

| Item type | Current library | Status | Barcode | |
|---|---|---|---|---|
|
|
. | Not for loan | LLM823 |
TABLE OF CONTENT
Candidate’s Declaration ;
Certificate;
Acknowledgement;
Table of content;
List of Abbreviation;
List of Cases;
Chapter I Introduction;
* Introduction;
* Statement of problem;
* Objective of the study;
* Scope and limitation;
* Hypothesis;
* Research question;
* Research methodology;
* Literature review;
* Tentative Chapterization;
Chapter II concept of the cybercrime and types of the cyber crime;
* Concept of cyber space;
* Modern concept of crime;
* Nature of Crimes;
* Fundamental Elements of Crime;
* Criminal Liability under Cyber Crimes;
* Meaning and concept of the cyber crime;
* Definition of Cyber crimes;
* Traditional Crime and Cyber Crime;
* Relation between Cyber Crime and Cyber Security;
* Elements of cyber security;
Types of cyber crime;
* Cybercrime against the person;
* Cyber crime against the property;
* Cyber crime against government;
* Cyber crime against society;
* Cyber crime during Covid-19;
Chapter IV Anaysis of Information Technology Act 2000;
* Application;
* Definition;
* Digital signature;
* Penalties;
* adjudication;
* Offences;
* Due diligence;
* Observation on ITA and ITAA;
Chapter IV Cases related to the cyber crime in India;
* Bois Locker Room case;
* Pune Citibank MphasiS Call Center Fraud;
* sony.sambandh.com case;
* The Bank NSP Case;
* SMC Pneumatics (India) Pvt. Ltd. vs. Jogesh Kwatra;
* Tamil Nadu Vs Suhas Katti AIR 2004;
* Cosmos Bank Cyber-Attack in Pune;
* Hack Attack on Indian Healthcare Websites;
* Shreya Singhal v Union of India;
* Ritu Kohali Case;
* Sanjay Kumar v. State of Haryana;
* Lakshmana Kailash K.case;
* Yahoo Inc. v Akash Arora & Anr;
* Mr. Arun Jaitley vs Network Solutions Private ltd;
* Sandeep Varghese Vs. State of Kerala;
* Syed Asifuddin & other v. The State of Andhra Pradesh & Another;
* Abhinav Gupta v. State of Haryana;
* National Association of Software v. Ajay Sood & Other;
* Shri Umashankar Sivasubramaniam v. ICICI Bank;
Chapter V Analysis of Information Technology laws of UK and US;
IT Laws of UK;
* Cyber security and the uk legal landscape;
* Computer misuse act, 1990;
* Computer misuse act amendments;
* Problems;
* Spam, malware and the law;
* The police and justice act 2006;
* European convention on cyber crime;
* Personal internet security;
* Crime and punishment;
* Using civil law to deal with cyber criminals;
* Balancing security and freedom;
IT Laws of US;
* Consumer privacy protection act 2017;
* Computer fraud and abuse act [cfaa];
* Electronics communication privacy act [ecpa];
* Federal laws;
* Federal cyber security laws;
Chapter VI Conclusion and Suggestions;
Table of statute;
Bibliography.