<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>of Information (Distance) Technologies in the Process of Hospitality Industry Professional Training under COVID19 Pandemic Conditions in the Southern Region of Russia</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Petr Chetyrbok</string-name>
          <email>petrchetyrbok@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marina Shostak</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yulia Andrusenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tatiana Gish</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>North-Caucasian Federal University</institution>
          ,
          <addr-line>Stavropol, 355000</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>V.I.Vernadsky Federal University</institution>
          ,
          <addr-line>Simferopol, 295007</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>217</fpage>
      <lpage>223</lpage>
      <abstract>
        <p>distance work. The article identifies recommendations for the use of information (distance) technologies in the process of hospitality industry professional training in the context of the Covid 19 pandemic in the southern region of the Russian Federation. Considered are the performance capabilities of the Moodle 3+ platform in the hospitality industry professional training. In the context of telecommuting in the hospitality industry, special attention is paid to specialists' efficiency and information security. Highlighted are the performance capabilities of StaffCop Enterprise in monitoring the hospitality industry specialists' Information, technology, development of a video course for the discipline, methodology for presenting lecture material, information security, distance work, monitoring.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The use of information (distance) technologies in the process of hospitality industry professional training in the
southern region of the Russian Federation during the Covid 19 pandemic have become particularly relevant. This
situation is associated with the need to ensure distance interaction within the educational process. At the same time,
it should be noted that the requirements for the level of professional training on the part of the hospitality industry
enterprises in the region remain unchanged, since it is obvious that the current unfavorable situation will be over in
the foreseeable future. Under the current conditions, educational institutions face the need to develop, adapt and
apply informational distance educational technologies, which, on the one hand, can provide professional training at
the required level in accordance with employers’ requests, and on the other hand, ensure the quality of the
educational process based on existing educational standards.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Purpose and objectives of the research</title>
      <p>The purpose of the research is to work out recommendations on the use of information (distance) technologies in
the process of hospitality industry professional training in the context of the Covid 19 pandemic.</p>
      <p>Research objectives are as follows:
- analyzing the use of distance learning technologies in hospitality industry professional training in the context of
the Covid 19 pandemic;
- using tools for analyzing StaffCop Enterprise events and information in the hospitality industry.
EMAIL:
marinashostak2010@gmail.com
(Marina</p>
      <p>Shostak);
ORCID:
0000-0002-0115-9158</p>
      <p>(Petr</p>
      <p>2020 Copyright for this paper by its authors.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Literature review</title>
      <p>
        The provisions of state regulation in the area are considered in the sources [1; 2] within the framework of the
analysis of the existing requirements for the organizational aspects of information technologies used in the Russian
Federation. The analysis of the use of distance technologies in the educational process has been carried out on the
basis of the following sources
        <xref ref-type="bibr" rid="ref19 ref21">(Chetyrbok, 2019; Kazak, Chetyrbok, Oleinikov, 2020)</xref>
        . When studying the
organization of hospitality industry professional training, the authors were guided by the following works: Bagiev,
Tarasevich, 2017; Agrova, 2015; Zubova, 2020; Kutuzov, Tatarnikova, Tsekhanovsky, 2020; Olifer, N., Olifer V.,
2016; Yurchik, Golubkova, 2018; Kazak, Lukyanova, Chetyrbok, 2018; Chetyrbok, Dzhulay, 2018; Shostak, 2020.
In order to analyze how the distance mode of hospitality industry professional training is controlled and how
information security is ensured, the following sources were considered: Voronin, Davydov, 2016; Kertov, Boliev,
Shogenov, Zhilokov, Kucherova, 2017; Novikov, Kondratenko, 2016; Tarasov, Bakhareva, Malakhov , Ushakov,
2019; Sergeev, 2016; Tengaykin, 2020; Tumbinskaya, Petrovsky, 2020.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Methodology</title>
    </sec>
    <sec id="sec-5">
      <title>5. Results</title>
      <p>In the context of the Covid 19 pandemic, it is most rational to use distance learning methodology on the Moodle
3+ platform in the process of hospitality industry training, since it provides for distance online courses within the
framework of hospitality industry specialists’ distance work.</p>
      <p>Nowadays, the use of information (distance learning) technologies in the process of hospitality industry
professional training is especially relevant in the context of the Covid 19 pandemic in the southern region of the
Russian Federation.</p>
      <p>Information technology in distance education is divided into three groups:
1. Technologies of presentation;
2. Technologies of storage and processing;
3. Technologies for the transmission of educational information.</p>
      <p>The combination of these groups forms the technology of distance learning. Let us consider the possibilities of
distance learning based on the Moodle 3+ e-course management system. The main teaching unit of Moodle 3+ is the
curriculum. Such a course allows for the following activities:
1. Student – student and student – teacher interaction. Such elements as forums and chats prove helpful.
2. Transfer of knowledge in electronic form using files, archives, web pages and lectures.</p>
      <p>3. Testing knowledge and learning with tests and assignments. Students can send the results of the accomplished
work in the form of texts or files.</p>
      <p>4. Students’ educational and research co-working on a specific topic, using built-in wiki mechanisms, seminars
and forums.</p>
      <p>The Moodle 3+ system provides for the following:
- choosing time and place for training, which is convenient both for teachers and students;
- strong knowledge acquisition;
- teacher – student contact when it is needed;
- individualization of training.</p>
      <p>The educational process of distance learning includes all the main forms of the standard organization of the
educational process: laboratory practice, lectures, tutorials and seminars, the supervision system and students’
individual and research work.</p>
      <p>Lecture is the main organizational form of training aimed at the primary knowledge acquisition.</p>
      <p>If video lectures are used, then teachers’ lectures are recorded using electronic media. It can be supplemented by
various editing methods with multimedia applications illustrating the presentation of lectures. Such additions serve
not only to enrich the content of lectures, but also to make its presentation more lively, understandable and attractive
for students.</p>
      <p>Students’ individual work is an integral part of any form of study. Thanks to distance learning technologies,
students deal with lecture materials using interactive computer training programs for multimedia lectures.</p>
      <p>Academic performance rating conducted by teachers is one of the main forms of organizing the educational
process. In the distance learning system, almost all possible organizational forms of control are used, supplemented
by specially developed computer programs allowing removing part of the workload from teachers and increasing the
effectiveness and timeliness of control. Thus, the use of new educational technologies makes it possible to carry out
such types of control: current, thematic, midterm and final.</p>
      <p>Students’ research work in the full-time education format, as a rule, consists in conducting scientific student
conferences, seminars, writing theses, term papers and projects, as well as implementing educational research
assignments. The distance learning system implies the use of a variety of pedagogical technologies that will make it
possible to implement game, research and creative forms of project pedagogical activity which forms the basis of
students' research work. The Moodle Learning Management System is a management system specifically designed
to create high-quality online courses. In terms of the provided capabilities, Moodle is comparable to well-known
commercial distance learning systems. At the same time, this system has an obvious advantage over them as it is
distributed in the open source code, which makes it possible to customize the system for the specific features of a
certain educational project, and, if necessary, build new modules into it.</p>
      <p>Great communication possibilities belong to Moodle’s greatest strengths. The system supports exchanging files
of any format (both between teachers and students and among students themselves). The mailing service allows
promptly informing all course participants or individual groups about current events.</p>
      <p>An important feature of Moodle is that the system creates and stores each student’s portfolio: all the submitted
assignments, all the teacher's grades and comments to the accomplished tasks and all the messages in the forum.</p>
      <p>Teachers can create and use any grading system within their courses. All grades for each course are stored in a
summary sheet. It allows controlling the "attendance", students’ activity and the time they spend on their academic
tasks in the network.</p>
      <p>The modular structure of the system makes the system easy to use for students and teachers.</p>
      <p>The presence of an open community, consisting of more than 50,000 system users and more than 3,000
implemented distance learning systems around the world allows for effective experience exchange.</p>
      <p>According to numerous studies of various software platforms’ capabilities, the Moodle system turned out to be
the sole leader. It should be noted that, given the continuous improvement of all systems, Moodle occupies a leading
position nowadays.</p>
      <p>One of the most important competencies managers in the hospitality industry should possess is to productively
and safely use the information resources of the companies they work at.</p>
      <p>StaffCop Enterprise is a powerful set of tools for analyzing events and information, which allows assessing and
monitoring managers’ efficiency when they use computers, quickly and accurately investigating information
security incidents within the enterprise, and also solving a wide range of tasks related to information security
analytics.</p>
      <p>The StaffCop monitoring agent, like its service, disguises itself as system processes and services, which names
do not give a hint that these elements are responsible for monitoring.</p>
      <p>The information collected by the monitoring agent is stored on the computers where the monitoring agent is
installed. It is encrypted and not available for free viewing.</p>
      <p>With the help of StaffCop information security tools, the network administrator and the head of the enterprise
will be able to control events in their managers’ computers (both in the local and distance networks), as well as all
data transmission channels:</p>
      <p>- Web mail services and social networks (mail.ru, yandex.ru, gmail.com, VK, FB, Odnoklassniki, LinkedIn,
etc.).</p>
      <p>- Mail protocols (SMTP / SMTPs, IMAP, POP3 / POP3s, MS Exchange).
- Internet messengers (Skype, ICQ, QIP, Jabber (XMPP), Mail.ru Agent, Yahoo and others).
- Transfer of hypertext information and files (HTTP / HTTPs, FTP / FTPs).
- Shadow file copying (from e-mails and removable media transmitted via the Internet and sent to print).
- USB ports (control and blocking).</p>
      <p>The reports also provide information on USB usage in the form of a "USBCachedFiles" folder. The
subdirectories contain copies of files copied to and from USB devices.</p>
      <p>Data graphs help visualize anomalies in managers’ behavioral analysis.</p>
      <p>StaffCop Enterprise is based on the OLAP complex multidimensional data analysis technology allowing creating
multidimensional reports on-the-fly and processing huge amounts of data within seconds.</p>
      <p>The applied technology makes it possible to establish a correlation between the data collected by agents on
endpoints in a few clicks.</p>
      <p>The most illustrative example of plotting a graph is a line graph of the number of events for copying files to
removable media. It is very easy to do (specify the time interval and limit the data set by the dimensions "copy
operation", "disk type: Removable" and select the "Linear graph" display type in the report designer (figure 1).</p>
      <p>To an unaided eye, it is obvious that the facts of copying files significantly exceed the average on one of the
days. By clicking on the top of the chart, one can go to the list of all copy operations of that day. To study the data in
close-up, one can simply click on the correspondent graph node. Figure 2 shows the obtained data about every
manager in the form of a bar graph.</p>
      <p>A noteworthy detail is that all graphs and tables have their own constructor for quick detailing and data
refinement.</p>
      <p>In order to simplify security officers’ analyzing managers’ actions and identifying any deviations, an automatic
anomaly detector is implemented in StaffCop. It analyzes managers’ behavior over a selected period of time and
shows deviations from the regular behavior format (figure 3).</p>
      <p>For instance, every manager uses the same applications approximately the same number of times every day. If
the number of operations is in large excess over the standard value, then StaffCop Enterprise considers such an
event as abnormal behavior, which may be a potential threat.</p>
      <p>It is also possible to connect to the manager's desktop. This can be done directly from the administrator's console in
the browser and, if necessary, one can take control over the manager’s computer (figure 4).</p>
      <p>Thus, the agent program is launched on workstations or terminal servers with the Windows operating system. It
monitors managers’ actions and events on their computers, transfers them to the server and also implements
blocking and access denials. StaffCop Enterprise agent can run on a remote computer which is not in the enterprise’s
local network. Using this tool, one can quickly and efficiently find atypical activity of managers or programs. Such
actions apply to almost any kind of event. Dangerous actions most often occur during spontaneous activation:
addressing personal mail; network activity of applications; connection of removable USB-devices: flash drives,
phones, etc.; using a printer; activity outside the normal working hours.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Discussion</title>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusion</title>
      <p>
        The use of distance technologies in the educational process was discussed at the 4th All-Russian Scientific and
Practical Conference (with international participation) on Distance Educational Technologies - 2019
        <xref ref-type="bibr" rid="ref19">(Chetyrbok,
2019)</xref>
        .
      </p>
      <p>Nowadays, the use of information technologies in the process of hospitality industry professional training in the
context of the Covid 19 pandemic in the Southern region of the Russian Federation is especially relevant. In the
article, the authors have discussed the possibilities of distance learning based on the Moodle 3+ e-course
management system and developed recommendations for its use in the process of hospitality industry professional
training under the Covid 19 pandemic conditions.</p>
      <p>Under the conditions of distance work in the hospitality industry, particular attention is paid to specialists’
productivity and information security. StaffCop Enterprise is a powerful set of tools for analyzing events and
information, which allows evaluating and monitoring managers’ productivity while using computers, quickly and
accurately investigating information security incidents within the enterprise, and also solving a wide range of tasks
related to information security analytics.</p>
    </sec>
    <sec id="sec-8">
      <title>8. References</title>
      <p>
        The provisions of state regulation in the area are considered in the sources [1; 2] within the framework of the
analysis of the existing requirements for the organizational aspects of information technologies used in the Russian
Federation. The analysis of the use of distance technologies in the educational process has been carried out on the
basis of the following sources
        <xref ref-type="bibr" rid="ref19 ref21">(Chetyrbok, 2019; Kazak, Chetyrbok, Oleinikov, 2020)</xref>
        . When studying the
organization of hospitality industry professional training, the authors were guided by the following works: Bagiev,
Tarasevich, 2017; Agrova, 2015; Zubova, 2020; Kutuzov, Tatarnikova, Tsekhanovsky, 2020; Olifer, N., Olifer V.,
2016; Yurchik, Golubkova, 2018; Kazak, Lukyanova, Chetyrbok, 2018; Chetyrbok, Dzhulay, 2018; Shostak, 2020.
In order to analyze how the distance mode of hospitality industry professional training is controlled and how
information security is ensured, the following sources were considered: Voronin, Davydov, 2016; Kertov, Boliev,
Shogenov, Zhilokov, Kucherova, 2017; Novikov, Kondratenko, 2016; Tarasov, Bakhareva, Malakhov , Ushakov,
2019; Sergeev, 2016; Tengaykin, 2020; Tumbinskaya, Petrovsky, 2020.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>State</given-names>
            <surname>All-Union Standard</surname>
          </string-name>
          (Military Register)
          <fpage>51987</fpage>
          -
          <lpage>2002</lpage>
          :
          <year>2002</year>
          .
          <string-name>
            <given-names>Information</given-names>
            <surname>Technology</surname>
          </string-name>
          .
          <source>Set of Standards at Nuclear Power Plants. Typical Requirements and Performance Indicators of Information Systems</source>
          . Мoscow:
          <article-title>Committee of the Russian Federation for Standardization, Metrology and Certification</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <source>[2] Federal Law of the Russian Federation on Information, Information Technologies and Information Security. No. 149-FL. 27 July</source>
          ,
          <year>2006</year>
          . (
          <year>2006</year>
          ).
          <article-title>Article 2</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Bagiev</surname>
            ,
            <given-names>G. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tarasevich</surname>
            ,
            <given-names>V. M.</given-names>
          </string-name>
          (
          <year>2017</year>
          ). Marketing. St. Petersburg: Piter Publ.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Agrova</surname>
            ,
            <given-names>K. O.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Studies into Modern WEB-design Tendencies</article-title>
          .
          <article-title>SCI-ARTICLE</article-title>
          .RU. Retrieved from: http://sci-article.
          <source>ru/stat.php?i=1443528790_</source>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Voronin</surname>
            ,
            <given-names>V. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Davydov</surname>
            ,
            <given-names>O. A.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Technology for Monitoring Equipment's Technical Condition in Local Networks</article-title>
          .
          <source>Computer Science and Control Systems [Informatika i sistemy upravleniya]</source>
          ,
          <volume>2</volume>
          ,
          <fpage>79</fpage>
          -
          <lpage>91</lpage>
          . Retrieved from: https://e.lanbook.com/journal/issue/300657
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Zubova</surname>
            ,
            <given-names>E. D.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <source>Computer Studies and Information</source>
          and Computer Technology. St. Petersburg: Lan' Publ. Retrieved from: https://e.lanbook.com/book/140773
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Kertov</surname>
            ,
            <given-names>K. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boliev</surname>
            ,
            <given-names>Z. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shogenov</surname>
            ,
            <given-names>A. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhilokov</surname>
            ,
            <given-names>A. H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kucherova</surname>
            ,
            <given-names>V. YU.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Modeling Organizations' Secure Local Networks in the CISCO PACKET TRACER 6.2</article-title>
          .
          <string-name>
            <given-names>Simulation</given-names>
            <surname>Environment</surname>
          </string-name>
          .
          <source>Modern Knowledge Intensive Technologies [Sovremennye naukoemkie tekhnologii]</source>
          ,
          <volume>8</volume>
          ,
          <fpage>19</fpage>
          -
          <lpage>24</lpage>
          . Retrieved from: http://toptechnologies.ru/ru/article/view?id=
          <fpage>36773</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Kutuzov</surname>
            ,
            <given-names>O. I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tatarnikova</surname>
            ,
            <given-names>T. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cekhanovskij. V. V.</surname>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Infocommunication Systems and Networks</article-title>
          . St. Petersburg: Lan' Publ. Retrieved from: https://e.lanbook.com/book/136177
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Novikov</surname>
            ,
            <given-names>YU. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>S. V.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Essentials of Local Networks. Moscow: Nacional'nyj Otkrytyj Universitet «INTUIT»</article-title>
          . Retrieved from: https://e.lanbook.com/book/100303
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Olifer</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olifer</surname>
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2016</year>
          ). Computer Networks. Principles, Technologies, Protocols. St. Petersburg: Piter Publ.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Tarasov</surname>
            ,
            <given-names>V. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bahareva</surname>
            ,
            <given-names>N. F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malahov</surname>
            ,
            <given-names>S. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ushakov</surname>
            ,
            <given-names>YU. A.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Designing and Modeling of Communication Networks</article-title>
          . Laboratory Workshop. St. Petersburg: Lan' Publ. Retrieved from: https://e.lanbook.com/book/111917
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Sergeev</surname>
            ,
            <given-names>A. N.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Essentials of Local Computer Networks</article-title>
          . St. Petersburg: Lan' Publ. Retrieved from: https://e.lanbook.com/book/87591
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Tengajkin</surname>
            ,
            <given-names>E. A.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Organization of Network Administration. Network Operating Systems</article-title>
          , Servers, Services and Protocols. Laboratory Sessions. St. Petersburg: Lan' Publ. Retrieved from: https://e.lanbook.com/book/136178
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Tumbinskaya</surname>
            ,
            <given-names>M. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petrovskij</surname>
            ,
            <given-names>M. V.</given-names>
          </string-name>
          (
          <year>2020</year>
          ). Information Security at Enterprises. St. Petersburg: Lan' Publ. Retrieved from: https://e.lanbook.com/book/130184
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Tengajkin</surname>
            ,
            <given-names>E. A.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Network Infrastructure Design. Organization, Principles of Construction and Functioning of Computer Networks</article-title>
          . Laboratory Sessions. St. Petersburg: Lan' Publ. Retrieved from: https://e.lanbook.com/book/139281
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Yurchik</surname>
            ,
            <given-names>P. F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Golubkova</surname>
            ,
            <given-names>V. B.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <source>IPSC Design and Operation</source>
          . Moscow: MADI.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Kazak</surname>
            ,
            <given-names>A. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Luk</surname>
            'yanova,
            <given-names>E. YU.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chetyrbok</surname>
            ,
            <given-names>P. V.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Analysis of the Development Dynamics in the Tourist and Recreational Sphere of the Crimean Region. Problems and Prospects of Tourism Evolution in the Southern Federal District</article-title>
          .
          <source>Collection of Research Papers</source>
          ,
          <volume>114</volume>
          -
          <fpage>120</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Chetyrbok</surname>
            ,
            <given-names>P. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dzhulaj</surname>
            ,
            <given-names>A. V.</given-names>
          </string-name>
          (
          <year>2018</year>
          )
          <article-title>Development of an Information Management System for a Hotel Industry Enterprise as Exemplified by a Guesthouse. Science Days at V. I. Vernadsky Crimean Federal University [Dni nauki Krymskogo federal'nogo universiteta im</article-title>
          . V. I. Vernadskogo],
          <fpage>61</fpage>
          -
          <lpage>62</lpage>
          . Retrieved from: https://elibrary.ru/item.asp?id=
          <fpage>41205880</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Chetyrbok</surname>
            ,
            <given-names>P. V.</given-names>
          </string-name>
          (
          <year>2019</year>
          )
          <article-title>Distance Technologies' Employment in the Educational Process</article-title>
          .
          <source>Distance Learning Technologies. Proceedings of the 4th All-Russian Scientific and Practical Conference (with International Participation)</source>
          ,
          <fpage>129</fpage>
          -
          <lpage>134</lpage>
          . Retrieved from: https://elibrary.ru/item.asp?id=
          <fpage>41205880</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Shostak</surname>
            ,
            <given-names>M. A.</given-names>
          </string-name>
          (
          <year>2020</year>
          )
          <article-title>Requirements for Future Managers' Professional Training in the Hospitality Industry in the Digital Economy</article-title>
          . State Youth Policy: National Projects 2019
          <article-title>-2024 in the Social Development of Youth [Gosudarstvennaya molodezhnaya politika: nacional'nye proekty 2019-2024 gg. v social'nom razvitii molodezhi]</article-title>
          ,
          <fpage>503</fpage>
          -
          <lpage>510</lpage>
          . Retrieved from: https://elibrary.ru/item.asp?id=
          <fpage>42791594</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Kazak</surname>
            <given-names>A. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chetyrbok</surname>
            <given-names>P. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oleinikov</surname>
            <given-names>N. N.</given-names>
          </string-name>
          (
          <year>2020</year>
          )
          <article-title>Artificial Intelligence in the Tourism Sphere</article-title>
          . IOP Conference Series: Earth and
          <string-name>
            <given-names>Environmental</given-names>
            <surname>Science</surname>
          </string-name>
          .
          <source>Conference proceedings. Krasnoyarsk Science and Technology City Hall of the Russian Union of Scientific and Engineering Associations</source>
          ,
          <volume>42020</volume>
          . Retrieved from: https://elibrary.ru/item.asp?id=
          <fpage>42632703</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>