558
Views
5
CrossRef citations to date
0
Altmetric
Articles

Systems theoretic process analysis of information security: the case of aadhaar

&

References

  • Agrawal, S., S. Banerjee, and S. Sharma. 2017. Privacy and security of Aadhaar: A computer science perspective. Economic & Political Weekly 52 (37):1–23.
  • Allison, C. K., K. M. Revell, R. Sears, and N. A. Stanton. 2017. Systems Theoretic Accident Model and Process (STAMP) safety modelling applied to an aircraft rapid decompression event. Safety Science 98:159–66. doi:10.1016/j.ssci.2017.06.011.
  • Gostojić, S., G. Sladić, B. Milosavljević, and Z. Konjović. 2012. Context-sensitive access control model for government services. Journal of Organizational Computing and Electronic Commerce 22 (2):184–213. doi:10.1080/10919392.2012.667717.
  • Hall, H. J. 2017. Applying system-theoretic accident model process view to patient safety for treatment with oral chemotherapy and anti-cancer drugs. PhD. Diss., Massachusetts Institute of Technology.
  • Kabanda, S., M. Tanner, and C. Kent. 2018. Exploring SME cybersecurity practices in developing countries. Journal of Organizational Computing and Electronic Commerce 28 (3):269–82. doi:10.1080/10919392.2018.1484598.
  • Khanna, T., and A. Raina. 2014. Aadhaar: India’s unique identification system. Boston, MA: Harvard Business School Cases, Case No. 9-712-412.
  • Laux, D., A. Luse, B. Mennecke, and A. M. Townsend. 2011. Adoption of biometric authentication systems: Implications for research and practice in the deployment of end-user security systems. Journal of Organizational Computing and Electronic Commerce 21 (3):221–45. doi:10.1080/10919392.2011.590111.
  • Leveson, N. G. 2009. Technical and managerial factors in the NASA Challenger and Columbia losses: Looking forward to the future. In Controversies in science & technology - from climate to chromosomes, Vol. 2. Mary Ann Liebert, Inc. doi:10.1089/9780913113424.237.
  • Leveson, N. G. 2012. Engineering a safer world: Systems thinking applied to safety. The MIT Press. doi:10.1017/CBO9781107415324.004.
  • Nourian, A., and S. Madnick. 2018. A systems theoretic approach to the security threats in cyber physical systems applied to Stuxnet. IEEE Transactions on Dependable and Secure Computing 15 (1):2–13. doi:10.1109/TDSC.2015.2509994.
  • Pati, R. K., V. Kumar, and N. Jain. 2015. Analysis of Aadhaar: A project management perspective. IIM Kozhikode Society & Management Review 4 (2):124–35. doi:10.1177/2277975215610687.
  • Press Trust of India. 2018. Aadhaar becomes a plaything. The Telegraph. New Delhi, July 29. Accessed September 17, 2018. https://www.telegraphindia.com/india/aadhaar-becomes-a-plaything-248438?ref=india-hmstory-stry-dtl.
  • Raina, R. 2016. A systems perspective on cybersecurity in the cloud - Frameworks, metrics and migration strategy. PhD. Diss., Massachusetts Institute of Technology.
  • Rajput, A., and K. Gopinath. 2017. Towards a more secure Aadhaar. In Information systems security. ICISS 2017. Lecture notes in computer science, ed. R. Shyamasundar, V. Singh, and J. Vaidya, 283–300. Cham: Springer.
  • Raju, R. S., S. Singh, and K. Khatter. 2017. Aadhaar Card: Challenges and impact on digital transformation. Cornell University Library. http://arxiv.org/abs/1708.05117
  • Salim, H., and S. Madnick. 2016. Cyber safety: A systems theory approach to managing cyber security risks – Applied to TJX cyber attack. Working Paper. CISL, Sloan School of Management, Massachusetts Institute of Technology, Cambridge, MA.
  • Savage, S., and F. B. Schneider. 2010. Security is not a commodity: The road forward for cybersecurity research. A White Paper Prepared for the Computing Community Consortium Committee of the Computing Research Association. https://cra.org/ccc/resources/ccc-led-whitepapers/
  • Shapiro, S. S. 2016. Privacy risk analysis based on system control structures: Adapting system-theoretic process analysis for privacy engineering., Sanjose, CA. Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, 17–24. IEEE. doi:10.1109/SPW.2016.15.
  • Suares, C. 2018. Bank details of 1.34l Aadhaar holders ‘leaked’ from AP govt website. Deccan Chronicle. Hyderabad, April 25. Accessed September 17, 2018. https://www.deccanchronicle.com/nation/current-affairs/250418/aadhaar-leak-from-andhra-pradesh-site.html.
  • Vatsa, M., R. Singh, S. Bharadwaj, H. Bhatt, and R. Mashruwala. 2010. Analyzing fingerprints of Indian population using image quality: A UIDAI case study. International Workshop on Emerging Techniques and Challenges for Hand-Based Biometrics 1 (August):1–5. doi:10.1109/ETCHB.2010.5559279.
  • Young, W., and N. G. Leveson. 2014. An integrated approach to safety and security based on systems theory. Communications of the ACM 57 (2):31–35. doi:10.1145/2556938.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.