The Cybersecurity Applied by Online Travel Agencies and Hotels to Protect Users’ Private Data in Smart Cities
Abstract
:1. Introduction
2. Literature Review
2.1. The Cybersecurity in the Context of OTAs, Hotels, and Smart Cities to Enhance the Sensitivity and Private Data of Users
2.2. The Types of Cyberattacks in the Tourism Industry
Type of Cyberattacks | Definition | References |
---|---|---|
Phishing | It is used to obtain sensitive information from users, such as online banking login credentials, company login credentials, credit card details, login credentials, or passwords. | Alawida et al. [21] |
Ransomware | The goal of this attack is to deny its owner or user access to it, and after that, the user pays the attacker directly. The ransomware is programmed to identify the organisation’s most sensitive or valuable data. | Sheridan [65] |
DDoS | It is a type of cyberattack in which cybercriminals aim to crash a computer system or server, making sites and services unavailable to customers. These attacks are commonly used by hacker groups to force websites to go offline. | Chaganti et al. [66] |
Botnets | Botnet attacks use networks of thousands of computers for malicious login attempts, mass spam attacks, or takedown of a network, network devices, and websites. | Elliot [67] |
Data breach | It is a data breach that exposes confidential, sensitive, or protected information to an unauthorised person. | Schlackl et al. [68] |
Password attack | A password attack is used to exploit the authentication of user accounts. Password attacks involve exploiting a broken authorisation vulnerability in the system combined with automatic password attack tools that speed up the guessing and cracking of passwords. | Al-Shareeda et al. [69] |
Hacking | Hacking involves forcefully gaining unauthorised access to it, such as by disabling the security measures of a computer network. | Muñoz et al. [70] |
Website/app breach | A website or app attack is a cyber assault in which sensitive, confidential, or otherwise protected data are accessed and released illegally. | Ukwandu et al. [71] |
Insider | An insider is someone who commits illegal activity against her/his own firm. | Smith and Rupp [72] |
Man-in-the-Middle | An attacker comes in between a two-party communication, i.e., the attacker hijacks the session between a client and host. By doing so, hackers steal and manipulate data. | Huang et al. [73] |
Human error | It refers to an employee either doing something he should not or failing to do something he should. Human error is still very much the driving force behind an overwhelming majority of cybersecurity problems. | Le Coze [74] |
SQL injection | It is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. | Alawida et al. [21] |
Point-of-sale (POS) | Point-of-sale (POS) attacks give hackers valuable data including credit card information such as card numbers and personal identification numbers (PINs). | Paraskevas [3] |
Zero-day exploit | Zero day gets its name from the number of days that a patch has existed for the flaw “zero”. It is a cyberattack that takes advantage of a zero-day vulnerability to install different types of malwares, steal sensitive data or credit card numbers, and cause data breaches. | Deshpande et al. [75] |
2.3. The Perspective of the Consumer against Present and Future Cyberattacks
2.4. Smart Cities’ Need to Prevent Future Cyberattacks and Cyberthreats
3. Methodology
4. Findings and Discussion
Cyberattack Incidents in the Travel and Hospitality Industries
5. Conclusions
5.1. Contribution to Literature
5.2. Practical Implications
5.3. Study Limitations and Future Research
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Buhalis, D.; Leung, D.; Lin, M. Metaverse as a disruptive technology revolutionising tourism management and marketing. Tour. Manag. 2023, 97, 104724. [Google Scholar] [CrossRef]
- Magliulo, A. Cybersecurity and tourism competitiveness. Eur. J. Tour. Hosp. Recreat. 2016, 7, 128–134. [Google Scholar]
- Paraskevas, A. Cybersecurity in travel and tourism: A risk-based approach. In Handbook of e-Tourism; Springer International Publishing: Cham, Swizerland, 2022; pp. 1605–1628. [Google Scholar]
- Levy, Y.; Gafni, R. Introducing the concept of cybersecurity footprint. Inf. Comput. Secur. 2021, 29, 724–736. [Google Scholar] [CrossRef]
- Florido-Benítez, L. International mobile marketing: A satisfactory concept for companies and users in times of pandemic. Benchmarking Int. J. 2022, 29, 1826–1856. [Google Scholar] [CrossRef]
- Bai, H.; Ran, W. Analysis of the Vulnerability and Resilience of the Tourism Supply Chain under the Uncertain Environment of COVID-19: Case Study Based on Lijiang. Sustainability 2020, 14, 2571. [Google Scholar] [CrossRef]
- Talwar, S.; Dhir, A.; Kaur, P.; Mäntymäki, M. Barriers toward purchasing from online travel agencies. Int. J. Hosp. Manag. 2020, 89, 102593. [Google Scholar] [CrossRef]
- Luo, S.; Choi, T.M. E-commerce supply chains with considerations of cyber-security: Should governments play a role? Prod. Oper. Manag. 2022, 31, 2107–2126. [Google Scholar] [CrossRef]
- Verhulsdonck, G.; Weible, J.L.; Helser, S.; Hadjuck, N. Smart Cities, Playable Cities, and Cybersecurity: A Systematic Review, International Journal of Human–Computer Interaction. Int. J. Hum.–Comput. Interact. 2023, 39, 378–390. [Google Scholar] [CrossRef]
- Florido-Benítez, L. Identifying cybersecurity risks in Spanish airports. Cyber Secur. 2021, 4, 267–291. [Google Scholar]
- Vitunskaite, M.; He, Y.; Brandstetter, T.; Janicke, H. Smart cities and cybersecurity: Are we there yet? A comparative study on the role of standards, third party risk management and security ownership. Comput. Secur. 2019, 83, 313–331. [Google Scholar] [CrossRef]
- Alasali, F.; Itradat, A.; Abu Ghalyon, S.; Abudayyeh, M.; El-Naily, N.; Hayajneh, A.M.; AlMajali, A. Smart Grid Resilience for Grid-Connected PV and Protection Systems under Cyber Threats. Smart Cities 2024, 7, 51–77. [Google Scholar] [CrossRef]
- Tutak, M.; Brodny, J. A Smart City Is a Safe City: Analysis and Evaluation of the State of Crime and Safety in Polish Cities. Smart Cities 2023, 6, 3359–3392. [Google Scholar] [CrossRef]
- Morrison, A.M.; Buhalis, D. Routledge Handbook of Trends and Issues in Tourism Sustainability, Planning and Development, Management, and Technology; Routledge: London, UK, 2024. [Google Scholar]
- D’Adamo, I.; González-Sánchez, R.; Medina-Salgado, M.S.; Settembre-Blundo, D. E-Commerce Calls for Cyber-Security and Sustainability: How European Citizens Look for a Trusted Online Environment. Sustainability 2021, 13, 6752. [Google Scholar] [CrossRef]
- Chan, H.K.; He, H.; Wang, W.Y. Green marketing, and its impact on supply chain management in industrial markets. Ind. Mark. Manag. 2012, 41, 557–562. [Google Scholar] [CrossRef]
- Chen, H.S.; Fiscus, J. The inhospitable vulnerability: A need for cybersecurity risk assessment in the hospitality industry. J. Hosp. Tour. Technol. 2018, 9, 223–234. [Google Scholar] [CrossRef]
- PhocusWire. The New Ways Cybercriminals Are Attacking Travel Companies. 2022. Available online: https://www.phocuswire.com/cybercriminals-find-new-ways-to-attack-travel-companies (accessed on 22 February 2023).
- Berezina, K.; Cobanoglu, C.; Miller, B.L.; Kwansa, F.A. The impact of information security breach on hotel guest perception of service quality, satisfaction, revisit intentions and word-of-mouth. Int. J. Contemp. Hosp. Manag. 2012, 24, 991–1010. [Google Scholar] [CrossRef]
- Pizam, A.; Ozturk, A.B.; Hacikara, A.; Zhang, T.; Balderas-Cejudo, A.; Buhalis, D.; Fuchs, G.; Hara, T.; Meira, J.; Revilla, R.G.M.; et al. The role of perceived risk and information security on customers’ acceptance of service robots in the hotel industry. Int. J. Hosp. Manag. 2024, 117, 103641. [Google Scholar] [CrossRef]
- Alawida, M.; Omolara, A.E.; Abiodun, O.I.; Al-Rajab, M. A deeper look into cybersecurity issues in the wake of COVID-19: A survey. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 8176–8206. [Google Scholar] [CrossRef]
- Khursheed, A.; Kumar, M.; Sharma, M. Security against cyberattacks in food industry. Int. J. Control Theory Appl. 2016, 9, 8623–8628. [Google Scholar]
- Tong, L.; Kong, A.; Kwan, M. How to design and strengthen cyber security to cope with data breach in the hotel industry? In Proceedings of the Main Conference Proceedings 2022, Virtual, 22–25 May 2022; p. 61. [Google Scholar]
- Fragniere, E.; Yagci, K. Network & cyber security in hospitality and tourism. In Hospitality & Tourism Information Technology; Cobanoglu, C., Dogan, S., Berezina, K., Collins, G., Eds.; USF M3 Publishing: Orlando, FL, USA, 2021; pp. 1–21. [Google Scholar]
- Singh, P.; Rajput, R.S. Cybersecurity analysis in the context of digital wallets. Int. J. Adv. Stud. Sci. Res. 2019, 4, 522–525. [Google Scholar]
- Lee, I. Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management. Future Internet 2020, 12, 157. [Google Scholar] [CrossRef]
- Bimaruci, H.; Hudaya, A.; Ali, H. Model of consumer trust on travel agent online: Analysis of perceived usefulness and security on re-purchase interests (case study ticket. com). Dinasti Int. J. Econ. Financ. Account. 2020, 1, 110–124. [Google Scholar] [CrossRef]
- Liu, X.; Ahmad, S.F.; Anser, M.K.; Ke, J.; Irshad, M.; Ul-Haq, J.; Abbas, S. Cybersecurity threats: A never-ending challenge for e-commerce. Front. Psychol. 2022, 13, 927398. [Google Scholar] [CrossRef]
- Arcuri, M.C.; Gai, L.; Ielasi, F.; Ventisette, E. Cyberattacks on hospitality sector: Stock market reaction. J. Hosp. Tour. Technol. 2020, 11, 277–290. [Google Scholar]
- Habibzadeh, H.; Nussbaum, B.H.; Anjomshoa, F.; Kantarci, B.; Soyata, T. A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustain. Cities Soc. 2019, 50, 101660. [Google Scholar] [CrossRef]
- Iranmanesh, M.; Ghobakhloo, M.; Nilashi, M.; Tseng, M.L.; Yadegaridehkordi, E.; Leung, N. Applications of disruptive digital technologies in hotel industry: A systematic review. Int. J. Hosp. Manag. 2022, 107, 103304. [Google Scholar] [CrossRef]
- Chin, K. Cybersecurity in the Hospitality Industry: Challenges and Solutions. 2023. Available online: https://www.upguard.com/blog/cybersecurity-in-the-hospitality-industry (accessed on 29 January 2024).
- Bhattacharya, S.; Sharma, R.P.; Gupta, A. Does e-retailer’s country of origin influence consumer privacy, trust and purchase intention? J. Consum. Mark. 2023, 40, 248–259. [Google Scholar] [CrossRef]
- Aftergood, S. Cybersecurity: The cold war online. Nature 2017, 547, 30–31. [Google Scholar] [CrossRef]
- Sarker, I.H.; Kayes, A.S.M.; Badsha, S.; Algahtani, H.; Watters, P.; Ng, A. Cybersecurity data science: An overview from machine learning perspective. J. Big Data 2020, 7, 41. [Google Scholar] [CrossRef]
- Boto-García, D. Hospitality workers’ awareness and training about the risks of online crime and the occurrence of cyberattacks. J. Hosp. Tour. Manag. 2023, 55, 240–247. [Google Scholar] [CrossRef]
- Demertzi, V.; Demertzis, S.; Demertzis, K. An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities. Appl. Sci. 2023, 13, 790. [Google Scholar] [CrossRef]
- De Arroyabe, I.F.; Arranz, C.F.; Arroyabe, M.F.; de Arroyabe, J.C.F. Cybersecurity capabilities and cyberattacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019. Comput. Secur. 2023, 124, 102954. [Google Scholar] [CrossRef]
- Corallo, A.; Lazoi, M.; Lezzi, M.; Luperto, A. Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review. Comput. Ind. 2022, 137, 103614. [Google Scholar] [CrossRef]
- UNWTO. Supporting Jobs and Economies through Travel & Tourism. Call for Action to Mitigate the Socio-Economic Impact of COVID-19 and Accelerate Recovery. 2020. Available online: https://webunwto.s3.eu-west-1.amazonaws.com/s3fs-public/2020-04/COVID19_Recommendations_English_1.pdf (accessed on 10 July 2023).
- Yallop, A.C.; Gică, O.A.; Moisescu, O.I.; Coroș, M.M.; Séraphin, H. The digital traveller: Implications for data ethics and data governance in tourism and hospitality. J. Consum. Mark. 2023, 40, 155–170. [Google Scholar] [CrossRef]
- European Union. What Is GDPR, the EU’s New Data Protection Law? 2023. Available online: https://gdpr.eu/what-is-gdpr/ (accessed on 13 March 2023).
- Hellard, B. Tourism Platforms Sign Data-Sharing Deal with EU. 2020. Available online: https://www.itpro.com/policy-legislation/data-governance/354933/tourism-platforms-sign-data-sharing-deal-with-eu (accessed on 27 May 2023).
- Fernandes, T.; Costa, M. Privacy concerns with COVID-19 tracking apps: A privacy calculus approach. J. Consum. Mark. 2023, 40, 181–192. [Google Scholar] [CrossRef]
- Hauff, C.J.; Nilsson, J. Individual costs and societal benefits: The privacy calculus of contact-tracing apps. J. Consum. Mark. 2023, 40, 171–180. [Google Scholar] [CrossRef]
- Alsmadi, I. Software Management. In The NICE Cyber Security Framework; Springer: Cham, Swizerland, 2020. [Google Scholar]
- Cooper, D.A.; Yalcin, T.; Nistor, C.; Macrini, M.; Pehlivan, E. Privacy considerations for online advertising: A stakeholder’s perspective to programmatic advertising. J. Consum. Mark. 2023, 40, 235–247. [Google Scholar] [CrossRef]
- Malgieri, G. In/acceptable marketing and consumers’ privacy expectations: Four tests from EU data protection law. J. Consum. Mark. 2023, 40, 209–223. [Google Scholar] [CrossRef]
- Elgarhy, S.D. Effects of service quality, loyalty programs, pricing strategies, and customer engagement on firms’ performance in Egyptian travel agencies: Mediating effects of customer retention. J. Qual. Assur. Hosp. Tour. 2022, 24, 753–781. [Google Scholar] [CrossRef]
- Buhalis, D. Strategic use of information technologies in the tourism industry. Tour. Manag. 1998, 15, 409–421. [Google Scholar] [CrossRef]
- Florido-Benítez, L. The impact of tourism promotion in tourist destinations: A bibliometric study. Int. J. Tour. Cities 2022, 8, 844–882. [Google Scholar] [CrossRef]
- GlobalData. Cybersecurity in Travel and Tourism—Thematic Intelligence. 2023. Available online: https://www.globaldata.com/store/report/cybersecurity-in-travel-tourism-theme-analysis/ (accessed on 15 June 2023).
- Shengenvisa. Cyberattacks Increased by 60% In Tourism Sector This Year. 2022. Available online: https://www.schengenvisainfo.com/news/cyberattacks-increased-by-60-in-tourism-sector-this-year/ (accessed on 3 January 2024).
- Airport Technology. Cybersecurity: A Key Theme in the Travel Industry. 2023. Available online: https://www.airport-technology.com/features/cybersecurity-a-key-theme-in-the-travel-industry/ (accessed on 23 February 2023).
- Post. A. The Cybersecurity Risks of Smart City Technologies: What Do the Experts Think? 2023. Available online: https://cltc.berkeley.edu/publication/smart-cities/ (accessed on 2 January 2024).
- Ordóñez-Martínez, D.; Seguí-Pons, J.M.; Ruiz-Pérez, M. Conceptual Framework and Prospective Analysis of EU Tourism Data Spaces. Sustainability 2024, 16, 371. [Google Scholar] [CrossRef]
- Medium.com. The History Of Hotels Cyber Attacks. 2020. Available online: https://securestay.medium.com/the-history-of-hotels-cyber-attacks-4b6a09c8bf30 (accessed on 17 December 2023).
- Scott, N.; Laws, E.; Prideaux, B. Safety and Security in Tourism: Recovery Marketing After Crises; Routledge: Abingdon, UK, 2010. [Google Scholar]
- Prabhu, B.A.; Dani, R.; Bhatt, C. A study of the challenges faced by the hotel sector with regards to cybersecurity. In Automation and Computation; CRC Press: Boca Raton, FL, USA, 2023; pp. 284–294. [Google Scholar]
- Al-Dosari, K.; Fetais, N.; Kucukvar, M. A shift to green cybersecurity sustainability development: Using triple bottom-line sustainability assessment in Qatar transportation sector. Int. J. Sustain. Transp. 2023, 17, 1287–1301. [Google Scholar] [CrossRef]
- Mungo, J. Self-paced cybersecurity awareness training educating retail employees to identify phishing attacks. J. Cyber Secur. Technol. 2023, in press. [CrossRef]
- Wynn, M.; Lam, C. Digitalisation and IT Strategy in the Hospitality Industry. Systems 2023, 11, 501. [Google Scholar] [CrossRef]
- Durst, S.; Hinteregger, C.; Zieba, M. The effect of environmental turbulence on cyber security risk management and organizational resilience. Comput. Secur. 2024, 137, 103591. [Google Scholar] [CrossRef]
- Dodge, M.; Kitchin, R. The challenges of cybersecurity for smart cities. In Creating Smart Cities; Routledge: London, UK, 2018; pp. 205–216. [Google Scholar]
- Sheridan, K. Destructive Malware Attacks up 200% in 2019. 2019. Available online: https://www.darkreading.com/endpoint/destructive-malware-attacks-up-200-in-2019 (accessed on 6 January 2024).
- Chaganti, R.; Bhushan, B.; Ravi, V. A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges, and future directions. Comput. Commun. 2022, 197, 96–112. [Google Scholar] [CrossRef]
- Elliot, C. Hackers Are Targeting Airlines in Record Numbers. Here’s What That Means for You. 2019. Available online: https://www.forbes.com/sites/christopherelliott/2019/02/25/hackers-are-targeting-airlines-in-record-numbers-heres-what-that-means-for-you/ (accessed on 1 February 2023).
- Schlackl, F.; Link, N.; Hoehle, H. Antecedents and consequences of data breaches: A systematic review. Inf. Manag. 2022, 59, 103638. [Google Scholar] [CrossRef]
- Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; Hasbullah, I.H. Password-guessing attack-aware authentication scheme based on Chinese remainder theorem for 5G-enabled vehicular networks. Appl. Sci. 2022, 12, 1383. [Google Scholar] [CrossRef]
- Muñoz, A.; Fernández-Gago, C.; López-Villa, R. A test environment for wireless hacking in domestic IoT scenarios. In Mobile Networks and Applications; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
- Ukwandu, E.; Ben-Farah, M.A.; Hindy, H.; Bures, M.; Atkinson, R.; Tachtatzis, C.; Andonovic, I.; Bellekens, X. CyberSecurity Challenges in Aviation Industry: A Review of Current and Future Trends. Information 2022, 13, 146. [Google Scholar] [CrossRef]
- Smith, A.D.; Rupp, W.T. Issues in cybersecurity; understanding the potential risks associated with hackers/crackers. Inf. Manag. Comput. Secur. 2002, 10, 178–183. [Google Scholar] [CrossRef]
- Huang, J.; Ho, D.W.; Li, F.; Yang, W.; Tang, Y. Secure remote state estimation against linear man-in-the-middle attacks using watermarking. Automatica 2020, 121, 109182. [Google Scholar] [CrossRef]
- Le Coze, J.C. The ‘new view’ of human error. Origins, ambiguities, successes, and critiques. Saf. Sci. 2022, 154, 105853. [Google Scholar] [CrossRef]
- Deshpande, A.; Patil, I.; Bhave, J.; Giri, A.; Sable, N.P.; Chavan, G.T. Detection and Notification of Zero-Day attack to Prevent Cybercrime. In Proceedings of the 2023 4th International Conference for Emerging Technology (INCET), Belgaum, India, 26–28 May 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–5. [Google Scholar]
- Olding, A.; Turner, P. Cyber vulnerabilities and the tourism industry: Developing a conceptual framework. In Proceedings of the ACIS 2007 Proceedings, Toowoomba, Australia, 5–7 December 2007; pp. 848–855. [Google Scholar]
- Chin, K. Biggest Data Breaches in US History. 2023. Available online: https://www.upguard.com/blog/biggest-data-breaches-us (accessed on 19 July 2023).
- ISACA. The Impact of Cybersecurity on Consumer Behaviour. 2022. Available online: https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2022/the-impact-of-cybersecurity-on-consumer-behavior (accessed on 31 December 2023).
- Bonastre, L.; Granollers, T. A set of heuristics for user experience evaluation in e-commerce websites. In Proceedings of the 7th International Conference on Advances in Computer-Human Interactions IARIA, Barcelona, Spain, 23–27 March 2014; pp. 27–34. [Google Scholar]
- ISO 9241-210:2010; Ergonomics of Human-System Interaction—Part 210: Human-Centred Design for Interactive Systems. ISO: Geneva, Switzerland, 2010. Available online: https://www.iso.org/obp/ui/#iso:std:iso:9241:-210:ed-1:v1:en (accessed on 3 August 2023).
- Ritter, M.; Winterbottom, C. UX for the Web: Build Websites for User Experience and Usability; Packt Publishing Ltd.: Birmingham, UK, 2017. [Google Scholar]
- Anichiti, A.; Dragolea, L.L.; Tacu-Hârșan, G.D.; Haller, A.P.; Butnaru, G.I. Aspects Regarding Safety and Security in Hotels: Romanian Experience. Information 2021, 12, 44. [Google Scholar] [CrossRef]
- Eurocontrol. Aviation Under Attack from a Wave of Cybercrime. 2021. Available online: https://www.eurocontrol.int/publication/eurocontrol-think-paper-12-aviation-under-attack-wave-cybercrime (accessed on 1 May 2023).
- Ye, B.H.; Fu, H.; Law, R. Use of impact-range performance and asymmetry analyses to improve OTA website quality. J. Hosp. Tour. Manag. 2016, 26, 9–17. [Google Scholar] [CrossRef]
- Tsang, N.K.; Wong, O. Traveller’s adoption of travel advisory system: A case of Hong Kong’s outbound travel alert system. J. Travel Tour. Mark. 2021, 38, 213–231. [Google Scholar] [CrossRef]
- Chen, J.S.; Kamalanon, P.; Janupiboon, T.P. Company websites and mobile apps versus social media: Which service experience creates more customer value for online travel agencies? Serv. Bus. 2022, 16, 1081–1110. [Google Scholar] [CrossRef]
- Chan, I.C.C.; Ma, J.; Law, R.; Buhalis, D.; Hatter, R. Dynamics of hotel website browsing activity: The power of informatics and data analytics. Ind. Manag. Data Syst. 2021, 121, 1398–1416. [Google Scholar] [CrossRef]
- Park, Y.A.; Gretzel, U.; Sirakaya-Turk, E. Measuring web site quality for online travel agencies. J. Travel Tour. Mark. 2007, 23, 15–30. [Google Scholar] [CrossRef]
- Dong-Her, S.; Hsiu-Sen, C.; Chun-Yuan, C.; Lin, B. Internet security: Malicious e-mails detection and protection. Ind. Manag. Data Syst. 2004, 104, 613–623. [Google Scholar] [CrossRef]
- Cao, K.; Yang, Z. A study of e-commerce adoption by tourism websites in China. J. Destin. Mark. Manag. 2016, 5, 283–289. [Google Scholar] [CrossRef]
- Ali, S.A.; Elsaid, S.A.; Ateya, A.A.; ElAffendi, M.; El-Latif, A.A.A. Enabling Technologies for Next-Generation Smart Cities: A Comprehensive Review and Research Directions. Future Internet 2023, 15, 398. [Google Scholar] [CrossRef]
- United Nations. World Population Prospects: 2017 Revision; Department of Economic and Social Affairs: New York, NY, USA, 2022; Available online: https://population.un.org/wpp/ (accessed on 1 January 2024).
- BT Group. Cybercrime: More Than 500 Potential Attacks Clocked Every Second. 2023. Available online: https://newsroom.bt.com/cybercrime-more-than-500-potential-attacks-clocked-every-second/ (accessed on 3 January 2024).
- Barcik, P.; Coufalikova, A.; Frantis, P.; Vavra, J. The Future Possibilities and Security Challenges of City Digitalization. Smart Cities 2023, 6, 137–155. [Google Scholar] [CrossRef]
- Fabrègue, B.F.G.; Bogoni, A. Privacy and Security Concerns in the Smart City. Smart Cities 2023, 6, 586–613. [Google Scholar] [CrossRef]
- Florido-Benítez, L. Constructing Spanish smart destinations: A new guide for the tourism industry. Int. J. Tour. Cities 2024, in press. [CrossRef]
- Coca-Stefaniak, A.; Morrison, A.M. City tourism destinations and terrorism a worrying trend for now, but could it get worse? Int. J. Tour. Cities 2018, 4, 409–412. [Google Scholar] [CrossRef]
- Jones, R. EasyJet Hacking Attack: Are You Affected and What Should You Do? 2020. Available online: https://www.theguardian.com/business/2020/may/19/easyjet-hacking-attack-what-to-do-customers (accessed on 5 January 2024).
- Javed, A.R.; Shahzad, F.; ur Rehman, S.; Zikria, Y.B.; Razzak, I.; Jalil, Z.; Xu, G. Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects. Cities 2022, 129, 103794. [Google Scholar] [CrossRef]
- Bekkali, A.E.; Essaaidi, M.; Boulmalf, M. A Blockchain-Based Architecture and Framework for Cybersecure Smart Cities. IEEE Access 2023, 11, 76359–76370. [Google Scholar] [CrossRef]
- CSIS. Significant Cyber Incidents Since 2006. 2023. Available online: https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents (accessed on 24 July 2023).
- KonBriefing. Cyberattacks on the Aviation Industry in 2022. 2023. Available online: https://konbriefing.com/en-topics/cyber-attacks-2022-ind-aviation.html#Res478761 (accessed on 1 August 2023).
- AAG. The Latest 2023 Cyber Crime Statistics. 2023. Available online: https://aag-it.com/the-latest-cyber-crime-statistics/#:~:text=Cyber%20crime%20in%20the%20United,for%2046%25%20of%20attacks%20globally (accessed on 3 August 2023).
- Panai, E. A Cybersecurity framework for independent hotels. In Proceedings of the 4th EATSA-FRANCE 2018, Challenges of Tourism Development, Dijon, France, 18–22 June 2018; pp. 145–152. [Google Scholar]
- Yin, H.C.; Goh, E.; Law, R. Developing inter-organizational relationships with online travel agencies (OTAs) and the hotel industry. J. Travel Tour. Mark. 2019, 36, 428–442. [Google Scholar]
- Alhalafi, N.; Veeraraghavan, P. Exploring the Challenges and Issues in Adopting Cybersecurity in Saudi Smart Cities: Conceptualization of the Cybersecurity-Based UTAUT Model. Smart Cities 2023, 6, 1523–1544. [Google Scholar] [CrossRef]
- Alohali, B.A. Aviation Cybersecurity National Governance. 2023. Available online: https://www.icao.int/MID/Documents/2023/Cybersecurity%20Symposium/2.2%20Saudi%20Arabia%20-%20Aviation%20Cybersecurity%20National%20Governance.pdf (accessed on 29 January 2024).
- Shabani, N.; Munir, A. A Review of Cyber Security Issues in Hospitality Industry. In Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing; Arai, K., Kapoor, S., Bhatia, R., Eds.; Springer: Cham, Swizerland, 2020; Volume 1230, pp. 82–493. [Google Scholar]
- Wicaksono, A.; Maharani, A. The effect of perceived usefulness and perceived ease of use on the technology acceptance model to use online travel agency. J. Bus. Manag. Rev. 2020, 1, 313–328. [Google Scholar] [CrossRef]
- Thomaidis, A. Data Breaches in Hotel Sector According to General Data Protection Regulation (EU 2016/679); Valeri, M., Ed.; Tourism Risk, Emerald Publishing Limited: Bingley, UK, 2022; pp. 129–140. [Google Scholar]
- GDPR. What Are the GDPR Fines? 2023. Available online: https://gdpr.eu/fines/ (accessed on 7 June 2023).
- Gwebu, K.; Barrows, C.W. Data breaches in hospitality: Is the industry different? J. Hosp. Tour. Technol. 2020, 11, 511–527. [Google Scholar] [CrossRef]
- Wang, X.; Wang, X.; Liu, Z.; Chang, W.; Hou, Y.; Zhao, Z. Too generous to be fair? Experiments on the interplay of what, when, and how in data breach recovery of the hotel industry. Tour. Manag. 2022, 88, 104420. [Google Scholar] [CrossRef]
- Gitlin, M.; Goldstein, M.J. Cyberattack; Twenty-First Century Books: Minneapolis, MN, USA, 2015. [Google Scholar]
- Newman, C.A. When to Report a Cyberattack? For Companies, That’s Still a Dilemma. 2018. Available online: https://www.nytimes.com/2018/03/05/business/dealbook/sec-cybersecurity-guidance.html (accessed on 25 December 2023).
- Sahu, A.K.; Gutub, A. Improving grayscale steganography to protect personal information disclosure within hotel services. Multimed. Tools Appl. 2022, 81, 30663–30683. [Google Scholar] [CrossRef]
- Swinhoe, D. Why Businesses Don’t Report Cybercrimes to Law Enforcement. 2019. Available online: https://www.csoonline.com/article/567307/why-businesses-don-t-report-cybercrimes-to-law-enforcement.html (accessed on 6 January 2024).
- Dearden, T.E.; Parti, K.; Hawdon, J.; Gainey, R.; Vandecar-Burdin, T.; Albanese, J. Differentiating Insider and Outsider Cyberattacks on Businesses. Am. J. Crim. Justice 2023, 48, 871–886. [Google Scholar] [CrossRef]
- Phelps, J.; Nowak, G.; Ferrell, E. Privacy Concerns and Consumer Willingness to Provide Personal Information. J. Public Policy Mark. 2000, 19, 27–41. [Google Scholar] [CrossRef]
- Culnan, M.J.; Bies, R.J. Consumer Privacy: Balancing Economic and Justice Considerations. J. Soc. Issues 2003, 59, 323–342. [Google Scholar] [CrossRef]
- Flavián, C.; Guinalíu, M. Consumer trust, perceived security, and privacy policy: Three basic elements of loyalty to a web site. Ind. Manag. Data Syst. 2006, 106, 601–620. [Google Scholar] [CrossRef]
- Tussyadiah, I.; Li, S.; Miller, G. Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In Information and Communication Technologies in Tourism 2019; Pesonen, J., Neidhardt, J., Eds.; Springer: Cham, Swizerland, 2019. [Google Scholar]
- Almeida, F. Prospects of Cybersecurity in Smart Cities. Future Internet 2023, 15, 285. [Google Scholar] [CrossRef]
- Chong, A.Y.L.; Blut, M.; Zheng, S. Predicting consumer decisions to adopt mobile commerce: Cross country empirical examination between China and Malaysia. Decis. Support Syst. 2022, 53, 34–43. [Google Scholar] [CrossRef]
- Cai, Z.; Liu, H.; Huang, Q.; Kang, Y.; Liang, L. Encouraging client’s knowledge sharing in enterprise system post-implementation through psychological contract and entrepreneurial orientation. Inf. Technol. People 2020, 33, 689–709. [Google Scholar] [CrossRef]
- Saputra, R.W. A survey of cybercrime in Indonesia. In Proceedings of the 2016 International Conference on ICT For Smart Society (ICISS), Surabaya, Indonesia, 20–21 July 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–5. [Google Scholar]
- Babu, K.E.K. The Reality of Cybersecurity in Bangladesh, Relevant Laws, Drawbacks and Challenges. In Cybersecurity in the Age of Smart Societies; Advanced Sciences and Technologies for Security Applications; Jahankhani, H., Ed.; Springer: Cham, Swizerland, 2023. [Google Scholar]
- Hall, C.M. Travel Safety, Terrorism, and the Media: The Significance of the Issue-Attention Cycle. Curr. Issues Tour. 2022, 5, 458–466. [Google Scholar] [CrossRef]
Year | Class | Incident Attack | Sector | Country | The Cyberattack Description |
---|---|---|---|---|---|
2000 | Confidentiality | Data breach | Airline | U.K. | EasyJet airlines reported that it had fallen victim to a very sophisticated cyberattack. The hackers gained access to the email addresses and travel information of about 9 million customers. |
2008 | Availability | Bot | Hotel | U.S. | Wyndham hotels suffered three data security attacks, which resulted in nearly USD 11 million in identity fraud damages. |
2010 | Confidentiality | DDoS | Hotel | U.S. | HEI Hotels & Resorts were hit by a DDoS attack, exposing the credit card number, expiration date, security code, and encoded magstripe data. |
2014 | Confidentiality | Malware | Hotel | U.S. | White Lodging Hotels were hacked by malware. |
2014 | Availability | Ransomware | Hotel | U.S. | The Houstonian Hotel, Club & Spa suffered a ransomware attack that exposed users’ credit card information. |
2015 | Confidentiality | Malware | Hotel | China | For Mandarin Oriental, the Hotel Group reported that Mandarin’s credit card system was compromised by a malware attack. |
2015 | Confidentiality | Data breach | OTA | Germany | Thousands of travel agents in Germany were embroiled in a scandal involving the sharing of sensitive business data by their consortium’s head office. The scandal, exposed by business newspaper Handelsblatt, caused uproar in German trade after the leading agency consortium RTK passed detailed sales figures of up to 4000 travel agencies to the tour operator FTI over a period of up to eight years. FTI is Germany’s third-biggest operator. |
2015 | Confidentiality | Malware | Hotel | U.S. | Noble House Hotels & Resorts reported that a malware downloaded guest information from the magnetic strip of credit cards swiped at the subject location. |
2015 | Confidentiality | Malware | Hotel | U.S. | Starwood Hotels & Resorts were attacked by malware, which stole users’ credit and debit card data. |
2015 | Confidentiality | Malware | Hotel | U.S. | Las Vegas Resort reported that a malware attack collected hotel guests’ names, card numbers, and expiration dates, |
2015 | Confidentiality | Malware | Hotel | U.S. | HEI Hotels & Resorts informed that a malware attack collected the personal information of its guests such as names, payment card numbers, and verification codes. |
2015 | Confidentiality | Data breach | Hotel | U.S. | BBC News reported that Hilton was fined USD 700,000 for mishandling data breaches in 2014 and 2015. |
2016 | Confidentiality | Data breach | Hotel | U.S. | InterContinental Hotel Group reported a credit card breach across some 5000 hotels worldwide. |
2016 | Availability | Hacking | Hotel | U.S. | KrebsonSecurity reported that hackers breached credit card systems at some of the Trump Hotel Collection establishments. |
2016 | Confidentiality | Malware | Restaurant | U.S. | Landry’s, Inc. revealed that hackers installed malware on payment card processing devices that lifted the data from the magnetic swipe stripe of payment cards in more than 300 of the chain’s restaurants, hotels, and casinos. |
2016 | Confidentiality | Data breach | Hotel | U.S. | Millennium Hotels & Resorts North America reported a data security collected customers’ card payments. |
2016 | Confidentiality | Malware | Hotel | U.S. | Omni Hotels reported that a malware attack collected more than 50,000 customer credit and debit cards that had been exposed to the attack. |
2017 | Confidentiality | Data breach | Travel reservation system | U.S. | Sabre Corporation was hacked by a data breach, and this collected consumers’ payment card data and personally identifiable information. |
2017 | Confidentiality | Data breach | Hotel | U.S. | Hyatt Hotels & Resorts were affected by a data breach into guest payment card information at 41 corporate-managed properties across 11 countries. |
2017 | Integrity | Hacking | OTA | U.S. | Orbitz, a subsidiary of online travel agency Expedia, reported that hackers accessed personal information from about 880,000 payment cards. |
2018 | Availability | Data breach | Hotel | U.S. | In March 2019, Marriott company announced that the 2018 data breach cost the company, pre-tax, a total of USD 28 million. |
2018 | Confidentiality | Data breach | Airline | Hong Kong | Cathay Pacific Airways revealed a data breach that compromised 9.4 million passenger records. |
2018 | Confidentiality | Data breach | Airline | U.K. | A data breach impacted 500,000 British Airways customers. The data breach compromised login, payment card, and travel booking details, while credit card details were stolen as they were being entered. |
2018 | Confidentiality | Data breach | Airline | U.S. | Delta airlines confirmed a breach of customer payment details due to a cyberattack. Hackers had unauthorised access to credit card information of fewer than 100,000 of its customers. |
2018 | Confidentiality | Data breach | Airline | Canada | Air Canada reported a mobile app data breach affecting the personal data of 20,000 people. |
2018 | Confidentiality | Malware | OTA | France | FastBooking was hit by a malware attack, which collected users’ payment card details from guests at hundreds of hotels. |
2018 | Confidentiality | Data breach | Hotel | China | A breach of data at Huazhu Hotels Group affected 130 million customers and their cell phone numbers, login credentials, addresses, dates of birth, credit card numbers, bank account numbers, and booking details. |
2018 | Confidentiality | Data breach | Hotel | U.S. | Radisson Hotel Group identified a security breach of data, and this stole users’ email addresses and phone numbers. |
2019 | Confidentiality | Phishing | Hotel | U.S. | Drury Hotels were hit by phishing attacks. |
2019 | Confidentiality | Data breach | Hotel | U.S. | Choice Hotels International reported a data breach that compromised users’ email addresses and credit card details. |
2019 | Confidentiality | Data breach | Hotel | U.S. | MGM Resorts International suffered a data breach in 2019 that affected 10.6 million guests. |
2020 | Confidentiality | Data breach | OTA | Spain | A Barcelona, Spain-based software firm called Prestige Software was caught exposing sensitive, private, and financial data of millions of customers around the globe. Customers from Booking.com, Expedia, Agoda, Amadeus, Hotels.com, Hotelbeds, Omnibees, Sabre, and several others are among the unsuspected victims of the data breach. |
2020 | Confidentiality | Data breach | OTA | U.S. | An internal leak exposed Airbnb hosts’ personally identifiable information to other users due to a data breach. |
2020 | Availability | Hacking | OTA | U.S. | The U.S. travel management firm CWT reported that they paid USD 4.5 million hackers who stole reams of sensitive corporate files and said they had knocked 30,000 computers offline. |
2021 | Integrity | POS | Restaurant | U.S. | Four restaurant chains in the U.S. disclosed payment card theft via PoS malware that took place over the summer. |
2021 | Confidentiality | Human error | Supermarket | U.S. | Wegmans Food Markets notified customers that some of their information was exposed after the company became aware that two of its databases were publicly accessible on the internet because of a configuration issue. |
2021 | Confidentiality | Ransomware | Supermarket | Netherlands | A ransomware attack against warehousing and transportation provider Bakker Logistics caused a cheese shortage in Dutch supermarkets. |
2021 | Confidentiality | Data breach | Bus transport | U.K. | Nottingham City Transport: Bus operator was hit by a data breach. |
2021 | Availability | Hacking | Entertainment | Switzerland | The Berlin Zoological Garden announced that one of its external service providers, Ticketcounter B.V., suffered a data breach affecting around 400,000 of its visitors. |
2021 | Confidentiality | Ransomware | Entertainment | Australia | A Tasmania casino operator suspended operations for 10 days due to a cyberattack that impacted its pokies machines and hotel bookings system for more than a week. |
2021 | Confidentiality | Ransomware | Hotel | Spain | Meliá Hotels International were hacked by a ransomware attack. |
2021 | Confidentiality | Website/app breach | Marketing | Hong Kong | Hong Kong marketing firm Fimmick was hit by a cyberattack, according to a British cybersecurity firm monitoring the situation. Fimmick serves several clients like McDonald’s, Coca-Cola, Shell, Asus, and others. |
2021 | Confidentiality | Website/app breach | Supermarket | U.K. | Tesco’s website and app was crashed after a web and app breach attack. |
2021 | Confidentiality | Zero-day exploit | Technology | U.S. | Hackers took control of Microsoft’s vulnerable systems due to a zero-day exploit attack. |
2022 | Confidentiality | Phishing | OTA | Netherlands | Booking.com suffered several cyberattacks on the professional interfaces of hoteliers and their clients. |
2022 | Confidentiality | Data breach | OTA | U.S. | SevenRooms suffered a data breach. |
2022 | Confidentiality | Data breach | Hotel | U.S. | The Holiday Inn owner, Intercontinental Hotels Group, confirmed that the company was hit by a data breach attack. |
2022 | Confidentiality | Data breach | Bus transport | U.K. | Go-Ahead Group confirmed a cyberattack after finding “unauthorised activity” within its IT systems. |
2022 | Confidentiality | Data breach | Airline | U.S. | American Airlines reported a data breach in which hackers compromised an undisclosed number of email accounts belonging to its personnel and gained access to confidential personal information. |
2022 | Confidentiality | DDoS | Airport | Taiwan | DDoS attacks targeted Taiwanese websites just before House of Representatives Speaker Nancy Pelosi arrived in Taiwan. At least four websites were targeted, including Taiwan Taoyuan International airport. |
2022 | Availability | Hacking | Airline | France | Air France—KLM shut down the booking facility on its AgentConnect travel agent portal due to hacking attacks. The airline reported that several OTAs on the French market were affected by cyberattacks. |
2023 | Confidentiality | Data breach | Airport | Germany | The official websites of Berlin (BER), Frankfurt (FRA), Munich (MUC), Düsseldorf (DUS), Nuremberg (NUE), and Dortmund (DTM) airports fell victim to large-scale DDoS attacks, and this caused the websites of the airports to be down temporarily. |
2023 | Confidentiality | Data breach | Airline | Sweden | Scandinavian airline SAS was hit by data breach attacks, and hackers paralyzed the carrier’s website and leaked customer information from its app. |
2023 | Availability | Data breach | Hotel | U.S. | Choice Hotels International confirmed that guest data from its Radisson Hotels Americas chain was compromised as part of the massive MOVEit file transfer system hack carried out by the Cl0p ransom gang. |
2023 | Confidentiality | Ransomware | Restaurant | U.S. | Pizza Hut, KFC, and Taco Bell companies advised a number of individuals that their personal data were exposed during a ransomware attack |
2023 | Confidentiality | Data breach | Online payment system | U.S. | PayPal suffered a data breach attack in which the hackers were able to access PayPal customer accounts using stolen login credentials. |
2023 | Availability | Hacking | Hotel | U.S. | The Marriot Hotel group suffered a data breach attack after a hacking group tricked an employee and subsequently gained computer access. |
2023 | Availability | Ransomware | OTA | U.K. | Scenic Group was exposed to a ransomware attack in February 2023. |
2023 | Availability | SQL injection | Entertainment | Netherlands | Landal Greenparks reported a data breach attack. This cyberattack compromised personal information, including names, birth dates, genders, addresses, and email addresses. |
2023 | Confidentiality | DDoS | Hotel/OTA | Spain | DMO website of Spain (Spain.info), Paradores, Riu, Majestic, Petit Palace, Only You, Catalonia Hotels & Resorts websites, and OTAs’ Reservalis and Best Hotels were attacked by a DDoS. This attack was made by the pro-Russian group called NoName057. |
Category of Attack | Hotel | OTA | Airlines | Entertainment | Restaurant | Supermarket | Airport | Bus Transport | Marketing | Travel Reservation System | Online Payment System | Technology |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Data breach | 11 | 4 | 7 | 1 | 2 | 1 | 1 | |||||
Malware | 7 | 1 | 1 | |||||||||
Ransomware | 2 | 1 | 1 | 1 | 1 | |||||||
Phishing | 1 | 1 | ||||||||||
Hacking | 2 | 2 | 1 | 1 | ||||||||
DDoS | 2 | 1 | 1 | |||||||||
Website/app breach | 1 | 1 | ||||||||||
POS | 1 | |||||||||||
Bot | 1 | |||||||||||
Human error | 1 | |||||||||||
SQL injection | 1 | |||||||||||
Zero-day exploit | 1 | |||||||||||
Total | 26 | 10 | 8 | 3 | 3 | 3 | 2 | 2 | 1 | 1 | 1 | 1 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Florido-Benítez, L. The Cybersecurity Applied by Online Travel Agencies and Hotels to Protect Users’ Private Data in Smart Cities. Smart Cities 2024, 7, 475-495. https://doi.org/10.3390/smartcities7010019
Florido-Benítez L. The Cybersecurity Applied by Online Travel Agencies and Hotels to Protect Users’ Private Data in Smart Cities. Smart Cities. 2024; 7(1):475-495. https://doi.org/10.3390/smartcities7010019
Chicago/Turabian StyleFlorido-Benítez, Lázaro. 2024. "The Cybersecurity Applied by Online Travel Agencies and Hotels to Protect Users’ Private Data in Smart Cities" Smart Cities 7, no. 1: 475-495. https://doi.org/10.3390/smartcities7010019
APA StyleFlorido-Benítez, L. (2024). The Cybersecurity Applied by Online Travel Agencies and Hotels to Protect Users’ Private Data in Smart Cities. Smart Cities, 7(1), 475-495. https://doi.org/10.3390/smartcities7010019