Have a personal or library account? Click to login
Smart Cities and the Challenges of Cross Domain Risk Management: Considering Interdependencies Between ICT-Security and Natural Hazards Disruptions Cover

Smart Cities and the Challenges of Cross Domain Risk Management: Considering Interdependencies Between ICT-Security and Natural Hazards Disruptions

Open Access
|Dec 2019

References

  1. Alexander, C. (1977). A Pattern Language: Towns, Buildings, Construction. Oxford: University Press.
  2. Andress, J. (2014). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Amsterdam: Syngress.
  3. Batty, M., Axhausen, K. W., Giannotti, F., Pozdnoukhov, A.,Bazzani, A., Wachowicz, M., et al. (2012). Smart cities of the future. European Physical Journal Special Topics, 214 (1), 481–51810.1140/epjst/e2012-01703-3
  4. Birkmann, J. J., & von Teichman, K. (2010). Integrating disaster risk reduction and climate change adaptation: Key challenges—scales, knowledge, and norms. Sustainability Science, 5(2), 171–184.10.1007/s11625-010-0108-y
  5. Busbach-Richard, U. (2019). The Case of IT-Security: Anti-Patterns in Policy Making and its Implementation. Book of Abstracts of the First International Conference on Sustainable Development in Business and Economics. Skopje: IBI/IBF.
  6. Caragliu, A., Del Bo, C., and Nijkamp, P. (2009). Smart Cities in Europe. Series Research Memoranda 0048. Amsterdam: VU University Amsterdam, Faculty of Economics, Business Administration and Econometrics.
  7. Conti, G., Cross, T., Raymond, D. (2015). Pen Testing a City Retrieved from https://www.blackhat.com/docs/us-15/materials/us-15-Conti-Pen-Testing-A-City-wp.pdf on September 24th 2019.
  8. De la Poterie, A. T., & Baudoin, M. A. (2015). From Yokohama to Sendai: Approaches to participation in international disaster risk reduction frameworks. International Journal of Disaster Risk Science, 6(2), 128–139.10.1007/s13753-015-0053-6
  9. Essays, UK. (2018). The Importance Of Security In Distributed Systems Information Technology Essay. Retrieved from https://www.ukessays.com/essays/information-technology/the-importance-of-security-in-distributed-systems-information-technology-essay.php?vref=1 on September 24th 2019.
  10. Garousi, G., Garousi-Yusifoglu, V., Ruhe, G., Zhi, J., Moussavi, M., & Smith, B. (2015). Usage and usefulness of technical software documentation: An industrial case study. Information and Software Technology, 57, 664–68210.1016/j.infsof.2014.08.003
  11. Fernandez-Buglioni, E. (2013) Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. Hoboken: Wiley Publishing
  12. Gamma, E., Helm. R., Johnson, R. & Vlissides, J. (1994). Design Patterns (the Gang of Four book). Boston: Addison-Wesley.
  13. Garousi, G., Garousi, V., Ruhe, G., Zhi, J., Moussavi, M., & Smith, B. (2015). Usage and usefulness of technical software documentation: An industrial case study. Information & Software Technology, 57, 664–682.10.1016/j.infsof.2014.08.003
  14. Hancke, G. P., de Carvalho e Silva, B., & Hancke, G. P, Jr. (2013). The role of advanced sensing in smart cities. Sensors, 13 (1), 393–425.10.3390/s130100393
  15. Harinath, D., Satyanarayana, P. (2017). A Review on Security Issues and Attacks in Distributed Systems. Journal of Advances in Information Technology, 8 (1), 1–9.10.12720/jait.8.1.1-9
  16. Hayslip, G. (2016) What I have learned as CISO for a Smart City. Retrieved from https://www.linkedin.com/pulse/what-i-have-learned-ciso-smart-city-cissp-cisa-crisc-ccsk?articleId=6099504343512272896#comments-6099504343512272896&trk=prof-post on September 24th 2019.
  17. ISACA (2009). The Risk-IT-Framework-Excerpt. Retrieved from https://m.isaca.org/Knowledge-Center/Research/Documents/Risk-IT-Framework-Excerpt_fmk_Eng_0109.pdf on September 26th 2019.
  18. ISACA (2019). COBIT 2019 Publications & Resources. Retrieved from http://www.isaca.org/COBIT/Pages/COBIT-2019-Publications-Resources.aspx on September 26th 2019.
  19. ISO/IEC (2018). ISO/IEC 27005:2018 - Information technology - Security techniques - Information security risk management (third edition). Retrieved from https://www.iso27001security.com/html/27005.html on September 26th 2019.
  20. Mijalkovic, Sasa & Cvetković, Vladimir. (2013). VULNERABILITY OF CRITICAL INFRASTRUCTURE BY NATURAL DISASTERS.
  21. NIST (2018). Framework for Improving Critical Infrastructure Cybersecurity. Retrieved from https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf on September 26th 2019.
  22. Nussbaum, B. (2014). The ‘Levels of Analysis’ Problem with Critical Infrastructure Risk. In Journal of Physical Security, 7(1), 43–50.
  23. O’Rouke, T.D. (2007). Critical infrastructure, interdependencies and resilience. The Bridge Vol. 37 No. 1, 22–29.
  24. Perrin, C. (2008). The CIA Triad. Retrieved from https://www.techrepublic.com/blog/it-security/the-cia-triad/ on September 24th 2019.
  25. Ray-Bennett, N. S., Mendez, D., Alam, E., & Morgner, C. (2020). Inter-agency collaboration in natural hazard management in developed countries. In B. J. Gerber (Ed.), The Oxford encyclopedia of natural hazards governance. New York, NY: Oxford University Press.10.1093/acrefore/9780199389407.013.176
  26. Robert, B., Morabito, L., Cloutier, I., & Hémond, Y. (2015). Interdependent critical infrastructures resilience: Methodology and case study. Disaster Prevention and Management, 24(1), 70–79.10.1108/DPM-10-2013-0195
  27. Schaffers, H., Komninos, N., Pallot, M., Trousse, B., Nilsson,M., & Oliveira, A. (2011). Smart cities and the future internet: Towards cooperation frameworks for open innovation. J. Domingue, et al. Eds.), Future Internet Assembly pp. 431–446. LNCS: Springer.10.1007/978-3-642-20898-0_31
  28. Townsend, A. (2013).Smart cities: Big data, civic hackers, and the quest for a new utopia. New York: W.W. Norton & Co.
  29. Thomalla, F., Downing, T., Spanger Siegfried, E., Han, G., & Rockstrom, J. (2006). Reducing hazard vulnerability: towards a common approach between disaster risk reduction and climate adaptation. Disasters, 30(1), 39–48.10.1111/j.1467-9523.2006.00305.x
  30. Thomas, D. S., Phillips, B. D., Lovekamp, W. E., & Fothergill, A. (2013). Social vulnerability to disasters. Baton Roca, FL: CRC Press.10.1201/b14854
  31. United Nations. (2010). Natural hazards, unnatural disasters: the economics of effective prevention.
  32. UNISDR (United Nations International Strategy for Disaster Reduction). (2009). 2009 UNISDR terminology on disaster risk reduction. Geneva, Switzerland: United Nations.
  33. Yoder, J., Barcalow, J. (1997). Architectural patterns for enabling application security. In Proceedings of the 4th Conference on Patterns Languages of Programming (PLoP’97).
Language: English
Page range: 106 - 116
Published on: Dec 30, 2019
Published by: University College of Economics and Culture
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2019 Busbach-Richard Uwe, Brian J. Gerber, published by University College of Economics and Culture
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.