[
1. World Tourism Organization UNWTO (2019). International tourist arrivals reach 1.4 billion two years ahead of forecasts. Retrieved October 1, 2019, from: http://www2.unwto.org/press-release/2019-01-21/international-tourist-arrivals-reach-14-billion-two-years-ahead-forecasts
]Search in Google Scholar
[
2. Kurež B. (2011). Modern security environment and tourism. Varstvoslovje 13(3), 330-347. [in Slovenian]
]Search in Google Scholar
[
3. Zýka J., Drahotský I. (2019). Methodology for assessing the impact of workplace ergonomic factors on airport security screener´s reliability and performance. Journal of Tourism and Services 10(18), 104-116. DOI: 10.29036/jots.v10i18.88.10.29036/jots.v10i18.88
]Search in Google Scholar
[
4. Chehabeddine M., Tvaronavičienė M. (2020). Securing regional development. Insights into Regional Development 2(1), 430-442. DOI: 10.9770/IRD.2020.2.1(3).10.9770/IRD.2020.2.1(3)
]Search in Google Scholar
[
5. Boustras G., Waring A. (2020). Towards a reconceptualization of safety and security, their interactions, and policy requirements in a 21st century context. Safety Science 132, 104942. DOI: 10.1016/j.ssci.2020.104942.10.1016/j.ssci.2020.104942
]Search in Google Scholar
[
6. World Economic Forum (2016). Security in travel: promoting seamless and secure travel through cross-border data sharing and collaboration. Retrieved March 25, 2019, from: https://www.weforum.org/reports
]Search in Google Scholar
[
7. Grizold A., Bučar B. (2011). Challenges of modern security: from national and international to human security. Teorija in praksa 48(4), 827-851. [in Slovenian]
]Search in Google Scholar
[
8. Barrero-Barrero D., Baquero-Valdés F. (2020). Sustainable development goals: A post-modern social contract for justice, development, and security. Revista Cientifica General Jose Maria Cordova 18(29), 113-137. DOI: 10.21830/19006586.562. [in Spanish]10.21830/19006586.562
]Search in Google Scholar
[
9. Hall C.M., Timothy D.J., Duval D.T. (2003). Security and tourism: towards a new understanding? In C.M. Hall, D.J. Timothy, D.T. Duval (eds.), Safety and security in tourism (pp. 1-18). New York: The Haworth Press.
]Search in Google Scholar
[
10. Wilks J., Page S.J. (2003). Managing tourist health and safety. In J. Wilks, S.J. Page (eds.), Managing Tourist Health and Safety (pp. 47-78). Oxford: Elsevier.
]Search in Google Scholar
[
11. Meško G., Dobovšek B. (1999). Security and some sources of threat in tourism. In A. Anžič (ed.), Security and tourism (pp. 257-271). Portorož: Visoka šola za hotelirstvo in turizem – Turistica; Ljubljana: Visoka policijsko-varnostna šola. [in Slovenian]
]Search in Google Scholar
[
12. Čavlek N. (2002). Tour operators and destination safety. Annals of Tourism Research 29(2), 478-496.10.1016/S0160-7383(01)00067-6
]Search in Google Scholar
[
13. Hreščak, A. (2010). Slovenia is one of the safest tourist countries in Europe; but health workers in tourist resorts are overwhelmed. Diary. Retrieved June 6, 2019, from: http://www.dnevnik.si/clanek/1042358808.
]Search in Google Scholar
[
14. Pondelicek M., Silhankova V., Alfaro Valero A., Arias Gomez J. (2019). Perception of risk as a barrier in tourist destination development. A key study from Colombia. In V. Klimova, V. Zitek (eds.), 22nd International Colloquium on Regional Sciences (pp. 583-591). Masarykova Univ. DOI: 10.5817/CZ.MUNI.P210-9268-2019-74.10.5817/CZ.MUNI.P210-9268-2019-74
]Search in Google Scholar
[
15. Alola Andrew A., Eluwole Kayode K., Alola Uju V., Lasisi Taiwo T., Avci T. (2019). Environmental quality and energy import dynamics: The tourism perspective of the Coastline Mediterranean Countries (CMCs). Management of Environmental Quality: An International Journal 31(3), 665-682.10.1108/MEQ-05-2019-0101
]Search in Google Scholar
[
16. Huamin L., Xuejing Z. (2019). A study of factors of leisure tourism intention: Based on the Theory of Planned Behaviour. Transformations In Business & Economics 18(1), 163-182.
]Search in Google Scholar
[
17. Antošová G., Lima Santos L., Stradová S. (2021) Perception of safety tourism in Colombia. In: A. Abreu, D. Liberato, E.A. González, J.C. Garcia Ojeda (eds), Advances in Tourism, Technology and Systems. ICOTTS 2020. Smart Innovation, Systems and Technologies (pp. 96-105). Singapore: Springer. DOI: 10.1007/978-981-33-4260-6_9.10.1007/978-981-33-4260-6_9
]Search in Google Scholar
[
18. Yorio P.L., Willmer D., Moore S.M. (2015). Health and safety management systems through a multilevel and strategic management perspective: Theoretical and empirical considerations. Safety Science 72, 221-228.10.1016/j.ssci.2014.09.011
]Search in Google Scholar
[
19. Simons H. (2009). Case study research in practice. London: SAGE.10.4135/9781446268322
]Search in Google Scholar
[
20. Stake R.E. (2005). Qualitative Case Studies. In N.K. Denzin, Y.S. Lincoln (eds.), The SAGE handbook of qualitative research (pp. 443-466). Thousand Oaks, CA: Sage.
]Search in Google Scholar
[
21. Štefko R., Jenčová S. Vašaničová P. (2020). The Slovak spa industry and spa companies: Financial and economic situation. Journal of Tourism and Services 20(11), 28-43. DOI: 10.29036/jots.v11i20.137.10.29036/jots.v11i20.137
]Search in Google Scholar
[
22. Vogrinc J. (2008). Qualitative research in the pedagogical field. Ljubljana: Univerza v Ljubljani, Pedagoška fakulteta. [in Slovenian]
]Search in Google Scholar
[
23. Sagadin J. (2001). A review of qualitative empirical pedagogical research. Sodobna Pedagogika 2, 10-25. [in Slovenian]
]Search in Google Scholar
[
24. Guba E.G., Lincoln Y.S. (2004). Competing paradigms in qualitative research: Theories and issues. In S.N. Hesse-Biber, P. Leavy (eds), Approaches to Qualitative Research (pp. 17-38). New York: Oxford University Press.
]Search in Google Scholar
[
25. Šadl Z. (1992). Symbolic interactionism and the definition of the situation. Družboslovne Razprave 14, 73-81. [in Slovenian]
]Search in Google Scholar
[
26. Holstein J.A., Gubrium J.F. (2004). Context: Working it up, down, and across. In C. Seale, G. Gobo, J.F. Gubrium, D. Silverman (eds.), Qualitative Research Practice (pp. 2-32). London: Sage.
]Search in Google Scholar
[
27. Devjak, T. (2007). Rules and educational operation of the school. Ljubljana: Pedagoška fakulteta. [in Slovenian]
]Search in Google Scholar
[
28. Mautner T. (1996). A dictionary of philosophy. London: Blackwell.
]Search in Google Scholar
[
29. Bregar L., Ograjenšek I., Bavdaž M. (2005). Research methods for economists: selected topics. Ljubljana: Ekonomska fakulteta. [in Slovenian]
]Search in Google Scholar
[
30. Mardia K.V., Kent J.T., Bibby J.M. (2003). Multivariate analysis. Amsterdam: Academic Press.
]Search in Google Scholar
[
31. Ferligoj A. (2001). Factor analysis. Retrieved October 1, 2019, from: https://studentski.net/gradivo/upr_fmg_mn1_rvm_sno_kvantitativne_metode__faktorska_analiza__predavanja_01__predstavitev. [in Slovenian]
]Search in Google Scholar
[
32. Kodrič B., Strašek R. (2008). Research methodology in the social sciences. Basics of sampling and statistical reasoning: lecture notes. Koper: Fakulteta za Management. [in Slovenian]
]Search in Google Scholar
[
33. Easterby-Smith M., Thorpe R., Love A. (2005). Research in management. Koper: Fakulteta za Management. [in Slovenian]
]Search in Google Scholar
[
34. Kordeš U., Smrdu M. (2015). The basics of qualitative research. Retrieved October 1, 2019, from: http://www.hippo-campus.si/ISBN/978-961-6963-98-5.pdf. [in Slovenian]
]Search in Google Scholar
[
35. Patman R. (1999). Introduction: Security in a Post-Cold War Context. In R. Patman (ed.), Security in a Post-Cold War World (pp. 3-29). London: Macmillan Press.
]Search in Google Scholar
[
36. Irwin T., Fine G. (1995). Aristotle: Selections. Indianapolis: Hackett Publishing Company.
]Search in Google Scholar
[
37. Erjavec A. (2010). Information security in accordance with the ISO/IEC 27000 series of standards as an integral part of an integrated security system. Retrieved March 10, 2019, from: http://sciget.com/Predogled/2297/7f129adcb7288d-5f8e022641145654d44ba98.
]Search in Google Scholar
[
38. Gostič Š. (2012). Ensuring corporate security through the ISO 28000: 2007 standard of the security management system. Korporativna Varnost 2, 24-27.
]Search in Google Scholar
[
39. Hiti T. (2011). The decision model for the introduction of a security information and event management system. Master thesis. Ljubljana: Univerza v Ljubljani, Fakulteta za Računalništvo in Informatiko. [in Slovenian]
]Search in Google Scholar
[
40. Vršec M. (2006). Establishing comprehensive protection as a preventive factor in companies. In A. Dvoršek, L. Selinšek (eds), Criminal attacks on the property of economic operators (pp. 83-101). Maribor: FPVV.
]Search in Google Scholar
[
41. Dular D. (2017). Business continuity is becoming an important part of international corporations. Korporativna varnost 13, 20-23.
]Search in Google Scholar
[
42. United Nations Development Programme (1994). Human Development Report (HDR). New York, Oxford: Oxford University Press.10.18356/87e94501-en
]Search in Google Scholar
[
43. Bajpai K. (2000). Human Security: Concept and Measurement. New Delhi: Kroc Institute.
]Search in Google Scholar
[
44. Lincoln Ch.C. (1995). Human security: Concepts and approaches. In M. Tatsuro, C.Ch. Lincoln (eds), Common security in Asia New Concepts of Human Security (p. 139). Tokyo: Tokai University Press.
]Search in Google Scholar
[
45. Haq M. (1995). Reflections on Human Development. New York: Oxford University Press.
]Search in Google Scholar
[
46. Møller B. (2000). National, societal and human security – A general discussion with a case study from the Balkans. In UNESCO – Division of Human Rights, Democracy, Peace and Tolerance, Social and Human Sciences Sector (ed.), What Agenda for Human Security in the Twenty-first Century? First International Meeting of Directors of Peace Research and Training Institutions (pp. 41-60). Paris: UNESCO.
]Search in Google Scholar
[
47. Moussa G. (2001). Challenges to human security in the Middle East. In UNESCO – Division of Human Rights, Democracy, Peace and Tolerance, Social and Human Sciences Sector (ed.), What Agenda for Human Security in the Twenty-first Century? First International Meeting of Directors of Peace Research and Training Institutions (pp. 37-52). Paris: UNESCO.
]Search in Google Scholar
[
48. Nef J. (1999). Human Security and mutual vulnerability – the Global political Economy of Development and Underdevelopment. Ottawa: International Development Research Centre.
]Search in Google Scholar
[
49. Suhrke A. (1999). Human security and the interests of states. Security Dialogue 30(3), 265-276. DOI: 10.1177/0967010699030003002.10.1177/0967010699030003002
]Search in Google Scholar
[
50. Rittichainuwat B.N., Chakraborty G. (2009). Perceived travel risk regarding terrorism and disease: the case of Thailand. Tourism Management 30, 410-418.10.1016/j.tourman.2008.08.001
]Search in Google Scholar