scholarly journals The role of telecom industry towards a new vision to make India Digitally powerful in the age of globalization

Author(s):  
Sumanta Bhattacharya ◽  
Bhavneet Kaur Sachdev

The Telecom Sector of India has grown over the years and emerged as the second largest today. The reliance Jio has planned to launch 5G in the second half of the 2021. since the launch of Jio we have seen a rapid penetration of Internet services in India. India has the 2nd largest telecom industry in India and the cheapest net provider to its people. There are 500 million active data users and by 2024 it is estimated to have more than 800 million active users and manufacture of 1 billion smart phones in the upcoming years. India is also working towards its objective to empower people digitally. We have seen a rise in the use of digital platform during the pandemic period and also India is taking it steps ahead towards digital economy. The sad reality behind this is even where India is about to launch 5G service in India 90% of the population in India are digitally illiterate with only 8% of the population have access to a laptop or a computer. India also has a poor cyber security system and the data is vulnerable of every user. We also have poor tower connection in many areas with only 25 % of the net is connected by fiber. India needs to upgrade its telecom industry and provide net facilitates to all its people as the Internet is going to dominate the future. India’s Telecom industry contributes to 6.5% of the GDP.

Author(s):  
Muhammad Waqar Khan ◽  
Muhammad Asghar Khan ◽  
Muhammad Alam ◽  
Wajahat Ali

<p>During past few years, data is growing exponentially attracting researchers to work a popular term, the Big Data. Big Data is observed in various fields, such as information technology, telecommunication, theoretical computing, mathematics, data mining and data warehousing. Data science is frequently referred with Big Data as it uses methods to scale down the Big Data. Currently<br />more than 3.2 billion of the world population is connected to internet out of which 46% are connected via smart phones. Over 5.5 billion people are using cell phones. As technology is rapidly shifting from ordinary cell phones towards smart phones, therefore proportion of using internet is also growing. There<br />is a forecast that by 2020 around 7 billion people at the globe will be using internet out of which 52% will be using their smart phones to connect. In year 2050 that figure will be touching 95% of world population. Every device connect to internet generates data. As majority of the devices are using smart phones to<br />generate this data by using applications such as Instagram, WhatsApp, Apple, Google, Google+, Twitter, Flickr etc., therefore this huge amount of data is becoming a big threat for telecom sector. This paper is giving a comparison of amount of Big Data generated by telecom industry. Based on the collected data<br />we use forecasting tools to predict the amount of Big Data will be generated in future and also identify threats that telecom industry will be facing from that huge amount of Big Data.</p>


2021 ◽  
Vol 16 (1) ◽  
pp. 47-60
Author(s):  
Michaela Šimonová ◽  

The arrival of information and communication technologies is nothing new. The number of people using these technologies and moving in cyberspace is growing, and therefore it is an important role of the state to respond sufficiently to such developments. A fundamental role of the state is to create a stable security system consisting of complex legislation as well as creation of a legislative environment capable of responding flexibly to the growing number of diverse incidents in cyberspace. Sufficient legal regulation consisting of unambiguous determination of competencies and tasks of individual subjects represents the basic pillar for the creation of a stable security system. The role of the state is also to maintain existing and create new partnerships with organizations that are able to provide relevant information and knowledge in the field of cyber security.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Dylan Rafferty ◽  
Kevin Curran

Cyber security breaches are on the rise globally. Due to the introduction of legislation like the EU’s General Data Protection Regulation (GDPR), companies are now subject to further financial penalties if they fail to meet requirements in protecting user information.  In 2018, 75% of CEOs and board members considered cyber security and technology acquisitions among their top priorities, and blockchain based solutions were among the most considered options. Blockchain is a decentralised structure that offers multiple security benefits over traditional, centralised network architectures. These two approaches are compared in this chapter in areas such as data storage, the Internet of Things (IoT) and Domain Name System (DNS) in order to determine blockchain’s potential in the future of cyber security.


Author(s):  
Praveen Pandey

Abstract: Cyber security are techniques generally set forth in published materials that attempt to safeguard the cyber environment of a user or organization. It manages the set of techniques used to save the integrity of networks, programs and data from unauthorized access. It refers to the body of technologies, processes, and it may also be referred to as information technology security. The field is of growing importance due to increasing reliance on computer systems, including smart phones, televisions and the various tiny devices that constitute the Internet of Things. Keywords: IT security, Internet of things (IOT)


2016 ◽  
Vol 6 (1) ◽  
Author(s):  
Dr. Ashish Kaushal ◽  
Dr. Imranur Rahman

Indian telecom industry has emerged as the fastest growing telecom market in the world. Opening of the telecom sector to foreign investors has not only led to rapid growth in subscriber base but also helped a great deal towards maximization of consumer benefits, particularly in terms of price discovery following the moderate approach in tariffs. Success of Indian telecommunications sector has made the country a truly attractive investment destination for MNCs. With the rapid changing technology, socio-economic and politico-legal environment and trend towards globalization of business, industry and increased competition, effective customer care services has become a very challenging job especially in telecom industry. There is no denying fact that human element is at the center stage in all economic activities and plays a major role for the service industry. One of the services providing industry that emerged rapidly in today’s scenario is telecom industry.


2021 ◽  
Vol 9 (12) ◽  
pp. 669-710
Author(s):  
Dr.Yusuf Perwej ◽  
Syed Qamar Abbas ◽  
Jai Pratap Dixit ◽  
Dr. Nikhat Akhtar ◽  
Anurag Kumar Jaiswal

In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has advanced greatly in recent years in order to keep up with the rapid changes that occur in cyberspace. Cyber security refers to the methods that a country or organization can use to safeguard its products and information in cyberspace.  Two decades ago, the term "cyber security" was barely recognized by the general public. Cyber security isn't just a problem that affects individuals but it also applies to an organization or a government. Everything has recently been digitized, with cybernetics employing a variety of technologies such as cloud computing, smart phones, and Internet of Things techniques, among others. Cyber-attacks are raising concerns about privacy, security, and financial compensation. Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data.  The primary goal of this article is to conduct a thorough examination of cyber security kinds, why cyber security is important, cyber security framework, cyber security tools, and cyber security difficulties. Cyber security safeguards the data and integrity of computing assets that are part of or connected to an organization's network, with the goal of defending such assets from all threat actors throughout the life cycle of a cyber-attack.


Author(s):  
Esra Söğüt ◽  
O. Ayhan Erdem

Thanks to the internet, the distances between the countries are easily overcome and the communication network rapidly expands. This situation also affects the cyber security of the countries to a great extent. Attacks on critical infrastructures, companies, and public institutions can be magnitude that make great harms. These developments in cyber space bring new problems. One of them is cyber terror. Cyber terror does not have a certain and well-known definition. Cyber terror is the realization of terrorist acts in the field of cyber war. In addition, cyber space is a place of display for terrorist acts. The effects of cyber terror attacks have reached a level to scare all countries. There is not enough information about the definition, characteristics, methods used in cyber terror attacks and cyber terror groups. It is important for national administrators and staff to become conscious and to become informed about cyber terror. In this chapter, information will be presented, endeavors on awareness-creation will be made, and a role of guiding the future studies will be taken.


2015 ◽  
Vol 26 (1) ◽  
pp. 68-83 ◽  
Author(s):  
Brett Furlonger ◽  
Sonja Budisa

Consumers are increasingly turning to both the internet and apps for mental health assistance. Mobile technologies such as smart phones and tablets offer swift and anonymous access for students to internet sites and app environments. Availability, however, does not guarantee quality or credibility. This web-based pilot study was undertaken to evaluate internet sites and apps on their ability to provide quality and credible information about counselling and counsellors. Of the 69 internet sites identified, only five met the inclusion criteria, and of the 30 apps identified, only eight met the inclusion criteria for quality and credibility. Inter-observer agreement was found to be 95.6% for the inclusion processes and 93% for quality and credibility. The findings strongly suggested that while there was a vast amount of information on the web, both internet sites and apps rarely met criteria for quality and credibility. The role of school counsellors in helping students use web-based counselling tools was discussed.


2012 ◽  
Author(s):  
Michael McNeese ◽  
Nancy J. Cooke ◽  
Anita D'Amico ◽  
Mica R. Endsley ◽  
Cleotilde Gonzalez ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document