Abstract

Get full access to this article
View all access options for this article.
References
1.
Ataya
G.
(2010 ). PCI DSS audit and compliance . Information Security Technical Report , 15 (4 ), 138 –144 .
2.
Berezina
K.
(2010 ). Top issues in PCI DSS compliance in hotels: an exploratory study . Journal of Hospitality and Tourism Technology , 1 (2 ), 218 –233 .
3.
Edmonds
J.
(2011 ). Managing successful change . Industrial and Commercial Training , 43 (6 ), 349 –353 .
4.
Epstein
R. A.
&
Brown
T.P.
(2008 ). Cybersecurity in the payment card industry . The University of Chicago Law Review , 75 (01 ), 203 –223 .
5.
Finne
T.
(2000 ). Information systems risk management: Key concepts and business processes . Computers and Security , 19 (2 ), 234 –242 .
6.First Data Corporation and National Retail Federation (2011 ). Small Merchant Data Security Survey Results . Atlanta, GA : Authors .
7.
Hosak
b
. (2011 ). Business still unaware of the risks of account data compromise . Computer Fraud and Security , 2011, (1), 17 –19 .
8.
Guisti
A.
(2009 ). PCI compliance made easy for restaurants accepting credit cards . QSRweb.com. Retrieved 10th of January 2012 from http://www.qsrweb.com/whitepapers/2319/PCI-Compliance-Made-Easy-for-Restaurants-Accepting-Credit-Cards.
9.
Guisti
A.
(2011 ). ISO's can teach merchants to look for security threats, even from the inside . ISO & Agent , 23 –28 .
10.
Kalkan
K.
,
Kwansa
F.
, and
Cobanoglu
C.
(2008 ). Payment card industry data security standards (PCI DSS) compliance in restaurants . Journal of Hospitality Financial Management , 16 (2 ), Article 3.
11.
Kapuria
S.
(2005 ). Steps for managing risk . Computerworld . Retrieved 11th of June 2012 from http://www.computerworld.com/s/article/106101/Steps_for_managing_risk?taxonomyId=17&pageNumber=2.
12.
Knights
M.
(2011 ). IT security legislation guide . Engineering and Technology , 6 (7 ), 63 –65 .
13.Ponemon Institute . (2011 ). 2010 U.S. Cost of a Data Breach . Traverse City, MI : Author .
14.
Rees
J.
(2010 ). Information security for small and medium-sized business . Computer Fraud and Security , 2010 (9 ),18 –19 .
15.
Slawsky
R.
(2011 ). Frequently Asked Questions about PCI Compliance . Reston, VA : NetWorld Alliance .
16.
Tutton
J.
(2010 ). Incident response and compliance: A case study . Information Security Technical Report , 15 (4 ), 145 –149 .
17.
Trustwave
. (2006 ). Protecting Cardholder Data for Hospitality Businesses Accepting Payment Cards through Multiple Channels: Hotels, Motels and Lodging . Chicago, IL : Author .
18.Trustwave (2010 ). Hospitality Breaches on the Rise . Chicago, IL : Author .
19.Trustwave (2011 ). Global Security Report 2011 . Chicago, IL : Author .
20.
Vaca
J.
(2010 ). Network and System Security. Burlington . MA : Elsevier .
21.
Vellayan
N.
(2011 ). PCI compliance: What your franchise should know International Franchise Association . Retrieved 4th of January 2012 from http://www.franchise.org/Franchise-Industry-News-Detail.aspx?id=55439.
