Robots in tourism: A research agenda for tourism economics

S Ivanov, C Webster - Tourism Economics, 2020 - journals.sagepub.com
The technological advances in artificial intelligence and robotics allow the massive
introduction of service robots by travel, tourism and hospitality companies. While research …

Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments

AB Garba, J Armarego, D Murray… - Journal of Information …, 2015 - Taylor & Francis
With increasing development and adoption of information and communication technology
initiatives internationally, evolving trends such as bring your own device (BYOD) is rapidly …

Advanced social engineering attacks

K Krombholz, H Hobel, M Huber, E Weippl - Journal of Information Security …, 2015 - Elsevier
Social engineering has emerged as a serious threat in virtual communities and is an
effective means to attack information systems. The services used by today's knowledge …

Review of security and privacy for the Internet of Medical Things (IoMT)

G Hatzivasilis, O Soultatos, S Ioannidis… - … computing in sensor …, 2019 - ieeexplore.ieee.org
Day-by-day modern circular economy (CE) models gain ground and penetrate the traditional
business sectors. The Internet of Medical Things (IoMT) is the main enabler for this interplay …

Beyond the organizational 'container': Conceptualizing 21st century sociotechnical work

S Winter, N Berente, J Howison, B Butler - Information and Organization, 2014 - Elsevier
The sociotechnical systems (STS) approach provides a framework that is well suited to
grappling with many issues of work in organizations. By conceiving of work systems as …

Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach

D Dang-Pham, S Pittayachawan - Computers & Security, 2015 - Elsevier
Malware have been regarded as a persistent threat to both individuals and organisations
due to its wide spread via various means of infection. With the increasing use of personal …

BYOD security engineering: A framework and its analysis

N Zahadat, P Blessner, T Blackburn, BA Olson - Computers & Security, 2015 - Elsevier
With the rapid increase of smartphones and tablets, security concerns have also been on the
rise. Employees find it desirable to use personal mobile devices for their work and make no …

Cloud computing: History and overview

J Surbiryala, C Rong - 2019 IEEE Cloud Summit, 2019 - ieeexplore.ieee.org
Cloud computing has emerged as a new technology and business paradigm in the last
couple of years. Cloud computing platforms provide easy access, scalability, reliability …

Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination

Z Tu, O Turel, Y Yuan, N Archer - Information & Management, 2015 - Elsevier
The loss and theft of mobile devices is a growing risk that has yet to be addressed in detail
by the IS community. This study extends the literature significantly by examining the roles of …

You are what you broadcast: Identification of mobile and {IoT} devices from (public){WiFi}

L Yu, B Luo, J Ma, Z Zhou, Q Liu - 29th USENIX security symposium …, 2020 - usenix.org
With the rapid growth of mobile devices and WiFi hotspots, security risks arise. In practice, it
is critical for administrators of corporate and public wireless networks to identify the type …