메뉴 건너뛰기




Volumn 35, Issue , 2013, Pages 369-379

Impact of hotel information security on system reliability

Author keywords

Hotel Information Systems; Hotel's management styles; Information security; System reliability; Types of hotels

Indexed keywords


EID: 84886396190     PISSN: 02784319     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijhm.2012.06.002     Document Type: Article
Times cited : (30)

References (59)
  • 1
    • 33947146473 scopus 로고    scopus 로고
    • Optimal resource allocation for security in reliability systems
    • Azaieza M.N., Bierb V.M. Optimal resource allocation for security in reliability systems. European Journal of Operational Research 2007, 181(2):773-786.
    • (2007) European Journal of Operational Research , vol.181 , Issue.2 , pp. 773-786
    • Azaieza, M.N.1    Bierb, V.M.2
  • 2
    • 33644636291 scopus 로고    scopus 로고
    • ISMS, security standards and security regulations
    • Broderick J.S. ISMS, security standards and security regulations. Information Security Technical Report 2006, 11(1):26-31.
    • (2006) Information Security Technical Report , vol.11 , Issue.1 , pp. 26-31
    • Broderick, J.S.1
  • 4
    • 33645031405 scopus 로고    scopus 로고
    • Organizational factors to the effectiveness of implementing information security management
    • Chang S., Ho C. Organizational factors to the effectiveness of implementing information security management. Industrial Management & Data Systems 2006, 106(3):345-361.
    • (2006) Industrial Management & Data Systems , vol.106 , Issue.3 , pp. 345-361
    • Chang, S.1    Ho, C.2
  • 5
    • 84886404051 scopus 로고    scopus 로고
    • Performance comparisons among food and beverage management information systems in Hong Kong hotels
    • Cho V., Wong J. Performance comparisons among food and beverage management information systems in Hong Kong hotels. Foodservice Research International 1999, 11(4):223-236.
    • (1999) Foodservice Research International , vol.11 , Issue.4 , pp. 223-236
    • Cho, V.1    Wong, J.2
  • 8
    • 77956778208 scopus 로고    scopus 로고
    • Survivability: synergizing security and reliability
    • Cowan C. Survivability: synergizing security and reliability. Advances in Computers 2004, 60:121-146.
    • (2004) Advances in Computers , vol.60 , pp. 121-146
    • Cowan, C.1
  • 9
    • 67649834507 scopus 로고    scopus 로고
    • The strategic management of information technology in UAE hotels: an exploratory study of TQM, SCM, and CRM implementations
    • Daghfous A., Barkhi R. The strategic management of information technology in UAE hotels: an exploratory study of TQM, SCM, and CRM implementations. Technovation 2009, 29(9):588-595.
    • (2009) Technovation , vol.29 , Issue.9 , pp. 588-595
    • Daghfous, A.1    Barkhi, R.2
  • 10
    • 33744830087 scopus 로고    scopus 로고
    • Value-focused assessment of information system security in organizations
    • Dhillon G., Torkzadeh G. Value-focused assessment of information system security in organizations. Information Systems Journal 2006, 16(3):293-314.
    • (2006) Information Systems Journal , vol.16 , Issue.3 , pp. 293-314
    • Dhillon, G.1    Torkzadeh, G.2
  • 11
    • 63649087849 scopus 로고    scopus 로고
    • Dynamics of organizational information security
    • Dutta A., Roy R. Dynamics of organizational information security. System Dynamics Review 2008, 24(3):349-375.
    • (2008) System Dynamics Review , vol.24 , Issue.3 , pp. 349-375
    • Dutta, A.1    Roy, R.2
  • 12
    • 84886446678 scopus 로고    scopus 로고
    • Application of information system technologies to power control centers in a liberalized environment
    • Fukui S., Asano T. Application of information system technologies to power control centers in a liberalized environment. IEEJ Transactions on Electrical and Electronic Engineering 2006, 1(3):337-344.
    • (2006) IEEJ Transactions on Electrical and Electronic Engineering , vol.1 , Issue.3 , pp. 337-344
    • Fukui, S.1    Asano, T.2
  • 13
    • 0042468094 scopus 로고    scopus 로고
    • A study on the certification of the information security management systems
    • Funga A.R., Farna K.J., Linc A.C. A study on the certification of the information security management systems. Computer Standards & Interfaces 2006, 25(5):447-461.
    • (2006) Computer Standards & Interfaces , vol.25 , Issue.5 , pp. 447-461
    • Funga, A.R.1    Farna, K.J.2    Linc, A.C.3
  • 14
    • 84970520884 scopus 로고
    • Information system training, usage, and satisfaction-an exploratory study of the hospitality industry
    • Gardner W.L., Gundersen D.E. Information system training, usage, and satisfaction-an exploratory study of the hospitality industry. Management Communication Quarterly August 1995, 9(1):78-114.
    • (1995) Management Communication Quarterly August , vol.9 , Issue.1 , pp. 78-114
    • Gardner, W.L.1    Gundersen, D.E.2
  • 16
    • 3843126615 scopus 로고    scopus 로고
    • Another look at Chow's test for the equality of two heteroscedastic regression models
    • Ghilagaber G. Another look at Chow's test for the equality of two heteroscedastic regression models. Quality & Quantity 2004, 38(1):81-93.
    • (2004) Quality & Quantity , vol.38 , Issue.1 , pp. 81-93
    • Ghilagaber, G.1
  • 18
    • 34848831177 scopus 로고    scopus 로고
    • Applying the cloak of invisibility technology to security and privacy in the hotel industry
    • Goh C.K.L., Law R. Applying the cloak of invisibility technology to security and privacy in the hotel industry. International Journal of Contemporary Hospitality Management 2007, 19(7):600-605.
    • (2007) International Journal of Contemporary Hospitality Management , vol.19 , Issue.7 , pp. 600-605
    • Goh, C.K.L.1    Law, R.2
  • 19
    • 36649016915 scopus 로고    scopus 로고
    • Comparing reliability and security: concepts, requirements, and techniques
    • Hanmer R.S., McBride D.T., Mendiratta V.B. Comparing reliability and security: concepts, requirements, and techniques. Bell Labs Technical Journal 2007, 12(3.):65-78.
    • (2007) Bell Labs Technical Journal , vol.12 , Issue.3 , pp. 65-78
    • Hanmer, R.S.1    McBride, D.T.2    Mendiratta, V.B.3
  • 23
    • 84886411184 scopus 로고    scopus 로고
    • International Data Corporation, 2007. Worldwide IT Security Software, Hardware, and Services 2007-2011 Forecast: The Big Picture. International Data Corporation (Doc #210018).
    • International Data Corporation, 2007. Worldwide IT Security Software, Hardware, and Services 2007-2011 Forecast: The Big Picture. International Data Corporation (Doc #210018).
  • 26
    • 17844381878 scopus 로고    scopus 로고
    • ISRAM: information security risk analysis method
    • Karabacaka B., Sogukpinarb I. ISRAM: information security risk analysis method. Computers & Security 2005, 24(2):147-159.
    • (2005) Computers & Security , vol.24 , Issue.2 , pp. 147-159
    • Karabacaka, B.1    Sogukpinarb, I.2
  • 28
    • 33745856956 scopus 로고    scopus 로고
    • Determinants of Chinese hotel customers' e-satisfaction and purchase
    • Kim W.G., Ma X., Kim D.J. Determinants of Chinese hotel customers' e-satisfaction and purchase. Tourism Management 2005, 27(5):890-900.
    • (2005) Tourism Management , vol.27 , Issue.5 , pp. 890-900
    • Kim, W.G.1    Ma, X.2    Kim, D.J.3
  • 31
    • 84898999022 scopus 로고    scopus 로고
    • Importance of hotel website dimensions and attributes: perceptions of online browsers and online purchasers
    • Law R., Hsu C.H.C. Importance of hotel website dimensions and attributes: perceptions of online browsers and online purchasers. Journal of Hospitality & Tourism 2006, 30(3):295-312.
    • (2006) Journal of Hospitality & Tourism , vol.30 , Issue.3 , pp. 295-312
    • Law, R.1    Hsu, C.H.C.2
  • 34
    • 84986099501 scopus 로고    scopus 로고
    • E-CRM: customer relationship marketing in the hotel industry
    • Luck D., Lancaster G. E-CRM: customer relationship marketing in the hotel industry. Managerial Auditing Journal 2003, 18(3):213-231.
    • (2003) Managerial Auditing Journal , vol.18 , Issue.3 , pp. 213-231
    • Luck, D.1    Lancaster, G.2
  • 35
    • 25444490650 scopus 로고    scopus 로고
    • Effective and practical risk management options for computerised system validation
    • McDowall R.D. Effective and practical risk management options for computerised system validation. The Quality Assurance Journal 2005, 9(3):196-227.
    • (2005) The Quality Assurance Journal , vol.9 , Issue.3 , pp. 196-227
    • McDowall, R.D.1
  • 36
    • 84986133689 scopus 로고    scopus 로고
    • Corporate information security management
    • Mitchell R.C., Marcella R., Baxter G. Corporate information security management. New Library World 1999, 100(5):213-227.
    • (1999) New Library World , vol.100 , Issue.5 , pp. 213-227
    • Mitchell, R.C.1    Marcella, R.2    Baxter, G.3
  • 37
    • 0022898598 scopus 로고
    • Secure software's impact on reliability
    • Murin.G.E. Secure software's impact on reliability. Computers & Security 1986, 5(4):336-339.
    • (1986) Computers & Security , vol.5 , Issue.4 , pp. 336-339
    • Murin, G.E.1
  • 38
    • 67649105826 scopus 로고    scopus 로고
    • The relationship between the hotel rating system, service quality improvement, and hotel performance changes: a canonical analysis of hotels in Thailand
    • Narangajavana Y., Hu B. The relationship between the hotel rating system, service quality improvement, and hotel performance changes: a canonical analysis of hotels in Thailand. Journal of Quality Assurance in Hospitality & Tourism 2008, 9(1):34-56.
    • (2008) Journal of Quality Assurance in Hospitality & Tourism , vol.9 , Issue.1 , pp. 34-56
    • Narangajavana, Y.1    Hu, B.2
  • 39
    • 84886382094 scopus 로고    scopus 로고
    • NIST 800-53, 2007. Special Publication 800-53 Rev 2, Recommended Security Controls for Federal Information Systems. National Institute of Standards and Technology.
    • NIST 800-53, 2007. Special Publication 800-53 Rev 2, Recommended Security Controls for Federal Information Systems. National Institute of Standards and Technology.
  • 40
    • 84886430794 scopus 로고    scopus 로고
    • NIST 800-55, 2008. Special Publication 800-53 Rev 1, Performance Measurement Guide for Information Security. National Institute of Standards and Technology.
    • NIST 800-55, 2008. Special Publication 800-53 Rev 1, Performance Measurement Guide for Information Security. National Institute of Standards and Technology.
  • 41
    • 34948879255 scopus 로고    scopus 로고
    • User-centred security applied to the development of a management information system
    • Nohlberg M., Bäckström J. User-centred security applied to the development of a management information system. Information Management & Computer Security 2007, 15(5):372-381.
    • (2007) Information Management & Computer Security , vol.15 , Issue.5 , pp. 372-381
    • Nohlberg, M.1    Bäckström, J.2
  • 42
    • 34247340852 scopus 로고    scopus 로고
    • Online consumer privacy: an analysis of hotel company behavior
    • O'Connor P. Online consumer privacy: an analysis of hotel company behavior. Cornell Hotel & Restaurant Administration Quarterly 2007, 48(2):183-200.
    • (2007) Cornell Hotel & Restaurant Administration Quarterly , vol.48 , Issue.2 , pp. 183-200
    • O'Connor, P.1
  • 43
    • 46149085668 scopus 로고    scopus 로고
    • Innovation behavior in the hotel industry
    • Orfila-Sintes F., Mattsson J. Innovation behavior in the hotel industry. Omega 2009, 37(2):380-394.
    • (2009) Omega , vol.37 , Issue.2 , pp. 380-394
    • Orfila-Sintes, F.1    Mattsson, J.2
  • 44
    • 55649096177 scopus 로고    scopus 로고
    • Criteria to evaluate automated personal identification mechanisms
    • Palmer A.J. Criteria to evaluate automated personal identification mechanisms. Computers & Security 2008, 27(7-8.):260-284.
    • (2008) Computers & Security , vol.27 , Issue.7-8 , pp. 260-284
    • Palmer, A.J.1
  • 45
    • 84863008959 scopus 로고    scopus 로고
    • A study of effect of Information Security Management System [ISMS] certification on organization performance
    • Park C.S., Jang S.S., Park Y.T. A study of effect of Information Security Management System [ISMS] certification on organization performance. International Journal of Computer Science and Network Security 2010, 10(3):10-21.
    • (2010) International Journal of Computer Science and Network Security , vol.10 , Issue.3 , pp. 10-21
    • Park, C.S.1    Jang, S.S.2    Park, Y.T.3
  • 46
    • 34547744968 scopus 로고    scopus 로고
    • Managing information security in a business network of machinery maintenance services business-enterprise architecture as a coordination tool
    • Pulkkinena M., Naumenkoa A., Luostarinenb K. Managing information security in a business network of machinery maintenance services business-enterprise architecture as a coordination tool. Journal of Systems and Software 2007, 80(10):1607-1620.
    • (2007) Journal of Systems and Software , vol.80 , Issue.10 , pp. 1607-1620
    • Pulkkinena, M.1    Naumenkoa, A.2    Luostarinenb, K.3
  • 47
    • 34547809340 scopus 로고    scopus 로고
    • Risks due to convergence of physical security systems and information technology environments
    • Schultza E.E. Risks due to convergence of physical security systems and information technology environments. Information Security Technical Report 2007, 12(2):80-84.
    • (2007) Information Security Technical Report , vol.12 , Issue.2 , pp. 80-84
    • Schultza, E.E.1
  • 48
    • 0036520897 scopus 로고    scopus 로고
    • The differential effect of environmental dimensionality, size, and structure on budget system characteristics in hotels
    • Sharma D.S. The differential effect of environmental dimensionality, size, and structure on budget system characteristics in hotels. Management Accounting Research 2002, 13(1):101-130.
    • (2002) Management Accounting Research , vol.13 , Issue.1 , pp. 101-130
    • Sharma, D.S.1
  • 49
    • 77957292713 scopus 로고    scopus 로고
    • Developing and implementing an eCRM 2.0 strategy: usage and readiness of Greek tourism firms
    • Sigala M. Developing and implementing an eCRM 2.0 strategy: usage and readiness of Greek tourism firms. Information and Communication Technologies in Tourism 2008, 2008(14):463-474.
    • (2008) Information and Communication Technologies in Tourism , vol.2008 , Issue.14 , pp. 463-474
    • Sigala, M.1
  • 50
    • 0013114592 scopus 로고    scopus 로고
    • Adoption of information technology in U.S. hotels: strategically driven objectives
    • Siguaw J.A., Enz C.A., Namasivayam K. Adoption of information technology in U.S. hotels: strategically driven objectives. Journal of Travel Research 2000, 39(2):192-201.
    • (2000) Journal of Travel Research , vol.39 , Issue.2 , pp. 192-201
    • Siguaw, J.A.1    Enz, C.A.2    Namasivayam, K.3
  • 52
    • 84978940867 scopus 로고    scopus 로고
    • Internet acceptable use policies: navigating the management, legal, and technical issues
    • Stewart F. Internet acceptable use policies: navigating the management, legal, and technical issues. Information Security Journal 2000, 9(3):1-7.
    • (2000) Information Security Journal , vol.9 , Issue.3 , pp. 1-7
    • Stewart, F.1
  • 54
    • 0001897127 scopus 로고    scopus 로고
    • Information security management: why standards are important
    • von Solms R. Information security management: why standards are important. Information management & Computer Security 1999, 7(1):50-57.
    • (1999) Information management & Computer Security , vol.7 , Issue.1 , pp. 50-57
    • von Solms, R.1
  • 55
    • 33747053670 scopus 로고    scopus 로고
    • Information security-the fourth wave
    • von Solms B. Information security-the fourth wave. Computers & Security 2006, 25(3):165-168.
    • (2006) Computers & Security , vol.25 , Issue.3 , pp. 165-168
    • von Solms, B.1
  • 56
    • 13644260152 scopus 로고    scopus 로고
    • Information technology and the performance effect of managers' participation in budgeting: evidence from the hotel industry
    • Winata L., Mia L. Information technology and the performance effect of managers' participation in budgeting: evidence from the hotel industry. International Journal of Hospitality Management 2005, 24(1):21-39.
    • (2005) International Journal of Hospitality Management , vol.24 , Issue.1 , pp. 21-39
    • Winata, L.1    Mia, L.2
  • 57
    • 0035665128 scopus 로고    scopus 로고
    • What do the recent terrorist attacks mean for the American information security profession
    • Wood C.C. What do the recent terrorist attacks mean for the American information security profession. Computers & Security 2001, 20(8):667-670.
    • (2001) Computers & Security , vol.20 , Issue.8 , pp. 667-670
    • Wood, C.C.1
  • 58
    • 34447298085 scopus 로고    scopus 로고
    • Threats and countermeasures for information system security: a cross-industry study
    • Yeh Q.J., Chang J.T. Threats and countermeasures for information system security: a cross-industry study. Information & Management 2007, 44(5):480-491.
    • (2007) Information & Management , vol.44 , Issue.5 , pp. 480-491
    • Yeh, Q.J.1    Chang, J.T.2
  • 59
    • 54049155665 scopus 로고    scopus 로고
    • Reliability engineering: old problems and new challenges
    • Zio E. Reliability engineering: old problems and new challenges. Reliability Engineering & System Safety 2009, 94(2):125-141.
    • (2009) Reliability Engineering & System Safety , vol.94 , Issue.2 , pp. 125-141
    • Zio, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.