期刊文献+

智慧城市建设对城市信息安全的强化与冲击分析 被引量:31

Reinforcing and Weakening Influence of Smart City Construction on Information Security
原文传递
导出
摘要 智慧城市是实现城市可持续发展的一种途径。基于信息技术对城市空间组织及其功能的形塑,揭示智慧城市建设的分层次技术体系及其多元应用维度;剖析信息安全的演化历程与多重内涵,确定城市信息安全的多维构面;讨论智慧城市对信息基础设施、社会环境的优化及其对信息安全的强化效应;从城市信息基础设施的脆弱性等4个方面,指出智慧城市建设引发的对信息安全的潜在冲击;提出保障智慧城市信息安全的新策略。 Smart city acts as an practical approach to realize sustainable development of cities.Based on the formulation of information technology on urban space and its function,this paper defines the technological system and the six application fields of smart cities.Theoretically it clarifies the evolutionary background of information security and its multiple connotations,as well as the corresponding facets at the city level.Then it discusses the reinforcement on information infrastructure,social environment and information security brought forth by constructing smart city.The potential weakening effects of smart city construction on information security are pointed out from four aspects.In the final section,a new perspective to safeguard smart city information security is proposed.
作者 李勇
出处 《图书情报工作》 CSSCI 北大核心 2012年第6期20-24,共5页 Library and Information Service
关键词 智慧城市 信息安全 信息系统 smart city information security information system
  • 相关文献

参考文献19

  • 1Komninos N. Intelligent cities: Towards interactive and global innovation environments [ J ]. International Journal of Innovation and Regional Development, 2009, 1 (4) : 337 - 355.
  • 2王世伟,李勇,王义全,等编.智慧城市辞典[M].上海:上海社会科学院出版社,2011.
  • 3Rudolf G, Fertner C, Kramar H, et al. Smart cities-Ranking of European medium-sized cities [ R ]. Vienna University of Technology, 2007.
  • 4Tapia A, Maitland C, Stone M. Making IT work for municipalities : Building municipal wireless networks [ J ]. Govemment Information Quarterly, 2006, 23 (3): 359- 380.
  • 5Kirk P, Gary F, David A, et al. Information security by words alone: The case for strong security policies [ J ]. International Journal of Information Security and Privacy, 2009, 3 ( 2 ) : 84 - 89.
  • 6Hong K S, Chi Y, Chao L,et al. An integrated system theory of information security management [ J ]. Information Management & Computer Security, 2003, 11 (5) : 243 - 248.
  • 7Computer Science and Telecommunications Board. Cyber security today and tomorrow: Pay now or pay later [ R ]. USA, Washington DC: National Academy Press, 2002.
  • 8Chesla A. Information security : A defensive battle [ J ]. Information System Security, 2004, 12 (6) : 24 - 32.
  • 9Dreger H, Feldmann A, Paxson V, et al. Operational experiences with high-volume network intrusion detection [ C ]//Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering. Washington DC : ACM Press, 2004 : 2 - 11.
  • 10Abbas H, Hemani A. Addressing dynamic issues in information security management [ J]. Information Management & Computer Security, 2011, 19(1) : 5 -24.

共引文献4

同被引文献340

引证文献31

二级引证文献267

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部