1,053
Views
18
CrossRef citations to date
0
Altmetric
Original Articles

Hotel Customer Perceptions of Biometric Door Locks: Convenience and Security Factors

, &
Pages 162-183 | Published online: 11 Oct 2008

REFERENCES

  • Aite , Group . 2006 . What will it take for biometric technologies to finally take off? , Boston : Aite Group, LLC. .
  • Ajzen , I. 1991 . The theory of planned behavior . Organizational Behavior and Human Decision Processes , 50 : 179 – 211 .
  • Ajzen , I. and Fishbein , M. 1980 . Understanding attitudes and predicting social behavior , Englewood Cliffs, NJ : Prentice Hall .
  • Chirillo , J. and Blaul , S. 2003 . Implementing biometric security , Indianapolis, IN : Wiley Publishing, Inc. .
  • Creative Vision Electronics (2004, June). Saflok, Samsung Si, creative vision electronics partner to introduce hospitality's first wireless biometric fingerprint locking system http://www.saflok.com/product_pdfs/system_6000_scrn.pdf (Accessed: 2 September 2005 ).
  • Dabholkar , P. A. 1996 . Consumer evaluation of new technology-based self-service options: An investigation of alternative models of service quality . International Journal of Research in Marketing , 13 : 29 – 51 .
  • Davis , F. 1989 . September). Perceived usefulness, perceived ease of use, and user acceptance of information technology . MIS Quarterly , 31 : 9 – 340 .
  • Davis , F. D. , Bagozzi , R. P. and Warshaw , P. R. 1989 . User acceptance of computer technology: A comparison of two theoretical models . Management Science , 35 : 982 – 1002 .
  • Electronic Data System. (2005). Survey finds consumers open to the use of innovative identification methods such as biometrics www.findbiometrics.com/Pages/feature%20articles/innovative-uses.html (Accessed: 7 October 2005 ).
  • Feder, B. J. (2004, May 31). Technology strains to find menace in the crowd. New York Times http://www.biometricgroup.com/in_the_news/05_31_04.html (Accessed: 11 October 2005 ).
  • Fishbein , M. and Ajzen , I. 1975 . Belief, attitude, intention, and behavior: An introduction to theory and research , Reading, MA : Addison-Wesley .
  • Grogan, J. (2005, March 11). Gazing into the future, one iris at a time. Naples Daily News http://www.biometricgroup.com/in_the_news/03_11_05.html (Accessed: 15 October 2005 ).
  • Hair , J. F. , Black , W. C. , Babin , B. J. , Anderson , R. E. and Tatham , R. L. 2006 . Multivariate data analysis , Upper Saddle River, NJ : Prentice Hall .
  • International Biometric Group. (2005). Biometric market and industry report 2004–2008 http://www.biometricgroup.com/reports/public/market_report.html (Accessed: 1 September 2005 ).
  • Javelin & Better Business Bureau. (2005). Identity theft survey http://www.privacyrights.org/ar/idtheftsurveys.htm#BBB (Accessed: 15 November 2005 ).
  • Las Vegas Convention Visitors Authority . 2006 . 2005 Las Vegas visitor profile , Las Vegas, NV : Author .
  • Maghiros , I. , Punie , Y. , Delaitre , S. , Lignos , E. , Rodríguez , C. Ulbrich , M. 2005 . Biometrics at the frontiers: Assessing the impact on society , Spain : European Commission's Joint Research Centre (JRC) .
  • Maltoni , D. , Maio , D. , Jain , A. and Prabhakar , S. 2003 . Handbook of fingerprint recognition , New York : Springer Verlag .
  • Meuter , M. L. , Bitner , M. J. , Ostrom , A. L. and Brown , S. W. 2005 . Choosing among alternative service delivery mode: An investigation of customer trial of self-service technologies . Journal of Marketing , 69 : 61 – 83 .
  • Meuter , M. L. , Ostrom , A. L. , Bitner , M. J. and Roundtree , R. 2003 . The influence of technology anxiety on consumer use and experiences with self-service technologies. Journal of . Business Research , 56 : 899 – 906 .
  • Meuter , M. L. , Ostrom , A. L. , Roundtree , R. I. and Bitner , M. J. 2000 . Self-service technologies: Understanding customer satisfaction with technology-based service encounters . Journal of Marketing , 64 ( 3 ) : 50 – 64 .
  • Miller , V. 2005 . Casinos leery of biometrics, new pay systems . Las Vegas Business Press , 22 ( 52 ) : 12
  • Most , M. 2004 . Toward privacy enhancing: Application of biometrics . Digital ID World June/July , : 18 – 20 .
  • Nanavati , S. , Thieme , M. and Nanavati , R. 2002 . Biometrics: Identity verification in a Networked World , New York : John Wiley & Sons, Inc. .
  • Norušis , M. J. 2005 . SPSS 14.0 Statistic Procedure Companion , Upper Saddle River, NJ : Prentice Hall .
  • Nunnally , J. C. 1978 . Psychometric theory , 2nd , New York : McGraw-Hill .
  • Pease, F. (2003). Biometric application: A question of identity. Pictures of the Future, Spring, 35–37 http://www.siemens.com/index.jsp?sdc_p=t15ls2o1161115i1161094cd1184570fmu20n1182567pFEz3&sdc_sid=26129377244& (Accessed: 10 July 2006 ).
  • Ratha , N. K. , Connell , J. H. and Bolle , R. M. 2001 . Enhancing security and privacy in biometric-based authentication systems . IBM System Journal , 40 : 614 – 634 .
  • Riley , R. A. and Kleist , V. F. 2005 . The biometric technologies business case: A systematic approach . Information Management & Computer Security , 13 ( 2 ) : 89 – 105 .
  • Rinehart , G. 2000 . Biometric payment: The new age of currency . Hospitality Upgrade , 11 Spring : 4 – 116 .
  • Rogers , E. M. 1983 . Diffusion of Innovations , 3rd , New York : The Free Press .
  • Venkatesh , V. 2000 . Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model . Information Systems Research , 11 : 342 – 365 .
  • Venkatesh , V. and Davis , F. D. 2000 . A theoretical extension of the technology acceptance model: Four longitudinal field studies . Management Science , 46 : 186 – 204 .
  • Whitford , M. 1999 . DNA shows the way . Hotel & Motel Management , 214 : 52 – 53 .
  • Woodward , J. D. 1997 . Biometrics: Privacy's foe or privacy's friend? . Proceedings of the IEEE , 85 : 1480 – 1492 .
  • Woodward , J. D. , Orlans , N. M. and Higgins , P. T. 2003 . Biometrics , New York : McGraw-Hill Professional .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.