[go: up one dir, main page]

Tarafdar et al., 2019 - Google Patents

Systems theoretic process analysis of information security: The case of Aadhaar

Tarafdar et al., 2019

Document ID
14062648148388875392
Author
Tarafdar P
Bose I
Publication year
Publication venue
Journal of Organizational Computing and Electronic Commerce

External Links

Snippet

ABSTRACT A new way of thinking about cybersecurity is much needed to deal with the complex and dynamic cyber-ecosystem. In this paper, we introduce a systems thinking based approach for solving problems related to cybersecurity. We adapt the powerful safety …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification

Similar Documents

Publication Publication Date Title
US11790117B2 (en) Systems and methods for enforcing privacy-respectful, trusted communications
JP7064576B2 (en) Systems and methods for implementing centralized privacy control in decentralized systems
Michael et al. Privacy, data rights and cybersecurity: Technology for good in the achievement of sustainable development goals
Gupta et al. An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: A scenario-based experiment
Rawat et al. Conversational Artificial Intelligence
Jeyaraj et al. Institutional isomorphism in organizational cybersecurity: A text analytics approach
WO2019246568A1 (en) Systems and methods for enforcing privacy-respectful, trusted communications
Gonzalez Managing online risk: Apps, mobile, and social media security
Chopra et al. Implementing an Information Security Management System
Tarafdar et al. Systems theoretic process analysis of information security: The case of Aadhaar
Austin et al. Safe sharing sites
Nobanee et al. Bibliometric analysis of cybercrime and cybersecurity risks literature
Santos Developing cybersecurity programs and policies
Chatzipoulidis et al. A readiness assessment tool for GDPR compliance certification
Hintzbergen et al. Foundations of Information Security Based on ISO27001 and ISO27002
van Wyk et al. COBIT 5 compliance: best practices cognitive computing risk assessment and control checklist
Duffourc et al. Privacy of personal data in the generative AI data lifecycle
Wilson A framework for security technology cohesion in the era of the GDPR
Babbs How to leverage data security in a post-Covid world
Afzal et al. Cyberfraud, usage intention, and cybersecurity awareness among e-banking users in India: an integrated model approach
Matulevičius et al. Ontological representation of healthcare application security using blockchain technology
Tomassi Data security and privacy concerns for generative ai platforms
Ryutov et al. Predicting information security policy compliance intentions and behavior for six employee-based risks
Shukla et al. Data privacy
Pushpa Digital Governance-Transforming Public Services