-
1
-
-
0034347745
-
The fallacy of "green technology
-
Allenby, B. R. 2000. The fallacy of "green technology. The American Behavioral Scientist, 44 (2): 213 - 228.
-
(2000)
The American Behavioral Scientist
, vol.44
, Issue.2
, pp. 213-228
-
-
Allenby, B.R.1
-
2
-
-
84883506249
-
-
Astaro Corp
-
Astaro Corp. (2007). Survey shows security budgets on the rise http://www.astaro.com/index.php/en/newsroom/press_releases/press_release_archive/survey_shows_security_budgets_on_the_rise (http://www.astaro.com/index.php/en/newsroom/press_releases/press_release_archive/survey_shows_security_budgets_on_the_rise)
-
(2007)
Survey shows security budgets on the rise
-
-
-
3
-
-
0002314269
-
Tracking the progress of e-mail versus snail mail
-
Bachmann, D., Elfrink, J. and Vazzana, G. 1996. Tracking the progress of e-mail versus snail mail. Marketing Research, 8 (2): 31 - 35.
-
(1996)
Marketing Research
, vol.8
, Issue.2
, pp. 31-35
-
-
Bachmann, D.1
Elfrink, J.2
Vazzana, G.3
-
4
-
-
0003713797
-
-
New York, NY, New York, NY,: John Wiley & Sons
-
Belsley, D. A., Kuh, E. and Welsch, R. E. 1980. Regression diagnostics: Identifying influential data and sources of collinearity, New York, NY: John Wiley & Sons.
-
(1980)
Regression diagnostics: Identifying influential data and sources of collinearity
-
-
Belsley, D.A.1
Kuh, E.2
Welsch, R.E.3
-
5
-
-
84883529170
-
Where are the wires?
-
Bentley, R. 2005. Where are the wires?. Caterer & Hotelkeeper, 195 (4401): 66 - 67.
-
(2005)
Caterer & Hotelkeeper
, vol.195
, Issue.4401
, pp. 66-67
-
-
Bentley, R.1
-
6
-
-
84883535265
-
Green hospitality and the changing demands of the tourism industry
-
Bickson, R. 2007. Green hospitality and the changing demands of the tourism industry. Green Hotelier, 45: 6 - 7.
-
(2007)
Green Hotelier
, vol.45
, pp. 6-7
-
-
Bickson, R.1
-
7
-
-
44249125210
-
Internet banking versus other banking channels: Young consumers' view
-
Calisir, F. and Gumussoy, C. 2008. Internet banking versus other banking channels: Young consumers' view. International Journal of Information Management, 28 (3): 215 - 221.
-
(2008)
International Journal of Information Management
, vol.28
, Issue.3
, pp. 215-221
-
-
Calisir, F.1
Gumussoy, C.2
-
9
-
-
84883542569
-
Step right up: Kiosks command attention across verticals
-
Carlin, M. (2006, December). Step right up: Kiosks command attention across verticals. Hospitality Technology Magazine http://c3185012.r12.cf0.rackcdn.com/v3-docs/1485cbb3114b14b7bca38ce49d914df/Kiosk_supp_6.pdf (http://c3185012.r12.cf0.rackcdn.com/v3-docs/1485cbb3114b14b7bca38ce49d914df/Kiosk_supp_6.pdf)
-
(2006)
Hospitality Technology Magazine
-
-
Carlin, M.1
-
10
-
-
34249931691
-
A critical look at restaurant network security: Attacks, prevention tool, practices
-
Cobanoglu, C. 2007. A critical look at restaurant network security: Attacks, prevention tool, practices. Journal of Foodservice Business Research, 10 (1): 31 - 50.
-
(2007)
Journal of Foodservice Business Research
, vol.10
, Issue.1
, pp. 31-50
-
-
Cobanoglu, C.1
-
11
-
-
33847608290
-
To be secure of not to be: Isn't this the question? A critical look at hotel's network security
-
Cobanoglu, C. and DeMicco, F. 2007. To be secure of not to be: Isn't this the question? A critical look at hotel's network security. International Journal of Hospitality & Tourism Administration, 8 (1): 43 - 59.
-
(2007)
International Journal of Hospitality & Tourism Administration
, vol.8
, Issue.1
, pp. 43-59
-
-
Cobanoglu, C.1
DeMicco, F.2
-
12
-
-
84883546780
-
SMBs spending for security
-
News, Communications. 2007. SMBs spending for security. Communications News, 44 (12): 8
-
(2007)
Communications News
, vol.44
, Issue.12
, pp. 8
-
-
News, C.1
-
14
-
-
70450069587
-
The physical safety and security features of U.S. hotels
-
Enz, C. A. 2009. The physical safety and security features of U.S. hotels. Cornell Hospitality Quarterly, 50 (4): 553 - 560.
-
(2009)
Cornell Hospitality Quarterly
, vol.50
, Issue.4
, pp. 553-560
-
-
Enz, C.A.1
-
15
-
-
1942505378
-
Who holds the key to IT security?
-
Flink, Y. 2002. Who holds the key to IT security?. Information Security Technical Report, 7 (4): 10 - 22.
-
(2002)
Information Security Technical Report
, vol.7
, Issue.4
, pp. 10-22
-
-
Flink, Y.1
-
16
-
-
85006558759
-
Diffusion of virtual innovation
-
Fuller, M. A., Hardin, A. M. and Scott, C. L. 2007. Diffusion of virtual innovation. Database for Advances in Information Systems, 38 (4): 40 - 44.
-
(2007)
Database for Advances in Information Systems
, vol.38
, Issue.4
, pp. 40-44
-
-
Fuller, M.A.1
Hardin, A.M.2
Scott, C.L.3
-
17
-
-
34848831177
-
Applying the "cloak of invisibility" technology to security and privacy in the hotel industry
-
Goh, C. and Law, R. 2007. Applying the "cloak of invisibility" technology to security and privacy in the hotel industry. International Journal of Contemporary Hospitality Management, 19 (6/7): 600 - 605.
-
(2007)
International Journal of Contemporary Hospitality Management
, vol.19
, Issue.6-7
, pp. 600-605
-
-
Goh, C.1
Law, R.2
-
18
-
-
33845802129
-
Understanding the decision to participate in a survey
-
Groves, R. M., Cialdini, R. B. and Courier, M. P. 1992. Understanding the decision to participate in a survey. Public Opinion Quarterly, 56: 475 - 495.
-
(1992)
Public Opinion Quarterly
, vol.56
, pp. 475-495
-
-
Groves, R.M.1
Cialdini, R.B.2
Courier, M.P.3
-
19
-
-
0003610254
-
-
Upper Saddle River, NJ, Upper Saddle River, NJ,: Prentice Hall
-
Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E. and Tatham, R. L. 2006. Multivariate data analysis, Upper Saddle River, NJ: Prentice Hall.
-
(2006)
Multivariate data analysis
-
-
Hair, J.F.1
Black, W.C.2
Babin, B.J.3
Anderson, R.E.4
Tatham, R.L.5
-
20
-
-
70350328445
-
Biometric technology: The future of identity assurance and authentication in the lodging industry
-
Jackson, L. 2009. Biometric technology: The future of identity assurance and authentication in the lodging industry. International Journal of Contemporary Hospitality Management, 21 (6/7): 892 - 905.
-
(2009)
International Journal of Contemporary Hospitality Management
, vol.21
, Issue.6-7
, pp. 892-905
-
-
Jackson, L.1
-
23
-
-
84883525409
-
Understanding PCI compliance
-
Kress, J. 2008. Understanding PCI compliance. CA Magazine, 141 (6): 44 - 46.
-
(2008)
CA Magazine
, vol.141
, Issue.6
, pp. 44-46
-
-
Kress, J.1
-
25
-
-
71049155854
-
Preparing hospitality organizations for self-service technology
-
Lema, J. 2009. Preparing hospitality organizations for self-service technology. Journal of Human Resources in Hospitality & Tourism, 8 (2): 153 - 169.
-
(2009)
Journal of Human Resources in Hospitality & Tourism
, vol.8
, Issue.2
, pp. 153-169
-
-
Lema, J.1
-
27
-
-
0034417136
-
Self-service technologies: Understanding customer satisfaction with technology based service encounters
-
Meuter, M., Ostrom, A., Roundtree, R. and Bitner, M. 2000. Self-service technologies: Understanding customer satisfaction with technology based service encounters. Journal of Marketing, 64 (3): 50 - 64.
-
(2000)
Journal of Marketing
, vol.64
, Issue.3
, pp. 50-64
-
-
Meuter, M.1
Ostrom, A.2
Roundtree, R.3
Bitner, M.4
-
30
-
-
24144431655
-
Technology advancement strategy on patronage decisions: The role of switching costs in high-technology markets
-
Pae, J. and Hyun, J. 2006. Technology advancement strategy on patronage decisions: The role of switching costs in high-technology markets. Omega, 34 (1): 19 - 27.
-
(2006)
Omega
, vol.34
, Issue.1
, pp. 19-27
-
-
Pae, J.1
Hyun, J.2
-
32
-
-
0032282676
-
Development of a standard e-mail methodology: Results of an experiment
-
Schaefer, D. R. and Dillman, D. A. 1998. Development of a standard e-mail methodology: Results of an experiment. Public Opinion Quarterly, 62 (3): 378 - 397.
-
(1998)
Public Opinion Quarterly
, vol.62
, Issue.3
, pp. 378-397
-
-
Schaefer, D.R.1
Dillman, D.A.2
-
33
-
-
70450150026
-
Adoption of WLANs in the hotel industry: A theoretical cost-analytic framework
-
Schneider, C. 2006. Adoption of WLANs in the hotel industry: A theoretical cost-analytic framework. Journal of Hospitality & Tourism Management, 13 (2): 189 - 198.
-
(2006)
Journal of Hospitality & Tourism Management
, vol.13
, Issue.2
, pp. 189-198
-
-
Schneider, C.1
-
34
-
-
84883533355
-
-
Security Standards Council
-
Security Standards Council. (2008). PCI Data Security Standard (PCI DSS) https://www.pcisecuritystandards.org/security_standards/pci_dss.shtml (http://www.pcisecuritystandards.org/security_standards/pci_dss.shtml)
-
(2008)
PCI Data Security Standard (PCI DSS)
-
-
-
35
-
-
84992791109
-
The impact of information technology on future management of lodging operations: A Delphi study to predict key technological events in 2007 and 2027
-
Singh, A. and Kasavana, M. 2005. The impact of information technology on future management of lodging operations: A Delphi study to predict key technological events in 2007 and 2027. Tourism & Hospitality Research, 6 (1): 24 - 37.
-
(2005)
Tourism & Hospitality Research
, vol.6
, Issue.1
, pp. 24-37
-
-
Singh, A.1
Kasavana, M.2
-
36
-
-
1842829828
-
-
Gaithersburg, MD, Gaithersburg, MD,: National Institute of Standards and Technology
-
Stoneburner, G., Goguen, A. and Feringa, A. 2002. Risk management guide for information technology systems and underlying technical models for information technology security, Gaithersburg, MD: National Institute of Standards and Technology.
-
(2002)
Risk management guide for information technology systems and underlying technical models for information technology security
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
37
-
-
0003976359
-
-
Boston, MA, Boston, MA,: Pearson Education
-
Tabachnick, B. G. and Fidell, L. S. 2007. Using multivariate statistics, Boston, MA: Pearson Education.
-
(2007)
Using multivariate statistics
-
-
Tabachnick, B.G.1
Fidell, L.S.2
-
38
-
-
21844490722
-
Comparing two methods of sending out questionnaires: E-mail versus mail
-
Tse, A. B., Yin, C. H., Ting, C. B., Yi, K. W., Yee, K. P. and Hong, W. C. 1995. Comparing two methods of sending out questionnaires: E-mail versus mail. Journal of the Market Research Society, 37 (4): 441 - 446.
-
(1995)
Journal of the Market Research Society
, vol.37
, Issue.4
, pp. 441-446
-
-
Tse, A.B.1
Yin, C.H.2
Ting, C.B.3
Yi, K.W.4
Yee, K.P.5
Hong, W.C.6
-
40
-
-
33747457875
-
-
8th, Upper Saddle River, NJ, Upper Saddle River, NJ,: Prentice Hall
-
Vallen, G. and Vallen, J. 2009. Check-in check-out: Managing hotel operations, 8th, Upper Saddle River, NJ: Prentice Hall.
-
(2009)
Check-in check-out: Managing hotel operations
-
-
Vallen, G.1
Vallen, J.2
-
41
-
-
65349100524
-
Customer self-efficacy in technology-based self-service: Assessing between- and within-person differences
-
Van Beuningen, J., De Ruyter, K., Wetzels, M. and Streukens, S. 2009. Customer self-efficacy in technology-based self-service: Assessing between- and within-person differences. Journal of Service Research, 11 (4): 407 - 428.
-
(2009)
Journal of Service Research
, vol.11
, Issue.4
, pp. 407-428
-
-
Van Beuningen, J.1
De Ruyter, K.2
Wetzels, M.3
Streukens, S.4
-
42
-
-
84873801747
-
-
New York: Deloitte Development LLC
-
Weissenberg, A., Redington, N., & Kutyla, D. (2008). The staying power of sustainability. New York: Deloitte Development LLC http://www.deloitte.com/assets/Dcom-UnitedStates/Local%20Assets/Documents/us_cb_sustainability_190608(1).pdf (http://www.deloitte.com/assets/Dcom-UnitedStates/Local%20Assets/Documents/us_cb_sustainability_190608(1).pdf)
-
(2008)
The staying power of sustainability
-
-
Weissenberg, A.1
Redington, N.2
Kutyla, D.3
-
44
-
-
0003834664
-
-
7th, Florence, KY, Florence, KY,: South-Western
-
Zikmund, W. G. 2003. Business research methods, 7th, Florence, KY: South-Western.
-
(2003)
Business research methods
-
-
Zikmund, W.G.1
|