Article ID: CBB132311682

Historical Consciousness of Cyber Security in India (2020)

unapi

Subramanian, Ramesh (Author)


IEEE Annals of the History of Computing
Volume: 42
Issue: 4
Pages: 71-93
Publication date: 2020
Language: English


Cyber security has become crucial to any nation's security, economy, and overall well-being. While much has been written about India's rise as a global computing power, not much is known about its cyber security history. I seek to fill this gap through a comprehensive analysis of India's cyber security history and cyber security consciousness. To do this, I take a very wide view of cyber security-as the totality of security infrastructure that includes all technologies used for information collection, storage, and dissemination. My study also covers a very long period, starting from India's colonial times to the present. The long period of examination helps gain perspective on how India's security stances and security consciousness have evolved with time. Earlier colonial policies kept information and communications technologies (ICTs) strictly under government authority, to be wielded as tools of project power and control. These policies continued even after independence, with successive Indian governments retaining absolute monopoly over ICTs. I divide cyber security into internally-focused (i.e. censorship, surveillance, control of citizens) and externally-focused (i.e. defensive and offensive actions directed at malicious external and internal entities perceived as threats to the nation, its enterprises, and citizens) cyber security. My analysis shows that postindependent India granted its citizens freedom of expression and the freedom to elect and govern, but did not do away with the colonial vestiges of internally-focused control policies using ICTs. Nor has it been entirely successful in stitching together a comprehensive externally-focused cyber security policy, despite increasing threats from the outside. These are increasingly at odds with Indian citizens whose cyber security consciousness has grown and evolved over time. It is clear that the state and the citizens need to continuously and democratically negotiate cyber security, to balancing national security with the citizens' constitutionally protected rights.

...More
Citation URI
data.isiscb.org/p/isis/citation/CBB132311682

This citation is part of the Isis database.

Similar Citations

Article Eric Kerr; Connor Graham; Alfred Montoya; (December 2018)
Networked Human, Network’s Human: Humans in Networks Inter-Asia: Introduction (/p/isis/citation/CBB538579778/) unapi

Book Ashley Sweetman; (2022)
Cyber and the City: Securing London’s Banks in the Computer Age (/p/isis/citation/CBB340774234/) unapi

Book Duane C. Wilson; (2021)
Cybersecurity (/p/isis/citation/CBB201310866/) unapi

Article Yost, Jeffrey R.; (2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems (/p/isis/citation/CBB570334134/) unapi

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age (/p/isis/citation/CBB486585682/) unapi

Article Jones, Anita K.; Wulff, William A; (Spring 2002)
Cybersecurity (/p/isis/citation/CBB367643580/) unapi

Book Ben Buchanan; (2022)
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics (/p/isis/citation/CBB525584724/) unapi

Article Cecilia Passanti; Marie-Emmanuelle Pommerolle; (2022)
The (un)making of electoral transparency through technology: The 2017 Kenyan presidential election controversy (/p/isis/citation/CBB699607308/) unapi

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age (/p/isis/citation/CBB758382142/) unapi

Article Norma Möllers; (January 2021)
Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State (/p/isis/citation/CBB777052436/) unapi

Article Rebecca Slayton; (January 2021)
Governing Uncertainty or Uncertain Governance? Information Security and the Challenge of Cutting Ties (/p/isis/citation/CBB911361449/) unapi

Article Jeremy Pitt; Agnieszka Rychwalska; Magdalena Roszczynska-Kurasinska; Andrzej Nowak; (March 2019)
Democratizing Platforms for Social Coordination (/p/isis/citation/CBB485378597/) unapi

Article P. L. Frana; (2018)
Telematics and the Early History of International Digital Information Flows (/p/isis/citation/CBB402121196/) unapi

Article Edwards, Elizabeth; (2014)
Photographic Uncertainties: Between Evidence and Reassurance (/p/isis/citation/CBB001201583/) unapi

Article Marine Al Dahdah; (2019)
From Evidence-based to Market-based mHealth: Itinerary of a Mobile (for) Development Project (/p/isis/citation/CBB830941331/) unapi

Article Slack, Frances; Rowley, Jennifer; (2005)
Notes from the Field: on Information kiosks and Indian farmers (/p/isis/citation/CBB076421762/) unapi

Book Blok, Aad; Downey, Greg; (2003)
Uncovering labor in information revolutions, 1750--2000 (/p/isis/citation/CBB001180030/) unapi

Article Aspray, William; (2010)
The Role of Policy in the Rise of the Indian Software and IT-Enabled Services Industry (/p/isis/citation/CBB000933575/) unapi

Chapter Downey, Greg; (2003)
The place of labor in the history of information technology revolutions (/p/isis/citation/CBB001180034/) unapi

Article Itty Abraham; (December 2018)
Prehistory of Aadhaar: Body, Law, and Technology as Postcolonial Assemblage (/p/isis/citation/CBB114433718/) unapi

Authors & Contributors
Downey, Greg
Stewart, Andrew J.
Abraham, Itty
Aspray, William F.
Edwards, Elizabeth
Frana, Philip L.
Journals
Science, Technology, and Human Values
East Asian Science, Technology and Society: An International Journal
IEEE Annals of the History of Computing
The Bridge: Journal of the National Academy of Engineering
Comparative Technology Transfer and Society
History and Anthropology
Publishers
Cornell University Press
Cambridge University Press
Harvard University Press
MIT Press
Springer Nature
Concepts
Information technology
Computer security; cyber security
Computers and computing
Science and technology studies (STS)
Technology and society
Privacy
Time Periods
21st century
20th century, late
20th century
19th century
18th century
Places
India
United States
Great Britain
Korea
Vietnam
Germany
Institutions
Facebook (firm)
India. Supreme Court
India Tobacco Company Ltd.
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment