Article ID: CBB132311682

Historical Consciousness of Cyber Security in India (2020)

unapi

Cyber security has become crucial to any nation's security, economy, and overall well-being. While much has been written about India's rise as a global computing power, not much is known about its cyber security history. I seek to fill this gap through a comprehensive analysis of India's cyber security history and cyber security consciousness. To do this, I take a very wide view of cyber security-as the totality of security infrastructure that includes all technologies used for information collection, storage, and dissemination. My study also covers a very long period, starting from India's colonial times to the present. The long period of examination helps gain perspective on how India's security stances and security consciousness have evolved with time. Earlier colonial policies kept information and communications technologies (ICTs) strictly under government authority, to be wielded as tools of project power and control. These policies continued even after independence, with successive Indian governments retaining absolute monopoly over ICTs. I divide cyber security into internally-focused (i.e. censorship, surveillance, control of citizens) and externally-focused (i.e. defensive and offensive actions directed at malicious external and internal entities perceived as threats to the nation, its enterprises, and citizens) cyber security. My analysis shows that postindependent India granted its citizens freedom of expression and the freedom to elect and govern, but did not do away with the colonial vestiges of internally-focused control policies using ICTs. Nor has it been entirely successful in stitching together a comprehensive externally-focused cyber security policy, despite increasing threats from the outside. These are increasingly at odds with Indian citizens whose cyber security consciousness has grown and evolved over time. It is clear that the state and the citizens need to continuously and democratically negotiate cyber security, to balancing national security with the citizens' constitutionally protected rights.

...More
Citation URI
https://data.isiscb.org/isis/citation/CBB132311682/

Similar Citations

Article Eric Kerr; Connor Graham; Alfred Montoya; (December 2018)
Networked Human, Network’s Human: Humans in Networks Inter-Asia: Introduction (/isis/citation/CBB538579778/)

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age (/isis/citation/CBB486585682/)

Book Ashley Sweetman; (2022)
Cyber and the City: Securing London’s Banks in the Computer Age (/isis/citation/CBB340774234/)

Book Duane C. Wilson; (2021)
Cybersecurity (/isis/citation/CBB201310866/)

Article Yost, Jeffrey R.; (2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems (/isis/citation/CBB570334134/)

Article Jones, Anita K.; Wulff, William A; (Spring 2002)
Cybersecurity (/isis/citation/CBB367643580/)

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age (/isis/citation/CBB758382142/)

Article Rebecca Slayton; (January 2021)
Governing Uncertainty or Uncertain Governance? Information Security and the Challenge of Cutting Ties (/isis/citation/CBB911361449/)

Article Cecilia Passanti; Marie-Emmanuelle Pommerolle; (2022)
The (un)making of electoral transparency through technology: The 2017 Kenyan presidential election controversy (/isis/citation/CBB699607308/)

Article Jeremy Pitt; Agnieszka Rychwalska; Magdalena Roszczynska-Kurasinska; Andrzej Nowak; (March 2019)
Democratizing Platforms for Social Coordination (/isis/citation/CBB485378597/)

Article Norma Möllers; (January 2021)
Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State (/isis/citation/CBB777052436/)

Article P. L. Frana; (2018)
Telematics and the Early History of International Digital Information Flows (/isis/citation/CBB402121196/)

Article Edwards, Elizabeth; (2014)
Photographic Uncertainties: Between Evidence and Reassurance (/isis/citation/CBB001201583/)

Article Aspray, William; (2010)
The Role of Policy in the Rise of the Indian Software and IT-Enabled Services Industry (/isis/citation/CBB000933575/)

Article Marine Al Dahdah; (2019)
From Evidence-based to Market-based mHealth: Itinerary of a Mobile (for) Development Project (/isis/citation/CBB830941331/)

Book Dinesh C Sharma; (2015)
The Outsourcer: The story of India's IT revolution (/isis/citation/CBB992472294/)

Article Banga, Rashmi; Kumar, Dinesh; (2011)
India's Exports of Software Services: Role of External Demand and Productivity (/isis/citation/CBB001201767/)

Book Blok, Aad; Downey, Greg; (2003)
Uncovering labor in information revolutions, 1750--2000 (/isis/citation/CBB001180030/)

Article Slack, Frances; Rowley, Jennifer; (2005)
Notes from the Field: on Information kiosks and Indian farmers (/isis/citation/CBB076421762/)

Authors & Contributors
Stewart, Andrew J.
Wulff, William A
Ashley Sweetman
Norma Möllers
Jones, Anita K.
Agnieszka Rychwalska
Concepts
Information technology
Computer security; cyber security
Computers and computing
Technoscience; science and technology studies
Security technologies
Privacy
Time Periods
21st century
20th century, late
20th century
19th century
18th century
Places
India
United States
Ghana
Singapore
Kenya
East Asia
Institutions
India Tobacco Company Ltd.
Facebook (firm)
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment