1. bookVolume 16 (2019): Edition 2 (December 2019)
Détails du magazine
License
Format
Magazine
eISSN
2256-0173
Première parution
16 Jun 2016
Périodicité
2 fois par an
Langues
Anglais
Accès libre

Smart Cities and the Challenges of Cross Domain Risk Management: Considering Interdependencies Between ICT-Security and Natural Hazards Disruptions

Publié en ligne: 30 Dec 2019
Volume & Edition: Volume 16 (2019) - Edition 2 (December 2019)
Pages: 106 - 116
Détails du magazine
License
Format
Magazine
eISSN
2256-0173
Première parution
16 Jun 2016
Périodicité
2 fois par an
Langues
Anglais

Alexander, C. (1977). A Pattern Language: Towns, Buildings, Construction. Oxford: University Press.Search in Google Scholar

Andress, J. (2014). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Amsterdam: Syngress.Search in Google Scholar

Batty, M., Axhausen, K. W., Giannotti, F., Pozdnoukhov, A.,Bazzani, A., Wachowicz, M., et al. (2012). Smart cities of the future. European Physical Journal Special Topics, 214 (1), 481–51810.1140/epjst/e2012-01703-3Search in Google Scholar

Birkmann, J. J., & von Teichman, K. (2010). Integrating disaster risk reduction and climate change adaptation: Key challenges—scales, knowledge, and norms. Sustainability Science, 5(2), 171–184.10.1007/s11625-010-0108-ySearch in Google Scholar

Busbach-Richard, U. (2019). The Case of IT-Security: Anti-Patterns in Policy Making and its Implementation. Book of Abstracts of the First International Conference on Sustainable Development in Business and Economics. Skopje: IBI/IBF.Search in Google Scholar

Caragliu, A., Del Bo, C., and Nijkamp, P. (2009). Smart Cities in Europe. Series Research Memoranda 0048. Amsterdam: VU University Amsterdam, Faculty of Economics, Business Administration and Econometrics.Search in Google Scholar

Conti, G., Cross, T., Raymond, D. (2015). Pen Testing a City Retrieved from https://www.blackhat.com/docs/us-15/materials/us-15-Conti-Pen-Testing-A-City-wp.pdf on September 24th 2019.Search in Google Scholar

De la Poterie, A. T., & Baudoin, M. A. (2015). From Yokohama to Sendai: Approaches to participation in international disaster risk reduction frameworks. International Journal of Disaster Risk Science, 6(2), 128–139.10.1007/s13753-015-0053-6Search in Google Scholar

Essays, UK. (2018). The Importance Of Security In Distributed Systems Information Technology Essay. Retrieved from https://www.ukessays.com/essays/information-technology/the-importance-of-security-in-distributed-systems-information-technology-essay.php?vref=1 on September 24th 2019.Search in Google Scholar

Garousi, G., Garousi-Yusifoglu, V., Ruhe, G., Zhi, J., Moussavi, M., & Smith, B. (2015). Usage and usefulness of technical software documentation: An industrial case study. Information and Software Technology, 57, 664–68210.1016/j.infsof.2014.08.003Search in Google Scholar

Fernandez-Buglioni, E. (2013) Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. Hoboken: Wiley PublishingSearch in Google Scholar

Gamma, E., Helm. R., Johnson, R. & Vlissides, J. (1994). Design Patterns (the Gang of Four book). Boston: Addison-Wesley.Search in Google Scholar

Garousi, G., Garousi, V., Ruhe, G., Zhi, J., Moussavi, M., & Smith, B. (2015). Usage and usefulness of technical software documentation: An industrial case study. Information & Software Technology, 57, 664–682.10.1016/j.infsof.2014.08.003Search in Google Scholar

Hancke, G. P., de Carvalho e Silva, B., & Hancke, G. P, Jr. (2013). The role of advanced sensing in smart cities. Sensors, 13 (1), 393–425.Search in Google Scholar

Harinath, D., Satyanarayana, P. (2017). A Review on Security Issues and Attacks in Distributed Systems. Journal of Advances in Information Technology, 8 (1), 1–9.10.12720/jait.8.1.1-9Search in Google Scholar

Hayslip, G. (2016) What I have learned as CISO for a Smart City. Retrieved from https://www.linkedin.com/pulse/what-i-have-learned-ciso-smart-city-cissp-cisa-crisc-ccsk?articleId=6099504343512272896#comments-6099504343512272896&trk=prof-post on September 24th 2019.Search in Google Scholar

ISACA (2009). The Risk-IT-Framework-Excerpt. Retrieved from https://m.isaca.org/Knowledge-Center/Research/Documents/Risk-IT-Framework-Excerpt_fmk_Eng_0109.pdf on September 26th 2019.Search in Google Scholar

ISACA (2019). COBIT 2019 Publications & Resources. Retrieved from http://www.isaca.org/COBIT/Pages/COBIT-2019-Publications-Resources.aspx on September 26th 2019.Search in Google Scholar

ISO/IEC (2018). ISO/IEC 27005:2018 - Information technology - Security techniques - Information security risk management (third edition). Retrieved from https://www.iso27001security.com/html/27005.html on September 26th 2019.Search in Google Scholar

Mijalkovic, Sasa & Cvetković, Vladimir. (2013). VULNERABILITY OF CRITICAL INFRASTRUCTURE BY NATURAL DISASTERS.Search in Google Scholar

NIST (2018). Framework for Improving Critical Infrastructure Cybersecurity. Retrieved from https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf on September 26th 2019.Search in Google Scholar

Nussbaum, B. (2014). The ‘Levels of Analysis’ Problem with Critical Infrastructure Risk. In Journal of Physical Security, 7(1), 43–50.Search in Google Scholar

O’Rouke, T.D. (2007). Critical infrastructure, interdependencies and resilience. The Bridge Vol. 37 No. 1, 22–29.Search in Google Scholar

Perrin, C. (2008). The CIA Triad. Retrieved from https://www.techrepublic.com/blog/it-security/the-cia-triad/ on September 24th 2019.Search in Google Scholar

Ray-Bennett, N. S., Mendez, D., Alam, E., & Morgner, C. (2020). Inter-agency collaboration in natural hazard management in developed countries. In B. J. Gerber (Ed.), The Oxford encyclopedia of natural hazards governance. New York, NY: Oxford University Press.Search in Google Scholar

Robert, B., Morabito, L., Cloutier, I., & Hémond, Y. (2015). Interdependent critical infrastructures resilience: Methodology and case study. Disaster Prevention and Management, 24(1), 70–79.10.1108/DPM-10-2013-0195Search in Google Scholar

Schaffers, H., Komninos, N., Pallot, M., Trousse, B., Nilsson,M., & Oliveira, A. (2011). Smart cities and the future internet: Towards cooperation frameworks for open innovation. J. Domingue, et al. Eds.), Future Internet Assembly pp. 431–446. LNCS: Springer.Search in Google Scholar

Townsend, A. (2013).Smart cities: Big data, civic hackers, and the quest for a new utopia. New York: W.W. Norton & Co.Search in Google Scholar

Thomalla, F., Downing, T., Spanger Siegfried, E., Han, G., & Rockstrom, J. (2006). Reducing hazard vulnerability: towards a common approach between disaster risk reduction and climate adaptation. Disasters, 30(1), 39–48.10.1111/j.1467-9523.2006.00305.xSearch in Google Scholar

Thomas, D. S., Phillips, B. D., Lovekamp, W. E., & Fothergill, A. (2013). Social vulnerability to disasters. Baton Roca, FL: CRC Press.10.1201/b14854Search in Google Scholar

United Nations. (2010). Natural hazards, unnatural disasters: the economics of effective prevention.Search in Google Scholar

UNISDR (United Nations International Strategy for Disaster Reduction). (2009). 2009 UNISDR terminology on disaster risk reduction. Geneva, Switzerland: United Nations.Search in Google Scholar

Yoder, J., Barcalow, J. (1997). Architectural patterns for enabling application security. In Proceedings of the 4th Conference on Patterns Languages of Programming (PLoP’97).Search in Google Scholar

Articles recommandés par Trend MD

Planifiez votre conférence à distance avec Sciendo