SAJBER BEZBEDNOST I TURIZAM: BIBLIOMETRIJSKA ANALIZA
Sažetak
Тема сајбер безбедности у туризму је од посебног значаја јер су туристи у страним земљама једна од најугроженијих група због непознавања језика, закона итд. Са повећањем броја технологија које омогућавају интерактивност, бесконтактно плаћање , односно информативног садржаја за туристе, јављају се ризици по безбедност података туриста, као и ризици везани за крађу података на банкарским картицама туриста. У циљу идентификације актуелних сазнања, односно тренутног стања у контексту истраживања сајбер безбедности у туризму, спроведена је библиометријска анализа која је указала да недовољан број аутора истражује сајбер безбедност и да нема довољан број студије које би анализирале механизме и мере повећања сајбер безбедности у туризму. Значај истраживања сајбер безбедности у туризму заснива се на чињеници да је туризам посебно рањива и осетљива грана привреде на ризике који утичу на туристе као такве, те да може зависити од угледа земље, институција или хотела. Библиометријска анализа спроведена у овом раду значајна је за будуће истраживаче с обзиром да може послужити као основа за фокусирање истраживача на одређене области сајбер безбедности.
Reference
Anichiti, A., Dragolea, L.L., Tacu Hârșan, G.D., Haller, A.P. & Butnaru, G.I. (2021). Aspects regarding safety and security in hotels: Romanian experience. Information, 12(1), 1-22.
Apvrille, A. (2014). The evolution of mobile malware. Fraud & Security, 2014(8), 18-20.
Artigas, E. M., Vilches-Montero, S., & Yrigoyen, C. C. (2015). Antecedents of tourism destination reputation: The mediating role of familiarity. Journal of Retailing and Consumer Services, 26, 147-152.
Bellare, M., Fuchsbauer, G., & Scafuro, A. (2016). NIZKs with an untrusted CRS: security in the face of parameter subversion. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 777-804). Springer, Berlin, Heidelberg.
Bodkhe, U., Tanwar, S., Parekh, K., Khanpara, P., Tyagi, S., Kumar, N., & Alazab, M. (2020). Blockchain for industry 4.0: A comprehensive review," IEEE Access, 79764-79800.
Buntak, K., Kovačić, M., & Mutavdžija, M. (2021). Application of Artificial Intelligence in the business. International journal for quality research, 15(2), 403-416.
Challa, S., Wazid, M., Das, A.K., Kumar, N., Reddy, A.G., Yoon, E.J., & Yoo, K.Y. (2017). Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access, 3028-3043.
Chen, H.S. & Jai, T.M.C. (2019). Cyber alarm: Determining the impacts of hotel’s data breach messages. International Journal of Hospitality Management, 82, 326-334.
Chiew, K.L., Yong, K.S.C. & Tan, C.L. (2018). A survey of phishing attacks: Their types, vectors and technical approaches. Expert Systems with Applications, 106, 1-20.
Čiković, K.F., Martinčević, I. & Lozić, J. (2022). Application of Data Envelopment Analysis (DEA) in the Selection of Sustainable Suppliers: A Review and Bibliometric Analysis. Sustainability, 14(11), 1-30.
Coca-Stefaniak, A. & Morrison, A.M. (2018). City tourism destinations and terrorism–a worrying trend for now, but could it get worse?. International Journal of Tourism Cities, 4(4), 409-412.
Cocosila, M. & Trabelsi, H. (2016). An integrated value-risk investigation of contactless mobile payments adoption. Electronic Commerce Research and Applications, 20, 159-170.
Dwivedi, Y.K., Hughes, L., Ismagilova, E., Aarts, G., Coombs, C., Crick, T., & Williams, M.D. (2021). Artificial Intelligence (AI): Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. International Journal of Information Management, 57, 101994.
Emms, M., Arief, B., Little, N., & Moorsel, A. V. (2013). Risks of offline verify PIN on contactless cards. In International Conference on Financial Cryptography and Data Security (pp. 313-321). Springer, Berlin, Heidelberg.
Fragniere, E., & Yagci, K. (2021). Network & Cyber Security in Hospitality and Tourism. University of South Florida M3 Center Publishing, 17(9781732127593), 7.
Gretzel, U., Sigala, M., Xiang, Z., & Koo, C. (2015). Smart tourism: foundations and developments. Electronic markets, 25(3), 179-188.
Hong, J. (2012). The state of phishing attacks. Communications of the ACM, 55(1), 74-81.
Kim, H.B., Lee, D.S., & Ham, S. (2013). Impact of hotel information security on system reliability. International Journal of Hospitality Management, 35, 369-379.
Kim, K., Kim, J. S., Jeong, S., Park J. H., & Kim, H.K. (2021). Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 103, 102150.
Knudsen, L., & Wagner, D. (2002). Integral cryptanalysis. In International Workshop on Fast Software Encryption (pp. 112-127). Springer, Berlin, Heidelberg. 2002
Kovačić, M., Mutavdžija, M., & Buntak, K. (2022). New Paradigm of Sustainable Urban Mobility: Electric and Autonomous Vehicles—A Review and Bibliometric Analysis. Sustainability, 14(15), 1-23.
Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M. & Weippl, E. (2014). QR code security: A survey of attacks and challenges for usable security. International Conference on Human Aspects of Information Security, Privacy, and Trust, Heraklion, Crete, Greece, 79-90.
Li, Y. & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176-8186.
Liao, Y. (2019). Research and implementation of the intelligent tourism system based on VRGIS. The International Conference on Cyber Security Intelligence and Analytics, Shenyang, China, 130-135.
Lugovic, S., Mrsic, L., & Korona, L.Z. (2919). Public WiFi security network protocol practices in tourist destination. 16th International Symposium on Pervasive Systems, Algorithms and Networks I-SPAN 2019, Naples, Italy, 321-332.
Magliulo, A. & Wright A.C. (2014). Cyber Security in Tourism: The Role of Awareness. In: M. Sitek, I. Niedziόtka, A. Ukleja (Eds.), Consumer Protection, (pp. 71-96). Alcide De Gasperi University Jόzefόw.
Magliulo, A. (2016). Cyber security and tourism competitiveness. European Journal of Tourism, Hospitality and Recreation, 7(2), 128-134.
Min, K.S., Chai, S.W. & Han, M. (2015). An international comparative study on cyber security strategy. International Journal of Security and its Applications, 9(2), 13-20.
Paraskevas, A. (2022). Cybersecurity in travel and tourism: a risk-based approach. In Handbook of e-Tourism (pp. 1605-1628). Cham: Springer International Publishing.
Plotnek, J.J. & Slay, J. (2021). Cyber terrorism: A homogenized taxonomy and definition. Computers & Security, 102, 102145.
Rashid, J., Mahmood, T., Nisar, M.W. & Nazir, T. (2020). Phishing detection using machine learning technique. 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH), Riyadh, Saudi Arabia, 43-46.
Raunak, P. & Krishnan, P. (2017). Network detection of ransomware delivered by exploit kit. ARPN Journal of Engineering and Applied Sciences, 12(2), 3885-3889.
Slapničar, S., Vuko, T., Čular, M., & Drašček, M. (2022). Effectiveness of cybersecurity audit. International Journal of Accounting Information Systems, 44, 1-22.
Specht, S. & Lee, R. (2003). Taxonomies of distributed denial of service networks, attacks, tools and countermeasures. CEL2003-03, Princeton University, 1-20.
Sveen, F.O., Torres, J.M. & Sarriegi, J.M. (2009). Blind information security strategy. International Journal of Critical Infrastructure Protection, 2(3), 95-109.
Von Solms, R. & Van Niekerk, J. (2013). From information security to cyber security. Computers & security, 38, 97-102.
Williams, P. A., & Woodward, A. J. (2015). Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Medical devices, 8, 305–316.
Yang, E.C.L. & Nair, V. (2014). Tourism at risk: A review of risk and perceived risk in tourism. Asia-Pacific Journal of Innovation in Hospitality and Tourism (APJIHT), 3, 1-21.
Zaini, M.K., Masrek, M.N., & Abdullah Sani, M.K.J. (2015). A Conceptual Overview on the Relationship Between Information Security Practices and Organizational Agility. Advanced Science Letters, 21(5), 1289-1292.