We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Cyber Law: Provisions and Anticipation

by Taraq Hussain Sheakh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 53 - Number 7
Year of Publication: 2012
Authors: Taraq Hussain Sheakh
10.5120/8432-2204

Taraq Hussain Sheakh . Cyber Law: Provisions and Anticipation. International Journal of Computer Applications. 53, 7 ( September 2012), 10-12. DOI=10.5120/8432-2204

@article{ 10.5120/8432-2204,
author = { Taraq Hussain Sheakh },
title = { Cyber Law: Provisions and Anticipation },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 53 },
number = { 7 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 10-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume53/number7/8432-2204/ },
doi = { 10.5120/8432-2204 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:54:31.369369+05:30
%A Taraq Hussain Sheakh
%T Cyber Law: Provisions and Anticipation
%J International Journal of Computer Applications
%@ 0975-8887
%V 53
%N 7
%P 10-12
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cyber law is a term used to portray the permissible issues related to the use of communication technology, predominantly "cyberspace", i. e. internet. It is less a distinct field of law in the way that property or contact are, as it is an intersection of many legal fields, including intellectual property, privacy, freedom of expression, and jurisdiction. In essence, cyber law is an endeavor to amalgamate the challenges presented by human bustle on the internet with bequest system of laws applicable to the physical world. The growth of Electronic commerce has propelled the need for vivacious and effective regulatory mechanisms which would further strengthen the legal infrastructure, so crucial to the success of electronic commerce. All these regulatory mechanisms and legal infrastructures come within the domain of Cyber law. This research paper tends to strike the drastic and immensely growing problem of cyber crime by taking some universal essentials and stature and also shows their preclusions.

References
  1. Cyber Crime: Practices and Policies for Its Prevention, The First International Conference on Interdisciplinary Research and Development, 31 May - 1 June 2011, Thailand byAjeet Singh Poonia, Dr. Awadesh Bhardwaj, Dr. G. S Dangayach.
  2. Computer Vulnerabilities, Eric Knight, CISSP, Electronic Edition, March 2000, release 4.
  3. Granville Williams
  4. Duggal Pawan
  5. Nagpal R. – What is Cyber Crime?
  6. www. unpan1. un. org/intradoc/groups/public/documents .
  7. www. cyberlawassociation. com.
  8. www. cyberlawonline. com.
  9. www. asianlaw. org/cyberlaw/library/index. html.
  10. www. smartsmart. in.
  11. www. indii. org/cyberlaw. aspx.
  12. Cyber Laws: provisions and preventions by Taraq Hussain.
  13. www. free-articals-searc. com.
  14. www. cyberlawcentral. com.
  15. www. thisbooksshop. com
  16. www. . csdms. in.
  17. www. cyberlawenforcement. org.
  18. www. cyber. law. harvard. edu.
  19. Zhou, J. ; Heckman, M. ; Reynolds, B. ; Carlson, A. ; Bishop, M. (2007). Modeling network intrusion detection alerts for correlation. ACM Transactions on Information and System Security (TISSEC), Volume 10, Issue 1, pp. -1-31.
  20. Sommer, R. ; Paxson, V. (2003). Enhancing byte-level network intrusion detection signatures with context. In: Proceedings of the 10th ACM conference on Computer and Communications Security, ACM, pp. 262-271.
  21. Pouzol, J. P. ; Ducass, E. M. (2002). Formal specifications of intrusion signatures and detection rules. In Proceedings of the Computer Security Foundation Workshop.
  22. Kruegel, C. ; Vigna, G. (2003). Anomaly detection of web-based attacks. Proceedings of the 10th ACM conference on Computer and communications security, ACM Press, New York, NY, USA, Pages: 251 – 261.
  23. Ghosh, A. K. ; Wanken, J. ; Charron, F. (1998). Detecting Anomalous and Unknown Intrusions against Programs. In Proceedings of the Annual Computer Security Applications Conference (ACSAC'98), pp. -259-267, Scottsdale, AZ.
  24. Cyber Crime and Punishment, Archaic Laws Threaten Global Information December 2000, by McConnell International.
Index Terms

Computer Science
Information Sciences

Keywords

Cyber law Cyber crime Cyberspace Fakesm