Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-5 of 5
Keywords: Security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Perceptions and challenges of blockchain adoption in tourism industry: a study on trust, privacy and security
Available to Purchase
Journal of Hospitality and Tourism Technology (2025) 16 (3): 429–449.
Published: 29 October 2024
... and expectations, especially in terms of trustworthiness and the management of privacy and security concerns. Design/methodology/approach The research used a quantitative methodology, collecting data from 135 industry practitioners across five tourism sectors (lodging, connected industries, entertainment, FandB...
Journal Articles
Factors influencing hotel customers’ intention to use a fingerprint system
Available to Purchase
Journal of Hospitality and Tourism Technology (2014) 5 (2): 98–125.
Published: 12 August 2014
... and tested the hypotheses using structural equation modeling. Findings – This study found seven factors (i.e. perceived usefulness, perceived ease of use, subjective norm, perceived convenience, perceived data security, perceived property security and personal concerns) which significantly influence...
Journal Articles
An empirical examination of guests' adoption of interactive mobile technologies in hotels: Revisiting cognitive absorption, playfulness, and security
Available to Purchase
Journal of Hospitality and Tourism Technology (2014) 5 (1): 78–94.
Published: 11 March 2014
... validates a variant of the technology acceptance model, extended with constructs such as cognitive absorption and security that capture better the context of IMT in hotels. Findings – The conceptual model explained a large part of variability in intentions to use IMT. Among several predictors...
Journal Articles
An analysis of the relationship between travel preferences and intentions to use registered traveler biometric systems in air travel
Available to Purchase
Journal of Hospitality and Tourism Technology (2013) 4 (1): 23–39.
Published: 15 March 2013
...Cristian Morosan Purpose Today's increasingly interconnected world presents substantial challenges for the security of air travel, which can be attenuated by using registered traveler biometric systems (RTBS). While several systems have been deployed (i.e. Global Entry), it is not clear how a mass...
Journal Articles
Biometric solutions for today's travel security problems
Available to Purchase
Journal of Hospitality and Tourism Technology (2012) 3 (3): 176–195.
Published: 28 September 2012
...Cristian Morosan Purpose The purpose of this paper is to analyze the applicability of biometric systems in travel and explain how they can be used in response to today's increasing security problems. Design/methodology/approach This research is conceptual. Its analysis is based on an extensive...
