Cybersecurity Risks Analysis in the Hospitality Industry: A Stakeholder Perspective on Sustainable Service Systems
Abstract
:1. Introduction
2. Literature Review
2.1. Stakeholders of Hospitality Industry
2.2. Cybersecurity Risks in Hospitality Industry
- CR1.
- CR2.
- CR3.
- CR4.
- CR5.
3. Methodology
3.1. Preliminaries of Picture Fuzzy Sets (PFSs)
3.2. Proposed Picture Fuzzy Sets (PFSs) Based MACTOR Approach
- Identifying the cyber security risks.
- Identifying the hospitality industry stakeholders playing important roles.
- Creating stakeholder × stakeholder matrix using PFSs to evaluate the inter-relationships of these stakeholders by asking the hospitality industry officials for their mutual understanding. Here, Matrix of Direct Influences (MDI) is generated by aggregating these hospitality industry officials’ decisions via Delphi technique.
- Applying the score function equation (see Preliminaries of PFSs) to defuzzify the input values.
- Describing the indirect linkages and taking the square of the MDI matrix to obtain the Matrix of Direct and Indirect Influences (MDII).
- Implementing the and computations to present the balance of power coefficients. Here, represents the direct and indirect influence of ith stakeholder, n means total number of stakeholders, represents direct and indirect dependence of ith stakeholder, and coefficient is the power balance of those stakeholders.
- 7.
- Stakeholder positioning map generation.
- 8.
- Stakeholder × risk matrix the Matrix of Stakeholder and Risks (MSR) is created by using PFSs again to assess the inter-relationships of these stakeholders with cybersecurity risks by again asking the hospitality industry officials for their mutual understanding, and again, aggregating them via the Delphi technique. The defuzzification is also repeated in here with a score function.
- 9.
- MSR and balance of power coefficients matrices multiplication to present the weighted matrix.
- 10.
- Generating the convergence and divergence graphs and offering strategic advice to the hospitality industry stakeholders.
4. Examination and Findings
5. Discussion and Potential Solutions
6. Conclusions
Funding
Data Availability Statement
Conflicts of Interest
References
- Merriam-Webster. Hospitality Definition & Meaning; Merriam-Webster: Springfield, MA, USA, 2024. [Google Scholar]
- Hendron, A.; Epos Now. The Importance of the Hospitality Industry & Its Four Sectors. Available online: https://www.eposnow.com/us/resources/importance-of-the-hospitality-industry/ (accessed on 23 January 2024).
- Statista Research Department. Hotel Industry Worldwide. Statista. Available online: https://www.statista.com/topics/1102/hotels/ (accessed on 25 January 2024).
- Statista Research Department. Foodservice and Drinking Place Sales US 2022. Statista. Available online: https://www.statista.com/statistics/239410/us-food-service-and-drinking-place-sales/ (accessed on 25 January 2024).
- EHL Insights. Hospitality Industry: All Your Questions Answered. Available online: https://hospitalityinsights.ehl.edu/hospitality-industry-2031 (accessed on 23 January 2024).
- EHL Insights. Why Hospitality Is Important as a Skill and Not Only as An Industry. Available online: https://hospitalityinsights.ehl.edu/why-hospitality-is-important (accessed on 23 January 2024).
- Pijls-Hoekstra, R.; Groen, B.H.; Galetzka, M.; Pruyn, A.T.H. Experiencing Hospitality: An Exploratory Study on the Experiential Dimensions of Hospitality. In Proceedings of the EuroCHRIE 2015, Manchester, UK, 15–17 October 2015. [Google Scholar]
- Huertas-Valdivia, I.; González-Torres, T.; Nájera-Sánchez, J.-J. Contemporary Leadership in Hospitality: A Review and Research Agenda. Int. J. Contemp. Hosp. Manag. 2022, 34, 2399–2422. [Google Scholar] [CrossRef]
- Seyitoğlu, F.; Costa, C.; Martins, M.; Malta, A.M. The Future of Tourism and Hospitality Labour: Challenges, Requirements, Trends, Skills and the Impact of Technology. Curr. Issues Tour. 2023, 1–15. [Google Scholar] [CrossRef]
- Augustyn, D.; Tick, A. Security Threats in Online Metasearch Booking Services. In Proceedings of the 2020 IEEE 20th International Symposium on Computational Intelligence and Informatics (CINTI), Budapest, Hungary, 5–7 November 2020; pp. 000017–000022. [Google Scholar] [CrossRef]
- Holdsworth, J.; Apeh, E. An Effective Immersive Cyber Security Awareness Learning Platform for Businesses in the Hospitality Sector. In Proceedings of the 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW), Lisbon, Portugal, 4–8 September 2017; pp. 111–117. [Google Scholar] [CrossRef]
- Aravinda, T.; Krishnareddy, K.; Varghese, S.; Chandrika, P.V.; Rao, T.P.; Trofimov, V. Implementation of Facial Recognition (AI) and Its Impact on the Service Sector. In Proceedings of the 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC), Salem, India, 9–11 May 2022; pp. 74–80. [Google Scholar] [CrossRef]
- Barda, I. Just about Managing: Dealing with the Threats to Industrial Systems. Comput. Fraud. Secur. 2019, 2019, 11–14. [Google Scholar] [CrossRef]
- Chin, K. Cybersecurity in the Hospitality Industry: Challenges and Solutions. Available online: https://www.upguard.com/blog/cybersecurity-in-the-hospitality-industry (accessed on 23 January 2024).
- Roberts, P. Hilton Was Fined $700K for a Data Breach. Under GDPR It Would Be $420M. Available online: https://www.digitalguardian.com/blog/hilton-was-fined-700k-data-breach-under-gdpr-it-would-be-420m (accessed on 23 January 2024).
- Tymoshchenko, D. Cybersecurity in Hospitality—How to Fix Data Breach Threats. Available online: https://acropolium.com/blog/cybersecurity-and-data-breach-threats-in-hospitality-how-to-fix/ (accessed on 23 January 2024).
- Logsign. The Biggest Cyber-Attacks in 2019. Logsign. Available online: https://www.logsign.com/blog/the-biggest-cyber-attacks-in-2019/ (accessed on 25 September 2024).
- Petrosyan, A.; Statista. Largest Data Breaches Worldwide 2023. Available online: https://www.statista.com/statistics/290525/cyber-crime-biggest-online-data-breaches-worldwide/ (accessed on 25 January 2024).
- Petrosyan, A.U.S. Consumers and Cyber Crime. Statista. Available online: https://www.statista.com/topics/2588/us-consumers-and-cyber-crime/ (accessed on 25 January 2024).
- Fiallos-Cárdenas, M.; Pérez-Martínez, S.; Ramirez, A.D. Prospectives for the Development of a Circular Bioeconomy around the Banana Value Chain. Sustain. Prod. Consum. 2022, 30, 541–555. [Google Scholar] [CrossRef]
- Fetoui, M.; Frija, A.; Dhehibi, B.; Sghaier, M.; Sghaier, M. Prospects for Stakeholder Cooperation in Effective Implementation of Enhanced Rangeland Restoration Techniques in Southern Tunisia. Rangel. Ecol. Manag. 2021, 74, 9–20. [Google Scholar] [CrossRef]
- Wei, G. Picture Fuzzy Cross-Entropy for Multiple Attribute Decision Making Problems. J. Bus. Econ. Manag. 2016, 17, 491–502. [Google Scholar] [CrossRef]
- Singh, P. Correlation Coefficients for Picture Fuzzy Sets. J. Intell. Fuzzy Syst. 2015, 28, 591–604. [Google Scholar] [CrossRef]
- Wynn, M.; Lam, C. Digitalisation and IT Strategy in the Hospitality Industry. Systems 2023, 11, 501. [Google Scholar] [CrossRef]
- Sahu, A.K.; Gutub, A. Improving Grayscale Steganography to Protect Personal Information Disclosure within Hotel Services. Multimed. Tools Appl. 2022, 81, 30663–30683. [Google Scholar] [CrossRef]
- Chen, H.S.; Fiscus, J. The Inhospitable Vulnerability: A Need for Cybersecurity Risk Assessment in the Hospitality Industry. JHTT 2018, 9, 223–234. [Google Scholar] [CrossRef]
- Gwebu, K.; Barrows, C.W. Data Breaches in Hospitality: Is the Industry Different? JHTT 2020, 11, 511–527. [Google Scholar] [CrossRef]
- Boto-García, D. Hospitality Workers’ Awareness and Training about the Risks of Online Crime and the Occurrence of Cyberattacks. J. Hosp. Tour. Manag. 2023, 55, 240–247. [Google Scholar] [CrossRef]
- Ogunyebi, O.; Swar, B.; Aghili, S. An Incident Handling Guide for Small Organizations in the Hospitality Sector. In Trends and Advances in Information Systems and Technologies; Rocha, Á., Adeli, H., Reis, L.P., Costanzo, S., Eds.; Advances in Intelligent Systems and Computing; Springer International Publishing: Cham, Switzerland, 2018; Volume 745, pp. 232–241. [Google Scholar] [CrossRef]
- Cohen, M.C. Big Data and Service Operations. Prod. Oper. Manag. 2018, 27, 1709–1723. [Google Scholar] [CrossRef]
- Shabani, N.; Munir, A. A Review of Cyber Security Issues in Hospitality Industry. In Intelligent Computing; Arai, K., Kapoor, S., Bhatia, R., Eds.; Advances in Intelligent Systems and Computing; Springer International Publishing: Cham, Switzerland, 2020; Volume 1230, pp. 482–493. [Google Scholar] [CrossRef]
- Arcuri, M.C.; Gai, L.; Ielasi, F.; Ventisette, E. Cyber Attacks on Hospitality Sector: Stock Market Reaction. J. Hosp. Tour. Technol. 2020, 11, 277–290. [Google Scholar] [CrossRef]
- Vrontis, D.; Iazzi, A.; Maizza, A.; Cavallo, F. Stakeholder Engagement IN The Hospitality Industry: An Analysis Of Communication In Smes And Large Hotels. J. Hosp. Tour. Res. 2022, 46, 923–945. [Google Scholar] [CrossRef]
- Jin, D.; Chen, H.; Qi, R. Diversity, Equity and Inclusion in Employee-Queer Customer Interactions in the Hospitality Service Setting: Including Multiple Stakeholders’ Perspectives. Int. J. Contemp. Hosp. Manag. 2024, 36, 1991–2010. [Google Scholar] [CrossRef]
- Ozdemir, O.; Dogru, T.; Kizildag, M.; Erkmen, E. A Critical Reflection on Digitalization for the Hospitality and Tourism Industry: Value Implications for Stakeholders. Int. J. Contemp. Hosp. Manag. 2023, 35, 3305–3321. [Google Scholar] [CrossRef]
- Shulga, L.V.; Busser, J.A.; Chang, W. Relational Energy and Co-Creation: Effects on Hospitality Stakeholders’ Wellbeing. J. Hosp. Mark. Manag. 2022, 31, 1026–1047. [Google Scholar] [CrossRef]
- Vasudevan, S.; Kumar, F.J.P. Distance to Distrust: The Dilemma for Internal Stakeholders in Post COVID-19 Hospitality. Int. J. Spa Wellness 2021, 4, 118–137. [Google Scholar] [CrossRef]
- Gouws, E.; Motala, T. Quality of Service Delivered by Alcoholic Beverage Suppliers to Customers in the South African Hospitality Industry. Afr. J. Hosp. Tour. Leis. 2019, 8, 1–16. [Google Scholar]
- Salihoğlu, G.; Gezici, F. Geography of Suppliers in the Hospitality Sector: The Case of Alanya. Tour. Manag. 2018, 65, 41–54. [Google Scholar] [CrossRef]
- Godinho, V. An Industry in Motion: Stakeholders across Hospitality, Tourism Space Share Key Insights. Gulf Business 2022. Available online: https://gulfbusiness.com/an-industry-in-motion-stakeholders-across-hospitality-tourism-space-share-key-insights/ (accessed on 25 January 2024).
- Alghizzawi, M.; Ahmed, E.; Alshaketheep, K.; Alkhlaifat, B.I.; Alnawafleh, H. Rival Influences of Airbnb Digital Platforms on the Jordanian Hotels Market. Migr. Lett. 2023, 20, 134–144. [Google Scholar] [CrossRef]
- ElShafei, R. Managers’ Risk Perception and the Adoption of Sustainable Consumption Strategies in the Hospitality Sector: The Moderating Role of Stakeholder Salience Attributes. Smart Sustain. Built Environ. 2022, 11, 1–18. [Google Scholar] [CrossRef]
- Sondari, T.; Sucherly; Hasan, M.; Soemaryani, I. The Influence of Market Orientation and Competitive Strategy on the Hotel Image. Int. J. Innov. Creat. Chang. 2020, 13, 297–309. [Google Scholar]
- Del Mar Gálvez-Rodriguez, M.; Saraite, L.; Alonso-Cañadas, J.; Del Carmen Caba-Pérez, M. Stakeholder Engagement via Social Media in the Hospitality Sector: The Evidence from BRIC Countries. In Opportunities and Challenges for Tourism and Hospitality in the BRIC Nations; IGI Global: Hershey, PA, USA, 2016; pp. 15–30. [Google Scholar] [CrossRef]
- Boutin, C.; NIST. Cybersecurity Guide Tailored to the Hospitality Industry. Available online: https://www.nist.gov/news-events/news/2021/03/nist-offers-cybersecurity-guide-tailored-hospitality-industry (accessed on 27 January 2024).
- Smith, C.L.; Wipfli. Cybersecurity Risks Shaping Hospitality in 2022. Available online: https://www.wipfli.com/insights/articles/acc-tc-cybersecurity-risks-shaping-hospitality-in-2022 (accessed on 27 January 2024).
- GoldSky Security. Top 5 Cyber Threats in the Hospitality Industry. GoldSky Security. Available online: https://www.goldskysecurity.com/top-5-cyber-threats-in-the-hospitality-industry/ (accessed on 27 January 2024).
- Zadeh, L.A. Outline of a New Approach to the Analysis of Complex Systems and Decision Processes. IEEE Trans. Syst. Man Cybern. 1973, SMC-3, 28–44. [Google Scholar] [CrossRef]
- Cuong, B.C.; Kreinovich, V. Picture Fuzzy Sets—A New Concept for Computational Intelligence Problems. In Proceedings of the 3rd World Congress on Information and Communication Technologies, Hanoi, Vietnam, 15–18 December 2013; pp. 1–6. [Google Scholar] [CrossRef]
- Atanassov, K.T. Intuitionistic Fuzzy Sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
- Vassilev, P.; Atanassov, K. A Note on Intuitionistic Fuzzy Sets, Interval Valued Intuitionistic Fuzzy Sets and Picture Fuzzy Sets. In Advances in Intelligent Systems and Computing; Springer: Cham, Switzerland, 2021; Volume 1081, pp. 24–28. [Google Scholar] [CrossRef]
- Servin, C.; Martinez, R.; Hanson, P.; Lopez, L.; Kreinovich, V. How to Define “and”-and “or”-Operations for Intuitionistic and Picture Fuzzy Sets. J. Uncertain Syst. 2019, 13, 126–132. [Google Scholar]
- Meksavang, P.; Shi, H.; Lin, S.-M.; Liu, H.-C. An Extended Picture Fuzzy VIKOR Approach for Sustainable Supplier Management and Its Application in the Beef Industry. Symmetry 2019, 11, 468. [Google Scholar] [CrossRef]
- Godet, M. Manuel de Prospective Stratégique, 2nd ed.; Dunod: Paris, France, 2001. [Google Scholar]
- Suasih, N.N.R.; Saskara, I.A.N.; Wijaya, P.Y.; Wibawa, I.P.S.; Santhyasa, I.K.G. Polemic of Stakeholders’ Objectives in the Decision of Revitalization and Relocation of the Sukawati Traditional Market as the Most Distinguished Art Market in Bali, Indonesia. Decis. Sci. Lett. 2024, 13, 211–224. [Google Scholar] [CrossRef]
- Sartika, R.C.; Purwaningsih, Y.; Gravitiani, E.; Nitiyasa, P. The Role of Stakeholders in Achieving Sustainable Agriculture: A Case Study in Sragen Regency, Indonesia. Nat. Environ. Pollut. Technol. 2023, 22, 2181–2188. [Google Scholar] [CrossRef]
- Ben-Daoud, M.; El Mahrad, B.; Moroșanu, G.A.; Elhassnaoui, I.; Moumen, A.; El Mezouary, L.; ELbouhaddioui, M.; Essahlaoui, A.; Eljaafari, S. Stakeholders’ Interaction in Water Management System: Insights from a MACTOR Analysis in the R’Dom Sub-Basin, Morocco. Environ. Manag. 2023, 71, 1129–1144. [Google Scholar] [CrossRef] [PubMed]
- Darmastuti, L.; Rustiadi, E.; Fauzi, A.; Purwanto, Y.J. Stakeholder Analysis of Sustainable Wastewater Management: A Case Study of Bogor, Indonesia. Sustainability 2023, 15, 11826. [Google Scholar] [CrossRef]
- Karadayi-Usta, S. A Novel Neutrosophical Approach in Stakeholder Analysis for Sustainable Fashion Supply Chains. J. Fash. Mark. Manag. 2023, 27, 370–394. [Google Scholar] [CrossRef]
- Wijayanto, Y.; Fauzi, A.; Rustiadi, E.; Wijaya, S. Development of Sustainable Urban Railway Service Model Using Micmac-Mactor: A Case Study in Jabodetabek Mega-Region Indonesia. Int. J. Sustain. Dev. Plan. 2022, 17, 135–146. [Google Scholar] [CrossRef]
- Iskandar; Waridin; Iskandar, D.D. The Potential of Muslim Friendly Hospitality in the Tourism Industry in Central Java. Indones. J. Islam Muslim Soc. 2023, 13, 169–197. [Google Scholar] [CrossRef]
- Suryade, L.; Fauzi, A.; Achsani, N.A.; Anggraini, E. Towards Sustainable Development of the Mandalika Special Economic Zone, Central Lombok, Indonesia: Analysis of Actors. J. Environ. Manag. Tour. 2021, 12, 1729–1740. [Google Scholar] [CrossRef]
- Karadayi-Usta, S. Sustainable Medical Tourism Service Network with a Stakeholder Perspective. Curr. Issues Tour. 2024, 1–20. [Google Scholar] [CrossRef]
- Twin, A. Delphi Method. Available online: https://www.investopedia.com/terms/d/delphi-method.asp (accessed on 25 January 2024).
- Karadayi-Usta, S. A New Servicizing Business Model of Transportation: Comparing the New and Existing Alternatives via Neutrosophic Analytic Hierarchy Process. Neutrosophic Sets Syst. 2022, 48, 56–65. [Google Scholar] [CrossRef]
- Ekran System. Cybersecurity for Hotels: Best Practices & Solutions. Available online: https://www.ekransystem.com/en/blog/cyber-security-in-hotels (accessed on 27 January 2024).
- Wainstein, L. Data Security in Hospitality: Risks and Best Practices. EHL Insights. Available online: https://hospitalityinsights.ehl.edu/data-security-in-hospitality-best-practices (accessed on 27 January 2024).
- Hoover, R.J.; Blount, A. Cybersecurity Risks in Hospitality. Risk Strategies. Available online: https://www.risk-strategies.com/blog/cybersecurity-risks-in-hospitality (accessed on 27 January 2024).
- InnQuest. Cybersecurity for Hospitality Management in the Age of AI. InnQuest Software. Available online: https://www.innquest.com/blog/cybersecurity-for-hospitality-management-in-the-age-of-ai/ (accessed on 27 January 2024).
- Rajagopal, A. As AI in Hotels Advances, So Too Should Cybersecurity Posture. Hospitality Technology. Available online: https://hospitalitytech.com/ai-hotels-advances-so-too-should-cybersecurity-posture (accessed on 27 January 2024).
- Parker, E. Texting Your Hotel—The Next Evolution of Hospitality Customer Service. OneReach. Available online: https://onereach.ai/journal/texting-your-hotel-the-next-evolution-of-hospitality-customer-service/ (accessed on 27 January 2024).
- IDeaS. Hotel Revenue Management Software & Solutions. IDeaS. Available online: https://ideas.com/hotel-rooms/ (accessed on 27 January 2024).
- Bhatia, G.; Mesmer, B. Trends in Occurrences of Systems Engineering Topics in Literature. Systems 2019, 7, 28. [Google Scholar] [CrossRef]
- Wiranatha, A.S.; Suryawardani, I.G.A.O.; Purbanto, I.G.R.; Yudiastina, I.G.B.A.; Bantacut, T. A Conceptual Model of Rural Tourism in Bali to Build Up Global Competitiveness. Systems 2024, 12, 245. [Google Scholar] [CrossRef]
Publication | Methodology | Findings |
---|---|---|
(Holdsworth and Apeh, 2017) [11] | In-depth interview | Cybersecurity awareness requires training, continuous monitoring, and evaluation. |
(Wynn and Lam, 2023) [24] | Divergent technologies and lack of data integrity are important concerns of hospitality firms’ digitalization. | |
(Ogunyebi et al., 2018) [29] | Literature and industrial reports’ review, conceptual framework | Incident response guidelines are a must for small businesses to enable cybersecurity. |
(Cohen, 2018) [30] | Easy access of personal data attracts hackers and pose cybersecurity risks. | |
(Chen and Fiscus, 2018) [26] | Cybersecurity risk assessment is a must in hospitality industry. | |
(Barda, 2019) [13] | There is a rise in cyber espionage. | |
(Shabani and Munir, 2020) [31] | Hotels’ existing cyberattack prevention procedures are outdated. | |
(Augustyn and Tick, 2020) [10] | Lack of security measures results in critical security threats and allows external users to access platform database. | |
(Sahu and Gutub, 2022) [25] | Steganography protects user information disclosure in hospitality services. | |
(Boto-García, 2023) [28] | It is critical for hospitality workers to be informed of and trained about the risks of internet crime and cyberattacks. | |
(Arcuri et al., 2020) [32] | Event study methodology | Cyberattack announcements of hospitality firms lead to negative market returns. |
(Gwebu and Barrows, 2020) [27] | Statistical analysis | The hospitality business has a higher rate of data breaches caused by external actors, hacking and malware. |
Linguistic Expressions | PFNs of Expressions |
---|---|
Very low | <0.10, 0.00, 0.85> |
Low | <0.25, 0.05, 0.60> |
Lower | <0.30, 0.00, 0.60> |
Equal | <0.50, 0.10, 0.40> |
More | <0.60, 0.00, 0.30> |
High | <0.75, 0.05, 0.10> |
Very high | <0.90, 0.00, 0.05> |
Company | Position | Company | Position |
---|---|---|---|
Restaurant a | Owner | Bar a | Shareholder |
Restaurant b | Co-Founder | Bar b | Manager |
Restaurant c | Founder | 2 Star Hotel a | Owner |
Restaurant d | Owner | 2 Star Hotel b | Owner |
Restaurant e | Owner | 3 Star Hotel a | Owner |
Restaurant f | Manager | 4 Star Hotel a | Recruitment Manager |
Cafe a | Owner | 5 Star Hotel a | IT Executive |
Cafe b | Owner | 5 Star Hotel a | HR Director |
Cafe c | Manager | 5 Star Hotel b | IT Specialist |
Cafe d | Director |
St1 | St2 | St3 | St4 | St5 | St6 | St7 | |
---|---|---|---|---|---|---|---|
St1 | 1.375 | 0.175 | 1.188 | 0.438 | 1.188 | 1.375 | |
St2 | 1.188 | 0.175 | 0.950 | 0.438 | 0.175 | 0.175 | |
St3 | 0.775 | 0.775 | 0.775 | 0.175 | 0.175 | 0.175 | |
St4 | 0.500 | 0.500 | 0.500 | 0.175 | 0.175 | 0.175 | |
St5 | 1.375 | 1.375 | 1.375 | 1.375 | 1.375 | 1.375 | |
St6 | 1.188 | 0.500 | 0.500 | 1.188 | 0.175 | 1.188 | |
St7 | 1.375 | 0.500 | 0.175 | 1.188 | 0.175 | 1.375 |
St1 | St2 | St3 | St4 | St5 | St6 | St7 | Mi | ri | ri* | |
---|---|---|---|---|---|---|---|---|---|---|
St1 | 6.265 | 2.612 | 2.270 | 5.086 | 1.288 | 2.971 | 2.491 | 16.72 | 0.14 | 0.48 |
St2 | 1.661 | 3.020 | 1.403 | 2.563 | 0.778 | 2.449 | 2.639 | 11.49 | 0.07 | 0.24 |
St3 | 1.997 | 1.869 | 1.018 | 2.313 | 0.875 | 1.673 | 1.785 | 10.51 | 0.11 | 0.38 |
St4 | 1.670 | 1.491 | 0.534 | 2.113 | 0.586 | 1.250 | 1.311 | 6.84 | 0.02 | 0.06 |
St5 | 6.909 | 5.019 | 2.097 | 7.270 | 2.166 | 4.245 | 4.245 | 29.79 | 1.36 | 4.73 |
St6 | 3.448 | 3.448 | 1.338 | 3.923 | 1.241 | 3.666 | 2.256 | 15.66 | 0.15 | 0.54 |
St7 | 3.197 | 3.548 | 1.850 | 4.117 | 1.299 | 2.199 | 4.090 | 16.21 | 0.17 | 0.58 |
Di | 18.88 | 17.99 | 9.49 | 25.27 | 6.07 | 14.79 | 14.73 |
CR1 | CR2 | CR3 | CR4 | CR5 | |
---|---|---|---|---|---|
St1 | 0.57 | 0.08 | 0.08 | 0.08 | 0.08 |
St2 | 0.28 | 0.28 | 0.28 | 0.28 | 0.28 |
St3 | 0.45 | 0.45 | 0.45 | 0.16 | 0.45 |
St4 | 0.07 | 0.07 | 0.07 | 0.07 | 0.07 |
St5 | 4.50 | 4.50 | 4.50 | 4.50 | 4.50 |
St6 | 0.64 | 0.64 | 0.64 | 0.23 | 0.64 |
St7 | 0.69 | 0.69 | 0.69 | 0.25 | 0.69 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Karadayi-Usta, S. Cybersecurity Risks Analysis in the Hospitality Industry: A Stakeholder Perspective on Sustainable Service Systems. Systems 2024, 12, 397. https://doi.org/10.3390/systems12100397
Karadayi-Usta S. Cybersecurity Risks Analysis in the Hospitality Industry: A Stakeholder Perspective on Sustainable Service Systems. Systems. 2024; 12(10):397. https://doi.org/10.3390/systems12100397
Chicago/Turabian StyleKaradayi-Usta, Saliha. 2024. "Cybersecurity Risks Analysis in the Hospitality Industry: A Stakeholder Perspective on Sustainable Service Systems" Systems 12, no. 10: 397. https://doi.org/10.3390/systems12100397
APA StyleKaradayi-Usta, S. (2024). Cybersecurity Risks Analysis in the Hospitality Industry: A Stakeholder Perspective on Sustainable Service Systems. Systems, 12(10), 397. https://doi.org/10.3390/systems12100397