Role-Based Access Control Models
Computer
Communications of the ACM - The Blogosphere
Rule support for role-based access control
Proceedings of the tenth ACM symposium on Access control models and technologies
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Web 2.0 and beyond: implications for electronic commerce
Proceedings of the 10th international conference on Electronic commerce
Tourism, Peer Production, and Location-Based Service Design
SCC '08 Proceedings of the 2008 IEEE International Conference on Services Computing - Volume 2
Hi-index | 0.00 |
In this work we look at the impact of information technologies in tourism SMEs and how they can benefit from the exploitation of information technology in their operations without violating privacy, with a special focus in hotel sector. We discuss how current technologies have shaped the new era of tourism and we discuss the travel 2.0 challenges, the transformation that the Web 2.0 and social networking brought to tourism sector, their applications to the domains such as the wikitravel, travel blogs, social networking communities, as well as the underlying technologies for these applications. More specifically, we discuss how the use of internet has transformed the hotel sector and we highlight the importance of the adoption of user friendly policies for the protection of user data. Finally, we propose a model for the protection of privacy that tourism companies need to consider when adopting these technologies in order to comply with the legislation and adopt user friendly trust policies.