Please use this identifier to cite or link to this item:
Title: Analyzing protection of hotel networks in Hong Kong
Authors: Leung, R
Law, R 
Issue Date: 2013
Source: Asian journal of tourism and hospitality research, 2013, v. 5, no. 1, p. 25-31 How to cite?
Journal: Asian journal of tourism and hospitality research 
Abstract: On a daily basis and for different applications, people interact with Information Technology (IT) at work and at home. The wide applications of IT directly apply to the hotel industry. At present, no hotel can maintain its competitiveness without the assistance of IT. The richer the customer information stored in a database, the more comprehensive level of services can be provided, and a higher level of customer satisfaction can be achieved. With the majority of computer servers attached to the Internet, the opportunities of customer data being inappropriately accessed by intruders have, unfortunately, increased dramatically. In addition, virus and worm attacks could create security flaws for hackers to gain access to hotel customers’ confidential data like credit card information. To protect their valuable information, hotel IT managers have to ensure that their networks are well-protected. Furthermore, hotel operations are now heavily IT-dependent. As such, good disaster recovery planning can ensure the business continuity during system downtime. This study presents the findings of the experience of 32 Hong Kong hotel IT managers who shared their hotels’ current IT security policies and disaster recovery preparations.
ISSN: 1908-8388
Appears in Collections:Journal/Magazine Article

View full-text via PolyU eLinks SFX Query
Show full item record

Page view(s)

Last Week
Last month
Citations as of Feb 19, 2019

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.