Evaluation of Hotel Information Technologies and EDI Adoption

2012 ◽  
Vol 54 (1) ◽  
pp. 25-37 ◽  
Author(s):  
Rosanna Leung ◽  
Rob Law

This study examines information technology (IT) applications, the adoption of electronic data interchange (EDI) among hotel systems, and management support for IT departments in a sample of Hong Kong hotels. The empirical results indicate that most hotels have not installed decision support or strategic management tools. In addition, the ratio of EDI implementation between hotel systems and web applications is relatively low. The rate of adoption of automated credit card authorization, which can enhance the security of customer data, is only 6 percent for the property management system (PMS) and 17 percent for point of sale (POS) applications. In keeping with the increased importance of hotel IT systems, the background of hotel IT managers has changed dramatically in the past decade. Many more have IT-related qualifications, with almost 70 percent holding a bachelor’s degree or higher. Because of the low adoption of EDI, the authors propose a revised EDI adoption model. The original model includes perceived benefits, external pressure, and organizational readiness. Within organizational readiness are financial resources and IT competence, and to those two factors the new model adds IT managers’ attitude toward and awareness of EDI.

2000 ◽  
Vol 14 (1) ◽  
pp. 37-52 ◽  
Author(s):  
Ram S. Sriram ◽  
Vairam Arunachalam ◽  
Daniel M. Ivancevich

In recent years, Electronic Data Interchange (EDI) has revolutionized the way in which businesses conduct their trading activities. Even though the popularity and potential attached to EDI is growing rapidly, knowledge regarding the nature of EDI benefits and EDI control practices is very limited. This paper reports the results of a survey of EDI users that explores these key implementation issues. This study focuses on organizational factors that are associated with EDI adoption and implementation. Findings indicate that organizations experience both operational and strategic benefits from EDI. Customer-initiated EDI users recognized slightly greater EDI strategic benefits than did other users. Also, long-time users recognized both strategic and operational benefits in greater proportions than did more recent users, and smaller firms more often cited better customer service and convenience (as strategic and operational benefits, respectively) from implementing EDI. An examination of control practices revealed that while some basic procedures such as passwords and logs are widely used, the overall EDI control structure is typically weak. The role of management support and awareness and the implications for the management and control of EDI are also discussed.


Author(s):  
Uyinomen O. Ekong ◽  
Princely Ifinedo ◽  
Charles K. Ayo ◽  
Airi Ifinedo

Business organizations around the world engage in e-commerce (EC) and e-business to support business operations and enhance revenue generation from non-traditional sources. Studies focusing on EC adoption in Sub Saharan Africa (SSA) are just beginning to emerge in the extant information systems (IS) literature. The objective of this current study is to investigate factors impacting the acceptance of EC in small businesses in SSA with Nigeria as an example. A research model based on the Diffusion of Innovation (DIT) and the Technology–Organization–Environment (TOE) frameworks were used to guide this discourse. Such factors as relative advantage, compatibility, complexity, management support, organizational readiness, external pressure, and IS vendor support were used to develop relevant hypotheses. Questionnaires were administered to respondents in Nigeria and data analysis was performed using the Partial Least Squares (PLS) technique. Predictions related to relative advantage, management support, and IS vendor support were confirmed; the other hypotheses were unsupported by the data. The study’s implications for research and practice are discussed in the chapter.


Author(s):  
Omkar Badve ◽  
B. B. Gupta ◽  
Shashank Gupta

Numerous vulnerabilities have a tendency to taint modern real-world web applications, allowing attackers in retrieving sensitive information and exploiting genuine web applications as a platform for malware activities. Moreover, computing techniques are evolved from the large desktop computer systems to the devices like smartphones, smart watches and goggles. This needs to be ensure that these devices improve their usability and will not be utilized for attacking the personal credentilas (such as credit card numbers, transaction passwords, etc.) of the users. Therefore, there is a need of security architecture over the user's credentials so that no unauthorized user can access it. This chapter summarizes various security models and techniques that are being discovered, studied and utilized extensively in order to ensure computer security. It also discusses numerous security principles and presents the models that ensure these security principles. Security models (such as access control models, information flow models, protection ring, etc.) form the basis of various higher level and complex models. Therefore, learning such security models is very much essential for ensuring the security of the computer and cyber world.


2011 ◽  
pp. 1942-1964
Author(s):  
Chuck C.H. Law ◽  
Eric W.T. Ngai

It has been widely discussed in the management information systems (MIS) literature that the outcomes of information technologies (IT) and systems may be subject to the influence of the characteristics of the organization, including those of the IT and business leadership. This study was conducted to examine the relationships that may exist between IT infrastructure capabilities (ITC), business process improvements (BPI), and such IT governance-related constructs as the reporting relationship between the chief executive officer (CEO) and chief information officer (CIO), and senior management support of IT and BPI projects. Using a sample of 243 multinational and Hong Kong-listed firms operating in Greater China, this study yielded empirical support for the perceived achievement of capabilities in some dimensions of the IT infrastructure in the companies under study. It was found that the BPI construct was related to the reporting relationship between the CEO and CIO (CEO-CIO distance), and to the levels of senior management support. The dimensions of the ITC construct were also investigated and identified by an exploratory factor analysis (EFA). Associations were found between the selected organizational constructs and the ITC dimensions, except in two hypothesized relationships. Those between CEO-CIO distance and the ITC dimensions of data integration and training were not supported at the significance level of 0.05.


2011 ◽  
pp. 989-1001
Author(s):  
Athanasia Pouloudi ◽  
Vlatka Hlupic ◽  
George Rzevski

E-commerce has become a key aspect of the global business environment, causing fundamental changes in markets and organisational structures. This chapter considers how knowledge management, the latest management approach aimed at improving business performance, can create new business opportunities in the new business environment that is defined by electronic commerce. Knowledge management deals with the systematic generation, codification and transfer of knowledge and can be supported by a number of technologies, known as knowledge management tools. It has been argued that intelligent systems can offer additional capabilities and advantages in comparison with more traditional information technologies. This chapter investigates the potential of intelligent agent-based software for more effective knowledge management in the context of e-commerce, adopting the perspective of an SME involved in development of intelligent agents-based knowledge management software. The chapter concludes with a research agenda for knowledge management research in e-commerce.


Author(s):  
Omkar Badve ◽  
B. B. Gupta ◽  
Shashank Gupta

Numerous vulnerabilities have a tendency to taint modern real-world web applications, allowing attackers in retrieving sensitive information and exploiting genuine web applications as a platform for malware activities. Moreover, computing techniques are evolved from the large desktop computer systems to the devices like smartphones, smart watches and goggles. This needs to be ensure that these devices improve their usability and will not be utilized for attacking the personal credentilas (such as credit card numbers, transaction passwords, etc.) of the users. Therefore, there is a need of security architecture over the user's credentials so that no unauthorized user can access it. This chapter summarizes various security models and techniques that are being discovered, studied and utilized extensively in order to ensure computer security. It also discusses numerous security principles and presents the models that ensure these security principles. Security models (such as access control models, information flow models, protection ring, etc.) form the basis of various higher level and complex models. Therefore, learning such security models is very much essential for ensuring the security of the computer and cyber world.


2020 ◽  
Vol 12 (9) ◽  
pp. 3931
Author(s):  
Marjeta Marolt ◽  
Hans-Dieter Zimmermann ◽  
Andreja Pucihar

The exponential speed of technological advancements and the ever-changing needs of customers have changed the way enterprises engage with their customers. However, despite the increasing scholarly interest in the enterprise-initiated perspective of customer engagement (CE) in recent years, it remains unclear what drives enterprises to initiate customer engagement and how enterprise-initiated customer engagement enhances enterprise performance. Thus, the purpose of this study is to develop and evaluate a conceptual model that consists of drivers and outcomes of enterprise-initiated customer engagement. After developing a conceptual model based on previous conceptual approaches to customer engagement, a quantitative survey was undertaken to gather the data from business-to-customer micro, small, and medium-sized enterprises. The data were analyzed using the partial least square path modelling. The findings showed that external pressure and organizational readiness influence enterprise-initiated customer engagement. Enterprise-initiated customer engagement was also found to influence marketing performance. The empirical findings provide insights for managers that explain what drivers may influence enterprise-initiated customer engagement and what benefits they can expect. Overall, this research extends the understanding of the CE domain and provides additional insights for the drivers and outcomes of enterprise-initiated CE.


Author(s):  
Mahmud Akhter Shareef ◽  
Yogesh K. Dwivedi ◽  
Michael D. Williams ◽  
Nitish Singh

This chapter examines the influence of some relevant factors on the acceptance of internet and E-Business technologies in Maritime Canada’s SMEs (small- and medium- sized enterprises). To examine the influence of the factors, a research framework was developed and nine hypotheses formulated to test the various relationships. A survey was conducted and a total of 162 valid responses were obtained from mainly business owners and managers. The data supported five out of the nine hypotheses formulated. The key findings are as follows: The sampled SME’s organizational readiness is positively related to their intent to use Internet/business technologies (dependant variable); the two constructs of the technology acceptance model (TAM) were found to be important mediators in the relationship between the management support construct and the dependant variable. Further, no evidence was found to suggest that management support positively influences the intent to use Internet/ business technologies among Maritime Canada’s SMEs. The implications of the study’s findings for policy making and research were discussed.


Author(s):  
Richard Brunet-Thornton ◽  
Vladimír Bureš

In the Czech Republic, Knowledge Management-related problems occur at all knowledge stages with difficulties more predominant at an organisational level. In principal, they originate from the lack of an utilisable and detailed KM implementation methodology; varying perceptions of KM coupled with the notion, that KM equates and is limited to information technologies and the like. As a reaction to these problems, the Faculty of Informatics and Management at the University of Hradec Králové (FIM UHK) developed a new KM implementation methodology. It aims to provide interested parties with a set of ground rules distributed among a number of phases. Further development is underway to elaborate the method by integrating project management tools, benchmarking exercises and critical success factors. Despite this endeavour, there is an on-going need for further research given the reality that small and medium sized enterprises constitute the majority of organisations in the Czech Republic.


2020 ◽  
Vol 16 (1) ◽  
pp. 1-27
Author(s):  
Mohammad Kasem Alrousan ◽  
Ahmad Samed Al-Adwan ◽  
Amro Al-Madadha ◽  
Mohammad Hamdi Al Khasawneh

This study examines the factors that influence decision-makers to adopt e-marketing in small- and medium-sized enterprises (SMEs) in Jordan. There is currently no comprehensive conceptual framework that explains e-marketing adoption in SMEs. Therefore, this study develops a conceptual framework based on the diffusion of innovation (DOI) and technology-organization-environment (TOE) theories. The conceptual framework is composed of four contexts: technological, organizational, managerial, and environmental, and hypothesizes eleven factors significantly influencing e-marketing adoption in SMEs. A self-administrated questionnaire survey was conducted with 362 SMEs in Jordan. Logistic regression was used to test the relevant hypotheses. The obtained results show that relative advantages, complexity, IT expertise, top management support, manager's IT knowledge and external pressure have a significant impact on e-marketing adoption. However, compatibility, cost, firm size, manager innovativeness, and government support do not show any association with e-marketing adoption.


Sign in / Sign up

Export Citation Format

Share Document