Analyses of issues of information security in Indian context

Author:

Chaturvedi Manmohan,Narain Singh Abhishek,Prasad Gupta Manmohan,Bhattacharya Jaijit

Abstract

Purpose – The purpose of this paper is to attempt to fill the need to identify critical information security issues at national level, both technical and social in the Indian context, and create a framework of these issues to provide interesting managerial insights about their hierarchy. Current literature advocates relevance of both technical and social issues in a potential framework to address national and organizational information security concerns. Such a framework can guide users in developing insight for strategy in the maize of important information security issues and their intricate interdependency. Design/methodology/approach – Delphi methodology is used to identify a set of topical issues with help from members of a cyber security group. These issues are further analyzed using Interpretive Structural Modeling (ISM) to impose order and direction to the complex relationships among them. Findings – The analysis using ISM creates a framework of these issues and provides interesting managerial insights about their hierarchy. These insights are used to recommend prioritized action for information security at national and organizational levels. Research limitations/implications – The highlight of this research is ingenious deployment of two idea engineering methods in developing interpretable structural model of 25 information security issues. This model provides valuable insights and can guide the policy formulation. This is the key contribution of this paper. It needs hardly any emphasis on the need for continuous search of all technical and social issues and formulating policies and programs using experts” judgment in a rigorous manner. Subsequent research may scale up to the global level for extension and validation by empanelling Delphi experts from nations belonging to different regions. Time-variant analysis can be attempted with the help of System Dynamics Modeling using causal-loop diagrams to account for the supportive and inhibiting influences of various issues. This approach has the potential to generate more realistic insights that can inform policy formulation. Practical implications – It brings about key information security issues connected with its various facets, viz. national/organizational level initiatives, supportive processes, capabilities and objectives. These issues, identified by Indian experts in the Indian context, offer a method that one could apply in other national contexts and see whether substantial differences occur, and how other experts prioritize these issues. The analysis of social issues along with technical issues using the ISM tool provides us insights that are considered applicable to a larger context than India. The policy and program formulations in other nations can benefit from the insights generated by this research. The fast-paced proliferation of technology and its resultant vulnerabilities have given birth to an underground economy of malware trading by criminals, terrorists and hostile nation states. Secure cyber space for legitimate use by the globalized world can only be achieved by international cooperation. Social implications – A “digital divide” in cyber defense cannot be afforded. As explained earlier, cyber security is a challenge for both developed and developing nations. Prioritization of resources in a sequence suggested by ISM analysis would help face the challenge of cyber security better. The methodology suggested in this paper would ensure adequate response to cyber threats and eliminate knee-jerk reaction. Originality/value – This research emphasizes identification of hierarchical relationship among the identified topical issues of information security rather than using them as a flat checklist. It helps us segregate the end objectives from root issues and highlights the necessity of addressing these root issues to achieve those objectives.

Publisher

Emerald

Subject

Information Systems and Management,Computer Science Applications,Public Administration

Reference66 articles.

1. Anderson, E.E. and Choobineh, J. (2008), “Enterprise information security strategies”, Computers & Security, Vol. 27 Nos 1/2, pp. 22-29.

2. Attri, R. , Dev, N. and Sharma, V. (2013), “Interpretive structural modelling (ISM) approach: an overview”, Research Journal of Management Sciences, Vol. 2 No. 2, pp. 3-8.

3. Bajaj, K. (2010), The Cybersecurity Agenda – Mobilizing for International Action, The EastWest Institute, New York, NY, available at: www.ewi.info (accessed June 2013).

4. BIC (2013), “D2.5 - final report of the working groups activities”, Building International Cooperation for Trustworthy ICT: Security, Privacy and Trust in Global Networks & Services, available at: www.bic-trust.eu

5. Bolaňos, R. , Fontela, R.E. and Pastor, P. (2005), “Using interpretive structural modeling in strategic decision-making groups”, Management Decision, Vol. 43 Nos 5/6, pp. 877-895.

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Information Security at Higher Education Institutions: A Systematic Literature Review;Information and Communication Technologies;2022

2. A Conceptual Framework for Exploring the Factors Influencing Information Security Policy Compliance in Emerging Economies;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2022

3. Prevention of cybercrimes in smart cities of India: from a citizen’s perspective;Information Technology & People;2019-10-07

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3