Full Paper View Go Back
Information Assurance: The Way to Introduce In PG Education in India—A Policy Framework
P. K. Paul1 , P. S. Aithal2
Section:Research Paper, Product Type: Journal-Paper
Vol.7 ,
Issue.4 , pp.44-47, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijsrpas/v7i4.4447
Online published on Aug 31, 2019
Copyright © P. K. Paul, P. S. Aithal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: P. K. Paul, P. S. Aithal, “Information Assurance: The Way to Introduce In PG Education in India—A Policy Framework,” International Journal of Scientific Research in Physics and Applied Sciences, Vol.7, Issue.4, pp.44-47, 2019.
MLA Style Citation: P. K. Paul, P. S. Aithal "Information Assurance: The Way to Introduce In PG Education in India—A Policy Framework." International Journal of Scientific Research in Physics and Applied Sciences 7.4 (2019): 44-47.
APA Style Citation: P. K. Paul, P. S. Aithal, (2019). Information Assurance: The Way to Introduce In PG Education in India—A Policy Framework. International Journal of Scientific Research in Physics and Applied Sciences, 7(4), 44-47.
BibTex Style Citation:
@article{Paul_2019,
author = {P. K. Paul, P. S. Aithal},
title = {Information Assurance: The Way to Introduce In PG Education in India—A Policy Framework},
journal = {International Journal of Scientific Research in Physics and Applied Sciences},
issue_date = {8 2019},
volume = {7},
Issue = {4},
month = {8},
year = {2019},
issn = {2347-2693},
pages = {44-47},
url = {https://www.isroset.org/journal/IJSRPAS/full_paper_view.php?paper_id=1476},
doi = {https://doi.org/10.26438/ijcse/v7i4.4447}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.4447}
UR - https://www.isroset.org/journal/IJSRPAS/full_paper_view.php?paper_id=1476
TI - Information Assurance: The Way to Introduce In PG Education in India—A Policy Framework
T2 - International Journal of Scientific Research in Physics and Applied Sciences
AU - P. K. Paul, P. S. Aithal
PY - 2019
DA - 2019/08/31
PB - IJCSE, Indore, INDIA
SP - 44-47
IS - 4
VL - 7
SN - 2347-2693
ER -
Abstract :
Information is the core of today’s development. Each and every type of organizations and institutions and even individuals today depend on Information. Due to the huge amount of information generation, its management, and security become an important issue and as a result organizations are involving different strategies and techniques towards secure information and computing practice. The traditional documents also emerged hugely in recent past in an organization of its different department and divisions. Initially managing and securing information considered by the discipline of Computing, Information Science, and Information Technologies. But the gradual improved size of data and information led to the development of another subject called Computer Security. Information Technology Security developed thereafter, and that combines few fields viz. Network Security, Web Security, Database Security, etc. The manual information and documents are also important affairs to be noted and as a result, another subject evolved in academics, called ‘Information Security’; which incorporates existing IT Security. Information Assurance is the latest name in this context. This paper is conceptual in nature and kind of policy talks about the potential program on Information Assurance and allied nomenclature.
Key-Words / Index Term :
Information, Information Security, Higher Education, UGC, India, Information Science, Information Assurance, MSc- Information Assurance
References :
[1] Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3), 523-548.
[2] Burkell, J., & Carey, R. (2011). Personal Information and the Public Library: Compliance with Fair Information Practice Principles/Les renseignements personnels dans les bibliothèques publiques: le respect des principes d`équité dans les pratiques de collecte de renseignements. Canadian Journal of Information and Library Science, 35(1), 1-16.
[3] Ezingeard, J. N., McFadzean, E., & Birchall, D. (2005). A model of information assurance benefits. Information Systems Management, 22(2), 20-29.
[4] Hamill, J. T., Deckro, R. F., & Kloeber Jr, J. M. (2005). Evaluating information assurance strategies. Decision Support Systems, 39(3), 463-484.
[5] Höne, K., & Eloff, J. H. P. (2002). Information security policy—what do international information security standards say?. Computers & security, 21(5), 402-409.
[6] Knapp, K. J., Marshall, T. E., Kelly Rainer, R., & Nelson Ford, F. (2006). Information security: management`s effect on culture and policy. Information Management & Computer Security, 14(1), 24-36.
[7] Paul, P. K., Chatterjee, D., Bhuimali,A., Atarthy, A. (2016). Cyber Crime: An Important facet for promoting Digital Humanities—A Short Review in Saudi Journal of Humanities and Social Science, 1(1), 13-16
[8] Paul, P. K. & Aithal, P. S. (2018). Cyber Crime: Challenges, Issues, Recommendation and Suggestion in Indian Context, International Journal of Advanced Trends in Engineering and Technology, 3(1), 59-62.
[9] Paul, P. K., and Aithal, P. S. (2018) Cyber Security to Information Assurance: The Changing World of Cyber Sciences in Proceedings of National Conference on Quality in Higher education challenges & opportunities (ISBN: 978-93-5311-082-6), Srinivas University, 11-18.
[10] Pérez, L. C., Cooper, S., Hawthorne, E. K., Wetzel, S., Brynielsson, J., Gökce, A. G., ... & Philips, A. (2011, June). Information assurance education in two-and four-year institutions. In Proceedings of the 16th annual conference reports on Innovation and technology in computer science education-working group reports (pp. 39-53).
[11] Proia, A., Simshaw, D., & Hauser, K. (2015). Consumer cloud robotics and the fair information practice principles: Recognizing the challenges and opportunities ahead. Minn. JL Sci. & Tech., 16, 145.
[12] Schou, C. D., & Trimmer, K. J. (2004). Information assurance and security. Journal of Organizational and End User Computing, 16(3), 123-145.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.