

| Item type | Current library | Status | Barcode | |
|---|---|---|---|---|
|
|
. | Not for loan | LLM446 |
Table of Contents 1) Introduction ; 2) Statement Of Problem ; 3) Research Questions, Scope: Hypothesis And Methodology ; 4) Part I ; 5) Chapter 1-Constitution and policy making; 6) Chapter 2- Legal and Ethical Issues; i) Ethical Issues ; ii) Legal Issues ; 7) Chapter 3- Building a Risk Management Program ; i) Establishing a Risk Management Framework; 8) Chapter 4- Security Policy Elements and Procedures ; i) Security policy elements ; ii) Security related roles and responsibilities ; iii) Policy implementation and enforcement; iv) Access privilages; 9) Chapter 5- Internet Marketing Ethics Issues; i) Importance of Ethics on the Internet; ii) A Process Approach to Ethical Decision Making In Internet Research ; iii) Major tensions/considerations ; 10) Chapter 6- Ethical Issues and Employer Internet Usage; 11) Chapter 7- Digital forensics ; 12) Chapter 8- Infrastructure protection in India: Need of the hour; 13) Chapter 9- Unique Security Requirements and Controls ; 14) Part II - Risks to Our Security ; 15) Chapter 1- Information Technology Act And Cyber Terrorism ; i) National Security Risk Assessment; ii) National Security Strategy: Priority Risks ; iii) Other priority risks ; iv) Core characteristics of cyber terrorism ; v) Indian interpretation of cyber terrorism; 16) References.