The Role of Cybersecurity in Modern Travel Risk Management: Challenges, Opportunities, and Policy Implications

Authors

  • Anisur Rahman IQC Security Consultancy, France

DOI:

https://doi.org/10.54536/ajds.v3i2.5614

Keywords:

Cybersecurity, Risk Management, Travel Risk

Abstract

This study explores the integration of cybersecurity into travel risk management, addressing the evolving threats faced by business travelers in an increasingly digitized and mobile global economy. As enterprises expand internationally, the convergence of physical and cyber risks necessitates a holistic approach to safeguarding mobile personnel and sensitive data. This research investigates the extent to which cybersecurity is embedded in organizational travel risk policies and identifies the barriers and enablers to its effective implementation. Guided by three research objectives (1) identifying key cybersecurity threats in business travel, (2) examining organizational responses, and (3) proposing a framework for AI-augmented cyber risk mitigation the study employs a multi-method approach. Data were collected through 10 expert interviews, two focus groups with 14 practitioners, and a survey of over 100 corporate travel and cybersecurity professionals across sectors. Thematic analysis and descriptive statistics revealed that travelers face increasing risks from unsecured networks, social engineering, device theft, and data breaches. The findings highlight four thematic domains: internal cybersecurity processes, stakeholder coordination, organizational information networks, and traveler-focused solutions. Results demonstrate a growing emphasis on AI-driven risk profiling, VPN use, training, and personalized protection, but also reveal inconsistencies in policy enforcement, ROI concerns, and regulatory constraints. Limitations include regional bias and underrepresentation of SMEs. The study offers a novel framework linking AI, human judgment, and real-time traveler risk management. Practical implications include the need for curriculum development, bespoke training, and new industry standards. This research advances the discourse on secure global mobility by bridging cybersecurity and travel risk management.

Downloads

Download data is not yet available.

References

Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.

Ghaderi, Z., Beal, L., & Houanti, L. (2024). Cybersecurity threats in tourism and hospitality: perspectives from tourists engaging with sharing economy services. Current Issues in Tourism, 1-16.

Graham, C. M. (2025). Enhancing cybersecurity: a semantic network analysis of MITRE ATT&CK techniques. Information & Computer Security.

Hoch, E., Volkow, N. D., Friemel, C. M., Lorenzetti, V., Freeman, T. P., & Hall, W. (2025). Cannabis, cannabinoids and health: a review of evidence on risks and medical benefits. European archives of psychiatry and clinical neuroscience, 275(2), 281-292.

Jahari, S. A., Yang, I. C. M., French, J. A., & Ahmed, P. K. (2023). COVID-19 and Beyond: Understanding travel risk perception as a process. Tourism Recreation Research, 48(3), 449-464.

Khadka, K., & Ullah, A. B. (2025). Human factors in cybersecurity: an interdisciplinary review and framework proposal. International Journal of Information Security, 24(3), 1-13.

Khan, S. K., Shiwakoti, N., Stasinopoulos, P., & Warren, M. (2023). Modelling cybersecurity regulations for automated vehicles. Accident Analysis & Prevention, 186, 107054.

Lusthaus, J., Kleemans, E., Leukfeldt, R., Levi, M., & Holt, T. (2024). Cybercriminal networks in the UK and Beyond: Network structure, criminal cooperation and external interactions. Trends in Organized Crime, 27(3), 364-387.

Mahim, M. M. H., Mallik, S. K., & Mahadi, S. M. I. (2025). Dynamic Capabilities and Cyber Resilience in Supply Chains management: Insights from Case Studies across Asia. American Journal of Social Development and Entrepreneurship, 4(1), 111-121.

Mallik, S. K. (2024). Analyzing Banking Sector Risk and Capital Allocation: A Study on the Improvement of Risk-Weighted Assets and CRAR Compliance in 2023.

Mallik, S. K. (2025). The impact of monetary policy on the performance of the commercial bank Malawi balance sheet in Southeast Africa. African Journal of Economic and Management Studies.

Ozcan, O., Pickernell, D., & Bacon, E. (2025). Identifying trade secrets: strategic process and challenges in the UK. Technology Analysis & Strategic Management, 1-18.

Paraskevas, A. (2020). Cybersecurity in travel and tourism: a risk-based approach. In Handbook of e-Tourism (pp. 1-24). Cham: Springer International Publishing.

Roumani, Y. (2022). Detection time of data breaches. Computers & Security, 112, 102508.

Sankaralingam, B. P., Pushpalingam, G., & Ganesh, D. S. (2025, March). Cyber crime and security: Intercepting data using Man-in-the-Middle-attack. In AIP Conference Proceedings (Vol. 3175, No. 1, p. 020024). AIP Publishing LLC.

Toker, A., & Emir, O. (2023). Safety and security research in tourism: A bibliometric mapping. European Journal of Tourism Research, 34, 3402-3402.

Vincent, K. P. (2025). Keeping Everyone Safe: Data Security and Privacy. In A Friendly Guide to Data Science: Everything You Should Know About the Hottest Field in Tech (pp. 265-301). Berkeley, CA: Apress.

Wolf, M., & Serpanos, D. (2017). Safety and security in cyber-physical systems and internet-of-things systems. Proceedings of the IEEE, 106(1), 9-20.

Yayla, A. (2025). Anatomy of Terrorist Cells: A Critical Examination and Identified Gaps in Current Research. Studies in Conflict & Terrorism, 1-28.

Zhou, W., Li, M., & Achal, V. (2025). A comprehensive review on environmental and human health impacts of chemical pesticide usage. Emerging Contaminants, 11(1), 100410.

Downloads

Published

2025-08-15

How to Cite

Rahman, A. (2025). The Role of Cybersecurity in Modern Travel Risk Management: Challenges, Opportunities, and Policy Implications. American Journal of Development Studies, 3(2), 57–65. https://doi.org/10.54536/ajds.v3i2.5614