The widespread adoption of digital technologies in tourism has transformed the data privacy landscape, necessitating stronger safeguards. This study examines the evolving research environment of digital privacy in tourism management, focusing on publication trends, collaborative networks, and social contract theory. A mixed-methods approach was employed, combining bibliometric analysis, social contract theory, and qualitative content analysis. Data from 2004 to 2023 were analyzed using network visualization tools to identify key researchers and trends. The study highlights a significant increase in academic attention after 2015, reflecting the industry's growing recognition of digital privacy as crucial. Social contract theory provided a framework emphasizing transparency, consent, and accountability. The study also examined high-impact articles and the role of publishers like Elsevier and Wiley. The findings offer practical insights for policymakers, industry leaders, and researchers, advocating for ongoing collaboration to address privacy challenges in tourism.
The rapid expansion of smart cities has led to the widespread deployment of Internet of Things (IoT) devices for real-time data collection and urban optimization. However, these interconnected systems face critical cybersecurity risks, including data tampering, unauthorized access, and privacy breaches. This paper proposes a blockchain-based framework designed to enhance the security, integrity, and resilience of IoT data in smart city environments. Leveraging a private blockchain, the system ensures decentralized, tamper-proof data storage, and transaction verification through digital signatures and a lightweight Proof of Work consensus mechanism. Smart contracts are employed to automate access control and respond to anomalies in real time. A Python-based simulation demonstrates the framework’s effectiveness in securing IoT communications. The system supports rapid transaction validation with minimal latency and enables timely detection of anomalous patterns through integrated machine learning. Evaluations show that the framework maintains consistent performance across diverse smart city components such as transportation, healthcare, and building security. These results highlight the potential of the proposed solution to enable secure, scalable, and real-time IoT ecosystems for modern urban infrastructures.
The purpose of this study is to investigate the relationship between the use of business intelligence applications in accounting, particularly in invoice handling, and the resultant disruption and technical challenges. Traditionally a manual process, accounting has fundamentally changed with the incorporation of BI technology that automates processes and allows for sophisticated data analysis. This study addresses the lack of understanding about the strategic implications and nuances of implementation. Data was collected from 467 accounting stakeholder surveys and analyzed quantitatively using correlational analysis. Multiple regression was utilized to investigate the effect of BI adoption, technical sophistication on operational and organizational performance enhancements. The results show a weak association between the use of BI tools and operational enhancements, indicating that the time for processing invoices has decreased. Challenges due to information privacy and bias were significant and negative on both operational and organizational performance. This study suggests that a successful implementation of a BI technology requires an integrated plan that focuses on strategic management, organizational learning, and sound policies This paper informs practitioners of how accounting is being transformed in the digital age, motivating accountants and policy makers to better understand accounting as it evolves with technology and for businesses to invest in concomitant advances.
An unprecedented demand for accurate information and action moved the industry toward RegTech where computing, big data, and social and mobile technologies could help achieve the demand. With the introduction and adoption of RegTech, regulatory changes were introduced in some countries. Enhanced regulatory changes to ease the barriers to market entry, data protection, and payment systems were also introduced to ensure a smooth transition into RegTech. However, regulatory changes fell short of comprehensiveness to address all the issues related to RegTech’s operation. This article is an attempt to devise a Privacy Model for RegTech so industries and regulators can protect the interests of various stakeholders. This model comprises four variables, and each variable consists of many items. The four variables are data protection, accountability, transparency, and organizational design. It is expected that the adoption of this Privacy Model will help industries and regulators embrace standards while being innovative in the development and use of RegTech.
A smart city focuses on enhancing and interconnecting facilities and services through digital technology to offer convenient services for both people and businesses. The basic infrastructure of smart cities consists of modern technologies such as the Internet of Things (IoT), cloud computing and artificial intelligence. These urban areas utilize different networks, such as the Internet and IoT, to share real-time information, improving convenience for the inhabitants. However, the reliance of smart cities on modern technologies exposes them to a range of organized, diverse, and sophisticated cyber threats. Therefore, prioritizing cybersecurity awareness and implementing appropriate measures and solutions are essential to protect the privacy and security of citizens. This study aims to identify cyber threats and their impact on smart cities, as well as the methods and measures required for key areas such as smart government, smart healthcare, smart mobility, smart environment, smart economy, smart living, and smart people. Furthermore, this study seeks to evaluate previous research in this field, establish necessary policies to mitigate these threats, and propose an appropriate model for the infrastructure associated with IT networks in smart cities.
In today’s digital education landscape, safeguarding the privacy and security of educational data, particularly the distribution of grades, is paramount. This research presents the “secure grade distribution scheme (SGDS)”, a comprehensive solution designed to address critical aspects of key management, encryption, secure communication, and data privacy. The scheme’s heart lies in its careful key management strategy, offering a structured approach to key generation, rotation, and secure storage. Hardware security modules (HSMs) are central to fortifying encryption keys and ensuring the highest security standards. The advanced encryption standard (AES) is employed to encrypt graded data, guaranteeing the confidentiality and integrity of information during transmission and storage. The scheme integrates the Diffie-Hellman key exchange protocol to establish secure communication, enabling users to securely exchange encryption keys without vulnerability to eavesdropping or interception. Secure communication channels further fortify graded data protection, ensuring data integrity in transit. The research findings underscore the SGDS’s efficacy in achieving the goals of secure grade distribution and data privacy. The scheme provides a holistic approach to safeguarding educational data, ensuring the confidentiality of sensitive information, and protecting against unauthorized access. Future research opportunities may centre on enhancing the scheme’s robustness and scalability in diverse educational settings.
Copyright © by EnPress Publisher. All rights reserved.