Search results
1 – 10 of 32Voice command and voice search are becoming increasingly popular in the hospitality and tourism industry, with many hotels and travel companies investing in voice-enabled…
Abstract
Voice command and voice search are becoming increasingly popular in the hospitality and tourism industry, with many hotels and travel companies investing in voice-enabled technology to improve guest experiences and streamline operations. This technology allows travellers to manage their travel plans, request services and get information through natural voice commands on any voice-enabled device. Voice assistants are also multilingual, allowing hotels to customise responses to guests who do not speak the local language. Angie, a multilingual, in-room voice assistant, is an example of this technology. It can fulfil guest requests, answer common questions about the property and create streamlined access to a wide range of hotel amenities, such as ordering room service or requesting extra towels. Hotels can control questions and responses to assist stretched staff and provide upsell and advertising revenue through digital promotions or recommended onsite amenities or discounts. In addition, voice command technology can be used to book travel and find things to do at a destination. Google Assistant can help with travel plans like booking a hotel, checking flight status and finding things to do at a destination. In conclusion, voice command and voice search technology are transforming the hospitality and tourism industry by improving guest experiences, reducing operational costs and increasing revenue.
Details
Keywords
The purpose of this study is to document and analyze the success story of YouTube as a social network site in a competitive market, offering important academic and managerial…
Abstract
Purpose
The purpose of this study is to document and analyze the success story of YouTube as a social network site in a competitive market, offering important academic and managerial implications.
Design/methodology/approach
Historical methods were used for investigation. This study applies the Resource-Advantage theory to identify key events in the history of YouTube from archival documents and evaluates and synthesizes the evidence to recount the channel’s evolution.
Findings
YouTube faced challenges from competitors across various industries since its launch. It has used its global user base and technological skills to develop innovative market offerings for users, contributors and marketers. YouTube built long-term relationships with stakeholders, continuously adapted to external changes and initiated internal alignments to compete in multiple industries. Over time, despite several changes in the competitive landscape, YouTube has grown into a successful media firm, competing across traditional broadcasting, gaming, live TV streaming and SNS industries. It is an exciting tale in the history of social networking.
Originality/value
This study significantly contributes to the marketing history of social network sites and platform-specific scholarship by applying the Resource-Advantage theory to document the evolution of YouTube.
Details
Keywords
Hsing-Hua Chang, Chen-Hsin Lai, Kuen-Liang Lin and Shih-Kuei Lin
Factor investment is booming in global asset management, especially environmental, social, and governance (ESG), dividend yield, and volatility factors. In this chapter, we use…
Abstract
Factor investment is booming in global asset management, especially environmental, social, and governance (ESG), dividend yield, and volatility factors. In this chapter, we use data from the US securities market from 2003 to 2019 to predict dividends and volatility factors through machine learning and historical data–based methods. After that, we utilize particle swarm optimization to construct the Markowitz portfolio with limits on the number of assets and weight restrictions. The empirical results show that that the prediction ability using XGBoost is superior to the historical factor investment method. Moreover, the investment performance of our portfolio with ESG, high-yield, and low-volatility factors outperforms baseline methods, especially the S&P 500 ETF.
Details
Keywords
Mohan Thite and Ramanathan Iyer
Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information…
Abstract
Purpose
Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information technology (IT)-centric solutions to secure and strengthen their information security ecosystem. Unfortunately, they pay little attention to human resource management (HRM) solutions. This paper aims to address this gap and proposes an actionable human resource (HR)-centric and artificial intelligence (AI)-driven framework.
Design/methodology/approach
The paper highlights the dangers posed by insider threats and presents key findings from a Leximancer-based analysis of a rapid literature review on the role, nature and contribution of HRM for information security, especially in addressing insider threats. The study also discusses the limitations of these solutions and proposes an HR-in-the-loop model, driven by AI and machine learning to mitigate these limitations.
Findings
The paper argues that AI promises to offer many HRM-centric opportunities to fortify the information security architecture if used strategically and intelligently. The HR-in-the-loop model can ensure that the human factors are considered when designing information security solutions. By combining AI and machine learning with human expertise, this model can provide an effective and comprehensive approach to addressing insider threats.
Originality/value
The paper fills the research gap on the critical role of HR in securing and strengthening information security. It makes further contribution in identifying the limitations of HRM solutions in info security and how AI and machine learning can be leveraged to address these limitations to some extent.
Details
Keywords
Guy J. Beauduy, Ryan Wright, David Julius Ford, Clifford H. Mack and Marcus Folkes
Many psychological, cultural, and social barriers exist that impact Black male participation in the workforce. In this chapter, authors discuss the impact that mentorship, racism…
Abstract
Many psychological, cultural, and social barriers exist that impact Black male participation in the workforce. In this chapter, authors discuss the impact that mentorship, racism, society, culture, economics, and other pertinent factors have on the career development of Black men. This chapter examines programs and strategies that effectively address the career development needs of Black men. A review of counseling interventions and their applicability to career counseling with Black men are presented. Emerging trends in career development for Black men are also discussed. In addition, provided in this chapter are personal narratives given by the authors who contextualize their career development experiences through culturally-specific career development theoretical frameworks. Lastly, implications for research, counseling, counselor education, and policy, as well as recommendations for professional development are offered.
Details
Keywords
Ali Katouzian Bolourforoush and Hamid Jahankhani
Banking traces back to 2000 BC in Assyria, India and Sumeria. Merchants used to give grain loans to farmers and traders to carry goods between cities. In ancient Greece and Roman…
Abstract
Banking traces back to 2000 BC in Assyria, India and Sumeria. Merchants used to give grain loans to farmers and traders to carry goods between cities. In ancient Greece and Roman Empire, lenders in temples, provided loans, and accepted deposits while performed change of money. The archaeological evidence uncovered in India and China corroborates this. The major development in banking came predominantly in the mediaeval, Renaissance Italy, with the major cities Florence, Venice and Genoa being the financial centres. Technology has become an inherent and integral part of our lives. We are generating a huge amount of data in transfer, storage and usage, with greater demands of ubiquitous accessibility, inducing an enormous impact on industry and society. With the emergence of smarter cities and societies, the security challenges pertinent to data become greater, impending impact on the consumer protection and security. The aim of this chapter is to highlight if SSI and passwordless authentication using FIDO-2 protocol assuage security concerns such as authentication and authorisation while preserving the individual's privacy.
Details
Keywords
Somayya Madakam, Rajeev Kumar Revulagadda, Vinaytosh Mishra and Kaustav Kundu
One of the most hyped concepts in the manufacturing industry is ‘Industry 4.0’. The ‘Industry 4.0’ concept is grabbing the attention of every manufacturing industry across the…
Abstract
One of the most hyped concepts in the manufacturing industry is ‘Industry 4.0’. The ‘Industry 4.0’ concept is grabbing the attention of every manufacturing industry across the globe because of its immense applications. This phenomenon is an advanced version of Industry 3.0, combining manufacturing processes and the latest Internet of Things (IoT) technologies. The main advantage of this paradigm shift is efficiency and efficacy in the manufacturing process with the help of advanced automated technologies. The concept of ‘Industry 4.0’ is contemporary, so it falls under exploratory study. Therefore, the research methodology is thematic narration grounded on secondary data (online) analysis. In this light, this chapter aims to explain ‘Industry 4.0’ in terms of concepts, theories and models based on the Web of Science (WoS) database. The data include research manuscripts, book chapters, blogs, white papers, news items and proceedings. The study details the latest technologies behind the ‘Industry 4.0’ phenomenon, different business intelligence technologies and their practical implications in some manufacturing industries. This chapter mainly elaborates on Industry 4.0 frameworks designed by (1) PwC (2) IBM (3) Frost & Sullivan.
Details
Keywords
Customer-obsessed organizations put customers first, create exceptional value and enhance business performance. This paper aims to offer a framework for implementing the customer…
Abstract
Purpose
Customer-obsessed organizations put customers first, create exceptional value and enhance business performance. This paper aims to offer a framework for implementing the customer obsession construct.
Design/methodology/approach
Using relevant customer value literature, syndicated research and a qualitative analysis, customer obsession insights are offered.
Findings
Customer-obsessed companies know their customers’ needs and engage with them to offer the best solutions. Four customer-centric stages are evaluated, and applications of customer obsession in the Now Economy are discussed.
Research limitations/implications
This analysis of customer obsession is largely conceptual and presents a case study in one metropolitan statistical area. Although the findings are insightful, it may not be representative of the US or global health-care market.
Practical implications
Strategic implications relate to a bias for action, types of business obsessions, values alignment and benchmarking. This paper features an in-depth case study on Baptist Health South Florida which assesses customer obsession using a customer value framework.
Originality/value
Customer obsession is a strategic mindset built upon strong leadership, a sound business culture and superior value. While critical to business success, there has been limited scholarly work in this area. This paper fills that gap by providing a managerial approach for understanding this key business priority.
Details