Advertisement

Alignment of IT Authority and Citizens of Proposed Smart Cities in India: System Security and Privacy Perspective

  • Sheshadri Chatterjee
  • Arpan Kumar Kar
  • M. P. Gupta
Original Research
  • 138 Downloads

Abstract

The entire world is trying to provide modern facilities as well as updated amenities to their citizens. As such, attempts are being made to establish smart cities or to convert cities or a portion of the big city into smart cities throughout the globe. Most of the countries are trying to provide world-class facilities to its citizens, and India is also gearing up to make its smart city project a success. Both private sector and Government departments along with citizens are trying to work together to achieve this goal. The ministry of Urban Development of Government of India at the top level has proposed to create 100 smart cities throughout India where its residents could be provided with all modern facilities which will include all possible IT-enabled services to its citizens of the proposed smart cities. To make the Indian smart city dream a success and to provide best IT-enabled services with best performance and reliability, many factors of diversified nature are required to be considered. In this paper, we have primarily considered two important factors, that is, the level of expertise of the internal IT staff to develop and support the IT-enabled services in the proposed smart cities and the citizens’ participation to use the IT-enabled services with focusing special attention on the security and privacy aspects. Although many studies have been carried out in terms of security and privacy issues of IT-enabled services, there are very few studies conducted on the aspect of system security and privacy policy on the proposed Indian smart cities considering internal IT staff and potential residents of these proposed smart cities. This study will help to understand how the system security and privacy policy influence the adoption of IT-enabled services by the potential inhabitants of the proposed smart cities of India.

Keywords

Adoption Citizens E-governance Flexibility Privacy Smart city of India System security User experience 

Notes

Compliance with Ethical Standards

Conflict of interest

The authors declare that they have no competing interests.

References

  1. Angeles, R. (2007). An empirical study of the anticipated consumer response to RFID product item tagging. Industrial Management & Data Systems, 107(4), 461–483.CrossRefGoogle Scholar
  2. Barclay, D., Thompson, R., & Higgins, C. (1995). The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use an illustration. Technology Studies, 2(2), 285–309.Google Scholar
  3. Barskar, R., Jayant, A., Bharti, J., Ahmed, G. F. (2010). The algorithm analysis of E-commerce security issues for online payment transaction system in banking technology. Journal of Computer Science and Information Security, 8(1), 307–312.Google Scholar
  4. Bartol, A., Hernandez-Serranoy, J., Soriano, M., Dohler, M., Kountouris, A., & Barthel, D. (2011). Security and privacy in your smart city. In Proceedings of Barcelona Smart Cities Congress, Barcelona, Spain, pp. 1–6.  Google Scholar
  5. Bresz, F. P. (2004). People-often the weakest link in security, but one of the best places to start. Journal of Health Care Compliance, 6(4), 57–60.Google Scholar
  6. Chin, W. W. (1998). The partial least square approach to structural equation modeling. In G. A. Marcoulides (Ed.), Modern methods for business research (pp. 295–336). Mahwah, NJ: Erlbaum.Google Scholar
  7. Cranor, L. F., & Resnick, P. (2000). Protocol for automated negotiations with buyer anonymity and seller reputation. Netnomics, 2, 1–23.CrossRefGoogle Scholar
  8. Culnan, M. J., & Pamcle, K. A. (1999). Information privacy concern, procedural fairness and impersonal trust: An empirical investigation. Organization Science, 10(1), 104–115.CrossRefGoogle Scholar
  9. DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten year update. Journal of Management Information Systems, 19(4), 9–30.CrossRefGoogle Scholar
  10. Dijkstra, T. (1985). Latent variables in linear stochastic models: Reflections on maximum likelihood and partial list square methods (2nd ed.). Amsterdam: Socio Economic Research Foundation.Google Scholar
  11. Duhigg, C. (2012). How companies learn your secrets. The New York Times Magazine. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html. Accessed Oct 2016.
  12. Dutta, A., & McCrohan, K. (2002). Management’s role in information security in a cyber economy. California Management Review, 45(1), 67–87.CrossRefGoogle Scholar
  13. Ernst & Young. (2008). Ernst & Young 2008 Global Information Security Survey. http://faisaldanka.wordpress.com/2008/10/20/ernst-young-2008-globa-informationsecurity-survey. Accessed 3 Oct 2016. 
  14. Falconer, G., & Mitchell, S. (2012). Smart city framework: A systematic process for enabling smart + connected communities. http://www.cisco.com/c/dam/en_us/about/ac79/docs/ps/motm/Smart-City-Framework.pdf. Accessed Feb 2017.  
  15. Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. JMR, Journal of Marketing Research, 18(1), 39–50.CrossRefGoogle Scholar
  16. Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issue. Journal of Public & Marketing, 12, 106–119.Google Scholar
  17. Galanxhi-Janaqi, H., & Nah, F. F.-H. (2004). U-commerce: Emerging trends and research issues. Industrial Management & Data Systems, 104(9), 744–755.CrossRefGoogle Scholar
  18. Gefen, D. (2000). E-Commerce: The role of familiarity and trust. Omega: The International Journal of Management Science, 28, 725–737.CrossRefGoogle Scholar
  19. Greet, H. (1997). Cultures and organizations: Software of the mind (3rd ed.). New York: McGraw-Hill.Google Scholar
  20. Grover, P., & Kar, A. K. (2017). Big data analytics—A review on theoretical contributions and tools used in literature. Forthcoming in Global Journal of Flexible Systems Management, 18(3), 203–229.CrossRefGoogle Scholar
  21. Hone, K., & Eloff, J. H. P. (2002). Information security policy—What do international security standards say. Computers & Security, 21(5), 402–409.CrossRefGoogle Scholar
  22. Hulland, J. (1999). Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20(2), 195–204.CrossRefGoogle Scholar
  23. Jaiswal, P., & Bhal, K. T. (2014). Behavioural flexibility: The use of upward impression management tactics by subordinates for good performance rating from leader and impact of organizational & leader’s machiavellianism. Global Journal of Flexible Systems Management, 15(4), 313–326.CrossRefGoogle Scholar
  24. Jeberson, W., Singh, G., & Sahu, G. P. (2011). Analysis of security measure implemented on G2C online payment systems in India. MIT International Journal of Computer Science and Information Technology, 1(1), 19–27.Google Scholar
  25. Kar, A. K., & Rakshit, A. (2015). Flexible pricing models for cloud computing based on group decision making under consensus. Global Journal of Flexible Systems Management, 16(2), 1–14.CrossRefGoogle Scholar
  26. Kelly, F. P. (1994). On tariffs, policing, and admission control of multi-service networks. Operational Research Letters, 15, 1–9.CrossRefGoogle Scholar
  27. Lee, M., & Turban, E. (2001). A trust model for consumers’ internet shopping. International Journal of Electronic Commerce, 6, 35–59.CrossRefGoogle Scholar
  28. LosHuertos, G. (2010). End of privacy—Herding Firesheep in Starbucks. CNN Money. http://money.cnn.com/2010/12/14/technology/firesheep_starbucks/index.htm. Accessed May 2016.
  29. Mangla, S. K., Kumar, P., & Barua, M. K. (2014). Flexible decision approach for analysing performance of sustainable supply chains under risks/uncertainty. Global Journal of Flexible Systems Management, 15(2), 113–130.CrossRefGoogle Scholar
  30. McKnight, D. H., Cummings, L. L., & Chervany, N. L. (1998). Initial trust formation in new organizational relationships. Academy of Management Review, 23(3), 473–490.Google Scholar
  31. Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192–222.CrossRefGoogle Scholar
  32. Nunnally, J. C., & Bernstein, I. H. (1978). Psychometric theory (2nd ed.). New York: McGraw Hill. ISBN-13: 978-0070478497.Google Scholar
  33. Okerson, A. (1996). Who owns digital works? Scientific America, 275(1), 80–84.CrossRefGoogle Scholar
  34. Piggott, S. (1950). Pre-historic India (p. 165). Harmondsworth: Penguin Books.Google Scholar
  35. Podsakoff, P. M., MacKenzie, S. B., & Lee, J. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.CrossRefGoogle Scholar
  36. Ranganathan, C., & Ganapathy, S. (2002). Key dimensions of business-to-commerce websites. Information & Management, 39, 437–465.CrossRefGoogle Scholar
  37. Ronald, C., Carver, C., & Ferguson, A. (2007). Phishing for user security awareness. Computers & Security, 26, 73–80.CrossRefGoogle Scholar
  38. Rothensee, M., & Spiekermann, S. (2008). Between extreme rejection and cautious acceptance: consumers’ reactions to RFID-based IS in retail. Social Science Computer Review, 26(1), 75–86.CrossRefGoogle Scholar
  39. Rouf, I., Miller, R., Mustafa, H., Taylor, T., Oh, S., & Xu, W. (2010). Security and privacy incredulities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of the 19th USENIX Conference on Security, Berkeley, CA, USA. USENIX Association. http://www.winlab.rutgers.edu/~gruteser/papers/xu_tpms10.pdf. Accessed Oct 2016.
  40. Siala, H., O’Keefe, R. M., & Hone, K. S. (2004). The impact of religious affiliation on trust in the context of electronic commerce. Interacting with Computers, 16(1), 07–27.CrossRefGoogle Scholar
  41. Standard British Institute. (2014). Smart city framework – Guide to establishing strategies for smart cities and communities. London: BSI.Google Scholar
  42. Srikanth, V. (2012). E-commerce online security and trust marks. International Journal of Computer Engineering & Technology, 3(2), 238–255.Google Scholar
  43. Standifer, R. L., & Wall, J. A. J. (2003). Managing conflict in B2B E-Commerce. Business Horizons, 46(2), 65–70.CrossRefGoogle Scholar
  44. Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441–469.CrossRefGoogle Scholar
  45. Sushil, (2015). Creating flexibility through technological and attitudinal change. Global Journal of Flexible Systems Management, 16(4), 309–311.CrossRefGoogle Scholar
  46. Tripathy, B., & Mishra, J. (2013). Protective measures in E-Commerce to deal with security threats arising out of social issues—A framework. International Journal of Computer Engineering and Technology, 4(1), 46–53.  Google Scholar
  47. Van der Heijden, H., Verhagen, T., & Creemers, M. (2003). Understanding on-line purchase intentions: Contribution from technology and trust perspectives. European Journal of Information System, 12(1), 47–48.Google Scholar
  48. Van der Voet, H. (1994). Comparing the predictive accuracy of models using a simple randomization test. Chemometrics and Intelligent Laboratory Systems, 25(2), 313–323.CrossRefGoogle Scholar
  49. Von Solms, B., & Von Solms, R. (2004). The ten deadly sins of information security management. Computers & Security, 23, 371–376.CrossRefGoogle Scholar
  50. Wolcott, P., Press, L., McHenry, W., Goodman, S. E., & Foster, W. (2001). A framework for assessing the global diffusion of the internet. Journal of the Association for Information System, 2(6), 1–53.CrossRefGoogle Scholar
  51. Yasmin, S., & Hasseb, K. (2012). Cryptography best E-commerce security: A review. International Journal of Computer Science and Information Technology, 9(2), 132–137.Google Scholar
  52. Yazdanifard, R., & Edres, N. A.-H. (2010). Security and privacy issues as a potential risk for further E-commerce development. In International Conference on Information, Communication and Management, IPCSIT (Vol. 16, pp. 23–27).Google Scholar

Copyright information

© Global Institute of Flexible Systems Management 2017

Authors and Affiliations

  • Sheshadri Chatterjee
    • 1
  • Arpan Kumar Kar
    • 1
  • M. P. Gupta
    • 1
  1. 1.Indian Institute of Technology DelhiNew DelhiIndia

Personalised recommendations