Search results

1 – 8 of 8
Article
Publication date: 10 August 2020

Umar Bashir Mir, Swapnil Sharma, Arpan Kumar Kar and Manmohan Prasad Gupta

This paper aims to enlighten stakeholders about critical success factors (CSFs) in developing intelligent autonomous systems (IASs) by integrating artificial intelligence (AI…

2643

Abstract

Purpose

This paper aims to enlighten stakeholders about critical success factors (CSFs) in developing intelligent autonomous systems (IASs) by integrating artificial intelligence (AI) with robotics. It suggests a prioritization hierarchy model for building sustainable ecosystem for developing IASs.

Design/methodology/approach

This paper is based on the existing literature and on the opinion of 15 experts. All the experts have minimum of eight years of experience in AI and related technologies. The CSF theory is used as a theoretical lens and total interpretative structure modelling (TISM) is used for the prioritization of CSFs.

Findings

Developing countries like India could leverage IASs and associated technologies for solving different societal problems. Policymakers need to develop basic policies regarding data collection, standardized hardware, skilled manpower, funding and start-up culture that can act as building blocks in undertaking sustainable ecosystem for developing IASs and implementing national AI strategy. Clear-cut regulations need to be in place for the proper functioning of the ecosystem. Any technology that can function properly in India has better chances of working at the global level considering the size of the population.

Research limitations/implications

This paper had all its experts from India only, and that makes the limitation of this paper, as there is a possibility that some of the factors identified may not hold same significance in other countries.

Practical implications

Stakeholders will understand the critical factors that are important in developing sustainable ecosystem for IASs and what should be the possible order of activities corresponding to each CSF.

Originality/value

The paper is the first of its kind that has used the CSF theory and TISM methodology for the identification and prioritization of CSFs in developing IASs. Further, eight significant factors, that is, emerging economy multinational enterprises (EMNEs), governance, utility, manpower, capital, software, data and hardware, have come up as the most important factors in integrating AI with robotics in India.

Details

Digital Policy, Regulation and Governance, vol. 22 no. 4
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 25 August 2021

Umar Mir, Arpan Kumar Kar and Manmohan Prasad Gupta

This conceptual article’s primary aim is to identify the significant stakeholders of the digital identity system (DIS) and then highlight the impact of artificial intelligence…

Abstract

Purpose

This conceptual article’s primary aim is to identify the significant stakeholders of the digital identity system (DIS) and then highlight the impact of artificial intelligence (AI) on each of the identified stakeholders. It also recommends vital points that could be considered by policymakers while developing technology-related policies for effective DIS.

Design/methodology/approach

This article uses stakeholder methodology and design theory (DT) as a primary theoretical lens along with the innovation diffusion theory (IDT) as a sub-theory. This article is based on the analysis of existing literature that mainly comprises academic literature, official reports, white papers and publicly available domain experts’ interviews.

Findings

The study identified six significant stakeholders, i.e. government, citizens, infrastructure providers, identity providers (IdP), judiciary and relying parties (RPs) of the DIS from the secondary data. Also, the role of IdP becomes insignificant in the context of AI-enabled digital identity systems (AIeDIS). The findings depict that AIeDIS can positively impact the DIS stakeholders by solving a range of problems such as identity theft, unauthorised access and credential misuse, and will also open a possibility of new ways to empower all the stakeholders.

Research limitations/implications

The study is based on secondary data and has considered DIS stakeholders from a generic perspective. Incorporating expert opinion and empirical validation of the hypothesis could derive more specific and context-aware insights.

Practical implications

The study could facilitate stakeholders to enrich further their understanding and significance of developing sustainable and future-ready DIS by highlighting the impact of AI on the digital identity ecosystem.

Originality/value

To the best of the authors’ knowledge, this article is the first of its kind that has used stakeholder theory, DT and IDT to explain the design and developmental phenomenon of AIeDIS. A list of six significant stakeholders of DIS, i.e. government, citizens, infrastructure providers, IdP, judiciary and RP, is identified through comprehensive literature analysis.

Details

Journal of Science and Technology Policy Management, vol. 13 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 12 August 2014

Manmohan Chaturvedi, Abhishek Narain Singh, Manmohan Prasad Gupta and Jaijit Bhattacharya

The purpose of this paper is to attempt to fill the need to identify critical information security issues at national level, both technical and social in the Indian context, and…

1059

Abstract

Purpose

The purpose of this paper is to attempt to fill the need to identify critical information security issues at national level, both technical and social in the Indian context, and create a framework of these issues to provide interesting managerial insights about their hierarchy. Current literature advocates relevance of both technical and social issues in a potential framework to address national and organizational information security concerns. Such a framework can guide users in developing insight for strategy in the maize of important information security issues and their intricate interdependency.

Design/methodology/approach

Delphi methodology is used to identify a set of topical issues with help from members of a cyber security group. These issues are further analyzed using Interpretive Structural Modeling (ISM) to impose order and direction to the complex relationships among them.

Findings

The analysis using ISM creates a framework of these issues and provides interesting managerial insights about their hierarchy. These insights are used to recommend prioritized action for information security at national and organizational levels.

Research limitations/implications

The highlight of this research is ingenious deployment of two idea engineering methods in developing interpretable structural model of 25 information security issues. This model provides valuable insights and can guide the policy formulation. This is the key contribution of this paper. It needs hardly any emphasis on the need for continuous search of all technical and social issues and formulating policies and programs using experts” judgment in a rigorous manner. Subsequent research may scale up to the global level for extension and validation by empanelling Delphi experts from nations belonging to different regions. Time-variant analysis can be attempted with the help of System Dynamics Modeling using causal-loop diagrams to account for the supportive and inhibiting influences of various issues. This approach has the potential to generate more realistic insights that can inform policy formulation.

Practical implications

It brings about key information security issues connected with its various facets, viz. national/organizational level initiatives, supportive processes, capabilities and objectives. These issues, identified by Indian experts in the Indian context, offer a method that one could apply in other national contexts and see whether substantial differences occur, and how other experts prioritize these issues. The analysis of social issues along with technical issues using the ISM tool provides us insights that are considered applicable to a larger context than India. The policy and program formulations in other nations can benefit from the insights generated by this research. The fast-paced proliferation of technology and its resultant vulnerabilities have given birth to an underground economy of malware trading by criminals, terrorists and hostile nation states. Secure cyber space for legitimate use by the globalized world can only be achieved by international cooperation.

Social implications

A “digital divide” in cyber defense cannot be afforded. As explained earlier, cyber security is a challenge for both developed and developing nations. Prioritization of resources in a sequence suggested by ISM analysis would help face the challenge of cyber security better. The methodology suggested in this paper would ensure adequate response to cyber threats and eliminate knee-jerk reaction.

Originality/value

This research emphasizes identification of hierarchical relationship among the identified topical issues of information security rather than using them as a flat checklist. It helps us segregate the end objectives from root issues and highlights the necessity of addressing these root issues to achieve those objectives.

Details

Transforming Government: People, Process and Policy, vol. 8 no. 3
Type: Research Article
ISSN: 1750-6166

Keywords

Abstract

Details

Journal of Science and Technology Policy Management, vol. 13 no. 3
Type: Research Article
ISSN: 2053-4620

Content available
Book part
Publication date: 25 July 2023

Deepa Jain, Manoj Kumar Dash and K.S. Thakur

Abstract

Details

The Sustainability of Financial Innovation in E-Payment Systems
Type: Book
ISBN: 978-1-80455-884-3

Article
Publication date: 9 May 2016

Ewan Sutherland

This paper aims to review the licensing in India, including the development of universal licences and of the now infamous 2G spectrum scam.

Abstract

Purpose

This paper aims to review the licensing in India, including the development of universal licences and of the now infamous 2G spectrum scam.

Design/methodology/approach

This paper is a case study drawing on a side range of official documents, including inquiry reports, policies, licences and court judgements.

Findings

Liberalisation of the sector introduced opportunities for lobbying and corruption that lead to very unusual market structures, with many operators and too little spectrum.

Research limitations/implications

Interviews with the principals were impossible.

Practical implications

It is now necessary for the government to adopt good governance processes, especially in respect of 4G and th inevitable consolidation of operators in a fair and equitable manner.

Social implications

The governance systems are incapable of controlling the corruption in the telecommunications sector and require substantial redesign.

Originality/value

The paper is the first to relate corporate political activity and corruption to outcomes in the telecommunications sector in India.

Details

info, vol. 18 no. 3
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 6 March 2007

Madhu Ranjan Kumar and Shankar Sankaran

This paper seeks to argue against the conventional wisdom in the current TQM literature that hierarchy is not conducive for TQM. It aims to identify the cultural dynamics that can…

8579

Abstract

Purpose

This paper seeks to argue against the conventional wisdom in the current TQM literature that hierarchy is not conducive for TQM. It aims to identify the cultural dynamics that can aid TQM implementation in a hierarchical country like India.

Design/methodology/approach

The paper reflects on the existing literature on culture and TQM and develops a mechanism that explains why hierarchy hinders TQM implementation in Western culture and how it can support TQM implementation in Indian culture.

Findings

In a people oriented culture like those of Japan and India, nurturance is the juice that sustains hierarchy that finally morphs into collectivism. In these social systems, there need not be conflicting impact of hierarchy and collectivism on TQM implementation if the nurturance aspect of hierarchy is understood. Thus, in the Indian context, hierarchy, operationalised through the guru‐shishya (teacher‐student) relationship between the boss and the subordinate can develop a learning orientation among the organisational members and facilitate TQM implementation. Similarly, by superimposing the element of “equity” on the “personalised relationship” dimension of hierarchy, in a collectivistic society like India, it is possible to elevate the aspect of “personalised relationship” between superior and subordinate to the status of “individualised consideration” dimension of transformational leadership provided it is bestowed only upon the satisfactory completion of “task” by the subordinate.

Practical implications

This paper shows how the cultural aspect of TQM implementation should be handled in a high power distance country like India.

Originality/value

The paper identifies the two Indian cultural aspects that can facilitate TQM implementation in India notwithstanding the hierarchical Indian values.

Details

The TQM Magazine, vol. 19 no. 2
Type: Research Article
ISSN: 0954-478X

Keywords

Article
Publication date: 8 April 2014

Dilip Diwakar G.

The reduction in under nutrition is very slow in the past two decades in India even with high-economic growth rate and expansion in the ICDS programme. The ICDS evaluation studies…

Abstract

Purpose

The reduction in under nutrition is very slow in the past two decades in India even with high-economic growth rate and expansion in the ICDS programme. The ICDS evaluation studies majorly stressed on the general factors but they fail to acknowledge the structural factors - class and caste - while providing solutions. In Tamil Nadu nutritional status and utilization of ICDS services are better as compared to all-India average. The purpose of this paper is to explore the nutritional status of the poor and scheduled caste (SC) in Tamil Nadu and their utilization of ICDS services and to examine the role of group-specific factors in low reduction of nutritional status and utilization of ICDS programme.

Design/methodology/approach

Multivariate analysis and logistic regression method were used using SPSS.

Findings

The reduction of underweight is slow among the poorest and SC, moreover, the disparity between the richest and poorest as well as upper caste and SC is increasing. Logistic regression analysis shows that the poorest are marginalized, children belonging to poorer income group have higher chances of using the ICDS than the poorest and it is significant. After making the wealth quintile constant, the utilization of ICDS services across social groups showed that, though the poorest quintile has less access, within them the SC had utilized less compared to the other backward class (OBC). This indicates the poorest SCs are more vulnerable and marginalized across all quintiles and social groups.

Research limitations/implications

In Tamil Nadu there is no sufficient sample of other caste/tribe and scheduled tribe. It would have given more insight on the utilization pattern. Lack of qualitative data has limited in explaining few phenomena to get more insight.

Social implications

It will help the government to formulate more inclusive policy and address the issue of exclusion of marginalized people.

Originality/value

The main core argument was based on the Tamil Nadu National Family Health Survey (NFHS) III unit-level data.

Details

International Journal of Sociology and Social Policy, vol. 34 no. 3/4
Type: Research Article
ISSN: 0144-333X

Keywords

1 – 8 of 8