{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T23:16:29Z","timestamp":1747178189436,"version":"3.40.5"},"reference-count":89,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Organizational Computing and Electronic Commerce"],"published-print":{"date-parts":[[2022,1,2]]},"DOI":"10.1080\/10919392.2022.2054259","type":"journal-article","created":{"date-parts":[[2022,3,18]],"date-time":"2022-03-18T08:26:02Z","timestamp":1647591962000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":12,"title":["Sarima-Based Cyber-Risk Assessment and Mitigation Model for A Smart City\u2019s Traffic Management Systems (Scram)"],"prefix":"10.1080","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4473-102X","authenticated-orcid":false,"given":"Kalpit","family":"Sharma","sequence":"first","affiliation":[{"name":"Doctoral Student, Information Technology and Systems, Indian Institute of Management Lucknow, Lucknow, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1455-5587","authenticated-orcid":false,"given":"Arunabha","family":"Mukhopadhyay","sequence":"additional","affiliation":[{"name":"Professor, Information Technology and Systems, Indian Institute of Management Lucknow, Lucknow, India"}]}],"member":"301","published-online":{"date-parts":[[2022,3,18]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.1080\/10630732.2014.942092"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.002"},{"key":"cit0003","unstructured":"Alsop, T. 2021. \u201cSmart city initiatives global spending 2018-2023.\u201d Statista. Accessed 12 March 2022. https:\/\/www.statista.com\/statistics\/884092\/worldwide-spending-smart-city-initiatives\/"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1049\/iet-wss.2017.0008"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.02.007"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2015.7365905"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1145\/162124.162127"},{"volume-title":"The economic approach to human behaviour","year":"1978","author":"Becker G. S","key":"cit0008"},{"key":"cit0009","first-page":"22","volume":"1","author":"Biswas B.","year":"2017","journal-title":"ISACA Journal"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-05-2017-0069"},{"key":"cit0011","unstructured":"Biswas, B., A. Mukhopadhyay, and G. Dhillon. 2017. \u201cGARCH-based risk assessment and mean-variance-based risk mitigation framework for software vulnerabilities.\u201d"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2792074"},{"volume-title":"Workshop on the Economics of Information Security (WEIS)","year":"2005","author":"B\u00f6hme R","key":"cit0013"},{"volume-title":"Workshop on the economics of information security (weis)","year":"2006","author":"B\u00f6hme R.","key":"cit0014"},{"key":"cit0015","first-page":"1","volume-title":"2006 workshop on the economics of information security (WEIS)","author":"B\u00f6hme R.","year":"2006"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2008.02.002"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"cit0019","unstructured":"Campbell, P. L., and J. E. Stamp. 2004. A classification scheme for risk assessment methods."},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0041"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0180"},{"key":"cit0022","first-page":"81","author":"Chen W.","year":"2020","journal-title":"Computers and Electrical Engineering"},{"key":"cit0023","first-page":"102","author":"Choo K. K. R.","year":"2021","journal-title":"Computers and Security"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2943146"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1145\/1499402.1499424"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.4324\/9780203076224"},{"key":"cit0027","doi-asserted-by":"publisher","DOI":"10.1145\/341852.341877"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2006.00219.x"},{"journal-title":"SSRN Electronic Journal","year":"2011","author":"Dutta K.","key":"cit0029"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1016\/j.jare.2014.02.006"},{"key":"cit0031","first-page":"1","author":"Elvira I.","year":"2020","journal-title":"Information Systems Frontiers"},{"key":"cit0032","first-page":"167","author":"Fahim U.","year":"2021","journal-title":"Technological Forecasting and Social Change"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.1145\/636772.636774"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90030-7"},{"volume-title":"Basic Econometrics","year":"2009","author":"Gujarati D","key":"cit0035"},{"key":"cit0036","first-page":"2289","volume-title":"Proceedings of the Annual Hawaii International Conference on System Sciences","author":"Hafedh C.","year":"2012"},{"key":"cit0037","first-page":"1","author":"Hartwig R. P.","year":"2014","journal-title":"Insurance Information Institute"},{"key":"cit0038","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2019.1611528"},{"issue":"2","key":"cit0039","first-page":"309","volume":"68","author":"Hiller J. S.","year":"2017","journal-title":"Hastings Law Journal"},{"key":"cit0040","first-page":"531","volume":"47","author":"Hoffman L. J.","year":"1978","journal-title":"AFIPS Natl Comput Conf Expo Conf Proc"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139173322"},{"key":"cit0042","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.ijinfomgt.2018.10.021","volume":"46","author":"Israilidis J.","year":"2019","journal-title":"International Journal of Information Management"},{"journal-title":"Dissent","year":"2013","author":"Jay K.","key":"cit0043"},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2020.1776033"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-019-09930-0"},{"key":"cit0047","first-page":"97","volume-title":"Fourth Workshop on the Economics of Information Security","volume":"2","author":"Kesan J. P.","year":"2005"},{"key":"cit0048","first-page":"103","author":"Kim K.","year":"2021","journal-title":"Computers and Security"},{"key":"cit0049","doi-asserted-by":"publisher","DOI":"10.1080\/10630732.2017.1408002"},{"key":"cit0050","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1999.tb00442.x"},{"key":"cit0051","first-page":"1","author":"Kunreuther H","year":"1997","journal-title":"Philadelphia, Wharton Risk Management and Decision Processes Center"},{"key":"cit0052","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2019.12.035"},{"key":"cit0053","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.008"},{"key":"cit0054","first-page":"91","author":"Lee S.","year":"2020","journal-title":"Computers and Security"},{"key":"cit0055","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102092"},{"journal-title":"Information Systems","year":"2019","author":"Magalhaes R. P.","key":"cit0056"},{"key":"cit0057","unstructured":"Majuca, R. P., W. Yurcik, and J. P. Kesan. 2006. \u201cThe evolution of cyberinsurance,\u201d. Accessed 12 March 2022. January. http:\/\/arxiv.org\/abs\/cs\/0601020"},{"key":"cit0058","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102091"},{"key":"cit0059","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.102050"},{"key":"cit0060","doi-asserted-by":"publisher","DOI":"10.1108\/INTR-06-2018-0252"},{"key":"cit0061","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.28.110601.140752"},{"key":"cit0062","volume-title":"Journal of marketing research","volume":"14","author":"Michael G.","year":"1977"},{"key":"cit0063","first-page":"158b","volume-title":"Proceedings of the Annual Hawaii International Conference on System Sciences","author":"Mukhopadhyay A.","year":"2007"},{"volume-title":"Proceedings of the Annual Hawaii International Conference on System Sciences","year":"2007","author":"Mukhopadhyay A.","key":"cit0064"},{"key":"cit0065","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-017-9808-5"},{"key":"cit0066","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2019.101411"},{"volume-title":"2017 annual report: NIST\/ITL cybersecurity program","year":"2018","author":"O\u2019Reilly P. D.","key":"cit0067"},{"issue":"4","key":"cit0068","first-page":"229","volume":"11","author":"Ozier W","year":"1989","journal-title":"Information Age"},{"key":"cit0069","unstructured":"Pandey, P. 2019. \u201cMaking smart cities cybersecure.\u201d Deloitte Insights. Deloitte. Accessed12 March 2022. https:\/\/www2.deloitte.com\/us\/en\/insights\/multimedia\/podcasts\/making-smart-cities-cybersecure.html"},{"key":"cit0070","unstructured":"Povolny, S., and S. Trivedi. 2020. \u201cModel hacking ADAS to pave safer roads for autonomous vehicles.\u201d McAfee Blogs. McAfee. Accessed 12 March 2022. https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/model-hacking-adas-to-pave-safer-roads-for-autonomous-vehicles\/"},{"key":"cit0071","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2541999"},{"key":"cit0072","first-page":"3","volume-title":"Lecture notes in business information processing","volume":"234","author":"Rabhi F.","year":"2018"},{"key":"cit0073","volume-title":"Principles of risk management and insurance","author":"Rejda G. E","year":"2007","edition":"10"},{"key":"cit0074","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"cit0075","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1394049"},{"volume-title":"19th Annual Security Conference","year":"2020","author":"Sharma K.","key":"cit0076"},{"key":"cit0077","first-page":"41","volume":"2","author":"Sharma K.","year":"2020","journal-title":"ISACA Journal"},{"volume-title":"Production and Operations Management Society (POMS) Conference 2021","year":"2021","author":"Sharma K.","key":"cit0078"},{"key":"cit0079","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-05-2018-0251"},{"key":"cit0080","unstructured":"Sneed, A. 2019. \u201cWhat cities can learn from atlanta\u2019s cyberattack.\u201d CityLab. Bloomberg. Accessed 12 March 2022. https:\/\/www.citylab.com\/life\/2019\/10\/cyber-security-cities-atlanta-cyberattack-ransomware-data\/600982\/"},{"key":"cit0081","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"cit0082","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2013.807712"},{"key":"cit0083","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101645"},{"key":"cit0084","doi-asserted-by":"publisher","DOI":"10.4018\/IJPADA.2018070106"},{"key":"cit0085","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.ijinfomgt.2018.10.021","volume":"46","author":"Yahia B.","year":"2019","journal-title":"International Journal of Information Management"},{"key":"cit0086","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2017.05.001"},{"key":"cit0087","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2021.113543"},{"key":"cit0088","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222300104"},{"key":"cit0089","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2019.0894"}],"container-title":["Journal of Organizational Computing and Electronic Commerce"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10919392.2022.2054259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T10:10:14Z","timestamp":1653905414000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10919392.2022.2054259"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,2]]},"references-count":89,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1,2]]}},"alternative-id":["10.1080\/10919392.2022.2054259"],"URL":"https:\/\/doi.org\/10.1080\/10919392.2022.2054259","relation":{},"ISSN":["1091-9392","1532-7744"],"issn-type":[{"type":"print","value":"1091-9392"},{"type":"electronic","value":"1532-7744"}],"subject":[],"published":{"date-parts":[[2022,1,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hoce20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hoce20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-03-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}