15,903 research outputs found

    Progress in information technology and tourism management: 20 years on and 10 years after the Internet—The state of eTourism research

    Get PDF
    This paper reviews the published articles on eTourism in the past 20 years. Using a wide variety of sources, mainly in the tourism literature, this paper comprehensively reviews and analyzes prior studies in the context of Internet applications to Tourism. The paper also projects future developments in eTourism and demonstrates critical changes that will influence the tourism industry structure. A major contribution of this paper is its overview of the research and development efforts that have been endeavoured in the field, and the challenges that tourism researchers are, and will be, facing

    Cyber–Physical–Social Frameworks for Urban Big Data Systems: A Survey

    Get PDF
    The integration of things’ data on the Web and Web linking for things’ description and discovery is leading the way towards smart Cyber–Physical Systems (CPS). The data generated in CPS represents observations gathered by sensor devices about the ambient environment that can be manipulated by computational processes of the cyber world. Alongside this, the growing use of social networks offers near real-time citizen sensing capabilities as a complementary information source. The resulting Cyber–Physical–Social System (CPSS) can help to understand the real world and provide proactive services to users. The nature of CPSS data brings new requirements and challenges to different stages of data manipulation, including identification of data sources, processing and fusion of different types and scales of data. To gain an understanding of the existing methods and techniques which can be useful for a data-oriented CPSS implementation, this paper presents a survey of the existing research and commercial solutions. We define a conceptual framework for a data-oriented CPSS and detail the various solutions for building human–machine intelligence

    South American Expert Roundtable : increasing adaptive governance capacity for coping with unintended side effects of digital transformation

    Get PDF
    This paper presents the main messages of a South American expert roundtable (ERT) on the unintended side effects (unseens) of digital transformation. The input of the ERT comprised 39 propositions from 20 experts representing 11 different perspectives. The two-day ERT discussed the main drivers and challenges as well as vulnerabilities or unseens and provided suggestions for: (i) the mechanisms underlying major unseens; (ii) understanding possible ways in which rebound effects of digital transformation may become the subject of overarching research in three main categories of impact: development factors, society, and individuals; and (iii) a set of potential action domains for transdisciplinary follow-up processes, including a case study in Brazil. A content analysis of the propositions and related mechanisms provided insights in the genesis of unseens by identifying 15 interrelated causal mechanisms related to critical issues/concerns. Additionally, a cluster analysis (CLA) was applied to structure the challenges and critical developments in South America. The discussion elaborated the genesis, dynamics, and impacts of (groups of) unseens such as the digital divide (that affects most countries that are not included in the development of digital business, management, production, etc. tools) or the challenge of restructuring small- and medium-sized enterprises (whose service is digitally substituted by digital devices). We identify specific issues and effects (for most South American countries) such as lack of governmental structure, challenging geographical structures (e.g., inclusion in high-performance transmission power), or the digital readiness of (wide parts) of society. One scientific contribution of the paper is related to the presented methodology that provides insights into the phenomena, the causal chains underlying “wanted/positive” and “unwanted/negative” effects, and the processes and mechanisms of societal changes caused by digitalization

    Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies

    Full text link
    This paper proposes a methodology for designing decision support systems for visualising and mitigating the Internet of Things cyber risks. Digital technologies present new cyber risk in the supply chain which are often not visible to companies participating in the supply chains. This study investigates how the Internet of Things cyber risks can be visualised and mitigated in the process of designing business and supply chain strategies. The emerging DSS methodology present new findings on how digital technologies affect business and supply chain systems. Through epistemological analysis, the article derives with a decision support system for visualising supply chain cyber risk from Internet of Things digital technologies. Such methods do not exist at present and this represents the first attempt to devise a decision support system that would enable practitioners to develop a step by step process for visualising, assessing and mitigating the emerging cyber risk from IoT technologies on shared infrastructure in legacy supply chain systems

    The Future of Cyber-Enabled Influence Operations: Emergent Technologies, Disinformation, and the Destruction of Democracy

    Get PDF
    Nation-states have been embracing online influence campaigns through disinformation at breakneck speeds. Countries such as China and Russia have completely revamped their military doctrine to information-first platforms [1, 2] (Mattis, Peter. (2018). China’s Three Warfares in Perspective. War on the Rocks. Special Series: Ministry of Truth. https://warontherocks.com/2018/01/chinas-three-warfares-perspective/, Cunningham, C. (2020). A Russian Federation Information Warfare Primer. Then Henry M. Jackson School of International Studies. Washington University. https://jsis.washington.edu/news/a-russian-federation-information-war fare-primer/.) to compete with the United States and the West. The Chinese principle of “Three Warfares” and Russian Hybrid Warfare have been used and tested across the spectrum of operations ranging from competition to active conflict. With the COVID19 pandemic limiting most means of face-to-face interpersonal communi-cation, many other nations have transitioned to online tools to influence audiences both domestically and abroad [3] (Strick, B. (2020). COVID-19 Disinformation: Attempted Influence in Disguise. Australian Strategic Policy Institute. International Cyber Policy Center. https://www.aspi.org.au/report/covid-19-disinformation.) to create favorable environments for their geopolitical goals and national objectives. This chapter focuses on the landscape that allows nations like China and Russia to attack democratic institutions and discourse within the United States, the strategies and tactics employed in these campaigns, and the emergent technologies that will enable these nations to gain an advantage with key populations within their spheres of influence or to create a disadvantage to their competitors within their spheres of influence. Advancements in machine learning through generative adversarial networks [4] (Creswell, A; White, T; Dumoulin, V; Arulkumaran, K; Sengupta, B; Bharath, A. (2017) Generative Adversarial Networks: An Overview. IEE-SPM. April 2017. https://arxiv.org/pdf/1710.07035.pdf.) that create deepfakes [5] (Whit-taker, L; Letheren, K; Mulcahy, R. (2021). The Rise of Deepfakes: A Conceptual J. Littell envelope symbolenvelope symbolenvelope symbol Army Cyber Institute at the West Point, United States Military Academy, West Point, NY 10996, USA e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 A.Farhadietal. (eds.), The Great Power Competition Volume 3, https://doi.org/10.1007/978-3-031-04586-8_10 197 198 J. Littell Framework and Research Agenda for Marketing. https://journals.sagepub.com/doi/ abs/10.1177/1839334921999479.) and attention-based transformers [6](https:// arxiv.org/abs/1810.04805.) (Devlin et al., 2018) that create realistic speech patterns and interaction will continue to plague online discussion and information spread, attempting to cause further partisan divisions and decline of U.S. stature on the world stage and democracy as a whole.https://digitalcommons.usmalibrary.org/aci_books/1020/thumbnail.jp

    Network of excellence in internet science: D13.2.1 Internet science – going forward: internet science roadmap (preliminary version)

    No full text

    Big Data and the Internet of Things

    Full text link
    Advances in sensing and computing capabilities are making it possible to embed increasing computing power in small devices. This has enabled the sensing devices not just to passively capture data at very high resolution but also to take sophisticated actions in response. Combined with advances in communication, this is resulting in an ecosystem of highly interconnected devices referred to as the Internet of Things - IoT. In conjunction, the advances in machine learning have allowed building models on this ever increasing amounts of data. Consequently, devices all the way from heavy assets such as aircraft engines to wearables such as health monitors can all now not only generate massive amounts of data but can draw back on aggregate analytics to "improve" their performance over time. Big data analytics has been identified as a key enabler for the IoT. In this chapter, we discuss various avenues of the IoT where big data analytics either is already making a significant impact or is on the cusp of doing so. We also discuss social implications and areas of concern.Comment: 33 pages. draft of upcoming book chapter in Japkowicz and Stefanowski (eds.) Big Data Analysis: New algorithms for a new society, Springer Series on Studies in Big Data, to appea

    Internet of Things and Big Data Analytics for Smart and Connected Communities

    Get PDF
    This paper promotes the concept of smart and connected communities SCC, which is evolving from the concept of smart cities. SCC are envisioned to address synergistically the needs of remembering the past (preservation and revitalization), the needs of living in the present (livability), and the needs of planning for the future (attainability). Therefore, the vision of SCC is to improve livability, preservation, revitalization, and attainability of a community. The goal of building SCC for a community is to live in the present, plan for the future, and remember the past. We argue that Internet of Things (IoT) has the potential to provide a ubiquitous network of connected devices and smart sensors for SCC, and big data analytics has the potential to enable the move from IoT to real-time control desired for SCC. We highlight mobile crowdsensing and cyber-physical cloud computing as two most important IoT technologies in promoting SCC. As a case study, we present TreSight, which integrates IoT and big data analytics for smart tourism and sustainable cultural heritage in the city of Trento, Italy
    corecore