Main Article Content
Abstract
Keywords
Article Details
Authors retain the copyright without restrictions for their published content in this journal. IJTHR is a Sherpa Romeo Journal.
Publishing License
This is an open-access article distributed under the terms of
References
- Aziz, H. (1995). Understanding attacks on tourists in Egypt. Tourism Management, 16(2), 91-95. DOI: https://doi.org/10.1016/0261-5177(94)00016-4
- Biometric Institute. (N.D). Working Definitions. Available from: http://www.biometricsinstitute.org/pages/aboutbiometrics. html. Retrieved 27.03.2014.
- Cassedy, K. (1991). Crisis Management Planning in the Travel and Tourism Industry: A Study of Three Destination Cases and a Crisis Management Planning Manual. San Francisco: Pacific Asia Travel Association.
- Chin, J. (2003). Lessons learned from 9/11 by NYC hotel security: A model for other cities. Hotel/Casino/Resort Security. March, 10.
- Davis, A. (1997). The body as password. Available from: http://www.wired.com/wired/archive/5.07/biometrics. html?pg=2. Last accessed on 2014 Mar 25
- Economist. (2003). The print edition: Prepared to be scanned. Available from: http://www.economist.com/scince/tq/displayStory.cfm?story_id=456, http://www.elsafe.com/binary?id=29450. Accessed 27.03.2014.
- ElSafe. (N.D.). Available from: http://www.elsafe.com/page?id=456, http://www.elsafe.com/binary?id=29450.
- Faulkner, B. (2001). Towards a framework for tourism disaster management. Tourism Management, 22(2), 135-147. DOI: https://doi.org/10.1016/S0261-5177(00)00048-0
- Faulkner, B., Laws, E., & Moscardo, G. (1998). Embracing and Managing Change in Tourism: International Case Studies. London: Routledge.
- Faulkner, B., & Russell, R. (1997). Chaos and complexity in tourism: In search of a new perspective. Pacific Tourism Review, 1(2), 93-102.
- Find Biometrics. (2007). Biometric Sensors and Detectors. Available from: http://www.findbiometrics.com/solutions/biometric-sensors-detectors/. Accessed 27.03.2014.
- Fink, S. (1986). Crisis Management: Planning for the Inevitable. New York, NY: American Management Association.
- Henderson, J. (2003). Communicating in a crisis: Flight SQ 006. Tourism Management, 24(3), 279-287. DOI: https://doi.org/10.1016/S0261-5177(02)00070-5
- Henderson, J. (2008). Managing crises: UK civil aviation, BAA airports and the August 2006 terrorist threat. Tourism and Hospitality Research, 8(2), 125-136. DOI: https://doi.org/10.1057/thr.2008.12
- Hospitality Upgrade. (2003). Available from: http://www.hospitalityupgrade.com/__852568890071b5b7. nsf/0/08b538906813 c0b085256c8e3e?Open Document& Highlight=0,biometric. Last accessed on 2014 Mar 23.
- IATA. (1998). Crisis Communication Manual. Monreal: Air Transport Association.
- Jarvis, A. (N.D). Facial recognition, retinal iris scans, DNA, fingerprinting, brain printing, ear matching, smart cards. What’s Next? Available from: http://www.forensicevidence.com/site/ID/ID_Biometric_jarvis.html. Last accessed on 2014 Mar 09.
- Kroeker, K.L. (2002). Graphics and security: Exploring visual biometrics. Computer Graphics and Applications, IEEE, 22(4), 16-21. DOI: https://doi.org/10.1109/MCG.2002.1016693
- Lehrman, C.K. (1986). When fact and fantasy collide crisis management in the travel industry. Public Relations Journal, 42(4), 25-28.
- Levin, G. (2001). Real World, Most Demanding Biometric System Usage. Paper presented at the Biometric Consortium.
- Meyersa, M., & Millsb, J.E. (2007). Are biometric technologies the wave of the future in tourism and hospitality? CERIAS Tech Report 2005-07. Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN 47907-2086.
- National Center for State Courts. (2003). Biometric Facial Recognition. Available from: http://www.ctl.ncsc.dni.us/biomet%20web/bmfacial.html. Accessed 27.03.2014.
- National Center for State Courts. (N.D.). Available from: http://www.ctl.ncsc.dni.us/biomet%20web/BMFacial.html, http://www.ctl.ncsc.dni.us/biomet%20web/BMIris.html. Retrieved 28.03.2014.
- National Information Assurance Partnership. (2003). U.S. Government Approved Protection Profile - U.S. Government Biometric Verification Mode Protection Profile for Medium Robustness Environments, Version 1.0. pp. 15. Available from: https://www.niap-ccevs.org/pp/PP_BVM_MR_v1.0/. Accessed 27.03.2014.
- Pizam, A. (2002). Tourism and terrorism. International Journal of Hospitality Management, 21, 1-3. DOI: https://doi.org/10.1016/S0278-4319(01)00037-8
- Prideaux, B. (1999). Tourism perspectives of the Asian financial crisis: Lessons for the future. Current Issues in Tourism, 2(4), 279-293. DOI: https://doi.org/10.1080/13683509908667856
- Prideaux, B. (2004). The need to use disaster planning frameworks to respond to major tourism disasters. Journal of Travel and Tourism Marketing, 15(4), 281-298. DOI: https://doi.org/10.1300/J073v15n04_04
- Richardson, B. (1993). Why we need to teach crisis management and to use case studies to do it. Management Learning, 24(2), 138-148. DOI: https://doi.org/10.1177/135050769302400203
- Ross, A., Jain, A., & Pankanti, S. (N.D.). Capturing hand geometry and extracting features. Available from: http://www.biometrics.ese.msu.edu/hand_proto.html. Last accessed on 2014 Apr 17.
- Santana, G. (2004). Crisis management and tourism. Journal of Travel and Tourism Marketing, 15(4), 299-321. DOI: https://doi.org/10.1300/J073v15n04_05
- Spangler, T. (Producer). (2004) Face Invaders, Ziff Media, pp.3, access date 27 March 2014.
- Tinari, M. (2003). Reducing Lawsuit Vulnerability of Your Hotel Parking Areas: Advise From a Legal Expert. Hotel/Casino/Resort Security September, 3-4.
- Turner, B.A. (1976). The organizational and interorganizational development of disasters. Administrative Science Quarterly, 21(3), 378-397. DOI: https://doi.org/10.2307/2391850
- Wayman, J. (2000). Available from: http://www.biomet.ch/aboutus.htm. Last accessed on 2014 Mar 07
- Witt, S.F., & Moore, S.A. (1992). Promoting tourism in the face of terrorism: The role of special events in Northern Ireland. Journal of International Consumer Marketing, 4(3), 63-75. DOI: https://doi.org/10.1300/J046v04n03_05
References
Aziz, H. (1995). Understanding attacks on tourists in Egypt. Tourism Management, 16(2), 91-95. DOI: https://doi.org/10.1016/0261-5177(94)00016-4
Biometric Institute. (N.D). Working Definitions. Available from: http://www.biometricsinstitute.org/pages/aboutbiometrics. html. Retrieved 27.03.2014.
Cassedy, K. (1991). Crisis Management Planning in the Travel and Tourism Industry: A Study of Three Destination Cases and a Crisis Management Planning Manual. San Francisco: Pacific Asia Travel Association.
Chin, J. (2003). Lessons learned from 9/11 by NYC hotel security: A model for other cities. Hotel/Casino/Resort Security. March, 10.
Davis, A. (1997). The body as password. Available from: http://www.wired.com/wired/archive/5.07/biometrics. html?pg=2. Last accessed on 2014 Mar 25
Economist. (2003). The print edition: Prepared to be scanned. Available from: http://www.economist.com/scince/tq/displayStory.cfm?story_id=456, http://www.elsafe.com/binary?id=29450. Accessed 27.03.2014.
ElSafe. (N.D.). Available from: http://www.elsafe.com/page?id=456, http://www.elsafe.com/binary?id=29450.
Faulkner, B. (2001). Towards a framework for tourism disaster management. Tourism Management, 22(2), 135-147. DOI: https://doi.org/10.1016/S0261-5177(00)00048-0
Faulkner, B., Laws, E., & Moscardo, G. (1998). Embracing and Managing Change in Tourism: International Case Studies. London: Routledge.
Faulkner, B., & Russell, R. (1997). Chaos and complexity in tourism: In search of a new perspective. Pacific Tourism Review, 1(2), 93-102.
Find Biometrics. (2007). Biometric Sensors and Detectors. Available from: http://www.findbiometrics.com/solutions/biometric-sensors-detectors/. Accessed 27.03.2014.
Fink, S. (1986). Crisis Management: Planning for the Inevitable. New York, NY: American Management Association.
Henderson, J. (2003). Communicating in a crisis: Flight SQ 006. Tourism Management, 24(3), 279-287. DOI: https://doi.org/10.1016/S0261-5177(02)00070-5
Henderson, J. (2008). Managing crises: UK civil aviation, BAA airports and the August 2006 terrorist threat. Tourism and Hospitality Research, 8(2), 125-136. DOI: https://doi.org/10.1057/thr.2008.12
Hospitality Upgrade. (2003). Available from: http://www.hospitalityupgrade.com/__852568890071b5b7. nsf/0/08b538906813 c0b085256c8e3e?Open Document& Highlight=0,biometric. Last accessed on 2014 Mar 23.
IATA. (1998). Crisis Communication Manual. Monreal: Air Transport Association.
Jarvis, A. (N.D). Facial recognition, retinal iris scans, DNA, fingerprinting, brain printing, ear matching, smart cards. What’s Next? Available from: http://www.forensicevidence.com/site/ID/ID_Biometric_jarvis.html. Last accessed on 2014 Mar 09.
Kroeker, K.L. (2002). Graphics and security: Exploring visual biometrics. Computer Graphics and Applications, IEEE, 22(4), 16-21. DOI: https://doi.org/10.1109/MCG.2002.1016693
Lehrman, C.K. (1986). When fact and fantasy collide crisis management in the travel industry. Public Relations Journal, 42(4), 25-28.
Levin, G. (2001). Real World, Most Demanding Biometric System Usage. Paper presented at the Biometric Consortium.
Meyersa, M., & Millsb, J.E. (2007). Are biometric technologies the wave of the future in tourism and hospitality? CERIAS Tech Report 2005-07. Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN 47907-2086.
National Center for State Courts. (2003). Biometric Facial Recognition. Available from: http://www.ctl.ncsc.dni.us/biomet%20web/bmfacial.html. Accessed 27.03.2014.
National Center for State Courts. (N.D.). Available from: http://www.ctl.ncsc.dni.us/biomet%20web/BMFacial.html, http://www.ctl.ncsc.dni.us/biomet%20web/BMIris.html. Retrieved 28.03.2014.
National Information Assurance Partnership. (2003). U.S. Government Approved Protection Profile - U.S. Government Biometric Verification Mode Protection Profile for Medium Robustness Environments, Version 1.0. pp. 15. Available from: https://www.niap-ccevs.org/pp/PP_BVM_MR_v1.0/. Accessed 27.03.2014.
Pizam, A. (2002). Tourism and terrorism. International Journal of Hospitality Management, 21, 1-3. DOI: https://doi.org/10.1016/S0278-4319(01)00037-8
Prideaux, B. (1999). Tourism perspectives of the Asian financial crisis: Lessons for the future. Current Issues in Tourism, 2(4), 279-293. DOI: https://doi.org/10.1080/13683509908667856
Prideaux, B. (2004). The need to use disaster planning frameworks to respond to major tourism disasters. Journal of Travel and Tourism Marketing, 15(4), 281-298. DOI: https://doi.org/10.1300/J073v15n04_04
Richardson, B. (1993). Why we need to teach crisis management and to use case studies to do it. Management Learning, 24(2), 138-148. DOI: https://doi.org/10.1177/135050769302400203
Ross, A., Jain, A., & Pankanti, S. (N.D.). Capturing hand geometry and extracting features. Available from: http://www.biometrics.ese.msu.edu/hand_proto.html. Last accessed on 2014 Apr 17.
Santana, G. (2004). Crisis management and tourism. Journal of Travel and Tourism Marketing, 15(4), 299-321. DOI: https://doi.org/10.1300/J073v15n04_05
Spangler, T. (Producer). (2004) Face Invaders, Ziff Media, pp.3, access date 27 March 2014.
Tinari, M. (2003). Reducing Lawsuit Vulnerability of Your Hotel Parking Areas: Advise From a Legal Expert. Hotel/Casino/Resort Security September, 3-4.
Turner, B.A. (1976). The organizational and interorganizational development of disasters. Administrative Science Quarterly, 21(3), 378-397. DOI: https://doi.org/10.2307/2391850
Wayman, J. (2000). Available from: http://www.biomet.ch/aboutus.htm. Last accessed on 2014 Mar 07
Witt, S.F., & Moore, S.A. (1992). Promoting tourism in the face of terrorism: The role of special events in Northern Ireland. Journal of International Consumer Marketing, 4(3), 63-75. DOI: https://doi.org/10.1300/J046v04n03_05