-
1
-
-
33947146473
-
Optimal resource allocation for security in reliability systems
-
Azaieza M.N., Bierb V.M. Optimal resource allocation for security in reliability systems. European Journal of Operational Research 2007, 181(2):773-786.
-
(2007)
European Journal of Operational Research
, vol.181
, Issue.2
, pp. 773-786
-
-
Azaieza, M.N.1
Bierb, V.M.2
-
2
-
-
33644636291
-
ISMS, security standards and security regulations
-
Broderick J.S. ISMS, security standards and security regulations. Information Security Technical Report 2006, 11(1):26-31.
-
(2006)
Information Security Technical Report
, vol.11
, Issue.1
, pp. 26-31
-
-
Broderick, J.S.1
-
4
-
-
33645031405
-
Organizational factors to the effectiveness of implementing information security management
-
Chang S., Ho C. Organizational factors to the effectiveness of implementing information security management. Industrial Management & Data Systems 2006, 106(3):345-361.
-
(2006)
Industrial Management & Data Systems
, vol.106
, Issue.3
, pp. 345-361
-
-
Chang, S.1
Ho, C.2
-
5
-
-
84886404051
-
Performance comparisons among food and beverage management information systems in Hong Kong hotels
-
Cho V., Wong J. Performance comparisons among food and beverage management information systems in Hong Kong hotels. Foodservice Research International 1999, 11(4):223-236.
-
(1999)
Foodservice Research International
, vol.11
, Issue.4
, pp. 223-236
-
-
Cho, V.1
Wong, J.2
-
8
-
-
77956778208
-
Survivability: synergizing security and reliability
-
Cowan C. Survivability: synergizing security and reliability. Advances in Computers 2004, 60:121-146.
-
(2004)
Advances in Computers
, vol.60
, pp. 121-146
-
-
Cowan, C.1
-
9
-
-
67649834507
-
The strategic management of information technology in UAE hotels: an exploratory study of TQM, SCM, and CRM implementations
-
Daghfous A., Barkhi R. The strategic management of information technology in UAE hotels: an exploratory study of TQM, SCM, and CRM implementations. Technovation 2009, 29(9):588-595.
-
(2009)
Technovation
, vol.29
, Issue.9
, pp. 588-595
-
-
Daghfous, A.1
Barkhi, R.2
-
10
-
-
33744830087
-
Value-focused assessment of information system security in organizations
-
Dhillon G., Torkzadeh G. Value-focused assessment of information system security in organizations. Information Systems Journal 2006, 16(3):293-314.
-
(2006)
Information Systems Journal
, vol.16
, Issue.3
, pp. 293-314
-
-
Dhillon, G.1
Torkzadeh, G.2
-
11
-
-
63649087849
-
Dynamics of organizational information security
-
Dutta A., Roy R. Dynamics of organizational information security. System Dynamics Review 2008, 24(3):349-375.
-
(2008)
System Dynamics Review
, vol.24
, Issue.3
, pp. 349-375
-
-
Dutta, A.1
Roy, R.2
-
12
-
-
84886446678
-
Application of information system technologies to power control centers in a liberalized environment
-
Fukui S., Asano T. Application of information system technologies to power control centers in a liberalized environment. IEEJ Transactions on Electrical and Electronic Engineering 2006, 1(3):337-344.
-
(2006)
IEEJ Transactions on Electrical and Electronic Engineering
, vol.1
, Issue.3
, pp. 337-344
-
-
Fukui, S.1
Asano, T.2
-
13
-
-
0042468094
-
A study on the certification of the information security management systems
-
Funga A.R., Farna K.J., Linc A.C. A study on the certification of the information security management systems. Computer Standards & Interfaces 2006, 25(5):447-461.
-
(2006)
Computer Standards & Interfaces
, vol.25
, Issue.5
, pp. 447-461
-
-
Funga, A.R.1
Farna, K.J.2
Linc, A.C.3
-
14
-
-
84970520884
-
Information system training, usage, and satisfaction-an exploratory study of the hospitality industry
-
Gardner W.L., Gundersen D.E. Information system training, usage, and satisfaction-an exploratory study of the hospitality industry. Management Communication Quarterly August 1995, 9(1):78-114.
-
(1995)
Management Communication Quarterly August
, vol.9
, Issue.1
, pp. 78-114
-
-
Gardner, W.L.1
Gundersen, D.E.2
-
16
-
-
3843126615
-
Another look at Chow's test for the equality of two heteroscedastic regression models
-
Ghilagaber G. Another look at Chow's test for the equality of two heteroscedastic regression models. Quality & Quantity 2004, 38(1):81-93.
-
(2004)
Quality & Quantity
, vol.38
, Issue.1
, pp. 81-93
-
-
Ghilagaber, G.1
-
18
-
-
34848831177
-
Applying the cloak of invisibility technology to security and privacy in the hotel industry
-
Goh C.K.L., Law R. Applying the cloak of invisibility technology to security and privacy in the hotel industry. International Journal of Contemporary Hospitality Management 2007, 19(7):600-605.
-
(2007)
International Journal of Contemporary Hospitality Management
, vol.19
, Issue.7
, pp. 600-605
-
-
Goh, C.K.L.1
Law, R.2
-
19
-
-
36649016915
-
Comparing reliability and security: concepts, requirements, and techniques
-
Hanmer R.S., McBride D.T., Mendiratta V.B. Comparing reliability and security: concepts, requirements, and techniques. Bell Labs Technical Journal 2007, 12(3.):65-78.
-
(2007)
Bell Labs Technical Journal
, vol.12
, Issue.3
, pp. 65-78
-
-
Hanmer, R.S.1
McBride, D.T.2
Mendiratta, V.B.3
-
23
-
-
84886411184
-
-
International Data Corporation, 2007. Worldwide IT Security Software, Hardware, and Services 2007-2011 Forecast: The Big Picture. International Data Corporation (Doc #210018).
-
International Data Corporation, 2007. Worldwide IT Security Software, Hardware, and Services 2007-2011 Forecast: The Big Picture. International Data Corporation (Doc #210018).
-
-
-
-
26
-
-
17844381878
-
ISRAM: information security risk analysis method
-
Karabacaka B., Sogukpinarb I. ISRAM: information security risk analysis method. Computers & Security 2005, 24(2):147-159.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 147-159
-
-
Karabacaka, B.1
Sogukpinarb, I.2
-
28
-
-
33745856956
-
Determinants of Chinese hotel customers' e-satisfaction and purchase
-
Kim W.G., Ma X., Kim D.J. Determinants of Chinese hotel customers' e-satisfaction and purchase. Tourism Management 2005, 27(5):890-900.
-
(2005)
Tourism Management
, vol.27
, Issue.5
, pp. 890-900
-
-
Kim, W.G.1
Ma, X.2
Kim, D.J.3
-
31
-
-
84898999022
-
Importance of hotel website dimensions and attributes: perceptions of online browsers and online purchasers
-
Law R., Hsu C.H.C. Importance of hotel website dimensions and attributes: perceptions of online browsers and online purchasers. Journal of Hospitality & Tourism 2006, 30(3):295-312.
-
(2006)
Journal of Hospitality & Tourism
, vol.30
, Issue.3
, pp. 295-312
-
-
Law, R.1
Hsu, C.H.C.2
-
34
-
-
84986099501
-
E-CRM: customer relationship marketing in the hotel industry
-
Luck D., Lancaster G. E-CRM: customer relationship marketing in the hotel industry. Managerial Auditing Journal 2003, 18(3):213-231.
-
(2003)
Managerial Auditing Journal
, vol.18
, Issue.3
, pp. 213-231
-
-
Luck, D.1
Lancaster, G.2
-
35
-
-
25444490650
-
Effective and practical risk management options for computerised system validation
-
McDowall R.D. Effective and practical risk management options for computerised system validation. The Quality Assurance Journal 2005, 9(3):196-227.
-
(2005)
The Quality Assurance Journal
, vol.9
, Issue.3
, pp. 196-227
-
-
McDowall, R.D.1
-
37
-
-
0022898598
-
Secure software's impact on reliability
-
Murin.G.E. Secure software's impact on reliability. Computers & Security 1986, 5(4):336-339.
-
(1986)
Computers & Security
, vol.5
, Issue.4
, pp. 336-339
-
-
Murin, G.E.1
-
38
-
-
67649105826
-
The relationship between the hotel rating system, service quality improvement, and hotel performance changes: a canonical analysis of hotels in Thailand
-
Narangajavana Y., Hu B. The relationship between the hotel rating system, service quality improvement, and hotel performance changes: a canonical analysis of hotels in Thailand. Journal of Quality Assurance in Hospitality & Tourism 2008, 9(1):34-56.
-
(2008)
Journal of Quality Assurance in Hospitality & Tourism
, vol.9
, Issue.1
, pp. 34-56
-
-
Narangajavana, Y.1
Hu, B.2
-
39
-
-
84886382094
-
-
NIST 800-53, 2007. Special Publication 800-53 Rev 2, Recommended Security Controls for Federal Information Systems. National Institute of Standards and Technology.
-
NIST 800-53, 2007. Special Publication 800-53 Rev 2, Recommended Security Controls for Federal Information Systems. National Institute of Standards and Technology.
-
-
-
-
40
-
-
84886430794
-
-
NIST 800-55, 2008. Special Publication 800-53 Rev 1, Performance Measurement Guide for Information Security. National Institute of Standards and Technology.
-
NIST 800-55, 2008. Special Publication 800-53 Rev 1, Performance Measurement Guide for Information Security. National Institute of Standards and Technology.
-
-
-
-
41
-
-
34948879255
-
User-centred security applied to the development of a management information system
-
Nohlberg M., Bäckström J. User-centred security applied to the development of a management information system. Information Management & Computer Security 2007, 15(5):372-381.
-
(2007)
Information Management & Computer Security
, vol.15
, Issue.5
, pp. 372-381
-
-
Nohlberg, M.1
Bäckström, J.2
-
42
-
-
34247340852
-
Online consumer privacy: an analysis of hotel company behavior
-
O'Connor P. Online consumer privacy: an analysis of hotel company behavior. Cornell Hotel & Restaurant Administration Quarterly 2007, 48(2):183-200.
-
(2007)
Cornell Hotel & Restaurant Administration Quarterly
, vol.48
, Issue.2
, pp. 183-200
-
-
O'Connor, P.1
-
43
-
-
46149085668
-
Innovation behavior in the hotel industry
-
Orfila-Sintes F., Mattsson J. Innovation behavior in the hotel industry. Omega 2009, 37(2):380-394.
-
(2009)
Omega
, vol.37
, Issue.2
, pp. 380-394
-
-
Orfila-Sintes, F.1
Mattsson, J.2
-
44
-
-
55649096177
-
Criteria to evaluate automated personal identification mechanisms
-
Palmer A.J. Criteria to evaluate automated personal identification mechanisms. Computers & Security 2008, 27(7-8.):260-284.
-
(2008)
Computers & Security
, vol.27
, Issue.7-8
, pp. 260-284
-
-
Palmer, A.J.1
-
45
-
-
84863008959
-
A study of effect of Information Security Management System [ISMS] certification on organization performance
-
Park C.S., Jang S.S., Park Y.T. A study of effect of Information Security Management System [ISMS] certification on organization performance. International Journal of Computer Science and Network Security 2010, 10(3):10-21.
-
(2010)
International Journal of Computer Science and Network Security
, vol.10
, Issue.3
, pp. 10-21
-
-
Park, C.S.1
Jang, S.S.2
Park, Y.T.3
-
46
-
-
34547744968
-
Managing information security in a business network of machinery maintenance services business-enterprise architecture as a coordination tool
-
Pulkkinena M., Naumenkoa A., Luostarinenb K. Managing information security in a business network of machinery maintenance services business-enterprise architecture as a coordination tool. Journal of Systems and Software 2007, 80(10):1607-1620.
-
(2007)
Journal of Systems and Software
, vol.80
, Issue.10
, pp. 1607-1620
-
-
Pulkkinena, M.1
Naumenkoa, A.2
Luostarinenb, K.3
-
47
-
-
34547809340
-
Risks due to convergence of physical security systems and information technology environments
-
Schultza E.E. Risks due to convergence of physical security systems and information technology environments. Information Security Technical Report 2007, 12(2):80-84.
-
(2007)
Information Security Technical Report
, vol.12
, Issue.2
, pp. 80-84
-
-
Schultza, E.E.1
-
48
-
-
0036520897
-
The differential effect of environmental dimensionality, size, and structure on budget system characteristics in hotels
-
Sharma D.S. The differential effect of environmental dimensionality, size, and structure on budget system characteristics in hotels. Management Accounting Research 2002, 13(1):101-130.
-
(2002)
Management Accounting Research
, vol.13
, Issue.1
, pp. 101-130
-
-
Sharma, D.S.1
-
49
-
-
77957292713
-
Developing and implementing an eCRM 2.0 strategy: usage and readiness of Greek tourism firms
-
Sigala M. Developing and implementing an eCRM 2.0 strategy: usage and readiness of Greek tourism firms. Information and Communication Technologies in Tourism 2008, 2008(14):463-474.
-
(2008)
Information and Communication Technologies in Tourism
, vol.2008
, Issue.14
, pp. 463-474
-
-
Sigala, M.1
-
50
-
-
0013114592
-
Adoption of information technology in U.S. hotels: strategically driven objectives
-
Siguaw J.A., Enz C.A., Namasivayam K. Adoption of information technology in U.S. hotels: strategically driven objectives. Journal of Travel Research 2000, 39(2):192-201.
-
(2000)
Journal of Travel Research
, vol.39
, Issue.2
, pp. 192-201
-
-
Siguaw, J.A.1
Enz, C.A.2
Namasivayam, K.3
-
51
-
-
17844366573
-
Analysis of end user security behaviors
-
Stanton J.M., Stam K.R., Mastrangelo P., Jolton J. Analysis of end user security behaviors. Computers & Security 2005, 24(2):124-133.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
52
-
-
84978940867
-
Internet acceptable use policies: navigating the management, legal, and technical issues
-
Stewart F. Internet acceptable use policies: navigating the management, legal, and technical issues. Information Security Journal 2000, 9(3):1-7.
-
(2000)
Information Security Journal
, vol.9
, Issue.3
, pp. 1-7
-
-
Stewart, F.1
-
54
-
-
0001897127
-
Information security management: why standards are important
-
von Solms R. Information security management: why standards are important. Information management & Computer Security 1999, 7(1):50-57.
-
(1999)
Information management & Computer Security
, vol.7
, Issue.1
, pp. 50-57
-
-
von Solms, R.1
-
55
-
-
33747053670
-
Information security-the fourth wave
-
von Solms B. Information security-the fourth wave. Computers & Security 2006, 25(3):165-168.
-
(2006)
Computers & Security
, vol.25
, Issue.3
, pp. 165-168
-
-
von Solms, B.1
-
56
-
-
13644260152
-
Information technology and the performance effect of managers' participation in budgeting: evidence from the hotel industry
-
Winata L., Mia L. Information technology and the performance effect of managers' participation in budgeting: evidence from the hotel industry. International Journal of Hospitality Management 2005, 24(1):21-39.
-
(2005)
International Journal of Hospitality Management
, vol.24
, Issue.1
, pp. 21-39
-
-
Winata, L.1
Mia, L.2
-
57
-
-
0035665128
-
What do the recent terrorist attacks mean for the American information security profession
-
Wood C.C. What do the recent terrorist attacks mean for the American information security profession. Computers & Security 2001, 20(8):667-670.
-
(2001)
Computers & Security
, vol.20
, Issue.8
, pp. 667-670
-
-
Wood, C.C.1
-
58
-
-
34447298085
-
Threats and countermeasures for information system security: a cross-industry study
-
Yeh Q.J., Chang J.T. Threats and countermeasures for information system security: a cross-industry study. Information & Management 2007, 44(5):480-491.
-
(2007)
Information & Management
, vol.44
, Issue.5
, pp. 480-491
-
-
Yeh, Q.J.1
Chang, J.T.2
-
59
-
-
54049155665
-
Reliability engineering: old problems and new challenges
-
Zio E. Reliability engineering: old problems and new challenges. Reliability Engineering & System Safety 2009, 94(2):125-141.
-
(2009)
Reliability Engineering & System Safety
, vol.94
, Issue.2
, pp. 125-141
-
-
Zio, E.1
|