Understanding Local Government Cybersecurity Policy: A Concept Map and Framework
Abstract
:1. Introduction and Background
- How effectively do the cybersecurity policy documents of LGs align with the functions and categories of the NIST CSF 2.0?
- What are the key components that should be included in a cybersecurity policy document by LGs to ensure its effectiveness and comprehensiveness?
2. The National Institute of Standards and Technology’s Cybersecurity Framework 2.0
3. Methodology
3.1. Policy Documents
3.2. Research Strategy
4. Results and Analysis
4.1. Quantitative Content Analysis
4.2. Qualitative Content Analysis
4.2.1. ‘Govern’, Focusing on Organizational Risk and Responsibility
“The aim... to ensure that the correct processes and procedures, roles and responsibilities are in place and followed for any council cyber threat or incident while we continue our normal business operations”.[31]
4.2.2. ‘Identify’, Focusing on Asset and Risk Management
“...must take an inventory of all approved hardware and software on City networks and systems; one inventory for hardware and one for software”.[33]
4.2.3. ‘Protect’, Focusing on Access Control, and Raising Awareness
“System administrator passwords will be terminated immediately if the employee who has access to such passwords is terminated, fired, investigated, or otherwise leaves employment”.[35]
4.2.4. ‘Detect’, Focusing on Continuous Monitoring
“All organization servers and workstations will utilize Microsoft Windows Defender with Windows Advanced Threat Protection (ATP) to protect systems from malware and viruses. Real-time scanning will be enabled on all systems and weekly malware scans will be performed”.[36]
4.2.5. ‘Respond’, Focusing on Incident Management
“... develop and implement appropriate activities to take action regarding a detected cybersecurity event, Response processes and procedures are executed and maintained, to ensure adequate response and recovery actions”.[37]
4.2.6. ‘Recover’, Focusing on Incident Recovery Plan Execution
“External communications should only be handled by designated individuals at the direction of the City Administrator. Recovery activities are communicated to internal stakeholders, executives, and management teams”.[38]
5. Findings and Discussion
5.1. Insights from Cybersecurity Policies of LGs
5.2. Key Contributing Factors to Existing Gaps in the Cybersecurity Policies
5.3. Cybersecurity Policy Framework for LGs
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- D’Amico, G.; L’Abbate, P.; Liao, W.; Yigitcanlar, T.; Ioppolo, G. Understanding sensor cities: Insights from technology giant company driven smart urbanism practices. Sensors 2020, 20, 4391. [Google Scholar] [CrossRef]
- Repette, P.; Sabatini-Marques, J.; Yigitcanlar, T.; Sell, D.; Costa, E. The evolution of city-as-a-platform: Smart urban development governance with collective knowledge-based platform urbanism. Land 2021, 10, 33. [Google Scholar] [CrossRef]
- Altoub, M.; AlQurashi, F.; Yigitcanlar, T.; Corchado, J.; Mehmood, R. An ontological knowledge base of poisoning attacks on deep neural networks. Appl. Sci. 2022, 12, 11053. [Google Scholar] [CrossRef]
- Micozzi, N.; Yigitcanlar, T. Understanding smart city policy: Insights from the strategy documents of 52 local governments. Sustainability 2022, 14, 10164. [Google Scholar] [CrossRef]
- Son, T.H.; Weedon, Z.; Yigitcanlar, T.; Sanchez, T.; Corchado, J.M.; Mehmood, R. Algorithmic urban planning for smart and sustainable development: Systematic review of the literature. Sustain. Cities Soc. 2023, 94, 104562. [Google Scholar] [CrossRef]
- Ahmadi-Assalemi, G.; Al-Khateeb, H.; Epiphaniou, G.; Maple, C. Cyber resilience and incident response in smart cities: A systematic literature review. Smart Cities 2020, 3, 894–927. [Google Scholar] [CrossRef]
- Toh, C.K. Security for smart cities. IET Smart Cities 2020, 2, 95–104. [Google Scholar] [CrossRef]
- Frandell, A.; Feeney, M. Cybersecurity threats in local government: A sociotechnical perspective. Am. Rev. Public Adm. 2022, 52, 558–572. [Google Scholar] [CrossRef]
- Chaudhuri, A.; Bozkus Kahyaoglu, S. Cybersecurity assurance in smart cities: A risk management perspective. EDPACS 2023, 67, 1–22. [Google Scholar] [CrossRef]
- Norris, D.F.; Mateczun, L.; Joshi, A.; Finin, T. Cyberattacks at the grass roots: American local governments and the need for high levels of cybersecurity. Public Adm. Rev. 2019, 79, 895–904. [Google Scholar] [CrossRef]
- Norris, D.F.; Mateczun, L.K. Cyberattacks on local governments 2020: Findings from a key informant survey. J. Cyber Policy 2022, 7, 294–317. [Google Scholar] [CrossRef]
- Garcia-Retuerta, D.; Chamoso, P.; Hernández, G.; Guzmán, A.; Yigitcanlar, T.; Corchado, J. An efficient management platform for developing smart cities: Solution for real-time and future crowd detection. Electronics 2021, 10, 765. [Google Scholar] [CrossRef]
- Ma, C. Smart city and cyber-security; technologies used, leading challenges and future recommendations. Energy Rep. 2021, 7, 7999–8012. [Google Scholar] [CrossRef]
- Tariq, N.; Khan, F.A.; Asim, M. Security challenges and requirements for smart internet of things applications: A comprehensive analysis. Procedia Comput. Sci. 2021, 191, 425–430. [Google Scholar] [CrossRef]
- Sharma, K.; Mukhopadhyay, A. Sarima-based cyber-risk assessment and mitigation model for a smart city’s traffic management systems (SCRAM). J. Organ. Comput. Electron. Commer. 2022, 32, 1–20. [Google Scholar] [CrossRef]
- Sarker, I.H.; Furhad, M.H.; Nowrozy, R. AI-driven cybersecurity: An overview, security intelligence modeling and research directions. SN Comput. Sci. 2021, 2, 173. [Google Scholar] [CrossRef]
- Savaş, S.; Karataş, S. Cyber governance studies in ensuring cybersecurity: An overview of cybersecurity governance. Int. Cybersecur. Law Rev. 2022, 3, 7–34. [Google Scholar] [CrossRef] [PubMed]
- Caruson, K.; MacManus, S.A.; McPhee, B.D. Cybersecurity policy-making at the local government level: An analysis of threats, preparedness, and bureaucratic roadblocks to success. J. Homel. Secur. Emerg. Manag. 2012, 9, 1–22. [Google Scholar] [CrossRef]
- Hatcher, W.; Meares, W.L.; Heslen, J. The cybersecurity of municipalities in the United States: An exploratory survey of policies and practices. J. Cyber Policy 2020, 5, 302–325. [Google Scholar] [CrossRef]
- Preis, B.; Susskind, L. Municipal cybersecurity: More work needs to be done. Urban Aff. Rev. 2022, 58, 614–629. [Google Scholar] [CrossRef]
- Norris, D.F.; Mateczun, L.; Joshi, A.; Finin, T. Cybersecurity at the grassroots: American local governments and the challenges of internet security. J. Homel. Secur. Emerg. Manag. 2018, 15, 20170048. [Google Scholar] [CrossRef]
- Morrissey, A.; Aslam, K.; Goodwin, B.; Vikas, R.; Langford-Smith, J. Cyber Security in Local Government. 2021. Available online: https://audit.wa.gov.au/reports-and-publications/reports/cyber-security-in-local-government/ (accessed on 2 December 2023).
- MacManus, S.A.; Caruson, K.; McPhee, B.D. Cybersecurity at the local government level: Balancing demands for transparency and privacy rights. J. Urban Aff. 2013, 35, 451–470. [Google Scholar] [CrossRef]
- Chaudhary, S.; Gkioulos, V.; Katsikas, S. A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises. Comput. Sci. Rev. 2023, 50, 100592. [Google Scholar] [CrossRef]
- NIST. NIST Cybersecurity Framework 2.0: Resource Overview Guide; National Institute of Standards and Technology, US Department of Commerce: Gaithersburg, MD, USA, 2024. [Google Scholar]
- Wolff, J.; Lehr, W. When cyber threats loom, what can state and local governments do? Georget. J. Int. Aff. 2018, 19, 67–75. [Google Scholar] [CrossRef]
- Taherdoost, H. Understanding cybersecurity frameworks and information security standards—A review and comprehensive overview. Electronics 2022, 11, 2181. [Google Scholar] [CrossRef]
- NIST. NIST Cybersecurity Framework (CSF) 2.0; National Institute of Standards and Technology, US Department of Commerce: Gaithersburg, MD, USA, 2024. [Google Scholar]
- NIST. The NIST Cybersecurity Framework 2.0—Initial Public Draft; National Institute of Standards and Technology, US Department of Commerce: Gaithersburg, MD, USA, 2023. [Google Scholar]
- Toussaint, M.; Krima, S.; Panetto, H. Industry 4.0 data security: A cybersecurity frameworks review. J. Ind. Inf. Integr. 2024, 39, 100604. [Google Scholar] [CrossRef]
- RBWM. Cyber security policy. Royal Borough Windsor Maidenhead, South East England, UK. 2020. Available online: https://www.rbwm.gov.uk/sites/default/files/2020-10/info_sec_cyber_security_policy.pdf (accessed on 4 December 2023).
- Öğüt, H.; Raghunathan, S.; Menon, N. Cyber security risk management: Public policy implications of correlated risk, imperfect ability to prove loss, and observability of self-protection. Risk Anal. 2011, 31, 497–512. [Google Scholar] [CrossRef] [PubMed]
- Beaverton. Cybersecurity Policy. City of Beaverton, Oregon, USA. 2021. Available online: https://content.civicplus.com/api/assets/fda4939f-c8e3-4228-85b8-87d31ae22c6d (accessed on 3 December 2023).
- Zhou, B.; Sun, B.; Zang, T.; Cai, Y.; Wu, J.; Luo, H. Security risk assessment approach for distribution network cyber physical systems considering cyber attack vulnerabilities. Entropy 2022, 25, 47. [Google Scholar] [CrossRef] [PubMed]
- Portland. A Resolution Authorizing the City of Portland to Enact a Critical Infrastructure Cyber Security Policy. City of Portland, Tennessee, USA. 2023. Available online: https://www.cityofportlandtn.gov/AgendaCenter/ViewFile/Item/865?fileID=2178 (accessed on 3 December 2023).
- Madras. Cybersecurity Policy. City of Madras, Oregon, USA. 2020. Available online: https://www.ci.madras.or.us/sites/default/files/fileattachments/city_council/page/98/g-council_policies-approved_4-27-2021.pdf (accessed on 2 December 2023).
- Norwich. Cybersecurity Policy. Town of Norwich, New York, USA. 2020. Available online: http://norwich.vt.us/wp-content/uploads/2020/03/SB-packet-03-25-20.pdf (accessed on 3 December 2023).
- Woodburn. Cybersecurity Policy and Procedures. Woodburn, Oregon, USA. 2021. Available online: https://www.woodburn-or.gov/sites/default/files/fileattachments/human_resources/page/13801/cybersecurity_policy.pdf (accessed on 2 December 2023).
- Verhulsdonck, G.; Weible, J.L.; Helser, S.; Hajduk, N. Smart cities, playable cities, and cybersecurity: A systematic review. Int. J. Hum.–Comput. Interact. 2023, 39, 378–390. [Google Scholar] [CrossRef]
- Yigitcanlar, T.; Li, R.Y.M.; Beeramoole, P.B.; Paz, A. Artificial intelligence in local government services: Public perceptions from Australia and Hong Kong. Gov. Inf. Q. 2023, 40, 101833. [Google Scholar] [CrossRef]
- Yigitcanlar, T.; Agdas, D.; Degirmenci, K. Artificial intelligence in local governments: Perceptions of city managers on prospects, constraints and choices. AI Soc. 2023, 38, 1135–1150. [Google Scholar] [CrossRef]
- Popescul, D.; Radu, L.D. Data security in smart cities: Challenges and solutions. Inform. Econ. 2016, 20, 29–38. [Google Scholar] [CrossRef]
- David, A.; Yigitcanlar, T.; Li, R.Y.M.; Corchado, J.M.; Cheong, P.H.; Mossberger, K.; Mehmood, R. Understanding local government digital technology adoption strategies: A PRISMA review. Sustainability 2023, 15, 9645. [Google Scholar] [CrossRef]
- Boyson, S. Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems. Technovation 2014, 34, 342–353. [Google Scholar] [CrossRef]
- Vitunskaite, M.; He, Y.; Brandstetter, T.; Janicke, H. Smart cities and cyber security: Are we there yet? A comparative study on the role of standards, third party risk management and security ownership. Comput. Secur. 2019, 83, 313–331. [Google Scholar] [CrossRef]
- Ali, O.; Shrestha, A.; Chatfield, A.; Murray, P. Assessing information security risks in the cloud: A case study of Australian local government authorities. Gov. Inf. Q. 2020, 37, 101419. [Google Scholar] [CrossRef]
- Sadik, S.; Ahmed, M.; Sikos, L.F.; Najmul Islam, A.K.M. Toward a sustainable cybersecurity ecosystem. Computers 2020, 9, 74. [Google Scholar] [CrossRef]
- Ullah, F.; Qayyum, S.; Thaheem, M.J.; Al-Turjman, F.; Sepasgozar, S.M.E. Risk management in sustainable smart cities governance: A TOE framework. Technol. Forecast. Soc. Chang. 2021, 167, 120743. [Google Scholar] [CrossRef]
- Kalinin, M.; Krundyshev, V.; Zegzhda, P. Cybersecurity risk assessment in smart city infrastructures. Machines 2021, 9, 78. [Google Scholar] [CrossRef]
- Fielder, A.; König, S.; Panaousis, E.; Schauer, S.; Rass, S. Risk assessment uncertainties in cybersecurity investments. Games 2018, 9, 34. [Google Scholar] [CrossRef]
- Goel, R.; Kumar, A.; Haddow, J. PRISM: A strategic decision framework for cybersecurity risk assessment. Inf. Comput. Secur. 2020, 28, 591–625. [Google Scholar] [CrossRef]
- Srinivas, J.; Das, A.K.; Kumar, N. Government regulations in cyber security: Framework, standards and recommendations. Future Gener. Comput. Syst. 2019, 92, 178–188. [Google Scholar] [CrossRef]
- Hamdani, S.W.A.; Abbas, H.; Janjua, A.R.; Shahid, W.B.; Amjad, M.F.; Malik, J.; Murtaza, M.H.; Atiquzzaman, M.; Khan, A.W. Cybersecurity standards in the context of operating system: Practical aspects, analysis, and comparisons. ACM Comput. Surv. 2021, 54, 57. [Google Scholar] [CrossRef]
- AlDaajeh, S.; Saleous, H.; Alrabaee, S.; Barka, E.; Breitinger, F.; Raymond Choo, K.-K. The role of national cybersecurity strategies on the improvement of cybersecurity education. Comput. Secur. 2022, 119, 102754. [Google Scholar] [CrossRef]
- Sun, N.; Zhang, J.; Rimba, P.; Gao, S.; Zhang, L.Y.; Xiang, Y. Data-diven cybersecurity incident prediction: A survey. IEEE Commun. Surv. Tutor. 2019, 21, 1744–1772. [Google Scholar] [CrossRef]
- Patterson, C.M.; Nurse, J.R.C.; Franqueira, V.N.L. Learning from cyber security incidents: A systematic review and future research agenda. Comput. Secur. 2023, 132, 103309. [Google Scholar] [CrossRef]
- Habibzadeh, H.; Nussbaum, B.H.; Anjomshoa, F.; Kantarci, B.; Soyata, T. A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustain. Cities Soc. 2019, 50, 101660. [Google Scholar] [CrossRef]
- Javed, A.R.; Shahzad, F.; Rehman, S.U.; Zikria, Y.B.; Razzak, I.; Jalil, Z.; Xu, G. Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects. Cities 2022, 129, 103794. [Google Scholar] [CrossRef]
- Nuñez, M.; Palmer, X.L.; Potter, L.; Aliac, C.J.; Velasco, L.C. ICT security tools and techniques among higher education institutions: A critical review. Int. J. Emerg. Technol. Learn. 2023, 18, 4–22. [Google Scholar] [CrossRef]
- Ibrahim, A.; Valli, C.; McAteer, I.; Chaudhry, J. A security review of local government using NIST CSF: A case study. J. Supercomput. 2018, 74, 5171–5186. [Google Scholar] [CrossRef]
- Möller, D.P.F. NIST cybersecurity framework and MITRE cybersecurity criteria. In Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices; Möller, D.P.F., Ed.; Springer Nature: Cham, Switzerland, 2023; pp. 231–271. [Google Scholar] [CrossRef]
- Syafrizal, M.; Selamat, S.; Zakaria, N. Analysis of sybersecurity standard and framework components. Int. J. Commun. Netw. Inf. Secur. 2020, 12, 417–432. [Google Scholar] [CrossRef]
- Grobler, M.; Gaire, R.; Nepal, S. User, usage and usability: Redefining human centric cyber security. Front. Big Data 2021, 4, 583723. [Google Scholar] [CrossRef] [PubMed]
- Norris, D.F.; Mateczun, L.; Joshi, A.; Finin, T. Managing cybersecurity at the grassroots: Evidence from the first nationwide survey of local government cybersecurity. J. Urban Aff. 2021, 43, 1173–1195. [Google Scholar] [CrossRef]
- Bauer, J.M.; van Eeten, M.J.G. Cybersecurity: Stakeholder incentives, externalities, and policy options. Telecommun. Policy 2009, 33, 706–719. [Google Scholar] [CrossRef]
- Li, L.; He, W.; Xu, L.; Ash, I.; Anwar, M.; Yuan, X. Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. Int. J. Inf. Manag. 2019, 45, 13–24. [Google Scholar] [CrossRef]
- Harknett, R.J.; Stever, J.A. The new policy world of cybersecurity. Public Adm. Rev. 2011, 71, 455–460. [Google Scholar] [CrossRef]
- Wu, Y.C.; Sun, R.; Wu, Y.J. Smart city development in Taiwan: From the perspective of the information security policy. Sustainability 2020, 12, 2916. [Google Scholar] [CrossRef]
- Ariffin, K.A.Z.; Ahmad, F.H. Indicators for maturity and readiness for digital forensic investigation in era of industrial revolution 4.0. Comput. Secur. 2021, 105, 102237. [Google Scholar] [CrossRef]
- Mishra, A.; Alzoubi, Y.I.; Anwar, M.J.; Gill, A.Q. Attributes impacting cybersecurity policy development: An evidence from seven nations. Comput. Secur. 2022, 120, 102820. [Google Scholar] [CrossRef]
- Baz, M.; Alhakami, H.; Agrawal, A.; Baz, A.; Khan, R.A. Impact of COVID-19 pandemic: A cybersecurity perspective. Intell. Autom. Soft Comput. 2021, 27. [Google Scholar] [CrossRef]
- Lallie, H.S.; Shepherd, L.A.; Nurse, J.R.C.; Erola, A.; Epiphaniou, G.; Maple, C.; Bellekens, X. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 2021, 105, 102248. [Google Scholar] [CrossRef] [PubMed]
- Alawida, M.; Omolara, A.E.; Abiodun, O.I.; Al-Rajab, M. A deeper look into cybersecurity issues in the wake of Covid-19: A survey. J. King Saud Univ. Comput. Inf. Sci. 2022, 34, 8176–8206. [Google Scholar] [CrossRef] [PubMed]
- Williams, C.M.; Chaturvedi, R.; Chakravarthy, K. Cybersecurity risks in a pandemic. J. Med. Internet Res. 2020, 22, e23692. [Google Scholar] [CrossRef] [PubMed]
- Tasheva, I. Cybersecurity post-COVID-19: Lessons learned and policy recommendations. Eur. View 2021, 20, 140–149. [Google Scholar] [CrossRef]
- Arulkumar, V.; Latha, C.P.; Dasig, D. Concept of implementing big data in smart city: Applications, services, data security in accordance with internet of things and AI. Int. J. Recent Technol. Eng. 2019, 8, 6819–6825. [Google Scholar] [CrossRef]
- De Sousa, R.; Carvalho, P.D. An Osint Approach to Automated Asset Discovery and Monitoring. Master’s Thesis, University of Porto, Porto, Portugal, 2019. [Google Scholar]
- Daskevics, A.; Nikiforova, A. IoTSE-based open database vulnerability inspection in three Baltic countries: ShoBEVODSDT sees you. In Proceedings of the 2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Gandia, Spain, 6–9 December 2021. [Google Scholar]
- Ramadhan, R.A.; Aresta, R.M.; Hariyadi, D. Sudomy: Information gathering tools for subdomain enumeration and analysis. IOP Conf. Ser. Mater. Sci. Eng. 2020, 771, 12019. [Google Scholar] [CrossRef]
- Genge, B.; Călin, E. Shovat: Shodan-based vulnerability assessment tool for internet-facing services. Secur. Comm. Netw. 2016, 9, 2696–2714. [Google Scholar] [CrossRef]
- Dahle, T. Large scale Vulnerability Scanning: Development of a Large-Scale Web Scanner for Detecting Vulnerabilities. Master's Thesis, University of Oslo, Oslo, Norway, 2020. [Google Scholar]
- Yigitcanlar, T.; Senadheera, S.; Marasinghe, R.; Bibri, S.; Sanchez, T.; Cugurullo, F.; Sieber, R. Artificial intelligence and the local government: A five-decade scientometric analysis on the evolution, state-of-the-art, and emerging trends. Cities 2024, 152, 105151. [Google Scholar] [CrossRef]
Function | Category | Description |
---|---|---|
Govern | Organizational Context | Organization’s mission, goal, stakeholder expectations, legal requirements. |
Risk Management Strategy | Priorities, constraints, risk appetite and tolerance statements, and assumptions of the organization are established, disseminated, and utilized to support operational risk decisions. | |
Roles, Responsibilities, and Authorities | Establishment and communication of cybersecurity roles, responsibilities, and authorities to promote accountability. | |
Policy | Cybersecurity policy is established, communicated, and enforced. | |
Oversight | The outcomes and performance of risk management activities are utilized to inform, enhance, and modify the risk management strategy. | |
Cybersecurity Supply Chain Risk Management | Supply chain risk management processes are identified, established, managed, monitored, and improved. | |
Identify | Asset Management | Management of assets, including personnel, facilities, services, data, hardware, software, and systems. |
Risk Assessment | Understanding the risk to the organization, its assets, and involved individuals. | |
Improvement | Necessary improvement to organizational cybersecurity risk management processes, procedures, and activities. | |
Protect | Identity Management, Authentication, and Access Control | Restricting access to assets to only authorized users, services, and hardware. |
Awareness and Training | Training staff about cybersecurity-related activities and raising awareness. | |
Data Security | Management of data to be consistent with the organization’s risk strategy. | |
Platform Security | Management of hardware, software, systems, applications, and services of physical and virtual platforms to be consistent with the organization’s risk strategy. | |
Technology Infrastructure Resilience | Management of security architecture in accordance with the organization’s risk strategy. | |
Detect | Continuous Monitoring | Monitoring assets to detect anomalies, adverse events, and potential breaches. |
Adverse Event Analysis | Events are analyzed to characterize and learn about them for future detection. | |
Respond | Incident Management | Managing incidents through a response mechanism. |
Incident Analysis | Supporting forensics and recovery efforts and ensuring an effective response. | |
Incident Response Reporting and Communication | Coordinating response activities with internal and external stakeholders. | |
Incident Mitigation | Preventing the escalation of an incident and alleviating its consequences. | |
Recover | Incident Recovery Plan Execution | Ensuring operational availability of systems and services. |
Incident Recovery Communication | Coordination of restoration activities involving both internal and external stakeholders. |
LG | Location | LG Status | Population | Policy Adoption/Last Update Year | ||||
---|---|---|---|---|---|---|---|---|
Country Capital | State | State Capital | Metropolitan | Rural Area | 2021 | |||
Central Highlands Council | Australia | ✓ | 2144 | Not Mentioned | ||||
Murray River Council | ✓ | 11,456 | 2022 | |||||
Sutherland Shire Council | ✓ | 218,464 | 2023 | |||||
Bayswater | ✓ | 69,283 | 2021 | |||||
Western Australia | ✓ | 2,660,026 | 2022 | |||||
New South Wales | ✓ | 8,072,163 | 2022 | |||||
Tasmania | ✓ | 557,571 | 2023 | |||||
Murrumbidgee Council | ✓ | 4000 | 2021 | |||||
Rous County Council | ✓ | 100,000 | 2019 | |||||
King Island Council | ✓ | 1617 | 2022 | |||||
Copper Coast Council | ✓ | 15,050 | 2022 | |||||
Balranald Shire Council | ✓ | 2208 | 2023 | |||||
Vancouver | Canada | ✓ | 662,248 | 2022 | ||||
Greenview | ✓ | 8584 | 2016 | |||||
London | England | ✓ | ✓ | 9,748,033 | 2023 | |||
Enfield | ✓ | 330,000 | 2021 | |||||
Northwest Leicestershire District Council | ✓ | 104,705 | 2020 | |||||
Crediton Town | ✓ | 21,990 | 2020 | |||||
Royal Borough Windsor and Maidenhead | ✓ | 154,738 | 2021 | |||||
Saughall and Shotwick Park Parish Council | ✓ | 3094 | 2022 | |||||
Aylesford Parish Council | ✓ | 11,671 | 2022 | |||||
Telangana | India | ✓ | 38,157,311 | 2021 | ||||
Odisha | ✓ | 47,099,270 | 2022 | |||||
Jammu and Kashmir | ✓ | 14,999,397 | 2020 | |||||
Tamil Nadu | ✓ | 83,697,770 | 2020 | |||||
Assam | ✓ | 35,713,000 | 2018 | |||||
Tripura | ✓ | 4,184,959 | ||||||
Woodburn City Council | USA | ✓ | 26,243 | 2019 | ||||
City and County of San Francisco | ✓ | 670,625 | 2021 | |||||
New York | ✓ | 7,613,466 | 2020 | |||||
Village of Pleasantville | ✓ | 7305 | 2021 | |||||
Beaverton | ✓ | 100,559 | 2022 | |||||
Albuquerque | ✓ | 556,496 | 2023 | |||||
Portland | ✓ | 13,701 | 2020 | |||||
Scappoose | ✓ | 8191 | 2020 | |||||
City of Madras | ✓ | 8200 | 2020 | |||||
Town of Norwich | ✓ | 6476 | 2021 | |||||
City of Lebanon | ✓ | 48,629 | 2022 |
Code and Document Frequency | Sub-Code | Documents with Sub-Code | Frequency of Sub-Code | Total Frequency for Sub-Codes |
---|---|---|---|---|
Govern = 37 | Organizational Context | 27 | 71 | 220 |
Risk Management Strategy | 22 | 37 | ||
Roles, Responsibilities, and Authorities | 27 | 76 | ||
Policy | 21 | 31 | ||
Oversight | 0 | 0 | ||
Cybersecurity Supply Chain Risk Management | 4 | 5 | ||
Identify = 29 | Asset Management | 25 | 42 | 71 |
Risk Assessment | 14 | 18 | ||
Improvement | 9 | 11 | ||
Protect = 32 | Identity Management, Authentication, and Access Control | 29 | 77 | 222 |
Awareness and Training | 24 | 40 | ||
Data Security | 18 | 51 | ||
Platform Security | 15 | 43 | ||
Technology Infrastructure Resilience | 5 | 11 | ||
Detect = 19 | Continuous Monitoring | 19 | 23 | 34 |
Adverse Event Analysis | 7 | 11 | ||
Respond = 30 | Incident Management | 27 | 44 | 64 |
Incident Analysis | 2 | 2 | ||
Incident Response Reporting and Communication | 9 | 13 | ||
Incident Mitigation | 5 | 5 | ||
Recover = 16 | Incident Recovery Plan Execution | 16 | 20 | 22 |
Incident Recovery Communication | 2 | 2 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hossain, S.T.; Yigitcanlar, T.; Nguyen, K.; Xu, Y. Understanding Local Government Cybersecurity Policy: A Concept Map and Framework. Information 2024, 15, 342. https://doi.org/10.3390/info15060342
Hossain ST, Yigitcanlar T, Nguyen K, Xu Y. Understanding Local Government Cybersecurity Policy: A Concept Map and Framework. Information. 2024; 15(6):342. https://doi.org/10.3390/info15060342
Chicago/Turabian StyleHossain, Sk Tahsin, Tan Yigitcanlar, Kien Nguyen, and Yue Xu. 2024. "Understanding Local Government Cybersecurity Policy: A Concept Map and Framework" Information 15, no. 6: 342. https://doi.org/10.3390/info15060342
APA StyleHossain, S. T., Yigitcanlar, T., Nguyen, K., & Xu, Y. (2024). Understanding Local Government Cybersecurity Policy: A Concept Map and Framework. Information, 15(6), 342. https://doi.org/10.3390/info15060342