메뉴 건너뛰기




Volumn 35, Issue 1, 2018, Pages 151-160

Economic solutions to improve cybersecurity of governments and smart cities via vulnerability markets

Author keywords

Cybersecurity; E government; Economics; Game theory; Smart cities; Vulnerability

Indexed keywords


EID: 85032360698     PISSN: 0740624X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.giq.2017.10.006     Document Type: Article
Times cited : (34)

References (44)
  • 4
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security: A survey and open questions
    • Anderson, R., Moore, T., The economics of information security: A survey and open questions. Science 314 (2006), 610–613.
    • (2006) Science , vol.314 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 5
    • 33846183559 scopus 로고    scopus 로고
    • Does information security attack frequency increase with vulnerability disclosure: An empirical analysis
    • Arora, A., Nandkumar, A., Telang, R., Does information security attack frequency increase with vulnerability disclosure: An empirical analysis. Information Systems Frontiers 8 (2006), 350–362.
    • (2006) Information Systems Frontiers , vol.8 , pp. 350-362
    • Arora, A.1    Nandkumar, A.2    Telang, R.3
  • 6
    • 61849175198 scopus 로고    scopus 로고
    • Optimal policy for software vulnerability disclosure
    • Arora, A., Telang, R., Xu, H., Optimal policy for software vulnerability disclosure. Management Science 54 (2008), 642–656.
    • (2008) Management Science , vol.54 , pp. 642-656
    • Arora, A.1    Telang, R.2    Xu, H.3
  • 7
    • 79956063140 scopus 로고    scopus 로고
    • Who should be responsible for software security? A comparative analysis of liability policies in network environments
    • August, T., Tunca, T.I., Who should be responsible for software security? A comparative analysis of liability policies in network environments. Management Science 57 (2011), 934–959.
    • (2011) Management Science , vol.57 , pp. 934-959
    • August, T.1    Tunca, T.I.2
  • 8
    • 84928754872 scopus 로고    scopus 로고
    • Determinants of multi-service smartcard success for smart cities development: A study based on citizens’ privacy and security perceptions
    • Belanche-Gracia, D., Casalo-Arinob, L.V., Perez-Rueda, A., Determinants of multi-service smartcard success for smart cities development: A study based on citizens’ privacy and security perceptions. Government Information Quarterly 32 (2015), 154–163.
    • (2015) Government Information Quarterly , vol.32 , pp. 154-163
    • Belanche-Gracia, D.1    Casalo-Arinob, L.V.2    Perez-Rueda, A.3
  • 12
    • 84940878946 scopus 로고    scopus 로고
    • Smart and digital city: A systematic literature review
    • R.P. Dameri C. Sabroux Spri nger International Publishing Switzerland
    • Cocchia, A., Smart and digital city: A systematic literature review. Dameri, R.P., Sabroux, C., (eds.) Smart city: How to create public and economic value with high technology in urban space, 2014, Spri nger International Publishing, Switzerland, 13–43.
    • (2014) Smart city: How to create public and economic value with high technology in urban space , pp. 13-43
    • Cocchia, A.1
  • 13
    • 85015714120 scopus 로고    scopus 로고
    • Building cybersecurity awareness: The need for evidence-based framing strategies
    • de Bruijn, H., Janssen, M., Building cybersecurity awareness: The need for evidence-based framing strategies. Government Information Quarterly 34 (2017), 1–7.
    • (2017) Government Information Quarterly , vol.34 , pp. 1-7
    • de Bruijn, H.1    Janssen, M.2
  • 15
    • 79960596666 scopus 로고    scopus 로고
    • The political economy of fiscal deficits: A survey
    • Eslava, M., The political economy of fiscal deficits: A survey. Journal of Economic Surveys 25 (2011), 645–673.
    • (2011) Journal of Economic Surveys , vol.25 , pp. 645-673
    • Eslava, M.1
  • 20
    • 85042800071 scopus 로고    scopus 로고
    • Governing proliferation in cybersecurity
    • Herr, T., Governing proliferation in cybersecurity. Global Summitry, 3, 2017.
    • (2017) Global Summitry , vol.3
    • Herr, T.1
  • 28
    • 0033451088 scopus 로고    scopus 로고
    • Evidence of under-investment in energy R&D in the United States and the impact of federal policy
    • Margolis, R.M., Kammen, D.M., Evidence of under-investment in energy R&D in the United States and the impact of federal policy. Energy Policy 27 (1999), 575–584.
    • (1999) Energy Policy , vol.27 , pp. 575-584
    • Margolis, R.M.1    Kammen, D.M.2
  • 32
  • 33
    • 77953614890 scopus 로고    scopus 로고
    • Identifying the security risks associated with governmental use of cloud computing
    • Paquette, S., Jaeger, P.T., Wilson, S.C., Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly 27 (2010), 245–253.
    • (2010) Government Information Quarterly , vol.27 , pp. 245-253
    • Paquette, S.1    Jaeger, P.T.2    Wilson, S.C.3
  • 36
    • 84928771409 scopus 로고    scopus 로고
    • ‘cyber gurus’: A rhetorical analysis of the language of cybersecurity specialists and the implications for security policy and critical infrastructure protection
    • Quigley, K., Burns, C., Stallard, K., ‘cyber gurus’: A rhetorical analysis of the language of cybersecurity specialists and the implications for security policy and critical infrastructure protection. Government Information Quarterly 32 (2015), 108–117.
    • (2015) Government Information Quarterly , vol.32 , pp. 108-117
    • Quigley, K.1    Burns, C.2    Stallard, K.3
  • 37
    • 84884138082 scopus 로고    scopus 로고
    • Are markets for vulnerabilities effective?
    • Ransbotham, S., Mitra, S., Ramsey, J., Are markets for vulnerabilities effective?. MIS Quarterly 36 (2012, March), 43–64.
    • (2012) MIS Quarterly , vol.36 , pp. 43-64
    • Ransbotham, S.1    Mitra, S.2    Ramsey, J.3
  • 38
    • 84976313991 scopus 로고    scopus 로고
    • Potential dimensions for a local e-government services quality model
    • Sa, F., Rochac, A., Cota, M.P., Potential dimensions for a local e-government services quality model. Telematics and Informatics 33 (2016), 270–276.
    • (2016) Telematics and Informatics , vol.33 , pp. 270-276
    • Sa, F.1    Rochac, A.2    Cota, M.P.3
  • 39
    • 77949757281 scopus 로고    scopus 로고
    • Tort liability for vendors of insecure software: Has the time finally come?
    • Scott, M.D., Tort liability for vendors of insecure software: Has the time finally come?. Maryland Law Review 67 (2008), 425–484.
    • (2008) Maryland Law Review , vol.67 , pp. 425-484
    • Scott, M.D.1
  • 43
    • 84895907919 scopus 로고    scopus 로고
    • Protecting personal data in e-government: A cross-country study
    • Wu, Y., Protecting personal data in e-government: A cross-country study. Government Information Quarterly 31 (2014), 150–159.
    • (2014) Government Information Quarterly , vol.31 , pp. 150-159
    • Wu, Y.1
  • 44
    • 70549093057 scopus 로고    scopus 로고
    • Opportunities and threats: A security assessment of state e-government websites
    • Zhao, J.J., Zhao, S.Y., Opportunities and threats: A security assessment of state e-government websites. Government Information Quarterly 27 (2010), 49–56.
    • (2010) Government Information Quarterly , vol.27 , pp. 49-56
    • Zhao, J.J.1    Zhao, S.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.