
Library Catalogue

| 000 -LEADER | |
|---|---|
| fixed length control field | 02426nam a2200181Ia 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20210719105533.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 210206s2020 xx 000 0 und |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | nls |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Aastha Agarwal |
| 245 #0 - TITLE STATEMENT | |
| Title | Cyber Terrorism: Analysis and Enforcement of Cyber Laws in India |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Bangalore |
| Name of publisher, distributor, etc. | NLSIU |
| Date of publication, distribution, etc. | 2020 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 73p. |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | TABLE OF CONTENT<br/>LIST OF SYMBOLS AND ABBREVIATION ;<br/>LIST OF STATUTES ;<br/>TABLE OF CASES ;<br/>1. INTRODUCTION;<br/>1.1 INTRODUCTION ;<br/>1.2 RESEARCH PROBLEM ;<br/>1.3 AIMS AND OBJECTIVE OF STUDY;<br/>1.4 HYPOTHESIS ;<br/>1.5 RESEARCH QUESTION ;<br/>1.6 METHODOLOGY;<br/>1.7 MODE OF CITATION ;<br/>1.8 LIMITATIONS ;<br/>1.9 SCHEME OF STUDY ;<br/>2. REVIEW OF LITERATURE ;<br/>3. COMPREHENDING THE PROVISIONS OF INDIAN PENAL CODE.1860 IN TERMS OF CYBER· TERRORISM;<br/>3.1 DEFINITION;<br/>3.2 INDIAN PENAL CODE, 1860 DEALING WITH THE PROVISIONS RELATING TO CYBBROFFENCES;<br/>32.1 Cyber-offences: Amendment to the Indian Penal Code, 1860 ;<br/>32.2 Interpretation of the term 'War' under the ambit of Indian Penal Code, 1860;<br/>3.3 CONCLUSION;<br/>4. COMPREHENDING THE PROVISIONS OF INFORMATION TECHNOLOGY ACT. 2000 IN RELATION TO CYBER·TERRORISM;<br/>4.1 PROVISION UNDER INFORMATION TECHNOLOGY ACT, 2000 ;<br/>4.2 SECTION 66F OF THE IT ACT. ;<br/>42.1 Distributed denial of services ;<br/>42.2 Relevance of critical information structure;<br/>4.3 POWER OF GOVERNMENT TO UNDERTAKE ACTION REGARDING<br/>CYBER SECURITY ;<br/>43.1 Section 69: power of Government to issue directions ;<br/>43.2 Section 69A: power of Government to block public access to information on computer resources;<br/>43.3 Section 69B: power of Government to monitor and collect traffic data and Internet;<br/>4.4 ALTERATION OF SOURCE CODE UNDER SECTION 43 ;<br/>4.5 INFORMATION TECHNOLOGY RULES, 20 11: CONCERN ING CYBER art;<br/>4.6 CONCLUSION ;<br/>5. JUDICIAL INTERPRETATION CONCERNING CYBER·TERRORSIM<br/>5.1 POSITION IN USA ;<br/>5.1.1 Analysis of Rajib Mitra case ;<br/>5.1.2 Analysis of Ardit Ferzi case ;<br/>5.2 POSITION IN INDIA ;<br/>52.1 Analysis of Mehdi Masoor Biswas case ;<br/>52.2 Analysis of Ahmedabad Bomb Blast case.<br/>5.3 CONCLUSION ;<br/>6. CONCLUSION AND SUGGESTIONS;<br/>6.1 CONCLUSION ;<br/>6.2 SUGGESTIONS ;<br/>6.3 LOOPHOLES IN THE EXISTING LEGAL FRAMEWORK ;<br/>6.4 SUGGESTIONS TO REGULATE CYBERSPACE TO COMBAT CYBER·TERRORISM ;<br/>BIBLIOGRAPHY .<br/> |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Dr. Nagarathna A - Guide |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="http://opac.nls.ac.in:8081/xmlui/handle/123456789/391">http://opac.nls.ac.in:8081/xmlui/handle/123456789/391</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | Dissertation |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| . | . | 06.02.2021 | LLM807 | 06.02.2021 | 06.02.2021 | Dissertation |