{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:10:10Z","timestamp":1751501410237,"version":"3.41.0"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319777023"},{"type":"electronic","value":"9783319777030"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-77703-0_23","type":"book-chapter","created":{"date-parts":[[2018,3,24]],"date-time":"2018-03-24T11:53:05Z","timestamp":1521892385000},"page":"232-241","source":"Crossref","is-referenced-by-count":2,"title":["An Incident Handling Guide for Small Organizations in the Hospitality Sector"],"prefix":"10.1007","author":[{"given":"Oluwadamilola","family":"Ogunyebi","sequence":"first","affiliation":[]},{"given":"Bobby","family":"Swar","sequence":"additional","affiliation":[]},{"given":"Shaun","family":"Aghili","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Symantec: Internet Security Threat Report. Symantec Corporation, Mountain View (2017)","key":"23_CR1"},{"unstructured":"AusCert, New South Wales Police and Deloitte Touche Tohmatsu: Australian Computer Crime and Security Survey. Australian Computer Emergency Response Team, New South Wales (2002)","key":"23_CR2"},{"unstructured":"Aguilar, L.: SEC.gov | The Need for Greater Focus on the Cybersecurity Challenges Facing Small and Midsize Businesses. https:\/\/www.sec.gov\/news\/statement\/cybersecurity-challenges-for-small-midsize-businesses.html","key":"23_CR3"},{"unstructured":"University of Connecticut: Cyber Risk for Small and Medium-Sized Enterprises. The Janet & Mark L. Goldenson Center for Acturial Research, Connecticut (2016)","key":"23_CR4"},{"unstructured":"Marquez, O.: The Costs and Risks of a Security Breach for Small Businesses. https:\/\/www.securitymagazine.com\/articles\/87288-the-costs-and-risks-of-a-security-breach-for-small-businesses","key":"23_CR5"},{"unstructured":"Small Business Presentation. https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/2_small-business-presentation.pdf","key":"23_CR6"},{"unstructured":"Small Business Profile. https:\/\/www.sba.gov\/sites\/default\/files\/advocacy\/SB%20Profiles%202014-15_0.pdf","key":"23_CR7"},{"unstructured":"Corporations Returns Act, by enterprise size and by country of control (Enterprises). http:\/\/www.statcan.gc.ca\/tables-tableaux\/sum-som\/l01\/cst01\/econ166a-eng.htm","key":"23_CR8"},{"unstructured":"JOBS, S.: What are the Different Sectors of the Hospitality Industry? https:\/\/www.soegjobs.com\/2016\/09\/07\/different-sectors-hospitality-industry\/","key":"23_CR9"},{"unstructured":"Nussbaumer, L.: Relationships between the Hospitality Industry and the Touri. https:\/\/prezi.com\/xrgpzgrqakh9\/relationships-between-the-hospitality-industry-and-the-touri\/","key":"23_CR10"},{"unstructured":"Terence, T., Ruighaver, T., Atif, A.: Incident handling: where the need for planning is often not recognized. In: 1st Australian Computer, Network & Information Forensics Conference. We-B center & ECU, Perth (2003)","key":"23_CR11"},{"doi-asserted-by":"crossref","unstructured":"Paulsen, C., Toth, P.: Small Business Information Security. http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2016\/NIST.IR.7621r1.pdf","key":"23_CR12","DOI":"10.6028\/NIST.IR.7621r1"},{"unstructured":"SURVEY: Small Business Security. http:\/\/www.csid.com\/wp-content\/uploads\/2017\/01\/WP_SmallBizSecurity_2016.pdf","key":"23_CR13"},{"unstructured":"Symantec: Internet Security Threat Report. Symatec (2015)","key":"23_CR14"},{"doi-asserted-by":"crossref","unstructured":"Husin, J., Singh, D.: A quick cybersecurity wellness evaluation framework for critical organizations. In: 2016 International Conference on ICT in Business Industry & Government (ICTBIG). pp. 1\u20135. IEEE, Indore (2017)","key":"23_CR15","DOI":"10.1109\/ICTBIG.2016.7892725"},{"unstructured":"Incident Response Methods. https:\/\/raw.githubusercontent.com\/certsocietegenerale\/IRM\/master\/EN\/IRM_English_Pack.zip","key":"23_CR16"},{"key":"23_CR17","volume-title":"A Study of Cyber Security in Hospitality Industry\u2014Threats and Countermeasures: Case Study in Reno","author":"N Shabani","year":"2016","unstructured":"Shabani, N.: A Study of Cyber Security in Hospitality Industry\u2014Threats and Countermeasures: Case Study in Reno. Nevada. University of South Florida, Sarasota-Manatee (2016)"},{"unstructured":"Do not disturb: Managing Data Protection and Cyber Security in the Hospitality Sector - Pitmans Law. http:\/\/www.pitmans.com\/news\/article\/do-not-disturb-managing-data-protection-and-cyber-security-in-the-hospitali","key":"23_CR18"},{"unstructured":"BakerHostetler: 2016 Data Security Incident Response Report. BakerHostetler, New York (2016)","key":"23_CR19"},{"unstructured":"Trustwave: Trustwave Global Security Report. Trustwave, Chicago (2016)","key":"23_CR20"},{"unstructured":"Evans, P.: 113 Canadian hotels in Holiday Inn chain hit by credit card hack. http:\/\/www.cbc.ca\/news\/business\/holiday-inn-hotel-hack-1.4079202","key":"23_CR21"},{"unstructured":"Hiller, S.: Top 5 risks and security challenges for hotels in 2015 \u2013 eHotelier. http:\/\/ehotelier.com\/insights\/2015\/01\/23\/top-5-risks-and-security-challenges-for-hotels-in-2015\/","key":"23_CR22"},{"unstructured":"Pokladnik, M.: An Incident Handling Process for Small and Medium Businesses. SANS Institute InfoSec Reading Room (2007)","key":"23_CR23"},{"unstructured":"Kindervag, J., Holland, R.: Incidence Response. https:\/\/www.malwareincidentresponse.com\/","key":"23_CR24"},{"unstructured":"Souppaya, M., Scarfone, K.: Guide to Malware Incident Prevention and Handling for Desktops and Laptops","key":"23_CR25"},{"unstructured":"Simons, D.: Malware Incident Response Plan | Malware | Antivirus Software. https:\/\/www.scribd.com\/document\/28726696\/Malware-Incident-Response-Plan","key":"23_CR26"},{"unstructured":"Handling Destructive Malware | US-CERT. https:\/\/www.us-cert.gov\/ncas\/tips\/ST13-003","key":"23_CR27"},{"key":"23_CR28","volume-title":"STEP-BY-STEP: Incident Response for Today\u2019s Top 3 Security Scenarios","author":"F Randy","year":"2017","unstructured":"Randy, F.: STEP-BY-STEP: Incident Response for Today\u2019s Top 3 Security Scenarios. Monterey Technology Group Inc., California (2017)"},{"unstructured":"Data Breach Investigation Report. http:\/\/www.verizonenterprise.com\/resources\/reports\/rp_data-breach-investigation-report_2015_en_xg.pdf","key":"23_CR29"},{"unstructured":"Malware Response. https:\/\/msdn.microsoft.com\/en-us\/library\/cc162838.aspx","key":"23_CR30"},{"unstructured":"Malware Outbreak | Incident Response Playbooks Gallery, https:\/\/www.incidentresponse.com\/playbooks\/malware-outbreak","key":"23_CR31"},{"unstructured":"National Institute of Standards and Technology Special Publication 800-61: Computer Security Incident Handling Guide. National Institute of Standards and Technology (2012)","key":"23_CR32"},{"unstructured":"Cabrera, M.: Network DDoS Incident Response Cheat Sheet (by SANS). https:\/\/www.slideshare.net\/Martinjcabrera\/irm-4d-dos","key":"23_CR33"},{"unstructured":"Revuelto, S., Socha, K., Meintanis, S.: DDoS Overview and Incident Response Guide. http:\/\/cert.europa.eu\/static\/WhitePapers\/CERT-EU_Security_Whitepaper_DDoS_17-003.pdf","key":"23_CR34"},{"unstructured":"TR12-001: Mitigation Guidelines for Denial-of-Service Attacks. https:\/\/www.publicsafety.gc.ca\/cnt\/rsrcs\/cybr-ctr\/2012\/tr12-001-en.aspx","key":"23_CR35"},{"unstructured":"DDoS | Incident Response Playbooks Gallery. https:\/\/www.incidentresponse.com\/playbooks\/ddos","key":"23_CR36"},{"unstructured":"Andre, J.: A Handy Guide on Handling Phishing Attacks. https:\/\/blog.komand.com\/a-layered-approach-to-handling-phishing-attacks","key":"23_CR37"},{"unstructured":"Incident Response Methods. https:\/\/raw.githubusercontent.com\/certsocietegenerale\/IRM\/master\/EN\/IRM_English_Pack.zip","key":"23_CR38"},{"unstructured":"Phishing | Incident Response Playbooks Gallery. https:\/\/www.incidentresponse.com\/playbooks\/phishing","key":"23_CR39"},{"unstructured":"Most Used Playbooks of 2017 #1: Phishing Playbook. https:\/\/resources.siemplify.co\/hubfs\/PDF%20Downloads\/Siemplify_Playbooks_Col1.pdf?hsCtaTracking=bffdaf2e-3732-4461-ba3b-72fdd2f6a2a5%7C5e3cfd4d-7b95-43a9-8c2b-2a78b12d2a8c","key":"23_CR40"},{"unstructured":"Albrethsen, M.: Defending Against Phishing. https:\/\/insights.sei.cmu.edu\/insider-threat\/2016\/12\/defending-against-phishing.html","key":"23_CR41"},{"unstructured":"Cobit 5 A business framework for the governance and management of enterprise. ISACA, Rolling Meadows, IL (2012)","key":"23_CR42"},{"issue":"10","key":"23_CR43","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s10916-015-0326-z","volume":"39","author":"\u00c1 Rocha","year":"2015","unstructured":"Rocha, \u00c1., Freixo, J.: Information architecture for quality management support in hospitals. J. Med. Syst. 39(10), 125 (2015)","journal-title":"J. Med. Syst."}],"container-title":["Advances in Intelligent Systems and Computing","Trends and Advances in Information Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-77703-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T23:42:32Z","timestamp":1751499752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-77703-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319777023","9783319777030"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-77703-0_23","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}