References
- Albino, V., U. Berardi, and R. Maria Dangelico. 2015. Smart cities: definitions, dimensions, performance, and initiatives. Journal of Urban Technology 22 (1):3–21. doi:https://doi.org/10.1080/10630732.2014.942092.
- Alhazmi, O. H., Y. K. Malaiya, and I. Ray. 2007. Measuring, analyzing and predicting security vulnerabilities in software systems. Computers and Security 26 (3):219–28. doi:https://doi.org/10.1016/j.cose.2006.10.002.
- Alsop, T. 2021. “Smart city initiatives global spending 2018-2023.” Statista. Accessed 12 March 2022. https://www.statista.com/statistics/884092/worldwide-spending-smart-city-initiatives/
- Auger, A., E. Exposito, and E. Lochin. 2017. Survey on quality of observation within sensor web systems. IET Wireless Sensor Systems 7 (6):163–77. doi:https://doi.org/10.1049/iet-wss.2017.0008.
- Awad, A. I., S. Furnell, A. M. Hassan, and T. Tryfonas. 2019. Special issue on security of iot-enabled infrastructures in smart cities. Ad Hoc Networks 92 (September):101850. doi:https://doi.org/10.1016/j.adhoc.2019.02.007.
- Balkanli, E., A. Nur Zincir-Heywood, and I. H. Malcolm 2015. “Feature selection for robust backscatter ddos detection.” In 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), December:611–18. Clearwater Beach, FL, USA: IEEE. doi:https://doi.org/10.1109/LCNW.2015.7365905.
- Baskerville, R. 1993. Information systems security design methods: implications for information systems development. ACM Computing Surveys (CSUR) 25 (4):375–414. doi:https://doi.org/10.1145/162124.162127.
- Becker, G. S. 1978. The economic approach to human behaviour. Chicago: The University of Chicago Press.
- Biswas, B., and A. Mukhopadhyay. 2017. Phishing detection and loss computation hybrid model: a machine-learning approach. ISACA Journal 1:22–29.
- Biswas, B., and A. Mukhopadhyay. 2018. G-RAM framework for software risk assessment and mitigation strategies in organisations. Journal of Enterprise Information Management 31 (2):276–99. doi:https://doi.org/10.1108/JEIM-05-2017-0069.
- Biswas, B., A. Mukhopadhyay, and G. Dhillon. 2017. “GARCH-based risk assessment and mean-variance-based risk mitigation framework for software vulnerabilities.”
- Biswas, B., S. Pal, and A. Mukhopadhyay. 2016. “AVICS-Eco framework: an approach to attack prediction and vulnerability assessment in a cyber ecosystem.” In AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems. San Diego, CL, USA.
- Böhme, R. 2005. “Cyber-Insurance revisited.” In Workshop on the Economics of Information Security (WEIS). Harvard, MA.
- Böhme, R., and G. Kataria. 2006. models and measures for correlation in cyber-insurance. in Workshop on the economics of information security (weis). England: University of Cambridge.
- Böhme, R., and G. Schwartz. 2006. Models and measures for correlation in cyber-insurance. In 2006 workshop on the economics of information security (WEIS), 1–26. England: University of Cambridge.
- Bojanc, R., and B. Jerman-Blažič. 2008. An economic modelling approach to information security risk management. International Journal of Information Management 28 (5):413–22. doi:https://doi.org/10.1016/j.ijinfomgt.2008.02.002.
- Boss, S. R., D. F. Galletta, P. Benjamin Lowry, G. D. Moody, and P. Polak. 2015. What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly: Management Information Systems 39 (4):837–64. doi:https://doi.org/10.25300/MISQ/2015/39.4.5.
- Bulgurcu, B., H. Cavusoglu, and I. Benbasat. 2010. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly: Management Information Systems 34 (3):523–48. doi:https://doi.org/10.2307/25750690.
- Campbell, P. L., and J. E. Stamp. 2004. A classification scheme for risk assessment methods.
- Cavusoglu, H., B. Mishra, and S. Raghunathan. 2005. The value of intrusion detection systems in information technology security architecture. Information Systems Research 16 (1):28–46. doi:https://doi.org/10.1287/isre.1050.0041.
- Cavusoglu, H., S. Raghunathan, and H. Cavusoglu. 2009. Configuration of and interaction between information security technologies: the case of firewalls and intrusion detection systems. Information Systems Research 20 (2):198–217. doi:https://doi.org/10.1287/isre.1080.0180.
- Chen, W., S. Xiao, L. Liu, X. Jiang, and Z. Tang. 2020. A DDoS attacks traceback scheme for SDN-based smart city. Computers and Electrical Engineering 81. doi:https://doi.org/10.1016/j.compeleceng.2019.106503.
- Choo, K. K. R., K. Gai, L. Chiaraviglio, and Q. Yang. 2021. A multidisciplinary approach to internet of things (IoT) cybersecurity and risk management. Computers and Security 102. doi:https://doi.org/10.1016/j.cose.2020.102136.
- Chuanfeng, X., H. Lin, W. Yulei, X. Guo, and W. Lin. 2019. An SDNFV-Based DDoS defense technology for smart cities. IEEE Access 7:137856–74. doi:https://doi.org/10.1109/access.2019.2943146.
- Courtney, R. H. 1977. “Security risk assessment in electronic data processing systems.” In AFIPS Conference Proceedings - 1977 National Computer Conference, AFIPS 1977. Dallas, Texas, USA, 97–104. doi:https://doi.org/10.1145/1499402.1499424.
- Deakin, M. 2013. Smart Cities: Governing, Modelling and Analysing the Transition. In Smart cities: governing, modelling and analysing the transition. Mark Deakin , TAYLOR & FRANCIS. doi:https://doi.org/10.4324/9780203076224.
- Dhillon, G., and J. Backhouse. 2000. Information system security management in the new millennium. Communications of the ACM 43 (7):125–28. doi:https://doi.org/10.1145/341852.341877.
- Dhillon, G., and G. Torkzadeh. 2006. Value-Focused assessment of information system security in organizations. Information Systems Journal 16 (3):293–314. doi:https://doi.org/10.1111/j.1365-2575.2006.00219.x.
- Dutta, K., and J. Perry. 2011. A tale of tails: an empirical analysis of loss distribution models for estimating operational risk Capital. SSRN Electronic Journal. doi:https://doi.org/10.2139/ssrn.918880.
- Elmaghraby, A. S., and M. M. Losavio. 2014. Cyber security challenges in smart cities: safety, security and privacy. Journal of Advanced Research 5 (4):491–97. doi:https://doi.org/10.1016/j.jare.2014.02.006.
- Elvira, I., L. Hughes, N. P. Rana, and Y. K. Dwivedi. 2020. Security, privacy and risks within smart cities: literature review and development of a smart city interaction framework. Information Systems Frontiers 1–22. doi:https://doi.org/10.1007/s10796-020-10044-1.
- Fahim, U., S. Qayyum, M. Jamaluddin Thaheem, F. Al-Turjman, and S. M. E. Sepasgozar. 2021. Risk management in sustainable smart cities governance: A TOE framework. Technological Forecasting and Social Change 167. doi:https://doi.org/10.1016/j.techfore.2021.120743.
- Gordon, L. A., M. P. Loeb, and T. Sohail. 2003. A framework for using insurance for cyber-risk management. Communications of the ACM 46(3):81–85. ACM. doi:https://doi.org/10.1145/636772.636774.
- Guarro, S. B. 1987. Principles and procedures of the LRAM approach to information systems risk analysis and management. Computers and Security 6(6):493–504. Elsevier. doi:https://doi.org/10.1016/0167-4048(87)90030-7.
- Gujarati, D. 2009. Basic Econometrics. Boston: McGraw-Hill Irwin.
- Hafedh, C., T. Nam, J. R. G.-G. Shawn Walker, S. Mellouli, K. Nahon, A. P. Theresa, and H. Jochen Scholl. 2012. “Understanding smart cities: an integrative framework.” In Proceedings of the Annual Hawaii International Conference on System Sciences. Maui, Hawaii, USA, 2289–97. IEEE. doi:https://doi.org/10.1109/HICSS.2012.615.
- Hartwig, R. P., and C. Wilkinson. 2014. Cyber risks: the growing threat. Insurance Information Institute 1–27.
- He, W., and Z. Zhang. 2019. Enterprise cybersecurity training and awareness programs: recommendations for success. Journal of Organizational Computing and Electronic Commerce 29 (4):249–57. doi:https://doi.org/10.1080/10919392.2019.1611528.
- Hiller, J. S., and J. M. Blanke. 2017. Smart cities, big data, and the resilience of privacy. Hastings Law Journal 68 (2):309–56. HeinOnline.
- Hoffman, L. J., E. H. Michelman, and D. Clements. 1978. Securate - security evaluation and analysis using fuzzy metrics. AFIPS Natl Comput Conf Expo Conf Proc 47:531–40.
- Hossack, I. B., J. H. Pollard, and B. Zehnwirth. 1999. Introductory statistics with applications in general insurance. Cambridge: Cambridge University Press. doi:https://doi.org/10.1017/CBO9781139173322.
- Israilidis, J., K. Odusanya, and M. Usman Mazhar. 2019. Exploring knowledge management perspectives in smart city research: a review and future research agenda. International Journal of Information Management 46:10–22. doi:https://doi.org/10.1016/j.ijinfomgt.2019.07.015.
- Jay, K., W. Yurcik, and R. P. Majuca. 2013. The Economic Case for Cyberinsurance. Dissent Aut/Win.
- Jeyaraj, A., and A. Zadeh. 2020. Institutional isomorphism in organizational cybersecurity: a text analytics approach. Journal of Organizational Computing and Electronic Commerce 30 (4):361–80. doi:https://doi.org/10.1080/10919392.2020.1776033.
- Kahneman, D., and A. Tversky. 1979. Prospect theory: an analysis of decision under risk. Econometrica 47 (2):263–91. doi:https://doi.org/10.2307/1914185.
- Kar, A. K., M. P. G. Vigneswara Ilavarasan, M. Janssen, and R. Kothari. 2019. Moving beyond smart cities: digital nations for social innovation & sustainability. Information Systems Frontiers 21 (3):495–501. doi:https://doi.org/10.1007/s10796-019-09930-0.
- Kesan, J. P., R. Majuca, and W. Yurcik. 2005. “Cyberinsurance as a market-based solution to the problem of cybersecurity - a case study.” In Fourth Workshop on the Economics of Information Security. Cambridge, Massachusetts, USA, 2:97–120.
- Kim, K., J. Seok Kim, S. Jeong, J. Hee Park, and H. Kang Kim. 2021. Cybersecurity for autonomous vehicles: review of attacks and defense. Computers and Security 103. doi:https://doi.org/10.1016/j.cose.2020.102150.
- Kitchin, R., and M. Dodge. 2019. The (In)Security of smart cities: vulnerabilities, risks, mitigation, and prevention. Journal of Urban Technology 26 (2):47–65. doi:https://doi.org/10.1080/10630732.2017.1408002.
- Kleindorfer, P. R., and H. Kunreuther. 1999. The complementary roles of mitigation and insurance in managing catastrophic risks. Risk Analysis 19 (4):727–38. doi:https://doi.org/10.1023/A:1007097906602.
- Kunreuther, H. 1997. Managing catastrophic risks through insurance and mitigation. Philadelphia, Wharton Risk Management and Decision Processes Center 1–31.
- Langley, D. J., J. van Doorn, I. C. L. Ng, S. Stieglitz, A. Lazovik, and A. Boonstra. 2021. The internet of everything: smart things and their impact on business models. Journal of Business Research 122:853–63. doi:https://doi.org/10.1016/j.jbusres.2019.12.035.
- Lee, S. M., S. Gun Lee, and S. Yoo. 2004. An integrative model of computer abuse based on social control and general deterrence theories. Information and Management 41 (6):707–18. doi:https://doi.org/10.1016/j.im.2003.08.008.
- Lee, S., J. Kim, S. Woo, C. Yoon, S. Scott-Hayward, V. Yegneswaran, P. Porras, and S. Shin. 2020. A comprehensive security assessment framework for software-defined networks. Computers and Security 91. doi:https://doi.org/10.1016/j.cose.2020.101720.
- Lom, M., and O. Pribyl. 2021. Smart city model based on systems theory. International Journal of Information Management 56 (February):102092. doi:https://doi.org/10.1016/j.ijinfomgt.2020.102092.
- Magalhaes, R. P., F. Lettich, J. Antonio Macedo, F. Maria Nardini, R. Perego, C. Renso, and R. Trani. 2019. Speed prediction in large and dynamic traffic sensor networks. Information Systems. doi:https://doi.org/10.1016/j.is.2019.101444.
- Majuca, R. P., W. Yurcik, and J. P. Kesan. 2006. “The evolution of cyberinsurance,”. Accessed 12 March 2022. January. http://arxiv.org/abs/cs/0601020
- Mamonov, S., and M. Koufaris. 2020. Fulfillment of higher-order psychological needs through technology: the case of smart thermostats. International Journal of Information Management 52 (June):102091. doi:https://doi.org/10.1016/j.ijinfomgt.2020.102091.
- Manfreda, A., K. Ljubi, and A. Groznik. 2021. Autonomous vehicles in the smart city era: an empirical study of adoption factors important for millennials. International Journal of Information Management 58 (June):102050. doi:https://doi.org/10.1016/j.ijinfomgt.2019.102050.
- Marijn, J., S. Luthra, S. Mangla, N. P. Rana, and Y. K. Dwivedi. 2019. Challenges for adopting and implementing IoT in smart cities: an integrated MICMAC-ISM approach. Internet Research 29 (6):1589–616. doi:https://doi.org/10.1108/INTR-06-2018-0252.
- McCarthy, B. 2002. New Economics of Sociological Criminology. Annual Review of Sociology Annual Reviews 4139 El Camino Way, PO Box 10139, Palo Alto, CA 94303-0139, USA:. 28 (1):417–42. doi:https://doi.org/10.1146/annurev.soc.28.110601.140752.
- Michael, G., G. E. P. Box, and G. M. Jenkins. 1977. Time series analysis: forecasting and control. In Journal of marketing research, Vol. 14, Hoboken, New Jersey: John Wiley \& Sons, Inc. doi:https://doi.org/10.2307/3150485
- Mukhopadhyay, A., B. Bhushan Chakrabarti, D. Saha, and A. Mahanti. 2007a. “E-risk management through self insurance: an option model.” In Proceedings of the Annual Hawaii International Conference on System Sciences. Maui, Hawaii, USA, 158b–158b. doi:https://doi.org/10.1109/HICSS.2007.192.
- Mukhopadhyay, A., B. Bhushan Chakrabarti, D. Saha, and A. Mahanti. 2007b. “E-Risk management through self insurance: an option model.” In Proceedings of the Annual Hawaii International Conference on System Sciences. Waikoloa, Big Island, HI, USA: IEEE. doi:https://doi.org/10.1109/HICSS.2007.192.
- Mukhopadhyay, A., S. Chatterjee, K. K. Bagchi, P. J. Kirs, and G. K. Shukla. 2019. Cyber risk assessment and mitigation (CRAM) framework using logit and probit models for cyber insurance. Information Systems Frontiers 21 (5):997–1018. doi:https://doi.org/10.1007/s10796-017-9808-5.
- Neumann, O., C. Matt, B. Simon Hitz-Gamper, L. Schmidthuber, and M. Stürmer. 2019. Joining forces for public value creation? Exploring collaborative innovation in smart city Initiatives. Government Information Quarterly 36 (4):101411. doi:https://doi.org/10.1016/j.giq.2019.101411.
- O’Reilly, P. D., K. Rigopoulos, G. Witte, and L. Feldman. 2018. 2017 annual report: NIST/ITL cybersecurity program. Gaithersburg, MD: NIST. doi: https://doi.org/10.6028/NIST.SP.800-203.
- Ozier, W. 1989. Risk quantification problems and bayesian decision support system solutions. Information Age 11 (4):229–34. Sevenoaks, Kent, UK, UK: Westbury Subscription Services. Accessed 12 March 2022. http://dl.acm.org/citation.cfm?id=69134.69141
- Pandey, P. 2019. “Making smart cities cybersecure.” Deloitte Insights. Deloitte. Accessed12 March 2022. https://www2.deloitte.com/us/en/insights/multimedia/podcasts/making-smart-cities-cybersecure.html
- Povolny, S., and S. Trivedi. 2020. “Model hacking ADAS to pave safer roads for autonomous vehicles.” McAfee Blogs. McAfee. Accessed 12 March 2022. https://www.mcafee.com/blogs/other-blogs/mcafee-labs/model-hacking-adas-to-pave-safer-roads-for-autonomous-vehicles/
- Puiu, D., P. Barnaghi, R. Tonjes, D. Kumper, M. Intizar Ali, A. Mileo, J. Xavier Parreira, 2016. CityPulse: large scale data analytics framework for smart cities. IEEE Access 4:1086–108. doi:https://doi.org/10.1109/ACCESS.2016.2541999.
- Rabhi, F., M. Bandara, A. Namvar, and O. Demirors. 2018. Big data analytics has little to do with analytics. In Lecture notes in business information processing. ed. A. Beheshti, M. Hashmi, H. Dong, and Z. Wei Emma. Vol. 234. 3–17. Cham: Springer International Publishing. doi: https://doi.org/10.1007/978-3-319-76587-7_1.
- Rejda, G. E. 2007. Principles of risk management and insurance. 10th Edition ed. Boston, MA: Pearson.
- Rogers, R. W. 1975. A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology 91 (1):93–114. doi:https://doi.org/10.1080/00223980.1975.9915803.
- Sagar, S., R. Chinn, H. Chen, and J. F. Nunamaker. 2017. Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. Journal of Management Information Systems 34 (4):1023–53. doi:https://doi.org/10.1080/07421222.2017.1394049.
- Sharma, K., and A. Mukhopadhyay. 2020a. “Cyber risk assessment and mitigation strategy for DDoS attacks in BFSI segment.” In 19th Annual Security Conference. Las Vegas, NV.
- Sharma, K., and A. Mukhopadhyay. 2020b. Assessing the risk of cyberattacks in the online gaming industry: A data mining approach. ISACA Journal. 2. 41–47 .
- Sharma, K., and A. Mukhopadhyay. 2021. “Assessing the cyber-risk in integrated traffic management systems (ITMS) in smart cities.” In Production and Operations Management Society (POMS) Conference 2021. Virtual.
- Sheshadri, C., A. Kumar Kar, Y. K. Dwivedi, and H. Kizgin. 2019. Prevention of cybercrimes in smart cities of india: from a citizen’s perspective. Information Technology and People 32 (5):1153–83. doi:https://doi.org/10.1108/ITP-05-2018-0251.
- Sneed, A. 2019. “What cities can learn from atlanta’s cyberattack.” CityLab. Bloomberg. Accessed 12 March 2022. https://www.citylab.com/life/2019/10/cyber-security-cities-atlanta-cyberattack-ransomware-data/600982/
- Tejaswini, H., and H. Raghav Rao. 2009. Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems 18 (2):106–25. doi:https://doi.org/10.1057/ejis.2009.6.
- Wang, T., J. Rees Ulmer, and K. Kannan. 2013. The textual contents of media reports of information security breaches and profitable short-term investment opportunities. Journal of Organizational Computing and Electronic Commerce 23 (3):200–23. doi:https://doi.org/10.1080/10919392.2013.807712.
- Wang, M., L. Yiqin, and J. Qin. 2020. A dynamic mlp-based ddos attack detection method using feature selection and feedback. Computers & Security 88 (January):101645. doi:https://doi.org/10.1016/j.cose.2019.101645.
- Wenxuan, Y., and X. Chengwei. 2018. Developing smart cities in China. International Journal of Public Administration in the Digital Age 5 (3):76–91. doi:https://doi.org/10.4018/ijpada.2018070106.
- Yahia, B., W. E. Nesrine, N. Bellamine Ben Saoud, and R. Colomo-Palacios. 2019. Towards sustainable collaborative networks for smart cities co-governance. International Journal of Information Management 46:10–22. doi:https://doi.org/10.1016/j.ijinfomgt.2019.11.005.
- Yeh, H. 2017. The effects of successful ict-based smart city services: from citizens’ perspectives. Government Information Quarterly 34 (3):556–65. doi:https://doi.org/10.1016/j.giq.2017.05.001.
- Zhang, Y., C. Zhang, and X. Yunjie. 2021. Effect of data privacy and security investment on the value of big data firms. Decision Support Systems 146. doi:https://doi.org/10.1016/j.dss.2021.113543.
- Zhao, X., L. Xue, and A. Whinston. 2013. Managing interdependent information security risks: cyberinsurance, managed security services, and risk pooling arrangements. Journal of Management Information Systems 30 (1):123–52. doi:https://doi.org/10.2753/MIS0742-1222300104.
- Zhi, C., M. Seok Pang, and P. A. Pavlou. 2020. Mitigating traffic congestion: the role of intelligent transportation systems. Information Systems Research 31 (3):653–74. doi:https://doi.org/10.1287/ISRE.2019.0894.