CYBER SECURITY AND TOURISM: BIBLIOMETRIC ANALYSIS

  • Matija Kovačić University North, Koprivnica, Croatia https://orcid.org/0000-0002-5472-5192
  • Marko Čičin-Šain PAR University College Rijeka, Rijeka, Croatia
  • Vedran Milojica PAR University College Rijeka, Rijeka, Croatia
Keywords: cyber security, tourism, risk, bibliometric analysis

Abstract


The topic of cyber security in tourism is of particular importance since tourists in foreign countries are one of the most vulnerable groups due to a lack of knowledge of languages, laws, etc. With the increase in the number of technologies that enable interactivity, contactless payments, i.e., informative content for tourists, risks for the security of tourists' data as well as risks related to the theft of data on tourists' bank cards are emerging. In order to identify the current knowledge, i.e., the current situation in the context of research on cyber security in tourism, a bibliometric analysis was conducted, which indicated that an insufficient number of authors research cyber security and that there is not a sufficient number of studies that would analyze the mechanisms and measures of increasing cyber security in tourism. The importance of researching cyber security in tourism is based on the fact that tourism is a particularly vulnerable and sensitive branch of the economy to risks that affect tourists as such, and that it can depend on the reputation of the country, institutions, or hotels. The bibliometric analysis conducted in this paper is significant for future researchers considering that it can serve as a basis for researchers' focus on specific areas of cyber security. 

References

Anichiti, A., Dragolea, L.L., Tacu Hârșan, G.D., Haller, A.P. & Butnaru, G.I. (2021). Aspects regarding safety and security in hotels: Romanian experience. Information, 12(1), 1-22.

Apvrille, A. (2014). The evolution of mobile malware. Fraud & Security, 2014(8), 18-20.

Artigas, E. M., Vilches-Montero, S., & Yrigoyen, C. C. (2015). Antecedents of tourism destination reputation: The mediating role of familiarity. Journal of Retailing and Consumer Services, 26, 147-152.

Bellare, M., Fuchsbauer, G., & Scafuro, A. (2016). NIZKs with an untrusted CRS: security in the face of parameter subversion. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 777-804). Springer, Berlin, Heidelberg.

Bodkhe, U., Tanwar, S., Parekh, K., Khanpara, P., Tyagi, S., Kumar, N., & Alazab, M. (2020). Blockchain for industry 4.0: A comprehensive review," IEEE Access, 79764-79800.

Buntak, K., Kovačić, M., & Mutavdžija, M. (2021). Application of Artificial Intelligence in the business. International journal for quality research, 15(2), 403-416.

Challa, S., Wazid, M., Das, A.K., Kumar, N., Reddy, A.G., Yoon, E.J., & Yoo, K.Y. (2017). Secure signature-based authenticated key establishment scheme for future IoT applications.  IEEE Access, 3028-3043.

Chen, H.S. & Jai, T.M.C.  (2019). Cyber alarm: Determining the impacts of hotel’s data breach messages. International Journal of Hospitality Management, 82, 326-334.

Chiew, K.L., Yong, K.S.C. & Tan, C.L. (2018). A survey of phishing attacks: Their types, vectors and technical approaches. Expert Systems with Applications, 106, 1-20. 

Čiković, K.F., Martinčević, I. & Lozić, J.  (2022). Application of Data Envelopment Analysis (DEA) in the Selection of Sustainable Suppliers: A Review and Bibliometric Analysis.  Sustainability, 14(11), 1-30.

Coca-Stefaniak, A. & Morrison, A.M. (2018). City tourism destinations and terrorism–a worrying trend for now, but could it get worse?. International Journal of Tourism Cities, 4(4), 409-412.

Cocosila, M. & Trabelsi, H. (2016). An integrated value-risk investigation of contactless mobile payments adoption. Electronic Commerce Research and Applications, 20, 159-170.

Dwivedi, Y.K., Hughes, L., Ismagilova, E., Aarts, G., Coombs, C., Crick, T., & Williams, M.D. (2021). Artificial Intelligence (AI): Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. International Journal of Information Management, 57, 101994.

Emms, M., Arief, B., Little, N., & Moorsel, A. V. (2013). Risks of offline verify PIN on contactless cards. In International Conference on Financial Cryptography and Data Security (pp. 313-321). Springer, Berlin, Heidelberg.

Fragniere, E., & Yagci, K. (2021). Network & Cyber Security in Hospitality and Tourism. University of South Florida M3 Center Publishing, 17(9781732127593), 7.

Gretzel, U., Sigala, M., Xiang, Z., & Koo, C. (2015). Smart tourism: foundations and developments. Electronic markets, 25(3), 179-188.

Hong, J. (2012). The state of phishing attacks. Communications of the ACM, 55(1), 74-81. 

Kim, H.B., Lee, D.S., & Ham, S. (2013). Impact of hotel information security on system reliability. International Journal of Hospitality Management, 35, 369-379.

Kim, K., Kim, J. S., Jeong, S., Park J. H., & Kim, H.K. (2021). Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 103, 102150.

Knudsen, L., & Wagner, D. (2002). Integral cryptanalysis. In International Workshop on Fast Software Encryption (pp. 112-127). Springer, Berlin, Heidelberg. 2002  

Kovačić, M., Mutavdžija, M., & Buntak, K. (2022). New Paradigm of Sustainable Urban Mobility: Electric and Autonomous Vehicles—A Review and Bibliometric Analysis.  Sustainability, 14(15), 1-23.

Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M. & Weippl, E. (2014). QR code security: A survey of attacks and challenges for usable security. International Conference on Human Aspects of Information Security, Privacy, and Trust, Heraklion, Crete, Greece, 79-90.

Li, Y. & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176-8186.

Liao, Y. (2019). Research and implementation of the intelligent tourism system based on VRGIS. The International Conference on Cyber Security Intelligence and Analytics, Shenyang, China, 130-135.

Lugovic, S., Mrsic, L., & Korona, L.Z. (2919). Public WiFi security network protocol practices in tourist destination. 16th International Symposium on Pervasive Systems, Algorithms and Networks I-SPAN 2019, Naples, Italy, 321-332. 

Magliulo, A. & Wright A.C. (2014). Cyber Security in Tourism: The Role of Awareness. In: M. Sitek, I. Niedziόtka, A. Ukleja (Eds.), Consumer Protection, (pp. 71-96). Alcide De Gasperi University Jόzefόw. 

Magliulo, A. (2016). Cyber security and tourism competitiveness. European Journal of Tourism, Hospitality and Recreation, 7(2), 128-134.

Min, K.S., Chai, S.W. & Han, M. (2015). An international comparative study on cyber security strategy. International Journal of Security and its Applications, 9(2), 13-20.

Paraskevas, A. (2022). Cybersecurity in travel and tourism: a risk-based approach. In Handbook of e-Tourism (pp. 1605-1628). Cham: Springer International Publishing.

Plotnek, J.J.  & Slay, J. (2021). Cyber terrorism: A homogenized taxonomy and definition. Computers & Security, 102, 102145.

Rashid, J., Mahmood, T., Nisar, M.W. & Nazir, T. (2020). Phishing detection using machine learning technique. 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH), Riyadh, Saudi Arabia, 43-46.

Raunak, P. & Krishnan, P. (2017). Network detection of ransomware delivered by exploit kit. ARPN Journal of Engineering and Applied Sciences, 12(2), 3885-3889.

Slapničar, S., Vuko, T., Čular, M., & Drašček, M. (2022). Effectiveness of cybersecurity audit.  International Journal of Accounting Information Systems, 44, 1-22.

Specht, S. & Lee, R. (2003). Taxonomies of distributed denial of service networks, attacks, tools and countermeasures. CEL2003-03, Princeton University, 1-20.

Sveen, F.O., Torres, J.M. & Sarriegi, J.M. (2009). Blind information security strategy.  International Journal of Critical Infrastructure Protection, 2(3), 95-109.

Von Solms, R. & Van Niekerk, J. (2013). From information security to cyber security.  Computers & security, 38, 97-102.

Williams, P. A., & Woodward, A. J. (2015). Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Medical devices, 8, 305–316.

Yang, E.C.L. & Nair, V. (2014). Tourism at risk: A review of risk and perceived risk in tourism. Asia-Pacific Journal of Innovation in Hospitality and Tourism (APJIHT), 3, 1-21. 

 

Zaini, M.K., Masrek, M.N., & Abdullah Sani, M.K.J. (2015). A Conceptual Overview on the Relationship Between Information Security Practices and Organizational Agility. Advanced Science Letters, 21(5), 1289-1292.

Published
2022/12/08
Section
Original Scientific Paper