You are on page 1of 60

CYBER SPACE 1

SUBJECT:- CYBER SPACE

CYBER SPACE

Cyberspace refers to the virtual computer world, and more specifically, is an electronic medium
used to form a global computer network to facilitate online communication.

CYBER SECURITY

Computer security, cybersecurity or information technology security is the protection of computer


systems from the theft of or damage to their hardware, software, or electronic data, as well as from
the disruption or misdirection of the services they provide.

CYBER CRIME

Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. The
computer may have been used in the commission of a crime, or it may be the target.

UNIT 1 INTERNET AND SOCIAL MEDIA

MEANING OF INTERNET

A global computer network providing a variety of information and communication facilities,


consisting of interconnected networks using standardized communication protocols.

We always associate the internet with the web. But essentially the internet is just a massive
networking infrastructure that connects millions of users and devices from across the world.

It connects more than 190 countries of the world allowing is a free exchange of data and
information at lightning fast speeds.

This happens as the internet is decentralized, i.e. not under any control. Every computer or device
is an independent host and the information just moves from one host to another via the internet.

URL: It stands for Universal Resource Locator. This is the link that connects the user to the remote
locator on the world wide web. It is basically a link to a website, which opens when you click on
the URL.

HOST: Any computer or device that is used to transfer the data

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 2

BASIC SERVICES OF INTERNET

The services provided by the Internets used for interaction, business, marketing, downloading
files, sending data etc. Various Internet services are

• Electronic Mail
• World Wide Web (WWW)
• File Transfer Protocol (FTP)
• Chat Rooms
• Mailing list
• Instant Messaging
• Chat
• News Groups

WORLD WIDE WEB (WWW)

This is what we call the web. It is a collection of information, data, videos, pictures, multimedia
etc. on the internet. It is all linked together through the world wide web.

The World Wide Web (WWW), commonly known as the Web, is an information system where
documents and other web resources are identified by Uniform Resource Locators(URLs, such
as https://www.example.com/), which may be interlinked by hypertext, and are accessible over
the Internet.[1] The resources of the WWW may be accessed by users by a software
application called a web browser.

English scientist Tim Berners-Lee invented the World Wide Web in 1989. He wrote the first web
browser in 1990 while employed at CERN near Geneva, Switzerland.[2][3] The browser was
released outside CERN in 1991, first to other research institutions starting in January 1991 and
then to the general public in August 1991. The World Wide Web has been central to the
development of the Information Agenda is the primary tool billions of people use to interact on
the Internet.

How the World Wide Web (WWW) works

Twenty or thirty years ago, there was something you could take for granted: you could walk into
a public library, open up a reference book, and find information on almost any subject you wanted.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 3

What we take for granted nowadays is that we can sit down at practically any computer, almost
anywhere on the planet, and access an online information library far more powerful than any public
library on Earth: the World Wide Web. Twenty-first century life is so dependent on the Web that
it seems remarkable we ever lived without it. Yet the Web was invented less than 30 years ago and
has been a huge popular success for only about 20 of them. One of the greatest inventions of all
time... is also one of the newest!

HYPERTEXT TRANSFER PROTOCOL

HTTP is the underlying protocol used by the World Wide Web and this protocol defines how
messages are formatted and transmitted, and what actions Web servers and browsers should take
in response to various commands.

HOW HTTP WORK?.

METHODS OF HTTP

1. GET Method
A GET request retrieves data from a web server by specifying parameters in the URL
portion of the request. This is the main method used for document retrieval. The following
example makes use of GET method to fetch hello.htm:
2. HEAD Method

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 4

The HEAD method is functionally similar to GET, except that the server replies with a
response line and headers, but no entity-body. The following example makes use of HEAD
method to fetch header information about hello.htm:
3. POST Method
The POST method is used when you want to send some data to the server, for example,
file update, form data, etc. The following example makes use of POST method to send a
form data to the server, which will be processed by a process.cgi and finally a response
will be returned:.
4. PUT Method
The PUT method is used to request the server to store the included entity-body at a location
specified by the given URL. The following example requests the server to save the given
entity-body in hello.htm at the root of the server:
5. DELETE Method
The DELETE method is used to request the server to delete a file at a location specified by
the given URL. The following example requests the server to delete the given
file hello.htm at the root of the server:
6. CONNECT Method
The CONNECT method is used by the client to establish a network connection to a web
server over HTTP. The following example requests a connection with a web server running
on the host tutorialspoint.com:

7. OPTIONS Method
The OPTIONS method is used by the client to find out the HTTP methods and other options
supported by a web server. The client can specify a URL for the OPTIONS method, or an
asterisk (*) to refer to the entire server. The following example requests a list of methods
supported by a web server running on tutorialspoint.com:
8. TRACE Method

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 5

The TRACE method is used to echo the contents of an HTTP Request back to the requester
which can be used for debugging purpose at the time of development. The following
example shows the usage of TRACE method:

HYPERTEXT MARKUP LANGUAGE (HTML)

Hypertext Markup Language (HTML) is the standard markup language for documents designed
to be displayed in a web browser. It can be assisted by technologies such as Cascading Style Sheets
(CSS) and scripting languages such as JavaScript.

In 1980, physicist Tim Berners-Lee, a contractor at CERN, proposed and prototyped ENQUIRE,
a system for CERN researchers to use and share documents. In 1989, Berners-Lee wrote a memo
proposing an Internet-based hypertext system. Berners-Lee specified HTML and wrote the
browser and server software in late 1990.

KEY ASPECTS ABOUT HTML

• HTML is the standard markup language for creating Web pages.


• HTML stands for Hyper Text Markup Language
• HTML describes the structure of a Web page
• HTML consists of a series of elements
• HTML elements tell the browser how to display the content
• HTML elements are represented by tags
• HTML tags label pieces of content such as "heading", "paragraph", "table", and so on
Browsers do not display the HTML tags, but use them to render the content of the page

EXAMPLE
<!DOCTYPE html>
<html>
<head>
<title>Page Title</title>
</head>
<body>

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 6

<h1>My First Heading</h1>


<p>My first paragraph.</p>

</body>
</html>
Example Explained

• The <!DOCTYPE html> declaration defines this document to be HTML5


• The <html> element is the root element of an HTML page
• The <head> element contains meta information about the document
• The <title> element specifies a title for the document
• The <body> element contains the visible page content
• The <h1> element defines a large heading
• The <p> element defines a paragraph

HTML Tags

HTML tags are element names surrounded by angle brackets:

<tagname>content goes here...</tagname>

HTML tags normally come in pairs like <p> and </p>

The first tag in a pair is the start tag, the second tag is the end tag

The end tag is written like the start tag, but with a forward slash inserted before the tag name

DOMAIN NAME SYSTEM (DNS)

The Domain Name System (DNS) is a hierarchical and decentralized naming system for
computers, services, or other resources connected to the Internet or a private network.

It associates various information with domain names assigned to each of the participating entities.
Most prominently, it translates more readily memorized domain names to the numerical IP
addresses needed for locating and identifying computer services and devices with the

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 7

underlying network protocols. By providing a worldwide, distributed directory service, the


Domain Name System has been an essential component of the functionality of the Internet since
1985.

How does DNS work?

The process of DNS resolution involves converting a hostname (such as www.example.com) into
a computer-friendly IP address (such as 192.168.1.1). An IP address is given to each device on the
Internet, and that address is necessary to find the appropriate Internet device - like a street address
is used to find a particular home.

When a user wants to load a webpage, a translation must occur between what a user types into
their web browser (example.com) and the machine-friendly address necessary to locate the
example.com webpage.

There are 4 DNS servers involved in loading a webpage:

1. DNS recursor - The recursor can be thought of as a librarian who is asked to go find a
particular book somewhere in a library.
2. Root nameserver - The root server is the first step in translating (resolving) human
readable host names into IP addresses.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 8

3. TLD nameserver - The top level domain server (TLD) can be thought of as a specific rack
of books in a library.
4. Authoritative nameserver - This final nameserver can be thought of as a dictionary on a
rack of books, in which a specific name can be translated into its definition.

IP ADDRESS

An Internet Protocol address (IP address) is a numerical label assigned to each device connected
to a computer network that uses the Internet Protocol for communication.[1][2]An IP address
serves two main functions: host or network interface identification and location addressing.

Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number.[2] However, because
of the growth of the Internet and the depletion of available IPv4 addresses, a new version of IP
(IPv6), using 128 bits for the IP address, was standardized in 1998.[3][4][5] IPv6 deployment has
been ongoing since the mid-2000s.

IP addresses are written and displayed in human-readable notations, such as 172.16.254.1 in IPv4,
and 2001:db8:0:1234:0:567:8:1 in IPv6. The size of the routing prefix of the address is designated

in CIDR notation by suffixing the address with the number of significant bits,
e.g., 192.168.1.15/24, which is equivalent to the historically used subnet mask 255.255.255.0

CLASSES OF IP ADDRESS

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 9

Class Address range Supports


Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on
each of 127 networks.
Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each
of 16,000 networks.
Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of
2 million networks.
Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups
Class E 240.0.0.0 to 254.255.255.254 Reserved for future use, or
research and development
purposes.

ELECTRONIC MAIL

E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication.


(Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-
mail messages are usually encoded in ASCI text. However, you can also send non-text files, such
as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the
first uses of the Internet and is still the most popular use. A large percentage of the total traffic
over the Internet is e-mail. E-mail can also be exchanged between online service provider users
and in networks other than the Internet, both public and private.

The death of Ray Tomlinson, credited as the inventor of email, has rekindled the controversy over
VA Shiva Ayyadurai's place in history. Here, he gives his version of how he invented the email.
Ray Tomlinson is universally credited as the creator of email as part of a program for ARPANET
in 1971.

TYPES OF E MAIL

Web-based email

Many email providers have a client (e.g. AOL Mail, Gmail, Outlook.com, Hotmail and Yahoo!
Mail). This allows users to log into the email account by using any compatible web browser to

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 10

send and receive their email. Mail is typically not downloaded to the client, so can't be read without
a current Internet connection.

email servers

The Post Office Protocol 3 (POP3) is a mail access protocol used by a client application to read
messages from the mail server. Received messages are often deleted from the server. POP supports
simple download-and-delete requirements for access to remote mailboxes (termed mail drop in the
POP RFC's).[60]

IMAP email servers

The Internet Message Access Protocol(IMAP) provides features to manage a mailbox from
multiple devices. Small portable devices like smartphones are increasingly used to check email
while travelling, and to make brief replies, larger devices with better keyboard access being used
to reply at greater length. IMAP shows the headers of messages, the sender and the subject and the
device needs to request to download specific messages. Usually mail is left in folders in the mail
server.

MAPI email servers

Messaging Application Programming Interface (MAPI) is used by Microsoft Outlookto


communicate to Microsoft Exchange Server - and to a range of other email server products such
as Axigen Mail Server, Kerio Connect, Scalix, Zimbra, HP Open Mail, IBM Lotus Notes, Zarafa,
and Bynari where vendors have added MAPI support to allow their products to be accessed
directly via Outlook.

USES OF ELECTRONIC MAIL

• Business and organizational use


• Reducing cost
• Facilitating logistics
• Increasing speed
• Email marketing
• Creating a "written" record
• Personal use

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 11

WEB BROWSER’S

A web browser (commonly referred to as a browser) is a software application for accessing


information on the World Wide Web. When a user requests a particular website, the web browser
retrieves the necessary content from a web server and then displays the resulting web page on the
user's device.

A web browser is a software program that allows a user to locate, access, and display web pages.
In common usage, a web browser is usually shortened to "browser." Browsers are used primarily
for displaying and accessing websites on the internet, as well as other content created using
languages such as Hypertext Markup Language (HTML) and Extensible Markup Language
(XML).

Example :- Google chrome, firefox, opera, internet Explorer, safari.

ARCHITECTURE OF WEB BROWSERS

The Browser Engine: The browser engine works as a bridge between the User interface and the
rendering engine. According to the inputs from various user interfaces, it queries and manipulates
the rendering engine. ... The interpreted results are sent to the rendering engine for display.

What is the primary function of the Web browsers?

• Web browser functions are to provide the resources or information to the user when asked
by them.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 12

• It processes the user inputs in the form of URL like http://www.google.com in the browser
and allows the access to that page.
• URL is used to identify the resources and fetch them from the server and displays it to the
client.
• It allows the user to interact with the web pages and dynamic content like surveys, forms,
etc.
• It also allows the user to navigate through the complete web page and see its source code
in the HTML format.
• It provides security to the data and the resources that are available on the web that is by
using the secure methods

SERACH ENGINES

A web search engine or Internet search engine is a software system that is designed to carry out
web search, which means to search the World Wide Web in a systematic way for particular
information specified in a textual web search query.

The first tool used for searching content (as opposed to users) on the Internet was Archie. The
name stands for "archive" without the "v". It was created by Alan Emtage, Bill Heelan and J. Peter
Deutsch, computer science students at McGill University in Montreal, Quebec, Canada.

• Google
• Bing
• Yahoo
• Baidu
• Yandex.ru
• DuckDuckGo
• Ask.com
• AOL.com
• WolframAlpha
• Internet Archive

COMPONENTS OF SEARCH ENGINE

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 13

Generally there are three basic components of a search engine as listed below:

1. Web Crawler
It is also known as spider or bots. It is a software component that traverses the web to
gather information.
2. Database
All the information on the web is stored in database. It consists of huge web resources.
3. Search Interfaces
This component is an interface between user and the database. It helps the user to search
through the database.

PROCESSING OF SEARCH ENGINE

• Indexing Process
Indexing process comprises of the following three tasks:
Text acquisition :- It identifies and stores documents for indexing.
Text Transformation :- It transforms document into index terms or features.
Index Creation :- It takes index terms created by text transformations and create data
structures to support fast searching.
• Query Process
Query process comprises of the following three tasks:
User interaction :-It supports creation and refinement of user query and displays the
results.
Ranking :-It uses query and indexes to create ranked list of documents.
Evaluation :-It monitors and measures the effectiveness and efficiency. It is done offline.

ARCHITECTURE OF SEARCH ENGINE

The search engine architecture comprises of the three basic layers listed below:

1. Content collection and refinement.


2. Search core
3. User and application interfaces

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 14

SOCIAL MEDIA

Social media is computer-based technology that facilitates the sharing of ideas, thoughts, and
information through the building of virtual networks and communities. By design, social media is
internet-based and gives users quick electronic communication of content.

ADVANTAGES OF SOCIAL MEDIA

• YOU REACH LARGE AUDIENCES


There are millions of people using social media platforms. It’s a great opportunity for your
business to reach a large pool of people that are interested in your products or services.
• YOU HAVE A DIRECT CONNECTION WITH YOUR AUDIENCE

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 15

Social media is one of the few marketing strategies that allow you to connect directly with
your audience. You know who is interested in your business because they choose to follow
your social media account.
• YOU HAVE ACCESS TO PAID ADVERTISING SERVICES
If you want to go beyond organic posting, there is an option to run paid advertisements.
Each social platform offers its own form of paid advertising. Your social media advertising
capabilities will vary depending upon your platform.
• YOU BUILD YOUR BRAND
One advantage of social media marketing is the ability to build your brand. When you
connect with interested leads, you expose them to your brand. The ability to post organic
content for free allows you to build brand recognition repeatedly with your audience.
• YOU CAN CREATE VIRAL CONTENT
Perhaps the most unique advantage of social media is the ability to get help from your
followers. People love to share things with their networks, from photos and recipes to
interesting articles and hot deals.

DISADVANTAGES OF SOCIAL MEDIA

• YOU CAN RECEIVE NEGATIVE FEEDBACK


People use social media to post content they love, but they also use it to share experiences
they didn’t love. If someone had a poor experience with your business, it opens a door of
opportunity for them to share their poor experience with others.
• YOU OPEN UP THE POTENTIAL FOR EMBARRASSMENT
It’s easy for posts to go viral on social media. People keep a close eye on the good and the
bad on social media. If you aren’t careful about the content you post, you can end up
embarrassing your company and getting caught in an awkward situation.
• YOU MUST SPEND A LOT OF TIME ON YOUR CAMPAIGNS
Social media isn’t a one and done type of marketing method. You must constantly create
new content, post content, and engage with your audience on these platforms. A big
drawback to social media is that it is time-consuming for companies.
• YOU HAVE TO WAIT TO SEE RESULTS

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 16

When companies invest in marketing strategies, they want to see immediate results. You
want to know that your strategies are working and that the investment is worth your time.
With social media marketing, you don’t see immediate results.
• PRIVACY ISSUE
Another big problem with this application is that anyone can see the profile picture which
results in loss of privacy besides anyone can add you to the group which can be annoying
as sometimes people add you to the group again even if you have left that group before.

TWITTER

Twitter was created in March 2006 by Jack Dorsey, Noah Glass, Biz Stone, and Evan Williams,
launched in July of that year. The service rapidly gained worldwide popularity. In 2012, more than
100 million users posted 340 million tweets a day, and the service handled an average of 1.6 billion
search queries per day.

Twitter is a free social networking microblogging service that allows registered members to
broadcast short posts called tweets. Twitter members can broadcast tweets and follow other users'
tweets by using multiple platforms and devices. Tweets and replies to tweets can be sent by cell
phone text message, desktop client or by posting at the Twitter.com website.

ADVANTAGES OF TWITTER

• Twitter is a very simple social network because it allows you to be aware of everything
that interests you, such as communities, celebrities or just people who are not famous but
who you know. This is a very important advantage of Twitter.
• The fact that everything has to be written in 140 characters makes the social network
simple and practical for human thinking.
• If you have written a tweet and one of your followers like what they see, this can be
retweeted so this tweet is also seen by all the followers of your follower.
• Another great advantage of Twitter is the structure it has since it is made up of your
followers and the ones you are following.
• It is possible to combine your Twitter account with your Facebook account so that what
you post on Twitter is also done on the other social network. This is a great advantage to
not waste so much time publishing on both social networks.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 17

• You can place buttons on the websites to tweet the page and other users can observe and
review the subject in question.

DIS ADVANTAGES OF TWITTER

• With Twitter you have to summarize everything that is happening to you in 140 characters.
This can generate problems by having to abbreviate everything that happens.
• Another disadvantage of Twitter is that there is a lot of spam on the network and this is not
so controlled. This also makes the network too fast in terms of number of Tweets and
sometimes the trust of the network is lost.
• It is very common to see insults from people towards companies.
• False profiles on Twitter are very common and this can generate distrust in the network.
• Another big disadvantage of Twitter is that having false profiles, any person can create a
famous account and many people begin to follow when in reality this profile is not of this
celebrity but a random person.

FACEBOOK

Facebook is a popular free social networking website that allows registered users to create profiles,
upload photos and video, send messages and keep in touch with friends, family and colleagues.

Facebook was founded by Mark Zuckerberg, along with fellow Harvard College students and
roommates Eduardo Saverin, Andrew McCollum,

ADVANTAGES OF FACEBOOK

• Facebook for News & Information


The real advantage of Facebook is that it’s a real-time social networking site. This makes
it one of the best sources to stay updated with the latest news and information. Major news
usually goes viral on Facebook, and most brands use it to announce important things
regarding their products/services.
• Facebook as a Personal Portfolio
Facebook’s Timeline gives a completely new look regarding your personal profile
branding.
• Facebook for Image and Video Hosting

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 18

You can also use Facebook as a site to host images and videos. You can set privacy levels
for individual albums to control who can see what you share.
• Facebook Video Chatting
Recently, Facebook implemented the Facebook video chat feature in partnership with
Skype. Now you can make video calls to your friends using Facebook’s inbuilt video chat
service
• Facebook for Business
Facebook is one of the largest sites in the world where we are not only allowed, but
encouraged to connect with everyone.
• Facebook for Networking
Facebook is arguably the most powerful social media and social networking site out there.
You can use Facebook to connect with your family, friends, work colleagues, and you can
even meet new people on Facebook.

DISADVANTAGES OF FACEBOOK

• Facebook Privacy
One of the major concerns and disadvantages of Facebook has to do with Facebook’s
privacy. In the past, it has created a lot of buzz due to sudden changes, but now Facebook
has simplified its privacy settings.
• Time-consuming
Of all of Facebook’s disadvantages, I believe this is one of the major reasons why
people deactivate or delete their Facebook profile. Being one of the best ways to stay
updated about what your friends are doing, people spend too much time on this vast social
networking site.
• "Facebook Addiction" A new disorder.
There are many, who are addicted to FB. People just start living in this virtual world &
spend hours & hours on Facebook. Due to this, a new type of disorder has also come in
human life i.e. Facebook addiction disorder in which person spend far too much time on
Facebook, have difficulty cutting back.
• Scams are spreading like fire.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 19

Suspicious emails, messages & notifications are the most widely used trick to hack your
account & to get your personal information by using the phishing website that looks similar
to the original Facebook site.
• Effect on academic’s activity.
Too much time on FB has proper with bad grades on the student's results. Even it’s often
found that many employees waste their time for surfing FB. That’s why many offices have
blocked these kinds of sites from their networks completely.
• Data privacy issues
The Facebook provides you the reliable & secure privacy settings, but many people don’t
use these settings properly, that causes an effect on your personal info that you provided
and shared by using the Facebook.

YOUTUBE

YouTube was founded by Steve Chen, Chad Hurley, and Jawed Karim, who were all early
employees of PayPal. Hurley had studied design at Indiana University of Pennsylvania, and Chen
and Karim studied computer science together at the University of Illinois at Urbana–Champaign.

YouTube is a video sharing service that allows users to watch videos posted by other users
and upload videos of their own. The service was started as an independent website in 2005 and
was acquired by Google in 2006. Videos that have been uploaded to YouTube may appear on
the YouTube website and can also be posted on other websites, though the files are hosted on the
YouTube server.

ADVANTAGES OF YOUTUBE

• In education YouTube help in term of provide the video of teaching and learning for the
students to get the knowledge from the professors in another part of the world.
• The students are able to access to the sources of learning anytime anywhere they want
without any payment.
• Provide the chance for all the learner to study with the high professional teacher especially
for those who have no chance to go university.
• There are many skill people who upload their video and we can learn from their skill.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 20

• YouTube is the very wide classroom for teaching and learning which we can save our time
and budget.
• It is a biggest source of study which easy to understand by the video such as video on how
to make up, video on how to cook, video on how …etc.
• YouTube is place that we can get all the kind of entertainment such as music, movies, game
show and many more which we can release our stress and enjoy.
• It is a big digital library which has both image and sound.
• YouTube is a site with we can playback all the video which help people to not miss the
interesting video
• YouTube is also benefit to spread the religion which we can access to our Uztaz in other
country.

DISADVANTAGES OF YOUTUBE

• YouTube is a free site which sometime the young generation will get the bad example from
the video.
• There are many pirated movie and song spread in YouTube which effect to the copy right
issue.
• There are many uncensored or sexual harassment clip which is not suitable for the young
age user.
• There are many video which spread the wrong believes that is dangerous to follow such as
eating Mentos with carbonated drink.
• Because of the freedom of uploading video there are many video was uploaded by another
people and it effect to the whole life of the owner.
• There are many contents foster to use violence to the young generation or to the country.
• Some skill that was spread vie YouTube will use in wrong purpose by those robber or
terrorist

WHATSAPP

WhatsApp was founded in 2009 by Brian Acton and Jan Koum, former employees of Yahoo!.
After leaving Yahoo! in September 2007, they took some time off in South America.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 21

WhatsApp is a mobile application that enables users to chat with one another one-to-one or as a
group. Due to its popularity (1 billion users!),WhatsApp is being used commonly as a 'verb'
tomean 'text'. So, if someone says, I'll whatsapp you.

ADVANTAGES OF WHATSAPP

• Free of Cost
The biggest advantage of WhatsApp is that it is free and there are no other charges for
using it, so one can send or share photos, messages, contacts, videos, make video calls to
anywhere in the world and hence it enables a person to save lot of money which earlier was
spent on SMS and video calling.
• User Friendly
Another big positive of WhatsApp is that it is user-friendly and that is the reason why it is
used by the young generation as well as by the old generation people
• Smart reply
Just suppose someone asked two questions separately, then you can mention which answer
you are replying.
• Group messages and broadcasting
Want to send the message to everyone at a movement, make a group to share it. Want to
keep anonymity of receivers, broadcast it, only you will know the people you send
message.
• Connectivity
Sending messages and making calls have a new destination WhatsApp. So even without a
balance we can reach our loved once.

DISADVANTAGES OF WHATSAPP

• Sharing of Wrong News and Information


Another big drawback of this application is that some people consider all news and
information shared on WhatsApp to be true which is not the case as all things shared are
not true which ultimately lead to problems especially during sensitive periods like riots,
elections, religious functions and so on.
• Privacy Issue

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 22

Another big problem with this application is that anyone can see the profile picture which
results in loss of privacy besides anyone can add you to the group which can be annoying
as sometimes people add you to the group again even if you have left that group before.
• Health-Related Problems
Multiple studies have confirmed that WhatsApp contributes to health-related problems
amongst teenagers. From sleep deprivation (due to continuous chatting) to straining of
eyes, WhatsApp contributes to a lot of problems. In fact, the impact of WhatsApp on
students is currently a growing concern for a lot of doctors and counselors.
• Lack Of Concentration
It has been reported that teenagers who are always engrossed in WhatsApp, have a lower
concentration. Checking for their messages or scrolling through their chats adds to this
problem.
• Social Isolation
WhatsApp has contributed to social isolation amongst teenagers. These days, in any family
gathering or parties, teenagers prefer to chat on groups and through personal messages,
rather than communicate in real life. In fact, teenagers find it much more comfortable to
talk over text than face-to-face.

LINKEDIN

LinkedIn is an American business and employment-oriented service that operates


via websites and mobile apps. Founded on December 28, 2002,[4] and launched on May 5,
2003,[5] it is mainly used for professional networking, including employers posting jobs and job
seekers posting their CVs. As of 2015, most of the company's revenue came from selling access
to information about its members to recruiters and sales professionals.[6] Since December 2016 it
has been a wholly owned subsidiary of Microsoft. As of June 2019, LinkedIn had 630 million
registered members in 200 countries.

ADVANTAGES OF LINKEDIN

• It Facilitates Networking
LinkedIn is a social network, so this is probably one of the advantages of LinkedIn that
will surprise no one. Still, professional networking is remarkably easy on LinkedIn.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 23

• It Can Boost Brand Credibility


Credibility and legitimacy are two things every brand needs to establish as soon as possible,
after all. Without them, consumers are unlikely to try out a brand’s offerings.
• It’s Great for B2B
While LinkedIn can be of use to B2C (business to consumer) companies as well, it’s even
better for B2B (business to business) ones.
• It Helps You Recruit New Talent
The ease of recruiting new talent on the platform has long been one of the great advantages
of LinkedIn. After all, it’s full of professionals. It focuses on their work history too in their
pages’ bios/public data.
• It Can Generate Leads
One of the advantages of LinkedIn is that you can use it to generate leads in various ways.
You can link to your site on your content or posts, as I mentioned earlier.

DISADVANTAGES OF LINKEDIN

• It Exposes Your Identity


From a privacy perspective, having your life (personal or professional) out there for
everyone to see is not the safest thing one can do. And that’s one of the drawbacks of
LinkedIn that people should be careful about. You may have a very closed profile, where
you only add and accept people you know.
• Linkedin’s User Experience Has Turned People Off in the Past
There have been many complaints by users who use Linkedin regularly, regarding the user
experience that it offers. People feel that the user experience is average and with a lot of
errors to start with.
• Slow Reaction Time by Linkedin Support
People who have reached out to Linkedin for help and support, also complain that Linkedin
is slow to react. This is a tough one. Even though I agree that slow customer service can
lead to unhappy users .
• Linkedin Owns Your Personal Data & Information
Nothing in the world is free. Linkedin supports itself through advertisements, by allowing
advertisers to target its users through the data it collects through users’ profiles.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 24

• Linkedin Decides on Who Reads Your Post


This is a debatable one. Because there is so much content being shared across all social
networks, social media websites like Linkedin, have built algorithms that limit the shared
content based on user interests and engagement levels.
• Limited Moderation to Manage Scams
Another big disappointment that I have been facing recently is the amount of scam and
phishing that is increasing on Linkedin. I consider this as one of the major cons of Linkedin.

PRIVACY ISSUES

’If you feel like someone is watching you, you're right. If you're worried about this, you have
plenty of company. If you're not doing anything about this anxiety, you’re just like almost everyone
else.’ (Bob Sullivan, 2011)

Many people increasingly utilize social Networks, such as Facebook, MySpace, Twitter, Orkut,
Linked in and etc. These networks allow users to publish details about themselves and their lives
and also connect to their friends and colleagues. However some of the information revealed in
these networks should remain private and not published at all.

1. Account hacking and impersonation

Increasingly, spammers, hackers, and other online criminals are targeting social networks. A
compromised social media account makes for an appealing target: if they can get into your
Facebook or Twitter account, they can impersonate you.

2. Stalking and harassment

Not all social media privacy threats come from strangers. Sometimes, people in your life turn out
to be less than friendly. Online stalking have become very well-known threats, and social media
makes them very easy to perpetrate.

3. Being compelled to turn over passwords

Unfortunately, there are situations where you may be asked to turn over access to your social media
accounts. One of the most common is upon starting a new job.

4. Causes Distractions

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 25

“When I have my phone out, it makes me feel like nothing else is going on around me. I use social
media as a way to feel popular, important, and also just to fit in.

5. Misleading data or information


Lots of things you read online especially in your social media feeds may appear to be true,
often is not. Fake news is news, stories or hoaxes created to deliberately misinform or
deceive readers.
6. Security
Social Media Privacy & Security Risks for Youth. Profile Hacking: Profile hacking is the
most common issue in social media scam lists. Fake Apps and Malicious Links. Fake offers
& schemes: Login to social media channels through other networks: Fake Gaming software
and apps

PRIVACY PROTECTION : QUICK TIPS

• Use strong passwords, and don’t use the same password for multiple accounts.
• Don’t use social media on public devices, and if you must, make sure to log out afterward.
• Disable access to geolocation data for your social media apps
• Be wary about clicking links from friends in social media; you never know if they’ve been
hacked
• Use two-factor authentication or password-reset checks for all your accounts
• Even on your private social profiles, keep personal information to a minimum.

UNIT2 :- ELECTRONIC COMMERCE

ELECTRONIC COMMERCE

E-Commerce or Electronic Commerce means buying and selling of goods, products, or services
over the internet. E-commerce is also known as electronic commerce or internet commerce. These
services provided online over the internet network. Transaction of money, funds, and data are also
considered as E-commerce. These business transactions can be done in four ways: Business to
Business (B2B), Business to Customer (B2C), Customer to Customer (C2C), Customer to
Business (C2B). The standard definition of E-commerce is a commercial transaction which is

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 26

happened over the internet. Online stores like Amazon, Flipkart, Shopify, Myntra, Ebay, Quikr,
Olx are examples of E-commerce websites. By 2020, global retail e-commerce can reach up to
$27 Trillion.

Examples of E-Commerce

Amazon, Flipkart, eBay, Fiverr, Upwork, Olx, Quikr

APPLICATIONS OF E COMMERCE

1. RETAIL AND WHOLESALE


There are numerous applications for retail as well as wholesale in the case of e-commerce.
Here comes e-retailing or may be called as online retailing. This refers to the selling of
goods and other services through electronic stores from business to consumers. These are
designed and equipped using a shopping cart model and electronic catalog.
2. MARKETING
Using web and e-commerce, data collection about the following are possible
1. Preferences
2. Behavior
3. Needs
4. Buying patterns
The marketing activities like price fixing, product feature, and its enhancement,
negotiation, and the relationship with the customer can be made using these.
3. FINANCE
e-commerce is being used by the financial companies to a large extent. By the name
finance, we know that there will be customers and transactions. The customers can check
the balance in their savings account, as well as their loan account. There are features like
transferring of money from and to their own accounts, paying off bills online and also e-
banking. Online stock trading is also another feature of e-commerce.
4. MANUFACTURING
e-commerce is included and used in the chain operations (supply) of a company. There are
companies that form the electronic exchange. This is by providing buying and selling items
together, trading market information and the information of runback office like inventory

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 27

control. This is a way that speeds up the flow of finished goods and the raw materials
among the business community member.
5. AUCTIONS
e-commerce customer to customer is direct selling of goods among customers. It includes
electronic auctions that involve bidding system. Bidding allows prospective buyers to bid
an item. In Airline Company they give bidding opportunity for customers to quote the price
for a seat on a specific route, date and time.
6. ENTERTAINMENT
e-commerce application is widely used in entertainment area also for video cataloging,
multiplayer games, interactive ads and for online discussion.
7. EDUCATION
In educational training also e-commerce has a major role in interactive education, video
conferencing, online class and for connecting different educational training centers.

TYPES OF E COMMERCE MODELS

Electronic commerce can be classified into four main categories. The basis for this simple
classification is the parties that are involved in the transactions. So the four basic electronic
commerce models are as follows,

1. BUSINESS TO BUSINESS (B2B)

This is Business to Business transactions. Here the companies are doing business with each other.
The final consumer is not involved. So the online transactions only involve the manufacturers,
wholesalers, retailers etc.

2. BUSINESS TO CUSTOMER (B2C)

Business to Consumer. Here the company will sell their goods and/or services directly to the
consumer. The consumer can browse their websites and look at products, pictures, read reviews.
Then they place their order and the company ships the goods directly to them. Popular examples
are Amazon, Flipkart, Jabong etc.

3. CONSUMER TO CONSUMER (C2C)

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 28

Consumer to consumer, where the consumers are in direct contact with each other. No company
is involved. It helps people sell their personal goods and assets directly to an interested party.
Usually, goods traded are cars, bikes, electronics etc. OLX, Quikr etc. follow this model.

4. CONSUMER TO BUSINESS (C2B)

This is the reverse of B2C, it is a consumer to business. So the consumer provides a good or some
service to the company. Say for example an IT freelancer who demos and sells his software to a
company. This would be a C2B transaction.

5. BUSINESS TO GOVERNMENT (B2G)

B2G model is a variant of B2B model. Such websites are used by governments to trade and
exchange information with various business organizations. Such websites are accredited by the
government and provide a medium to businesses to submit application forms to the government.

6. GOVERNMENT TO BUSINESS (G2B)

Governments use B2G model websites to approach business organizations. Such websites support
auctions, tenders, and application submission functionalities.

7. GOVERNMENT TO CITIZEN (G2C)

Governments use G2C model websites to approach citizen in general. Such websites support
auctions of vehicles, machinery, or any other material. Such website also provides services like
registration for birth, marriage or death certificates. The main objective of G2C websites is to
reduce the average time for fulfilling citizen’s requests for various government services.

DIFFERENCE BETWEEN TRADITIONAL COMMERCE AND E COMMERCE

TRADITIONAL COMMERCE E-COMMERCE

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 29

Traditional commerce is a branch of business e-Commerce means carrying out commercial


which focuses on the exchange of products transactions or exchange of information,
and services, and includes all those activities electronically on the internet.
which encourages exchange, in some way or
the other.
Manual Processing of Transactions Automatic Processing of Transactions
Limited Time 24×7×365
Goods can be inspected physically before Goods cannot be inspected physically before
purchase. purchase.
Face-to-face Screen-to-face
One way marketing One-to-one marketing

INCENTIVES FOR ENGAGING IN E COMMERCE

• Selection and value


• Performance and service
• Look and feel
• Advertising and incentive
• Personal attention
• community relationships
• Security

BENEFITS OF E COMMERCE

The benefits of e-commerce include its around-the-clock availability, the speed of access, the wide
availability of goods and services for the consumer, easy accessibility and international reach.

1. AVAILABILTIY :- Aside from outages or scheduled maintenance, e-commerce sites are


available 24x7, allowing visitors to browse and shop at any time. Bricks and mortar
businesses tend to open for a fixed amount of hours and may even close entirely on certain
days.
2. SPEED OF ACCESS :- While shoppers in a physical store can be slowed by crowds, e-
commerce sites run quickly, which is determined by compute and bandwidth

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 30

considerations on both consumer device and e-commerce site. Product pages and shopping
cart pages load in a few seconds or less. An e-commerce transaction can comprise a few
clicks and take less than five minutes.
3. WIDE AVAILABILTIY :- Amazon’s first slogan was “Earth’s Biggest Bookstore.” They
could make this claim because they were an e-commerce site and not a physical store that
had to stock each book on its shelves. E-commerce enables brands to make a wide array of
products available, which are then shipped from a warehouse after a purchase is made.
4. LOWER COST :- e-commerce businesses avoid the cost associated with physical stores,
such as rent, inventory and cashiers, although they may incur shipping and warehouse
costs.
5. PERSONALIZATION AND PRODUCT RECOMMENDATIONS :- E-commerce
sites can track visitors’ browse, search and purchase history. They can leverage this data
to present useful and personalized product recommendation. Examples include the sections
of Amazon product pages labeled “Frequently bought together” and “Customers who
viewed this item also viewed.”
6. EASY ACCESSIBILITY :- Customers shopping a physical store may have a hard time
determining which aisle a particular product is in. In e-commerce, visitors can browse
product category pages and use the site search feature the find the product immediately.

LIMITATIONS OF E COMMERCE

The perceived downside of e-commerce include sometimes limited customer service, consumers
not being able to see or touch a product prior to purchase and the wait time for product shipping.

1. SECURITY :- Skilled hackers can create authentic-looking websites that claim to sell
well-known products. Instead, the site sends customers forfeit or imitation versions of those
products -- or, simply collects customers’ credit card information. Bonafide e-commerce
sites also carry risk, especially when customers store their credit card information with the
retailer to make future purchases easier. If the retailer’s site is hacked, hackers may come
into the possession of customers’ credit card information.
2. NOT BEING ABLE TO TOUCH OR SEE :- While images on a web page can provide
a good sense about a product, it’s different from experiencing it “directly,” such as playing
music on speakers, assessing the picture quality of a television or trying on a shirt or dress.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 31

E-commerce can lead consumers to receive products that differ from their expectations,
which leads to returns. In some scenarios, the customer bears the burden for the cost of
shipping the returned item to the retailer.
3. LIMITED CUSTOMER SERVICE :- If a customer has a question or issue in a physical
store, he or she can see a clerk, cashier or store manager for help. In an e-commerce store,
customer service may be limited: the site may only provide support during certain hours of
the day, or a call to a customer service phone number may keep the customer on hold.
4. UNSURE ABOUT THE QUALITY :- One of the biggest problems with buying things
online is that you will have no guarantee of a products’ quality. Reviews are not always
helpful and though all the researches will never assure you about the quality of a product.
5. INTERNET BANDWIDTH :- E-commerce is the store which totally runs on the internet
and though it needs a good connection to run the business online. If you are not the good
bandwidth connection than you might face issue with placing the orders, loading pages,
and check out issues too.
6. SOME PRODUCTS ARE DIFFICULT TO PURCHASE ONLINE :- Yes, it is true
some products are really difficult to purchase online like, gold, spectacles and other which
you required very customized one. It is not that easy to trust on those which are kept online
in an image to express but let’s say for example gold is not the product which can be easily
purchased online. One has to verify physically and has to look on to the size too, so it is
not easy at all to purchase online.
7. IT IS DIFFICULT TO TRY BEFORE BUYING :- You can say that online
shoppers will not have much ability to inspect physically, even sometimes they lose the
power to negotiate the price and payment terms might exist different as compared to local
stores.

SURVEY ON POPULAR E COMMERCE SITES

There are multiple articles naming the best e-commerce sites based on the opinions of
professional designers or e-commerce specialists. However, the only opinions that do really
matter are those of your buyers. We asked people who shop online what the best e-
commerce site(s) is/are and why. Now lets take a look at our findings.

1. Amazon is the most popular e-commerce site among online shoppers.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 32

As you can see in the graph below, more than half of all respondents named Amazon among
the best e-commerce sites based on their online shopping experience. The second most
popular site eBay is far behind and was mentioned almost 7 times less than Amazon.

2. Pricing is the main criteria buyers take into consideration during online shopping.

There are multiple reasons based on which buyers choose the best e-commerce sites. Below is the
list of the most popular reasons.

• Affordable pricing – 69.7%


• Wide range of products – 42.1%
• Trust towards the e-commerce site – 30%
• Quality of products – 20.3%
• Timely delivery – 18.3%
• Easy check out process – 17.1%
• Easy site navigation – 14%
• Product reviews – 11.5%
• Free shipping – 9.8%
• . Rare/unique/customized products – 6.2%

3. 2/3 of the ‘best e-commerce sites’ sell clothing online.

That confirms data from an earlier online shopping behavior survey saying that clothing is the
most popular product buyers shop for online

4. Almost half of the ‘best e-commerce sites’ are on the Top 100 Online Retailers list.

Internet Retailer created a list of Top 500 Online Retailers in the US and Canada based on their
annual online sales and yearly sales growth. 49% of websites mentioned by buyers are in the Top
100 online shopping sites list that serves as more evidence of the correlation between online sales
and online shopping experience provided by the retailer.

UNIT3 :- E GOVERNANCE

MEANING OF E GOVERNANCE

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 33

application of information and communication technology (ICT) for delivering government


services, exchange of information, communication transactions, integration of various stand-alone
systems and services between government-to-citizen (G2C), government-to-business (G2B),
government-to-government (G2G), government-to-employees (G2E) as well as back-office
processes and interactions within the entire government framework.[1] Through e-governance,
government services are made available to citizens in a convenient, efficient, and transparent
manner. The three main target groups that can be distinguished in governance concepts are
government, citizens, and businesses/interest groups. In e-governance, there are no distinct
boundaries

DEFINITION OF E GOVERNANCE

As per UNESCO, "E-Governance involves new styles of leadership, new ways of debating and
deciding policy and investment, new ways of accessing education, new ways of listening to
citizens and new ways of organizing and delivering information and services".

THE FIELDS OF IMPLEMENTATION OF E GOVERNANCE ARE AS FOLLOWS

E ADMINISTRATION :- refers to improving of government processes and of the internal


workings of the public sector with new ICT-executed information processes.

E SERVICES :- refers to improved delivery of public services to citizens. Some examples


of interactive services are: requests for public documents, requests for legal documents and
certificates, issuing permits and licenses.

E DEMOCRACY :- implies greater and more active citizen participation and involvement
enabled by ICTs in the decision-making process

FORMS OR TYPES OF E GOVERNANCE

1. GOVERNMENT TO GOVERNMENT (G2G)


When the exchange of information and services is within the periphery of the
government, is termed as G2G interaction. This can be both horizontal, i.e. among

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 34

various government entities and vertical, i.e. between national, state and local
government entities and within different levels of the entity.

2. GOVERNMENT TO CITIZEN (G2C)


The interaction amidst the government and general public is G2C interaction. Here an
interface is set up between government and citizens, which enables citizens to get access
to wide variety of public services. The citizens has the freedom to share their views and
grievances on government policies anytime, anywhere.

3. GOVERNMENT TO BUSINESS (G2B)


In this case, the e-governance helps the business class to interact with the government
seamlessly. It aims at eliminating red-tapism, saving time, cost and establish transparency
in the business environment, while interacting with government.

4. GOVERNMENT TO EMPLOYEES (G2E)


The government of any country is the biggest employer and so it also deals with
employees on a regular basis, as other employers do. ICT helps in making the interaction
between government and employees fast and efficient, along with raising their level of
satisfaction by providing perquisites and add-on benefits.

5. GOVERNMENT TO NON PROFIT ORGANIZATION (G2NPO)


It involves educational, charitable, religious, social welfare, public sector, association,
health services, culture, foundation etc.
STAGES OF E GOVERNANCE
STAGE 1 :- EMERGING PRESENCE

It is Stage I representing information, which is limited and basic. The government online presen
ce comprises a web page and /oran official website; links to ministries/departments of education,
health, social welfare, labor and finance may/may not exist; links to regional/localgovernment m
ay/may not exist; some archived information such as the head of states' message or a document s
uch as the constitution may beavailable on line, most information remains static with the fewest
options for citizens.

STAGE 2 :- ENHANCED PRESENCE

Stage II in which the government provides greater public policy and governance sources of curr
ent and archived information,such as policies, laws and regulation, reports, newsletters, and dow
nloadable databases. The user can search for a document and there is a helpfeature and a site map

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 35

provided. A larger selection of public policy documents such as an e-


government strategy, policy briefs on specific education orhealth issues. Though more

sophisticated, the interaction is still primarily unidirectional with information flowing essentially
from government to the citizen.

STAGE 3 :- INTERACTIVE PRESENCE

Stage III in which the online services of the government enter the interactive mode with
services to enhance convenience ofthe consumer such as downloadable forms for tax payment,

application for license renewal. Audio and video capability is provided for relevant public
information.

The government officials can be contacted via email, fax, telephone and post. The site is updated
with greater regularity to keep theinformation current and up to date for the public.

STAGE 4 :- TRNASACTIONAL PRESENCE

Stage IV that allows twoway interaction between the citizen and his/her government. It includes
options for paying taxes;applying for ID cards, birth certificates/passports, license renewals and
other similar C2G interactions by allowing him/her to submit these online 24/7.The citizens are a
ble to pay for relevant public services, such as motor vehicle violation, taxes, fees for postal servi
ceces through their credit, bank ordebit card. Providers of goods and services are able to bid onli
ne for public contacts via secure links.

STAGE 5 :- NETWORKED PRESENCE

Stage V which represents the most sophisticated level in the online e-


government initiatives. It can be characterized by anintegration of G2G, G2C and C2G (and reve
rse) interactions. The government encourages participatory deliberative decision-
making and is willing andable to involve the society in a twoway open dialogue. Through interac
tive features such as the web comment form, and innovative online consultationmechanisms, the
government actively solicits citizens' views on public policy, law making, and democratic partici
patory decision making. Implicit in thisstage of the model is the integration of the public sector a
gencies with full cooperation and understanding of the concept of collective decision-
making,participatory democracy and citizen empowerment as a democratic right.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 36

ADVANTAGES OF E GOVERNANCE

1. SPEED
Technology makes communication swifter. Internet, smartphones have enables instant
transmission of high volumes of data all over the world.
2. SAVING COSTS
A lot the Government expenditure goes towards the cost of buying stationery for official
purposes. Letters and written records consume a lot of stationery. However, replacing
them with smartphones and the internet can saves crores of money in expenses every
year.
3. TRANSPARENCY
The use of e-governance helps make all functions of the business transparent. All
Governmental information can be uploaded onto the internet. The citizens access
specifically access whichever information they want, whenever they want it, at the click
of a mouse, or the touch of a finger.
4. ACCOUNTABILITY
Transparency directly links to accountability. Once the functions of the government are
available, we can hold them accountable for their actions.
5. REDUCED CORRUPTION
E-governance is used, being considered an efficient and effective mean to improve public
transparency and reduce corruption.
6. INCREASED CONVENIENCE
E- governance is very essential tool for the convenience to both customers and
government for proper utilization of services in effective and efficient manner.
7. GROWTH IN GDP
E- governance main objective is to reduced corruption this leads to the growth in the
GDP leave and increased in the standard of living of the people in the country.
8. REDUCTION IN OVERALL COST
E- governance is all about the electronic not involved in any paper work it leads to the
reduction of cost and other expenses to the government.

CHALLENGES OR DISADVANTAGES OF E GOVERNANCE

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 37

1. ILLITERACY
A large number of people in India are illiterate and do not know how to operate
computers and smartphones. E-governance is very difficult for them to access and
understand.
2. CYBER CRIME / LEAKAGE OF PERSONAL INFORMATION
There is always the risk of private data of citizens stored in government serves being
stolen. Cybercrime is a serious issue, a breach of data can make the public lose
confidence in the Government’s ability to govern the people.
3. HIGHER SET UP COST AND TECHANICAL DIFFICULTIES
Technology has its disadvantages as well. Specifically, the setup cost is very high and the
machines have to be regularly maintained. Often, computers and internet can also break
down and put a dent in governmental work and services.
4. LOSS OF INTERPERSONAL COMMUNICATION
The main disadvantage of e-governance is the loss of interpersonal communication.
Interpersonal communication is an aspect of communication that many people consider
vital.
5. MANAGEMENT OF CHANGE
It demands fundamental changes in Government decision management. The employees
need to be delegated more authority. De- layering of the decision-making levels leads to
re-engineering and appropriate sizing of the decision-making machinery.

6. FUNDING
Funding is the foremost issue in e-Governance initiatives. The projects that are part of the
e-governance initiatives need to be funded either through the Government sector or
through the private sector.
7. TECHNOLOGY ISSUES
A number of organizations, both in the Centre and the States, have taken commendable
initiatives to develop hardware and software platforms to address the challenges offered
by e-Governance. At the central level in particular, the C-DAC, CMC and a number of
others are noteworthy.
8. PRIVACY

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 38

The privacy of the citizen also needs to be ensured while addressing the issues. Whenever
a citizen gets into any transaction with a Government agency, he shells out lot of personal
information, which can be misused by the private sector. Thus, the citizen should be
ensured that the information flow would pass through reliable channels and seamless
network.

STRATEGIES FOR IMPLEMENTATION OF E GOVERNANCE OR REQUIREMENTS


FOR IMPLEMENTING SUCCESSFUL E- GOVERNANCE ACROSS THE NATION

1. e-Governance framework across the nation with enough bandwidth to service a


population of one billion.
2. Connectivity framework for making the services to reach rural areas of the country or
development of alternative means of services such as e-governance kiosks in regional
languages.
3. National Citizen Database which is the primary unit of data for all governance vertical
and horizontal applications across the state and central governments.
4. E-governance and interoperability standards for the exchange of secure information
with non-repudiation, across the state and central government departments seamlessly.
5. A secure delivery framework by means of private network connecting across the state
and central government departments.
6. Datacentres in centre and states to handle the departmental workflow automation,
collaboration, interaction, exchange of information with authentication.

E GOVERNANCE – INTERNATIONAL STATUS

Foreign Perspective on E-Governance

The concept of E-Governance is recognized globally. It has been implemented in almost all
countries in the world, which have developed internet infrastructure framework and information
networks. On the click of the button (below), you will be directed to the website for the ICEGOV
(an international conference on theory and practise of E-Governance), which will be held in
Seoul, South Korea from 22-25 October 2013. It will be a good refresher.

"The IT and the internet is same everywhere. The countries have the same protocol, same
operating system and architecture used at the local level; however, the way how it is

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 39

implemented and how it is prioritized in different spheres is very different in different


countries. There is no universal application module and implementation module for IT. Every
country has its own road map: social, cultural political and economic issues which are around
and dominant in the country are actually the drivers of the information society and not IT. It has
never been technology project. We have to learn the local circumstances of demand and the way
priorities are set in particular countries. Is it driven by campaigning? true aspiration? This
regards to categorize sustainable government and failures. Whether it is developing countries, or
countries such as USA, UK, Germany, etc., we see that the projects are driven by campaigns and
not based on established fundamentals, the core access architecture, security architecture;
therefore, the project fails. When it is based on long term, not on campaigning, but long term
strategies on core architecture and telecommunication networks, E-Governance prevails"

"Local focus and influence = success factor of E-Governance Positive mind-set


and overall knowledge of all stakeholders (since stakeholders are a cause to failures) Trust is a
crucial factor. Trust in country, in politicians, in civil society, in technology should be there
before you establish a project of E-Governance. Windows of starting such projects are so narrow
(and that is why we must build knowledge and trust before)"

E GOVERNANCE – INDIAN STATUS

E-governance refers to the delivery of government information and services via the Information
and communications technology (ICT) to citizens or businesses or governmental agencies. The
purpose of this paper is to present the status of e-Governance in India. The paper discusses the
initiatives taken by Government of India to computerize Government to Citizen (G2C),
Governance to Business (G2B) and Government to Government (G2G) services. The important
G2C services like National Rural Employment Guarantee Scheme (NREGS) and Dial.Gov; G2B
services like Ministry of Corporate Affairs and G2G services like Smart Government of Andhra
Pradesh and e-Office are presented in detail. Tools and Technologies are adopted for providing
e-Governance services are explained. The issues in digital governance like Cyber Crime and lack
of Citizen Unique Identity are also mentioned. Government projects in pipeline and future
projects are also included. It is concluded that e-Governance in India enables people to have
efficient, effective, transparent and accountable services.

• Better access to information and quality services for citizens

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 40

• Simplicity, efficiency and accountability in the government


• Expanded reach of government

The Government of India inspires to provide a hassle-free information system that allows the
citizens of India as well the businesses and other governmental bodies to engage in digital
transactions over services and other useful applications, with each other. India has its 'National
Portal' comprising of various services and information about E-Governance and its programs
visible onhttp://india.gov.in . The Government of India embraces E-Governance in the following
three areas:

Governance

• Transparency
• People's participation
• Promotion of a democratic society

Public Services

• Efficient, cost-effective & responsive government


• Convenient services to its citizens & businesses
• Greater citizen access to public information
• Quick delivery of services to citizens

Management

• Managing large amounts of data properly


• Quick & secure communication

Initiatives by the Government-Central & State

Aapka Aadhar (Govt. of India)

• Unique Identification Card of India


• Digital synchronisation of fingerprints, self-photograph, personal information (name of the
card holder, permanent address, phone number, name of father etc.
• Soft and hard copy of ID Card
• Bar-code on the ID Card (swift scanning)

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 41

Customs & Excise (Govt. of India)

• Computerization of 98% of export & 90-95% of import documentation


• Electronic filing at 3 locations: Delhi, Mumbai & Chennai
• Processing of 80% of Service Tax

UNIT4:- INFORMATION TECHNOLOGY ACT 2000

INTRODUCTION

IT ACT 2000 (Information Technology Act, 2000)


The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of
the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law
in India dealing with cybercrime and electronic commerce. It is based on the UNCITRAL Model
Law on International Commercial Arbitration recommended by the General Assembly of United
Nations by a resolution dated 30 January 1997.

OBJECTIVES OF IT ACT 2000

• Grant legal recognition to all transactions done via electronic exchange of data or other
electronic means of communication or e-commerce, in place of the earlier paper-based
method of communication.
• Give legal recognition to digital signatures for the authentication of any information or
matters requiring legal authentication
• Facilitate the electronic filing of documents with Government agencies and also
departments
• Facilitate the electronic storage of data
• Give legal sanction and also facilitate the electronic transfer of funds between banks and
financial institutions
• Grant legal recognition to bankers under the Evidence Act, 1891 and the Reserve Bank of
India Act, 1934, for keeping the books of accounts in electronic form.

SAILENT FEATURES OF IT ACT 2000

• All electronic contracts made through secure electronic channels are legally valid.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 42

• Legal recognition for digital signatures.


• Security measures for electronic records and also digital signatures are in place
• A procedure for the appointment of adjudicating officers for holding inquiries under the
Act is finalized
• Provision for establishing a Cyber Regulatory Appellant Tribunal under the Act. Further,
this tribunal will handle all appeals made against the order of the Controller or Adjudicating
Officer.
• An appeal against the order of the Cyber Appellant Tribunal is possible only in the High
Court
• Digital Signatures will use an asymmetric cryptosystem and also a hash function
• Provision for the appointment of the Controller of Certifying Authorities (CCA) to license
and regulate the working of Certifying Authorities. The Controller to act as a repository of
all digital signatures.
• The Act applies to offences or contraventions committed outside India
• Senior police officers and other officers can enter any public place and search and arrest
without warrant
• Provisions for the constitution of a Cyber Regulations Advisory Committee to advise the
Central Government and Controller.

SECTIONS UNDER INFORMATION TECHNOLOGY ACT 2000

(i) Extends to the whole of India (Section 1) ;

(ii) Authentication of electronic records (Section 3) ;

(iii) Legal Framework for affixing Digital signature by use of asymmetric crypto system and

hash function (Section 3) ;

(iv) Legal recognition of electronic records (Section 4);

(v) Legal recognition of digital signatures (Section 5) ;

(vi) Retention of electronic record (Section 7);

(vii) Publication of Official Gazette in electronic form (Section 8);

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 43

(viii) Security procedure for electronic records and digital signature (Sections 14, 15, 16);

(ix) Licensing and Regulation of Certifying authorities for issuing digital signature

certificates (Sections 17-42);

(x) Functions of Controller (Section 18);

(xi) Appointment of Certifying Authorities and Controller of Certifying Authorities,

including recognition of foreign Certifying Authorities (Section 19);

(xii) Controller to act as repository of all digital signature certificates (Section 20);

(xiii) Data Protection (Sections 43 & 66);

(xiv) Various types of computer crimes defined and stringent penalties provided under the

Act (Section 43 and Sections 66, 67, 72);

(xv) Appointment of adjudicating officer for holding inquiries under the Act (Sections 46 &

47);

(xvi) Establishment of Cyber Appellate Tribunal under the Act (Sections 48-56);

(xvii) Appeal from order of Adjudicating Officer to Cyber Appellate Tribunal and not to any

Civil Court (Section 57);

(xviii) Appeal from order of Cyber Appellate Tribunal to High Court (Section 62);

(xix) Interception of information from computer to computer (Section 69);

(xx) Protection System (Section 70);

(xxi) Act to apply for offences or contraventions committed outside India (Section 75);

(xxii) Investigation of computer crimes to be investigated by officer at the DSP (Deputy

Superintendent of Police) level;

(xxiii) Network service providers not to be liable in certain cases (Section 79);

(xxiv) Power of police officers and other officers to enter into any public place and search

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 44

and arrest without warrant (Section 80);

(xxv) Offences by the Companies (Section 85);

(xxvi) Constitution of Cyber Regulations Advisory Committee who will advice the Central

Government and Controller (Section 88).

VARIOUS REGULATIONS PROVIDED FOR CERTIFYING AUTHORITIES AS PER


INFORMATION TECHNOLOGY ACT 2000

1. Section 17 – Appointment of the Controller and other officers


The Head Office and Branch Office of the office of the Controller shall be at such places
as the Central Government may specify, and these may be established at such places as the
Central Government may think fit.
2. Functions of Controller (Section 18)
• Supervise the activities of the Certifying Authorities and also certify their public
keys
• Lay down the standards that the Certifying Authorities follow
• Resolve any conflict of interests between the Certifying Authorities and the
subscribers
• Lay down the duties of the Certifying Authorities
3. Recognition of Foreign Certifying Authority (Section 19)
A Controller has the right to recognize any foreign certifying authority as a certifying
authority for the purpose of the IT Act, 2000. While this is subject to the conditions and
restrictions which the regulations specify, the Controller can recognize it with the previous
approval of the Central Government and notify in the Official Gazette.
4. Controller to act as a repository (Section 20)
The Controller will act as a repository of all digital signature certificates under this Act.
The Controller will maintain a computerized database of all public keys. Further, he must
ensure that the public keys and the database are available to any member of the public.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 45

5. License to issue Digital Signature Certificates (Section 21)


Subject to the provisions of sub-section any person can apply to the Controller for a license
to issue digital signature certificates.
A Controller can issue a license under sub-section only if the applicant fulfills all the
requirements. The Central Government specifies requirements with respect
to qualification, expertise, manpower, financial resources, and also infrastructure facilities
for the issuance of digital signature certificates.

DIGITAL SIGNATURE

MEANING

Digital Signature is a mathematical technique used to validate the authenticity and integrity of a
message, software or digital document.

A digital signature is a electronic rather than a written signature that can be used by someone to
authenticity the identity of the sender of a message or of the signer of a document.

PROCESS OF DIGITAL SIGNATURE

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 46

Digital Signature is a process that guarantees that the contents of a message have not been altered
in transit. When you, the server, digitally sign a document, you add a one-way hash (encryption)
of the message content using your public and private key pair.

ADVANTAGES OF DIGITAL SIGNATURE

1. SAVES TIME
You no longer have to wait for your manager to return from a holiday or conference for
that signature. Digital signatures ensure that businesses save on cost and time with
documents and contracts signed off with a click of a button.
2. COST SAVINGS
Many companies also see significant cost savings, with little or no expense in ink, paper,
printing, scanning , shipping/delivery or travel expenses. There are also savings in other
indirect costs such as filing, rekeying data, archiving, or tracking.

3. WORKFLOW EFFICENCY
With lesser delays, digital signatures ensure better efficiency in workflow. Managing and
tracking documents are made easier, with lesser effort and time involved. Many features
of the digital signatures help speed up the work process. For instance, email notifications
help remind the person to sign, while status tracking, help to know at which stage the
document is at.
4. BETTER CUSTOMER EXPERIENCE
Digital signatures provide the convenience of signing important documents where ever a
customer or the person to sign is located. Sales persons do not have to wait for the customer
to come to the bank or office. Documents can be signed off at the door step. This is ideal,
especially in remote areas and smaller townships providing improved and personalized
services. The customer has the freedom to be anywhere, and engage with a company,
making services and businesses far more easy, quick and user – friendly.
5. SECURITY
When it comes to signatures, authenticity and security is a priority. Digital signatures
reduce the risk of duplication or alteration of the document itself. Digital signatures ensure

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 47

that signatures are verified, authentic and legitimate. Signers are provided with PINs,
password and codes that can authenticate and verify their identity and approve their
signatures.
6. LEGAL VALIDITY
Digital signatures provides authenticity and ensures that the signature is verified. This can
stand in any court of law like any other signed paper document. Time stamping and ability
to track and easily archive documents improve and simplify audit and compliance.
7. FUTURE VALIDITY
Digital signatures also hold validity into the future. ETSI PDF Advanced Signatures
(PAdES) with its eIDAS requirements have validity well into the future with its long term
signature formats. Should there be far reaching technological changes, digital signatures
would still be valid for the foreseeable future.
8. ENVIRONMENTAL BENEFITS
As corporates and business become more conscious of their role in sustainability, digital
signatures is a step ahead in their efforts in reducing waste and being environmental
friendly.
9. BUSINESS EFFICIENCY
The costs involved in integrating digital signatures into the work processes is relatively
small, compared to its benefits. With quicker contract turnaround time, and reduced the
work flow time, digital signatures are ideal for both small and large organizations.

ELECTRONIC SIGNATURE

MEANING

An electronic signature, or e-signature, refers to data in electronic form, which is logically


associated with other data in electronic form and which is used by the signatory to
sign.[1][2][3] This type of signature provides the same legal standing as a handwritten signature
as long as it adheres to the requirements of the specific regulation it was created under
(e.g., eIDAS in the European Union, NIST-DSS in the USA or ZertES in Switzerland).

An electronic signature or e-signature, indicates either that a person who demands to have created
a message is the one who created it.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 48

A signature can be defined as a schematic script related with a person. A signature on a document
is a sign that the person accepts the purposes recorded in the document. In many engineering
companies digital seals are also required for another layer of authentication and security. Digital
seals and signatures are same as handwritten signatures and stamped seals.

USES OF ELECTRONIC SIGNATURE

1. GOVERNMENT
The U.S. Government Publishing Office publishes electronic versions of budgets, public
and private laws and congressional bills with electronic signatures.
2. HEALTH CARE
electronic signatures are used in the healthcare industry to improve the efficiency of
treatment and administrative processes, to strengthen data security, for e-prescribing and
hospital admissions.
3. MANUFACTURING
Manufacturing companies use digital signatures to speed up processes, including product
design, quality assurance (QA), manufacturing enhancements, marketing and sales.
4. FINANCIAL SERVICES
The U.S. financial sector uses digital signatures for contracts, paperless banking, loan
processing, insurance documentation, mortgages and more.

DIGITAL SIGNATURE V/S ELECTRONIC SIGNATURE

While digital signature is a technical term, defining the result of a cryptographic process that can
be used to authenticate a sequence of data, the term electronic signature -- or e-signature -- is a
legal term that is defined legislatively.

For example, in the United States, the term was defined in the Electronic Signatures in Global and
National Commerce Act, passed in 2000, as meaning "an electronic sound, symbol, or process,
attached to or logically associated with a contract or other record and executed or adopted by a
person with the intent to sign the record."

DIGITAL REPOSITORY

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 49

A digital repository is a mechanism for managing and storing digital content.Repositories can be
subject or institutional in their focus. Putting content into an institutional repository enables staff
and institutions to manage and preserve it, and therefore derive maximum value from it.

CYBER APPELLATE TRIBUNAL

CHAPTER X

THE CYBER REGULATIONS APPELLATE

TRIBUNAL

48. Establishment of Cyber Appellate Tribunal.

(1) The Central Government shall, by notification, establish one or more appellate tribunals to be
known as the Cyber Regulations Appellate Tribunal.

2) The Central Government shall also specify, in the notification referred to in sub-section (1), the
matters and places in relation to which the Cyber Appellate Tribunal may exercise jurisdiction.

49. Composition of Cyber Appellate Tribunal.

A Cyber Appellate Tribunal shall consist of one person only (hereinafter referred to as the
Residing Officer of the Cyber Appellate Tribunal) to be appointed, by notification, by the Central
Government.

50. Qualifications for appointment as Presiding Officer of the Cyber Appellate Tribunal.

A person shall not be qualified for appointment as the Presiding Officer of a Cyber Appellate
Tribunal unless he—

(a) is, or has been. or is qualified to be, a Judge of a High Court; or

(b) is or has been a member of the Indian Legal Service and is holding or has held a post in Grade
I of that Service for at least three years.

51. Term of office

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 50

The Presiding Officer of a Cyber Appellate Tribunal shall hold office for a term of five years from
the date on which he enters upon his office or until he attains the age of sixty-five years, whichever
is earlier.

52. Salary, allowances and other terms and conditions of service of Presiding Officer.

The salary and allowances payable to, and the other terms and conditions of service including
pension, gratuity and other retirement benefits of. the Presiding Officer of a Cyber Appellate
Tribunal shall be such as may be prescribed: Provided that neither the salary and allowances nor
the other terms and conditions of service of the Presiding Officer shall be varied to his disadvantage
after appointment.

53. Filling up of vacancies.

If, for reason other than temporary absence, any vacancy occurs in the office n the Presiding
Officer of a Cyber Appellate Tribunal, then the Central Government shall appoint another person
in accordance with the provisions of this Act to fill the vacancy and the proceedings may be
continued before the Cyber Appellate Tribunal from the stage at which the vacancy is filled.

54. Resignation and removal.

(1) The Presiding Officer of a Cyber Appellate Tribunal may, by notice in writing under his hand
addressed to the Central Government, resign his office:

(2) The Presiding Officer of a Cyber Appellate Tribunal shall not be removed from his office
except by an order by the Central Government on the ground of proved misbehaviour or incapacity
after an inquiry made by a Judge of the Supreme Court in which the Presiding Officer concerned
has been informed of the charges against him and given a reasonable opportunity of being heard
in respect of these charges.

(3) The Central Government may, by rules, regulate the procedure for the investigation of
misbehavior or incapacity of the aforesaid Presiding Officer.

55. Orders constituting Appellate Tribunal to be final and not to invalidate its proceedings.

No order of the Central Government appointing any person as the Presiding Officer of a Cyber
Appellate Tribunal shall be called in question in any manner and no act or proceeding before a

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 51

Cyber Appellate Tribunal shall be called in question in any manner on the ground merely of any
defect in the constitution of a Cyber Appellate Tribunal.

56. Staff of the Cyber Appellate Tribunal.

(1) The Central Government shall provide the Cyber Appellate Tribunal with such officers and
employees as that Government may think fit

(2) The officers and employees of the Cyber Appellate Tribunal shall discharge their functions
under general superintendence of the Presiding Officer.

(3) The salaries, allowances and other conditions of service of the officers and employees or' the
Cyber Appellate Tribunal shall be such as may be prescribed by the Central Government.

57. Appeal to Cyber Appellate Tribunal.

(1) Save as provided in sub-section (2), any person aggrieved by an order made by Controller or
an adjudicating officer under this Act may prefer an appeal to a Cyber Appellate Tribunal having
jurisdiction in the matter.

(2) No appeal shall lie to the Cyber Appellate Tribunal from an order made by an adjudicating
officer with the consent of the parties

58. Procedure and powers of the Cyber Appellate Tribunal.

(1) The Cyber Appellate Tribunal shall not be bound by the procedure laid down by the Code of
civil Procedure, 1908 but shall be guided by the principles of natural justice and, subject to the
other provisions of this Act and of any rules, the Cyber Appellate Tribunal shall have powers to
regulate its own procedure including the place at which it shall have its sittings.

(2) The Cyber Appellate Tribunal shall have, for the purposes of discharging its functions under
this Act, the same powers as are vested in a civil court under the Code of Civil Procedure, 1908,
while trying a suit, in respect of the following matters, namely:—

(a) summoning and enforcing the attendance of any person and examining him on oath;

(b) requiring the discovery and production of documents or other electronic records;

(c) receiving evidence on affidavits;

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 52

(d) issuing commissions for the examination of witnesses or documents;

(e) reviewing its decisions;

(f) dismissing an application for default or deciding it ex pane;

59. Right to legal representation.

The appellant may either appear in person or authorize one or more legal practitioners or any of
its officers to present his or its case before the Cyber Appellate Tribunal.

60. Limitation.

The provisions of the Limitation Act, 1963, shall, as far as may be, apply to an appeal made to the
Cyber Appellate Tribunal.

61. Civil court not to have jurisdiction.

No court shall have jurisdiction to entertain any suit or proceeding in respect of any matter which
an adjudicating officer appointed under this Act or the Cyber Appellate Tribunal constituted under
this Act is empowered by or under this Act to determine and no injunction shall be granted by any
court or other authority in respect of any action taken or to be taken in pursuance of any power
conferred by or under this Act.

62. Appeal to High Court.

Any person aggrieved by any decision or order of the Cyber Appellate Tribunal may. file an appeal
to the High Court within sixty days from the date of communication of the decision or order of the
Cyber Appellate Tribunal to him on any question of fact or law arising out of such order.

63. Compounding of contraventions.

(Any contravention under this Chapter may, either before or after the institution of adjudication
proceedings, be compounded by the Controller or such other officer as may be specially authorised
by him in this behalf or by the adjudicating officer.

64. Recovery of penalty

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 53

A penalty imposed under this Act, if it is not paid, shall be recovered as an arrear of land revenue
and the licence or the Digital Signature Certificate, as the case may be, shall be suspended till the
penalty is paid.

ADJUDICATOR

provides any assistance to any person to facilitate access to a computer, computer system or
computer network in contravention of the provisions of this Act,

46. Power to adjudicate.

(1) For the purpose of adjudging under this Chapter whether any person has committed a
contravention of any of the provisions of this Act or of any rule, regulation, direction or order
made thereunder the Central Government shall, subject to the provisions of sub-section.

(2) The adjudicating officer shall, after giving the person referred to in sub-section (1a) reasonable
opportunity for making representation in the matter and if, on such Inquiry.

(3) No person shall be appointed as an adjudicating officer unless he possesses such experience in
the field of Information Technology and legal or judicial experience as may be prescribed by the
Central Government.

(4) Where more than one adjudicating officers are appointed, the Central Government shall specify
by order the matters and places with respect to which such officers shall exercise their jurisdiction.

(5) Every adjudicating officer shall have the powers of a civil court which are conferred oh the
Cyber Appellate Tribunal under sub-section (2) of section 58, and— (a) all proceedings before it
shall be deemed to be judicial proceedings within the meaning of sections 193 and 228 of the
Indian Penal Code;(b) shall be deemed to be a civil court for the purposes of sections 345 and 346
of the Code of Criminal Procedure, 1973.

47. Factors to be taken into account by the adjudicating officer.

While adjudging the quantum of compensation under this Chapter, the adjudicating

officer shall have due regard to the following factors, namely:—

• the amount of gain of unfair advantage, wherever quantifiable, made as a

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 54

result of the default;


• the amount of loss caused to any person as a result of the default;
• the repetitive nature of the default

CHAPTER XI

OFFENCES

65. Tampering with computer source documents.

Whoever knowingly or intentionally conceals, destroys or alters or intentionally or

knowingly causes another to conceal, destroy or alter any computer source code used for a

computer, computer programme, computer system or computer network, when the

computer source code is required to be kept or maintained by law for the time being in

force, shall be punishable with imprisonment up to three years, or with fine which may

extend up to two lakh rupees, or with both.

Explanation.—For the purposes of this section, "computer source code" means the

listing of programmes, computer commands, design and layout and programme analysis of

computer resource in any form.

66. Hacking with computer system.

(1) Whoever with the intent to cause or knowing that he is likely to cause wrongful

loss or damage to the public or any person destroys or deletes or alters any information

residing in a computer resource or diminishes its value or utility or affects it injuriously by

any means, commits hack:

(2) Whoever commits hacking shall be punished with imprisonment up to three years,

or with fine which may extend upto two lakh rupees, or with both.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 55

67. Publishing of information which is obscene in electronic form.

Whoever publishes or transmits or causes to be published in the electronic form, any

material which is lascivious or appeals to the prurient interest or if its effect is such as to
tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances.

68. Power of Controller to give directions.

(1) The Controller may, by order, direct a Certifying Authority or any employee of such

Authority to take such measures or cease carrying on such activities as specified in the order if
those

are necessary to ensure compliance with the provisions of this Act, rules or any regulations made

thereunder.

(2) Any person who fails to comply with any order under sub-section (1) shall be guilty of an

offence and shall be liable on conviction to imprisonment for a term not exceeding three years or
to a

Fine not exceeding two lakh rupees or to both.

69. Directions of Controller to a subscriber to extend facilities to decrypt information.

(1) If the Controller is satisfied that it is necessary or expedient so to do in the interest of the
sovereignty or integrity of India, the security of the State, friendly relations with foreign Stales or
public order or for preventing incitement to the commission of any cognizable offence, for reasons
to be recorded in writing, by order, direct any agency of the Government to intercept any
information transmitted through any computer resource.

(2) The subscriber or any person incharge of the computer resource shall, when called upon by any
agency which has been directed under sub-section (1), extend all facilities and technical assistance
to decrypt the information.

(3) The subscriber or any person who fails to assist the agency referred to in sub-section (2)

shall be punished with an imprisonment for a term which may extend to seven years.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 56

70. Protected system.

(1) The appropriate Government may, by notification in the Official Gazette, declare that any

computer, computer system or computer network to be a protected system.

(2) The appropriate Government may, by order in writing, authorize the persons who are

authorized to access protected systems notified under sub-section (1).

(3) Any person who secures access or attempts to secure access to a protected system in

contravention of the provisions of this section shall be punished with imprisonment of either

description for a term which may extend to ten years and shall also be liable to fine.

71. Penalty for misrepresentation.

Whoever makes any misrepresentation to, or suppresses any material fact from, the Controller

or the Certifying Authority for obtaining any license or Digital Signature Certificate, as the case
may

be. shall be punished with imprisonment for a term which may extend to two years, or with fine
which

may extend to one lakh rupees, or with both.

72. Penalty for breach of confidentiality and privacy.

Save as otherwise provided in this Act or any other law for the time being in force, any person

who, in pursuance of any of the powers conferred under this Act, rules or regulations made
thereunder,

has secured access to any electronic record, book, register, correspondence, information, document
or

other material without the consent of the person concerned discloses such electronic record, book.

register, correspondence, information, document or other material to any other person shall be

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 57

punished with imprisonment for a term which may extend to two years, or with fine which may
extend

to one lakh rupees, or with both.

73. Penalty for publishing Digital Signature Certificate false in certain particulars.

(1) No person shall publish a Digital Signature Certificate or otherwise make it available to any

other person with the knowledge that—

(a) the Certifying Authority listed in the certificate has not issued it; or

(b) the subscriber listed in the certificate has not accepted it; or

(c) the certificate has been revoked or suspended,

unless such publication is for the purpose of verifying a digital signature created prior to such

suspension or revocation.

(2) Any person who contravenes the provisions of sub-section (1) shall be punished with

imprisonment for a term which may extend to two years, or with fine which may extend to one
lakh

rupees, or with both.

74. Publication for fraudulent purpose.

Whoever knowingly creates, publishes or otherwise makes available a Digital Signature

Certificate for any fraudulent or unlawful purpose shall be punished with imprisonment for a term

which may extend to two years, or with fine which may extend to one lakh rupees, or with both.

75. Act to apply for offence or contravention committed outside India.

(1) Subject to the provisions of sub-section (2), the provisions of this Act shall apply also to

any offence or contravention committed outside India by any person irrespective of his nationality.

(2) For the purposes of sub-section (1), this Act shall apply to an offence or contravention

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 58

committed outside India by any person if the act or conduct constituting the offence or
contravention

involves a computer, computer system or computer network located in India.

76. Confiscation.

Any computer, computer system, floppies, compact disks, tape drives or any other accessories

related thereto, in respect of which any provision of this Act. rules, orders or regulations made

thereunder has been or is being contravened, shall be liable to confiscation:

Provided that where it is established to the satisfaction of the court adjudicating the confiscation

that the person in whose possession, power or control of any such computer, computer system,

floppies, compact disks, tape drives or any other accessories relating thereto is found is not

responsible for the contravention of the provisions of this Act, rules, orders or regulations made

thereunder, the court may, instead of making an order for confiscation of such computer, computer

system, floppies, compact disks, tape drives or any other accessories related thereto, make such
other

order authorized by this Act against the person contravening of the provisions of this Act, rules,
orders

or regulations made thereunder as it may think fit.

77. Penalties or confiscation not to interfere with other punishments.

No penalty imposed or confiscation made under this Act shall prevent the imposition of any

other punishment to which the person affected thereby is liable under any other law for the time
being

in force.

78. Power to investigate offences.

Notwithstanding anything contained in the Code of Criminal Procedure, 1973, a police officer

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 59

not below the rank of Deputy Superintendent of Police shall investigate any offence under this
Act.

CHAPTER IX

PENALTIES AND ADJUD1CATION

43. Penalty for damage to computer, computer system, etc.

If any person without permission of the owner or any other person who is incharge of a

computer, computer system or computer network, —

• accesses or secures access to such computer, computer system or computer network;


• (b) downloads, copies or extracts any data, computer data base or information
• from such computer, computer system or computer network including information or
• data held or stored in any removable storage medium;
• (c) i introduces or causes to be introduced any computer contaminant or
• computer virus into any computer, computer system or computer network;

44. Penalty for failure to furnish information return, etc.

If any person who is required under this Act or any rules or regulations made

thereunder to—
(a) furnish any document, return or report to the Controller or ?he Certifying
Authority fails to furnish the same, he shall be liable to a penalty not exceeding one
lakh and fifty thousand rupees for each such failure;
(b) file any return or furnish any information, books or other documents within
the time specified therefor in the regulations fails to file return or furnish the same
within the time specified therefor in the regulations, he shall be liable to a penalty not
exceeding five thousand rupees for every day during which such failure continues;

45. Residuary penalty.

Ramaiah Institute of Business Studies GIRISH G.N


CYBER SPACE 60

Whoever contravenes any rules or regulations made under this Act, for .the contravention of which
no penalty has been separately provided, shall be liable to pay a compensation not exceeding
twenty-five thousand rupees to the person affected by such contravention or a penalty not
exceeding twenty-five thousand rupees.

Ramaiah Institute of Business Studies GIRISH G.N

You might also like