IN SEARCH FOR CYBER DEPENDENCE

Authors

  • Avijit Dutta Ex - Scientist F NIC New Delhi

DOI:

https://doi.org/10.29121/granthaalayah.v7.i12.2019.294

Keywords:

ICT, IoT, SCADA, TCP/IP

Abstract

Civilization progressed through phases like agrarian, semi-industrialization, industrialization, advanced-industrialization and arrived at Information age. Advances in ICT (Information and Communication Technology) transformed most revered ancient concept of ‘Knowledge’ from abstract to measurable form with considerable economic value. Produces of knowledge exercise, in form of data, analyses and   documents etc., are being digitized increasingly and stored on servers across the globe building large knowledge warehouses [1,2,3]. Some of these are shared and rests are protected. Material value of these possessions are enormous and immensely attracts attention of cyber predators, armed with aggressive ICT tools and techniques. Cyber predators can now harm both material and digital possessions with digital tools. Thus, human possessions in either form; physical and digital, demands to be defended digitally and an environment of cyber dependence needs to be established. The scope of deliberation is vast though an attempt has been made to present a kaleidoscope of the issues that deserve attention [4,5,6].

Downloads

Download data is not yet available.

References

James W. Cortada, Ashish M. Gupta and Marc Le Noir; How the most advanced nations can remain competitive in the Information Age, IBM Institute for Business Value, IBM Global Business Services,

Dutta Avijit; Knowledge Ubiquity in WEB 2.0 Paradigm; Innovation in Information System and Technology, ITCDC ‘09 Macmillan Publications; Page 234-238,

Dutta Avijit; Collaborative Knowledge with Cloud Computing, Proceedings of the 4th National Conference, INDIACom – 2010,

Dutta Avijit; Digital Communication and Knowledge Society; BIJIT – 2012 Issue 8: (July - December, 2012 Vol.4 No.2)

Dutta Avijit; Agile Social Interaction on Virtual Plane; Proceedings of the 7th National Conference; INDIACom-2013,

Dutta A. (2018) Digital Security: An Enigma. In: Bokhari M., Agrawal N., Saini D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore DOI: https://doi.org/10.1007/978-981-10-8536-9_25

Dutta Avijit, Vinay Kumar; Managing Information Security in Digital Age, IJMSS, January 1, 2012

Dutta Avijit, Vinay Kumar; Evolution and Adoption of Social IT, Volume 8 Issue 2 2013, IMS Manthan DOI: https://doi.org/10.18701/imsmanthan.v8i2.5129

Jeffrey O. Kephart, David M. Chess, Autonomic Computing, IBM Thomas J. Watson Research Center, IEEE Computer Society 2003,

Kalle Lyytinen, Youngjin Yoo, The Next Wave of Nomadic Computing: A Research Agenda for Information Systems Research, Working Papers on Information Systems, Sprouts, ISSN 1535-6078

Karlene C. Cousins, Daniel Robey; Human agency in a wireless world: Patterns of technology use in nomadic computing environments; Information and Organization; Science Direct.

Krishna Venkata Subramanian and Sandeep K.S. Gupta, Security Solutions for Pervasive Healthcare P1: BINAYA DASH, December 8, 2006 11:58 AU7921 AU7921˙C015

Koroma J., Vartiainen M. (2018) From Presence to Multipresence: Mobile Knowledge Workers’ Densified Hours. In: Taylor S., Luckman S. (eds) The New Normal of Working Lives. Dynamics of Virtual Work. Palgrave Macmillan, Cham DOI: https://doi.org/10.1007/978-3-319-66038-7_9

L. Kleinrock; Nomadic Computing; Computer Science Department Los Angeles, California, USA

Mark Burgin and Eugene Eberbach, Evolutionary Computation and the Processes of Life; an ACM publication August, 2012; DOI: https://doi.org/10.1145/2351436.2351437

Satyanarayanan M, Pervasive Computing: Vision and Challenges; School of Computer Science Carnegie Mellon University

TechTarget, Security Media Group, Information Security, October 2014, Vol 16, No 8.

Tim O’Reilly and John Battelle; Web Squared: Web 2.0 Five Years On; Special Report

Thomas F. La Porta, Krishan K. Sabnani, Richard D. Gitlin; Challenges for Nomadic Computing: Mobility Management and Wireless Communications; Bell Laboratories

Weiser, M. The, The Computer for the 21st Century, Scientific American, September 1991, Pages 94-104 DOI: https://doi.org/10.1038/scientificamerican0991-94

Weiser, M, Brown, J.S.The Coming Age of Calm Technology, TECHNOLOGY1 Xerox PARC October 5, 1996

https://www.itu.int/dms_pub/itu-d/opb/str/d-str-gci.01-2017-pdf-e.pdf

http://en.wikipedia.org/wiki/Transmission_Control_Protocol

http://en.wikipedia.org/wiki/Public_key_infrastructure

https://en.wikipedia.org/wiki/Cellular_network,

https://www.owasp.org/index.php/Main_Page

Downloads

Published

2020-06-08

How to Cite

Dutta, A. (2020). IN SEARCH FOR CYBER DEPENDENCE. International Journal of Research -GRANTHAALAYAH, 7(12), 1–25. https://doi.org/10.29121/granthaalayah.v7.i12.2019.294