References
- Aiello, G., Donvito, R., Acuti, D., Grazzini, L., Mazzoli, V., Vannucci, V., & Viglia, G. (2020). Customers’ willingness to disclose personal information throughout the customer purchase journey in retailing: The role of perceived warmth. Journal of Retailing, 96(4), 490–506. https://doi.org/https://doi.org/10.1016/j.jretai.2020.07.001
- Al-Ansi, A., Han, H., Kim, S., & King, B. (2021). Inconvenient experiences amongst Muslim travelers: An analysis of the multiple causes. Journal of Travel Research, 60(6), 1352–1370. https://doi.org/https://doi.org/10.1177/0047287520934870
- Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin, 103(3), 411–423. https://doi.org/https://doi.org/10.1037/0033-2909.103.3.411
- Bard, T. (2011). Negative emotions and their effect on customer complaint behavior. Journal of Service Management, 22(1), 111–134.
- BBC (2018). Marriott hack hits 500 million Starwood guests. Retrieved November 30, 2018 from https://www.bbc.com/news/technology-46401890
- Belanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017–1041. https://doi.org/https://doi.org/10.2307/41409971
- Berezina, K., Cobanoglu, C., Miller, B. L., & Kwansa, F. (2012). The impact of information security breach on hotel guest perception of service quality, satisfaction, revisit intentions and word‐of‐mouth. International Journal of Contemporary Hospitality Management, 24(7), 991–1010.
- Chen, Q., Feng, Y., Liu, L., & Tian, X. (2019). Understanding consumers’ reactance of online personalized advertising: A new scheme of rational choice from a perspective of negative effects. International Journal of Information Management, 44, 53–64.
- Chi, X., & Han, H. (2021). Emerging rural tourism in China’s current tourism industry and tourism behaviors: The case of Anji County. Journal of Travel and Tourism Marketing, 38(1), 58–74. https://doi.org/https://doi.org/10.1080/10548408.2020.1862026
- Collins, G. R., & Cobanoglu, C. (2008). Hospitality information technology: Learning how to use it (6th ed.). Kendall-Hunt.
- Forbes, (2014). 2014: The year big data adoption goes mainstream in the enterprise. Retrieved January 12, 2014 from http://www.forbes.com/siteslouiscolumbus/2014/01/12/12/2014-the-year-big-data-adoption-goes-mainstream-in-the-enterprise
- Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. https://doi.org/https://doi.org/10.1177/002224378101800104
- Gregoire, Y., & Fisher, R. K. (2008). Customer betrayal and retaliation: When your best customers become your worst enemies. Journal of the Academy of Marketing Science, 36(2), 247–261. https://doi.org/https://doi.org/10.1007/s11747-007-0054-0
- Guo, J., Shan, S., Wang, Y., & Khan, Y. A. (2021). Analyzing Chinese customers’ switching intention of smartphone brands: Integrating the push-pull-mooring framework. Discrete Dynamics in Nature and Society, 2021, 6660340. https://doi.org/https://doi.org/10.1155/2021/6660340
- Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate data analysis. Prentice-Hall.
- Han, H., & Hyun, S. S. (2013). Image congruence and relationship quality in predicting switching intention: Conspicuousness of product use as a moderator variable. Journal of Hospitality and Tourism Research, 37(3), 303–329. https://doi.org/https://doi.org/10.1177/1096348012436381
- Han, H., Kim, W., & Hyun, S. S. (2011a). Switching intention model development: Role of service performances, customer satisfaction, and switching barriers in the hotel industry. International Journal of Hospitality Management, 30(3), 619–629. https://doi.org/https://doi.org/10.1016/j.ijhm.2010.11.006
- Han, H., Kim, Y., & Kim, E. (2011b). Cognitive, affective, conative, and action loyalty: Testing the impact of inertia. International Journal of Hospitality Management, 30(4), 1008–1019. https://doi.org/https://doi.org/10.1016/j.ijhm.2011.03.006
- Hilton Hotel & Resorts (2020). Hilton worldwide holdings INC. global statement. Retrieved August 12, 2020 from https://hiltonhonors3.hilton.com/en/policy/global-privacy-statement/index.html#Protecting
- Hou, A. C. Y., Chern, C. C., Chen, H. G., & Chen, Y. C. (2011). Migrating to a new virtual world’: Exploring MMORPG switching through human migration theory. Computers in Human Behavior, 27(5), 1892–1903. https://doi.org/https://doi.org/10.1016/j.chb.2011.04.013
- Hyatt, (2019). Global privacy policy. Retrieved December, 2019 from https://www.hyatt.com/ko-KR/info/privacy-policy-global
- Janakiraman, R., Lim, J. H., & Rishika, R. (2018). The effect of a data breach announcement on customer behavior. Journal of Marketing, 82(2), 85–105. https://doi.org/https://doi.org/10.1509/jm.16.0124
- Kim, Y., Park, Y., & Choi, J. (2017). A study on the adoption of IoT smart home service: Using value-based adoption model. Total Quality Management and Business Excellence, 28(910), 1149–1165. https://doi.org/https://doi.org/10.1080/14783363.2017.1310708
- Lam, I. K. V., & Wong, I. A. (2020). The role of relationship quality and loyalty program in tourism shopping: A multilevel investigation. Journal of Travel and Tourism Marketing, 37(1), 92–111. https://doi.org/https://doi.org/10.1080/10548408.2020.1711848
- Lehto, X. Y., Park, O. J., & Gordon, S. E. (2015). Migrating to new hotels: A comparison of antecedents of business and leisure travelers’ hotel switching intentions. Journal of Quality Assurance in Hospitality and Tourism, 16(3), 235–258. https://doi.org/https://doi.org/10.1080/1528008X.2014.925787
- Liu, X., Shin, H., & Burns, A. C. (2021). Examining the impact of luxury brand’s social media marketing on customer engagement: Using big data analytics and natural language processing. Journal of Business Research, 125, 815–826. https://doi.org/https://doi.org/10.1016/j.jbusres.2019.04.042
- Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. https://doi.org/https://doi.org/10.1287/isre.1040.0032
- Malhotra, A., & Malhotra, C. (2011). Evaluating customer information breaches as service failures: An event study approach. Journal of Service Research, 14(1), 44–59. https://doi.org/https://doi.org/10.1177/1094670510383409
- Mani, Z., & Chouk, I. (2019). Impact of privacy concerns on resistance to smart services: Does the ‘Big Brother effect’ matter? Journal of Marketing Management, 35(15–16), 1460–1476. https://doi.org/https://doi.org/10.1080/0267257X.2019.1667856
- Martin, K. D., Borah, A., & Palmatier, R. W. (2017). Data privacy: Effect on customer and firm performance. Journal of Marketing, 18(1), 36–58. https://doi.org/https://doi.org/10.1509/jm.15.0497
- Miltgen, C. L., Henseler, J., Gelhard, C., & Popovic, A. (2016). Introducing new products that affect consumer privacy: A mediation model. Journal of Business Research, 69(10), 4659–4666. https://doi.org/https://doi.org/10.1016/j.jbusres.2016.04.015
- Miyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer Affairs, 35(1), 27–44. https://doi.org/https://doi.org/10.1111/j.1745-6606.2001.tb00101.x
- Mohd, A. Z. A., Anuar, N., & Ahmad, S. A. P. S. (2019). Customer data security and theft: A Malaysian organization’s experience. Information and Computer Security, 27(1), 81–100. https://doi.org/https://doi.org/10.1108/ICS-04-2018-0043
- Moon, H., Lho, H., & Han, H. (2021). Self-check-in Kisok quality and airline non-contact service maximization: How to win air traveler satisfaction and loyalty in the post-pandemic world? Journal of Travel and Tourism Marketing, 38(4), 383–398. https://doi.org/https://doi.org/10.1080/10548408.2021.1921096
- The New York Times. (2014). Eight (No, Nine!) problems with big data. Retrieved April 6, 2014 from http://www.nytimes.com/2014/04/17/opinion/eight-no-nine-problem-with-big-data.html.
- Ogle, J., Wagner, E., & Talbert, M. (2008). Hotel network security: A study of computer networking in US hotels. Cornell Hospitality Report, 8(15), 1–20.
- Okazaki, S., Eisend, M., Plangger, K., de Ruyter, K., & Grewal, D. (2020). Understanding the strategic consequences of customer privacy concerns: A meta-analytic review. Journal of Retailing, 96(4), 458–473. https://doi.org/https://doi.org/10.1016/j.jretai.2020.05.007
- Phelps, J. E., D’Souza, G., & Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: An empirical investigation. Journal of Interactive Marketing, 15(4), 2–17. https://doi.org/https://doi.org/10.1002/dir.1019
- Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric recognition: Security and privacy concerns. IEEE Security and Privacy, 1(2), 33–42. https://doi.org/https://doi.org/10.1109/MSECP.2003.1193209
- Richman, L. S., & Leary, M. R. (2009). Reactions to discrimination, stigmatization, ostracism, and other forms of interpersonal rejection: A multimotive model. Psychological Review, 116(2), 365–383. https://doi.org/https://doi.org/10.1037/a0015250
- Rime, B. (2009). Emotion elicits the social sharing of emotion: Theory and empirical review. Emotion Review, 1(1), 60–85. https://doi.org/https://doi.org/10.1177/1754073908097189
- Sathish, M., Kumar, K. S., Naveen, K. J., & Jeevanantham, V. (2011). A study on consumer switching behavior in cellular service provider: A study with reference to Chennai. Far East Journal of Psychology and Business, 2(2), 71–81.
- Scharf, S. (2007). Report casts doubt on the impact of data breaches on identity theft. Internal Auditor, 64(4), 23–23.
- Schneider, M. J., Jagpal, S., Gupta, S., Li, S., & Yu, Y. (2017). Protecting customer privacy when marketing with second-party data. International Journal of Research in Marketing, 34(3), 593–603. https://doi.org/https://doi.org/10.1016/j.ijresmar.2017.02.003
- Schumann, J. H., von Wangenheim, F., & Groene, N. (2014). Targeted online advertising: Using reciprocity appeals to increase acceptance among users of free web services. Journal of Marketing, 78(1), 59–75. https://doi.org/https://doi.org/10.1509/jm.11.0316
- Solove, D. J. (2003). Identity theft, privacy, and the architecture of vulnerability. Hastings Law Journal, 54(4), 1227–1276.
- Spiggle, S. (1994). Analysis and interpretation of qualitative data in consumer research. Journal of Consumer Research, 21(3), 491–503. https://doi.org/https://doi.org/10.1086/209413
- Su, L., Hsu, M. K., & Swanson, S. (2014). The effect of tourist relationship perception on destination loyalty at a world heritage site. in China: The mediating role of overall destination satisfaction and trust. Journal of Hospitality and Tourism Research, 41(2), 180–210. https://doi.org/https://doi.org/10.1177/1096348014525630
- Tsai, H., & Fong, L. H. N. (2021). Casino-induced satisfaction of needs and casino customer loyalty: The moderating role of subjective norms and perceived gaming value. Journal of Travel and Tourism Marketing, 38(5), 478–490. https://doi.org/https://doi.org/10.1080/10548408.2021.1952147
- Van Alstyne, M. W., & Lenart, A. (2020). Economic and business dimensions using data and respecting users: Three technical and legal approaches that create value from data and foster user trust. Communications of the ACM, 63(11), 28–30. https://doi.org/https://doi.org/10.1145/3423998
- van der Schyff, K., Flowerday, S., & Furnell, S. (2020). Privacy risk and the use of Facebook Apps: A gender-focused vulnerability assessment. Computers & Security, 96, 101866. https://doi.org/https://doi.org/10.1016/j.cose.2020.101866
- Wang, H., Wang, X. A., Xiao, S., & Liu, J. (2021). Decentralized data outsourcing auditing protocol based on blockchain. Journal of Ambient Intelligence & Humanized Computing, 12(2), 2703–2714. https://doi.org/https://doi.org/10.1007/s12652-020-02432-x
- Xiao, S. (2020). Research on the information security of sharing economy customers based on block chain technology. Information Systems and e-Business Management, 18(4), 487–496. https://doi.org/https://doi.org/10.1007/s10257-018-0380-4
- ZDNet. (2020). Marriott discloses new data breach impacting 5.2 million hotel guests. Retrieved March 31, 2020 from https://www.zdnet.com/article/marriott-discloses-new-data-breach-impacting-5-2-million-hotel-guests/