Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Business

Risk Communication In The Tourism Industry, Lindsay E. Usher, Ashley Schroeder Nov 2021

Risk Communication In The Tourism Industry, Lindsay E. Usher, Ashley Schroeder

Human Movement Sciences & Special Education Faculty Publications

This chapter focuses on risk communication in the tourism sector. Tourism organizations must communicate with a variety of stakeholders when conveying messages about impending severe weather or disasters, which are increasing due climate change and sea level rise. There is also an increased need to distribute information to tourism stakeholders about preparing for, continuing service during, and recovering from, disasters. Stakeholders involved with the tourism industry include business owners, government officials and tourists, all of whom have differing degrees of vulnerability in a destination when a threat occurs. Different messages regarding disaster preparation and recovery must be communicated to the …


Communicating With Muted Groups: The Case Of Human Trafficking, Amy Matzke-Fawcett Jul 2021

Communicating With Muted Groups: The Case Of Human Trafficking, Amy Matzke-Fawcett

Communication & Theatre Arts Theses

The problem of human trafficking is global, affecting men and women, adults, and children, with exploitation of various forms including (but not limited to) sex work, hospitality and entertainment, labor, agriculture, soldiering, forced begging and organ removal. While it has been the focus of movies, news articles, documentaries, legislation and research, the discussion of the communication surrounding human trafficking is still in the formative stages. What is the messaging about human trafficking in legislation, both historically and in the present day, and how did news and popular media help to frame the discourse around trafficking in the United States? Using …


Image Source Identification Using Convolutional Neural Networks In Iot Environment, Yan Wang, Qindong Sun, Dongzhu Rong, Shancang Li, Li Da Xu Jan 2021

Image Source Identification Using Convolutional Neural Networks In Iot Environment, Yan Wang, Qindong Sun, Dongzhu Rong, Shancang Li, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

Digital image forensics is a key branch of digital forensics that based on forensic analysis of image authenticity and image content. The advances in new techniques, such as smart devices, Internet of Things (IoT), artificial images, and social networks, make forensic image analysis play an increasing role in a wide range of criminal case investigation. This work focuses on image source identification by analysing both the fingerprints of digital devices and images in IoT environment. A new convolutional neural network (CNN) method is proposed to identify the source devices that token an image in social IoT environment. The experimental results …


Takin' Care Of Small Business: The Rise Of Stakeholder Influence, William P. Jimenez, Xiaohong (Violet) Xu, Emily D. Campion, Andrew A. Bennett Jan 2021

Takin' Care Of Small Business: The Rise Of Stakeholder Influence, William P. Jimenez, Xiaohong (Violet) Xu, Emily D. Campion, Andrew A. Bennett

Management Faculty Publications

In this Exchange, we consider three crucial boundary conditions that Barnett, Henriques, and Husted (2020) overlooked in their model of diminished stakeholder influence. Although we agree that social media platforms have weakened stakeholder influence in certain conditions, such is not the case for all firms, all stakeholders, or all situations. Drawing from socio-cognitive and self-determination theories, we contend that (a) independent, owner-managed small firms present a context wherein information overload is rendered less of an issue because the information about the firm is more salient to locals; (b) stakeholders can be motivated to influence firms via social media platforms, which …


Detecting Incentivized Review Groups With Co-Review Graph, Yubao Zhang, Shuai Hao, Haining Wang Jan 2021

Detecting Incentivized Review Groups With Co-Review Graph, Yubao Zhang, Shuai Hao, Haining Wang

Computer Science Faculty Publications

Online reviews play a crucial role in the ecosystem of nowadays business (especially e-commerce platforms), and have become the primary source of consumer opinions. To manipulate consumers’ opinions, some sellers of e-commerce platforms outsource opinion spamming with incentives (e.g., free products) in exchange for incentivized reviews. As incentives, by nature, are likely to drive more biased reviews or even fake reviews. Despite e-commerce platforms such as Amazon have taken initiatives to squash the incentivized review practice, sellers turn to various social networking platforms (e.g., Facebook) to outsource the incentivized reviews. The aggregation of sellers who …


Ranking Influential Nodes Of Fake News Spreading On Mobile Social Networks, Yunfei Xing, Xiwei Wang, Fang-Kwei Wang, Yang Shi, Wu He, Haowu Chang Jan 2021

Ranking Influential Nodes Of Fake News Spreading On Mobile Social Networks, Yunfei Xing, Xiwei Wang, Fang-Kwei Wang, Yang Shi, Wu He, Haowu Chang

Information Technology & Decision Sciences Faculty Publications

Online fake news can generate a negative impact on both users and society. Due to the concerns with spread of fake news and misinformation, assessing the network influence of online users has become an important issue. This study quantifies the influence of nodes by proposing an algorithm based on information entropy theory. Dynamic process of influence of nodes is characterized on mobile social networks (MSNs). Weibo (i.e., the Chinese version of microblogging) users are chosen to build the real network and quantified influence of them is analyzed according to the model proposed in this paper. MATLAB is employed to simulate …