Checking, not Balancing – Application of Law of Armed Conflicts in Right to Self–Defence in CyberWar
The twenty-first century is the era of the Internet and, in terms of criminal activity, the era of cybercrime. Cyberspace is expanding and developing quickly. Cyberwar is riskier and considerably less expensive to carry out. It’s a…
The Villainy Saga of Identity Theft – Prevention of Identity Theft in the Post Internet Era
Identity theft is when one uses another’s unique identification factors such as name, Aadhar card number, credit card information, and other government-recognized identification to commit fraud. The information gathered by fraudsters can be used for various types…
Faking Narratives through Cyber Space and Influencing People’s Opinion – Curbing the Menace
Cyber Space has advanced to every sector of human need in a very short time. With the advent of the internet, cyberspace became the biggest arena for free and transparent speeches and interactions through online newspapers, articles,…
Cyberbullying – A Deleterious Effect of Advancing Technology
Digital technology has empowered young people to achieve their daily goals in a more efficient and effective manner. Moreover, the internet has provided them with a positive growing environment in which they can promote social responsibility and…
Cyberspace – The Future and Facets
The digital world which we witness in this current era is very different from the face-to-face world. The intertwined environment that involves interplay between software, services, and people could be roughly defined as what cyberspace is. The…
Social Media in a tug of war between Regulations and Fundamental Human Rights
Social media comes with its own budding problems and growth. India is such bliss where you can say anything or everything on social media platforms; speak your heart out without the fear of someone gunning you down.…
Cybercrime and Terrorism
Computer technology’s continued development and advancement have created a new class of threats — cyber threats — that societies must confront. These cyber-threats may generally be described as the use of computer technology for activities that can…