) (Eds.). Safety and Security in Tourism: Relationships, Management, and Marketing, New York and London: Routledge
 ISDR (2004). Living with risk. A global review of disaster reduction initiatives, Geneva: United Nations
 Kasperskylab (2012), Malware attacks, in blog.kaspersky.lab
 Magliulo, A. (2013). A Model for the Sustainable Competitiveness of Tourism Destinations. European Journal of Tourism, Hospitality and Recreation, 2, pp. 7-26
 Magliulo, A. & Wright A.C. (2014). CyberSecurity in Tourism: The Role of Awareness. In M. Sitek
European Network and Information Security Agency (ENISA). (2012). National CyberSecurity Strategies Practical Guide on Development and Execution, available at: https://www.enisa.europa.eu/publications/national-cyber-security-strategies-an-implementation-guide/at_download/fullReport , accessed on: 29 May 2018.
European Network and Information Security Agency (ENISA). (2016). NCSS Good Practice Guide Designing and Implementing National CyberSecurity Strategies, available at: https
1. Chabrow, E. (2015). Cybersecurity as a Campaign Issue. Retrieved from http://www.govinfosecurity .
2. DHS. (2012). Task Force on Cyber Skills. Cyber Skills Task Force Report. D.o.H. Security. Washington, DC, 1–41.
3. Diorditsa, I. (2017). Kvalifikatsiyni vymogy do kompetentsiy fakhivtsiv z kiberbezpeky. Informatsiyne pravo , 2, 215–219.
4. Dubov, D. (2010). Kiberbezpekova polityka u konteksti transformatsii polityky bezpekt USA administratsyi B. Obamy. Politychnyi Management, 1, 155–163.
5. Franscella, J. (2013
Rohit Kalakuntla, Anvesh Babu Vanamala and Ranjith Reddy Kolipyaka
; European Union.
 Gade, N. R., & Reddy, U. G. (2014). A Study Of CyberSecurity Challenges And Its Emerging Trends On Latest Technologies. Retrieved from https://www.researchgate.net/publication/260126665_A_Study_Of_Cyber_Security_Challenges_And_Its_Emerging_Trends_On_Latest_Technologies
 Gross, M. L., Canetti, D., & Vashdi, D. R. (2017). Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes. Journal of Cybersecurity, 3(1), 49–58. doi:10.1093/cybsec/tyw018
 Hua, J., & Bapna, S. (2013). The economic
The development of the information and communication technology (ICT), regardless of its many advantages, unfortunately has its disadvantage - the abuse of the cyberworld. The global character of cyberspace is specific in terms of national legislation and its view of specificities. Some countries adopted the recommendation of the Convention on Cybercrime of the Council of Europe (Official Gazette NN-MU 9/02, 4/04) and amended their national legislation, whereas others kept implementing their criminal law solutions, which are outdated and cannot reach the level of this type of criminal offences. Consequently, governments are inclined to cooperate and exchange information about this type of crime due to the fact that the criminal offender may be anywhere, and the offence itself can take place at a great distance from the offender. In September 2015, the government of the Republic of Croatia adopted the National Cyber Security Strategy and the Action Plan for the Implementation of the National Cyber Security Strategy, the first allencompassing strategy of the Republic of Croatia on cyber security. The paper also focuses on the role of the Police College in the Action Plan for the Implementation of the National Cyber Security Strategy.
European Commission. (2010). Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions: A Digital Agenda for Europe, available at: http://eur-lex.europa.eu/legalcontent/EN/TXT/PDF/?uri=CELEX:52010DC0245R(01)&from=EN, accessed on: 20 February 2018.
European Commission. (2013). Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, available at: https://eeas.europa.eu/archives/docs/policies/eu-cyber-security
An autonomous vehicle (AV) is a vehicle that operates and performs tasks under its own power. Some features of autonomous vehicle are sensing the environment, collecting information and managing communication with other vehicles. Many autonomous vehicles in development use a combination of cameras, sensors, GPS, radar, LiDAR, and on-board computers. These technologies work together to map the vehicle’s position and its proximity to everything around it. Because of their reliance on these sorts of technologies, which are easily accessible to tampering, a autonomous vehicles are susceptible to cyber attacks if an attacker can discover a weakness in a certain type of vehicle or in a company’s electronic system. This lack of information security can lead to criminal and terrorist acts that eventually cost lives. This paper gives an overview of cyber attack scenarios relating to autonomous vehicles. The cyber security concept proposed here uses biometric data for message authentication and communication, and projects stored and new data based on iris recognition. Iris recognition system can provide other knowledge about drivers as well, such as how tired and sleepy they might be while driving, and they are designed to encrypt the vehicle-to-vehicle and vehicle-to-environment communication based on encryption security mechanisms.
Alexandru Tăbuşcă, Silvia-Maria Tăbuşcă and Gabriel Garais
The new realities brought on us by the growing usage of IoT devices should be paralleled by new sets of paradigms and regulations, in order to not only accomplish the raise in the living standards of people but also to increase their level of human security. The IoT devices, as well as, in whole, the virtually completely internet connected society we live in today, need strong and clear rules and regulations, need laws that can help maintain and improve the cyber-security level. While being able to electronically track one’s children, by a multitude of IoT and other electronic devices, it is a great and useful feature we have to take into account that the same information, now shared over the internet, might also get into the wrong hands and lead to unpleasant or even dangerous situations.
There is a strong relationship between groups of users who don’t use anti-virus and those who don’t backup their data, meaning that a similar proportion of users don't use either of these two means of protection. In case of users who lack knowledge in informatics there is an increase in the number of virus attacks; these users are more likely to not use anti-virus and neglect to back up their data. For digital systems, users who are – based on our classification – in a lower rank, represent increased risk based on the number of the occurred virus attacks. For every user group there is a need for continuous and repeated safety awareness training to reach and retain a high safety level/
From the mid-2000s on, new types of security challenges have emerged at a global level. Their prevention, management and recovery, given their characteristics, is a serious challenge for the countries. Cybersecurity challenges require special attention and close interaction both at national and international level. In this paper the author presents the highlights of OSCE and V4 cooperation on cyber defence.