PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Cybersecurity in travel based on the opinions of university students engaging in tourism

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Cybersecurity is a critical, yet often overlooked aspect of travelling domestically and abroad. Several issues connected with cybersecurity, such as the possibility of network-based attacks while connected to public wireless networks as well as matters connected with physical security of carried devices arise when travelling and are exacerbated with repeated border crossings or stays in several accommodation facilities. This study focuses on gauging the types of security precautions university students take when engaging in tourism and providing recommendations based on the collected data and responses taken from participants of the study. In the investigation, an analysis of source materials was used in conjunction with a diagnostic survey distributed among university students in Poland. In the study, the research hypothesis of “Among the surveyed students, most are at least partially security-conscious, but the majority fail to implement adequate measures of improving data confidentiality and availability on their personal devices while travelling” has been put forward.
Rocznik
Strony
7--15
Opis fizyczny
Bibliogr. 21 poz., rys.
Twórcy
autor
  • AGH Univeristy of Science and Technology, Kraków, Poland
  • Apius Technologies S.A.
Bibliografia
  • Erendor M.E., Yildirim M., 2022. Cybersecurity Awareness in Online Education: A Case Study Analysis. IEEE Access 10, 52319-52335, DOI: 10.1109/ACCESS.2022.3171829.
  • Garba A., Siraj M., Alhaji Musa M., Othman S., 2020. A Study on Cybersecurity Awareness Among Students in Yobe: A Quantitative Approach. International Journal on Emerging Technologies 11(5), 41-49.
  • Ikram M., Vallina-Rodriguez N., Seneviratne S., Kaafar M.A., Paxson V. 2016. An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. [In] Gill P., Heidemann J. [Eds.] Book of Proceedings IMC 2016: Internet measurement Conference, November 14-16, Santa Monica, California, USA, 349–364, https://doi.org/10.1145/2987443.2987471.
  • Prensky M., 2001. Digital Natives, Digital Immigrants. On the Horizon 9(5), 1-6, DOI:10.1108/10748120110424816.
  • Shirey R.W., 2007. Internet Security Glossary, Version 2. Request for Comments (RFC) 4949. Copyright Internet Engineering Task Force (IETF), 364, DOI: https://doi.org/10.17487/RFC4949.
  • Sremath Tirumala S., Sarrafzadeh A., Pang P., 2016. A survey on internet usage and cybersecurity awareness in students. [In:]Sarrafzadeh M. [Ed.] Book of Proceedings 14th Annual Conference on Privacy, Security and Trust (PST), 12-14 December, Auckland, New Zeland, DOI: https://doi.org/10.1109/PST.2016.7906931.
  • Zinkus, M., Jois, T.M., Green, M. 2021. Data security on mobile devices: Current state of the art, open problems, and proposed solutions. arXiv, 118, https://arxiv.org/pdf/2105.12613.pdf.
  • European Commission, Cybercrime, https://home-affairs.ec.europa.eu/cybercrime_en (Date of access: 01.11.2022).
  • Gallagher S., 2016. Checking in with spear phishing, criminals check out with hotel credit card data, https://ars-technica.com/information-technology/2016/05/hotels-face-increasingly-targeted-attacks-on-customer-data/ (Date of access: 27.09.2022).
  • Harwell D., 2022. Customs officials have copied Americans’ phone data at massive scale. Washington Post, https://www.washingtonpost.com/technology/2022/09/15/government-surveillance-database-dhs/ (Date of access: 27.09.2022).
  • Hotel Internet Services, 2019. Meeting Hotel Guest Wi-Fi Expectations in the Age of Hyper Connectivity and IoT. Hotel Internet Services, https://www.hotelwifi.com/wp-content/uploads/2019/02/WiFi_Whitepaper.pdf (Date of access: 27.09.2022).
  • Malwarebytes Inc., Demographics of Cybercrime Report, https://www.malwarebytes.com/resources/2021-demo-graphics-of-cybercrime-report/index.html#younger (Date of access: 27.09.2022).
  • Morgan S., 2022. Cybersecurity Almanac: 100 Facts, Figures, Predictions And Statistics. Cybercrime Magazine, https://cybersecurityventures.com/cybersecurity-almanac-2019/ (Date of access: 27.09.2022).
  • Orphanides K.G, 2020. Free VPNs are a privacy nightmare. You shouldn’t download them. Wired UK, https://www.wired.co.uk/article/free-vpn-android-ios-privacy (Date of access: 27.09.2022).
  • Palmer D., Hackers are using hotel Wi-Fi to spy on guests, steal data. ZDNET, https://www.zdnet.com/article/hackers-are-using-hotel-wi-fi-to-spy-on-guests-steal-data/ (Date of access: 27.09.2022).
  • Raynor E., 2021. Everything you need to know about Android encryption. Hexnode Blogs, https://www.hexnode.com/blogs/everything-you-need-to-know-about-android-encryption/ (Date of access: 27.09.2022).
  • Schwartz A., Sophia C., Kalia A., Schoen S., 2017. Digital Privacy at the U.S. Border: Protecting the Data On Your Devices, https://www.eff.org/wp/digital-privacy-us-border-2017 (Date of access: 27.09.2022).
  • Smith L., Read B., 2017. APT28 Targets Hospitality Sector, Presents Threat to Travelers, https://www.mandiant.com/resources/blog/apt28-targets-hospitality-sector-presents-threat-travelers (Date of access: 27.09.2022).
  • U.S. Customs and Border Protection, CBP Enforcement Statistics Fiscal Year 2022, https://www.cbp.gov/news-room/stats/cbp-enforcement-statistics (Date of access: 27.09.2022).
  • Whitehead J., 2018. Booking.com targeted by hackers with email scam asking customers for payment details, https://www.independent.co.uk/travel/news-and-advice/travel-website-hackers-cyber-crime-phishing-holidays-a8382771.html (Date of access: 27.09.2022).
  • Wueest C., 2019. Two in Three Hotel Websites Leak Guest Booking Details and Allow Access to Personal Data, http://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/hotel-websites-leak-guest-data (Date of access: 27.09.2022)
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-e2d5cf43-5465-4fff-8e5f-103e5e08d74b
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.