Akcije

Journal of Process Management and New Technologies
kako citirati ovaj članak
podeli ovaj članak

Metrika

  • citati u SCIndeksu: 0
  • citati u CrossRef-u:0
  • citati u Google Scholaru:[]
  • posete u poslednjih 30 dana:3
  • preuzimanja u poslednjih 30 dana:2

Sadržaj

članak: 1 od 334  
Back povratak na rezultate
2022, vol. 10, br. 3-4, str. 75-92
Cyber security and tourism: Bibliometric analysis
(naslov ne postoji na srpskom)
aUniversity North, Koprivnica, Croatia
bPAR University College Rijeka, Rijeka, Croatia

e-adresamatkovacic@unin.hr, cicinsain.marko@gmail.com, vedran.milojica@gmail.com
Sažetak
(ne postoji na srpskom)
The topic of cyber security in tourism is of particular importance since tourists in foreign countries are one of the most vulnerable groups due to a lack of knowledge of languages, laws, etc. With the increase in the number of technologies that enable interactivity, contactless payments, i.e., informative content for tourists, risks for the security of tourists' data as well as risks related to the theft of data on tourists' bank cards are emerging. In order to identify the current knowledge, i.e., the current situation in the context of research on cyber security in tourism, a bibliometric analysis was conducted, which indicated that an insufficient number of authors research cyber security and that there is not a sufficient number of studies that would analyze the mechanisms and measures of increasing cyber security in tourism. The importance of researching cyber security in tourism is based on the fact that tourism is a particularly vulnerable and sensitive branch of the economy to risks that affect tourists as such, and that it can depend on the reputation of the country, institutions, or hotels. The bibliometric analysis conducted in this paper is significant for future researchers considering that it can serve as a basis for researchers' focus on specific areas of cyber security.
Reference
Anichiti, A., Dragolea, L., Tacu, H.an G., Haller, A.P., Butnaru, G.I. (2021) Aspects Regarding Safety and Security in Hotels: Romanian Experience. Information, 12(1), 1-22
Apvrille, A. (2014) The evolution of mobile malware. Fraud & Security, 2014(8): 18-20
Artigas, E.M., Vilches-Montero, S., Yrigoyen, C.C. (2015) Antecedents of tourism destination reputation: The mediating role of familiarity. Journal of Retailing and Consumer Services, 26: 147-152
Bellare, M., Fuchsbauer, G., Scafuro, A. (2016) NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion. u: International Conference on the Theory and Application of Cryptology and Information Security, Berlin-Heidelberg: Springer, 777-804
Bodkhe, U., Tanwar, S., Parekh, K., Khanpara, P., Tyagi, S., Kumar, N., Alazab, M. (2020) Blockchain for Industry 4.0: A Comprehensive Review. IEEE Access, 8: 79764-79800
Buntak, K., Kovačić, M., Mutavdžija, M. (2021) Application of Artificial Intelligence in the business. International Journal for Quality Research, 15(2): 403-416
Challa, S., Wazid, M., Das, A.K., Kumar, N., Goutham, R.A., Yoon, E.J., Yoo, K.Y. (2017) Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications. IEEE Access, 5: 3028-3043
Chen, H.S., Jai, T.M.C. (2019) Cyber alarm: Determining the impacts of hotel's data breach messages. International Journal of Hospitality Management, 82: 326-334
Chiew, K.L., Yong, K.S.C., Tan, C.L. (2018) A survey of phishing attacks: Their types, vectors and technical approaches. Expert Systems with Applications, 106: 1-20
Coca-Stefaniak, A., Morrison, A.M. (2018) City tourism destinations and terrorism: A worrying trend for now, but could it get worse?. International Journal of Tourism Cities, 4(4): 409-412
Cocosila, M., Trabelsi, H. (2016) An integrated value-risk investigation of contactless mobile payments adoption. Electronic Commerce Research and Applications, 20: 159-170
Čiković, K.F., Martinčević, I., Lozić, J. (2022) Application of Data Envelopment Analysis (DEA) in the Selection of Sustainable Suppliers: A Review and Bibliometric Analysis. Sustainability, 14(11): 1-30
Dwivedi, Y.K., Hughes, L., Ismagilova, E., Aarts, G., Coombs, C., Crick, T., Williams, M.D. (2021) Artificial Intelligence (AI): Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. International Journal of Information Management, 57: 101994
Emms, M., Arief, B., Little, N., Moorsel, A.V. (2013) Risks of offline verify PIN on contactless cards. u: International Conference on Financial Cryptography and Data Security, Berlin, Heidelberg: Springer, 313-321
Fragniere, E., Yagci, K. (2021) Network & Cyber Security in Hospitality and Tourism. University of South Florida M3 Center Publishing, 17(9781732127593), 7
Gretzel, U., Sigala, M., Xiang, Z., Koo, C. (2015) Smart tourism: Foundations and developments. Electronic Markets, 25(3): 179-188
Hong, J. (2012) The state of phishing attacks. Communications of the ACM, 55(1): 74-81
Kim, H.B., Lee, D.S., Ham, S. (2013) Impact of hotel information security on system reliability. International Journal of Hospitality Management, 35: 369-379
Kim, K., Kim, J.S., Jeong, S., Park, J.H., Kim, H.K. (2021) Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 103: 102150
Knudsen, L., Wagner, D. (2002) Integral cryptanalysis. u: International Workshop on Fast Software Encryption, Berlin-Heidelberg: Springer, 112-127
Kovačić, M., Mutavdžija, M., Buntak, K. (2022) New Paradigm of Sustainable Urban Mobility: Electric and Autonomous Vehicles: A Review and Bibliometric Analysis. Sustainability, 14(15): 1-23
Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., Weippl, E. (2014) QR Code Security: A Survey of Attacks and Challenges for Usable Security. u: International Conference on Human Aspects of Information Security, Privacy, and Trust, Heraklion, Crete, Greece, 79-90
Li, Y., Liu, Q. (2021) A comprehensive review study of cyber-attacks and cyber security: Emerging trends and recent developments. Energy Reports, 7: 8176-8186
Liao, Y. (2019) Research and implementation of the intelligent tourism system based on VRGIS. u: The International Conference on Cyber Security Intelligence and Analytics, Shenyang, China, 130-135
Lugović, S., Mršić, L., Zekanović-Korona, L. (2019) Public WiFi Security Network Protocol Practices in Tourist Destination. u: 16th International Symposium on Pervasive Systems, Algorithms and Networks I-SPAN 2019, Naples, Italy, 321-332
Magliulo, A., Wright, A.C. (2014) Cyber Security in Tourism: The Role of Awareness. u: Sitek M.; Niedziόtka I.; Ukleja A. [ur.] Consumer Protection, Alcide De Gasperi University Jόzefόw, 71-96
Magliulo, A. (2016) Cyber Security and Tourism Competitiveness. European Journal of Tourism, Hospitality and Recreation, 7(2): 128-134
Min, K., Chai, S., Han, M. (2015) An International Comparative Study on Cyber Security Strategy. International Journal of Security and Its Applications, 9(2): 13-20
Paraskevas, A. (2022) Cybersecurity in Travel and Tourism: A Risk-Based Approach. u: Handbook of e-Tourism, Cham: Springer International Publishing, 1605-1628
Plotnek, J.J., Slay, J. (2021) Cyber terrorism: A homogenized taxonomy and definition. Computers & Security, 102: 102145
Rashid, J., Mahmood, T., Nisar, M.W., Nazir, T. (2020) Phishing Detection Using Machine Learning Technique. u: 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH), Riyadh, Saudi Arabia, 43-46
Raunak, P., Krishnan, P. (2017) Network detection of ransomware delivered by exploit kit. ARPN Journal of Engineering and Applied Sciences, 12(2): 3885-3889
Slapničar, S., Vuko, T., Čular, M., Drašček, M. (2022) Effectiveness of cybersecurity audit. International Journal of Accounting Information Systems, 44, 1-22
Specht, S., Lee, R. (2003) Taxonomies of distributed denial of service networks, attacks, tools and countermeasures. Princeton University, CEL2003-03, 1-20
Sveen, F.O., Torres, J.M., Sarriegi, J.M. (2009) Blind information security strategy. International Journal of Critical Infrastructure Protection, 2(3): 95-109
von Solms, R., van Niekerk, J. (2013) From information security to cyber security. Computers & Security, 38: 97-102
Williams, P.A., Woodward, A.J. (2015) Cybersecurity vulnerabilities in medical devices: A complex environment and multifaceted problem. Medical Devices: Evidence and Research, 8: 305-316
Yang, E.C.L., Nair, V. (2014) Tourism at Risk: A Review of Risk and Perceived Risk in Tourism. Asia-Pacific Journal of Innovation in Hospitality and Tourism (APJIHT), 3(2): 1-21
Zaini, M.K., Masrek, M.N., Abdullah, S.M.K.J. (2015) A Conceptual Overview on the Relationship Between Information Security Practices and Organizational Agility. Advanced Science Letters, 21(5): 1289-1292
 

O članku

jezik rada: engleski
vrsta rada: izvorni naučni članak
DOI: 10.5937/jouproman2203075K
primljen: 15.11.2022.
prihvaćen: 02.12.2022.
objavljen onlajn: 08.12.2022.
objavljen u SCIndeksu: 24.12.2022.
metod recenzije: dvostruko anoniman
Creative Commons License 4.0

Povezani članci

Nema povezanih članaka