3,833 research outputs found

    Benefits of Location-Based Access Control:A Literature Study

    Get PDF
    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, \ud attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been investigated thoroughly. To this end, we perform a structured literature review, and examine the goals that LBAC can potentially fulfill, \ud the specific LBAC systems that realize these goals and the context on which LBAC depends. Our paper has four main contributions:\ud first we propose a theoretical framework for LBAC evaluation, based on goals, systems and context. Second, we formulate and apply criteria for evaluating the usefulness of an LBAC system. Third, we identify four usage scenarios for LBAC: open areas and systems, hospitals, enterprises, and finally data centers and military facilities. Fourth, we propose directions for future research:\ud (i) assessing the tradeoffs between location-based, physical and logical access control, (ii) improving the transparency of LBAC decision making, and \ud (iii) formulating design criteria for facilities and working environments for optimal LBAC usage

    Segmenting travelers based on responses to nudging for information disclosure

    Get PDF
    Digital technologies shape travel environments. Noticing online privacy issues, consumers can hold distinct attitudes towards disclosing personal information to service providers. We conducted a panel survey to gauge travelers’ willingness to share personal information with service providers, provided with different types of nudges. Based on the results of clustering analysis, two segments were identified: travelers who are reasonably willing to share (Privacy Rationalists) and those who are reluctant to share (Privacy Pessimists). This study provides empirical evidence of privacy segmentations in the travel context, which has not been reported before and thus deserves more attention from both researchers and practitioners

    A Broader View of Perceived Risk during Internet Transactions

    Get PDF
    Ubiquitous networking facilitates Internet access across multiple network environments, whose value is tied directly to user perceptions of its ability to securely execute transactions. Prior research has cited awareness, trust, and risk as critical determinants of adoption but has failed to examine these factors as they relate to infrastructure and its provider. Because information in transit is at risk from a network environment’s vulnerabilities, we focus on the implications of such risk on Internet activities. We examine the multiple parties that must be trusted to complete and facilitate an online transaction. We propose that the user must trust not only the information recipient to act benevolently but also the technologies and organizations that facilitate the online exchange

    Examining the RV Travelers\u27 Camping Experience: A Social Media Approach

    Get PDF
    The aim of this study was to analyze RV travelers\u27 experience posted on campground online review websites. The study contributes to the relevant literature by understanding what influences the campground experience. Findings were categorized by six themes: campground attributes, campsite attributes, outdoor activities, surrounding area, campground policies, and staff. Findings also depicted major topic areas revealed in the reviewed postings. Implications were outlined for the campground owner/operator and future RV traveler as a result of this study

    Privacy Concerns Regarding the Use of Biometrics in Trusted Traveler Programs

    Get PDF
    One of the objectives of the U.S. government is to balance the individual’s right to privacy and national security interests. Trusted Traveler programs create a risk-based security model where the traveling public is categorized into low or high risk. There are, however, some privacy concerns related to the acceptance of the use of biometric technology in the adoption of expedited security screening procedures in commercial airports. The theoretical construct of this case study of the TSA Pre-Check Program is based on Ajzen and Fischbein’s theory of reasoned action, specifically through Davis’ technology acceptance model. The purpose of this case study was to explore the perceptions of the traveling public regarding the protection of privacy and the use of biometric technologies. Data for this study included 325 social media postings, 50 privacy complaints reported to the Department of Homeland Security between 2009 and 2014, and publicly available data from the Government Accountability Office about expedited screening for the years 2011 – 2014. Data were coded into a priori themes and then subjected to a content analysis procedure. Findings indicate that the traveling public generally support expedited security screening and consent to waiving certain privacy rights in order to facilitate expedited screening. Complaints from travelers were also primarily related to wait times and secondary screening, and not privacy concerns. The positive social change implications stemming from this study include recommendations to the TSA to expand the Trusted Traveler programs such that the primary concern of the traveling public, reduction of wait time is balanced against privacy concerns about the collection of biometric data as part of a measured response to aviation security

    BETWEEN FOOTPRINTS: BALANCING ENVIRONMENTAL SUSTAINABILITY AND PRIVACY IN SMART TOURISM DESTINATIONS

    Get PDF
    Data lies at the core of all smart tourism activities as tourists engage in different and personalized touristic services whilst the pre/during/post traveling or in holidays. From these interactions, a digital data trail is seamlessly captured in a technology embedded environment, and then mined and harnessed in the context of STD - Smart Tourist Destinations to create enriched, high-value experiences, namely those related to eco-responsibility, as well as granting destinations with competitive advantages. At the same time, these technologies enable tourism destinations for an optimization of the use natural resources and energy, as well as for the preservation of natural spaces, in short, reducing the “ecological footprint” of tourism. However, this comes with a cost, an increased “data footprint”. Therefore, the perceived enjoyment of experiences must be considered within the legal framework of Privacy and Data Protection by exposing inherent risks, analysing the available answers given by the GDPR – the General Data Protection Regulation of the European Union. Hence the purpose of this paper is i. to singularize the specificities of Smart Tourism Destinations; ii. to show how the principles of personal data protection, as set forth by the GDPR, are allocated within the STD realm; iii. and, finally, to derive potential legal implications of this ecosystem. Our approach is based on a legal analysis engaged in scholarship research. We have mostly denoted the underestimation of the legal implications of technology-enhanced tourism experiences, and the marginalization of both informed involvement and awareness by the individual in these processes. This study is novel in having undertaken an initial exploration of the legal implications of experiences taking place by STD.Los datos estĂĄn en la base misma de todas las actividades turĂ­sticas inteligentes ya que los turistas se quedan inmersos en servicios distintos y personalizados antes/durante/despuĂ©s de los viajes o de las vacaciones.  De estas interacciones, un rastro es obtenido de un modo imperceptible a travĂ©s de un medioambiente embutido en tecnologĂ­a, el cual es a continuaciĂłn extraĂ­do y almacenado en el contexto de los DTI - Destinos TurĂ­sticos Inteligentes para crear experiencias valiosas, señaladamente las relacionadas con la eco-responsabilidad, y bien asĂ­ proporcionando ventajas competitivas a eses destinos. Asimismo, estas tecnologĂ­as permiten a los destinos turĂ­sticos una optimizaciĂłn del uso de los recursos naturales y de la energĂ­a, ademĂĄs de la preservaciĂłn de los espacios naturales, en sĂ­ntesis, reducen la “huella ecolĂłgica” del turismo. Sin embargo, esto tiene un coste, el incremento de la “huella de los datos”. Por ello, el disfrute apercibido de experiencias tendrĂĄ de ser tenido en cuenta en el marco normativo del RGPD – Reglamento General sobre ProtecciĂłn de Datos de la UniĂłn Europea. Por ende, los objetivos de este artĂ­culo son los siguientes: i. identificar las especificidades de los Destinos TurĂ­sticos Inteligentes; ii. enseñar como los principios de la protecciĂłn de datos, tal como estĂĄn en el RGPD, son relevantes para los DTI; iii, en Ășltimo lugar, evaluar las consecuencias jurĂ­dicas potenciales de este ecosistema. Nuestro enfoque se basa en un anĂĄlisis jurĂ­dico de naturaleza acadĂ©mica. En especial, buscamos poner en evidencia como las implicaciones jurĂ­dicas de las experiencias turĂ­sticas reforzadas por las tecnologĂ­as han sido subestimadas, al igual que la participaciĂłn informada y consciente de las personas en estos procesos. Este estudio es novedoso al haber emprendido una exploraciĂłn inicial de las implicaciones jurĂ­dicas que resultan de experiencias que ocurren en los DTI.Os dados estĂŁo na base de todas as atividades turĂ­sticas inteligentes pois os turistas ficam envolvidos em serviços diferentes e personalizados antes/durante/depois das viagens ou das fĂ©rias. Para estas interaçÔes, um rastro de dados Ă© imperceptivelmente obtido por um meio ambiente embebido em tecnologia, sendo depois minerado e armazenado no contexto de Destinos TurĂ­sticos Inteligentes para criar experiĂȘncias valiosas, designadamente relacionadas com a eco-responsabilidade, assim como facultando vantagens competitivas a tais destinos. Ao mesmo tempo, estas tecnologias permitem aos destinos turĂ­sticos uma otimização do uso de recursos naturais e da energia, assim como a preservação dos espaços naturais, em sĂ­ntese, reduzindo a “pegada ecolĂłgica” do turismo. PorĂ©m, isto ocorre com um custo, o de uma “pegada de dados” acrescida. Consequentemente, a fruição apercebida de experiĂȘncias tem de ser considerada no contexto normativo da Privacidade e da Proteção de Dados proteção de dados expondo os riscos potencias relacionados que lhe sĂŁo inerentes, analisando as respostas das pelo RGPD - Regulamento Geral sobre Proteção de Dados da UniĂŁo Europeia. Assim, os objetivos do artigo sĂŁo os seguintes: i. identificar as especificidades dos Destinos TurĂ­sticos Inteligentes; ii. mostrar como os princĂ­pios da proteção de dados, tal como constam do RGPD, sĂŁo relevantes para os DTI; iii, finalmente, avaliar as consequĂȘncias jurĂ­dicas potenciais deste ecossistema. A nossa perspectiva assenta numa anĂĄlise jurĂ­dica de natureza acadĂ©mica. Sobretudo, procuramos mostrar como as implicaçÔes jurĂ­dicas das experiĂȘncias turĂ­sticas reforçadas pelas tecnologias tĂȘm sido subestimadas, tal como o envolvimento informado e consciente das pessoas nestes processos. Este estudo Ă© novo ao ter empreendido uma exploração inicial das implicaçÔes jurĂ­dicas que resultam das experiĂȘncias que tĂȘm lugar nos DTI

    Issues Related to the Emergence of the Information Superhighway and California Societal Changes, IISTPS Report 96-4

    Get PDF
    The Norman Y. Mineta International Institute for Surface Transportation Policy Studies (IISTPS) at San JosĂ© State University (SJSU) conducted this project to review the continuing development of the Internet and the Information Superhighway. Emphasis was placed on an examination of the impact on commuting and working patterns in California, and an analysis of how public transportation agencies, including Caltrans, might take advantage of the new communications technologies. The document reviews the technology underlying the current Internet “structure” and examines anticipated developments. It is important to note that much of the research for this limited-scope project was conducted during 1995, and the topic is so rapidly evolving that some information is almost automatically “dated.” The report also examines how transportation agencies are basically similar in structure and function to other business entities, and how they can continue to utilize the emerging technologies to improve internal and external communications. As part of a detailed discussion of specific transportation agency functions, it is noted that the concept of a “Roundtable Forum,” growing out of developments in Concurrent Engineering, can provide an opportunity for representatives from multiple jurisdictions to utilize the Internet for more coordinated decision-making. The report also included an extensive analysis of demographic trends in California in recent years, such as commute and recreational activities, and identifies how the emerging technologies may impact future changes

    Smart Cities for Real People

    Get PDF
    Accelerating urbanization of the population and the emergence of new smart sensors (the Internet of Things) are combining in the phenomenon of the smart city. This movement is leading to improved quality of life and public safety, helping cities to enjoy economies that help remedy some budget overruns, better health care, and is resulting in increased productivity. The following report summarizes evolving digital technology trends, including smart phone applications, mapping software, big data and sensor miniaturization and broadband networking, that combine to create a technology toolkit available to smart city developers, managers and citizens. As noted above, the benefits of the smart city are already evident in some key areas as the technology sees actual implementation, 30 years after the creation of the broadband cable modem. The challenges of urbanization require urgent action and intelligent strategies. The applications and tools that truly benefit the people who live in cities will depend not on just the tools, but their intelligent application given current systemic obstacles, some of which are highlighted in the article. Of course, all the emerging technologies mentioned are dependent on ubiquitous, economical, reliable, safe and secure networks (wired and wireless) and network service providers

    Information Technology Applications in Hospitality and Tourism: A Review of Publications from 2005 to 2007

    Get PDF
    The tourism and hospitality industries have widely adopted information technology (IT) to reduce costs, enhance operational efficiency, and most importantly to improve service quality and customer experience. This article offers a comprehensive review of articles that were published in 57 tourism and hospitality research journals from 2005 to 2007. Grouping the findings into the categories of consumers, technologies, and suppliers, the article sheds light on the evolution of IT applications in the tourism and hospitality industries. The article demonstrates that IT is increasingly becoming critical for the competitive operations of the tourism and hospitality organizations as well as for managing the distribution and marketing of organizations on a global scale
    • 

    corecore