Corporate cybersecurity in the aviation, tourism, and hospitality sector:
"The rapid advancement of Industry 4.0 technologies is revolutionizing the travel, tourism, and hospitality industries, offering unparalleled opportunities for innovation and growth. However, with these advancements comes a significant challenge: cybersecurity. As organizations in these sectors...
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
2024.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | "The rapid advancement of Industry 4.0 technologies is revolutionizing the travel, tourism, and hospitality industries, offering unparalleled opportunities for innovation and growth. However, with these advancements comes a significant challenge: cybersecurity. As organizations in these sectors increasingly rely on digital technologies to enhance customer experiences and streamline operations, they become more vulnerable to cyber threats. The need for clarity on how to effectively manage cybersecurity risks in the context of Industry 4.0 poses a severe threat to the integrity and security of these industries.Corporate Cybersecurity in the Aviation, Tourism, and Hospitality Sector presents a solution to this pressing problem by comprehensively exploring cybersecurity and corporate digital responsibility in the global travel, tourism, and hospitality sectors. It brings together cutting-edge theoretical and empirical research to investigate the impact of emerging Industry 4.0 technologies on these industries. It provides insights into how organizations can build cybersecurity capabilities and develop effective cybersecurity strategies. By addressing key topics such as cyber risk management policies, security standards and procedures, and data breach prevention, this book equips industry professionals and scholars with the knowledge and tools needed to navigate the complex cybersecurity landscape of the Fourth Industrial Revolution."-- |
Beschreibung: | 24 PDFs (343 Seiten) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9798369327166 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00333717 | ||
003 | IGIG | ||
005 | 20240812134413.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 240812s2024 pau fob 001 0 eng d | ||
020 | |a 9798369327166 |q PDF | ||
020 | |z 9798369327159 |q print | ||
024 | 7 | |a 10.4018/979-8-3693-2715-9 |2 doi | |
035 | |a (CaBNVSL)slc00006562 | ||
035 | |a (OCoLC)1452678371 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TL725.3.S44 |b C67 2024e | |
082 | 7 | |a 363.2876 |2 23 | |
245 | 0 | 0 | |a Corporate cybersecurity in the aviation, tourism, and hospitality sector |c Pavan Thealla, Vipin Nadda, Sumesh Dadwal, Latif Oztosun, Giuseppe Cantafio, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c 2024. | |
300 | |a 24 PDFs (343 Seiten) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Cybersecurity risk assessment models and theories in the travel and tourism industry -- Chapter 2. Rise of the shadows: profiling the new age cybercriminals -- Chapter 3. Beyond ATP: unmasking the emerging threat vectors -- Chapter 4. Anatomy of cyberattacks on hybrid clouds: trends and tactics -- Chapter 5. Understanding customer perception of cyber attacks: impact on trust and security -- Chapter 6. Good governance and cybersecurity: enhancing digital resilience -- Chapter 7. System condition monitoring and cybersecurity: aviation, tourism, and hospitality industry -- Chapter 8. Cyber security and system vulnerabilities -- Chapter 9. India's cybersecurity journey: challenges and triumphs -- Chapter 10. Data breach incidents and prevention in the hospitality industry -- Chapter 11. Impact of cybersecurity in the aviation, tourism, and hospitality industries -- Chapter 12. Navigating the digital skies: good governance and cyber security in tourism, aviation, and hospitality sectors -- Chapter 13. Fourth industrial revolution and the role of cyber security: technologies on the travel and tourism industry and more specifically cyber security in travel tourism -- Chapter 14. Harnessing AI for enhanced cybersecurity: trends, challenges, and future prospects. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "The rapid advancement of Industry 4.0 technologies is revolutionizing the travel, tourism, and hospitality industries, offering unparalleled opportunities for innovation and growth. However, with these advancements comes a significant challenge: cybersecurity. As organizations in these sectors increasingly rely on digital technologies to enhance customer experiences and streamline operations, they become more vulnerable to cyber threats. The need for clarity on how to effectively manage cybersecurity risks in the context of Industry 4.0 poses a severe threat to the integrity and security of these industries.Corporate Cybersecurity in the Aviation, Tourism, and Hospitality Sector presents a solution to this pressing problem by comprehensively exploring cybersecurity and corporate digital responsibility in the global travel, tourism, and hospitality sectors. It brings together cutting-edge theoretical and empirical research to investigate the impact of emerging Industry 4.0 technologies on these industries. It provides insights into how organizations can build cybersecurity capabilities and develop effective cybersecurity strategies. By addressing key topics such as cyber risk management policies, security standards and procedures, and data breach prevention, this book equips industry professionals and scholars with the knowledge and tools needed to navigate the complex cybersecurity landscape of the Fourth Industrial Revolution."-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 08/12/2024). | ||
650 | 0 | |a Aeronautics |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Hospitality industry |x Security measures. | |
650 | 0 | |a Tourism |x Security measures. | |
653 | |a Artificial Intelligence Security. | ||
653 | |a Business Cybersecurity Defense Mechanisms. | ||
653 | |a Business Protection. | ||
653 | |a Customer Perception of Cyber Attacks. | ||
653 | |a Cyber Risks Management Policies. | ||
653 | |a Cyber Security and System Vulnerability. | ||
653 | |a Cyber Security Risk Assessment Models and Theories. | ||
653 | |a Data Breach Incidents and Prevention. | ||
653 | |a Data Loss Prevention and Encryption. | ||
653 | |a Data-Driven Security and Measurement Studies. | ||
653 | |a Digital Innovation. | ||
653 | |a Good Governance and Cybersecurity. | ||
653 | |a Machine Learning. | ||
653 | |a Security Policy, Standards, and Procedures. | ||
653 | |a System Condition Monitoring and Cybersecurity. | ||
655 | 4 | |a Electronic books. | |
700 | 1 | |a Cantafio, Giuseppe |e editor. | |
700 | 1 | |a Dadwal, Sumesh |e editor. | |
700 | 1 | |a Nadda, Vipin |e editor. | |
700 | 1 | |a Oztosun, Latif |e editor. | |
700 | 1 | |a Thealla, Pavan |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 9798369327159 |
966 | 4 | 0 | |l DE-862 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-2715-9 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-2715-9 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00333717 |
---|---|
_version_ | 1826942602964893696 |
adam_text | |
any_adam_object | |
author2 | Cantafio, Giuseppe Dadwal, Sumesh Nadda, Vipin Oztosun, Latif Thealla, Pavan |
author2_role | edt edt edt edt edt |
author2_variant | g c gc s d sd v n vn l o lo p t pt |
author_facet | Cantafio, Giuseppe Dadwal, Sumesh Nadda, Vipin Oztosun, Latif Thealla, Pavan |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TL725 |
callnumber-raw | TL725.3.S44 C67 2024e |
callnumber-search | TL725.3.S44 C67 2024e |
callnumber-sort | TL 3725.3 S44 C67 42024E |
callnumber-subject | TL - Motor Vehicles and Aeronautics |
collection | ZDB-98-IGB |
contents | Chapter 1. Cybersecurity risk assessment models and theories in the travel and tourism industry -- Chapter 2. Rise of the shadows: profiling the new age cybercriminals -- Chapter 3. Beyond ATP: unmasking the emerging threat vectors -- Chapter 4. Anatomy of cyberattacks on hybrid clouds: trends and tactics -- Chapter 5. Understanding customer perception of cyber attacks: impact on trust and security -- Chapter 6. Good governance and cybersecurity: enhancing digital resilience -- Chapter 7. System condition monitoring and cybersecurity: aviation, tourism, and hospitality industry -- Chapter 8. Cyber security and system vulnerabilities -- Chapter 9. India's cybersecurity journey: challenges and triumphs -- Chapter 10. Data breach incidents and prevention in the hospitality industry -- Chapter 11. Impact of cybersecurity in the aviation, tourism, and hospitality industries -- Chapter 12. Navigating the digital skies: good governance and cyber security in tourism, aviation, and hospitality sectors -- Chapter 13. Fourth industrial revolution and the role of cyber security: technologies on the travel and tourism industry and more specifically cyber security in travel tourism -- Chapter 14. Harnessing AI for enhanced cybersecurity: trends, challenges, and future prospects. |
ctrlnum | (CaBNVSL)slc00006562 (OCoLC)1452678371 |
dewey-full | 363.2876 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.2876 |
dewey-search | 363.2876 |
dewey-sort | 3363.2876 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05473nam a2200685 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00333717</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20240812134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">240812s2024 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369327166</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9798369327159</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-2715-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00006562</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1452678371</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TL725.3.S44</subfield><subfield code="b">C67 2024e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.2876</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Corporate cybersecurity in the aviation, tourism, and hospitality sector </subfield><subfield code="c">Pavan Thealla, Vipin Nadda, Sumesh Dadwal, Latif Oztosun, Giuseppe Cantafio, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) </subfield><subfield code="b">IGI Global</subfield><subfield code="c">2024.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">24 PDFs (343 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Cybersecurity risk assessment models and theories in the travel and tourism industry -- Chapter 2. Rise of the shadows: profiling the new age cybercriminals -- Chapter 3. Beyond ATP: unmasking the emerging threat vectors -- Chapter 4. Anatomy of cyberattacks on hybrid clouds: trends and tactics -- Chapter 5. Understanding customer perception of cyber attacks: impact on trust and security -- Chapter 6. Good governance and cybersecurity: enhancing digital resilience -- Chapter 7. System condition monitoring and cybersecurity: aviation, tourism, and hospitality industry -- Chapter 8. Cyber security and system vulnerabilities -- Chapter 9. India's cybersecurity journey: challenges and triumphs -- Chapter 10. Data breach incidents and prevention in the hospitality industry -- Chapter 11. Impact of cybersecurity in the aviation, tourism, and hospitality industries -- Chapter 12. Navigating the digital skies: good governance and cyber security in tourism, aviation, and hospitality sectors -- Chapter 13. Fourth industrial revolution and the role of cyber security: technologies on the travel and tourism industry and more specifically cyber security in travel tourism -- Chapter 14. Harnessing AI for enhanced cybersecurity: trends, challenges, and future prospects.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"The rapid advancement of Industry 4.0 technologies is revolutionizing the travel, tourism, and hospitality industries, offering unparalleled opportunities for innovation and growth. However, with these advancements comes a significant challenge: cybersecurity. As organizations in these sectors increasingly rely on digital technologies to enhance customer experiences and streamline operations, they become more vulnerable to cyber threats. The need for clarity on how to effectively manage cybersecurity risks in the context of Industry 4.0 poses a severe threat to the integrity and security of these industries.Corporate Cybersecurity in the Aviation, Tourism, and Hospitality Sector presents a solution to this pressing problem by comprehensively exploring cybersecurity and corporate digital responsibility in the global travel, tourism, and hospitality sectors. It brings together cutting-edge theoretical and empirical research to investigate the impact of emerging Industry 4.0 technologies on these industries. It provides insights into how organizations can build cybersecurity capabilities and develop effective cybersecurity strategies. By addressing key topics such as cyber risk management policies, security standards and procedures, and data breach prevention, this book equips industry professionals and scholars with the knowledge and tools needed to navigate the complex cybersecurity landscape of the Fourth Industrial Revolution."--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 08/12/2024).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Aeronautics</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hospitality industry</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Tourism</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Artificial Intelligence Security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Business Cybersecurity Defense Mechanisms.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Business Protection.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Customer Perception of Cyber Attacks.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Risks Management Policies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Security and System Vulnerability.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Security Risk Assessment Models and Theories.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Breach Incidents and Prevention.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Loss Prevention and Encryption.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data-Driven Security and Measurement Studies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Digital Innovation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Good Governance and Cybersecurity.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Machine Learning.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security Policy, Standards, and Procedures.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">System Condition Monitoring and Cybersecurity.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cantafio, Giuseppe</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dadwal, Sumesh</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nadda, Vipin</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oztosun, Latif</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thealla, Pavan</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9798369327159</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-2715-9</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-2715-9</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. |
genre_facet | Electronic books. |
id | ZDB-98-IGB-00333717 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:30:37Z |
institution | BVB |
isbn | 9798369327166 |
language | English |
oclc_num | 1452678371 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 24 PDFs (343 Seiten) Also available in print. |
psigel | ZDB-98-IGB FWS_PDA_IGB ZDB-98-IGB |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global |
record_format | marc |
spelling | Corporate cybersecurity in the aviation, tourism, and hospitality sector Pavan Thealla, Vipin Nadda, Sumesh Dadwal, Latif Oztosun, Giuseppe Cantafio, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global 2024. 24 PDFs (343 Seiten) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Cybersecurity risk assessment models and theories in the travel and tourism industry -- Chapter 2. Rise of the shadows: profiling the new age cybercriminals -- Chapter 3. Beyond ATP: unmasking the emerging threat vectors -- Chapter 4. Anatomy of cyberattacks on hybrid clouds: trends and tactics -- Chapter 5. Understanding customer perception of cyber attacks: impact on trust and security -- Chapter 6. Good governance and cybersecurity: enhancing digital resilience -- Chapter 7. System condition monitoring and cybersecurity: aviation, tourism, and hospitality industry -- Chapter 8. Cyber security and system vulnerabilities -- Chapter 9. India's cybersecurity journey: challenges and triumphs -- Chapter 10. Data breach incidents and prevention in the hospitality industry -- Chapter 11. Impact of cybersecurity in the aviation, tourism, and hospitality industries -- Chapter 12. Navigating the digital skies: good governance and cyber security in tourism, aviation, and hospitality sectors -- Chapter 13. Fourth industrial revolution and the role of cyber security: technologies on the travel and tourism industry and more specifically cyber security in travel tourism -- Chapter 14. Harnessing AI for enhanced cybersecurity: trends, challenges, and future prospects. Restricted to subscribers or individual electronic text purchasers. "The rapid advancement of Industry 4.0 technologies is revolutionizing the travel, tourism, and hospitality industries, offering unparalleled opportunities for innovation and growth. However, with these advancements comes a significant challenge: cybersecurity. As organizations in these sectors increasingly rely on digital technologies to enhance customer experiences and streamline operations, they become more vulnerable to cyber threats. The need for clarity on how to effectively manage cybersecurity risks in the context of Industry 4.0 poses a severe threat to the integrity and security of these industries.Corporate Cybersecurity in the Aviation, Tourism, and Hospitality Sector presents a solution to this pressing problem by comprehensively exploring cybersecurity and corporate digital responsibility in the global travel, tourism, and hospitality sectors. It brings together cutting-edge theoretical and empirical research to investigate the impact of emerging Industry 4.0 technologies on these industries. It provides insights into how organizations can build cybersecurity capabilities and develop effective cybersecurity strategies. By addressing key topics such as cyber risk management policies, security standards and procedures, and data breach prevention, this book equips industry professionals and scholars with the knowledge and tools needed to navigate the complex cybersecurity landscape of the Fourth Industrial Revolution."-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 08/12/2024). Aeronautics Security measures. Computer security. Hospitality industry Security measures. Tourism Security measures. Artificial Intelligence Security. Business Cybersecurity Defense Mechanisms. Business Protection. Customer Perception of Cyber Attacks. Cyber Risks Management Policies. Cyber Security and System Vulnerability. Cyber Security Risk Assessment Models and Theories. Data Breach Incidents and Prevention. Data Loss Prevention and Encryption. Data-Driven Security and Measurement Studies. Digital Innovation. Good Governance and Cybersecurity. Machine Learning. Security Policy, Standards, and Procedures. System Condition Monitoring and Cybersecurity. Electronic books. Cantafio, Giuseppe editor. Dadwal, Sumesh editor. Nadda, Vipin editor. Oztosun, Latif editor. Thealla, Pavan editor. IGI Global, publisher. Print version: 9798369327159 |
spellingShingle | Corporate cybersecurity in the aviation, tourism, and hospitality sector Chapter 1. Cybersecurity risk assessment models and theories in the travel and tourism industry -- Chapter 2. Rise of the shadows: profiling the new age cybercriminals -- Chapter 3. Beyond ATP: unmasking the emerging threat vectors -- Chapter 4. Anatomy of cyberattacks on hybrid clouds: trends and tactics -- Chapter 5. Understanding customer perception of cyber attacks: impact on trust and security -- Chapter 6. Good governance and cybersecurity: enhancing digital resilience -- Chapter 7. System condition monitoring and cybersecurity: aviation, tourism, and hospitality industry -- Chapter 8. Cyber security and system vulnerabilities -- Chapter 9. India's cybersecurity journey: challenges and triumphs -- Chapter 10. Data breach incidents and prevention in the hospitality industry -- Chapter 11. Impact of cybersecurity in the aviation, tourism, and hospitality industries -- Chapter 12. Navigating the digital skies: good governance and cyber security in tourism, aviation, and hospitality sectors -- Chapter 13. Fourth industrial revolution and the role of cyber security: technologies on the travel and tourism industry and more specifically cyber security in travel tourism -- Chapter 14. Harnessing AI for enhanced cybersecurity: trends, challenges, and future prospects. Aeronautics Security measures. Computer security. Hospitality industry Security measures. Tourism Security measures. |
title | Corporate cybersecurity in the aviation, tourism, and hospitality sector |
title_auth | Corporate cybersecurity in the aviation, tourism, and hospitality sector |
title_exact_search | Corporate cybersecurity in the aviation, tourism, and hospitality sector |
title_full | Corporate cybersecurity in the aviation, tourism, and hospitality sector Pavan Thealla, Vipin Nadda, Sumesh Dadwal, Latif Oztosun, Giuseppe Cantafio, editors. |
title_fullStr | Corporate cybersecurity in the aviation, tourism, and hospitality sector Pavan Thealla, Vipin Nadda, Sumesh Dadwal, Latif Oztosun, Giuseppe Cantafio, editors. |
title_full_unstemmed | Corporate cybersecurity in the aviation, tourism, and hospitality sector Pavan Thealla, Vipin Nadda, Sumesh Dadwal, Latif Oztosun, Giuseppe Cantafio, editors. |
title_short | Corporate cybersecurity in the aviation, tourism, and hospitality sector |
title_sort | corporate cybersecurity in the aviation tourism and hospitality sector |
topic | Aeronautics Security measures. Computer security. Hospitality industry Security measures. Tourism Security measures. |
topic_facet | Aeronautics Security measures. Computer security. Hospitality industry Security measures. Tourism Security measures. Electronic books. |
work_keys_str_mv | AT cantafiogiuseppe corporatecybersecurityintheaviationtourismandhospitalitysector AT dadwalsumesh corporatecybersecurityintheaviationtourismandhospitalitysector AT naddavipin corporatecybersecurityintheaviationtourismandhospitalitysector AT oztosunlatif corporatecybersecurityintheaviationtourismandhospitalitysector AT theallapavan corporatecybersecurityintheaviationtourismandhospitalitysector AT igiglobal corporatecybersecurityintheaviationtourismandhospitalitysector |