References
- Allen, N. 2016. “Cybersecurity Weaknesses Threaten to Make Smart Cities More Costly and Dangerous than their Analog Predecessors.” USApp–American Politics and Policy Blog. https://blogs.lse.ac.uk/usappblog/2016/02/18/cybersecurity-weaknesses-threaten-to-make-smart-cities-more-costly-and-dangerous-than-their-analog-predecessors/.
- Bryer, T. A., and S. M. Zavattaro. 2011. “Social Media and Public Administration.” Administrative Theory and Praxis 33 (3): 325–340.
- Caruson, K., S. A. MacManus, and B. D. McPhee. 2012. “Cybersecurity Policy-Making at the Local Government Level: An Analysis of Threats, Preparedness, and Bureaucratic Roadblocks to Success.” Journal of Homeland Security and Emergency Management 9 (2): 1–22.
- Coursey, D., and D. F. Norris. 2008. “Models of e-Government: Are They Correct? An Empirical Assessment.” Public Administration Review 68 (3): 523–536.
- D’Agostino, M., R. Schwester, T. Carrizales, and J. Melitski. 2011. “A Study of e-Government and e-Governance: An Empirical Examination of Municipal Websites.” Public Administration Quarterly 35 (1): 3–28.
- Dawes, S. S. 2008. “The Evolution and Continuing Challenges of e-Governance.” Public Administration Review 68: S86–S102.
- De Blasio, B. 2017. “ Executive Order No. 28: New York City Cyber Command.” https://www1.nyc.gov/assets/home/downloads/pdf/executive-orders/2017/eo_28.pdf.
- Douglas, T. 2018. “Total Costs Still Unknown, Atlanta Moves to Refortify Post-Hack.” Government Technology Magazine. http://www.govtech.com/security/Total-Costs-Still-Unknown-Atlanta-Moves-to-Refortify-Post-Hack.html.
- Edmiston, K. D. 2003. “State and Local e-Government: Prospects and Challenges.” American Review of Public Administration 33 (1): 20–45.
- Falco, G., A. Noriega, and L. Susskind. 2019. “Cyber Negotiation: A Cyber Risk Management Approach to Defend Urban Critical Infrastructure From Cyberattacks.” Journal of Cyber Policy 4 (1): 90–116.
- French, P. E., and D. H. Folz. 2004. “Executive Behavior and Decision Making in Small US Cities.” The American Review of Public Administration 34 (1): 52–66.
- Gallardo, R., and W. Hatcher. 2015. “How do Municipalities of Difference Sizes Use the Internet?” Government Technology, March 3. http://www.govtech.com/internet/How-Do-Municipalities-of-Different-Sizes-Use-the-Internet.html.
- Grance, T., J. Hash, M. Stevens, K. O’Neal, and N. Bartol. 2003. Guide to Informational Technology Security Services: Recommendations of the National Institute of Standards and Technology. National Institute of Standards and Technology US Department of Commerce Report. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-35.pdf.
- Gurley, G. 2018. “Securing Cities from Cyber Attacks.” The American Prospect. https://prospect.org/article/securing-cities-cyber-attacks.
- Haggard, S., and J. Lindsay. 2015. “North Korea and the Sony Hack: Exporting Instability Through cyberspace.” East-West Center 117. https://www.eastwestcenter.org/publications/north-korea-and-the-sony-hack-exporting-instability-through-cyberspace.
- Harknett, R. J., and J. A. Stever. 2011. “The new Policy World of Cybersecurity.” Public Administration Review 71 (3): 455–460.
- Harrison, C., B. Eckman, R. Hamilton, P. Hartswick, J. Kalagnanam, J. Paraszczak, and P. Williams. 2010. “Foundations for Smarter Cities.” IBM Journal of Research and Development 54 (4): 1–16.
- Hatcher, W., and A. Vick. 2017. “Promoting Your Community on the web: An Exploratory Analysis of the web Presence of Cities in Georgia.” Georgia Journal of Public Policy 3 (1): 2.
- Koerner, B. 2016. “Inside the Cyberattack that Shocked the US Government.” Wired. https://www.wired.com/2016/10/inside-cyberattack-shocked-us-government/.
- Li, Z., and M. Shahidehpour. 2017. “Deployment of Cybersecurity for Managing Traffic Efficiency and Safety in Smart Cities.” The Electricity Journal 30 (4): 52–61.
- MacManus, S. A., K. Caruson, and B. D. McPhee. 2013. “Cybersecurity at the Local Government Level: Balancing Demands for Transparency and Privacy Rights.” Journal of Urban Affairs 35 (4): 451–470.
- Mauldin, M. D. 2016. “No MPA Left Behind: A Review of Information Technology in the Master of Public Administration Curriculum.” Journal of Public Affairs Education 22 (2): 187–192.
- Meares, W. L., M. Harris, W. Hatcher, and A. Vick. 2017. “ Augusta Metro Cybersecurity Workforce Study.” https://www.augusta.edu/pamplin/mpa/documents/2017_augusta_metro_cybersecurity_workforce_study.pdf.
- Moon, M. J. 2002. “The Evolution of e-Government among Municipalities: Rhetoric or Reality?” Public Administration Review 62 (4): 424–433.
- National Institute of Standards and Technology (NIST) US Department of Commerce. 2011. “ Managing Information Security Risk: Organization, Mission, and Information System View.” https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-39.pdf.
- National Institute of Standards and Technology (NIST) US Department of Commerce. 2012. “ Guide for Conducting Risk Assessments.” https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf.
- Nieles, M., K. Dempsey, and V. Yan Pillitteri. 2017. “ An Introduction to Information Security. National Institute of Standards and Technology (NIST) US Department of Commerce Report.” https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-12r1.pdf.
- Norris, D. F., L. Mateczun, A. Joshi, and T. Finin. 2016. “ Cybersecurity Challenges to American Local Governments.” https://ebiquity.umbc.edu/_file_directory_/papers/874.pdf.
- Norris, D. F., L. Mateczun, A. Joshi, and T. Finin. 2019. “Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity.” Public Administration Review.
- Norris, D. F., and C. G. Reddick. 2013. “Local e-Government in the United States: Transformation or Incremental Change?” Public Administration Review 73 (1): 165–175.
- Poon, L. 2018. “Why are Cities so Vulnerable to Cyber Attack?” City-Lab.com. https://www.citylab.com/life/2018/03/atlanta-city-hall-cyber-attack-ransomware-cesar-cerrudo/556703/.
- Prall, D. 2017. “The Weakest Link in your Cybersecurity Chain.” American City and County. https://www.americancityandcounty.com/2017/05/30/the-weakest-link-in-your-cybersecurity-chain/.
- Raytheon. 2016. “ Securing Our Future: Closing the Cybersecurity Talent Gap.” https://www.raytheon.com/sites/default/files/cyber/rtnwcm/groups/corporate/documents/content/rtn_335212.%20pdf.
- Reddick, C. G. 2004a. “A two-Stage Model of e-Government Growth: Theories and Empirical Evidence for U.S. Cities.” Government Information Quarterly 21 (1): 51–64.
- Reddick, C. G. 2004b. “Empirical Models of e-Government Growth in Local Governments.” e-Service Journal 3 (2): 59–84.
- Rid, T. 2016. Rise of the Machines. New York, NY: W. W. Norton.
- Schutt, R. K. 2011. Investigating the Social World: The Process and Practice of Research. Thousand Oaks, CA: Pine Forge Press.
- Spidalieri, F. 2015. State of the States on Cybersecurity. https://pellcenter.org/eight-states-lead-the-rest-in-cybersecurity/.
- Stoll, C. 1989. The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage. New York, NY: Doubleday Publishers.
- Tonar, R., and E. Talton. 2018. “A Lack of Cybersecurity Funding and Expertise Threatens U.S. Infrastructure.” Forbes. https://www.forbes.com/sites/ellistalton/2018/04/23/the-u-s-governments-lack-of-cybersecurity-expertise-threatens-our-infrastructure/#3cd191d549e0.
- US Census Bureau. 2016. American Community Survey. https://www.census.gov/programs-surveys/cog.html.
- USA v. Fathi. 2016. 16 CR 48 (Southern District of New York).
- USA v. Savandi. 2018. 18 CR 704 (District of New Jersey).
- Vogel, R. 2016. “Closing the Cybersecurity Skills gap.” Salus Journal 4 (2): 32–46.
- Waedt, K., A. Ciriello, M. Parekh, and E. Bajramovic. 2016. “Automatic Assets Identification for Smart Cities: Prerequisites for Cybersecurity Risk Assessments.” In Smart Cities Conference (ISC2), 2016 IEEE International (pp. 1-6). Piscataway, NJ: IEEE.
- Welch, E. W., C. C. Hinnant, and M. J. Moon. 2004. “Linking Citizen Satisfaction with e-Government and Trust in Government.” Journal of Public Administration Research and Theory 15 (3): 371–391.