2014
DOI: 10.1108/tg-07-2013-0019
|View full text |Cite
|
Sign up to set email alerts
|

Analyses of issues of information security in Indian context

Abstract: Purpose – The purpose of this paper is to attempt to fill the need to identify critical information security issues at national level, both technical and social in the Indian context, and create a framework of these issues to provide interesting managerial insights about their hierarchy. Current literature advocates relevance of both technical and social issues in a potential framework to address national and organizational information security concerns. Such a framework can guide users in deve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 39 publications
0
6
0
Order By: Relevance
“…The GoI is developing the SCI concept with a core of information communication technology (ICT activity). However, there are concerns that the SCI concept might be adversely affected by security problems (Thomson et al ., 2006; Chaturvedi et al ., 2014; Dwivedi, Rana, Janssen, Lal, Williams and Clement, 2017; Dwivedi, Rana, Jeyaraj, Clement and Williams, 2017; Gcaza et al ., 2017). It is expected that citizens of SCI would use high-speed internet for ensuring easy access to digital services (Chatterjee and Kar, 2017; Chhonker et al ., 2017).…”
Section: Introductionmentioning
confidence: 99%
“…The GoI is developing the SCI concept with a core of information communication technology (ICT activity). However, there are concerns that the SCI concept might be adversely affected by security problems (Thomson et al ., 2006; Chaturvedi et al ., 2014; Dwivedi, Rana, Janssen, Lal, Williams and Clement, 2017; Dwivedi, Rana, Jeyaraj, Clement and Williams, 2017; Gcaza et al ., 2017). It is expected that citizens of SCI would use high-speed internet for ensuring easy access to digital services (Chatterjee and Kar, 2017; Chhonker et al ., 2017).…”
Section: Introductionmentioning
confidence: 99%
“…For example, according to the Indian Information Technology Act of 2000, Internet service providers are not liable for criminal activity on their networks (Chaturvedi et al, 2014). But, full autonomy, as a rule, is not possible.…”
Section: Methodsmentioning
confidence: 99%
“…Therefore, the main prominence is placed on the accurate description of the ML / DL methods, and ~ 53 ~ references to the signal function of each ML and DL method. Also discuss the challenges and opportunities of using ML / DL to get cyber security [5,7,9] .…”
Section: Towards Cyber Securitymentioning
confidence: 99%
“…This type of risk is one risk factor for an organization, which can include many types of risk (e.g. investment risk, budget risk, program management risk, legal liability risk, security risk, inventory risk, and risk from information systems) [4,5,7] . The Smart Grid risk assessment process is based on the risk assessments already carried out by both the private and public sectors and includes identifying assets, risks and threats and specifying the impacts to produce a risk assessment for Smart Grid and its domains and subsites, such as homes and businesses.…”
Section: Introductionmentioning
confidence: 99%