Impact of Digital Transformation on Security Policies and Standards - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

11
(FIVE YEARS 11)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781799823674, 9781799823698

Author(s):  
Manjula Raghav ◽  
Nisha Dhanraj Dewani

Development and advancement in information technologies have paved the path for many challenges for the intellectual property rights holders. There are several forms of cybercrimes such as pornography, stalking, cyber fraud, cyber terrorism, etc., that are affecting people, hurdling e-commerce, challenging law, and disturbing the channel of information and communication. No doubt that cybercrimes are offences where the computer is the means of the commission of the offence as well as a target of the offence. Apparently, such offences are generated through electronic means where mens rea has no role to play. This unruly horse is creating several problems in the world of intellectual property, which has the capacity to affect global commerce. This chapter will focus on Indian case laws to showcase the interface between IPR and cyberspace. Also the dealing of issues like cybersqatting, cyberbullying, cyber theft will be discussed in order to check the competency of IPR.


Author(s):  
Lavanya Lingareddy ◽  
Parthiban Krishnamoorthy

Like other new generation information technologies such as IoT, big data, AI, and cloud, cryptocurrency and blockchain became buzz words in both industry and academia due to their advantageous features. With the features like decentralization, transparency, immutability, blockchain technology became more famous and is emerging in almost all fields like banking, education, healthcare, government, and real estate. Blockchain technology was introduced in the year 1991. It came into existence after this technology was created for bitcoin, a digital cryptocurrency by Santoshi Nakamoto in the year 2008. Since then, the blockchain is evolving rapidly. Even though blockchain usage is in high demand in all the sectors and it has received attention from many international organizations, most of the people lag in knowledge of blockchain technology and Cryptocurrency and how exactly they work. This chapter explores more in detail what blockchain technology is, how it works, and its applications.


Author(s):  
Dasari Kalyani

In today's digital e-commerce and m-commerce world, the information itself acts as an asset and exists in the form of hardware, software, procedure, or a person. So the security of these information systems and management is a big challenging issue for small and large-scale agencies. So this chapter discusses the major role and responsibility of the organization's management in identifying the need for information security policy in today's world of changing security principles and controls. It focuses on various policy types suitable for all kinds of security models and procedures with the background details such as security policy making, functionality, and its impact on an agency culture. Information security policies are helpful to identify and assess risk levels with the available set of technological security tools. The chapter describes the management strategies to write a good policy and selection of the right policy public announcement. The agencies must also ensure that the designed policies are properly implemented and ensure compliance through frequent intermediate revisions.


Author(s):  
Shanthi Makka ◽  
Gagandeep Arora ◽  
B. B. Sagar

Blockchain technology makes use of a centralized, peer-to-peer (P2P) network of databases, also called nodes, to validate and record digital transactions between individual users located anywhere across the globe. These transactions often take place through the exchange of cryptocurrencies such as bitcoins, Ethereum, and Ripple, etc. The security and transparency that is inherently present in digital transactions place blockchain technology in high demand across various industrial applications. Each node updates its database in real-time as and when transactions occur. The transaction gets authorized only when a majority of the nodes in the network validate the transaction. Once the verification is complete, a block, consisting of hash and keys, is generated for each new transaction and is linked to previous transactions in every database. Every node updates its database with the new block. A hacker would have to break down every node in the system to commit fraud. Blockchain could play a major role in maintaining the cyber security of digital transactions in the future.


Author(s):  
Pooja Kaplesh

This chapter gives an overview about the need for computer security and different types of network securities. Different types of attacks like active and passive are discussed that can harm system resources. This chapter also provides the basics of the cryptography system and basic terms used in cryptography. Security services provided by cryptography are also discussed such as data integrity, privacy/confidentiality, user authentication, message authentication, authorization, digital signatures, validation, access control, and non-repudiation along with their mechanisms.


Author(s):  
Hima Bindu P. ◽  
John Samuel K. ◽  
Bhaskar Reddy T.

It is a known fact that technology drives the nation. Day by day more disruptive technologies emerge that enable a nation to strive for massive growth in its GDP. The digital India is a high priority programme from the Indian government in order to make India a digitally literate nation. This project mainly provides the services offered by the government to common public through electronic means. This is done by enhancing the operational setup of the existing services. The digitalization of many aspects in India make it a better contender to become a global leader by creating digital empowerment in technology with cumulative internet connectivity. The chapter identifies some of the core areas where the concept of digitalization enhances its operational processes. The changes reflected in each individual sector by adopting digital transformation are discussed in detail.


Author(s):  
Anilkumar Chunduru ◽  
Gowtham Mamidisetti

Cloud computing is a highly demanding zone in the present IT enterprise. The key characteristics are adaptability, productivity, pay-per-utilize, and cost viability. Access control and information security are the significant issues in cloud computing. Various access control strategies are present. The major problems of storing data in expandable access control and access rights from users are not used in this scheme. This chapter presents a generic survey on scalable and secure access control systems and schemes in cloud computing with a key focus on cloud security. Research gaps in the existing literature on cloud security are presented.


Author(s):  
Sam Goundar ◽  
Abraham Colin Chongkit ◽  
Shalvendra Kumar ◽  
Akashdeep Bhardwaj

Companies have realized the need to have the competitive edge over their rivals. Enterprise systems provide this competitive edge. But with implementing enterprise system software (ESS), companies have to invest in the networking of their various business offices to interconnect to ESS. This chapter investigates the various ways two companies in Fiji do this and the various disadvantages they face from lack of knowledge of ESS to infrastructure limitations and issues faced in a developing country like Fiji. This chapter focuses on the network security issues of enterprise systems deployed in two companies in Fiji. It compares the information gathered to published papers on network infrastructure, network security issues, and threat assessments. It also proposes solutions to mitigate the security issues faced by enterprise systems networks.


Author(s):  
Sam Goundar ◽  
Bettylyn Chandra ◽  
Akashdeep Bhardwaj ◽  
Fatemeh Saber ◽  
Subhash Appana

This chapter seeks to examine the digital transformation (digitalisation) of diplomacy and how such digital transformations can be used to positively influence and improve a country's foreign services. The chapter further explores how the country's diplomats and their Foreign Service counterparts at Ministry of Foreign Affairs (MFA) can utilize the tools provided by digitalisation to advance the country's interests. Given the critical intelligence data, diplomatic protocols, and confidential information exchanged at the diplomatic level between countries, it is equally important to evaluate and assess the cyber security measures that are being taken to secure the digital network of the diplomatic missions. Scholarly research was initially conducted to position the field of research amongst pertinent literature to ascertain the use of digital tools in diplomacy and present key deliberations that exist.


Author(s):  
Sam Goundar ◽  
Alvish Pillai ◽  
Akashdeep Bhardwaj

Healthcare is a vital portion of today's medical environment, and it is necessary for medical providers to do their work in an efficient and effective manner. Everyday, hundreds of thousands of patients visit medical amenities stimulating the administration to run smoothly. Almost all hospitals and the health centers in Fiji are now heavily dependent on a patient information system (PATISplus) that helps the employees to manage all the medical and administrative information. In this chapter, the authors analyse the ethical issues of a patient information systems (PATIS) using the PAPA model. This is in terms of privacy, accessibility, accuracy, and property. This chapter reviews current policies within the Ministry of Health and Medical Services in Fiji and also if there is a need of development of standard operating procedures in view of the PAPA model.


Sign in / Sign up

Export Citation Format

Share Document