Subramanian, Ramesh (Author)
Cyber security has become crucial to any nation's security, economy, and overall well-being. While much has been written about India's rise as a global computing power, not much is known about its cyber security history. I seek to fill this gap through a comprehensive analysis of India's cyber security history and cyber security consciousness. To do this, I take a very wide view of cyber security-as the totality of security infrastructure that includes all technologies used for information collection, storage, and dissemination. My study also covers a very long period, starting from India's colonial times to the present. The long period of examination helps gain perspective on how India's security stances and security consciousness have evolved with time. Earlier colonial policies kept information and communications technologies (ICTs) strictly under government authority, to be wielded as tools of project power and control. These policies continued even after independence, with successive Indian governments retaining absolute monopoly over ICTs. I divide cyber security into internally-focused (i.e. censorship, surveillance, control of citizens) and externally-focused (i.e. defensive and offensive actions directed at malicious external and internal entities perceived as threats to the nation, its enterprises, and citizens) cyber security. My analysis shows that postindependent India granted its citizens freedom of expression and the freedom to elect and govern, but did not do away with the colonial vestiges of internally-focused control policies using ICTs. Nor has it been entirely successful in stitching together a comprehensive externally-focused cyber security policy, despite increasing threats from the outside. These are increasingly at odds with Indian citizens whose cyber security consciousness has grown and evolved over time. It is clear that the state and the citizens need to continuously and democratically negotiate cyber security, to balancing national security with the citizens' constitutionally protected rights.
...More
Article
Eric Kerr;
Connor Graham;
Alfred Montoya;
(December 2018)
Networked Human, Network’s Human: Humans in Networks Inter-Asia: Introduction
Book
Ashley Sweetman;
(2022)
Cyber and the City: Securing London’s Banks in the Computer Age
Book
Duane C. Wilson;
(2021)
Cybersecurity
Article
Yost, Jeffrey R.;
(2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
Article
Ashwin Jacob Mathew;
(2024)
Unscripted Practices for Uncertain Events: Organizational Problems in Cybersecurity Incident Management
Article
Jones, Anita K.;
Wulff, William A;
(Spring 2002)
Cybersecurity
Book
Ben Buchanan;
(2022)
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
Article
Vijay Varadharajan;
Neeraj Suri;
(February 2024)
Security challenges when space merges with cyberspace
Article
Cecilia Passanti;
Marie-Emmanuelle Pommerolle;
(2022)
The (un)making of electoral transparency through technology: The 2017 Kenyan presidential election controversy
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
Article
Norma Möllers;
(January 2021)
Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State
Article
Rebecca Slayton;
(January 2021)
Governing Uncertainty or Uncertain Governance? Information Security and the Challenge of Cutting Ties
Article
Jeremy Pitt;
Agnieszka Rychwalska;
Magdalena Roszczynska-Kurasinska;
Andrzej Nowak;
(March 2019)
Democratizing Platforms for Social Coordination
Article
P. L. Frana;
(2018)
Telematics and the Early History of International Digital Information Flows
Article
Ajey Lele;
(August 2023)
Indian Space Force: A Strategic Inevitability
Article
Raja Qaiser Ahmed;
Muhammad Shoaib;
Ramsha Ashraf;
(August 2023)
India's Space Pursuit and the Changing Matrix of South Asian Security
Article
Rajeswari Pillai Rajagopalan;
Dimitrios Stroikos;
(August 2024)
The transformation of India's space policy: From space for development to the pursuit of security and prestige
Article
Edwards, Elizabeth;
(2014)
Photographic Uncertainties: Between Evidence and Reassurance
Article
Marine Al Dahdah;
(2019)
From Evidence-based to Market-based mHealth: Itinerary of a Mobile (for) Development Project
Be the first to comment!