Search results

1 – 4 of 4
Content available
Book part
Publication date: 9 February 2023

Kristína Medeková, Kristína Pompurová and Ivana Šimočková

Interest in the Electronic Word-of-Mouth (eWOM) in connection with tourism is constantly growing not only among consumers but also among theoreticians. Therefore, the objective of…

Abstract

Interest in the Electronic Word-of-Mouth (eWOM) in connection with tourism is constantly growing not only among consumers but also among theoreticians. Therefore, the objective of this chapter is to provide an overview of studies that focus on eWOM in the tourism sector using the snowball method. The article is based on a review of the literature of 60 studies that focus not only on consumer behavior in tourism and the impact of eWOM on tourism supply but also on the impact of hotel managers' responses to other consumer behavior and tourism companies. The results of the studies show that eWOM has a significant impact not only on consumer behavior but also on tourism supply. Manager responses can also strongly affect other consumer behavior in decision-making. When eWOM is distributed, consumers are influenced by their emotions, motives, and also by the websites to which they have decided to contribute. The chapter proposes further research areas for different authors.

Details

Online Reputation Management in Destination and Hospitality
Type: Book
ISBN: 978-1-80382-376-8

Keywords

Open Access
Book part
Publication date: 1 May 2019

Kaleem Ullah, Irene Lill and Emlyn Witt

Building Information Modeling (BIM) is a revolutionary innovation in the construction industry to virtually design and mange projects throughout the building lifecycle. Although…

Abstract

Purpose

Building Information Modeling (BIM) is a revolutionary innovation in the construction industry to virtually design and mange projects throughout the building lifecycle. Although Estonia is one of the foremost countries in the Information and Communications Technology (ICT) sector, BIM adoption in the Estonian construction industry is still lagging behind other countries. This paper is part of doctoral research that aims to determine the barriers to BIM adoption and develop a framework for effective implementation of BIM in the Estonian construction industry. The purpose of this paper is to examine the status of BIM adoption, BIM benefits and common barriers to BIM adoption in the construction industry worldwide.

Design/Methodology/Approach

The methodology used in this study is a literature review of journal articles, conference proceedings and published reports from various sources.

Findings

This study showed BIM benefits through building lifecycle phases and explored the BIM adoption rate in the construction industry of various countries. Eighteen barriers to BIM adoption were also identified.

Research Limitations/Implications

The study presented is limited to a literature review – some related literature may have been missed.

Practical Implications

The main practical significance of this study is that the findings can be used to inform a further survey to model the barriers to BIM adoption in the Estonian construction industry.

Originality/Value

This study offers information on BIM adoption in the construction industry and will form the basis of further research.

Details

10th Nordic Conference on Construction Economics and Organization
Type: Book
ISBN: 978-1-83867-051-1

Keywords

Book part
Publication date: 15 September 2022

Caner Asbaş and Şule Tuzlukaya

A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change…

Abstract

A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change, disable or eliminate information, or to breach computer information systems, computer networks, and computer infrastructures. Cyberattackers gain a benefit from victims, which may be criminal such as stealing data or money, or political or personal such as revenge. In cyberattacks, various targets are possible. Some potential targets for businesses include business and customer financial data, customer lists, trade secrets, and login credentials.

Cyberattackers use a variety of methods to gain access to data, including malware such as viruses, worms, and spyware and phishing methods, man-in-the-middle attacks, denial-of-service attacks, SQL injection, zero-day exploit, and DNS tunneling.

Related to cyberattack, the term cyberwarfare is gaining popularity nowadays. Cyberwarfare is the use of cyberattacks by a state or an organization to cause harm as in warfare against another state's or organization's computer information systems, networks, and infrastructures.

Military, civil, and ideological motivations, or hacktivism can be used to launch a cyberwarfare. For these reasons, cyberwarfare may be used to conduct espionage, sabotage, propaganda, and economic disruption.

Considering highly digitalized business processes such as e-mails, digital banking, online conference, and digital manufacturing methods, damage of cyberwarfare to businesses and countries are unavoidable. As a result, developing strategies for defending against cyberattacks and cyberwarfare is critical for businesses. The concepts of cyberattack and cyberwarfare, as well as business strategies to be protected against them will be discussed in this chapter.

Details

Conflict Management in Digital Business
Type: Book
ISBN: 978-1-80262-773-2

Keywords

Content available
Book part
Publication date: 31 July 2023

Michael Nizich

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

1 – 4 of 4