Please use this identifier to cite or link to this item:
https://repository.iimb.ac.in/handle/2074/18592
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Raghunath, S | |
dc.contributor.author | Inokondu, Sivaprasad | |
dc.date.accessioned | 2021-04-30T14:26:58Z | - |
dc.date.available | 2021-04-30T14:26:58Z | - |
dc.date.issued | 2021 | |
dc.identifier.uri | https://repository.iimb.ac.in/handle/2074/18592 | - |
dc.description.abstract | After the post-Liberalization and Globalization, the developing Nations like India has witnessed tremendous changes in all areas of socio-economic, technological and political fields. With the rapid changes in disruptive and state-of-art technologies, the Nation has witnessed a proliferation of devices from various countries being used by citizens and Businesses. When these devices are networked/communicated through the Internet medium then the individuals and businesses seamlessly interact each other to any part of the world. However, there are serious & significant threats in the form “Cyber Security Threats” through this networked internet medium. This has also raised questions about the National critical communication Infrastructures, National borders and question of National Security. The National security, cybersecurity issues arising out of networked devices, and data privacy of citizens has also led to political risks at National and International Context. During PreGlobalisation/ Liberalization period, political risk is somewhat easy to understand and any steps by the Government/ Govt Officials could affect a company/ business to any critical extent. The Twenty-First century political risk is not only the Government action but also actions by organizations, disruptive technologies and wide range of people. This document discusses about defining cybersecurity, the threat landscape, the threat actors and the factors associated with it. Along with this base work, this document links/focusses the political risks associated with an Organization/Platform and analyse Value (assets) vs Vulnerability of Assets. This will help the organizations to decide over the firms’ operation or continuity. In order to understand/ analyse the problem context from different actors, three scenarios have been analysed using the value (assets) vs vulnerability of assets frameworks. The platform “TikTok” has been chosen as the first scenario to understand and apply the 21st century political frameworks associated with cyberthreats. TikTok is a recent subject matter both at National (India) and International (US etc) context. The platform “TikTok” is owned by Chinese-based ByteDance and has humongous user base (100crore plus). TikTok shares short video clips (live or recorded). The other scenarios are IIMB-Zoom and IIMB conferences. These scenarios provide insights about the importance of disciplined processes and quick incidence response to restore the normalcy of business operations/ events. In this FY2020-21, India has banned 199 apps like Tiktok, PubG etc citing the cyber threats to Nation. At International level, The US Navy and other agencies told the employees and citizens that they should avoid from installing the TikTok app on any phones and tablets including govt devices. The decision was based on cybersecurity threat tests made and to address “on current and evolving threats in defence networks”. This has raised the issue of potential National security risk. This document attempts to bring in practical insights happening in National and International scenario w.r.to problem context. This document applied the concepts/ framework of 21st century political risks in International scenario. Also, this document brought the concept of Social Engineering, touched on Operational Governance of Organization, impact of Global commons and Global message, and legal frameworks/ issues at International/ National level. This document gives the reader the dimensions of the policy problem, its standards, the interest groups involved in the problem concern and the best practices or standards that may be adopted or adapted, through the analysis or inferences drawn from conferences/frameworks, to the requirement of the market sector. This document, as per the analysis done, is of view that a good operational governance in organizations with proper/responsible independent regulator in every Industry segment coupled/ handshaking with fair principles of competent local/ state authority can assist the nation and the overall well-being & harmony in the ecosystem. ….…. leaving the thought…….can we achieve that collective effort……. way to go. | |
dc.publisher | Indian Institute of Management Bangalore | |
dc.relation.ispartofseries | CPP_PGPPM_P21_05 | |
dc.subject | Communication technology | |
dc.subject | IT Devices | |
dc.subject | Infrastructure | |
dc.subject | National security | |
dc.subject | Post-liberalization | |
dc.subject | Globalization | |
dc.title | Sophisticated communication/IT Devices (Goods/ Services), critical infrastructure and national security | |
dc.type | Policy Paper-PGPPM | |
dc.pages | 31p. | |
Appears in Collections: | 2021 |
Files in This Item:
File | Size | Format | |
---|---|---|---|
CPP_PGPPM_P21_05.pdf | 1.25 MB | Adobe PDF | View/Open Request a copy |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.