CFP last date
20 December 2024
Reseach Article

Privacy and Freedom Issues in Cyberspace with Reference to Cyber Law

by Indu Sharma, M. Afshar Alam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 145 - Number 3
Year of Publication: 2016
Authors: Indu Sharma, M. Afshar Alam
10.5120/ijca2016910185

Indu Sharma, M. Afshar Alam . Privacy and Freedom Issues in Cyberspace with Reference to Cyber Law. International Journal of Computer Applications. 145, 3 ( Jul 2016), 11-18. DOI=10.5120/ijca2016910185

@article{ 10.5120/ijca2016910185,
author = { Indu Sharma, M. Afshar Alam },
title = { Privacy and Freedom Issues in Cyberspace with Reference to Cyber Law },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 145 },
number = { 3 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 11-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume145/number3/25257-2016910185/ },
doi = { 10.5120/ijca2016910185 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:47:46.679506+05:30
%A Indu Sharma
%A M. Afshar Alam
%T Privacy and Freedom Issues in Cyberspace with Reference to Cyber Law
%J International Journal of Computer Applications
%@ 0975-8887
%V 145
%N 3
%P 11-18
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Privacy and freedom issues in cyber security with reference to IT law takes on important new meaning in cyberspace. Privacy and freedom of expression is said to be universally known for any individual’s fundamental right. But when we talk about these right in terms of cyber space, meaning comes out to be very different. Our constitution have various laws regarding this, how these laws plays different role when evaluated online and offline privacy and freedom of expression. This comes to be true when the source of the information is outside the jurisdiction of those endeavoring to control speech. Cyber world is both informational and interactive with lots of autonomy. As everything is available on internet which people do for their personal convenience including personal details, professional details, bank details, and even private keys of individuals. All these information can lead to a serious privacy risk. Along with that how much private data of an individual should be accessible to government. Also, Hate speech on internet, or speech designed to target, oppress or incite hatred or violence against a person or group based on cast, creed, race, religion, nationality, gender, sexual orientation, disability or other group characteristic, do not get effected by locations, time and boundaries. Due to the freely available internet services worldwide, incidents of profane talk has become known throughout the world within seconds and can cause serious repercussion. India presently does not have any specific legislation governing data protection or privacy especially in IT law. However, as per Article-21 which gives right to privacy and Section- 19A which deals with freedom of expression under The Constitution of Indian but still there working is not actively involved when it comes under cybercrime. Although India has come up with IT Act, 2000 and the subsequent amendment to it in 2008 yet it is not able to cover the complete boundaries of cybercrimes, like a very crucial issue of right to privacy. This only shows the imbalance between age old procedure adopted in India and the advancement which Indian society has made. The session focuses on the dynamics of cyber world with respect of privacy concerns and freedom issues with special reference to cyber laws of countries like India, European Nations and United States of America. The problem of how to reconcile all the conflicting claims arising out of the issues of privacy in the context of Internet exposure and the right to freedom of speech. The paper will raise all these issues and discuss the legal implications on the intrusion of the freedom of speech along with some case studies on privacy intrusion.

References
  1. Chun Cheng Niu , Kuan Cheng Zou , Yuan Ling Ou Yang, Guan Jie Tang, Yi Zou “Security and Privacy Issues of the Internet of Things”, September 2013
  2. Rehan Khan “Cyber Privacy Issues in India”, Article in Social Science Research Network(SSRN) Electronic journal, DOI: 10.2139/ssrn.2357266, January 2013
  3. Asou Aminnezhad, Ali Dehghantanha, Mohd Taufik Abdullah “A Survey on Privacy Issues in Digital Forensics”, International Journal of cyber security and digital forensics, The society of Digital Information and wireless communication, 2012(ISSN: 2305-0012)
  4. Alok Mishra, Deepti Mishra, “Web Privacy ; Issues, Legislations and Technological Challenges”, DOI: 10.4018/978-1-59904-804-8.ch001 , September 2008
  5. A. A. Sattikar , Dr. R. V. Kulkarni “A Review of Security and Privacy Issues in Social Networking”, International Journal of Computer Science and Information Technologies, Vol. 2 (6) , 2011, 2784-2787.
  6. R. Aggarwal “Dispute settlement for cyber crimes in India: An analysis”, DOI: 10.4018/978-1-4666-4209-6.ch015, January 2013
  7. Dr V.Kiran Kumar, “SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL NETWORKS”, International Journal on Web Service Computing (IJWSC), Vol.5, No.3, September 2014.
  8. Tuija Kuusisto, Rauno Kuusisto, “Cyber World as a Social System”, DOI: 10.1007/978-3-319-18302-2_2 , January 2015 In book: Cyber Security: Analytics, Technology and Automation, Publisher: Springer, Editors: Martti Lehto, Pekka Neittaanmäki, pp.31-43
  9. Mahantesh B Madiwalar, Prof(Dr.) B S Reddy “Privacy Rights and Data Protection In Cyber Space with Special Reference to E-Commerce”, Global Journal for Research Analysis, Volume-4, Issue-12, Dec-2015 • ISSN No 2277 – 8160.
  10. Sanaz Taheri Boshrooyeh, Alptekin Kupcu, Oznur Ozkasap “Security and Privacy ofDistributed Online Social Networks”, Conference: IEEE ICDCS (International Conference on Distributed Computing Systems) Workshop ESP-DGC, At Columbus, Ohio
  11. Albert I. Aldesco, The Demise of Anonymity: A Constitutional Challenge to the Convention on Cybercrime, 23 Loy. L.A. Ent . L. Rev. 81 (2002).
  12. Ann Beeson, Top Ten Threats to Civil Liberties in Cyberspace, HUM.RTS., Spring 1996, at 10, 10
  13. Privacy and Human Rights, An International Survey of Privacy Laws and Practise, Global Internet Liberty Campaign at www.gilc.org/ privacy/survey/intro.htmlaccessedon23rd August,2013
  14. Gupta, Rohit K. (2013). India : An Overview of Cyber Laws vs. Cyber Crimes : In Indian Perspective at www.mondaq.com accessed on 4th December,2013
  15. Report on ‘Cyber Security and Right to Privacy’ submitted by the Parliamentary Standing Committee on Information Technology presented on Feb. 12, 2014 under the Chairmanship of Rao Inderjit Singh to the fifteenth Lok Sabha.
  16. A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, “Measurement and analysis of online social networks,” in Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pp. 29–42, ACM, 2007.
  17. S. R. Chowdhury, A. R. Roy, M. Shaikh, and K. Daudjee, “A taxonomy of decentralized online social networks,” Peer-to-Peer Networking and Applications , pp. 1–17, 2014.
  18. https://factly.in/cyber-crimes-in-india-which-state-tops-the-chart/
  19. M. Beye, A. Jeckmans, Z. Erkin, P. Hartel, R. Lagendijk, and Q. Tang, “Literature overview-privacy in online social networks,” Centre for Telematics and Information Technology, University of Twente, 2010.
  20. S. Jahid and N. Borisov, “Enhancing security and privacy in online social networks,” Technical Report, Illinois University, 2012.
  21. A. Sattikar and D. R. Kulkarni, “A review of security and privacy issues in social networking,”International Journal of Computer Science and Information Technologies , vol. 2, no. 6, pp. 2784–2787, 2011
  22. E. Novak and Q. Li, “A survey of security and privacy in online social networks,” College of William and Mary Computer Science Technical Report , 2012.
  23. M. M. Lucas and N. Borisov, “Flybynight: mitigating the privacy risks of social networking,” inProceedings of the 7th ACM workshop on Privacy in the electronic society , pp. 1–8, ACM, 2008.
  24. A. J. Feldman, A. Blankstein, M. J. Freedman, and E. W. Felten, “Social networking with frientegrity: Privacy and integrity with an untrusted provider.,” in USENIX Security Symposium, pp. 647–662, 2012
  25. R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin,“Persona: an online social network with user-defined privacy,” in ACM SIGCOMM Computer Communication Review, vol. 39, pp. 135–146, ACM, 2009
  26. C. Zhang, J. Sun, X. Zhu, and Y. Fang, “Privacy and security for online social networks: challenges and opportunities,” Network, IEEE, vol. 24,no. 4, pp. 13–18, 2010
  27. Cyber laws related to privacy and freedom issues retrieved from http://www.cyberlawsindia.net/lawyering.html
  28. P. Jain, P. Jain, and P. Kumaraguru, “Call me maybe: Understanding nature and risks of sharing mobile numbers on online social networks,” in Proceedings of the first ACM conference on Online social networks, pp. 101–106, ACM, 2013.
  29. Joshi and C.-C. Kuo, “Security and privacy in online social networks: A survey,” inMultimedia and Expo (ICME), 2011 IEEE International Conference on, pp. 1–6, IEEE, 2011
  30. Chung, W. & Paynter, J. (2002). Privacy issues on the Internet. Proceedings of the 35th Hawaii Internaional Conference on System Sciences.
  31. Davis, J. (2000). Protecting privacy in the cyber era. IEEE Technology and Society Magazine, Summer, 10-22.
  32. Earp, J.B., Anton, A.I., Aiman-Smith, L., & Stufflebeam, W.H. (2005). Examining Internet privacy policies within the context of user privacy values, 52(2) 227237.
  33. Article: By freedom house – About freedom on the net. Retrieved from https://freedomhouse.org/report-types/freedom-net
  34. Frank Y.W. Law et al, “Protecting Digital Data Privacy in Computer Forensic Examination,” Systematic Approaches to Digital Forensic Engineering (SADFE), 2011.
  35. “Cyber Crimes and the Society”, Post Graduate Diploma in Cyber laws & Cyber Forensics, Distance Education Department National Law School of India University, p-84.
  36. European Union Agency for Fundamental Rights retrieved from http://fra.europa.eu/en/theme/information-society-privacy-and-data-protection
  37. Maria Grazia Porcedda, “DATA PROTECTION AND THE PREVENTION OF CYBERCRIME: THE EU AS AN AREA OF SECURITY?”, EUI Working Papers, European University Institute, Department of law
  38. U.S. Federal of computer crime by SANS Institute is retrieved from https://www.sans.org/reading-room/whitepapers/legal/federal-computer-crime-laws-1446
Index Terms

Computer Science
Information Sciences

Keywords

Cyber cyberspace freedom of speech privacy cybercrime.