2013
DOI: 10.1016/j.ijhm.2012.06.002
|View full text |Cite
|
Sign up to set email alerts
|

Impact of hotel information security on system reliability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(21 citation statements)
references
References 43 publications
0
21
0
Order By: Relevance
“…Zhang and Paxson (2000) asserted that IT could open a back door for threats to customers by using unauthorized access to the hotel and guests' data, which demonstrates the necessity of an efficient computer security system. A hotel may secure its information and protect it from prohibited usage (H. Kim, Lee, & Ham, 2012). This insures the software and hardware security works continuously without information interruption (Azaiez & Bier, 2007;Zio, 2009), and protects the guests' personal data (O'Connor, 2007).…”
Section: Emergency Management Preparednessmentioning
confidence: 99%
See 1 more Smart Citation
“…Zhang and Paxson (2000) asserted that IT could open a back door for threats to customers by using unauthorized access to the hotel and guests' data, which demonstrates the necessity of an efficient computer security system. A hotel may secure its information and protect it from prohibited usage (H. Kim, Lee, & Ham, 2012). This insures the software and hardware security works continuously without information interruption (Azaiez & Bier, 2007;Zio, 2009), and protects the guests' personal data (O'Connor, 2007).…”
Section: Emergency Management Preparednessmentioning
confidence: 99%
“…Zhang and Paxson (2000) asserted that IT could open a back door for threats to customers by using unauthorized access to the hotel and guests’ data, which demonstrates the necessity of an efficient computer security system. A hotel may secure its information and protect it from prohibited usage (H. Kim, Lee, & Ham, 2012).…”
Section: Literature Reviewmentioning
confidence: 99%
“…The works of the following authors are devoted to security issues in hotel enterprises: Hong-bumm Kim, Dong-Soo Lee, SunnyHam, 2013 [1], Eric S. W. Chan, Doris Lam, 2013 [2], Peter E. Tarlow, 2014 [3], Charles Brossman, 2016 [4]. The issues of providing additional services in hotel enterprises are covered in the works of the following authors: Özgür Davras, Meltem Caber 2019 [5], Asunción Beerli-Palacio, Josefa D. Martín-Santana, Crisanto Román-Montoya 2020 [6], Shan Liu, Baojun Gao, Michael Gallivan, Yeming Gong 2020 [7], Seongsoo Jang, Luiz Moutinho 2019 [8].…”
Section: Methodsmentioning
confidence: 99%
“…Reliability of an information system refers to the availability of the system (Kim, Lee, & Ham, 2013). Availability is important because organizations have become increasingly dependent on their IT infrastructure.…”
Section: Security and Reliability Of Cloudmentioning
confidence: 99%
“…Australia is especially vulnerable to power/Internet outages because of severe weather conditions. The security of a system also affects its availability (Cooper, 2006;Hanmer, McBride, & Mendiratta, 2007;Kim, et al, 2013). Systems that are vulnerable to Distributed Denial of Service (DDoS) attacks or malicious software are unlikely to perform the required operations when compromised, which will therefore affect availability.…”
Section: Security and Reliability Of Cloudmentioning
confidence: 99%