Search results
1 – 8 of 8Alkmini Gkritzali, Eleni Mavragani and Dimitris Gritzalis
The purpose of this paper is to examine the impact of microblogging word of mouth (MWOM) through twitter on value co-destruction for Athens, as a tourism destination facing a…
Abstract
Purpose
The purpose of this paper is to examine the impact of microblogging word of mouth (MWOM) through twitter on value co-destruction for Athens, as a tourism destination facing a sustained crisis. The study demonstrates the sentiment and sharing evolution of tweets, illustrating the value co-destruction of a tourism destination. Overall, the study expands understanding on the online footprints of MWOM in the field of tourism.
Design/methodology/approach
It uses social media focused data mining and sentiment analysis, to analyze more than 90,000 tweets posted by top twitter influencers between 2013 and 2015. The methodology that the authors have adopted follows seven steps: first, identification of the top-5 twitter influencers who use the hashtag #Athens, based on their klout score; second, collection of tweets from the top-5 twitter influencers, for the period from January 2013 until June 2015; third, collection of the retweets metadata of the above tweets and of the corresponding retweeter accounts (i.e. user id, name, screen name), together with the frequency of retweeting per tweet; fourth, collection of user metadata (i.e. location and number of followers) from the retweeter accounts; fifth, influence computation of retweetwers using their klout score; sixth, tweets classification based on the klout score of their retweeters; and seventh, sentiment analysis of the collected tweets.
Findings
The findings show the high potential of value co-destruction in virtual environments, through negative MWOM related to tourism destinations in crisis, and shared among highly influencing users, that disseminate negative stories through microblogging. The findings also reveal the existence of negativity bias that can reduce the risks of visiting a new destination facing a crisis and, at the same time, significantly destroy the destination’s value.
Originality/value
This is the first study to examine the impact of MWOM through twitter on a tourism destination facing a sustained crisis, such as Athens. This study uses social media focused data mining and sentiment analysis, to analyze more than 90,000 tweets posted by top twitter influencers between 2013 and 2015. The findings reveal the existence of negativity bias that can reduce the risks of visiting a new destination facing a crisis and, at the same time, significantly destroy the destination’s value.
Details
Keywords
Stefanos Gritzalis and Dimitris Gritzalis
Traditional business practice depends on trust relations between the transacting parties. One of the most important aspects of this trust is the quality of the offered services or…
Abstract
Traditional business practice depends on trust relations between the transacting parties. One of the most important aspects of this trust is the quality of the offered services or products. The Web currently constitutes an enabler for electronic commerce, providing a global transaction platform that does not require physical presence. However, transferring trust from the physical world to the electronic one is a process that requires a trust infrastructure. The current infrastructure, based on trusted third parties can be enhanced. We introduce the notion of digital seals and provide a mechanism for transferring the trust placed by users in companies in the physical world, to the electronic one.
Details
Keywords
A considerable research stream in information systems security has elaborated several propositions as to how privacy and anonymity can be protected, the most prominent of which…
Abstract
A considerable research stream in information systems security has elaborated several propositions as to how privacy and anonymity can be protected, the most prominent of which make use of encryption and digital signing. Since privacy protection is a persistent topic in most electronically performed activities, the icreasing popularity of Internet has driven researchers to approach privacy protection in a holistic way. As a result, privacy‐enhancing technologies have been put forth, aiming at protecting users against privacy and anonymity threats and vulnerabilities. Nowadays, that privacy protection has to be incorporated in most IT applications is one of the least controversial statements. This paper describes Privacy Protector, a technological means for enhancing privacy in an IT application development process. Privacy Protector comprises of a set of software services that have been built upon generic, privacy‐focused user requirements. The paper also describes an API that can be used for incorporating Privacy Protector in the development framework of an IT application.
Details
Keywords
Kosmas Pipyros, Lilian Mitrou, Dimitris Gritzalis and Theodoros Apostolopoulos
The increasing number of cyber attacks has transformed the “cyberspace” into a “battlefield”, bringing out “cyber warfare” as the “fifth dimension of war” and emphasizing the…
Abstract
Purpose
The increasing number of cyber attacks has transformed the “cyberspace” into a “battlefield”, bringing out “cyber warfare” as the “fifth dimension of war” and emphasizing the States’ need to effectively protect themselves against these attacks. The existing legal framework seem inadequate to deal effectively with cyber operations and, from a strictly legal standpoint, it indicates that addressing cyber attacks does not fall within the jurisdiction of just one legal branch. This is mainly because of the fact that the concept of cyber warfare itself is open to many different interpretations, ranging from cyber operations performed by the States within the context of armed conflict, under International Humanitarian Law, to illicit activities of all kinds performed by non-State actors including cybercriminals and terrorist groups. The paper initially presents major cyber-attack incidents and their impact on the States. On this basis, it examines the existing legal framework at the European and international levels. Furthermore, it approaches “cyber warfare” from the perspective of international law and focuses on two major issues relating to cyber operations, i.e. “jurisdiction” and “attribution”. The multi-layered process of attribution in combination with a variety of jurisdictional bases in international law makes the successful tackling of cyber attacks difficult. The paper aims to identify technical, legal and, last but not least, political difficulties and emphasize the complexity in applying international law rules in cyber operations.
Design/methodology/approach
The paper focuses on the globalization of the “cyber warfare phenomenon” by observing its evolutionary process from the early stages of its appearance until today. It examines the scope, duration and intensity of major cyber-attacks throughout the years in relation to the reactions of the States that were the victims. Having this as the base of discussion, it expands further by exemplifying “cyber warfare” from the perspective of the existing European and International legal framework. The main aim of this part is to identify and analyze major obstacles that arise, for instance in terms of “jurisdiction” and “attribution” in applying international law rules to “cyber warfare”.
Findings
The absence of a widely accepted legal framework to regulate jurisdictional issues of cyber warfare and the technical difficulties in identifying, with absolute certainty, the perpetrators of an attack, make the successful tackling of cyber attacks difficult.
Originality/value
The paper fulfills the need to identify difficulties in applying international law rules in cyber warfare and constitutes the basis for the creation of a method that will attempt to categorize and rank cyber operations in terms of their intensity and seriousness.
Details
Keywords
Kate Pangbourne, Dominic Stead, Miloš Mladenović and Dimitris Milakis
This chapter provides a reflective critique of Mobility as a Service (MaaS), an emerging development seeking a role within the Smart Mobility paradigm. We assess a range of its…
Abstract
This chapter provides a reflective critique of Mobility as a Service (MaaS), an emerging development seeking a role within the Smart Mobility paradigm. We assess a range of its future implications for urban policymakers in terms of governance and sustainability (i.e., social and environmental impacts). We begin by describing the origins of the MaaS concept, along with the features of precursor technologies and current early examples. We then reflect on the marketing of MaaS and use it to consider how we might anticipate some potentially less desirable aspects of the promoted business models. Finally, we discuss the implications for governance.
Details
Keywords
Dimitris Mitropoulos, Vassilios Karakoidas, Panagiotis Louridas and Diomidis Spinellis
The purpose of this paper is to propose a generic approach that prevents a specific class of code injection attacks (CIAs) in a novel way.
Abstract
Purpose
The purpose of this paper is to propose a generic approach that prevents a specific class of code injection attacks (CIAs) in a novel way.
Design/methodology/approach
To defend against CIAs this approach involves detecting attacks by using location‐specific signatures to validate code statements. The signatures are unique identifiers that represent specific characteristics of a statement's execution. The key property that differentiates the scheme presented in this paper is that these characteristics do not depend entirely on the code statement, but also take into account elements from its execution context.
Findings
The approach was applied successfully to defend against attacks targeting structured query language (SQL), XML Path Language and JavaScript with positive results.
Originality/value
Despite many countermeasures that have been proposed the number of CIAs has been increasing. Malicious users seem to find new ways to introduce compromised embedded executable code to applications by using a variety of languages and techniques. Hence, a generic approach that defends against such attacks would be a useful countermeasure. This approach can defend attacks that involve both domain‐specific languages (e.g. SQL) and general purpose languages (e.g. JavaScript) and can be used both against client‐side and server‐side attacks.
Details
Keywords
Christos Skourlas, Anastasios Tsolakidis, Petros Belsis, Dimitris Vassis, Argyrw Kampouraki, Panos Kakoulidis and Georgios A. Giannakopoulos
Institutional repositories (IR) are usually used to archive and manage digital collections including research results, educational material, etc. Learning management systems (LMS…
Abstract
Purpose
Institutional repositories (IR) are usually used to archive and manage digital collections including research results, educational material, etc. Learning management systems (LMS) form a popular basis for e-learning and blended learning. This paper aims to study how to integrate IR and LMS to support accessibility of disabled students and students with learning difficulties (dyslexic students) in higher education. Customised ontologies focusing on disabled students can be used to facilitate indexing, and access of items in the repository.
Design/methodology/approach
The authors propose a simple methodological approach to establish an integrating system for supporting accessibility. First, the authors review research works related to adaptive learning environments (ALEs) and blended learning, and discuss issues of the interoperability of IR and LMS. Then, based on the review, the authors discuss the use of an integrated ALE for supporting disabled students in the domain of higher technological education. The integrated system is based on IR, LMS and assistive and adaptive technology. The open source software platform DSpace is used to build up the repository applications Use of the web ontology language (OWL) ontologies is also proposed for indexing and accessing the various, heterogeneous items stored in the repository. Various open source LMS (e.g. openeclass) could be used to build up the integrated system. Finally, the authors describe experimentation with a prototype implemented to provide the mentioned capabilities.
Findings
The technology is mature enough for building up integrated systems, combining capabilities of IR and LMS, for supporting disabled students. The use of ontologies focused on disabled students could facilitate the use of such integrated systems. Customisation and operation of a platform, for the selection and use of portions of OWL ontologies, could be based on the open source software Protégé. Such a platform forms a basis to create an appropriate ontology suitable for specific domains, e.g. the domain of technological education. Finally, the authors argue that the combined use of the OWL platform and the DSpace repository with open source LMS platforms could support domain experts for creating customised ontologies and facilitating searching.
Originality/value
A new perception of the term integrated system for supporting disabled students in the higher education context is presented. This perception tries to combine the IR technology that supports the self-archiving approach of information, open LMS technology and the user-centred approach to support students and manage the “life of information”.
Details
Keywords
Bingcheng Liu, Junyou Song and Wei Geng
This study aims to enhance an enterprise’s private cloud services by optimally determining the ownership of cloud computing resources and responsibility for maintenance and…
Abstract
Purpose
This study aims to enhance an enterprise’s private cloud services by optimally determining the ownership of cloud computing resources and responsibility for maintenance and operations. The core objective is to identify the most cost-effective private cloud deployment model at the intersection of technology and business considerations.
Design/methodology/approach
This study evaluates three ownership and responsibility models, each encompassing decisions related to candidate data center locations, resource provisioning, and demand placements. Drawing from the cloud computing literature, these models are referred to as deployment models. The research formulates a private cloud deployment model selection problem and introduces an established Lagrangian-relaxation-based optimization approach, combined with a novel greedy relieving-pooling heuristic, to facilitate model selection.
Findings
This study identifies the optimal deployment model for a representative instance using real test-bed data from the US, demonstrating the private cloud deployment model selection problem. Various numerical examples are analyzed to explore the influence of environmental parameters. Generally, the virtual PC model is optimal for low demand arrival rates and resource requirements, while the on-premises PC model is preferable for higher values of these parameters. Additionally, the virtual PC model is found to be optimal when enroute latency coefficients are large.
Originality/value
This study contributes to the literature by formulating an optimization problem that integrates performance, financial, and assurance metrics for enterprises. The introduction of a solution approach enables enterprises to make informed decisions regarding ownership and responsibility design. The study effectively bridges the gap between academic research and industry demands from a business perspective.
Details