Implication of Cyber Security in a Digital Economy: Learning from Corporate Sector with Special Reference to BFSI

Author(s):  
Ajitabh Ambastha ◽  
Krutarth Desai ◽  
Piyush Patil ◽  
Omkar Chavan ◽  
Harshil Dodia ◽  
...  
E-Management ◽  
2019 ◽  
pp. 61-66
Author(s):  
L. O. Gontar’

The article considers a problem of the definition of the digital economy, as well as presents a new theme on the legal procuring of international cyber security. The above mentioned new direction serves as an indicator of possible interdisciplinary research in the field of law and economics in the sphere of digital processes. As a justification the acts of the European Union have been adduced and their characteristic features, which consist in consideration of a substantial part of digital economy (economic party) have been allocated. This integration association has a unique structure and history, but the process of regulating the digital economy in the European Union began not so long ago. The European Union is one of the few integration associations that has started to work on improving the mechanisms of legal regulation of the digital market. This circumstance certainly affects the development of an integrated approach to the understanding of the digital economy, as well as further actualizes the issue of considering the legal procuring of international cyber security of this phenomenon. Legal procuring of security is a new direction in the international legal field, which will allow to consider the legal aspects in demand in the digital economy. The challenges in relation to international cyber security and the impact of the conceptual apparatus on the issues of the legal procuring of the security of the digital economy have been considered. It is important to note that the article suggests possible solutions to the problem posed. At the end of the article three proposals for improving approaches to the security of the digital economy have been elaborated. In terms of their qualitative characteristics, the proposals, undoubtedly, relate to legal and technical aspects, but also solutions regarding the conceptual component of the legal procuring of the security have been presented.


Author(s):  
Vardan Mkrttchian ◽  
Leyla Ayvarovna Gamidullaeva ◽  
Yulia Vertakova ◽  
Svetlana Panasenko

The chapter introduces the perspectives on the use of avatar-based management techniques for designing new tools to improve blockchain as technology for cyber security issues. The purpose of this chapter was to develop an avatar-based closed model with strong empirical grounding that provides a uniform platform to address issues in different areas of digital economy and creating new tools to improve blockchain technology using the intelligent visualization techniques. The authors show the essence, dignity, current state, and development prospects of avatar-based management using blockchain technology for improving implementation of economic solutions in the digital economy of Russia.


Author(s):  
Swapneshwar Goutam

This chapter focuses on the issues evolved out of the Indian Information Technology Act of 2000; the key subject related to authentication of digital signatures with special reference to India based on case studies; the benefits of strong information technology infrastructure in India for advancement of future technologies and expansion of domestic market worldwide as well as the vital suggestions on advantages of electronic and digital signatures in enriching and ensuring swiftness in business desires and security.


Author(s):  
Rishikesh Rao

The age of computer advancement has caused a revolutionary change in the corporate sector. From on-campus working hours to remote work from home scenarios, from meetings in a conference room to meeting online in a virtual environment, things are changing continuously in the corporate environment. This paper tries to educate and generate awareness about cyber security in the non-technical human resource and try to make them understand the potential risks to their organization which can be caused because of not giving much attention to smaller details. This paper concentrates on those attacks which can be mitigated by any non-technical employee and which are easy to understand and give preventive measures for the same.


Organized sectors are already familiar with digital economy through banking one way or other. Micro, Small and Macro Enterprises (MSMEs) may or may not have bank account due to their level of transactions and the ways they do their business, make them to continue to remain in the SME sector and not scale beyond a point. So a good percentage of this Group of people is unbanked and away from digital economy. Micro and SMEs are generating employment and helps for the promotion of the large scale sectors’ development especially for the rural India. This study was made an attempt to analyse the impacts on digital and cashless economy of MSMEs in Peenya Industrial Area, Bengalure.


Author(s):  
Vardan Mkrttchian ◽  
Leyla Ayvarovna Gamidullaeva ◽  
Yulia Vertakova ◽  
Svetlana Panasenko

The chapter introduces the perspectives on the use of avatar-based management techniques for designing new tools to improve blockchain as technology for cyber security issues. The purpose of this chapter was to develop an avatar-based closed model with strong empirical grounding that provides a uniform platform to address issues in different areas of digital economy and creating new tools to improve blockchain technology using the intelligent visualization techniques. The authors show the essence, dignity, current state, and development prospects of avatar-based management using blockchain technology for improving implementation of economic solutions in the digital economy of Russia.


2011 ◽  
Vol 4 (3) ◽  
Author(s):  
John Hatchard

This article examines the potential impact of the UK Bribery Act 2010, with special reference to Africa. The central focus is on the bribery of foreign public officials and bribery within the corporate sector.


2021 ◽  
pp. 164-169
Author(s):  
Iryna Revak ◽  
Roman Gren

Purpose. The aim of the article is to reveal the peculiarities of the formation of secure cyberspace in the digital economy, to substantiate the activities of law enforcement agencies to prevent cybercrime. Methodology of research. The theoretical basis of the study were the fundamental provisions of modern economic theory, scientific works of scientists, regulations and legislation of Ukraine on cyber security and the development of the digital economy. To achieve this goal, the following general and special methods were used: abstract and logical (to substantiate the key characteristics of the information space in the context of growing digital economy), system (to consider the relationship between different departments and businesses to develop measures to combat transnational crime), inductive logic (in the study of law enforcement activities to prevent real and potential cybercrime), deductive (to determine effective means of security control in the management of cyber threats), system and structural analysis (to identify and analyse patterns, trends and features of the digital economy). Findings. The peculiarities of a secure virtual environment in the conditions of digital economy development are studied, taking into account the specifics of information society formation and digitalization of economic relations, development of economic processes, in particular their entry into the international digital market. Problematic issues of information and cyber security are outlined. Emphasis is placed on the development and implementation of technologies to protect and counter cyber-attacks, cyber risk management and evaluation of the effectiveness of safe cyberspace control. Effective means of counteracting the commission of crimes in the digital economy are analysed, perspective directions of ensuring law and order in cyberspace are substantiated. Originality. The scientific novelty lies in the substantiation of theoretical and methodological provisions and applied recommendations for the formation of secure cyberspace in the digital economy, the formation of the institutional basis for the integration of government and business structures based on information technology. Practical value. The practical significance of the obtained results lies in the development of scientific and applied recommendations for combating cybercrime in the work of law enforcement agencies. Key words: digital economy, digital technologies, digitalization, cyber security, cybercrime, cyber threats, cyberspace, information and communication technologies.


2018 ◽  
Vol 23 (2) ◽  
pp. 113-120
Author(s):  
László Kovács

Abstract The more advanced digital economy and society a country has the more exposed it is to cyber threats. Consequently, countries with advanced digital economy and digital infrastructure naturally need to pay more attention to protecting cyber space. Today it is a national security issue and it can no longer be argued that cyber security is its indispensable part. Accordingly, a national cyber security strategy has to be built on national security strategy. That is the main reason for using the word “cornerstone” in the title of this study. The relation between national security and national cyber security means a specific context, which is one of the subjects of our examination in this study. Today, most countries have a cyber security strategy. However, these strategies are mostly static documents that do not or only partially can handle the dynamism that characterizes cyberspace. This paper focuses on the key issues that are needed for developing a usable cyber security strategy.


Sign in / Sign up

Export Citation Format

Share Document