Subramanian, Ramesh (Author)
Cyber security has become crucial to any nation's security, economy, and overall well-being. While much has been written about India's rise as a global computing power, not much is known about its cyber security history. I seek to fill this gap through a comprehensive analysis of India's cyber security history and cyber security consciousness. To do this, I take a very wide view of cyber security-as the totality of security infrastructure that includes all technologies used for information collection, storage, and dissemination. My study also covers a very long period, starting from India's colonial times to the present. The long period of examination helps gain perspective on how India's security stances and security consciousness have evolved with time. Earlier colonial policies kept information and communications technologies (ICTs) strictly under government authority, to be wielded as tools of project power and control. These policies continued even after independence, with successive Indian governments retaining absolute monopoly over ICTs. I divide cyber security into internally-focused (i.e. censorship, surveillance, control of citizens) and externally-focused (i.e. defensive and offensive actions directed at malicious external and internal entities perceived as threats to the nation, its enterprises, and citizens) cyber security. My analysis shows that postindependent India granted its citizens freedom of expression and the freedom to elect and govern, but did not do away with the colonial vestiges of internally-focused control policies using ICTs. Nor has it been entirely successful in stitching together a comprehensive externally-focused cyber security policy, despite increasing threats from the outside. These are increasingly at odds with Indian citizens whose cyber security consciousness has grown and evolved over time. It is clear that the state and the citizens need to continuously and democratically negotiate cyber security, to balancing national security with the citizens' constitutionally protected rights.
...More
Article
Eric Kerr;
Connor Graham;
Alfred Montoya;
(December 2018)
Networked Human, Network’s Human: Humans in Networks Inter-Asia: Introduction
(/p/isis/citation/CBB538579778/)
Book
Ashley Sweetman;
(2022)
Cyber and the City: Securing London’s Banks in the Computer Age
(/p/isis/citation/CBB340774234/)
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/p/isis/citation/CBB201310866/)
Article
Yost, Jeffrey R.;
(2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems
(/p/isis/citation/CBB570334134/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/p/isis/citation/CBB486585682/)
Article
Jones, Anita K.;
Wulff, William A;
(Spring 2002)
Cybersecurity
(/p/isis/citation/CBB367643580/)
Book
Ben Buchanan;
(2022)
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
(/p/isis/citation/CBB525584724/)
Article
Cecilia Passanti;
Marie-Emmanuelle Pommerolle;
(2022)
The (un)making of electoral transparency through technology: The 2017 Kenyan presidential election controversy
(/p/isis/citation/CBB699607308/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/p/isis/citation/CBB758382142/)
Article
Norma Möllers;
(January 2021)
Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State
(/p/isis/citation/CBB777052436/)
Article
Rebecca Slayton;
(January 2021)
Governing Uncertainty or Uncertain Governance? Information Security and the Challenge of Cutting Ties
(/p/isis/citation/CBB911361449/)
Article
Jeremy Pitt;
Agnieszka Rychwalska;
Magdalena Roszczynska-Kurasinska;
Andrzej Nowak;
(March 2019)
Democratizing Platforms for Social Coordination
(/p/isis/citation/CBB485378597/)
Article
P. L. Frana;
(2018)
Telematics and the Early History of International Digital Information Flows
(/p/isis/citation/CBB402121196/)
Article
Edwards, Elizabeth;
(2014)
Photographic Uncertainties: Between Evidence and Reassurance
(/p/isis/citation/CBB001201583/)
Article
Marine Al Dahdah;
(2019)
From Evidence-based to Market-based mHealth: Itinerary of a Mobile (for) Development Project
(/p/isis/citation/CBB830941331/)
Article
Slack, Frances;
Rowley, Jennifer;
(2005)
Notes from the Field: on Information kiosks and Indian farmers
(/p/isis/citation/CBB076421762/)
Book
Blok, Aad;
Downey, Greg;
(2003)
Uncovering labor in information revolutions, 1750--2000
(/p/isis/citation/CBB001180030/)
Article
Aspray, William;
(2010)
The Role of Policy in the Rise of the Indian Software and IT-Enabled Services Industry
(/p/isis/citation/CBB000933575/)
Chapter
Downey, Greg;
(2003)
The place of labor in the history of information technology revolutions
(/p/isis/citation/CBB001180034/)
Article
Itty Abraham;
(December 2018)
Prehistory of Aadhaar: Body, Law, and Technology as Postcolonial Assemblage
(/p/isis/citation/CBB114433718/)
Be the first to comment!