Aadhaar Card: Challenges and Impact on Digital Transformation

نویسندگان

  • Raja Siddharth Raju
  • Sukhdev Singh
  • Kiran Khatter
چکیده

Objectives: This paper presents a brief review on Aadhaar card, and discusses the scope and advantages of linking Aadhaar card to various systems. Further we present various cases in which Aadhaar card may pose security threats. The observations of Supreme Court of India are also presented in this paper followed by a discussion on the loopholes in the existing system. Methods: We conducted literature survey based on the various research articles, leading newspapers, case studies and the observations of Supreme Court of India, and categorized the various cases into three categories. Findings: Aadhaar project is one of the significant projects in India to bring the universal trend of digital innovation. The launch of this project was focused on the inter-operability of various e-governance functionalities to ensure the optimal utilization of Information, Communication and Technology Infrastructure. Towards this Government of India has recently made Aadhaar card mandatory for many government applications, and also has promoted Aadhaar enabled transactions. Improvements: There are many issues related to security and privacy of the Aadhaar data need to be addressed. This paper highlights such cases.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Aadhaar-Based Unified Payment Solution

In this paper, we propose to build an Aadhaar-Based Unified Payment Solution. The key idea is that a virtual wallet will be linked to the Aadhaar card number of the customer. After that, any identification unique to the person and linked with the Aadhaar card, be it something the person knows like secret Internet-banking password, be it something s/he carries like debit card/ credit card, somet...

متن کامل

Extension of Wiener’s Approach on Security on Aadhaar Card based ATM System

Cryptography is necessary for the security of the data which may in the form of text, audio and video. In general Symmetric and Asymmetric cryptographical methods are used for the above purpose. In which all types of data is converted into the binary number system. Due to non availability of the cryptographical system, hackers may have hack the data. For the strong security, various researcher ...

متن کامل

Challenges of the Iranian E-Banking Business Model in Digital Transformation

With advanced information and communication technology, the organizations’ business model has undergone fundamental changes. These changes are also observed in the banking industry. This research aims at explaining the Iranian electronic banking business model and recognizing its challenges in the transformation to digital banking, which is considered as the research innovation. In terms of met...

متن کامل

Privacy and Security of Aadhaar: A Computer Science Perspective

We investigate the privacy and security issues of Aadhaar from a technology point of view. Specifically, we investigate the possibilities of identification and authentication without consent using the Aadhaar number or biometric data, and unlawful access of Aadhaar data in the central repository. Our analysis suggests that privacy protection in Aadhaar will require a) an independent third party...

متن کامل

Digitalization and Sports Sponsorship Strategy: A Review and Research Agenda

Background. The sports industry has been transformed through digitalization processes. One traditional area of sports marketing strategy that has changed significantly is sponsorship. Objectives. To reveal how digitalization has impacted sports sponsorship strategies according to the findings of academic articles in leading sports management journals. In light of the dramatic transformation of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1708.05117  شماره 

صفحات  -

تاریخ انتشار 2017