Skip to main content
Erschienen in: Global Journal of Flexible Systems Management 1/2018

24.11.2017 | Original Research

Alignment of IT Authority and Citizens of Proposed Smart Cities in India: System Security and Privacy Perspective

verfasst von: Sheshadri Chatterjee, Arpan Kumar Kar, M. P. Gupta

Erschienen in: Global Journal of Flexible Systems Management | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The entire world is trying to provide modern facilities as well as updated amenities to their citizens. As such, attempts are being made to establish smart cities or to convert cities or a portion of the big city into smart cities throughout the globe. Most of the countries are trying to provide world-class facilities to its citizens, and India is also gearing up to make its smart city project a success. Both private sector and Government departments along with citizens are trying to work together to achieve this goal. The ministry of Urban Development of Government of India at the top level has proposed to create 100 smart cities throughout India where its residents could be provided with all modern facilities which will include all possible IT-enabled services to its citizens of the proposed smart cities. To make the Indian smart city dream a success and to provide best IT-enabled services with best performance and reliability, many factors of diversified nature are required to be considered. In this paper, we have primarily considered two important factors, that is, the level of expertise of the internal IT staff to develop and support the IT-enabled services in the proposed smart cities and the citizens’ participation to use the IT-enabled services with focusing special attention on the security and privacy aspects. Although many studies have been carried out in terms of security and privacy issues of IT-enabled services, there are very few studies conducted on the aspect of system security and privacy policy on the proposed Indian smart cities considering internal IT staff and potential residents of these proposed smart cities. This study will help to understand how the system security and privacy policy influence the adoption of IT-enabled services by the potential inhabitants of the proposed smart cities of India.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Angeles, R. (2007). An empirical study of the anticipated consumer response to RFID product item tagging. Industrial Management & Data Systems, 107(4), 461–483.CrossRef Angeles, R. (2007). An empirical study of the anticipated consumer response to RFID product item tagging. Industrial Management & Data Systems, 107(4), 461–483.CrossRef
Zurück zum Zitat Barclay, D., Thompson, R., & Higgins, C. (1995). The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use an illustration. Technology Studies, 2(2), 285–309. Barclay, D., Thompson, R., & Higgins, C. (1995). The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use an illustration. Technology Studies, 2(2), 285–309.
Zurück zum Zitat Barskar, R., Jayant, A., Bharti, J., Ahmed, G. F. (2010). The algorithm analysis of E-commerce security issues for online payment transaction system in banking technology. Journal of Computer Science and Information Security, 8(1), 307–312. Barskar, R., Jayant, A., Bharti, J., Ahmed, G. F. (2010). The algorithm analysis of E-commerce security issues for online payment transaction system in banking technology. Journal of Computer Science and Information Security, 8(1), 307–312.
Zurück zum Zitat Bartol, A., Hernandez-Serranoy, J., Soriano, M., Dohler, M., Kountouris, A., & Barthel, D. (2011). Security and privacy in your smart city. In Proceedings of Barcelona Smart Cities Congress, Barcelona, Spain, pp. 1–6. Bartol, A., Hernandez-Serranoy, J., Soriano, M., Dohler, M., Kountouris, A., & Barthel, D. (2011). Security and privacy in your smart city. In Proceedings of Barcelona Smart Cities Congress, Barcelona, Spain, pp. 1–6.  
Zurück zum Zitat Bresz, F. P. (2004). People-often the weakest link in security, but one of the best places to start. Journal of Health Care Compliance, 6(4), 57–60. Bresz, F. P. (2004). People-often the weakest link in security, but one of the best places to start. Journal of Health Care Compliance, 6(4), 57–60.
Zurück zum Zitat Chin, W. W. (1998). The partial least square approach to structural equation modeling. In G. A. Marcoulides (Ed.), Modern methods for business research (pp. 295–336). Mahwah, NJ: Erlbaum. Chin, W. W. (1998). The partial least square approach to structural equation modeling. In G. A. Marcoulides (Ed.), Modern methods for business research (pp. 295–336). Mahwah, NJ: Erlbaum.
Zurück zum Zitat Cranor, L. F., & Resnick, P. (2000). Protocol for automated negotiations with buyer anonymity and seller reputation. Netnomics, 2, 1–23.CrossRef Cranor, L. F., & Resnick, P. (2000). Protocol for automated negotiations with buyer anonymity and seller reputation. Netnomics, 2, 1–23.CrossRef
Zurück zum Zitat Culnan, M. J., & Pamcle, K. A. (1999). Information privacy concern, procedural fairness and impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115.CrossRef Culnan, M. J., & Pamcle, K. A. (1999). Information privacy concern, procedural fairness and impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115.CrossRef
Zurück zum Zitat DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten year update. Journal of Management Information Systems, 19(4), 9–30.CrossRef DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten year update. Journal of Management Information Systems, 19(4), 9–30.CrossRef
Zurück zum Zitat Dijkstra, T. (1985). Latent variables in linear stochastic models: Reflections on maximum likelihood and partial list square methods (2nd ed.). Amsterdam: Socio Economic Research Foundation. Dijkstra, T. (1985). Latent variables in linear stochastic models: Reflections on maximum likelihood and partial list square methods (2nd ed.). Amsterdam: Socio Economic Research Foundation.
Zurück zum Zitat Dutta, A., & McCrohan, K. (2002). Management’s role in information security in a cyber economy. California Management Review, 45(1), 67–87.CrossRef Dutta, A., & McCrohan, K. (2002). Management’s role in information security in a cyber economy. California Management Review, 45(1), 67–87.CrossRef
Zurück zum Zitat Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. JMR, Journal of Marketing Research, 18(1), 39–50.CrossRef Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. JMR, Journal of Marketing Research, 18(1), 39–50.CrossRef
Zurück zum Zitat Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issue. Journal of Public & Marketing, 12, 106–119. Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issue. Journal of Public & Marketing, 12, 106–119.
Zurück zum Zitat Galanxhi-Janaqi, H., & Nah, F. F.-H. (2004). U-commerce: Emerging trends and research issues. Industrial Management & Data Systems, 104(9), 744–755.CrossRef Galanxhi-Janaqi, H., & Nah, F. F.-H. (2004). U-commerce: Emerging trends and research issues. Industrial Management & Data Systems, 104(9), 744–755.CrossRef
Zurück zum Zitat Gefen, D. (2000). E-Commerce: The role of familiarity and trust. Omega: The International Journal of Management Science, 28, 725–737.CrossRef Gefen, D. (2000). E-Commerce: The role of familiarity and trust. Omega: The International Journal of Management Science, 28, 725–737.CrossRef
Zurück zum Zitat Greet, H. (1997). Cultures and organizations: Software of the mind (3rd ed.). New York: McGraw-Hill. Greet, H. (1997). Cultures and organizations: Software of the mind (3rd ed.). New York: McGraw-Hill.
Zurück zum Zitat Grover, P., & Kar, A. K. (2017). Big data analytics—A review on theoretical contributions and tools used in literature. Forthcoming in Global Journal of Flexible Systems Management, 18(3), 203–229.CrossRef Grover, P., & Kar, A. K. (2017). Big data analytics—A review on theoretical contributions and tools used in literature. Forthcoming in Global Journal of Flexible Systems Management, 18(3), 203–229.CrossRef
Zurück zum Zitat Hone, K., & Eloff, J. H. P. (2002). Information security policy—What do international security standards say. Computers & Security, 21(5), 402–409.CrossRef Hone, K., & Eloff, J. H. P. (2002). Information security policy—What do international security standards say. Computers & Security, 21(5), 402–409.CrossRef
Zurück zum Zitat Hulland, J. (1999). Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20(2), 195–204.CrossRef Hulland, J. (1999). Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20(2), 195–204.CrossRef
Zurück zum Zitat Jaiswal, P., & Bhal, K. T. (2014). Behavioural flexibility: The use of upward impression management tactics by subordinates for good performance rating from leader and impact of organizational & leader’s machiavellianism. Global Journal of Flexible Systems Management, 15(4), 313–326.CrossRef Jaiswal, P., & Bhal, K. T. (2014). Behavioural flexibility: The use of upward impression management tactics by subordinates for good performance rating from leader and impact of organizational & leader’s machiavellianism. Global Journal of Flexible Systems Management, 15(4), 313–326.CrossRef
Zurück zum Zitat Jeberson, W., Singh, G., & Sahu, G. P. (2011). Analysis of security measure implemented on G2C online payment systems in India. MIT International Journal of Computer Science and Information Technology, 1(1), 19–27. Jeberson, W., Singh, G., & Sahu, G. P. (2011). Analysis of security measure implemented on G2C online payment systems in India. MIT International Journal of Computer Science and Information Technology, 1(1), 19–27.
Zurück zum Zitat Kar, A. K., & Rakshit, A. (2015). Flexible pricing models for cloud computing based on group decision making under consensus. Global Journal of Flexible Systems Management, 16(2), 1–14.CrossRef Kar, A. K., & Rakshit, A. (2015). Flexible pricing models for cloud computing based on group decision making under consensus. Global Journal of Flexible Systems Management, 16(2), 1–14.CrossRef
Zurück zum Zitat Kelly, F. P. (1994). On tariffs, policing, and admission control of multi-service networks. Operational Research Letters, 15, 1–9.CrossRef Kelly, F. P. (1994). On tariffs, policing, and admission control of multi-service networks. Operational Research Letters, 15, 1–9.CrossRef
Zurück zum Zitat Lee, M., & Turban, E. (2001). A trust model for consumers’ internet shopping. International Journal of Electronic Commerce, 6, 35–59.CrossRef Lee, M., & Turban, E. (2001). A trust model for consumers’ internet shopping. International Journal of Electronic Commerce, 6, 35–59.CrossRef
Zurück zum Zitat Mangla, S. K., Kumar, P., & Barua, M. K. (2014). Flexible decision approach for analysing performance of sustainable supply chains under risks/uncertainty. Global Journal of Flexible Systems Management, 15(2), 113–130.CrossRef Mangla, S. K., Kumar, P., & Barua, M. K. (2014). Flexible decision approach for analysing performance of sustainable supply chains under risks/uncertainty. Global Journal of Flexible Systems Management, 15(2), 113–130.CrossRef
Zurück zum Zitat McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Academy of Management Review, 23(3), 473–490. McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Academy of Management Review, 23(3), 473–490.
Zurück zum Zitat Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192–222.CrossRef Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192–222.CrossRef
Zurück zum Zitat Nunnally, J. C., & Bernstein, I. H. (1978). Psychometric theory (2nd ed.). New York: McGraw Hill. ISBN-13: 978-0070478497. Nunnally, J. C., & Bernstein, I. H. (1978). Psychometric theory (2nd ed.). New York: McGraw Hill. ISBN-13: 978-0070478497.
Zurück zum Zitat Okerson, A. (1996). Who owns digital works? Scientific America, 275(1), 80–84.CrossRef Okerson, A. (1996). Who owns digital works? Scientific America, 275(1), 80–84.CrossRef
Zurück zum Zitat Piggott, S. (1950). Pre-historic India (p. 165). Harmondsworth: Penguin Books. Piggott, S. (1950). Pre-historic India (p. 165). Harmondsworth: Penguin Books.
Zurück zum Zitat Podsakoff, P. M., MacKenzie, S. B., & Lee, J. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.CrossRef Podsakoff, P. M., MacKenzie, S. B., & Lee, J. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.CrossRef
Zurück zum Zitat Ranganathan, C., & Ganapathy, S. (2002). Key dimensions of business-to-commerce websites. Information & Management, 39, 437–465.CrossRef Ranganathan, C., & Ganapathy, S. (2002). Key dimensions of business-to-commerce websites. Information & Management, 39, 437–465.CrossRef
Zurück zum Zitat Ronald, C., Carver, C., & Ferguson, A. (2007). Phishing for user security awareness. Computers & Security, 26, 73–80.CrossRef Ronald, C., Carver, C., & Ferguson, A. (2007). Phishing for user security awareness. Computers & Security, 26, 73–80.CrossRef
Zurück zum Zitat Rothensee, M., & Spiekermann, S. (2008). Between extreme rejection and cautious acceptance: consumers’ reactions to RFID-based IS in retail. Social Science Computer Review, 26(1), 75–86.CrossRef Rothensee, M., & Spiekermann, S. (2008). Between extreme rejection and cautious acceptance: consumers’ reactions to RFID-based IS in retail. Social Science Computer Review, 26(1), 75–86.CrossRef
Zurück zum Zitat Siala, H., O’Keefe, R. M., & Hone, K. S. (2004). The impact of religious affiliation on trust in the context of electronic commerce. Interacting with Computers, 16(1), 07–27.CrossRef Siala, H., O’Keefe, R. M., & Hone, K. S. (2004). The impact of religious affiliation on trust in the context of electronic commerce. Interacting with Computers, 16(1), 07–27.CrossRef
Zurück zum Zitat Standard British Institute. (2014). Smart city framework – Guide to establishing strategies for smart cities and communities. London: BSI. Standard British Institute. (2014). Smart city framework – Guide to establishing strategies for smart cities and communities. London: BSI.
Zurück zum Zitat Srikanth, V. (2012). E-commerce online security and trust marks. International Journal of Computer Engineering & Technology, 3(2), 238–255. Srikanth, V. (2012). E-commerce online security and trust marks. International Journal of Computer Engineering & Technology, 3(2), 238–255.
Zurück zum Zitat Standifer, R. L., & Wall, J. A. J. (2003). Managing conflict in B2B E-Commerce. Business Horizons, 46(2), 65–70.CrossRef Standifer, R. L., & Wall, J. A. J. (2003). Managing conflict in B2B E-Commerce. Business Horizons, 46(2), 65–70.CrossRef
Zurück zum Zitat Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441–469.CrossRef Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441–469.CrossRef
Zurück zum Zitat Sushil, (2015). Creating flexibility through technological and attitudinal change. Global Journal of Flexible Systems Management, 16(4), 309–311.CrossRef Sushil, (2015). Creating flexibility through technological and attitudinal change. Global Journal of Flexible Systems Management, 16(4), 309–311.CrossRef
Zurück zum Zitat Tripathy, B., & Mishra, J. (2013). Protective measures in E-Commerce to deal with security threats arising out of social issues—A framework. International Journal of Computer Engineering and Technology, 4(1), 46–53. Tripathy, B., & Mishra, J. (2013). Protective measures in E-Commerce to deal with security threats arising out of social issues—A framework. International Journal of Computer Engineering and Technology, 4(1), 46–53.  
Zurück zum Zitat Van der Heijden, H., Verhagen, T., & Creemers, M. (2003). Understanding on-line purchase intentions: Contribution from technology and trust perspectives. European Journal of Information System, 12(1), 47–48. Van der Heijden, H., Verhagen, T., & Creemers, M. (2003). Understanding on-line purchase intentions: Contribution from technology and trust perspectives. European Journal of Information System, 12(1), 47–48.
Zurück zum Zitat Van der Voet, H. (1994). Comparing the predictive accuracy of models using a simple randomization test. Chemometrics and Intelligent Laboratory Systems, 25(2), 313–323.CrossRef Van der Voet, H. (1994). Comparing the predictive accuracy of models using a simple randomization test. Chemometrics and Intelligent Laboratory Systems, 25(2), 313–323.CrossRef
Zurück zum Zitat Von Solms, B., & Von Solms, R. (2004). The ten deadly sins of information security management. Computers & Security, 23, 371–376.CrossRef Von Solms, B., & Von Solms, R. (2004). The ten deadly sins of information security management. Computers & Security, 23, 371–376.CrossRef
Zurück zum Zitat Wolcott, P., Press, L., McHenry, W., Goodman, S. E., & Foster, W. (2001). A framework for assessing the global diffusion of the internet. Journal of the Association for Information System, 2(6), 1–53.CrossRef Wolcott, P., Press, L., McHenry, W., Goodman, S. E., & Foster, W. (2001). A framework for assessing the global diffusion of the internet. Journal of the Association for Information System, 2(6), 1–53.CrossRef
Zurück zum Zitat Yasmin, S., & Hasseb, K. (2012). Cryptography best E-commerce security: A review. International Journal of Computer Science and Information Technology, 9(2), 132–137. Yasmin, S., & Hasseb, K. (2012). Cryptography best E-commerce security: A review. International Journal of Computer Science and Information Technology, 9(2), 132–137.
Zurück zum Zitat Yazdanifard, R., & Edres, N. A.-H. (2010). Security and privacy issues as a potential risk for further E-commerce development. In International Conference on Information, Communication and Management, IPCSIT (Vol. 16, pp. 23–27). Yazdanifard, R., & Edres, N. A.-H. (2010). Security and privacy issues as a potential risk for further E-commerce development. In International Conference on Information, Communication and Management, IPCSIT (Vol. 16, pp. 23–27).
Metadaten
Titel
Alignment of IT Authority and Citizens of Proposed Smart Cities in India: System Security and Privacy Perspective
verfasst von
Sheshadri Chatterjee
Arpan Kumar Kar
M. P. Gupta
Publikationsdatum
24.11.2017
Verlag
Springer India
Erschienen in
Global Journal of Flexible Systems Management / Ausgabe 1/2018
Print ISSN: 0972-2696
Elektronische ISSN: 0974-0198
DOI
https://doi.org/10.1007/s40171-017-0173-5

Weitere Artikel der Ausgabe 1/2018

Global Journal of Flexible Systems Management 1/2018 Zur Ausgabe

Premium Partner