Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Local Government Cybersecurity Analysis: From Policy Review to Policy Framework Formulation

Version 1 : Received: 9 May 2024 / Approved: 10 May 2024 / Online: 10 May 2024 (11:30:55 CEST)

How to cite: Hossain, S. T.; Yigitcanlar, T.; Nguyen, K.; Xu, Y. Local Government Cybersecurity Analysis: From Policy Review to Policy Framework Formulation. Preprints 2024, 2024050641. https://doi.org/10.20944/preprints202405.0641.v1 Hossain, S. T.; Yigitcanlar, T.; Nguyen, K.; Xu, Y. Local Government Cybersecurity Analysis: From Policy Review to Policy Framework Formulation. Preprints 2024, 2024050641. https://doi.org/10.20944/preprints202405.0641.v1

Abstract

Cybersecurity is a crucial concern for local governments, as they serve as the primary interface between public and government services, managing sensitive data and critical infrastructure. While technical safeguards are integral to cybersecurity, the role of well-structured policy is equally important, as it provides structured guidance to translate technical requirements into actionable protocols. This study reviews local governments’ cybersecurity policies to provide a comprehensive assessment of how these policies align with NIST CSF, which is a widely adopted and commonly used cybersecurity assessment framework. The review offers local governments a mirror to reflect on their cybersecurity stance, identifying potential vulnerabilities and areas needing urgent attention. The study further extends to developing a cybersecurity policy framework, which local governments can use as a strategic tool. It provides valuable information on crucial cybersecurity elements that local governments must incorporate into their policies to protect confidential data and critical infrastructure.

Keywords

cybersecurity; cyber-attacks; cybersecurity policy; local government; local council; municipality; smart city

Subject

Social Sciences, Government

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.