Article ID: CBB132311682

Historical Consciousness of Cyber Security in India (2020)

unapi

Subramanian, Ramesh (Author)


IEEE Annals of the History of Computing
Volume: 42
Issue: 4
Pages: 71-93
Publication date: 2020
Language: English


Cyber security has become crucial to any nation's security, economy, and overall well-being. While much has been written about India's rise as a global computing power, not much is known about its cyber security history. I seek to fill this gap through a comprehensive analysis of India's cyber security history and cyber security consciousness. To do this, I take a very wide view of cyber security-as the totality of security infrastructure that includes all technologies used for information collection, storage, and dissemination. My study also covers a very long period, starting from India's colonial times to the present. The long period of examination helps gain perspective on how India's security stances and security consciousness have evolved with time. Earlier colonial policies kept information and communications technologies (ICTs) strictly under government authority, to be wielded as tools of project power and control. These policies continued even after independence, with successive Indian governments retaining absolute monopoly over ICTs. I divide cyber security into internally-focused (i.e. censorship, surveillance, control of citizens) and externally-focused (i.e. defensive and offensive actions directed at malicious external and internal entities perceived as threats to the nation, its enterprises, and citizens) cyber security. My analysis shows that postindependent India granted its citizens freedom of expression and the freedom to elect and govern, but did not do away with the colonial vestiges of internally-focused control policies using ICTs. Nor has it been entirely successful in stitching together a comprehensive externally-focused cyber security policy, despite increasing threats from the outside. These are increasingly at odds with Indian citizens whose cyber security consciousness has grown and evolved over time. It is clear that the state and the citizens need to continuously and democratically negotiate cyber security, to balancing national security with the citizens' constitutionally protected rights.

...More
Citation URI
data.isiscb.org/p/isis/citation/CBB132311682

This citation is part of the Isis database.

Similar Citations

Article Eric Kerr; Connor Graham; Alfred Montoya; (December 2018)
Networked Human, Network’s Human: Humans in Networks Inter-Asia: Introduction unapi

Book Ashley Sweetman; (2022)
Cyber and the City: Securing London’s Banks in the Computer Age unapi

Book Duane C. Wilson; (2021)
Cybersecurity unapi

Article Yost, Jeffrey R.; (2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems unapi

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age unapi

Article Ashwin Jacob Mathew; (2024)
Unscripted Practices for Uncertain Events: Organizational Problems in Cybersecurity Incident Management unapi

Article Jones, Anita K.; Wulff, William A; (Spring 2002)
Cybersecurity unapi

Book Ben Buchanan; (2022)
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics unapi

Article Vijay Varadharajan; Neeraj Suri; (February 2024)
Security challenges when space merges with cyberspace unapi

Article Cecilia Passanti; Marie-Emmanuelle Pommerolle; (2022)
The (un)making of electoral transparency through technology: The 2017 Kenyan presidential election controversy unapi

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age unapi

Article Norma Möllers; (January 2021)
Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State unapi

Article Rebecca Slayton; (January 2021)
Governing Uncertainty or Uncertain Governance? Information Security and the Challenge of Cutting Ties unapi

Article Jeremy Pitt; Agnieszka Rychwalska; Magdalena Roszczynska-Kurasinska; Andrzej Nowak; (March 2019)
Democratizing Platforms for Social Coordination unapi

Article P. L. Frana; (2018)
Telematics and the Early History of International Digital Information Flows unapi

Article Ajey Lele; (August 2023)
Indian Space Force: A Strategic Inevitability unapi

Article Raja Qaiser Ahmed; Muhammad Shoaib; Ramsha Ashraf; (August 2023)
India's Space Pursuit and the Changing Matrix of South Asian Security unapi

Article Rajeswari Pillai Rajagopalan; Dimitrios Stroikos; (August 2024)
The transformation of India's space policy: From space for development to the pursuit of security and prestige unapi

Article Edwards, Elizabeth; (2014)
Photographic Uncertainties: Between Evidence and Reassurance unapi

Article Marine Al Dahdah; (2019)
From Evidence-based to Market-based mHealth: Itinerary of a Mobile (for) Development Project unapi

Authors & Contributors
Stewart, Andrew J.
Edwards, Elizabeth
Frana, Philip L.
Slayton, Rebecca
Yost, Jeffrey R.
Graham, Connor
Journals
Science, Technology, and Human Values
Space Policy
IEEE Annals of the History of Computing
The Bridge: Journal of the National Academy of Engineering
East Asian Science, Technology and Society: An International Journal
History and Anthropology
Publishers
Cornell University Press
Harvard University Press
MIT Press
Springer Nature
Concepts
Computer security; cyber security
Information technology
Computers and computing
National security
Science and technology studies (STS)
Security technologies
Time Periods
21st century
20th century, late
20th century
19th century
Places
India
United States
Great Britain
Korea
Vietnam
China
Institutions
Facebook (firm)
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment