Page Nos. Lcknowledgem Ibbreviations Ist of Cases Snts I - III IV - VII Viii-Ix 1 - 1 8

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

CONTENTS

Page Nos.

Lcknowledgem< snts i - iii


ibbreviations iv - vii
ist of Cases viii-ix
hapter-I INTRODUCTION 1-18
1.0. General Introduction
1.1. Computer Crime or an e-crime
1.2. Statement of the Problem
1.3. Objectives of the Study
1.4. Hypothesis
1.5. Research Methodology
1.6. Literature Review
1.7. Presentation of the Study

Chapter-II CONCEPTUAL ANALYSIS OF CYBER CRIME 19 - 65


2.0. History and Development of Internet
2.1. Evolution Nature and scope of Cyber Crime
2.2. Categories of Cyber Crime
2.3. Classification of Cyber Crime
2.4. Cyber Crime and Orgaruzed Crime
2.5. Cyber Crime and Legislation of Nations
2.6. Cyber Crime and Indian Position
2.7. Cyber Crimes other than those mentioned under the IT
Act
2.8. Challenges posed by Cyber Crime

Chapter-Ill CYBER CRIME AGAINST PERSON 66 -131


(A) DEFAMATION
3.0. Elements of Defamation
3.1. Cyber Defamation: A Socio-Economic Offence
3.2. Significant Aspects of Social and
Economic Offence
3.3. Cyber Defamation Position in Other Countries
3.4. Cyber Defamation and Information Technology
Act, 2000
3.5. Jurisdiction Issue in Cyber Defamation
(B) HACKING
3.6. Origin and Ethos
3.7. Who is a Hacker
3.8. Hacking without Intention
3.9. Hacking Specific Legislation: The UK,
The US and India
3.10. Case Situation in India
3.11. Hacking and Criminal Trespass
3.12. Comparative Study
3.13. Legal Position in the UK, US and India

Chapter-IV CYBER CRIME AGAINST SOCIETY (CYBER


PORNOGRAPHY) 132 - 1 6 4
4.0. Meaning & History
4.1. Cyber Pornography
4.2. Available Formats of Cyber Pornography
4.3. Child Pornography
4.4. Effects of Child Pornography
4.5. The Role of Internet in Promoting Child
Pornography
4.6. Legal Position in Various Countries

Chapter-V CYBER CRIME AGAINST GOVERNMENT


(CYBER TERRORISM) 165 - 209
5.0. Conceptual Framew^ork
5.1. Forms of Cyber Terrorism
5.2. Privacy Violation
5.3. Demolition of e-Governance Base
5.4. International Efforts in Combating Cyber
Terrorism
5.5. Laws in Various Countries on Cyber
Terrorism
5.6. Cyber Terrorism and Human Rights
5.7. Cyber Terrorism and Modern Terrorist
5.8. Technological Protection from Cyber Terrorism
5.9. Legal Protection from Cyber Terrorism

Chapter-VI LEGAL AND TECHNOLOGICAL MEASURES TO


COMBAT CYBER CRIME 210 - 260
6.0. Impact of Cyber Crime
6.1. Areas Ripe for Exploitation: National Security
6.2. Future Trends
6.3. Internet Governance Challenges and Constraints
6.4. The Indian Cyberspace
6.5. Need for a Comprehensive Cyber Security Policy
6.6. Need for a Nodal Authority
6.7. Need for an International Convention on
Cyberspace
6.8. Jurisdiction Issue
6.9. Cyber Crime and the Nature of Evidence

Chapter-VII Conclusion and Suggestions 261 - 277

Annexure Information Technology Act, 2000 278 - 330

Bibliography \-X\

You might also like