THE CRIMINALS IN A CYBER ENVIRONMENT USING COMPUTER NETWORKS

Author: 
Jitender K Malik and Sanjaya Choudhury
Country: 
India
Abstract: 

In traditional and online trading environments, consumers are entitled to have their privacy respected. In traditional and online trading environments, consumers are entitled to have their privacy respected In traditional and online trading environments, consumers are entitled to have their privacy respected with little effort. At times, people forget or ignore the legal and ethical values of their actions. Consequently, cyber wrong s in different forms are increasing day by day: cracking/hacking, e-mail spoofing, spamming/Denial of Services (DOS attacks), carding (making false ATM Debit and Credit cards), cheating and fraud, assault by threat, impersonation, intellectual property rights (IPR) infringements (software piracy, infringement of copyright, trademark, patents, domain names, designs and service mark violation, theft of computer source code, etc.), online gambling and other financial crimes including the use of networking sites and phone networking to attack the victim by sending bogus mails or messages through internet, forgery, URL hijacking or squatting (using the domain name of another person in bad faith), cyber vandalism (destroying or damaging the data when a network service is stopped or disrupted), virus transmission, internet time thefts, pornography, cyber terrorism etc-the list is endless. Customer information has to pass through several hands; and the safety and security of a customer's personal information lies within the hands of the business. Therefore, security and privacy of the information are a major concern. E-commerce has a tremendous impact on copyright and other intellectual property rights (IPRs). The issues related to copyrights on digital content also lie unaddressed. From one perspective, the internet has been described as "the world's biggest copy machine." Generally, a trade mark can be owned by an individual, a company, or any sort of legal entity. When someone else tries to use that trademark with out authorization, it could be considered an entity. When someone else tries to use that trademark with out authorization, it could be considered an distinctive quality of the mark or trade on the owner's reputation, the trademark owner may seek damages.In the cyberspace, domain name infringements are rampant. The present study primarily intends to address the pitfalls in the present legal system and to evolve a strategy to regulate cyber crimes in India.
 

KeyWords: 

Cyber space, Critical infrastructure,Cyber Crimes, Internet, Netizen

Volume & Issue: 
Vol. 4, Issue, 12
Pages: 
1416-1422
Download PDF: