Designing and localizing a novel cybersecurity model according to smart city digital infrastructure components (A Case Study of GreenWeb Co.)

Publish Year: 1403
نوع سند: مقاله ژورنالی
زبان: English
View: 207

This Paper With 18 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_IJIMES-4-3_001

تاریخ نمایه سازی: 13 آبان 1403

Abstract:

Purpose: Today, the world is witnessing the evolution of smart cities. The emergence of these cities results from the application of information technology innovations, which, despite creating numerous economic and social opportunities, have introduced cybersecurity and privacy threats to citizens. Smart cities' successful transition to optimal performance depends on awareness of these threats and their impact. This study aims to provide a framework for identifying and evaluating cybersecurity criteria and examining their effect on cybersecurity performance in smart cities.Methodology: To achieve the study's practical purpose, a descriptive survey method was used to collect the necessary data. The criteria were identified through in-depth library research and surveys conducted via researcher-made questionnaires using the fuzzy Delphi method. Academic experts and relevant officials selected purposefully participated in the surveys. The importance of each criterion was determined using the fuzzy Best-Worst Multi-Criteria method. Subsequently, based on the digital infrastructure components of the smart city, the cybersecurity performance of the smart city was described according to the criteria identified in the previous step. The study hypotheses were then tested using Structural Equation Modeling based on the Partial Least Squares method.Findings: Analysis of the fitted model and research hypotheses revealed a positive and significant relationship between the variables of cybersecurity process re-engineering and cybersecurity actions with cybersecurity performance at a ۹۵% confidence level. Considering the value of the R² coefficient, it was observed that the variables of cybersecurity process re-engineering and cybersecurity actions collectively predicted ۷۲.۷% of the cybersecurity performance variable of the smart city.Originality/value: This article highlights the importance of cybersecurity in smart cities. It explains factors that affect cybersecurity and proposes a conceptual framework for providing cybersecurity services based on the digital infrastructure of the smart city. This study focuses on factors that occur before incidents, such as vulnerabilities and preventive measures. Future research should consider factors that occur after incidents, such as the actions taken and the recovery of digital systems.Purpose: Today, the world is witnessing the evolution of smart cities. The emergence of these cities results from the application of information technology innovations, which, despite creating numerous economic and social opportunities, have introduced cybersecurity and privacy threats to citizens. Smart cities' successful transition to optimal performance depends on awareness of these threats and their impact. This study aims to provide a framework for identifying and evaluating cybersecurity criteria and examining their effect on cybersecurity performance in smart cities. Methodology: To achieve the study's practical purpose, a descriptive survey method was used to collect the necessary data. The criteria were identified through in-depth library research and surveys conducted via researcher-made questionnaires using the fuzzy Delphi method. Academic experts and relevant officials selected purposefully participated in the surveys. The importance of each criterion was determined using the fuzzy Best-Worst Multi-Criteria method. Subsequently, based on the digital infrastructure components of the smart city, the cybersecurity performance of the smart city was described according to the criteria identified in the previous step. The study hypotheses were then tested using Structural Equation Modeling based on the Partial Least Squares method. Findings: Analysis of the fitted model and research hypotheses revealed a positive and significant relationship between the variables of cybersecurity process re-engineering and cybersecurity actions with cybersecurity performance at a ۹۵% confidence level. Considering the value of the R² coefficient, it was observed that the variables of cybersecurity process re-engineering and cybersecurity actions collectively predicted ۷۲.۷% of the cybersecurity performance variable of the smart city. Originality/value: This article highlights the importance of cybersecurity in smart cities. It explains factors that affect cybersecurity and proposes a conceptual framework for providing cybersecurity services based on the digital infrastructure of the smart city. This study focuses on factors that occur before incidents, such as vulnerabilities and preventive measures. Future research should consider factors that occur after incidents, such as the actions taken and the recovery of digital systems.

Keywords:

Smart City , Cybersecurity , Passive defense , Digital infrastructure , Business process re-engineering (BPR) , Structural equation modeling (SEM) , Fuzzy Best-Worst Multi-criteria method (FBWM)

Authors

Sattar Rajabpour Sanati

Department of Business Intelligence at GreenWeb Co., Mashhad, Iran

Mohammad Zebardast

Department of Cybersecurity Operation Center at GreenWeb Co., Mashhad, Iran

Rasoul Jamshidi *

Department of Industrial Engineering, School of Engineering, Damghan University, Damghan, Iran

Mohammad Ebrahim Sadeghi

Department of Industrial Management, Faculty of Management, University of Tehran, Tehran, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Blasi, S., A. Ganzaroli, and I. De Noni. (2022). Smartening ...
  • Camero, A. and E. Alba. (2019). Smart City and information ...
  • Myeong, S., J. Park, and M. Lee. (2022). Research models ...
  • Gerasopoulos, E., et al. (2022). Earth observation: An integral part ...
  • Albino, V., U. Berardi, and R.M. Dangelico. (2015). Smart cities: ...
  • Security and privacy analysis based on Internet of Things in the fourth industrial generation (Industry ۴.۰) [مقاله ژورنالی]
  • Kashef, M., A. Visvizi, and O. Troisi. (2021). Smart city ...
  • Alizadeh, T. (2021). Global trends of smart cities. Elsevier. https://doi.org/10.1016/C2019-0-00713-3 ...
  • Reichental, J. (2020). Smart cities for dummies. John Wiley & ...
  • AlDairi, A. (2017). Cyber security attacks on smart cities and ...
  • Lord, K.M. and T. Sharp. (2011). America's Cyber Future: Security ...
  • Ijaz, S., et al. (2016). Smart cities: A survey on ...
  • Curry, E., et al. (2016). Smart cities–enabling services and applications. ...
  • Botta, A., et al. (2016). Integration of cloud computing and ...
  • Big data and cloud computing: roles and relationships, techniques and tools [مقاله ژورنالی]
  • Hashem, I.A.T., et al. (2016). The role of big data ...
  • Yang, C., et al. (2017). Big Data and cloud computing: ...
  • Puentes, M., et al. (2020). Towards smart-city implementation for crisis ...
  • Al Sharif, R. and S. Pokharel. (2022). Smart city dimensions ...
  • Hasbini, M.A., T. Eldabi, and A. Aldallal. (2018). Investigating the ...
  • Farahat, I., et al. (2019). Data security and challenges in ...
  • Laufs, J., H. Borrion, and B. Bradford. (2020). Security and ...
  • Wu, Y.C., R. Sun, and Y.J. Wu. (2020). Smart city ...
  • Wollman, D.A., et al. (2022). Smart Cities and Communities: A ...
  • Haque, A.B., B. Bhushan, and G. Dhiman. (2022). Conceptualizing smart ...
  • Xagoraris, L., D. Kogias, and P. Karkazis. (2023). A Review ...
  • Andrade, R.O., et al. (2020). A comprehensive study of the ...
  • Nafrees, A.C.M., A.M.A. Sujah, and C. Mansoor. (2021). Smart Cities: ...
  • Adeodato, R. and S. Pournouri. (2020). Secure implementation of e-governance: ...
  • Telo, J. (2023). Smart city security threats and countermeasures in ...
  • Prioritizing policy tools to support development of IoT technologies in Iran [مقاله ژورنالی]
  • Parker, C., S. Scott, and A. Geddes. (2019). Snowball sampling. ...
  • Allen, I.E. and C.A. Seaman. (2007). Likert scales and data ...
  • Guo, S. and H. Zhao. (2017). Fuzzy best-worst multi-criteria decision-making ...
  • Orcan, F. (2020). Parametric or non-parametric: Skewness to test normality ...
  • Rasoolimanesh, S.M. (2022). Discriminant validity assessment in PLS-SEM: A comprehensive ...
  • Götz, O., K. Liehr-Gobbers, and M. Krafft. (2009). Evaluation of ...
  • نمایش کامل مراجع