{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T15:30:40Z","timestamp":1774625440838,"version":"3.50.1"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030522421","type":"print"},{"value":"9783030522438","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-52243-8_35","type":"book-chapter","created":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T11:03:49Z","timestamp":1593774229000},"page":"482-493","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A Review of Cyber Security Issues in Hospitality Industry"],"prefix":"10.1007","author":[{"given":"Neda","family":"Shabani","sequence":"first","affiliation":[]},{"given":"Arslan","family":"Munir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,4]]},"reference":[{"issue":"2","key":"35_CR1","first-page":"1","volume":"31","author":"A Bilgihan","year":"2013","unstructured":"Bilgihan, A., Karadag, E., Cobanoglu, C., Okumus, F.: Research note: biometric technology applications and trends in hotels. FIU Hospitality Rev. 31(2), 1\u201318 (2013)","journal-title":"FIU Hospitality Rev."},{"key":"35_CR2","unstructured":"Butler, J.: Not Just Heads In Beds \u2013 Cybersecurity for Hotel Owners (2016). \nhttps:\/\/www.hospitalitynet.org\/opinion\/4073687.html\n\n. Accessed 26 Dec 2019"},{"key":"35_CR3","unstructured":"Clark, C.: The Serious Cyber Security Threat That Could Hurt Hotels (2015). \nhttp:\/\/www.pcma.org\/news\/news-landing\/2015\/04\/13\/the-serious-cyber-security-threat-that-could-hurt-hotels#.VqhHLGCZaJV\n\n. 26 Feb 2016"},{"issue":"1","key":"35_CR4","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1300\/J149v08n01_03","volume":"8","author":"C Cobanoglu","year":"2007","unstructured":"Cobanoglu, C., Demicco, F.J.: To be secure or not to be: isn\u2019t this the question? a critical look at hotel\u2019s network security. Int. J. Hospitality Tour. Administration 8(1), 43\u201359 (2007)","journal-title":"Int. J. Hospitality Tour. Administration"},{"key":"35_CR5","volume-title":"Hospitality Information Technology: Learning How to Use It","author":"GR Collins","year":"2017","unstructured":"Collins, G.R., Cobanoglu, C., Bilgihan, A., Berezina, K.: Hospitality Information Technology: Learning How to Use It. Kendall Hunt Publishing, Dubuque (2017)"},{"key":"35_CR6","unstructured":"Eubanks, N.: The True Cost Of Cybercrime For Businesses, July 2017. \nhttps:\/\/www.forbes.com\/sites\/theyec\/2017\/07\/13\/the-true-cost-of-cybercrime-for-businesses\/#764083449476\n\n. Accessed on 26 Dec 2019"},{"key":"35_CR7","unstructured":"Greenberg, A.: Cybercrime Checks Into Hotels (2010). \nhttps:\/\/www.forbes.com\/2010\/02\/01\/cybersecurity-breaches-trustwave-technology-security-hotels.html#4f1684853c8c\n\n. Accessed 26 Dec 2019"},{"issue":"1","key":"35_CR8","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/MCE.2018.2867979","volume":"8","author":"DA Hahn","year":"2019","unstructured":"Hahn, D.A., Munir, A., Mohanty, S.P.: Security and privacy issues in contemporary consumer electronics. IEEE Consumer Electron. Mag. 8(1), 95\u201399 (2019)","journal-title":"IEEE Consumer Electron. Mag."},{"key":"35_CR9","unstructured":"Hiller, S.: Top 5 Risks and Security Challenges for Hotels in 2015, January 2015. \nhttps:\/\/insights.ehotelier.com\/insights\/2015\/01\/22\/top-5-risks-and-security-challenges-for-hotels-in-2015\/\n\n. Accessed 26 Dec 2019"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Kansakar, P., Munir, A., Shabani, N.: A fog-assisted architecture to support an evolving hospitality industry in smart cities. In: Proceedings of the 16th International Conference on Frontiers of Information Technology (FIT). IEEE, Islamabad, Pakistan, December 2018","DOI":"10.1109\/FIT.2018.00018"},{"issue":"3","key":"35_CR11","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCE.2019.2892245","volume":"8","author":"P Kansakar","year":"2019","unstructured":"Kansakar, P., Munir, A., Shabani, N.: Technology in hospitality industry: prospects and challenges. IEEE Consumer Electron. Mag. 8(3), 60\u201365 (2019)","journal-title":"IEEE Consumer Electron. Mag."},{"key":"35_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04101-3","volume-title":"Understanding Cryptography","author":"C Paar","year":"2010","unstructured":"Paar, C., Pelzl, J.: Understanding Cryptography. Springer, Heidelberg (2010)"},{"issue":"6","key":"35_CR13","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/S1361-3723(03)06008-1","volume":"2003","author":"JJ Rusch","year":"2003","unstructured":"Rusch, J.J.: Computer and internet fraud: a risk identification overview. Elsevier Comput. Fraud Secur. 2003(6), 6\u20139 (2003)","journal-title":"Elsevier Comput. Fraud Secur."},{"issue":"1","key":"35_CR14","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/MPOT.2018.2850598","volume":"38","author":"N Shabani","year":"2019","unstructured":"Shabani, N., Munir, A., Hassan, A.: Revolutionizing e-Marketing via augmented reality: a case study in tourism and hospitality industry. IEEE Potentials 38(1), 43\u201347 (2019)","journal-title":"IEEE Potentials"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52243-8_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T10:11:56Z","timestamp":1598523116000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52243-8_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030522421","9783030522438"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52243-8_35","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Science and Information Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sai2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/saiconference.com\/Computing","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}