CRITICAL SUCCESS FACTORS FOR MANAGING INFORMATION SYSTEMS SECURITY IN SMART CITY ENABLED BY INTERNET OF THINGS
Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) (Vol.11, No. 12)Publication Date: 2020-12-31
Authors : Zarina Din Dian Indrayani Jambari Maryati Mohd Yusof; Jamaiah Yahaya;
Page : 1108-1120
Keywords : Critical Success Factors; Information Systems Security Management; Internet of Things; Smart City;
Abstract
IoT technology commercialisation in a Smart City involves the use of multiple interconnected devices by citizens that will accumulate volumes and complex information. The information must be managed systematically in integrated information systems (IS), to provide efficient personalised services to citizens. Managing IS security risks becomes a priority to organisations. IoT heightens the concerns toward IS security management in terms of safeguarding the integrity, confidentiality, and availability of citizens' information. Recognising the value of protecting information, organisations in a Smart City require solutions to manage the IS security. The existing approach is ineffective as it does not specifically factor in IoT implementation security risks to manage IS security successfully. Thus, this paper intended to identify a set of critical success factors (CSF) for managing IS security in an IoT-enabled Smart City. For this purpose, IS security and IoT security management aspects were combined to identify key factors for managing IS security for an IoT-enabled SC. This study applied the qualitative approach, where document analysis on existing studies, reports, and official documents was carried out. The seven critical factors were identified for IS security management for IoT, including policy and guideline standardization, organisational management, citizen engagement, system integration, IoT readiness, risk management, and technology adoption. Understanding these CSF will enable stakeholders to plan city development strategies, particularly in safeguarding information.
Other Latest Articles
- HEURISTIC TASK SCHEDULING ALGORITHMS FOR OPTIMAL RESOURCE UTILISATION IN GRID COMPUTING
- CLOUD-BASED SECURE HEALTHCARE FRAMEWORK BY USING ENHANCED CIPHERTEXT POLICY ATTRIBUTE-BASED ENCRYPTION SCHEME
- A REAL-TIME MONITORING AND INCUBATION INTEGRATED SYSTEM FOR CELL CULTURING
- APPLICATION OF MACHINE LEARNING WITH BIG DATA ANALYTICS IN THE INSURANCE INDUSTRY
- TO STUDY THE STRENGTH CHARACTERISTICS OF NON-AUTOCLAVED AERATED CONCRETE USING RICE HUSK ASH AND MARBLE POWDER
Last modified: 2021-02-23 20:04:21