An economic alternative to improve Cybersecurity of e-government and smart cities

Zhen Li, Qi Liao

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

While the rapid progress in smart city technologies are chang-ing cities and the lifestyle of the people, there are increas-ingly enormous challenges in terms of the safety and security of smart cities. The potential vulnerabilities of e-government products and imminent attacks on smart city infrastructure and services will have catastrophic consequences on the gov-ernments and can cause substantial economic and noneco-nomic losses, even chaos, to the cities and their residents. This paper aims to explore alternative economic solutions ranging from incentive mechanisms to market-based solu-tions to motivate smart city product vendors, governments, and vulnerability researchers and finders to improve the cy-bersecurity of smart cities.

Original languageEnglish
Title of host publicationdg.o 2016 - Proceedings of the 17th Annual International Conference on Digital Government Research - Internet Plus Government
Subtitle of host publicationNew Opportunities to Solve Public Problems
EditorsYushim Kim, Shuhua Monica Liu
PublisherAssociation for Computing Machinery
Pages455-464
Number of pages10
ISBN (Electronic)9781450343398
DOIs
StatePublished - Jun 8 2016
Event17th Annual International Conference on Digital Government Research, dg.o 2016 - Shanghai, China
Duration: Jun 8 2016Jun 10 2016

Publication series

NameACM International Conference Proceeding Series
Volume08-10-June-2016

Conference

Conference17th Annual International Conference on Digital Government Research, dg.o 2016
Country/TerritoryChina
CityShanghai
Period06/8/1606/10/16

Keywords

  • E-government
  • Economics
  • Game Theory
  • Security and Privacy
  • Smart cities
  • Vulnerability

Fingerprint

Dive into the research topics of 'An economic alternative to improve Cybersecurity of e-government and smart cities'. Together they form a unique fingerprint.

Cite this