2019
DOI: 10.1016/j.giq.2018.09.007
|View full text |Cite
|
Sign up to set email alerts
|

A framework for Internet of Things-enabled smart government: A case of IoT cybersecurity policies and use cases in U.S. federal government

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
97
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 137 publications
(118 citation statements)
references
References 42 publications
1
97
0
Order By: Relevance
“…The IoT devices in an IoT system must manage and deploy privacy policies to control the flow of data to service providers (Neisse et al, 2015). According to (Chatfield and Reddick, 2018) at IoT, public policies consist of cybersecurity policies and digital technology policies and should behave as complements to each other (Chatfield & Reddick, 2018).…”
Section: Discussion and Insightsmentioning
confidence: 99%
See 2 more Smart Citations
“…The IoT devices in an IoT system must manage and deploy privacy policies to control the flow of data to service providers (Neisse et al, 2015). According to (Chatfield and Reddick, 2018) at IoT, public policies consist of cybersecurity policies and digital technology policies and should behave as complements to each other (Chatfield & Reddick, 2018).…”
Section: Discussion and Insightsmentioning
confidence: 99%
“…For industry 4.0 industries such as smart manufacturing, operations require the development of guidelines, strategic policies to enhance the adoption (Chatfield & Reddick, 2018). For (Weber, 2013) IoT should consider the requirements of cooperation, policy, coordination, standards, and laws to create rules to extend governance among the IoT's structural issues.…”
Section: Discussion and Insightsmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, the planning and implementation of smart cities are leveraging emerging technologies like IoT and cloud computing as the foundation to improve processes and outcomes in urbanization efforts (Liu and Peng 2014). However, these technologies can be used and also misused in various ways and need to be secured to avoid adverse impacts to the society (Chatfield and Reddick 2018). To gain the advantages of such emerging technologies, governments are also facilitating the interaction of citizens with such technologies (Chatterjee et al 2018).…”
Section: Introductionmentioning
confidence: 99%
“…In the Land Defense Spatial Planning, the battle area has been determined to cover 12 Sub districts. This means that the 12 Sub districts (see figure4.3) will be vulnerable to the danger of war. Twelve sub-districts prone to the dangers of warare Sukasari District, Cidadap District, Sukajadi District, Coblong District, Cibeunying Kaler District, Cibeunying Kidul District, Antapani District, Mandalajati District, Arcamanik District, Ujung Berung District, Cibiru District and Panyieulekan District.…”
mentioning
confidence: 99%