|
Reference
|
|
Anichiti, A., Dragolea, L., Tacu, H.an G., Haller, A.P., Butnaru, G.I. (2021) Aspects Regarding Safety and Security in Hotels: Romanian Experience. Information, 12(1), 1-22
|
|
Apvrille, A. (2014) The evolution of mobile malware. Fraud & Security, 2014(8): 18-20
|
1
|
Artigas, E.M., Vilches-Montero, S., Yrigoyen, C.C. (2015) Antecedents of tourism destination reputation: The mediating role of familiarity. Journal of Retailing and Consumer Services, 26: 147-152
|
|
Bellare, M., Fuchsbauer, G., Scafuro, A. (2016) NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion. u: International Conference on the Theory and Application of Cryptology and Information Security, Berlin-Heidelberg: Springer, 777-804
|
|
Bodkhe, U., Tanwar, S., Parekh, K., Khanpara, P., Tyagi, S., Kumar, N., Alazab, M. (2020) Blockchain for Industry 4.0: A Comprehensive Review. IEEE Access, 8: 79764-79800
|
|
Buntak, K., Kovačić, M., Mutavdžija, M. (2021) Application of Artificial Intelligence in the business. International Journal for Quality Research, 15(2): 403-416
|
|
Challa, S., Wazid, M., Das, A.K., Kumar, N., Goutham, R.A., Yoon, E.J., Yoo, K.Y. (2017) Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications. IEEE Access, 5: 3028-3043
|
|
Chen, H.S., Jai, T.M.C. (2019) Cyber alarm: Determining the impacts of hotel's data breach messages. International Journal of Hospitality Management, 82: 326-334
|
|
Chiew, K.L., Yong, K.S.C., Tan, C.L. (2018) A survey of phishing attacks: Their types, vectors and technical approaches. Expert Systems with Applications, 106: 1-20
|
|
Coca-Stefaniak, A., Morrison, A.M. (2018) City tourism destinations and terrorism: A worrying trend for now, but could it get worse?. International Journal of Tourism Cities, 4(4): 409-412
|
|
Cocosila, M., Trabelsi, H. (2016) An integrated value-risk investigation of contactless mobile payments adoption. Electronic Commerce Research and Applications, 20: 159-170
|
|
Čiković, K.F., Martinčević, I., Lozić, J. (2022) Application of Data Envelopment Analysis (DEA) in the Selection of Sustainable Suppliers: A Review and Bibliometric Analysis. Sustainability, 14(11): 1-30
|
|
Dwivedi, Y.K., Hughes, L., Ismagilova, E., Aarts, G., Coombs, C., Crick, T., Williams, M.D. (2021) Artificial Intelligence (AI): Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. International Journal of Information Management, 57: 101994
|
|
Emms, M., Arief, B., Little, N., Moorsel, A.V. (2013) Risks of offline verify PIN on contactless cards. u: International Conference on Financial Cryptography and Data Security, Berlin, Heidelberg: Springer, 313-321
|
|
Fragniere, E., Yagci, K. (2021) Network & Cyber Security in Hospitality and Tourism. University of South Florida M3 Center Publishing, 17(9781732127593), 7
|
2
|
Gretzel, U., Sigala, M., Xiang, Z., Koo, C. (2015) Smart tourism: Foundations and developments. Electronic Markets, 25(3): 179-188
|
|
Hong, J. (2012) The state of phishing attacks. Communications of the ACM, 55(1): 74-81
|
|
Kim, H.B., Lee, D.S., Ham, S. (2013) Impact of hotel information security on system reliability. International Journal of Hospitality Management, 35: 369-379
|
|
Kim, K., Kim, J.S., Jeong, S., Park, J.H., Kim, H.K. (2021) Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 103: 102150
|
|
Knudsen, L., Wagner, D. (2002) Integral cryptanalysis. u: International Workshop on Fast Software Encryption, Berlin-Heidelberg: Springer, 112-127
|
|
Kovačić, M., Mutavdžija, M., Buntak, K. (2022) New Paradigm of Sustainable Urban Mobility: Electric and Autonomous Vehicles: A Review and Bibliometric Analysis. Sustainability, 14(15): 1-23
|
|
Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., Weippl, E. (2014) QR Code Security: A Survey of Attacks and Challenges for Usable Security. u: International Conference on Human Aspects of Information Security, Privacy, and Trust, Heraklion, Crete, Greece, 79-90
|
|
Li, Y., Liu, Q. (2021) A comprehensive review study of cyber-attacks and cyber security: Emerging trends and recent developments. Energy Reports, 7: 8176-8186
|
|
Liao, Y. (2019) Research and implementation of the intelligent tourism system based on VRGIS. u: The International Conference on Cyber Security Intelligence and Analytics, Shenyang, China, 130-135
|
|
Lugović, S., Mršić, L., Zekanović-Korona, L. (2019) Public WiFi Security Network Protocol Practices in Tourist Destination. u: 16th International Symposium on Pervasive Systems, Algorithms and Networks I-SPAN 2019, Naples, Italy, 321-332
|
|
Magliulo, A., Wright, A.C. (2014) Cyber Security in Tourism: The Role of Awareness. u: Sitek M.; Niedziόtka I.; Ukleja A. [ur.] Consumer Protection, Alcide De Gasperi University Jόzefόw, 71-96
|
|
Magliulo, A. (2016) Cyber Security and Tourism Competitiveness. European Journal of Tourism, Hospitality and Recreation, 7(2): 128-134
|
|
Min, K., Chai, S., Han, M. (2015) An International Comparative Study on Cyber Security Strategy. International Journal of Security and Its Applications, 9(2): 13-20
|
|
Paraskevas, A. (2022) Cybersecurity in Travel and Tourism: A Risk-Based Approach. u: Handbook of e-Tourism, Cham: Springer International Publishing, 1605-1628
|
|
Plotnek, J.J., Slay, J. (2021) Cyber terrorism: A homogenized taxonomy and definition. Computers & Security, 102: 102145
|
|
Rashid, J., Mahmood, T., Nisar, M.W., Nazir, T. (2020) Phishing Detection Using Machine Learning Technique. u: 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH), Riyadh, Saudi Arabia, 43-46
|
|
Raunak, P., Krishnan, P. (2017) Network detection of ransomware delivered by exploit kit. ARPN Journal of Engineering and Applied Sciences, 12(2): 3885-3889
|
|
Slapničar, S., Vuko, T., Čular, M., Drašček, M. (2022) Effectiveness of cybersecurity audit. International Journal of Accounting Information Systems, 44, 1-22
|
|
Specht, S., Lee, R. (2003) Taxonomies of distributed denial of service networks, attacks, tools and countermeasures. Princeton University, CEL2003-03, 1-20
|
|
Sveen, F.O., Torres, J.M., Sarriegi, J.M. (2009) Blind information security strategy. International Journal of Critical Infrastructure Protection, 2(3): 95-109
|
2
|
von Solms, R., van Niekerk, J. (2013) From information security to cyber security. Computers & Security, 38: 97-102
|
|
Williams, P.A., Woodward, A.J. (2015) Cybersecurity vulnerabilities in medical devices: A complex environment and multifaceted problem. Medical Devices: Evidence and Research, 8: 305-316
|
|
Yang, E.C.L., Nair, V. (2014) Tourism at Risk: A Review of Risk and Perceived Risk in Tourism. Asia-Pacific Journal of Innovation in Hospitality and Tourism (APJIHT), 3(2): 1-21
|
|
Zaini, M.K., Masrek, M.N., Abdullah, S.M.K.J. (2015) A Conceptual Overview on the Relationship Between Information Security Practices and Organizational Agility. Advanced Science Letters, 21(5): 1289-1292
|
|
|
|