1,234
Views
4
CrossRef citations to date
0
Altmetric
Research Articles

Smart Cities, Playable Cities, and Cybersecurity: A Systematic Review

, , &

References

  • Aldeen, Y. A. A. S., & Salleh, M. (2019). Techniques for privacy preserving data publication in the cloud for smart city applications. In D. Rawat & K. Ghafoor (Eds.), Smart cities cybersecurity and privacy (pp. 129–145). Elsevier. https://doi.org/10.1016/C2017-0-02545-4
  • Aleisa, N., & Renaud, K. (2017, April 24–26). Yes, i know this IoT device might invade my privacy, but i love it anyway! A study of Saudi Arabian perceptions. In Proceedings of the 2nd International Conference on Internet of Things, Big Data Security (IoTBDS) 2017 (pp. 198–205). Science and Technology Publications. https://doi.org/10.5220/0006233701980205
  • Baggini, J. (2014). Playable cities: The city that plays together, stays together. The Guardian, 4. https://web.archive.org/web/20190122170634/https://www.theguardian.com/cities/2014/sep/04/playable-cities-the-city-that-plays-together-stays-together
  • Belanche-Gracia, D., Casaló-Ariño, L. V., & Pérez-Rueda, A. (2015). Determinants of multiservice smartcard success for smart cities development: A study based on citizens’ privacy and security perceptions. Government Information Quarterly, 32(2), 154–163. https://doi.org/10.1016/j.giq.2014.12.004
  • Carvalho, L. (2015). Smart cities from scratch? A socio-technical perspective. Cambridge Journal of Regions, Economy and Society, 8(1), 43–60. https://doi.org/10.1093/cjres/rsu010
  • Chaturvedi, K., Matheus, A., Nguyen, S. H., & Kolbe, T. H. (December 2019). Securing spatial data infrastructures for distributed smart city applications and services. Future Generation Computer Systems, 101, 723–736. https://doi.org/10.1016/j.future.2019.07.002
  • Combs, T. D., & Brown, R. (2018). Digital behavioral design. Boundless Mind.
  • Costea, R. (2018). Build EU GDPR data protection compliance from scratch (CIPT). O’Reilly. https://www.oreilly.com/library/view/build-eu-gdpr/9781789610420/
  • Cui, L., Xie, G., Qu, Y., Gao, L., & Yang, Y. (2018). Security and privacy in smart cities: Challenges and opportunities. IEEE Access, 6, 46134–46145. https://doi.org/10.1109/ACCESS.2018.2853985
  • De Waal, M. (2014). The city as interface: How Digital media are changing the city. Nai010 Publishers.
  • Dewey, A. D., & Drahota, A. (2016). Introduction to systematic reviews. Online Learning Module. Cochrane Training. https://training.cochrane.org/interactivelearning/module-1-introduction-conducting-systematic-reviews
  • Doku, R., & Rawat, D. B. (2019). Big data in cybersecurity for smart city applications. In D. Rawat & K. Ghafoor (Eds.), Smart cities cybersecurity and privacy (pp. 103–112). Elsevier. https://doi.org/10.1016/C2017-0-02545-4
  • Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of Advanced Research, 5(4), 491–497. https://doi.org/10.1016/j.jare.2014.02.006
  • Esposito, C., Castiglione, A., Frattini, F., Cinque, M., Yang, Y., & Choo, K. K. R. (2019). On data sovereignty in cloud-based computation offloading for smart cities applications. IEEE Internet of Things Journal, 6(3), 4521–4535. https://doi.org/10.1109/JIOT.2018.2886410
  • Fan, K., Wang, J., Wang, X., & Yang, Y. (2017). Proxy-assisted access control scheme of cloud data for smart cities. Personal and Ubiquitous Computing, 21(5), 937–947. https://doi.org/10.1007/s00779-017-1050-0
  • Fogg, B. J. (2002). Persuasive technology: Using computers to change what we think and do. Elsevier.
  • Fredericks, J. (2020). From smart city to smart engagement: Exploring digital and physical interactions for playful city-making. In A. Nijholt (Ed.), Making smart cities more playable (pp. 107–128). Springer.
  • Gharaibeh, A., Salahuddin, M. A., Hussini, S. J., Khreishah, A., Khalil, I., Guizani, M., & Al-Fuqaha, A. (2017). Smart cities: A survey on data management, security, and enabling technologies. IEEE Communications Surveys & Tutorials, 19(4), 2456–2501. https://doi.org/10.1109/COMST.2017.2736886
  • Hsu, J. (2018). The Strava heat map and the end of secrets. WIRED. https://www.wired.com/story/strava-heat-map-military-bases-fitness-trackers-privacy/
  • Huang, Q., Wang, L., & Yang, Y. (2017). Secure and privacy-preserving data sharing and collaboration in mobile healthcare social networks of smart cities. Security and Communication Networks, 2017, 1–12. https://doi.org/10.1155/2017/6426495
  • Innocent, T. (2020). Citizens of play: Revisiting the relationship between playable and smart cities. In A. Nijholt (Ed.), Making smart cities more playable (pp. 25–49). Springer.
  • Ismagilova, E., Hughes, L., Dwivedi, Y. K., & Raman, K. R. (2019). Smart cities: Advances in research—An information systems perspective. International Journal of Information Management, 47, 88–100. https://doi.org/10.1016/j.ijinfomgt.2019.01.004
  • Lai, J., Mu, Y., Guo, F., Susilo, W., & Chen, R. (2017). Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city. Personal and Ubiquitous Computing, 21(5), 855–868. https://doi.org/10.1007/s00779-017-1045-x
  • Li, Y., Dai, W., Ming, Z., & Qiu, M. (2016). Privacy protection for preventing data over-collection in smart city. IEEE Transactions on Computers, 65(5), 1339–1350. https://doi.org/10.1109/TC.2015.2470247
  • Li, Y., Lin, Y., & Geertman, S. (2015). The development of smart cities in China. In Proceedings of the 14th International Conference on Computers in Urban Planning and Urban Management (pp. 7–10). CUPUM.
  • Ma, M., Preum, S. M., Ahmed, M. Y., Tärneberg, W., Hendawi, A., & Stankovic, J. A. (2019). Data sets, modeling, and decision making in smart cities: A survey. ACM Transactions on Cyber-Physical Systems, 4(2), 1–28. https://doi.org/10.1145/3185510
  • Makhdoom, I., Zhou, I., Abolhasan, M., Lipman, J., & Ni, W. (2020). PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Computers & Security, 88, 101653. https://doi.org/10.1016/j.cose.2019.101653
  • Martin, F., Chen, Y., Moore, R. L., & Westine, C. D. (2020). Systematic review of adaptive learning research designs, context, strategies, and technologies from 2009 to 2018. Educational Technology Research and Development, 68(4), 1903–1929. https://doi.org/10.1007/s11423-020-09793-2
  • McCumber, J. (2004). Assessing and managing security risk in IT systems: A structured methodology. CRC Press.
  • Moher, D., Liberati, A., Tetzlaff, J., & Altman, D. G. (2009). Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement. Public Library of Science Medicine, 6(6), el000097. https://doi.org/10.1371/journal.pmed.1000097
  • Mora, L., & Deakin, M. (2019). Untangling smart cities. From utopian dreams to innovation systems for technology-enabled urban sustainability. Elsevier.
  • Nijholt, A. (2017). Playable cities. Springer.
  • Nijholt, A. (2020). Making smart cities more playable. Springer.
  • NIST. (2019, November). NIST smart cities and communities framework series. https://www.nist.gov/el/cyber-physical-systems/smart-americaglobal-cities/nist-smart-cities-and-communities-framework
  • Perna, V. (2018). From smart cities to playable cities. Towards playful intelligence in the urban environment. archi-DOCT: The E-journal of Doctoral Research in Architecture, 6(1), 51–62. http://www.enhsa.net/archidoct.
  • Powell, A. (2014). ‘Datafication,’ transparency, and good governance of the data city. In K. O’Hara & C. Nguyen (Eds.), Digital enlightenment yearbook (pp. 215–224). London: IOS Press.
  • Price, S. (2008). Extending the McCumber cube to model network defense. ISSA Journal, 14–18. https://mydigitalpublication.com/publication/?i=5669&p=14
  • Qureshi, K. N., Rana, S. S., Ahmed, A., & Jeon, G. (October 2020). A novel and secure attacks detection framework for smart cities industrial internet of things. Sustainable Cities and Society, 61, 102343. https://doi.org/10.1016/j.scs.2020.102343
  • Rathore, M. M., Paul, A., Ahmad, A., Chilamkurti, N., Hong, W. H., & Seo, H. (June 2018). Real-time secure communication for Smart City in high-speed Big Data environment. Future Generation Computer Systems, 83, 638–652. https://doi.org/10.1016/j.future.2017.08.006
  • Rebollo-Monedero, D., Bartoli, A., Hernández-Serrano, J., Forné, J., & Soriano, M. (2014). Reconciling privacy and efficient utility management in smart cities. Transactions on Emerging Telecommunications Technologies, 25(1), 94–108. https://doi.org/10.1002/ett.2708
  • Schouten, B. A. M. (2011). PlayDesign & citizen empowerment. Archis Publishers.
  • Schuurman, D., Baccarne, B., De Marez, L., & Mechant, P. (2012). Smart ideas for smart cities: Investigating crowdsourcing for generating and selecting ideas for ICT innovation in a city context. Journal of Theoretical and Applied Electronic Commerce Research, 7(3), 49–62. https://doi.org/10.4067/S0718-18762012000300006
  • Sengupta, N. (2018, April 22–23). Designing cyber security systems for smart cities. In Smart Cities Symposium 2018 (pp. 1–6). IET. https://doi.org/10.1049/cp.2018.1418
  • Shen, J., Liu, D., Liu, Q., He, D., & Sun, X. (2017). An enhanced cloud data storage auditing protocol providing strong security and efficiency for smart city. Journal of Information Science and Engineering, 33(4), 923-938. https://doi.org/10.6688/JISE.2017.33.4.4
  • Shen, M., Tang, X., Zhu, L., Du, X., & Guizani, M. (2019). Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet of Things Journal, 6(5), 7702–7712. https://doi.org/10.1109/JIOT.2019.2901840
  • Sifah, E. B., Xia, H., Cobblah, C. N., Xia, Q., Gao, J., & Du, X. (2020). BEMPAS: A decentralized employee performance assessment system based on blockchain for smart city governance. IEEE Access, 8, 99528–99539. https://doi.org/10.1109/ACCESS.2020.2997650
  • Stephanidis, C., Salvendy, G., Antona, M., Chen, J. Y., Dong, J., Duffy, V. G., … Guo, Y. (2019). Seven HCI grand challenges. International Journal of Human–Computer Interaction, 35(14), 1229–1269. https://doi.org/10.1080/10447318.2019.1619259
  • Streitz, N. (2015). Citizen-centred design for humane and sociable hybrid cities. In I. Theona, and D. Charitos (Eds.), Hybrid City 2015: Proceedings of the 3rd International Biennial Conference (pp. 17–20). University of Athens, Greece.
  • Sun, J., & Poole, M. S. (2010). Beyond connection: Situated wireless communities. Communications of the ACM, 53(6), 121–125. https://doi.org/10.1145/1743546.1743579
  • Tan, E. (2014). Negotiation and design for the self-organizing city. TU Delft.
  • Tan, E. (2017). Play the city: Games informing the urban development. JAP SAM Books.
  • Tragos, E. Z., Fragkiadakis, A., Kazmi, A., & Serrano, M. (2018). Trusted IoT in ambient assisted living scenarios. In A. Moallem (Ed.), Human- Computer interaction and cybersecurity handbook (pp. 191–208). CRC Press.
  • Van den Bosch, H. (2020). Humane by choice, smart by default: 39 building blocks for cities of the future. IET Smart Cities, 2(3), 111–121. https://doi.org/10.1049/iet-smc.2020.0030
  • Van Zoonen, L. (2016). Privacy concerns in smart cities. Government Information Quarterly, 33(3), 472–480. https://doi.org/10.1016/j.giq.2016.06.004
  • Wang, B., Li, M., Jin, X., & Guo, C. (2020). A reliable IoT edge computing trust management mechanism for smart cities. IEEE Access, 8, 463737–46399. https://doi.org/10.1109/ACCESS.2020.2979022
  • Wendel, S. (2014). Designing for behavior changes: Applying psychology and behavioral economics. O’Reilly Media.
  • Williams, M. D., Dwivedi, Y. K., Lal, B., & Schwarz, A. (2009). Contemporary trends and issues in IT adoption and diffusion research. Journal of Information Technology, 24(1), 1–10. https://doi.org/10.1057/jit.2008.30
  • Williams, M. D., Rana, N. P., & Dwivedi, Y. K. (2015). The unified theory of acceptance and use of technology (UTAUT): A literature review. Journal of Enterprise Information Management, 28(3), 443–488. https://doi.org/10.1108/JEIM-09-2014-0088
  • Wu, F., Xu, L., Li, X., Kumari, S., Karuppiah, M., & Obaidat, M. (2019). A lightweight and provably secure key agreement system for a smart grid with elliptic curve cryptography. IEEE Systems Journal, 13(3), 2830–2838. https://doi.org/10.1109/JSYST.2018.2876226
  • Wu, L., Wang, J., Kumar, N., & He, D. (2017). Secure public data auditing scheme for cloud storage in smart city. Personal and Ubiquitous Computing, 21(5), 949–962. https://doi.org/10.1007/s00779-017-1048-7
  • Yan, Z., Robertson, T., Yan, R., Park, S. Y., Bordoff, S., Chen, Q., & Sprissler, E. (2018). Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment? Computers in Human Behavior, 84, 375–382. https://doi.org/10.1016/j.chb.2018.02.019
  • Zhou, Y., Varquez, A. C., & Kanda, M. (2019). High-resolution global urban growth projection based on multiple applications of the SLEUTH urban growth model. Scientific Data, 6(1), 1–10. https://doi.org/10.1038/s41597-019-0048-z
  • Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the internet of things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742. https://doi.org/10.1002/sec.795

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.