Page Nos. Lcknowledgem Ibbreviations Ist of Cases Snts I - III IV - VII Viii-Ix 1 - 1 8
This document is a table of contents for a book on cyber crime. It includes 7 chapters that cover an introduction to cyber crime, conceptual analysis of cyber crime, cyber crimes against persons such as defamation and hacking, cyber crimes against society like cyber pornography, cyber crimes against government like cyber terrorism, legal and technological measures to combat cyber crime, and a conclusion with suggestions. Each chapter is further broken down into sections that delve deeper into the topics covered.
Page Nos. Lcknowledgem Ibbreviations Ist of Cases Snts I - III IV - VII Viii-Ix 1 - 1 8
This document is a table of contents for a book on cyber crime. It includes 7 chapters that cover an introduction to cyber crime, conceptual analysis of cyber crime, cyber crimes against persons such as defamation and hacking, cyber crimes against society like cyber pornography, cyber crimes against government like cyber terrorism, legal and technological measures to combat cyber crime, and a conclusion with suggestions. Each chapter is further broken down into sections that delve deeper into the topics covered.
ibbreviations iv - vii ist of Cases viii-ix hapter-I INTRODUCTION 1-18 1.0. General Introduction 1.1. Computer Crime or an e-crime 1.2. Statement of the Problem 1.3. Objectives of the Study 1.4. Hypothesis 1.5. Research Methodology 1.6. Literature Review 1.7. Presentation of the Study
Chapter-II CONCEPTUAL ANALYSIS OF CYBER CRIME 19 - 65
2.0. History and Development of Internet 2.1. Evolution Nature and scope of Cyber Crime 2.2. Categories of Cyber Crime 2.3. Classification of Cyber Crime 2.4. Cyber Crime and Orgaruzed Crime 2.5. Cyber Crime and Legislation of Nations 2.6. Cyber Crime and Indian Position 2.7. Cyber Crimes other than those mentioned under the IT Act 2.8. Challenges posed by Cyber Crime
Chapter-Ill CYBER CRIME AGAINST PERSON 66 -131
(A) DEFAMATION 3.0. Elements of Defamation 3.1. Cyber Defamation: A Socio-Economic Offence 3.2. Significant Aspects of Social and Economic Offence 3.3. Cyber Defamation Position in Other Countries 3.4. Cyber Defamation and Information Technology Act, 2000 3.5. Jurisdiction Issue in Cyber Defamation (B) HACKING 3.6. Origin and Ethos 3.7. Who is a Hacker 3.8. Hacking without Intention 3.9. Hacking Specific Legislation: The UK, The US and India 3.10. Case Situation in India 3.11. Hacking and Criminal Trespass 3.12. Comparative Study 3.13. Legal Position in the UK, US and India
Chapter-IV CYBER CRIME AGAINST SOCIETY (CYBER
PORNOGRAPHY) 132 - 1 6 4 4.0. Meaning & History 4.1. Cyber Pornography 4.2. Available Formats of Cyber Pornography 4.3. Child Pornography 4.4. Effects of Child Pornography 4.5. The Role of Internet in Promoting Child Pornography 4.6. Legal Position in Various Countries
Chapter-V CYBER CRIME AGAINST GOVERNMENT
(CYBER TERRORISM) 165 - 209 5.0. Conceptual Framew^ork 5.1. Forms of Cyber Terrorism 5.2. Privacy Violation 5.3. Demolition of e-Governance Base 5.4. International Efforts in Combating Cyber Terrorism 5.5. Laws in Various Countries on Cyber Terrorism 5.6. Cyber Terrorism and Human Rights 5.7. Cyber Terrorism and Modern Terrorist 5.8. Technological Protection from Cyber Terrorism 5.9. Legal Protection from Cyber Terrorism
Chapter-VI LEGAL AND TECHNOLOGICAL MEASURES TO
COMBAT CYBER CRIME 210 - 260 6.0. Impact of Cyber Crime 6.1. Areas Ripe for Exploitation: National Security 6.2. Future Trends 6.3. Internet Governance Challenges and Constraints 6.4. The Indian Cyberspace 6.5. Need for a Comprehensive Cyber Security Policy 6.6. Need for a Nodal Authority 6.7. Need for an International Convention on Cyberspace 6.8. Jurisdiction Issue 6.9. Cyber Crime and the Nature of Evidence
Chapter-VII Conclusion and Suggestions 261 - 277
Annexure Information Technology Act, 2000 278 - 330