Please use this identifier to cite or link to this item: https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1037
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTarafdar, Pratik
dc.contributor.authorBose, Indranil
dc.date.accessioned2021-08-26T06:03:22Z-
dc.date.available2021-08-26T06:03:22Z-
dc.date.issued2019
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85071055353&doi=10.1080%2f10919392.2019.1598608&partnerID=40&md5=231111a9cec24bf7dec39012dc956331
dc.identifier.urihttps://ir.iimcal.ac.in:8443/jspui/handle/123456789/1037-
dc.descriptionTarafdar, Pratik, Management Information Systems, Indian Institute of Management Calcutta, Kolkata, West Bengal, India; Bose, Indranil, Management Information Systems, Indian Institute of Management Calcutta, Kolkata, West Bengal, India
dc.descriptionISSN/ISBN - 10919392
dc.descriptionpp.209-222
dc.descriptionDOI - 10.1080/10919392.2019.1598608
dc.description.abstractA new way of thinking about cybersecurity is much needed to deal with the complex and dynamic cyber-ecosystem. In this paper, we introduce a systems thinking based approach for solving problems related to cybersecurity. We adapt the powerful safety-hazard analysis method, Systems Theoretic Process Analysis (STPA) based on systems theory to analyze the cybersecurity related features of India�s massive digital identity program, Aadhaar. Our findings produce important insights. On one hand, it helps identify the security gaps of the Aadhaar system, and on the other hand, it provides controls using systems thinking to overcome these gaps. We contribute to understanding the world of cybersecurity practices and develop risk mitigation strategies that can benefit the Aadhaar.
dc.publisherSCOPUS
dc.publisherJournal of Organizational Computing and Electronic Commerce
dc.publisherTaylor and Francis Inc.
dc.relation.ispartofseries29(3)
dc.subjectAadhaar
dc.subjectCybersecurity
dc.subjectProcess analysis
dc.subjectRisk management
dc.subjectSystems theory
dc.subjectSystems thinking
dc.titleSystems theoretic process analysis of information security: the case of aadhaar
dc.typeArticle
Appears in Collections:Management Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.