Tarafdar et al., 2019 - Google Patents
Systems theoretic process analysis of information security: The case of AadhaarTarafdar et al., 2019
- Document ID
- 14062648148388875392
- Author
- Tarafdar P
- Bose I
- Publication year
- Publication venue
- Journal of Organizational Computing and Electronic Commerce
External Links
Snippet
ABSTRACT A new way of thinking about cybersecurity is much needed to deal with the complex and dynamic cyber-ecosystem. In this paper, we introduce a systems thinking based approach for solving problems related to cybersecurity. We adapt the powerful safety …
- 238000004458 analytical method 0 title abstract description 51
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11790117B2 (en) | Systems and methods for enforcing privacy-respectful, trusted communications | |
| JP7064576B2 (en) | Systems and methods for implementing centralized privacy control in decentralized systems | |
| Michael et al. | Privacy, data rights and cybersecurity: Technology for good in the achievement of sustainable development goals | |
| Gupta et al. | An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: A scenario-based experiment | |
| Rawat et al. | Conversational Artificial Intelligence | |
| Jeyaraj et al. | Institutional isomorphism in organizational cybersecurity: A text analytics approach | |
| WO2019246568A1 (en) | Systems and methods for enforcing privacy-respectful, trusted communications | |
| Gonzalez | Managing online risk: Apps, mobile, and social media security | |
| Chopra et al. | Implementing an Information Security Management System | |
| Tarafdar et al. | Systems theoretic process analysis of information security: The case of Aadhaar | |
| Austin et al. | Safe sharing sites | |
| Nobanee et al. | Bibliometric analysis of cybercrime and cybersecurity risks literature | |
| Santos | Developing cybersecurity programs and policies | |
| Chatzipoulidis et al. | A readiness assessment tool for GDPR compliance certification | |
| Hintzbergen et al. | Foundations of Information Security Based on ISO27001 and ISO27002 | |
| van Wyk et al. | COBIT 5 compliance: best practices cognitive computing risk assessment and control checklist | |
| Duffourc et al. | Privacy of personal data in the generative AI data lifecycle | |
| Wilson | A framework for security technology cohesion in the era of the GDPR | |
| Babbs | How to leverage data security in a post-Covid world | |
| Afzal et al. | Cyberfraud, usage intention, and cybersecurity awareness among e-banking users in India: an integrated model approach | |
| Matulevičius et al. | Ontological representation of healthcare application security using blockchain technology | |
| Tomassi | Data security and privacy concerns for generative ai platforms | |
| Ryutov et al. | Predicting information security policy compliance intentions and behavior for six employee-based risks | |
| Shukla et al. | Data privacy | |
| Pushpa | Digital Governance-Transforming Public Services |