Search results

1 – 10 of 10
Book part
Publication date: 14 October 2019

Katerina Berezina, Olena Ciftci and Cihan Cobanoglu

Purpose: The purpose of this chapter is to review and critically evaluate robots, artificial intelligence and service automation (RAISA) applications in the restaurant industry to…

Abstract

Purpose: The purpose of this chapter is to review and critically evaluate robots, artificial intelligence and service automation (RAISA) applications in the restaurant industry to educate professors, graduate students, and industry professionals.

Design/methodology/approach: This chapter is a survey of applications of RAISA in restaurants. The chapter is based on the review of professional and peer-reviewed academic literature, and the industry insight section was prepared based on a 50-minute interview with Mr. Juan Higueros, Chief Operations Officer of Bear Robotics.

Findings: Various case studies presented in this chapter illustrate numerous possibilities for automation: from automating a specific function to complete automation of the front of the house (e.g., Eatsa) or back of the house (e.g., Spyce robotic kitchen). The restaurant industry has already adopted chatbots; voice-activated and biometric technologies; robots as hosts, food runners, chefs, and bartenders; tableside ordering; conveyors; and robotic food delivery.

Practical implications: The chapter presents professors and students with a detailed overview of RAISA in the restaurant industry that will be useful for educational and research purposes. Restaurant owners and managers may also benefit from reading this chapter as they will learn about the current state of technology and opportunities for RAISA implementation.

Originality/value: To the best of the authors’ knowledge, this chapter presents the first systematic and in-depth review of RAISA technologies in the restaurant industry.

Details

Robots, Artificial Intelligence, and Service Automation in Travel, Tourism and Hospitality
Type: Book
ISBN: 978-1-78756-688-0

Keywords

Book part
Publication date: 12 May 2022

Justin R. Ellis

PurposeThis chapter considers the economic and political relationship between artificial intelligence tools such as facial recognition software and Lesbian, Gay, Bisexual

Abstract

PurposeThis chapter considers the economic and political relationship between artificial intelligence tools such as facial recognition software and Lesbian, Gay, Bisexual, Transgender and Queer (LGBTQ) identity construction and identification. In doing so, the chapter considers the threats and opportunities to diverse LGBTQ identities from algorithmic governance.

Methodology/approachThe author analyzes public discourse on these issues and its relationship to agency for LGBTQ communities. The conceptual approach integrates research into surveillance capitalism and neuroliberalism with “digiqueer” criminology to map the relationship between digital media technologies, institutional legitimacy and negotiations for LGBTQ rights, recognition and resources.

FindingsThe discussion shows that the surveillance capitalist principles of blurred consent and redistributed privacy are underpinned by geopolitical and technological forces that have undermined the legitimacy of governments and big tech companies. LGBTQ community resistance to harms perpetrated through digital media platforms is one positive consequence of the ambiguities of surveillance capitalism, but which also reflects the investment required by such communities to secure basic protections that the general population might take for granted.

Originality/value – Research into the relationship between recognition and redistribution through access to rights granted to different social groups on the basis of sexuality, sexual expression and identity is under-interrogated. This chapter responds to that gap with a focus on the role that digital media technologies can play in securing recognition and redistribution of resources for LGBTQ communities, or the significance of their absence and/or diminution in current contexts.

Details

Diversity in Criminology and Criminal Justice Studies
Type: Book
ISBN: 978-1-80117-001-7

Keywords

Book part
Publication date: 18 March 2020

Peter Grindrod

Abstract

Details

Leading within Digital Worlds
Type: Book
ISBN: 978-1-83909-806-2

Book part
Publication date: 13 June 2013

Li Xiao, Hye-jin Kim and Min Ding

Purpose – The advancement of multimedia technology has spurred the use of multimedia in business practice. The adoption of audio and visual data will accelerate as marketing…

Abstract

Purpose – The advancement of multimedia technology has spurred the use of multimedia in business practice. The adoption of audio and visual data will accelerate as marketing scholars become more aware of the value of audio and visual data and the technologies required to reveal insights into marketing problems. This chapter aims to introduce marketing scholars into this field of research.Design/methodology/approach – This chapter reviews the current technology in audio and visual data analysis and discusses rewarding research opportunities in marketing using these data.Findings – Compared with traditional data like survey and scanner data, audio and visual data provides richer information and is easier to collect. Given these superiority, data availability, feasibility of storage, and increasing computational power, we believe that these data will contribute to better marketing practices with the help of marketing scholars in the near future.Practical implications: The adoption of audio and visual data in marketing practices will help practitioners to get better insights into marketing problems and thus make better decisions.Value/originality – This chapter makes first attempt in the marketing literature to review the current technology in audio and visual data analysis and proposes promising applications of such technology. We hope it will inspire scholars to utilize audio and visual data in marketing research.

Details

Review of Marketing Research
Type: Book
ISBN: 978-1-78190-761-0

Keywords

Abstract

Details

Drones and the Law
Type: Book
ISBN: 978-1-80043-249-9

Book part
Publication date: 13 July 2023

Sabiha Annaç Göv

Digital transformation has created an important framework for the commercial aviation industry. Aviation companies that develop a digital strategy or implement the strategies…

Abstract

Digital transformation has created an important framework for the commercial aviation industry. Aviation companies that develop a digital strategy or implement the strategies successfully are seeing improvements in their overall efficiency, cost, flexibility and security performances with the effect of digitalization. For aviation businesses, digitalization is seen as one of the important conditions of competition. For this reason, many aviation businesses prioritize digital investments and make the major strategic moves necessary to gain a competitive advantage. However, the digitization of aviation businesses cannot be achieved by investing in technology alone. Digital arguments need to be aligned with customer expectations and the goals of the business. The increase in the number of airline companies has caused airline companies to create new strategies that will increase cost efficiency. IATA (International Air Transport Association), which is a member of airline companies and works for the efficiency of commercial air transportation revealed its vision of a ‘Digital Airline’, which represents what an airline can look like in 2025. Digitalization and efficiency, reflections on human resources, digital applications of airlines, benefits of airline companies from digital transformation, airline mobile applications, online check-in and boarding services (self-check-in, kiosk), online travel assistant, digital baggage cards (RFID – radio frequency identification), digital cabin management systems, in-flight entertainment systems, cabin cleaning robots, digital loyalty programmes, a new perspective in aviation education, interactive virtual reality environments, big data technology and applications and disadvantages of digital transformation are evaluated in the chapter.

Details

Two Faces of Digital Transformation
Type: Book
ISBN: 978-1-83753-096-0

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Book part
Publication date: 30 December 2013

Wang Shacheng

In general, the security situation for China’s sports pageants is quite stable, but still China needs to face up to the threats from both traditional and nontraditional security…

Abstract

In general, the security situation for China’s sports pageants is quite stable, but still China needs to face up to the threats from both traditional and nontraditional security areas such as terrorism, separatism, and extremism. Terrorism is the biggest threat to China’s sports pageants. Effective security and defense strategies for the games require reliable intelligence. Reliable intelligence, however, is notoriously difficult to obtain even though we are immersed in vast quantities of information. How can we identify and obtain the useful intelligence from the vast sea of other less useful information? After analyzing the potential terrorism attacks and terrorists in the 2008 Beijing Olympic Games and the 2010 Guangzhou Asian Games, this chapter analyzes the potential means for counterterrorism at the games and tries to set up an intelligence study system based on the Information Galaxy (IG), which includes five parts of Sun (S), Earth (E), Moon (M), Information Sharing Environment (ISE), and IG. The relationships of SEM are just like the Sun, the Earth, and the Moon. All the methods especially need to cooperate in the study of different cases in the IG system until valuable intelligence can be produced from the S, the S-E, the S-E-M, or the S-E-Ms. This chapter does not expect to put forward a complete and careful theoretical system of terrorism and Intelligence-led counterterrorism in China, but it still tries to establish a relatively complete theoretical framework, with a multi-disciplinary perspective of peace science, national defense economics, information science, and computer science, etc.

Details

Cooperation for a Peaceful and Sustainable World Part 2
Type: Book
ISBN: 978-1-78190-655-2

Abstract

Details

Understanding Financial Stability
Type: Book
ISBN: 978-1-78756-834-1

Abstract

Details

Intelligence and State Surveillance in Modern Societies
Type: Book
ISBN: 978-1-78769-171-1

1 – 10 of 10