SAJBER BEZBEDNOST I TURIZAM: BIBLIOMETRIJSKA ANALIZA

  • Matija Kovačić University North, Koprivnica, Croatia https://orcid.org/0000-0002-5472-5192
  • Marko Čičin-Šain PAR University College Rijeka, Rijeka, Croatia
  • Vedran Milojica PAR University College Rijeka, Rijeka, Croatia

Sažetak


Тема сајбер безбедности у туризму је од посебног значаја јер су туристи у страним земљама једна од најугроженијих група због непознавања језика, закона итд. Са повећањем броја технологија које омогућавају интерактивност, бесконтактно плаћање , односно информативног садржаја за туристе, јављају се ризици по безбедност података туриста, као и ризици везани за крађу података на банкарским картицама туриста. У циљу идентификације актуелних сазнања, односно тренутног стања у контексту истраживања сајбер безбедности у туризму, спроведена је библиометријска анализа која је указала да недовољан број аутора истражује сајбер безбедност и да нема довољан број студије које би анализирале механизме и мере повећања сајбер безбедности у туризму. Значај истраживања сајбер безбедности у туризму заснива се на чињеници да је туризам посебно рањива и осетљива грана привреде на ризике који утичу на туристе као такве, те да може зависити од угледа земље, институција или хотела. Библиометријска анализа спроведена у овом раду значајна је за будуће истраживаче с обзиром да може послужити као основа за фокусирање истраживача на одређене области сајбер безбедности.

Reference

Anichiti, A., Dragolea, L.L., Tacu Hârșan, G.D., Haller, A.P. & Butnaru, G.I. (2021). Aspects regarding safety and security in hotels: Romanian experience. Information, 12(1), 1-22.

Apvrille, A. (2014). The evolution of mobile malware. Fraud & Security, 2014(8), 18-20.

Artigas, E. M., Vilches-Montero, S., & Yrigoyen, C. C. (2015). Antecedents of tourism destination reputation: The mediating role of familiarity. Journal of Retailing and Consumer Services, 26, 147-152.

Bellare, M., Fuchsbauer, G., & Scafuro, A. (2016). NIZKs with an untrusted CRS: security in the face of parameter subversion. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 777-804). Springer, Berlin, Heidelberg.

Bodkhe, U., Tanwar, S., Parekh, K., Khanpara, P., Tyagi, S., Kumar, N., & Alazab, M. (2020). Blockchain for industry 4.0: A comprehensive review," IEEE Access, 79764-79800.

Buntak, K., Kovačić, M., & Mutavdžija, M. (2021). Application of Artificial Intelligence in the business. International journal for quality research, 15(2), 403-416.

Challa, S., Wazid, M., Das, A.K., Kumar, N., Reddy, A.G., Yoon, E.J., & Yoo, K.Y. (2017). Secure signature-based authenticated key establishment scheme for future IoT applications.  IEEE Access, 3028-3043.

Chen, H.S. & Jai, T.M.C.  (2019). Cyber alarm: Determining the impacts of hotel’s data breach messages. International Journal of Hospitality Management, 82, 326-334.

Chiew, K.L., Yong, K.S.C. & Tan, C.L. (2018). A survey of phishing attacks: Their types, vectors and technical approaches. Expert Systems with Applications, 106, 1-20. 

Čiković, K.F., Martinčević, I. & Lozić, J.  (2022). Application of Data Envelopment Analysis (DEA) in the Selection of Sustainable Suppliers: A Review and Bibliometric Analysis.  Sustainability, 14(11), 1-30.

Coca-Stefaniak, A. & Morrison, A.M. (2018). City tourism destinations and terrorism–a worrying trend for now, but could it get worse?. International Journal of Tourism Cities, 4(4), 409-412.

Cocosila, M. & Trabelsi, H. (2016). An integrated value-risk investigation of contactless mobile payments adoption. Electronic Commerce Research and Applications, 20, 159-170.

Dwivedi, Y.K., Hughes, L., Ismagilova, E., Aarts, G., Coombs, C., Crick, T., & Williams, M.D. (2021). Artificial Intelligence (AI): Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. International Journal of Information Management, 57, 101994.

Emms, M., Arief, B., Little, N., & Moorsel, A. V. (2013). Risks of offline verify PIN on contactless cards. In International Conference on Financial Cryptography and Data Security (pp. 313-321). Springer, Berlin, Heidelberg.

Fragniere, E., & Yagci, K. (2021). Network & Cyber Security in Hospitality and Tourism. University of South Florida M3 Center Publishing, 17(9781732127593), 7.

Gretzel, U., Sigala, M., Xiang, Z., & Koo, C. (2015). Smart tourism: foundations and developments. Electronic markets, 25(3), 179-188.

Hong, J. (2012). The state of phishing attacks. Communications of the ACM, 55(1), 74-81. 

Kim, H.B., Lee, D.S., & Ham, S. (2013). Impact of hotel information security on system reliability. International Journal of Hospitality Management, 35, 369-379.

Kim, K., Kim, J. S., Jeong, S., Park J. H., & Kim, H.K. (2021). Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 103, 102150.

Knudsen, L., & Wagner, D. (2002). Integral cryptanalysis. In International Workshop on Fast Software Encryption (pp. 112-127). Springer, Berlin, Heidelberg. 2002  

Kovačić, M., Mutavdžija, M., & Buntak, K. (2022). New Paradigm of Sustainable Urban Mobility: Electric and Autonomous Vehicles—A Review and Bibliometric Analysis.  Sustainability, 14(15), 1-23.

Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M. & Weippl, E. (2014). QR code security: A survey of attacks and challenges for usable security. International Conference on Human Aspects of Information Security, Privacy, and Trust, Heraklion, Crete, Greece, 79-90.

Li, Y. & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176-8186.

Liao, Y. (2019). Research and implementation of the intelligent tourism system based on VRGIS. The International Conference on Cyber Security Intelligence and Analytics, Shenyang, China, 130-135.

Lugovic, S., Mrsic, L., & Korona, L.Z. (2919). Public WiFi security network protocol practices in tourist destination. 16th International Symposium on Pervasive Systems, Algorithms and Networks I-SPAN 2019, Naples, Italy, 321-332. 

Magliulo, A. & Wright A.C. (2014). Cyber Security in Tourism: The Role of Awareness. In: M. Sitek, I. Niedziόtka, A. Ukleja (Eds.), Consumer Protection, (pp. 71-96). Alcide De Gasperi University Jόzefόw. 

Magliulo, A. (2016). Cyber security and tourism competitiveness. European Journal of Tourism, Hospitality and Recreation, 7(2), 128-134.

Min, K.S., Chai, S.W. & Han, M. (2015). An international comparative study on cyber security strategy. International Journal of Security and its Applications, 9(2), 13-20.

Paraskevas, A. (2022). Cybersecurity in travel and tourism: a risk-based approach. In Handbook of e-Tourism (pp. 1605-1628). Cham: Springer International Publishing.

Plotnek, J.J.  & Slay, J. (2021). Cyber terrorism: A homogenized taxonomy and definition. Computers & Security, 102, 102145.

Rashid, J., Mahmood, T., Nisar, M.W. & Nazir, T. (2020). Phishing detection using machine learning technique. 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH), Riyadh, Saudi Arabia, 43-46.

Raunak, P. & Krishnan, P. (2017). Network detection of ransomware delivered by exploit kit. ARPN Journal of Engineering and Applied Sciences, 12(2), 3885-3889.

Slapničar, S., Vuko, T., Čular, M., & Drašček, M. (2022). Effectiveness of cybersecurity audit.  International Journal of Accounting Information Systems, 44, 1-22.

Specht, S. & Lee, R. (2003). Taxonomies of distributed denial of service networks, attacks, tools and countermeasures. CEL2003-03, Princeton University, 1-20.

Sveen, F.O., Torres, J.M. & Sarriegi, J.M. (2009). Blind information security strategy.  International Journal of Critical Infrastructure Protection, 2(3), 95-109.

Von Solms, R. & Van Niekerk, J. (2013). From information security to cyber security.  Computers & security, 38, 97-102.

Williams, P. A., & Woodward, A. J. (2015). Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Medical devices, 8, 305–316.

Yang, E.C.L. & Nair, V. (2014). Tourism at risk: A review of risk and perceived risk in tourism. Asia-Pacific Journal of Innovation in Hospitality and Tourism (APJIHT), 3, 1-21. 

 

Zaini, M.K., Masrek, M.N., & Abdullah Sani, M.K.J. (2015). A Conceptual Overview on the Relationship Between Information Security Practices and Organizational Agility. Advanced Science Letters, 21(5), 1289-1292.

Objavljeno
2022/12/08
Rubrika
Originalni naučni članak