IN SEARCH FOR CYBER DEPENDENCE
DOI:
https://doi.org/10.29121/granthaalayah.v7.i12.2019.294Keywords:
ICT, IoT, SCADA, TCP/IPAbstract [English]
Civilization progressed through phases like agrarian, semi-industrialization, industrialization, advanced-industrialization and arrived at Information age. Advances in ICT (Information and Communication Technology) transformed most revered ancient concept of ‘Knowledge’ from abstract to measurable form with considerable economic value. Produces of knowledge exercise, in form of data, analyses and documents etc., are being digitized increasingly and stored on servers across the globe building large knowledge warehouses [1,2,3]. Some of these are shared and rests are protected. Material value of these possessions are enormous and immensely attracts attention of cyber predators, armed with aggressive ICT tools and techniques. Cyber predators can now harm both material and digital possessions with digital tools. Thus, human possessions in either form; physical and digital, demands to be defended digitally and an environment of cyber dependence needs to be established. The scope of deliberation is vast though an attempt has been made to present a kaleidoscope of the issues that deserve attention [4,5,6].
Downloads
References
James W. Cortada, Ashish M. Gupta and Marc Le Noir; How the most advanced nations can remain competitive in the Information Age, IBM Institute for Business Value, IBM Global Business Services,
Dutta Avijit; Knowledge Ubiquity in WEB 2.0 Paradigm; Innovation in Information System and Technology, ITCDC ‘09 Macmillan Publications; Page 234-238,
Dutta Avijit; Collaborative Knowledge with Cloud Computing, Proceedings of the 4th National Conference, INDIACom – 2010,
Dutta Avijit; Digital Communication and Knowledge Society; BIJIT – 2012 Issue 8: (July - December, 2012 Vol.4 No.2)
Dutta Avijit; Agile Social Interaction on Virtual Plane; Proceedings of the 7th National Conference; INDIACom-2013,
Dutta A. (2018) Digital Security: An Enigma. In: Bokhari M., Agrawal N., Saini D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore DOI: https://doi.org/10.1007/978-981-10-8536-9_25
Dutta Avijit, Vinay Kumar; Managing Information Security in Digital Age, IJMSS, January 1, 2012
Dutta Avijit, Vinay Kumar; Evolution and Adoption of Social IT, Volume 8 Issue 2 2013, IMS Manthan DOI: https://doi.org/10.18701/imsmanthan.v8i2.5129
Jeffrey O. Kephart, David M. Chess, Autonomic Computing, IBM Thomas J. Watson Research Center, IEEE Computer Society 2003,
Kalle Lyytinen, Youngjin Yoo, The Next Wave of Nomadic Computing: A Research Agenda for Information Systems Research, Working Papers on Information Systems, Sprouts, ISSN 1535-6078
Karlene C. Cousins, Daniel Robey; Human agency in a wireless world: Patterns of technology use in nomadic computing environments; Information and Organization; Science Direct.
Krishna Venkata Subramanian and Sandeep K.S. Gupta, Security Solutions for Pervasive Healthcare P1: BINAYA DASH, December 8, 2006 11:58 AU7921 AU7921˙C015
Koroma J., Vartiainen M. (2018) From Presence to Multipresence: Mobile Knowledge Workers’ Densified Hours. In: Taylor S., Luckman S. (eds) The New Normal of Working Lives. Dynamics of Virtual Work. Palgrave Macmillan, Cham DOI: https://doi.org/10.1007/978-3-319-66038-7_9
L. Kleinrock; Nomadic Computing; Computer Science Department Los Angeles, California, USA
Mark Burgin and Eugene Eberbach, Evolutionary Computation and the Processes of Life; an ACM publication August, 2012; DOI: https://doi.org/10.1145/2351436.2351437
Satyanarayanan M, Pervasive Computing: Vision and Challenges; School of Computer Science Carnegie Mellon University
TechTarget, Security Media Group, Information Security, October 2014, Vol 16, No 8.
Tim O’Reilly and John Battelle; Web Squared: Web 2.0 Five Years On; Special Report
Thomas F. La Porta, Krishan K. Sabnani, Richard D. Gitlin; Challenges for Nomadic Computing: Mobility Management and Wireless Communications; Bell Laboratories
Weiser, M. The, The Computer for the 21st Century, Scientific American, September 1991, Pages 94-104 DOI: https://doi.org/10.1038/scientificamerican0991-94
Weiser, M, Brown, J.S.The Coming Age of Calm Technology, TECHNOLOGY1 Xerox PARC October 5, 1996
https://www.itu.int/dms_pub/itu-d/opb/str/d-str-gci.01-2017-pdf-e.pdf
http://en.wikipedia.org/wiki/Transmission_Control_Protocol
http://en.wikipedia.org/wiki/Public_key_infrastructure
Downloads
Published
How to Cite
Issue
Section
License
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.