for business transactions. India, being a rapid adaptor of technology is apace with the current scenario of electronic data exchanges and has taken to e-commerce. In view of this, this article tries to present a snapshot of the evolution of e-commerce business indicating the chronological order, category of e-commerce business, description of organizations involved in e-businesses in India, key characteristics of the firms engaged in e-commerce application, to examine the growth of e-commerce in both physical and financial terms, to evaluate the benefits obtained from e-business, to critically analyze the barriers and constraints involved in flourishing e-commerce businesses in India and finally to develop a framework for effective dissemination of e-commerce in India. The role of government  should be to provide a legal framework for e-commerce so that while domestic and international trade are allowed to expand their horizons, basic rights such as privacy, intellectual property, prevention of fraud, consumer protection etc are all taken care of. Key words: E-commerce, India, internet, online

    Rationalizing Online Romance Fraud: In the Eyes of the Offender

    Get PDF
    This study seeks to understand romance scam from the offenders\u27 perspective and how they rationalize their motivations, opportunities and abilities towards the commission of the crime. To this end, we adopt the Motivation-Opportunity-Ability framework and the Rationalization dimension of the Fraud Triangle Theory. The study employed a qualitative methodological approach to analyze the opportunities presented by emerging technologies to cyber fraudsters amid socio-economic drivers. One is the interplay of various socio-economic factors being a major driving force behind the commission of cybercrime. These include peer recruitment and training, poverty, unemployment, low level of education and low income. The uniqueness of this study stems from the fact that it deviates from previous studies to investigate cybercrime from the perspective of the perpetrators. Again, this study is arguably one of the first to put all three dimensions of the MOA framework and the rationalization dimension of the Fraud Triangle to study romance scammers\u27 behaviors

    What if we could travel without passport? First sight to blockchain-based identity management in tourism

    Get PDF
    Blockchain technology, as a distributed digital ledger, enables users to control their credentials without being breached by third parties. From a tourism perspective, it allows tourists to pass through checkpoints and/or bookings without waiting and having to go through third-party transactions. Hence, this paper aims to discuss traditional identity management (IdM) system challenges and what blockchain might offer as a counterpoint to conventional travel experiences within th

    Exploring the Darkverse: A Multi-Perspective Analysis of the Negative Societal Impacts of the Metaverse

    Get PDF
    The Metaverse has the potential to form the next pervasive computing archetype that can transform many aspects of work and life at a societal level. Despite the many forecasted benefits from the metaverse, its negative outcomes have remained relatively unexplored with the majority of views grounded on logical thoughts derived from prior data points linked with similar technologies, somewhat lacking academic and expert perspective. This study responds to the dark side perspectives through informed and multifaceted narratives provided by invited leading academics and experts from diverse disciplinary backgrounds. The metaverse dark side perspectives covered include: technological and consumer vulnerability, privacy, and diminished reality, human–computer interface, identity theft, invasive advertising, misinformation, propaganda, phishing, financial crimes, terrorist activities, abuse, pornography, social inclusion, mental health, sexual harassment and metaverse-triggered unintended consequences. The paper concludes with a synthesis of common themes, formulating propositions, and presenting implications for practice and policy

    Cybersecurity in travel based on the opinions of university students engaging in tourism

    Get PDF
    Cybersecurity is a critical, yet often overlooked aspect of travelling domestically and abroad. Several issues connected with cybersecurity, such as the possibility of network-based attacks while connected to public wireless networks as well as matters connected with physical security of carried devices arise when travelling and are exacerbated with repeated border crossings or stays in several accommodation facilities. This study focuses on gauging the types of security precautions university students take when engaging in tourism and providing recommendations based on the collected data and responses taken from participants of the study. In the investigation, an analysis of source materials was used in conjunction with a diagnostic survey distributed among university students in Poland. In the study, the research hypothesis of “Among the surveyed students, most are at least partially security-conscious, but the majority fail to implement adequate measures of improving data confidentiality and availability on their personal devices while travelling” has been put forward.Cybersecurity is a critical, yet often overlooked aspect of travelling domestically and abroad. Several issues connected with cybersecurity, such as the possibility of network-based attacks while connected to public wireless networks as well as matters connected with physical security of carried devices arise when travelling and are exacerbated with repeated border crossings or stays in several accommodation facilities. This study focuses on gauging the types of security precautions university students take when engaging in tourism and providing recommendations based on the collected data and responses taken from participants of the study. In the investigation, an analysis of source materials was used in conjunction with a diagnostic survey distributed among university students in Poland. In the study, the research hypothesis of “Among the surveyed students, most are at least partially security-conscious, but the majority fail to implement adequate measures of improving data confidentiality and availability on their personal devices while travelling” has been put forward

    Trafficking Without Borders: Why It Is Time for the Law to Properly Address Cybersex Trafficking in the Livestreaming Context

    Get PDF
    This Comment assesses the impact, and growing prevalence, of cybersex trafficking: A relatively novel form of human trafficking conducted via livestream over the internet. In particular, this Comment focuses on the differences between the statutes that criminalize sex trafficking and child pornography and how these statutes operate both domestically and internationally. This Comment argues that the Trafficking Victims Protection Act of 2000 should be amended in order for the modern crime of cybersex trafficking to fall under the statute’s ambit and to aid in prosecution efforts

    Socio-economic and technological new normal in supply chain management : lessons from COVID-19 pandemic

    Get PDF
    Purpose This paper explores the new normal activities and strategic responses of the service industry towards the challenges created by the coronavirus disease 2019 (COVID-19) outbreak and other constructs and validates the measurement scale for socio-economic and technological new normal activities following lockdown and social distancing practices. Design/methodology/approach First, structured interviews with 28 participants helped us generate items and develop survey instruments for cross-sectional data collection in the second phase. So, the authors received 256 complete responses from the top and middle management of the services industry. Exploratory factor analysis helped us explore the factors and reliability of the items. Confirmatory factor analysis aided us in generating and confirming the factorial structure of the constructs. Findings Results indicated that amid COVID-19's pandemic, new normal activities are emerging in which organizations are deploying crisis strategies to safeguard their business and stakeholders. Organizations are re-opening swiftly, focusing on digital transformation, developing digital platforms for ease in working and improved consumer services, to name a few operational changes. Practical implications Discussion on empirical analysis revolves around the guidelines to service industry's managers and top management to improve shortcomings in combating the challenges they face in their operations. Originality/value Prior studies have provided substantial insights on the COVID-19 pandemic, but relatively little research exists on new normal activities in the supply chain network of the service industry. Among other reasons for such less empirical evidence on new normal activities is the unavailability of a comprehensive tool for measuring the socio-economic and technological new normal activities. This paper is a contribution to bridging this knowledge gap.©2022 Emerald Publishing Limited. This manuscript version is made available under the Creative Commons Attribution–NonCommercial 4.0 International (CC BY–NC 4.0) license, https://creativecommons.org/licenses/by-nc/4.0/fi=vertaisarvioitu|en=peerReviewed
    corecore