H. Conclusion/Recommendations

The foundation of hotel industry safety and security organization involved roles and functions and its safety and security success domains and that success in hotel industry safety and security not just happen to be in operations influence over various products and services but, business can’t fully exercise overall stature of the business without hotel industry safety and security  as enclosed in the strategic role of hotel industry resources is related changed of hotel industry safety and security functions of service such as from traditional sense to hotel industry safety and security service tenets and be able to attempt to understand and deal with hotel industry function and hotel industry safety and security connectivity. The need for hotel industry safety and security base and there was paradigm shift along IT systems as well as to the client/server networks and the internet distribution. Although it is true that hotel industry safety and security management is imperative, it may not be critical to the success of hotel companies but, it is the main factor for hotel industry service to keep on track with their business as hotel industry safety and security base will protect such useful systems from any abuse of resources as such, the unauthorized users that has gain access through the use of spare resource can be damaging as hotel industry safety and security base security sources can be expensive and costly to survive in the market as there can be the presence of possible knowledge as well as tools required in order to compromise the mainframe system of security process of the company. As such the growth factors for security knowledge have led to countless of innovative security management controversies problems. For instance, the utilizing of processor is not the main concern but, it is access to network security systems with the importance of achieving better control of the security management as adopted by the region.

Furthermore, security system planning and acceptance, particularly capacity planning, must take due cognizance of availability business impacts in the information assets domain as business impacts associated with confidentiality and integrity of data assets should be taken into account in the security requirements of new systems. Virus controls appears to have been given a particular prominence in the standards, whereas one might have expected to see a wider discussion on more generic countermeasures. Security attacks could now have a greater impact on the organization and the distributed use of computers complicated the implementation of physical security measures (Gollmann, 1999). During the present era, the protection of information technology systems required additional technical security measures. Technical security measures refer to security implemented by using software mechanisms residing on IT systems as the change will focus security efforts as introduced IT security.

 

I. References

 

BS 7799-2 (1999), Information Security Management Part 2: Specification for Information Security Management Systems, British Standards Institute, London

 

Cazemier, Jacques A.; Overbeek, Paul L.; Peters, Louk M. (2000). Security Management, Stationery Office

Clandinin, D., & Connelly, M. (1999). Narrative inquiry: Experience and story in qualitative research. San Francisco: Jossey-Bass Publishing Co.

COBIT (1998), COBIT: Control Objectives, ISACA, Rolling Meadows, IL

Cooper C., Fletcher, J., Gilbert, D., & Wanhill, S. et al. (1998). Tourism principles & practice (2nd ed.). Longman Publishing.

Forcht, K.A. (1994), Computer Security Management, Boyd & Fraser, MA

Gibb J and Scott N (1999) Strategic Awareness, Personal Commitment and the Process of Planning in the Small Business, Journal of Management Studies 22(6), 597-631

Hart C (2001) Doing a Literature Review, London: Sage Publications Ltd. 

Hart C (2005) Doing your Masters Dissertation, London: Sage Publications Ltd.

Marshall T and Rossman E (1999) Designing Qualitative Research, 3rd Ed

Master M and Heresniak, EJ (2002) Ethics at Work: The Disconnect in Ethics Training, Across the Board 39(5), 51–52.

Olsen, M.D., & Cassee, E. (1996). Into the New Millennium – White Pape r on the Global Hospitality Industry. S i n g a p o r e : International Hotel Association.

Paton MQ (2002) Qualitative evaluation and research methods (2nd ed.). Newbury Park: Sage Publications

Pinkston T and Carroll A (1996) A Retrospective Examination of CSR Orientations: Have They Changed? Journal of Business Ethics 15(2), 199–207.

Power, T., & Barrows, C.W. (1999). Introduction to management in the hospitality industry (6th ed.). John Wiley & Sons Inc. Republic of Singapore (1985). The Innkeepers’ Act. Singapore: The Government Printer.

Rushmore S., & Malone C. (1998). Keys and hotel security. Cornell Hotel and Restaurant Administration Quarterly, December, 91- 95.

Saunders M Lewis P and Thornhill A (2003) Research Methods for Business Students. London: Financial Times-Prentice Hall

Singapore Hotel Association (SHA) (1994). Hotel Security Manual. Singapore: Singapore Hotel Association. Singapore Hotel Association (SHA) (1997). Annual Report, 1997. Singapore: Singapore Hotel Association.

 

Weber, R. (1999), Information System Control and Audit, Prentice-Hall, Englewood Cliffs, NJ 

Read this paper from the START.


0 comments:

Post a Comment

 
Top