|
|
Book
Details |
|
 |
|
|
 |
CONTENTS |
 |
CONTENTS:- Vol.1: 1. International perspectives on computer related crimes. 2. Criminal offences. 3. Internet related crimes. 4. The world wide web and legal resources. 5. Cyber terrorism and its network. 6. Menance of virus. 7. Intellectual property rights and law. 8. Privacy and its legal safeguards. 9. E-contract and law. 10. Evidence and law. 11. Electronic banking and legal support. 12. Bank related crimes. 13. Frauds and scams. 14. Cyber crime-robberies and its prevention. 15. Understanding forged and digital signatures. 16. Hackers, crackers and whackers attack. 17. Threat to information systems and security. 18. Cyber consumers and E-commerce. 19. Net work security. 20. Integrating cyber crime and law. Appendix: 1. Terrorism and the law. 2. The prevention of terrorism ordinance, 2001-at a glance. Bibliography. Index. Vol.2: 1. Conceptual framework. 2. Nature and scope. 3. Issues and concerns. 4. Computer related crimes and law. 5. Internet related scams and frauds. 6. Cyber terrorism and law enforcement. 7. Web sites-valuable legal resource. 8. Intellectual property rights and its legal safeguards. 9. Electronic documents and contract. 10. Electronic signatures. 11. Communication and convergence. 12. E-business. 13. Electronic commerce. 14. Electronic payment and legal implications. 15. Financial crimes and law. 16. The Information Technology Act, 2000-at a glance. |
 |
 |
DESCRIPTION |
 |
The word Cyberspace was coined by William Gibson in the science fiction-'Neuromancer' published in 1984. It is used as a means of denoting the apparent or virtual location within which electronic activities take place. The aggregation of Intranets, Internet and the World Wide Web is dubbed as cyberspace. The computer is a computing as well as communication tool. By 2005, 50 percent of Internet access would be through non-PC devices. The Internet has opened up a virtual heaven for the people for both good and bad, native to interact with lot of diverse cultures, and demographics. The very same virtues of Internet when gone in wrong hands or when exploited by people with malicious intentions make up a virtual hell. Copyright, theft, cracking, virus attacks etc. started sweeping with the growth medium and the present scenario, and their nature and magnitude. Cyber crime is the most recent type of crime, which affects many people. This is the biggest challenge for police, prosecutors and lawmakers. If we do not wake up now, we would be mere spectators in cyber world. The criminal provisions deal with offences such as tampering with source code, hacking into computer systems, publishing of obscene information and misuse of licenses and digital signature etc. Government efforts being done in India and abroad to stop such crimes, and looks closely on their success and failure. Cyber laws are those laws, which have been adapted or reinterpreted to govern or apply to transactions or interactions in cyber-space. Cyber laws cover these special enactments, which are specially designed to govern or apply to cyber space for example, the Electronic Commerce Act on the uniform computer, Information Transaction Act and the uniform Electronics Transaction Act recently approved in the US for adoption by the various US states. We need to learn from the experiences in other countries and to examine how our current contract laws could be applied to such contracts. The Information Technology Act 2000, is being implemented in India. Times have changed and we live in a digital age in which crimes transported over the same networks and to use integrated devices to overcome it. Just as overdose of regulation could halt the growth of technology just as the lack of clear and consistent law hinder progress. Thus a fine balance to be achieved between the two with due care and consideration. |
 |
|
|
|
|
 |
|
|
|