Please use this identifier to cite or link to this item:
https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1037
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tarafdar, Pratik | |
dc.contributor.author | Bose, Indranil | |
dc.date.accessioned | 2021-08-26T06:03:22Z | - |
dc.date.available | 2021-08-26T06:03:22Z | - |
dc.date.issued | 2019 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85071055353&doi=10.1080%2f10919392.2019.1598608&partnerID=40&md5=231111a9cec24bf7dec39012dc956331 | |
dc.identifier.uri | https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1037 | - |
dc.description | Tarafdar, Pratik, Management Information Systems, Indian Institute of Management Calcutta, Kolkata, West Bengal, India; Bose, Indranil, Management Information Systems, Indian Institute of Management Calcutta, Kolkata, West Bengal, India | |
dc.description | ISSN/ISBN - 10919392 | |
dc.description | pp.209-222 | |
dc.description | DOI - 10.1080/10919392.2019.1598608 | |
dc.description.abstract | A new way of thinking about cybersecurity is much needed to deal with the complex and dynamic cyber-ecosystem. In this paper, we introduce a systems thinking based approach for solving problems related to cybersecurity. We adapt the powerful safety-hazard analysis method, Systems Theoretic Process Analysis (STPA) based on systems theory to analyze the cybersecurity related features of India�s massive digital identity program, Aadhaar. Our findings produce important insights. On one hand, it helps identify the security gaps of the Aadhaar system, and on the other hand, it provides controls using systems thinking to overcome these gaps. We contribute to understanding the world of cybersecurity practices and develop risk mitigation strategies that can benefit the Aadhaar. | |
dc.publisher | SCOPUS | |
dc.publisher | Journal of Organizational Computing and Electronic Commerce | |
dc.publisher | Taylor and Francis Inc. | |
dc.relation.ispartofseries | 29(3) | |
dc.subject | Aadhaar | |
dc.subject | Cybersecurity | |
dc.subject | Process analysis | |
dc.subject | Risk management | |
dc.subject | Systems theory | |
dc.subject | Systems thinking | |
dc.title | Systems theoretic process analysis of information security: the case of aadhaar | |
dc.type | Article | |
Appears in Collections: | Management Information Systems |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.