Skip to main content

Advertisement

Log in

Alignment of IT Authority and Citizens of Proposed Smart Cities in India: System Security and Privacy Perspective

  • Original Research
  • Published:
Global Journal of Flexible Systems Management Aims and scope Submit manuscript

Abstract

The entire world is trying to provide modern facilities as well as updated amenities to their citizens. As such, attempts are being made to establish smart cities or to convert cities or a portion of the big city into smart cities throughout the globe. Most of the countries are trying to provide world-class facilities to its citizens, and India is also gearing up to make its smart city project a success. Both private sector and Government departments along with citizens are trying to work together to achieve this goal. The ministry of Urban Development of Government of India at the top level has proposed to create 100 smart cities throughout India where its residents could be provided with all modern facilities which will include all possible IT-enabled services to its citizens of the proposed smart cities. To make the Indian smart city dream a success and to provide best IT-enabled services with best performance and reliability, many factors of diversified nature are required to be considered. In this paper, we have primarily considered two important factors, that is, the level of expertise of the internal IT staff to develop and support the IT-enabled services in the proposed smart cities and the citizens’ participation to use the IT-enabled services with focusing special attention on the security and privacy aspects. Although many studies have been carried out in terms of security and privacy issues of IT-enabled services, there are very few studies conducted on the aspect of system security and privacy policy on the proposed Indian smart cities considering internal IT staff and potential residents of these proposed smart cities. This study will help to understand how the system security and privacy policy influence the adoption of IT-enabled services by the potential inhabitants of the proposed smart cities of India.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  • Angeles, R. (2007). An empirical study of the anticipated consumer response to RFID product item tagging. Industrial Management & Data Systems, 107(4), 461–483.

    Article  Google Scholar 

  • Barclay, D., Thompson, R., & Higgins, C. (1995). The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use an illustration. Technology Studies, 2(2), 285–309.

    Google Scholar 

  • Barskar, R., Jayant, A., Bharti, J., Ahmed, G. F. (2010). The algorithm analysis of E-commerce security issues for online payment transaction system in banking technology. Journal of Computer Science and Information Security, 8(1), 307–312.

    Google Scholar 

  • Bartol, A., Hernandez-Serranoy, J., Soriano, M., Dohler, M., Kountouris, A., & Barthel, D. (2011). Security and privacy in your smart city. In Proceedings of Barcelona Smart Cities Congress, Barcelona, Spain, pp. 1–6.  

  • Bresz, F. P. (2004). People-often the weakest link in security, but one of the best places to start. Journal of Health Care Compliance, 6(4), 57–60.

    Google Scholar 

  • Chin, W. W. (1998). The partial least square approach to structural equation modeling. In G. A. Marcoulides (Ed.), Modern methods for business research (pp. 295–336). Mahwah, NJ: Erlbaum.

    Google Scholar 

  • Cranor, L. F., & Resnick, P. (2000). Protocol for automated negotiations with buyer anonymity and seller reputation. Netnomics, 2, 1–23.

    Article  Google Scholar 

  • Culnan, M. J., & Pamcle, K. A. (1999). Information privacy concern, procedural fairness and impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115.

    Article  Google Scholar 

  • DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten year update. Journal of Management Information Systems, 19(4), 9–30.

    Article  Google Scholar 

  • Dijkstra, T. (1985). Latent variables in linear stochastic models: Reflections on maximum likelihood and partial list square methods (2nd ed.). Amsterdam: Socio Economic Research Foundation.

    Google Scholar 

  • Duhigg, C. (2012). How companies learn your secrets. The New York Times Magazine. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html. Accessed Oct 2016.

  • Dutta, A., & McCrohan, K. (2002). Management’s role in information security in a cyber economy. California Management Review, 45(1), 67–87.

    Article  Google Scholar 

  • Ernst & Young. (2008). Ernst & Young 2008 Global Information Security Survey. http://faisaldanka.wordpress.com/2008/10/20/ernst-young-2008-globa-informationsecurity-survey. Accessed 3 Oct 2016. 

  • Falconer, G., & Mitchell, S. (2012). Smart city framework: A systematic process for enabling smart + connected communities. http://www.cisco.com/c/dam/en_us/about/ac79/docs/ps/motm/Smart-City-Framework.pdf. Accessed Feb 2017.  

  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. JMR, Journal of Marketing Research, 18(1), 39–50.

    Article  Google Scholar 

  • Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issue. Journal of Public & Marketing, 12, 106–119.

    Google Scholar 

  • Galanxhi-Janaqi, H., & Nah, F. F.-H. (2004). U-commerce: Emerging trends and research issues. Industrial Management & Data Systems, 104(9), 744–755.

    Article  Google Scholar 

  • Gefen, D. (2000). E-Commerce: The role of familiarity and trust. Omega: The International Journal of Management Science, 28, 725–737.

    Article  Google Scholar 

  • Greet, H. (1997). Cultures and organizations: Software of the mind (3rd ed.). New York: McGraw-Hill.

    Google Scholar 

  • Grover, P., & Kar, A. K. (2017). Big data analytics—A review on theoretical contributions and tools used in literature. Forthcoming in Global Journal of Flexible Systems Management, 18(3), 203–229.

    Article  Google Scholar 

  • Hone, K., & Eloff, J. H. P. (2002). Information security policy—What do international security standards say. Computers & Security, 21(5), 402–409.

    Article  Google Scholar 

  • Hulland, J. (1999). Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20(2), 195–204.

    Article  Google Scholar 

  • Jaiswal, P., & Bhal, K. T. (2014). Behavioural flexibility: The use of upward impression management tactics by subordinates for good performance rating from leader and impact of organizational & leader’s machiavellianism. Global Journal of Flexible Systems Management, 15(4), 313–326.

    Article  Google Scholar 

  • Jeberson, W., Singh, G., & Sahu, G. P. (2011). Analysis of security measure implemented on G2C online payment systems in India. MIT International Journal of Computer Science and Information Technology, 1(1), 19–27.

    Google Scholar 

  • Kar, A. K., & Rakshit, A. (2015). Flexible pricing models for cloud computing based on group decision making under consensus. Global Journal of Flexible Systems Management, 16(2), 1–14.

    Article  Google Scholar 

  • Kelly, F. P. (1994). On tariffs, policing, and admission control of multi-service networks. Operational Research Letters, 15, 1–9.

    Article  Google Scholar 

  • Lee, M., & Turban, E. (2001). A trust model for consumers’ internet shopping. International Journal of Electronic Commerce, 6, 35–59.

    Article  Google Scholar 

  • LosHuertos, G. (2010). End of privacy—Herding Firesheep in Starbucks. CNN Money. http://money.cnn.com/2010/12/14/technology/firesheep_starbucks/index.htm. Accessed May 2016.

  • Mangla, S. K., Kumar, P., & Barua, M. K. (2014). Flexible decision approach for analysing performance of sustainable supply chains under risks/uncertainty. Global Journal of Flexible Systems Management, 15(2), 113–130.

    Article  Google Scholar 

  • McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Academy of Management Review, 23(3), 473–490.

    Google Scholar 

  • Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192–222.

    Article  Google Scholar 

  • Nunnally, J. C., & Bernstein, I. H. (1978). Psychometric theory (2nd ed.). New York: McGraw Hill. ISBN-13: 978-0070478497.

  • Okerson, A. (1996). Who owns digital works? Scientific America, 275(1), 80–84.

    Article  Google Scholar 

  • Piggott, S. (1950). Pre-historic India (p. 165). Harmondsworth: Penguin Books.

    Google Scholar 

  • Podsakoff, P. M., MacKenzie, S. B., & Lee, J. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.

    Article  Google Scholar 

  • Ranganathan, C., & Ganapathy, S. (2002). Key dimensions of business-to-commerce websites. Information & Management, 39, 437–465.

    Article  Google Scholar 

  • Ronald, C., Carver, C., & Ferguson, A. (2007). Phishing for user security awareness. Computers & Security, 26, 73–80.

    Article  Google Scholar 

  • Rothensee, M., & Spiekermann, S. (2008). Between extreme rejection and cautious acceptance: consumers’ reactions to RFID-based IS in retail. Social Science Computer Review, 26(1), 75–86.

    Article  Google Scholar 

  • Rouf, I., Miller, R., Mustafa, H., Taylor, T., Oh, S., & Xu, W. (2010). Security and privacy incredulities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of the 19th USENIX Conference on Security, Berkeley, CA, USA. USENIX Association. http://www.winlab.rutgers.edu/~gruteser/papers/xu_tpms10.pdf. Accessed Oct 2016.

  • Siala, H., O’Keefe, R. M., & Hone, K. S. (2004). The impact of religious affiliation on trust in the context of electronic commerce. Interacting with Computers, 16(1), 07–27.

    Article  Google Scholar 

  • Standard British Institute. (2014). Smart city framework – Guide to establishing strategies for smart cities and communities. London: BSI.

    Google Scholar 

  • Srikanth, V. (2012). E-commerce online security and trust marks. International Journal of Computer Engineering & Technology, 3(2), 238–255.

    Google Scholar 

  • Standifer, R. L., & Wall, J. A. J. (2003). Managing conflict in B2B E-Commerce. Business Horizons, 46(2), 65–70.

    Article  Google Scholar 

  • Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441–469.

    Article  Google Scholar 

  • Sushil, (2015). Creating flexibility through technological and attitudinal change. Global Journal of Flexible Systems Management, 16(4), 309–311.

    Article  Google Scholar 

  • Tripathy, B., & Mishra, J. (2013). Protective measures in E-Commerce to deal with security threats arising out of social issues—A framework. International Journal of Computer Engineering and Technology, 4(1), 46–53.  

  • Van der Heijden, H., Verhagen, T., & Creemers, M. (2003). Understanding on-line purchase intentions: Contribution from technology and trust perspectives. European Journal of Information System, 12(1), 47–48.

    Google Scholar 

  • Van der Voet, H. (1994). Comparing the predictive accuracy of models using a simple randomization test. Chemometrics and Intelligent Laboratory Systems, 25(2), 313–323.

    Article  Google Scholar 

  • Von Solms, B., & Von Solms, R. (2004). The ten deadly sins of information security management. Computers & Security, 23, 371–376.

    Article  Google Scholar 

  • Wolcott, P., Press, L., McHenry, W., Goodman, S. E., & Foster, W. (2001). A framework for assessing the global diffusion of the internet. Journal of the Association for Information System, 2(6), 1–53.

    Article  Google Scholar 

  • Yasmin, S., & Hasseb, K. (2012). Cryptography best E-commerce security: A review. International Journal of Computer Science and Information Technology, 9(2), 132–137.

    Google Scholar 

  • Yazdanifard, R., & Edres, N. A.-H. (2010). Security and privacy issues as a potential risk for further E-commerce development. In International Conference on Information, Communication and Management, IPCSIT (Vol. 16, pp. 23–27).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sheshadri Chatterjee.

Ethics declarations

Conflict of interest

The authors declare that they have no competing interests.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chatterjee, S., Kar, A.K. & Gupta, M.P. Alignment of IT Authority and Citizens of Proposed Smart Cities in India: System Security and Privacy Perspective. Glob J Flex Syst Manag 19, 95–107 (2018). https://doi.org/10.1007/s40171-017-0173-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40171-017-0173-5

Keywords

Navigation