Access the full text.
Sign up today, get DeepDyve free for 14 days.
J. Pae, J. Hyun (2006)
Technology advancement strategy on patronage decisions: the role of switching costs in high-technology marketsOmega-international Journal of Management Science, 34
C. Cobanoglu (2007)
A Critical Look at Restaurant Network SecurityJournal of Foodservice Business Research, 10
R. Groves, R. Cialdini, M. Couper (1992)
UNDERSTANDING THE DECISION TO PARTICIPATE IN A SURVEYPublic Opinion Quarterly, 56
(2007)
Survey shows security budgets on the rise
(2005)
SPSS 14.0 statistic procedure companion
Step right up: Kiosks command attention across verticals. Hospitality Technology Magazine
(2008)
PCI Data Security Standard (PCI DSS)
(2007)
Final report: Green Lodging Project Phase 2: Energy efficiency and clean air practices
M. Hogan (2004)
The “Next Big Thing”:The Future of Diplomatic History in a Global AgeDiplomatic History, 28
L. Jackson (2009)
Biometric technology: the future of identity assurance and authentication in the lodging industry.International Journal of Contemporary Hospitality Management, 21
M. Meuter, Amy Ostrom, R. Roundtree, M. Bitner (2000)
Self-Service Technologies: Understanding Customer Satisfaction with Technology-Based Service EncountersJournal of Marketing, 64
C. Cobanoglu, F. DeMicco (2007)
To Be Secure or Not to BeInternational Journal of Hospitality & Tourism Administration, 8
M. Norusis (2000)
SPSS 13.0 Guide to Data Analysis
(2009)
Check-in check-out: Managing hotel operations (8th ed.)
(2005)
Where are the wires? Caterer & Hotelkeeper
A. Tse, K. Tse, Chow Yin, Choy Ting, Ko Yi, Kwan Yee, W. Hong (1995)
Comparing Two Methods of Sending out Questionnaires: E-mail versus MailInternational Journal of Market Research, 37
James Stanier (2011)
Green technologyXRDS, 17
Mark Fuller, Andrew Hardin, C. Scott (2007)
Diffusion of virtual innovationData Base, 38
Carey Goh, R. Law (2007)
Applying the “cloak of invisibility” technology to security and privacy in the hotel industryInternational Journal of Contemporary Hospitality Management, 19
Arjun Singh, M. Kasavana (2005)
The Impact of Information Technology on Future Management of Lodging Operations: A Delphi Study to Predict Key Technological Events in 2007 and 2027Tourism and Hospitality Research, 6
F. Calisir, C. Gumussoy (2008)
Internet banking versus other banking channels: Young consumers' viewInt. J. Inf. Manag., 28
S. Zailani, R. Salam (2006)
The Adoption of Technology System in the Malaysian Public Sector2006 2nd International Conference on Information & Communication Technologies, 1
Jacqueline Beuningen, Ko Ruyter, Martin Wetzels, Sandra Streukens (2009)
Customer Self-Efficacy in Technology-Based Self-ServiceJournal of Service Research, 11
Joseph Lema (2009)
Preparing Hospitality Organizations for Self-Service TechnologyJournal of Human Resources in Hospitality & Tourism, 8
E. Tse, S. Ho (2006)
Targeting Sports TeamsCornell Hotel and Restaurant Administration Quarterly, 47
George Neville-Neil (2007)
The Next Big ThingQueue, 5
G. Stoneburner (2001)
Underlying technical models for information technology security :: recommendations of the National Institute of Standards and Technology
J. Canavan (2012)
Fundamentals of Network Security
Yona Flink (2002)
Who holds the key to IT security?Inf. Secur. Tech. Rep., 7
David Belsley, E. Kuh, R. Welsch (1980)
Regression Diagnostics: Identifying Influential Data and Sources of Collinearity
(1996)
Tracking the progress of e-mail versus snail mail
David Schaefer, D. Dillman (1998)
Development of a Standard E-Mail Methodology: Results of an ExperimentPublic Opinion Quarterly, 62
(2007)
SMBs spending for security
S. Doyle (2007)
Self-service delivery and the growing roles of channelsJournal of Database Marketing & Customer Strategy Management, 14
C. Schneider, P. Datta (2006)
Adoption of WLANs in the Hotel Industry: A Theoretical Cost-analytic FrameworkJournal of Hospitality and Tourism Management, 13
(2005)
What's next in self-service. The Bottomline: The Journal of Hospitality Financial and Technology Professionals
C. Enz (2009)
The Physical Safety and Security Features of U.S. HotelsCornell Hospitality Quarterly, 50
J. Krosnick (1977)
Survey ResearchApplied Psychological Measurement, 1
X. Qu (2007)
Multivariate Data AnalysisTechnometrics, 49
B. Allenby (2000)
The Fallacy of “Green Technology”American Behavioral Scientist, 44
(2008)
The staying power of sustainability
G. Stoneburner, Alice Goguen, Alexis Feringa (2002)
Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology
(2008)
Understanding PCI compliance
(2003)
Business research methods (7th ed.). Florence, KY: SouthWestern
E. Rogers (1964)
Diffusion of innovationsEncyclopedia of Sport Management
(2007)
Green hospitality and the changing demands of the tourism industry
During the past decade, information technology (IT) has significantly changed the way the hotel industry controls and manages operations. While many technologies have been utilized, some newer technologies have emerged in the literature and in practice, and many of them impact the hotel's security. The purpose of this study is to understand how hotels with different service levels are currently using these technologies, and if having an internal IT department and sufficient IT budget impacts the use of these technologies. Among the results, this study identified a gap between hoteliers’ understanding of IT budget adequacy and the adequacy of installed IT security systems. The results also showed that luxury properties were significantly more likely to employ adequate IT security systems than other service levels.
International Journal Of Hospitality & Tourism Administration – Taylor & Francis
Published: Jul 1, 2013
Keywords: hotel IT; security; green technology; self-service technology; wireless
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.