{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T22:32:17Z","timestamp":1759530737292,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319510637"},{"type":"electronic","value":"9783319510644"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-51064-4_17","type":"book-chapter","created":{"date-parts":[[2017,1,3]],"date-time":"2017-01-03T02:21:56Z","timestamp":1483410116000},"page":"205-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Review on Privacy Issues in Hotels: A Contribution to the Definition of Information Security Policies and Marketing Strategies"],"prefix":"10.1007","author":[{"given":"Maria Jos\u00e9","family":"Magalh\u00e3es","sequence":"first","affiliation":[]},{"given":"S\u00e9rgio Tenreiro","family":"de Magalh\u00e3es","sequence":"additional","affiliation":[]},{"given":"Kenneth","family":"Revett","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Jahankhani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,4]]},"reference":[{"key":"17_CR1","first-page":"1","volume":"20","author":"NA John","year":"2016","unstructured":"John, N.A., Peters, B.: Why privacy keeps dying: the trouble with talk about the end of privacy. Inf. Commun. Soc. 20, 1\u201315 (2016)","journal-title":"Inf. Commun. Soc."},{"key":"17_CR2","unstructured":"Federal Trade Commission: Consumer Sentinel Network Data Book for January\u2013December 2015 (2016)"},{"issue":"2","key":"17_CR3","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MSP.2006.31","volume":"4","author":"WJ Wang","year":"2006","unstructured":"Wang, W.J., Yuan, Y., Archer, N.: A contextual framework for combating identity theft. IEEE Secur. Priv. 4(2), 30\u201338 (2006)","journal-title":"IEEE Secur. Priv."},{"key":"17_CR4","unstructured":"Basil, M.: Japanese love hotels: protecting privacy for private encounters. In: E-European Advances in Consumer Research, vol. 8 (2007)"},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.ijhm.2015.03.008","volume":"47","author":"C Morosan","year":"2015","unstructured":"Morosan, C., DeFranco, A.: Disclosing personal information via hotel apps: a privacy calculus perspective. Int. J. Hosp. Manag. 47, 120\u2013130 (2015)","journal-title":"Int. J. Hosp. Manag."},{"issue":"2","key":"17_CR6","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/S0261-5177(99)00042-4","volume":"21","author":"S Wong","year":"2000","unstructured":"Wong, S., Keung, C.: Tourists\u2019 perceptions of hotel frontline employees\u2019 questionable job-related behaviour. Tour. Manag. 21(2), 121\u2013134 (2000)","journal-title":"Tour. Manag."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Bakhtiar, M.F.S., Azdel, A.A., Kamaruddin, M.S.Y., Hamad, N.A.: Perception of environmental strategies in hotels and the influence towards future behavior intention: locals\u2019 perspective in Malaysia. In: Theory and Practice in Hospitality and Tourism Research, p. 343 (2014)","DOI":"10.1201\/b17390-68"},{"issue":"7","key":"17_CR8","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1108\/09596111211258883","volume":"24","author":"K Berezina","year":"2012","unstructured":"Berezina, K., et al.: The impact of information security breach on hotel guest perception of service quality, satisfaction, revisit intentions and word-of-mouth. Int. J. Contemp. Hosp. Manag. 24(7), 991\u20131010 (2012)","journal-title":"Int. J. Contemp. Hosp. Manag."},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.ijhm.2014.05.008","volume":"41","author":"D Kucukusta","year":"2014","unstructured":"Kucukusta, D., Guillet, B.: Measuring spa-goers\u2019 preferences: a conjoint analysis approach. Int. J. Hosp. Manag. 41, 115\u2013124 (2014)","journal-title":"Int. J. Hosp. Manag."},{"issue":"6","key":"17_CR10","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1080\/10548408.2013.810995","volume":"30","author":"D Kucukusta","year":"2013","unstructured":"Kucukusta, D., Pang, L., Chui, S.: Inbound travelers\u2019 selection criteria for hotel spas in Hong Kong. J. Travel Tour. Mark. 30(6), 557\u2013576 (2013)","journal-title":"J. Travel Tour. Mark."},{"issue":"1","key":"17_CR11","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1108\/09596110610641993","volume":"18","author":"J-A Hecht","year":"2006","unstructured":"Hecht, J.-A., Martin, D.: Backpacking and hostel-picking: an analysis from Canada. Int. J. Contemp. Hosp. Manag. 18(1), 69\u201377 (2006)","journal-title":"Int. J. Contemp. Hosp. Manag."},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/j.ijhm.2012.06.002","volume":"35","author":"H-b Kim","year":"2013","unstructured":"Kim, H.-b., Lee, D.-S., Ham, S.: Impact of hotel information security on system reliability. Int. J. Hosp. Manag. 35, 369\u2013379 (2013)","journal-title":"Int. J. Hosp. Manag."},{"issue":"6","key":"17_CR13","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1016\/j.jbusres.2011.09.005","volume":"66","author":"H Oh","year":"2013","unstructured":"Oh, H., Jeong, M., Baloglu, S.: Tourists\u2019 adoption of self-service technologies at resort hotels. J. Bus. Res. 66(6), 692\u2013699 (2013)","journal-title":"J. Bus. Res."},{"issue":"41","key":"17_CR14","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/S1138-5758(09)70049-0","volume":"12","author":"AI Yusta","year":"2009","unstructured":"Yusta, A.I., Ruiz, M.P.M.: An\u00e1lisis de los factores que condicionan la elecci\u00f3n del canal de compra por parte del consumidor: evidencias emp\u00edricas en la industria hotelera. Cuadernos de Econom\u00eda y Direcci\u00f3n de la Empresa 12(41), 93\u2013122 (2009)","journal-title":"Cuadernos de Econom\u00eda y Direcci\u00f3n de la Empresa"},{"issue":"36","key":"17_CR15","first-page":"173","volume":"20","author":"AI Yusta","year":"2010","unstructured":"Yusta, A.I., Ruiz, M.P.M., Zarco, A.I.J.: Condicionantes econ\u00f3micos de la adopci\u00f3n de una innovaci\u00f3n por parte del consumidor: an\u00e1lisis de la compra de servicios online. Innovar 20(36), 173 (2010)","journal-title":"Innovar"},{"issue":"4","key":"17_CR16","first-page":"574","volume":"9","author":"NA Azizan","year":"2015","unstructured":"Azizan, N.A., Said, M.A.A.: The effect of E-commerce usage of online business performance of hotels. Int. Bus. Manag. 9(4), 574\u2013580 (2015)","journal-title":"Int. Bus. Manag."},{"issue":"4","key":"17_CR17","first-page":"341","volume":"14","author":"M Essawy","year":"2013","unstructured":"Essawy, M.: Egyptians\u2019 hotel booking behavior on the internet. Int. J. Hosp. Tour. Adm. 14(4), 341\u2013357 (2013)","journal-title":"Int. J. Hosp. Tour. Adm."},{"key":"17_CR18","first-page":"699","volume":"6","author":"O Radolovi\u0107","year":"2010","unstructured":"Radolovi\u0107, O.: Hotel guest\u2019s privacy protection in tourism business law. Interdisc. Manag. Res. 6, 699\u2013708 (2010)","journal-title":"Interdisc. Manag. Res."},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Brennan-Marquez, K.R.: Fourth Amendment Fiduciaries. Fordham Law Rev. 84(2) (2015)","DOI":"10.2139\/ssrn.2572052"},{"key":"17_CR20","unstructured":"European Parliament and Council: 95\/46\/EC of the European parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off. J. EC 23(6) (1995)"},{"key":"17_CR21","unstructured":"Federal Trade Commission: Privacy online: fair information practices in the electronic marketplace: a federal trade commission report to congress. FTC, Washington DC (2000)"},{"issue":"2","key":"17_CR22","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1177\/0010880407299541","volume":"48","author":"P O\u2019Connor","year":"2007","unstructured":"O\u2019Connor, P.: Online consumer privacy an analysis of hotel company behavior. Cornell Hotel Restaur. Adm. Q. 48(2), 183\u2013200 (2007)","journal-title":"Cornell Hotel Restaur. Adm. Q."},{"issue":"4","key":"17_CR23","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1504\/IJRM.2011.043795","volume":"5","author":"M Tinggi","year":"2011","unstructured":"Tinggi, M., et al.: Customers? Confidence and trust towards privacy policy: a conceptual research of hotel revenue management. Int. J. Revenue Manag. 5(4), 350\u2013368 (2011)","journal-title":"Int. J. Revenue Manag."},{"issue":"3","key":"17_CR24","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1177\/1938965512471892","volume":"54","author":"P-H Ting","year":"2013","unstructured":"Ting, P.-H., et al.: Website evaluation of the top 100 hotels using advanced content analysis and eMICA model. Cornell Hosp. Q. 54(3), 284\u2013293 (2013)","journal-title":"Cornell Hosp. Q."},{"issue":"1","key":"17_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/17406315.2016.1122965","volume":"13","author":"A Dallabona","year":"2016","unstructured":"Dallabona, A.: At home with the Missoni family: narratives of domesticity within hotel Missoni Edinburgh. Home Cult. 13(1), 1\u201321 (2016)","journal-title":"Home Cult."},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Zou, Y., Huang, J.: An importance-performance analysis of influencing factors of guestroom comfort in high star-rated hotels. In: ICSSSM 2012. IEEE (2012)","DOI":"10.1109\/ICSSSM.2012.6252275"},{"issue":"7","key":"17_CR27","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1108\/09596110710818338","volume":"19","author":"CKL Goh","year":"2007","unstructured":"Goh, C.K.L., Law, R.: Applying the \u201ccloak of invisibility\u201d technology to security and privacy in the hotel industry. Int. J. Contemp. Hosp. Manag. 19(7), 600\u2013605 (2007)","journal-title":"Int. J. Contemp. Hosp. Manag."},{"key":"17_CR28","doi-asserted-by":"publisher","unstructured":"Lee, H., Au, N., Law, R.: Presentation formats of policy statements on hotel websites and privacy concerns: a multimedia learning theory perspective. J. Hosp. Tour. Res. (2012). doi:\n                    10.1177\/1096348012436384","DOI":"10.1177\/1096348012436384"}],"container-title":["Communications in Computer and Information Science","Global Security, Safety and Sustainability - The Security Challenges of the Connected World"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-51064-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T08:26:57Z","timestamp":1558513617000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-51064-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319510637","9783319510644"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-51064-4_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"4 January 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICGS3","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Global Security, Safety, and Sustainability","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 January 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 January 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icgs32017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conferences.gsm.org.uk\/icgs3\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}