Legal Aspects of Business
Legal Aspects of Business
Legal Aspects of Business
com
+venkirohit7x@gmail.com
https://www.cyberralegalservices.com/detail-
1. Introduction casestudies.php
_Assigned to Novin Ignatius_
Commented [2]: +novingeoo@gmail.com
"The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be
https://oakland.edu/Assets/upload/docs/AIS/Syllabi/Tay
able to do more damage with a keyboard than with a bomb". ler_Research_Hypothesis.pdf
2. Aim
Nowadays there are many disturbing things happening in cyberspace. Due to the anonymous
nature of the Internet, it is possible to engage into a variety of criminal activities with impunity
and people with intelligence, have been grossly misusing this aspect of the Internet to perpetuate
criminal activities in cyberspace. Hence the need for cyber laws.
This research project aims to study the significance and effectiveness of the already present cyber
laws in India by analysing various cases, issues and judgements related to the same.
3. Hypothesis
The study assumes that…………. Commented [3]: +novingeoo@gmail.com
Its indeed high time to intrigue whether the existing laws and norms are sufficient enough to tackle Hypothesis should be something like this, as per the
thesis...
the various cyber crimes getting introduced into the cyber world day by day. http://repository.out.ac.tz/591/1/FAKI.pdf
_Assigned to Novin Ignatius_
Cyber Jurisdiction
5. Research Methodology
The present study shall collect, collate and analyze different judicial decisions of various courts.
Besides this, the study shall encompass different reports, books, law journals, statues of legislature.
Critical analysis of statutory enactments that is IT Act, 2000 as well as analysis of various statutes
operating in the field shall be made. The Judicial pronouncements of various courts in India would
also be examined..
6. Research Questions
Evaluating Existing Cyber Crime Policies: Do They Suffice in Today’s World?
7. Tentative Chapterisation
1. Introduction
2. Cyber Threats
2.1. Classification of Cyber Threats
2.1.1. Cyber Warfare
2.1.2. Cyber Crimes
2.1.3. Cyber Terrorism
2.1.4. Cyber Espionage
2.2. Scenario of Cyber Crimes in India
3. Indian Law Regime to Combat Cyber Crime
3.1. Cyber Laws
3.2. Information Technology Act, 2000
3.2.1. Major Provisions of the IT Act, 2000 and Amendment, 2008
3.3. National Cyber Security Policy
3.4. Cyber Crisis Management Plan
4. Cyber Jurisdiction
4.1. Judicial Response to Combat Cyber Crimes
4.2.
5. Analysis of judgements
5.1. Shreya Singhal versus Union of India
6. Conclusion and Suggestions
8. References
1. Lakshmanan, Annamalai. (2019). Literature review on Cyber Crimes and its Prevention
Mechanisms. 10.13140/RG.2.2.16573.51684.
2. S. Ghate; P. K. Agrawal, "A Literature Review on Cyber Security in Indian Context",
Journal of Computer & Information Technology, Volume 8, Issue 5, Page Number 30-36,
2017.
3. Animesh Sarmah, Roshmi Sarmah, Research journal(2017).”Study of cyber crime and Commented [5]: Opening and closing!!
6. Shreya Singhal Versus Union of India, Supreme court civil jurisdiction, NO.167 OF 2012. Commented [7]: Opening quote!
Commented [8]: ok sure i will do it carefully
7. Cyber Laws of India, WWW,Vikaspedia.in
References used:- Please format it to the above format and delete this section
once done
Also, arrange it in alphabetical order as specified in the guidelines by Sir
1. https://www.irjet.net/archives/V4/i6/IRJET-V4I6303.pdf
2. http://www.iibf.org.in/documents/Cyber-Laws-chapter-in-Legal-Aspects-Book.pdf
3. http://ficci.in/spdocument/22982/FICCI%20-%20EY%20Report%20-
%20Confronting%20the%20New%20Age%20Cyber%20Criminal.pdf
4. https://idsa.in/system/files/book/book_indiacybersecurity.pdf
5. https://meity.gov.in/writereaddata/files/Honorable-Supreme-Court-order-dated-
24th-March%202015.pdf
6. http://vikaspedia.in/education/Digital%20Litercy/information-security/cyber-laws
7. https://meity.gov.in/content/cyber-laws
8. http://www.osou.ac.in/eresources/introduction-to-indian-cyber-law.pdf
9. http://caaa.in/Image/cyber%20laws%20overview.pdf
10. http://repository.out.ac.tz/591/1/FAKI.pdf
11. https://digitalindia.gov.in/writereaddata/files/MeitY_Cyber%20Security_13%20Feb
_Final.pdf
12. https://cis-india.org/internet-governance/blog/state-of-cyber-security-and-
surveillance-in-india.pdf
13.