{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:15:50Z","timestamp":1775470550776,"version":"3.50.1"},"reference-count":106,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T00:00:00Z","timestamp":1692748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The complex and interconnected infrastructure of smart cities offers several opportunities for attackers to exploit vulnerabilities and carry out cyberattacks that can have serious consequences for the functioning of cities\u2019 critical infrastructures. This study aims to address this phenomenon and characterize the dimensions of security risks in smart cities and present mitigation proposals to address these risks. The study adopts a qualitative methodology through the identification of 62 European research projects in the field of cybersecurity in smart cities, which are underway during the period from 2022 to 2027. Compared to previous studies, this work provides a comprehensive view of security risks from the perspective of multiple universities, research centers, and companies participating in European projects. The findings of this study offer relevant scientific contributions by identifying 7 dimensions and 31 sub-dimensions of cybersecurity risks in smart cities and proposing 24 mitigation strategies to face these security challenges. Furthermore, this study explores emerging cybersecurity issues to which smart cities are exposed by the increasing proliferation of new technologies and standards.<\/jats:p>","DOI":"10.3390\/fi15090285","type":"journal-article","created":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T10:09:53Z","timestamp":1692871793000},"page":"285","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Prospects of Cybersecurity in Smart Cities"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6758-4843","authenticated-orcid":false,"given":"Fernando","family":"Almeida","sequence":"first","affiliation":[{"name":"Polytechnic Higher Institute of Gaya (ISPGAYA), 4400-103 Vila Nova de Gaia, Portugal"},{"name":"Institute for Systems and Computer Engineering, Technology and Science, 4200-465 Porto, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2023,8,23]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3389\/fbuil.2020.00077","article-title":"The Concept of Sustainability in Smart City Definitions","volume":"6","author":"Toli","year":"2020","journal-title":"Front. Built Environ."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1080\/10630732.2014.942092","article-title":"Smart Cities: Definitions, Dimensions, Performance, and Initiatives","volume":"22","author":"Albino","year":"2015","journal-title":"J. Urban Technol."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"509","DOI":"10.35808\/ersj\/2442","article-title":"Smart City: Definitions, Dimensions, and Initiatives","volume":"XXIV","author":"Kozlowski","year":"2021","journal-title":"Eur. Res. Studies J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1016\/j.procs.2016.07.258","article-title":"Developing Smart Cities: An Integrated Framework","volume":"93","author":"Joshi","year":"2016","journal-title":"Proc. Comp. Sci."},{"key":"ref_5","first-page":"70","article-title":"Smart city concept in the light of the literature review","volume":"11","author":"Winkowska","year":"2019","journal-title":"Eng. Manag. Prod. Serv."},{"key":"ref_6","first-page":"1","article-title":"Smart Sustainable Cities: Characterization and Impacts for Sustainable Development Goals","volume":"11","author":"Corsi","year":"2022","journal-title":"J. Environ. Manag. Sust."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1080\/12265934.2022.2074076","article-title":"Smart city as a social transition towards inclusive development through technology: A tale of four smart cities","volume":"27","author":"Lee","year":"2023","journal-title":"Int. J. Urban Sci."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"63","DOI":"10.31648\/oej.3646","article-title":"The Role of ICT in the Smart City Concept","volume":"14","author":"Czupich","year":"2019","journal-title":"Olszt. Econ. J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1016\/j.giq.2017.05.001","article-title":"The effects of successful ICT-based smart city services: From citizens\u2019 perspectives","volume":"34","author":"Yeh","year":"2017","journal-title":"Gov. Inf. Q."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Myeong, S., Jung, Y., and Lee, E. (2018). A Study on Determinant Factors in Smart City Development: An Analytic Hierarchy Process Analysis. Sustainability, 10.","DOI":"10.3390\/su10082606"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"73","DOI":"10.5958\/2321-581X.2017.00012.5","article-title":"Cyber crime in the society: Security issues, preventions and challenges","volume":"8","author":"Nitika","year":"2017","journal-title":"Res. J. Eng. Technol."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Verma, A., and Shri, C. (2022). Cyber Security: A Review of Cyber Crimes, Security Challenges and Measures to Control. Vision, in press.","DOI":"10.1177\/09722629221074760"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Alamer, M., and Almaiah, M.A. (2021, January 14\u201315). Cybersecurity in Smart City: A Systematic Mapping Study. Proceedings of the 2021 International Conference on Information Technology (ICIT), Amman, Jordan.","DOI":"10.1109\/ICIT52682.2021.9491123"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Kim, K., Alshenaifi, I.M., Ramachandran, S., Kim, J., Zia, T., and Amorjan, A. (2023). Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey. Sensors, 23.","DOI":"10.3390\/s23073681"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1719","DOI":"10.3390\/smartcities6040080","article-title":"Smart Cities\u2014A Structured Literature Review","volume":"6","author":"Gracias","year":"2023","journal-title":"Smart Cities"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Kollarova, M., Granak, T., Stricova, S., and Ristvej, J. (2023). Conceptual Model of Key Aspects of Security and Privacy Protection in a Smart City in Slovakia. Sustainability, 15.","DOI":"10.3390\/su15086926"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Alfouzan, F.A., Kim, K., and Alzahrani, N.M. (2022). An Efficient Framework for Securing the Smart City Communication Networks. Sensors, 22.","DOI":"10.3390\/s22083053"},{"key":"ref_18","first-page":"e01374","article-title":"Smart Cities after COVID-19: Building a conceptual framework through a multidisciplinary perspective","volume":"17","author":"Megahed","year":"2022","journal-title":"Sci. Afr."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1186\/s40537-020-00363-0","article-title":"A survey of methods supporting cyber situational awareness in the context of smart cities","volume":"7","author":"Neshenko","year":"2020","journal-title":"J. Big Data"},{"key":"ref_20","first-page":"4671","article-title":"Security and Privacy Challenges in the Deployment of Cyber-Physical Systems in Smart City Applications: State-of-Art Work","volume":"62","author":"Rani","year":"2022","journal-title":"Mater. Proc."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1186\/s13731-016-0036-x","article-title":"Cyber-security in smart cities: The case of Dubai","volume":"5","author":"Efthymiopoulos","year":"2016","journal-title":"J. Innov. Entrep."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"403","DOI":"10.3233\/EPL-210023","article-title":"Dubai and Barcelona as Smart Cities: Some Reflections on Data Protection Law and Privacy","volume":"51","author":"Eskhita","year":"2021","journal-title":"Environ. Policy Law"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Cui, Q., Chen, R., Wei, R., Hu, X., and Wang, G. (2023). Smart Mega-City Development in Practice: A Case of Shanghai, China. Sustainability, 15.","DOI":"10.3390\/su15021591"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"586","DOI":"10.3390\/smartcities6010027","article-title":"Privacy and Security Concerns in the Smart City","volume":"6","author":"Bogoni","year":"2023","journal-title":"Smart Cities"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Lepore, D., Testi, N., and Pasher, E. (2023). Building Inclusive Smart Cities through Innovation Intermediaries. Sustainability, 15.","DOI":"10.3390\/su15054024"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"100491","DOI":"10.1016\/j.ccs.2022.100491","article-title":"Public-private partnerships in smart cities: A critical survey and research agenda","volume":"32","author":"Quan","year":"2023","journal-title":"City Cult. Soc."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"8176","DOI":"10.1016\/j.egyr.2021.08.126","article-title":"A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments","volume":"7","author":"Li","year":"2021","journal-title":"Energy Rep."},{"key":"ref_28","unstructured":"Lambauer, D. (2023, June 27). Taking on the Challenge of Public Sector Cyber Security. Available online: https:\/\/www.nao.org.uk\/insights\/taking-on-the-challenge-of-public-sector-cyber-security\/."},{"key":"ref_29","unstructured":"Reed, J. (2023, June 27). Cyberattacks Rise Sharply Against Governments and Schools. Available online: https:\/\/securityintelligence.com\/news\/cyberattacks-rise-sharply-against-governments-schools\/."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Lippert, K.J., and Cloutier, R. (2021). Cyberspace: A Digital Ecosystem. Systems, 9.","DOI":"10.3390\/systems9030048"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1007\/s43253-021-00037-4","article-title":"The digital revolution and digitalized network society","volume":"2","author":"Knell","year":"2021","journal-title":"Rev. Evol. Polit. Econ."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Pereira, C.S., Dur\u00e3o, N., Moreira, F., and Veloso, B. (2022). The Importance of Digital Transformation in International Business. Sustainability, 14.","DOI":"10.3390\/su14020834"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1016\/j.ijresmar.2020.03.006","article-title":"Consumer privacy and the future of data-based innovation and marketing","volume":"37","author":"Bleier","year":"2020","journal-title":"Int. J. Res. Mark."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/s11948-017-9992-1","article-title":"Defining Information Secuirty","volume":"25","author":"Lundgren","year":"2019","journal-title":"Sci. Eng. Ethics"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1108\/XJM-08-2020-0096","article-title":"Information privacy concern at individual, group, organization and societal level\u2014A literature review","volume":"18","author":"Rath","year":"2021","journal-title":"Vilakshan-XIMB J. Manag."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Egoshin, N.S., Konev, A.A., and Shelupanov, A.A. (2023). Model of Threats to the Integrity and Availability of Information Processed in Cyberspace. Symmetry, 15.","DOI":"10.3390\/sym15020431"},{"key":"ref_37","first-page":"185","article-title":"Information Availability: An Insight into the Most Important Attribute of Information Security","volume":"7","author":"Qadir","year":"2016","journal-title":"J. Inf. Sec."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/s42979-021-00765-8","article-title":"Data Science and Analytics: An Overview from Data-Driven Smart Computing, Decision-Making and Applications Perspective","volume":"2","author":"Sarker","year":"2021","journal-title":"SN Comp. Sci."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.dsm.2021.02.002","article-title":"Data science: Connotation, methods, technologies, and development","volume":"1","author":"Xu","year":"2021","journal-title":"Data Sci. Manag."},{"key":"ref_40","first-page":"236","article-title":"Cloud Computing: Revolution of the Internet","volume":"2","author":"Hazim","year":"2014","journal-title":"Int. J. Eng. Res. Tech."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Brataas, G., Herbst, N., Ivansek, S., and Polutnik, J. (2017, January 17\u201321). Scalability Analysis of Cloud Software Services. Proceedings of the IEEE International Conference on Autonomic Computing (ICAC), Columbus, OH, USA.","DOI":"10.1109\/ICAC.2017.34"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1186\/s13677-017-0100-5","article-title":"A hybrid auto-scaling technique for clouds processing applications with service level agreements","volume":"6","author":"Biswas","year":"2017","journal-title":"J. Cloud Comp."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"103419","DOI":"10.1016\/j.jnca.2022.103419","article-title":"Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy","volume":"205","author":"Soni","year":"2022","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"012002","DOI":"10.1088\/1742-6596\/910\/1\/012002","article-title":"The Research of the Parallel Computing Development from the Angle of Cloud Computing","volume":"910","author":"Peng","year":"2017","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1917","DOI":"10.1007\/s12525-022-00609-0","article-title":"Smart cities and smart governance models for future cities","volume":"32","author":"Nastjuk","year":"2022","journal-title":"Electron. Mark."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/COMST.2017.2748998","article-title":"Privacy in the smart city\u2014Applications, technologies, challenges, and solutions","volume":"20","author":"Eckhoff","year":"2018","journal-title":"IEEE Comm. Surv. Tutor."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Demertzi, V., Demertzis, S., and Demertzis, K. (2023). An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities. Appl. Sci., 13.","DOI":"10.3390\/app13020790"},{"key":"ref_48","unstructured":"Wray, S. (2023, June 29). International Agencies Issue Smart City Cybersecurity Guide. Available online: https:\/\/cities-today.com\/international-agencies-issue-smart-city-cybersecurity-guide\/."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3389\/frai.2022.826737","article-title":"AI Technologies, Privacy, and Security","volume":"5","author":"Elliott","year":"2022","journal-title":"Front. Artif. Intell."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"e010435","DOI":"10.1136\/bmjgh-2022-010435","article-title":"Threats by artificial intelligence to human health and human existence","volume":"8","author":"Federspiel","year":"2023","journal-title":"BMJ Global Health"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1007\/s10796-022-10272-7","article-title":"Editorial: Special Issue on \u201cBright ICT: Security, Privacy and Risk Issues\u201d","volume":"24","author":"Ayaburi","year":"2022","journal-title":"Inf. Syst. Front."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"2286","DOI":"10.1177\/1071181312561481","article-title":"Augmenting the Technology Acceptance Model with Trust: Commercial Drivers\u2019 Attitudes towards Monitoring and Feedback","volume":"56","author":"Ghazizadeh","year":"2012","journal-title":"Proc. Hum. Factors Ergon. Soc. Annu. Meet."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1016\/j.ijhcs.2011.07.007","article-title":"Factors affecting perception of information security and their impacts on IT adoption and security practices","volume":"69","author":"Huang","year":"2011","journal-title":"Int. J. Hum. Comp. Stud."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1186\/s40410-018-0089-1","article-title":"Smart cities and security: Editorial preface","volume":"5","author":"Edwards","year":"2018","journal-title":"City Territ. Arch."},{"key":"ref_55","first-page":"888","article-title":"Conceptual Model of Privacy by Design","volume":"62","author":"Drev","year":"2022","journal-title":"J. Comp. Inf. Syst."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.clsr.2017.05.021","article-title":"The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise","volume":"34","author":"Romanou","year":"2018","journal-title":"Comp. Law Sec. Rev."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Kalinin, M., Krundyshev, V., and Zegzhda, P. (2021). Cybersecurity Risk Assessment in Smart City Infrastructures. Machines, 9.","DOI":"10.3390\/machines9040078"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1177\/2399808320907607","article-title":"Risk priorities and their co-occurrences in smart city project implementation: Evidence from India\u2019s Smart Cities Mission (SCM)","volume":"48","author":"Gupta","year":"2021","journal-title":"Env. Plann. Urban Analyt. City Sci."},{"key":"ref_59","first-page":"217","article-title":"Research on smart city data encryption and communication efficiency improvement under federated learning framework","volume":"24","author":"Kuang","year":"2023","journal-title":"Egypt. Inf. J."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Daoudagh, S., Marchetti, E., Savarino, V., Bernabe, J.B., Garcia-Rodr\u00edguez, J., Moreno, R.T., Martinez, J.A., and Skarmeta, A.F. (2021). Data Protection by Design in the Context of Smart Cities: A Consent and Access Control Proposal. Sensors, 21.","DOI":"10.3390\/s21217154"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"7001","DOI":"10.1109\/ACCESS.2017.2693380","article-title":"An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things","volume":"5","author":"Liu","year":"2017","journal-title":"IEEE Access"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"12083","DOI":"10.1109\/ACCESS.2020.3047996","article-title":"Secure Software-Defined Networking Communication Systems for Smart Cities: Current Status, Challenges, and Trends","volume":"9","author":"Rahouti","year":"2021","journal-title":"IEEE Access"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"e13113","DOI":"10.1111\/exsy.13113","article-title":"Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism","volume":"40","author":"Almagrabi","year":"2023","journal-title":"Expert Syst."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MNET.2019.1800240","article-title":"Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications","volume":"33","author":"Ometov","year":"2019","journal-title":"IEEE Netw."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"108234","DOI":"10.1016\/j.comnet.2021.108234","article-title":"Blockchain based secure smart city architecture using low resource IoTs","volume":"196","author":"Paul","year":"2021","journal-title":"Comp. Netw."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Gong, S., Tcydenova, E., Jo, J., Lee, Y., and Park, J.H. (2019). Blockchain-Based Secure Device Management Framework for an Internet of Things Network in a Smart City. Sustainability, 11.","DOI":"10.3390\/su11143889"},{"key":"ref_67","first-page":"200189","article-title":"Engineering the application of machine learning in an IDS based on IoT traffic flow","volume":"17","author":"Prazeres","year":"2023","journal-title":"Intell. Syst. Appl."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"101746","DOI":"10.1016\/j.giq.2022.101746","article-title":"Factors for collaboration amongst smart city stakeholders: A local government perspective","volume":"39","author":"Clement","year":"2022","journal-title":"Gov. Inf. Q."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1177\/2053951715617783","article-title":"Educating the smart city: Schooling smart citizens through computational urbanism","volume":"2","author":"Williamson","year":"2015","journal-title":"Big Data Soc."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1093\/humrep\/dev334","article-title":"Qualitative research methods: When to use them and how to judge them","volume":"31","author":"Hammarberg","year":"2016","journal-title":"Human Reprod."},{"key":"ref_71","first-page":"535","article-title":"Using Interpretive Qualitative Case Studies for Exploratory Research in Doctoral Studies: A Case of Information Systems Research in Small and Medium Enterprises","volume":"10","author":"Ponelis","year":"2015","journal-title":"Int. J. Dr. Stud."},{"key":"ref_72","unstructured":"European Commission (2023, June 26). CORDIS Is the Primary Source of Results from EU-Funded Projects Since 1990. Available online: https:\/\/cordis.europa.eu\/projects."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"13","DOI":"10.4314\/mmj.v27i1.4","article-title":"The Implication of Using NVivo Software in Qualitative Data Analysis: Evidence-Based Reflections","volume":"27","author":"Zamawe","year":"2015","journal-title":"Malawi Med. J."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Lupton, B., Zappe, M., Thom, J., Sengupta, S., and Feil-Seifer, D. (2022, January 26\u201329). Analysis and Prevention of Security Vulnerabilities in a Smart City. Proceedings of the IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC54503.2022.9720824"},{"key":"ref_75","first-page":"31","article-title":"Smart City Security Threats and Countermeasures in the Context of Emerging Technologies","volume":"6","author":"Telo","year":"2023","journal-title":"Int. J. Intell. Autom. Comp."},{"key":"ref_76","first-page":"100076","article-title":"Adoption of artificial intelligence in smart cities: A comprehensive review","volume":"2","author":"Herath","year":"2022","journal-title":"Int. J. Inform. Manag. Data Insights"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Hui, P. (2020, January 11\u201313). Construction of Information Security Risk Assessment Model in Smart City. Proceedings of the 2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS), Shenyang, China.","DOI":"10.1109\/TOCS50858.2020.9339614"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"1","DOI":"10.22161\/ijaers.810.1","article-title":"Smart City in Urban Innovation: Concept, Management, Policy and Technology","volume":"8","author":"Younus","year":"2021","journal-title":"Int. J. Adv. Eng. Res. Sci."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1080\/10811680.2023.2180266","article-title":"Applying the Purpose Limitation Principle in Smart-City Data-Processing Practices: A European Data Protection Law Perspective","volume":"28","author":"Faisal","year":"2023","journal-title":"Comm. Law Policy"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Burlacu, M., Boboc, R.G., and Butila, E.V. (2022). Smart Cities and Transportation: Reviewing the Scientific Character of the Theories. Sustainability, 14.","DOI":"10.3390\/su14138109"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"1389","DOI":"10.3390\/smartcities5040071","article-title":"Energy and Sustainable Development in Smart Cities: An Overview","volume":"5","author":"Almihat","year":"2022","journal-title":"Smart Cities"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1057\/s41288-022-00266-6","article-title":"Cyber risk and cybersecurity: A systematic review of data availability","volume":"47","author":"Cremer","year":"2022","journal-title":"Geneva Pap. Risk Insur. Issues Pract."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/s10796-020-10044-1","article-title":"Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework","volume":"24","author":"Ismagilova","year":"2022","journal-title":"Inf. Syst. Front."},{"key":"ref_84","first-page":"102717","article-title":"Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems","volume":"58","author":"Anthi","year":"2021","journal-title":"J. Inform. Sec. Applic."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"405","DOI":"10.31577\/cai_2022_2_405","article-title":"Smart Cities Security Threat Landscape: A Review","volume":"41","author":"Anwar","year":"2022","journal-title":"Comp. Inform."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1177\/2053951718802321","article-title":"Data in the smart city: How incongruent frames challenge the transition from ideal to practice","volume":"5","author":"Madsen","year":"2018","journal-title":"Big Data Soc."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3389\/frsc.2020.00005","article-title":"Multi-Stakeholder Innovation in Smart City Discourse: Quadruple Helix Thinking in the Age of \u201cPlatforms\u201d","volume":"2","author":"Borghys","year":"2020","journal-title":"Front. Sustain. Cities"},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1080\/02681102.2017.1353946","article-title":"Increasing collaboration and participation in smart city governance: A cross-case analysis of smart city initiatives","volume":"23","author":"Pereira","year":"2017","journal-title":"Inf. Technol. Develop."},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Ziosi, M., Hewitt, B., Juneja, P., Taddeo, M., and Floridi, L. (2022). Smart cities: Reviewing the debate about their ethical implications. AI Soc., in press.","DOI":"10.1007\/s00146-022-01558-0"},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s43762-021-00005-y","article-title":"Smart city based on digital twins","volume":"1","author":"Deren","year":"2021","journal-title":"Comput. Urban Sci."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Caprari, G., Castelli, G., Montuori, M., Camardelli, M., and Malvezzi, R. (2022). Digital Twin for Urban Planning in the Green Deal Era: A State of the Art and Future Perspectives. Sustainability, 14.","DOI":"10.3390\/su14106263"},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Cheng, R., Hou, L., and Xu, S. (2023). A Review of Digital Twin Applications in Civil and Infrastructure Emergency Management. Buildings, 13.","DOI":"10.3390\/buildings13051143"},{"key":"ref_93","unstructured":"Timperley, J. (2023, July 09). The Six Problems Aviation Must Fix to Hit Net Zero. Available online: https:\/\/www.theguardian.com\/environment\/2021\/sep\/05\/the-six-problems-aviation-must-fix-to-hit-net-zero."},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.trd.2016.02.004","article-title":"Are technology myths stalling aviation climate policy?","volume":"44","author":"Peeters","year":"2016","journal-title":"Transp. Res. Part D Transp. Environ."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1080\/01441647.2021.1938284","article-title":"Transition policies for climatically sustainable aviation","volume":"41","author":"Lyle","year":"2021","journal-title":"Transp. Rev."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1038\/s41893-022-01046-9","article-title":"Pathways to net-zero emissions from aviation","volume":"6","author":"Bergero","year":"2023","journal-title":"Nat. Sustain."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.1007\/s10207-022-00594-7","article-title":"Classifying resilience approaches for protecting smart grids against cyber threats","volume":"21","author":"Syrmakesis","year":"2022","journal-title":"Int. J. Inform. Sec."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.comnet.2015.02.013","article-title":"Minimizing data redundancy for high reliable cloud storage systems","volume":"81","author":"Huang","year":"2015","journal-title":"Comp. Netw."},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Kosmowski, K.T., Piesik, E., Piesik, J., and Sliwinski, M. (2022). Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management. Energies, 15.","DOI":"10.3390\/en15103610"},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Yazdinejad, A., Zolfaghari, B., Azmoodeh, A., Dehghantanha, A., Karimipour, H., Fraser, E., Green, A.G., Russell, C., and Duncan, E. (2021). A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures. Appl. Sci., 11.","DOI":"10.3390\/app11167518"},{"key":"ref_101","first-page":"221","article-title":"A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing","volume":"31","author":"Ting","year":"2022","journal-title":"J. Intell. Syst."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"100048","DOI":"10.1016\/j.array.2020.100048","article-title":"Security challenges to smart agriculture: Current state, key issues, and future directions","volume":"8","author":"Zanella","year":"2020","journal-title":"Array"},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Mahmood, O.A., Abdellah, A.R., Muthanna, A., and Koucheryavy, A. (2022). Distributed Edge Computing for Resource Allocation in Smart Cities Based on the IoT. Information, 13.","DOI":"10.3390\/info13070328"},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"286","DOI":"10.3390\/smartcities4010018","article-title":"Smart Cities and Big Data Analytics: A Data-Driven Decision-Making Use Case","volume":"4","author":"Osman","year":"2021","journal-title":"Smart Cities"},{"key":"ref_105","unstructured":"Aiyer, B., Caso, J., Russell, P., and Sorel, M. (2023, July 09). New Survey Reveals $2 Trillion Market Opportunity for Cybersecurity Technology and Service Providers. Available online: https:\/\/www.mckinsey.com\/capabilities\/risk-and-resilience\/our-insights\/cybersecurity\/new-survey-reveals-2-trillion-dollar-market-opportunity-for-cybersecurity-technology-and-service-providers."},{"key":"ref_106","unstructured":"Alspach, K. (2023, July 09). Thanks to the Economy, Cybersecurity Consolidation is Coming. CISOs Are More than Ready. Available online: https:\/\/www.protocol.com\/enterprise\/cybersecurity-startups-acquisitionss-tools."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/15\/9\/285\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:41:08Z","timestamp":1760128868000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/15\/9\/285"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,23]]},"references-count":106,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2023,9]]}},"alternative-id":["fi15090285"],"URL":"https:\/\/doi.org\/10.3390\/fi15090285","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,23]]}}}