Main Article Content
Abstract
This paper studies the drivers that have a significant impact on organizational resilience in terms of ransomware attacks in the hospitality industry of Indonesia, with a particular focus on hotels operating in Bali. The interviews with IT managers in two of the most important hotels were conducted using in-depth interviews. They showed that the ransomware attacks caused severe operational disturbances and a loss of consumer confidence. Despite these, several proactive measures have been put in place by the hotels, and this has emanated through the strong leadership from the senior management to upgrade cybersecurity infrastructure and to instigate staff awareness programs. The findings pinpoint budget limitations and inadequate training, which align with the existing literature, as some of the important obstacles. The work underlines the desperate need for adaptive strategies in cybersecurity and develops an understanding that a collective organizational commitment is required toward sensitive data protection and good reputation building. Indeed, the research points out that creating security awareness among all employees would genuinely enhance the culture of cybersecurity and resilience. Collaboration between industry players and governmental bodies may provide the required wherewithal and frameworks for building up strength with which the ransomware threat could be tackled effectively. Given the practical recommendations, it might be useful to consider how to make the hospitality industry resilient in the case of ransomware attacks
Keywords
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who publish with INSPIRA: Indonesian Journal of Psychological Research agree to the following terms:
- Authors retain copyright licensed under a Creative Commons Attribution-NonCommercial CC BY-NC 4.0, which allows others to remix, tweak, and build upon the authors' work non-commercially, and although the others' new works must also acknowledge the authors and be non-commercial, they do not have to license their derivative works on the same terms.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access). In other words, authors can archive pre-print (submitted version), post-print (accepted version), and publisher's version/PDF.
References
- Adams, W. C. (2015). Conducting Semi-Structured Interviews. In E. N. Kathryn, P. H. Harry, & S. W. Joseph (Eds.), Handbook of practical program evaluation, 492–505. https://doi.org/10.1002/9781119171386.ch19
- Al-rimy, B. A. S., Maarof, M. A., & Shaid, S. Z. M. (2018). Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions. Computers and Security 74, 144–166). https://doi.org/10.1016/j.cose.2018.01.001
- Alawida, M., Omolara, A. E., Abiodun, O. I., & Al-Rajab, M. (2022). A deeper look into cybersecurity issues in the wake of Covid-19: A survey. In Journal of King Saud University - Computer and Information Sciences 34(10), 8176–8206. https://doi.org/10.1016/j.jksuci.2022.08.003
- Appiah, G., Amankwah-Amoah, J., & Liu, Y. L. (2022). Organizational architecture, resilience, and cyberattacks. IEEE Transactions on Engineering Management, 69(5), 2218–2233. https://doi.org/10.1109/TEM.2020.3004610
- Aqilah, N., Farok, Z., & Zolkipli, M. F. (2024). Incident response planning and procedures. In Borneo International Journal, 7(2). www.majmuah.com
- Braun, V., Clarke, V., Braun, V., & Clarke, V. (2017). Applied qualitative research in psychology. Applied Qualitative Research in Psychology, 0887(2006). https://doi.org/10.1057/978-1-137-35913-1
- Brooks, S. K., Dunn, R., Amlôt, R., Rubin, G. J., & Greenberg, N. (2019). Protecting the psychological wellbeing of staff exposed to disaster or emergency at work: A qualitative study. BMC Psychology, 7(1). https://doi.org/10.1186/s40359-019-0360-6
- Brooks, S. K., Rubin, G. J., & Greenberg, N. (2019). Traumatic stress within disaster-exposed occupations: Overview of the literature and suggestions for the management of traumatic stress in the workplace. In British Medical Bulletin, 129(1), 35–51). https://doi.org/10.1093/bmb/ldy040
- Cartwright, E., Hernandez Castro, J., & Cartwright, A. (2019). To pay or not: Game theoretic models of ransomware. Journal of Cybersecurity, 5(1). https://doi.org/10.1093/cybsec/tyz009
- Clarke, R. V. G. (1980). Situational crime prevention: Theory and practice. The British Journal of Criminology, 20(2), 136–147. https://doi.org/10.1093/oxfordjournals.bjc.a047153
- Cobanoglu, C., Dogan, S., Berezina, K., & Collins, G. (2021). Hospitality and tourism information technology. University of South Florida M3 Publishing, 17. https://doi.org/10.5038/9781732127593
- Connolly, L. Y., Wall, D. S., Lang, M., & Oddson, B. (2020). An empirical study of ransomware attacks on organizations: An assessment of severity and salient factors affecting vulnerability. Journal of Cybersecurity, 6(1). https://doi.org/10.1093/CYBSEC/TYAA023
- Ell, M. (2024, April 9). Cyber security breaches survey 2024. United Kingdom Government.
- Florido-BenÃtez, L. (2024). The cybersecurity applied by online travel agencies and hotels to protect users’ private data in smart cities. Smart Cities, 7(1), 475–495. https://doi.org/10.3390/smartcities7010019
- Guest, G., MacQueen, K., & Namey, E. (2014). Introduction to applied thematic analysis. SAGE Publications, 3–20. https://doi.org/10.4135/9781483384436
- Gundu, T., & Mmango, N. (2024). A cybersecurity collaborative model: best practices sharing among south african tourism and hospitality businesses. Proceedings of the 7th International Conference on Tourism Research, 7(1), 222–231. https://doi.org/10.34190/ictr.7.1.2159
- He, Z., Huang, H., Choi, H., & Bilgihan, A. (2023). Building organizational resilience with digital transformation. Journal of Service Management, 34(1), 147–171. https://doi.org/10.1108/JOSM-06-2021-0216
- Law, R., Leung, D., Au, N., & Lee, H. A. (2013). Progress and development of information technology in the hospitality industry: evidence from cornell hospitality quarterly. Cornell Hospitality Quarterly, 54(1), 10–24. https://doi.org/10.1177/1938965512453199
- Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176–8186. https://doi.org/10.1016/j.egyr.2021.08.126
- Marcucci, G., Antomarioni, S., Ciarapica, F. E., & Bevilacqua, M. (2022). The impact of operations and it-related industry 4.0 key technologies on organizational resilience. Production Planning and Control, 33(15), 1417–1431. https://doi.org/10.1080/09537287.2021.1874702
- Matveev, V., Olena Eduardivna, N., Stefanova, N., Khrypko, S., Ishchuk, A., Ishchuk, O., & Bondar, T. (2021). Cybercrime in the economic space: Psychological motivation and semantic-terminological specifics. IJCSNS International Journal of Computer Science and Network Security, 21(11). https://doi.org/10.22937/IJCSNS.2021.21.11.18
- Sachs, J. D., De Neve, J.-E., Helliwell, J. F., Aknin, L. B., Layard, R., Iyengar, R., Karadag, O., Wang, S., & Quintarelli, S. (2022). Global happiness and well-being policy report global council for happiness and well-being. Happiness Council. https://www.happinesscouncil.org/
- Safitra, M. F., Lubis, M., & Fakhrurroja, H. (2023). Counterattacking cyber threats: A framework for the future of cybersecurity. Sustainability (Switzerland), 15(18). https://doi.org/10.3390/su151813369
- Taylor, J., & Whitty, M. (2024). An exploration of the awareness and attitudes of psychology students regarding their psychological literacy for working in the cybersecurity industry. Psychology Learning and Teaching, 23(2), 298–314. https://doi.org/10.1177/14757257231214612
- Thunberg, S., & Arnell, L. (2022). Pioneering the use of technologies in qualitative research–A research review of the use of digital interviews. International Journal of Social Research Methodology, 25(6), 757–768. https://doi.org/10.1080/13645579.2021.1935565
- Vogus, T. J., & Sutcliffe, K. M. (2007). Organizational resilience: Towards a theory and research agenda. IEEE, 8(7), 3418–3422. http://doi.org/10.1109/ICSMC.2007.4414160
- Wirza, Y. (2018). A narrative case study of Indonesian EFL learners’ identities. Indonesian Journal of Applied Linguistics, 8(2), 473–481. https://doi.org/10.17509/ijal.v8i2.13313
- Yanuarni, E., Iqbal, M., Astuti, E. S., Mawardi, M. K., & Alfisyahr, R. (2024). Determinants of business recovery: The role of government support as moderator (a study on tourism SMEs affected by Lombok earthquake, Indonesia). Human Systems Management, 43(1), 79–97. https://doi.org/10.3233/HSM-220171