This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
Smart city breaks the traditional urban barriers and obstacles through the intersection and integration of new generation information technologies [1] and is a new urban form that comprehensively improves the modernization, refinement, and science of urban governance [2–6], which provides the first exploration of ideas for future sustainable urban development [7, 8]. Currently, many countries such as the United States, the European Union, and South Korea have put forward strategic initiatives for smart cities [9–11], and their core cities have actively responded to the government’s call to join the team to explore the practice of smart city construction. China is not different.
Along with the deepening of smart city construction, the practice of smart cities is increasingly relying on a series of new information technologies such as Internet of Things and cloud computing to achieve and present an irreversible trend. While this trend continues to facilitate people’s lives, it also puts the whole urban center in high danger [5], and the information security issue is the most sensitive and vulnerable part of it [12]. According to the “2021 Global Risk Report” released by the World Economic Forum, information security is still one of the major risks of concern, and the percentage of occurrence is increasing year by year. Since 2019 until now, the intervention of many smart city-related technologies has effectively improved the efficiency of epidemic prevention and control but also exacerbated the information security risks due to the COVID-19 virus [13]. Information security is a solid foundation and important guarantee for smart city construction and plays a vital role in social stability and even national security [14]. Although smart cities are public in nature, they are highly dependent on and integrated with enterprises. Therefore, the information security behavior of enterprises is considered as one of the important factors affecting the information security of smart cities [15, 16]. But the pursuit of profit maximization characteristic of enterprises makes them have the tendency of opportunistic behavior when choosing to strengthen information security management decisions [17], which needs to be guided and regulated by the government. Therefore, handling the conflict and cooperation between the government and the enterprise is the key to guaranteeing the information security of smart cities now.
In recent years, scholars have conducted a lot of research on enterprise information security behavior and government supervision strategy, and the related research mainly includes two aspects: first, the causes of enterprise information security and the influence of government supervision on enterprise information security behavior; second, the use of evolutionary game theory to analyze the relationship between government supervision and enterprise behavior. In terms of the causes of enterprise information security and the impact of government supervision on enterprise information security practices, Malatj et al. [18] and Quinn [19] introduced that most information security problems are caused by human actions or errors within the enterprise. Sengan et al. [20] mentioned that some vendors usually do not evaluate the cybersecurity of software and hardware manufactured for smart cities in order to save costs. Kai et al. [21] elaborated that there are characteristics such as concealment and complexity of information security in smart cities, these characteristics tend to cause information asymmetry, and enterprises can gain illegal profits by taking advantage of their information. Due to the information asymmetry between enterprises and the public and the opportunistic behavior of enterprises, information security supervision is considered to be an effective intervention strategy. The government can set scientific and reasonable reward and punishment policies to intervene and manage the information security behavior of enterprises and prompt them to choose to strengthen information security management strategies. For example, Luning [22] suggested that a possible incentive model in information security supervision is to discipline the subject for improper use of power, to use both encouragement and discipline for responsibility implementation, and to encourage the initiative of obligation implementation. Nepal et al. [23] proposed the possibility of including cybersecurity in the benchmarking analysis within the incentive supervision framework. Can et al. [24] pointed out that the external incentives of legal liability can be used to promote the active legal responsibility of information holders, controllers, and regulators. Herath et al. [25] developed a theoretical model of the incentive effects of punishment, and the severity of punishment was found to have a negative effect on safety behavioral intentions. Yang [26] suggested that a combination of mandatory and incentive regulation can be used to achieve effective supervision of the risk of personal biometric information application.
In terms of using evolutionary game theory to analyze the relationship between government supervision and enterprise behavior, evolutionary game theory [27,28] takes a finite rational game as the analytical framework, and the two sides of the game achieve dynamic equilibrium through the process of continuous learning and adaptation, which makes up for the defects of traditional game theory such as assuming that the participants are perfectly rational and have complete information. In the process of evolutionary game, individuals often dynamically adjust their own strategies based on observing and learning other individuals’ strategies. Evolutionary game theory has now been widely used in various types of supervision, such as environmental protection [29], drug quality [30], and information disclosure [31]. Many scholars have extended the game subjects to three or even four parties or optimized the game model by adding governmental reward and punishment mechanisms [32–35]. However, relatively few studies have been conducted on information security supervision using evolutionary game theory, especially in the context of smart cities. Min et al. [36] constructed an evolutionary game model for two groups of overcollecting APPs and the government and concluded that increasing the intensity of punishment by the government could effectively reduce the probability of passive personal data leakage. Xinchi et al. [37] constructed an evolutionary game model of platforms, users, and government and concluded that increasing the penalty for leaking users’ private information on platforms is the best strategy to enhance the willingness of platforms to protect users’ private information. Kai et al. [38] constructed an evolutionary game model with the smart city operator and the information security regulator as the main players and analyzed the evolutionary stabilization strategies of each game player under six scenarios from the perspective of costs and benefits.
In summary, scholars in various countries have used different theories and based on different models or data to study government policies on enterprise information security behavior. Although this has some reference value, there are still shortcomings: (1) Scholars explain the feasibility of implementing governmental reward and punishment mechanisms in information security supervision. However, from the perspective of research methodology, studies are mostly qualitative and rarely use scientific tools and models to objectively describe and quantitatively prove supervisory issues. In addition, there is less research on the information security behavior of individuals or enterprises and the confrontation, dependency, and constraint relationship between government and enterprises under smart cities. (2) When using evolutionary game theory to explore the issue of information security supervision, some scholars have considered the influence of reward and punishment mechanisms on enterprise information security behavior, but the conclusions seem to differ in terms of implementation effects. Existing studies have more quantification of punishments and less quantification of rewards involved in government interventions. The assumed rewards and punishments are usually static. In fact, government rewards and punishments are not fixed, so it is difficult to reflect the dynamic nature of government reward and punishment mechanisms. The main contributions of this paper are as follows: (1) Using evolutionary game theory, we analyze the impact of different reward and punishment mechanisms on the information security behavior decisions of smart city enterprises. (2) Using case data from China, we compare the evolutionary results of the system under different reward and punishment mechanisms, combining the simulation results to provide theoretical reference and practical guidance for the government to make regulatory decisions.
The rest of the paper is structured as follows: Section 2 constructs an evolutionary game model of local government and enterprise under the static reward and punishment mechanism and the payoff matrix of both parties. Section 3 discusses the evolutionary stabilization strategies of local government and enterprise under the dynamic reward and static punishment, static reward and dynamic punishment, and dynamic reward and dynamic punishment mechanisms. Section 4 presents a numerical study to test the theoretical results and reveal the mechanism of the parameters’ influence on the game process. Finally, Section 5 presents the main conclusions, research limitations, and future research directions.
2. Evolutionary Game Model
2.1. Problem Description and Underlying Assumptions
Information security supervision of smart cities refers to the fact that, in order to cope with the information security problems of smart cities, local governments set up corresponding supervisory agencies to restrict and regulate the information security behaviors of enterprises involved in the construction of smart cities. Therefore, local governments and smart city enterprises are the two main subjects of information security regulation of smart cities, and the discussion of supervisory issues focuses more on these two subjects. For example, in the cybersecurity strategy developed in Singapore, the need to strengthen and expand the regulatory authority of the National Cyber Incident Response Team and the National Cyber Security Centre in smart scenarios was emphasized [39]. The United States constructed a cyber information security sector coordination mechanism to achieve effective regulation of cyber geographic information security, with specific tasks shared by information security-related committees, offices, and administrative agencies at all levels [40]. Like other countries, the Chinese government has established information security supervisory departments such as communication management departments, computer virus prevention and control centers, network security emergency response centers, and disaster recovery centers for critical network systems (usually authorized by government departments to act as government regulators, hereinafter referred to as local governments).
For the local government, the all-round and multidisciplinary supervision is difficult and costly, and it is very easy to have the situation of slack supervision. For the enterprise, the growth in the number of information security incidents and the serious consequences that follow prompted its operational investment had to be raised, but considering the factors of their own operating costs and local government efforts, there will be bad operational speculation, that is, not to strengthen information security management. Therefore, there is an obvious game relationship between the supervision strength of the local government and the degree of operational input of the enterprise, with the former managing and making decisions on the information security of smart cities through supervision and reward and punishment measures and the latter paying more attention to the economic benefits they can obtain in the construction of smart city. Based on the limited rationality of both parties, for the action strategy related to specific information security events, the set of strategies adopted by the local government is {Supervise
Assumption 1.
The probability that the local government chooses the “Supervise
Assumption 2.
When the local government chooses Supervise and the enterprise chooses Manage, the cost of regulation invested by the local government to prevent information security incidents is
Assumption 3.
From the previous analysis, it is clear that the public, as the ultimate benefit subject of smart city, can hardly identify whether the enterprise chooses to manage or not due to the information asymmetry factor and can only rely on the information disclosure of the local government or the information disclosure of the enterprise itself to judge [42]. Therefore, regardless of whether enterprises choose to manage or choose not to manage, the public can only assess the benefits based on their feelings after using smart city services, so the enterprise’s benefits are all
Assumption 4.
When the local government chooses Supervise and the enterprise chooses Nonmanaged, the local government takes a penalty measure against the enterprise [43]. Assume that the amount of punishment is f. The probability of an information security event at this time is
Assumption 5.
When the local government chooses Unsupervised and the enterprise chooses Manage, local governments will not implement incentives for enterprise.
Assumption 6.
When the local government chooses Unsupervised and the enterprise chooses Nonmanaged, the local government will not implement punitive measures on the enterprise. At this time, information security incidents will cause social losses [20]. Due to the local government’s inaction, it needs to additionally bear the social loss caused by the information security event
The parameters are described as shown in Table 1.
The matrix of benefits for the local government and enterprise is shown in Table 2.
Table 1
Parameter definition.
Parameters | Description |
Strategy options for local government and enterprise. | |
Supervision costs invested by the local government to prevent information security incidents, for example, technology costs and human and material costs. | |
Operational costs invested by the enterprise to prevent information security incidents, for example, technology costs and management costs. | |
Operating reward from local government when the enterprise chooses Manage, for example, subsidies and tax incentives. | |
Punishment given by the local government when the enterprise chooses Nonmanage, for example, fines and suspension of operations. | |
Local government needs to bear losses when they choose Unsupervised, for example, losses from remediation of information security incidents. | |
Losses to be borne when the enterprise chooses Nonmanaged, for example, compensation losses and loss of reputation. | |
Social losses to be borne by the local government, for example, loss of credibility and compensation for property damage. | |
Benefits to local government, for example, reputation enhancement and innovation performance. | |
Revenue obtained by the enterprise, for example, product service revenue. | |
The probability of an information security incident when the local government chooses Supervise and the enterprise chooses Nonmanaged. | |
The probability of information security incidents when the local government chooses Unsupervised and the enterprise chooses Nonmanaged. |
Table 2
Game payment matrix between local government and enterprise.
Enterprise | |||
Manage | Nonmanaged | ||
Local government | Supervise | ||
Unsupervised |
2.2. Replication Dynamic Equation
The expected payoff
The expected payoff
Thus, the local government’s average expected payoff is
The replication dynamic equation of the local government can be further expressed as follows:
Let
Similarly, the replication dynamic equation of the enterprise can be further expressed as follows:
Let
The replicated dynamic equation system consisting of the above local government and enterprise is denoted as system 1. If the reward and punishment mechanism of local government is to be effective, the total benefit of enterprise adopting the strategy of “Manage
From the above replication dynamic equation, we can get five equilibrium points, namely, (0,0), (0,1), (1,1), (1,0), and
2.3. Stability Analysis
According to the method proposed by Friedman [30], the Jacobian matrix can be used to analyze the stability of each equilibrium point. If there exists an equilibrium point that satisfies both its corresponding determinant
The Jacobian matrix of the game system in this paper is as follows:
The stability analysis of each equilibrium point is performed under precondition (1). The
Table 3
Results of stability analysis of system 1.
Equilibrium point | Sign | Sign | ||
(0,0) | ± | — | ||
(0,1) | ± | — | ||
(1,0) | ± | — | ||
(1,1) | ± | — | ||
0 | 0 | + | + |
It can be seen that all equilibrium points do not have stability, where the characteristic roots of the point
(a) When
(b) When
[figure(s) omitted; refer to PDF]
3. Dynamic Reward and Punishment Mechanism
Since there is no ESS in the evolutionary system under the static reward and punishment mechanism, there is no stable equilibrium point that makes the enterprise choose the “Manage
3.1. Dynamic Reward and Static Punishment
Assume that the reward strength of the local government is linearly related to the strategy choice of the enterprise; that is,
The above replicated dynamic equation set forms system 2. We can get five equilibrium points, namely, (0,0), (0,1), (1,1), (1,0), and
The precondition for the effectiveness of the reward and punishment mechanism is as follows:
The stability analysis of each equilibrium point is performed under precondition (2). The
3.2. Static Reward and Dynamic Punishment
Assume that the punishment strength of the local government is linearly related to the strategy choice of the enterprise; that is,
In system 3, the
3.3. Dynamic Reward and Dynamic Punishment
Assume that the reward strength and the punishment strength of the local government are linearly related to the strategy choice of the enterprise, that is:
In system 4, the
4. Numerical Simulations
Based on the current stage of development and statistical data of Chinese smart cities, we propose a numerical study to simulate the behaviors of game subjects under different mechanisms, respectively, which can be theoretically applied to the problem of information security supervision in the construction of global smart cities.
4.1. Setting Initial Values
The application of the proposed evolutionary game model is demonstrated by taking the development of smart cities in China as an example. The initial input parameter data of the model are mainly obtained from industry analysis reports, national standards, and government websites of the central government and provinces and cities.
In recent years, with the accelerated development of a new generation of information technology, smart cities are developing rapidly in China. According to the Baidu City Brain White Paper, a total of 749 “smart city” pilot projects will be launched in China in 2021, and local governments at all levels have issued a total of 424 policy documents under the guidance of the central government to promote and regulate the construction of smart cities. By analyzing the text of 424 policy documents, we found that there were 162 policy documents that explicitly mentioned information security regulation and management rules, so we chose 0.4 as the initial value of
According to the 2021 Ernst & Young Global Information Security Survey released by Ernst & Young [45], about three-quarters of Chinese enterprises surveyed were unsure whether their cybersecurity defenses were adequate to deal with hackers’ attacks, causing about one trillion yuan in losses. According to the “Research Report on the Information Security Status of Chinese Internet Users in 2021,” the total amount of personal losses caused by information security incidents is about 20 billion yuan. According to the statistics of the weekly report on information security incidents released by the China National Internet Emergency Response Centre, there were about 120,000 information security incidents in the year 2021. According to “the 2019–2025 China Smart City Market Deep Panoramic Survey and 13th Five-Year Development Trend Forecast Report” statistics released by the China Research Institute of Industry, the number of enterprises in the smart city industry is expected to reach about 1,500 in 2021. In summary, we choose 0.25 as the initial value of
According to data from China and provincial, municipal, and district government procurement networks, nearly 4,300 bids were awarded for various types of smart cities in 2021, with a total award amount of about 108.5 billion yuan and an average investment of about 2.5 million yuan per project. In 2021, the Ministry of Industry and Information Technology issued the “Three-Year Action Plan for the High-Quality Development of Network Security Industry (2021–2023),” which shows that the investment in network security in telecommunications and other key industries accounts for 10% of the investment in information technology, while the “Information Security Technology Information Security Assurance Guide for Smart City Construction” clearly stipulates that the investment in information security should account for 8%–15% of the total project investment. Therefore, we set the management cost that enterprises need to invest when strengthening management to 6.
China’s central government has a subsidy policy for enterprises involved in smart city operations, which is implemented by all local government. For example, Hefei City promulgated “Hefei City to promote the high-quality economic development of a number of policies.” “For the development of smart city application scene innovation project investment of 3 million yuan and above, a one-time subsidy of up to 1 million yuan will be given on the basis of 10% of the investment amount on a merit basis.” Wuhan City proposed “the main body of the shortlisted smart city project construction, according to its actual investment of 30% to give a maximum of 2 million yuan of financial support.” The comprehensive policy of each city shows that the degree of subsidy varies from 10% to 30%. Combined with the specific requirements of the information security input ratio, we set the reward given by the local government to enterprises when strengthening management at 2.
For smart city information security punishment, according to China’s information security-related laws, “for organizations that do not fulfill their obligations to protect network security and refuse to correct or cause harm to network security and other consequences, they will be given a fine of more than five thousand to one million yuan.” Based on the bad information security practices against Tianxia Smart City Technology Co. in December 2021, a total penalty of 1 million yuan was imposed. This is consistent with the punishment standard set by law, and we set the punishment that enterprises receive when they do not strengthen management at 10.
Since the replication dynamic equations do not involve the returns of local governments and enterprises, they are not assigned here. Other values are set according to the model constraints, as shown in Table 4.
Table 4
Initial values of the simulation.
Parameter | |||||||||||
Value | 0.25 | 0.4 | 5 million | 6 million | 8 million | 50 million | 2 million | 2 million | 10 million | 0.1 | 0.9 |
Unit |
4.2. Simulation Results and Discussion
MATLAB R2019a software was used for evolutionary game model simulation. Three scenarios were constructed to investigate how enterprises respond to different government policies. Scenario 1 evaluates the behavioral strategy changes of game players under static reward and punishment mechanisms. Scenario 2 compares the strategies chosen by players under three dynamic mechanisms. Scenario 3 analyzes the impact of changes in the upper bounds of each parameter on the game subjects under the optimal reward and punishment mechanism.
4.2.1. Player Behavior of Evolutionary Games under Static Mechanisms
Figure 4(a) shows the change in the behavioral strategy of the enterprise under the static reward and punishment mechanism with different initial values of the local government. In this figure, the initial value of the local government is
[figure(s) omitted; refer to PDF]
4.2.2. Player Behavior of Evolutionary Games under Dynamic Mechanisms
Figure 6 shows the evolutionary paths of local government and enterprise under dynamic reward and static punishment mechanisms. Figure 7 shows a comparison of the evolutionary paths of local government and enterprise under static reward and dynamic punishment and dynamic reward and dynamic punishment mechanisms. The initial value for the local government is still 0.4, and the initial value for the enterprise is still 0.25. From Figure 6, it is easy to see that the evolution of system 2 is a closed curve from the point (0.4,0.25), and there is no equilibrium point. From Figure 7, it can be seen that there are stabilization points for both system 3 and system 4. Both verify the conclusions of the previous analysis. The probability of local government adopting the Supervise strategy and enterprise adopting the Manage strategy is higher, so the evolutionary equilibrium point of game subjects in system 4 is better. Therefore, dynamic reward and dynamic punishment is the optimal reward and punishment mechanism, followed by static reward and dynamic punishment, followed by dynamic reward and static punishment, and finally followed by static reward and static punishment.
[figure(s) omitted; refer to PDF]
Next, the paper will continue to discuss the evolutionary path of the upper limit changes of the key parameter values (
Under the optimal reward and punishment mechanism, the initial value of the local government is still 0.4, and the initial value of the enterprise is still 0.25. The simulation results are shown in the following.
Figure 8 shows the effect of the change in the upper bound of the supervisory cost (
[figure(s) omitted; refer to PDF]
Figure 9 shows the effect of the change in the upper bound of the supervisory cost (
[figure(s) omitted; refer to PDF]
Figure 10 shows the effect of the change in the upper bound of the reward (
[figure(s) omitted; refer to PDF]
Figure 11 shows the effect of the change in the upper bound of the punishment (
[figure(s) omitted; refer to PDF]
4.3. Analysis of Results
The simulation results show that there is no stable equilibrium point in the system under the static reward and punishment mechanism, and there is no condition that makes the enterprise choose the Manage strategy if the initial conditions are changed. Under the dynamic reward and punishment mechanism, there is no stable equilibrium point in the system under the dynamic reward and static punishment mechanism, there is a stable equilibrium point in the system under both the static reward and dynamic punishment and dynamic reward and dynamic punishment mechanisms, and the latter is the more optimal mechanism. Under the optimal reward and punishment mechanism, the probability of the local government choosing the Supervise strategy is negatively related to the increase of supervision cost and the upper limit of reward and punishment and positively related to the increase of management cost. The probability that enterprise chooses the Manage strategy is negatively correlated with the increase of supervision cost, management cost, and upper limit of reward and positively correlated with the increase of the upper limit of punishment.
Combined with the simulation results, this paper puts forward some suggestions for the information security supervision of smart cities. Local government reward and punishment play a key role in stimulating smart city enterprise to adopt enhanced information security management, but a scientific policy of reward and punishment needs to be implemented. The improvement of the information security supervisory system for smart cities often lags behind market development, which leaves many incentives to be enforced by traditional regulators based on old regulatory norms. Obviously, this lacks dynamism and timeliness. As we have studied, in the process of information security supervision in smart cities, dynamic reward and dynamic punishment mechanisms provide more incentives for local government and enterprise, and both increase the probability of both sides of the game to adopt positive strategies, so local government should adopt dynamic reward and dynamic punishment mechanisms when implementing supervision on enterprise. In terms of reward, ongoing subsidy incentives can place a huge financial burden on the government. For enterprise, it is also not the case that higher incentives are better. Excessive incentive subsidies can sometimes be counterproductive, so be flexible and change in the actual supervisory process. For example, start-ups have financial and technological constraints [41] and can be poorly run in subsequent operations once the initial subsidy expires [46]. At this point, local government needs to focus on reward. Growing and mature enterprise is stronger on its own and has a certain degree of risk resistance. At this time, the local government needs to reduce the incentive subsidies to punishment. In terms of punishment, too low punishment has a little restraining effect on enterprises, so the punishment should be increased for enterprises that do not strengthen information security management, and at the same time, recovery measures should be taken and punishment imposed on enterprises that have received subsidies. Larger punishment can have a high probability of deterrence and promote enterprise to adopt a higher probability of strengthening information security management strategy, indirectly relieving the supervisory pressure of the local government and reducing supervisory costs.
5. Conclusion
Strengthening information security supervision can effectively promote the healthy development of smart cities. Local governments, smart city enterprises, and academia are currently studying the issue of government incentives for relevant enterprises. Most previous studies have explored the effectiveness of incentives from a qualitative perspective and have not been able to reveal the dynamics of the strategic choices of local governments and enterprises on information security issues under different policies. Therefore, this paper establishes an evolutionary game model for local governments and smart city enterprises, analyzes the equilibrium point of each system and its stability under different reward and punishment mechanisms with the help of case data from China, and explores the impact of increasing the upper limit value of key parameters on the evolutionary stability strategy of game subjects under the optimal mechanism. The results are as follows: First, the initial value is one of the decisive factors influencing the choice of management strategy of the enterprise. Second, by comparing the four reward and punishment mechanisms, we found that the dynamic reward and dynamic punishment mechanism is the optimal mechanism. Finally, we analyze the effect of increasing the upper bound of key parameters on the strategy choice of both sides of the game under the optimal mechanism. Among them, increasing punishment can effectively promote both sides of the game to adopt active strategies, and reasonably adjusting the reward policy can also mobilize the information security behavior of enterprises.
At the theoretical level, this paper explores the applicability of evolutionary game theory to the problem of information security supervision in smart cities, providing a new perspective for the current research in related fields. At the practical level, this paper finds the optimal mechanism for information security supervision of smart city by constructing game models under different reward and punishment mechanisms and puts forward feasible optimization suggestions, which provides some reference for the practical regulation of information security of smart city. At the same time, there are still shortcomings in this paper. Firstly, in the dynamic reward and punishment mechanism, the strategy choice of the game subject does not necessarily show a linear relationship with the upper limit of the reward and punishment but may be a nonlinear relationship. Secondly, in the process of information security supervision of smart city, in addition to the two sides in the paper, it will also involve the influence of the decision-making behavior of higher-level government, the public, and other subjects. Finally, there may be organizations or individuals with different degrees of influence within the game group, and there may be some complex environments outside, which remains to be explored whether this will affect the evolutionary stability strategy of the whole group. More in-depth research will be conducted on the basis of the above in the future.
Acknowledgments
The authors acknowledge the National Social Science Foundation of China for supporting this research. This research was supported by the National Social Science Fund of China (no. 18BTQ055).
[1] F. Victoria, M. F. Jose, G. Rudolf, "Smart City implementation and discourses: an integrated conceptual model. The case of Vienna," Cities, vol. 78,DOI: 10.1016/j.cities.2017.12.004, 2018.
[2] E. Ismagilova, L. Hughes, Y. K. Dwivedi, K. R. Raman, "Smart cities: advances in research—an information systems perspective," International Journal of Information Management, vol. 47, pp. 88-100, DOI: 10.1016/j.ijinfomgt.2019.01.004, 2019.
[3] P. Singh, Y. K. Dwivedi, K. S. Kahlon, R. S. Sawhney, A. A. Alalwan, N. P. Rana, "Smart monitoring and controlling of government policies using social media and cloud computing," Information Systems Frontiers, vol. 22 no. 2, pp. 315-337, DOI: 10.1007/s10796-019-09916-y, 2020.
[4] S. Kehua, L. Jie, F. Hongbo, "Smart City and the Applications," pp. 1028-1031, DOI: 10.1109/icecc.2011.6066743, .
[5] C. Aandres, A. Enrique, "Smart City and information technology," A review Cities, vol. 93, pp. 84-94, 2019.
[6] Z. Allam, P. Newman, "Redefining the smart city: culture, metabolism and governance," Smart Cities, vol. 1 no. 1,DOI: 10.3390/smartcities1010002, 2018.
[7] S. Liyin, H. Zhenhua, W. Siuwai, S Liao, Y Lou, "A holistic evaluation of smart city performance in the context of China," Journal of Cleaner Production, vol. 200 no. 1, pp. 667-679, DOI: 10.1016/j.jclepro.2018.07.281, 2018.
[8] B. S. Elias, K. John, "On the social shaping dimensions of smart sustainable cities: a study in science, technology, and society," Sustainable Cities and Society, vol. 29, pp. 219-246, 2017.
[9] P. Guido, R. Mariangela, "A taxonomic analysis of smart city projects in North America and Europe," Sustainability, vol. 18 no. 12, 2020.
[10] K. Milan, S. Dominika, V. Josef, "Comparison of smart city standards, implementation and cluster models of cities in North America and Europe," Sustainability, vol. 13 no. 6, 2021.
[11] Y. Jeyun, K. Youngsang, K. Daehwan, "Regional smart city development focus: the South Korean national strategic smart city program," IEEE Access, vol. 9, pp. 7193-7210, 2020.
[12] Z. Kuan, N. Jianbing, Y. Kan, "Security and privacy in smart city applications: challenges and solutions," IEEE Communications Magazine, vol. 55 no. 1, pp. 122-129, 2017.
[13] Z. Yanxia, "A study on the balance between government information disclosure and personal information protection in epidemic prevention and control," Journal of Hubei Police College, vol. 33 no. 2, pp. 25-33, 2020.
[14] C. Lim, G. H. Cho, J. Kim, "Understanding the linkages of smart-city technologies and applications: key lessons from a text mining approach and a call for future research," Technological Forecasting and Social Change, vol. 170, 2021.
[15] E. Ismagilova, L. Hughes, N. P. Rana, Y. K. Dwivedi, "Security, privacy and risks within smart cities: literature review and development of a smart city interaction framework," Information Systems Frontiers, 2020.
[16] Z. Jing, "Problems of Internet security and countermeasures: a perspective on the “prism gate” incident," Journal of Jiangxi Police Academy, vol. 4, pp. 66-69, 2014.
[17] M. Chen, "Smart city and cyber-security; technologies used, leading challenges and future recommendations," Energy Reports, vol. 7, pp. 7999-8012, 2021.
[18] M. Masike, M. Annlize, V. S. Sune, "Validation of a socio-technical management process for optimising cybersecurity practices," Computers & Security, vol. 95, 2020.
[19] Q. K. J. Su, Computer Crime and Security Survey, 2010.
[20] S. Sengan, S. V, I. V, P. Velayutham, L. Ravi, "Detection of false data cyber-attacks for the assessment of security in smart grid using deep learning," Computers & Electrical Engineering, vol. 93,DOI: 10.1016/j.compeleceng.2021.107211, 2021.
[21] Z. Kai, G. Yihang, X. Shang, W. Zhen, "Research on the construction of information security guarantee system for smart cities under big data environment," Knowledge Management Forum, vol. 6 no. 6, pp. 364-374, 2021.
[22] N. Repal, T. Jamasb, "Incentive regulation and utility benchmarking for electricity network security," Economic Analysis and Policy, vol. 48, pp. 117-127, 2015.
[23] J. Luning, "Positive and Negative Incentives for Information Security Policies," China Information Security, vol. 8, 2014.
[24] L. Can, Z. Yongjie, H. Sheng, "The optimization of the legal system for the cybersecurity governance of smart cities in China," Korean-Chinese Social Science Studies, vol. 19 no. 4, pp. 312-331, 2021.
[25] T. Herath, H. R. Rao, "Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness," Decision Support Systems, vol. 47 no. 2, pp. 154-165, DOI: 10.1016/j.dss.2009.02.005, 2009.
[26] Y. Yang, "On the regulatory structure of the risk of personal biometric information application," Administrative Law Studies, vol. 6, pp. 101-114, 2021.
[27] J. M. Smith, G. R. Price, "The logic of animal conflict," Nature, vol. 246 no. 5427, pp. 15-18, DOI: 10.1038/246015a0, 1973.
[28] J. M. Smith, "The theory of games and the evolution of animal conflicts," Journal of Theoretical Biology, vol. 47 no. 1, pp. 209-221, DOI: 10.1016/0022-5193(74)90110-6, 1974.
[29] K. Po, H. Ying, S. Junguo, "A study of local government environmental control behavior in the context of central environmental protection inspectors," Operations Management, vol. 30 no. 10, pp. 27-133, 2021.
[30] Y. Zhihua, T. Xijin, "Humanistic analysis of drug quality and safety regulation based on evolutionary game," Management Comments, vol. 33 no. 5, pp. 64-75, 2021.
[31] Z. Xiaofeng, H. Xiaoting, B. Gaofeng, "Research on the quality control of micro-government information disclosure considering reputation," Library Theory and Practice, vol. 5, pp. 70-76, 2019.
[32] R. Mahmoudi, M. Rasti-Barzoki, "Sustainable supply chains under government intervention with a real-world case study: an evolutionary game theoretic approach," Computers & Industrial Engineering, vol. 116, pp. 130-143, DOI: 10.1016/j.cie.2017.12.028, 2018.
[33] L. Xingwei, H. Ruonan, D. Jiachi, J Li, Q Shen, "Research on the evolutionary game of construction and demolition waste (CDW) recycling units’ green behavior, considering remanufacturing capability," International Journal of Environmental Research and Public Health, vol. 18 no. 17, 2021.
[34] L. Hongyu, L. Hongyong, L. Xingwei, C. Longjun, "An evolutionary game theory study for construction and demolition waste recycling considering green development performance under the Chinese government’s reward–penalty mechanism," International Journal of Environmental Research and Public Health, vol. 17 no. 17, 2020.
[35] L. Cong, H. Weilai, Y. Chao, "The evolutionary dynamics of China’s electric vehicle industry–Taxes vs. Subsidies," Computers & Industrial Engineering, vol. 113, pp. 103-122, 2017.
[36] Z. Min, Q. Peng, "Evolutionary game study on the protection and use of personal data of over-collected APPs under government regulation," Intelligence Exploration, vol. 11, 2020.
[37] Q. Xinchi, H. Guisheng, "Research on information security governance of platform based on three-party evolutionary game," Modern Intelligence, vol. 40 no. 7, pp. 114-125, 2020.
[38] Z. Kai, W. Zhen, C. Dan, Z. Dongdong, "Evolutionary game analysis of information security regulation strategy in smart cities," Modern Intelligence, vol. 41 no. 3, 2021.
[39] V. Morta, H. Ying, B. Thomas, J. Helge, "Smart cities and cyber security: are we there yet? A comparative study on the role of standards, third party risk management and security ownership," Computers & Security, vol. 83, pp. 313-331, 2019.
[40] Z. Hui, G. Dandan, "U.S. Network Geographic Information Security Regulation and Its Implications for China," Theoretical Discussion, vol. 4, pp. 139-143, 2015.
[41] W. Huawei, S. Xiaomin, Z. Lijian, "Research on fiscal policies to promote the construction of smart cities," Business Economy, vol. 3 no. 3, 2021.
[42] Z. Chang, X. Xiaolin, W. Junze, Z. Congcong, "Analysis of non-traditional security in information sharing and use in smart cities: the case of," New Online Political Advertising, vol. 7, 2018.
[43] Inflated Revenue of More than 3 Billion, Tianxia Intelligence and 23 Related Personnel Received Fines,” https://cj.sina.com.cn/articles/view/1704103183/65928d0f02002m7yb
[44] C. Zhuolun, "Application of Environmental Ecological Strategy in Smart City Space Architecture Planning," Environmental Technology & Innovation, vol. 23, 2021.
[45] E. Ernst, Y. Young, "Releases the 2021 Ernst & Young Global Information Security Survey," 2021. https://www.yicai.com/news/101178234.html
[46] I. M. F. Oomens, B. M. Sadowski, "The importance of internal alignment in smart city initiatives: an ecosystem approach," Telecommunications Policy, vol. 43 no. 6, pp. 485-500, 2019.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2022 Yihang Guo et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/
Abstract
At present, the information security problems of smart city show a high incidence, and it is necessary to strengthen the information security supervision of smart city. In the process of supervision, there is a game relationship between local government and smart city enterprises. This paper firstly constructs the game matrices of local government and enterprises under the static and three dynamic reward and punishment mechanisms, then conducts numerical simulation with the help of MATLAB to arrive at the optimal reward and punishment mechanism through comparison, and finally explores the influence of the change of the upper limit value of each key variable on the directionality and sensitivity of the decision-making behavior of game subjects under the optimal mechanism. The result shows that initial value is one of the decisive factors influencing the choice of management strategy by enterprise. Dynamic reward and dynamic punishment mechanism is the best reward and punishment mechanism for information security supervision in smart cities. In case the upper limit value of key parameters is increased, a larger punishment has a strong influence on the positive strategy choice of the enterprise, and a reasonable adjustment of the reward policy can likewise mobilize the probability that the enterprise actively chooses to strengthen information security management. Based on the simulation results, we propose a feasible strategy.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer