References
- Asokan , N. , Philippe , A. , Steiner , M. and Waidner , M. 1997 . The state of the art in electronic payment systems . IEEE JNL , 30 ( 9 ) : 28 – 35 .
- Clark , T. 2007 . Protecting payments Retrieved November 26, 2007, from www. htmagazine. com/ HT/ archive/ 1007/ 1007_04.html
- Cobanoglu , C. and Erdem , M. 2009 . 11th annual restaurant technology study: Driving efficiency . Supplement to Hospitality Technology , 13 ( 2 )
- Compliance validation details for merchants Retrieved November 26, 2007, from: http://usa.visa.com/merchants/risk_management/cisp_merchants.html?it=c/merchants/risk_management/cisp.html/Defining%20Your%20Merchant%20Level#anchor_2
- Epstein , R. A. and Brown , T. P. 2006 . The war on plastic . Regulation , 29 ( 3 ) : 12 – 16 . Available at SSRN: http://ssrn.com/abstract=944870
- Gentry , C. R. 2007 . Hardening the target: Achieving PCI compliance is one step to network security . Chain Store Age , 83 ( 5 ) May : 248
- Gerdes , G. G. 2008 . Recent payment trends in the United States . Federal Reserve Bulletin , 2008 ( Oct ) : A75 – A106 .
- Hoffman , D. L. and Novak , T. P. 1999 . Building ConTrust online . Communications of the ACM , 42 ( 4 ) : 80 – 85 .
- Kalogeris , R. 2005 . Are you S.A.F.E.? Secure against fraud electronically . Hospitality Upgrade , Fall : 160
- Leach , T. Payment card industry data security standards: From the council's perspective . The Second Payment Card Industry Compliance in Hospitality Conference . Houston , TX .
- McMillan , R. 2008 . Three charged in Dave & Buster's hacking job . PCWorld. , Retrieved December 19, 2008, from www.pcworld.com/businesscenter/article/145781/three_ charged_in_dave_amp_busters_hackingJob.html
- Navetta , D. Bridging the communications divide between IT, risk, and legal . The Second Payment Card Industry Compliance in Hospitality Conference . Houston , TX .
- Parker , J. Lessons learned in the field: How to not repeat them in the future–The operators' IT viewpoint . The Second Payment Card Industry Compliance in Hospitality Conference . Houston , TX .
- Pastrikos , C. 2004 . Identity theft statutes: Which will protect Americans the most? . Albany Law Review. , 67 ( 4 ) : 1137 – 1157 .
- 2006 . PCI compliance deadline too soon for most Retrieved on October 23, 2007, from www.itbusinessedge.com/item/?ci=20698
- September 2007 . PCI compliance: Low risk, high reward September , Retrieved November 26, 2007, from Hughes Networks Systems website: www.hughes.com/HUGHES/Doc/0/BIJENRGP3AT4JFJSEAUGLUJ7C1/PCI%20Compliance.H36659.09–24-07.pdf
- September 2007 . Profiting from PCI compliance September , Retrieved November 26, 2007, from IBM Corporation website, www-935.ibms.com/services/us/iss/pdf/profiting_from_pci_compliance_wp.pdf
- Rylander , R. G. , Propst , D. B. and McMurtry , T. R. 1995 . Nonresponse and recall biases in a survey of traveler spending . Journal of Travel Research , 33 ( 4 ) : 39 – 45 .
- Sidel , R. 2007 . Card companies crack down on restaurants . Wall Street Journal, Eastern Edition , 249 ( 69 ) : B1 – B2 .
- The skinny on skimming . July 2007 . Stores Magazine. July , Retrieved March 7, 2009, from www.stores.org/LPinformation_new/2007/07/LPiEditSidel.asp
- Visa . 2006 . Retrieved December 19, 2008, from http://usa.visa.com/merchants/new_acceptance/benefits/index.html