Professional Documents
Culture Documents
numans uSing We are reaching the next era in h e evolution of the internet.
n e current golden age of information and connectivity has so far been focused on the
n e sonware and devices managing this process are certainly complex, but tor tne most
and
part these systems have relied on humans to act on the information being transierred
n e next Significant step is the removal of the boundary between the physical world and
tne intenet, to enable machines to communicate with each other to achieve pnysical
Outcomes. This is a world where you never run out of milk. because your fridge knows how
much you have left, and can order you more- unless it krnows from your calendar that you
inroads are being made across a number of sectors including energy, telehealth and in the
automative industry where progress has in part been driven by
for all new models of passenger cars to be fitted with "eCall"
a system which
automatically dials the emergency services if the car is involved in a
serious accident.
Spectrum Availability
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEw DELHI
All of the devices required to communicate are unlikely to be hardwired to the internet,
and will instead rely on local or mobile wireless communications. The electromagnetic
we can find ways of
spectrum usable for transmissions is a limited resource, and unless
will reach capacity and
doing more with less, the expansion in wireless.communications
grind to a halt.
This risk has caught the attention of the European Commission and Ofcom. Ofcom has
proposed that one way we can do more with less is to make use of the "white space" in
the spectrum between the licensed bands. A trial of white space technology is due to
Network Coverage
Mobile access is increasingly seen as the solution for consumers in remote localions
where it is not commercially viable to install physical connections, but there are many
locations where there are insufficient users to support even mobile connectivity.
As internet access has become ever more important to modern life, the UK government
has increasingly viewed connectivity in rural locations as a responsibility of government.
For example, the UK 4G spectrum auction earlier this year included specific Coverage
obligations on the bidders.
A two-tier system of those in the internet of things and those out of it would cause
inefficiency and inequality, and it is likely that univeraal access will remain on the
legislative agenda, whether funded centrally or paid for by network businesses (and
therefore indirectly by their subscribers).
As with almost all new technologies, the growth of the intemet of things will be hampered
if producers do not adopt standards which enable devices to interoperate.
There is little point in a home network in which the shower cannot tell the coffee machine
to switch on.
Most technology businesses understand the value to the whole industry of successful
interoperability, and we can expect standards to evolve naturally. particularly considering
the legislative priority given to interoperability in the EU
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI
Market Cooperation
The market for M2M communications is currently fragmented, and there are widely
of the speed of growth in
this sector. Vertical alliances and
varying predictions
consolidation between the different stages of production will improve efficiency and the
Privacy
The amount of personal information we share with online business is a concern of many
With huge amounts of data being generated, tracked and stored by the internet of things
businesses will have an unprecedented insight into the lives of their customers.
As this industry develops and policies designed for the simple information age become
less able to deal with the practical challenges of the internet of things, we will need to
reconsider the basis of our approach to regulating for privacy.
Cyber law covers a fairly broad area, encompassing several subtopics including freedom of
expression. access to and usage of the Internet. and online privacy. Generically, cyber law is
relerred to as the Law of the Interne.
When we think of information technology (IT), we think of computers and the internet. Right?
Even kids can't imagine that there was a time without computers, cell phones and other mobile
devices. We use it everyday and we feel that we can't live without it. We communicate with others
Using cel phones, chat rooms, forums and email. We use the internet for research, entertainment,
communication, work and school. In today's modem time, kids don't have to go to the library to
find information and to do their homework. They conveniently have constant access to the internet
in their own homes. Likewise, businesses use computers and the internet not only for research
purposes but also for gathering and storing information. They no longer have rely
to on paperwork,
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI
sOcIcry used other forms of what was the latest technology at that time. In fact, information
technology has been around for a long time and without the evolution of IT throughout history, it
wouldn't be where it is today and provide us with the modern technologies that are readily
available to us.
Let's go back through history and take a look at the different stages of IT development:
*They created these drawings on rock. This form of language was used to tell a story, to
keep record of how many animals one owned and to mark their territory.
*This eventually led to the arrival
of the
first writing system known as
"cuniform
(cuneiform was first created between 3500 and 3000 BCE by ancient Sumerians, who were
who inhabited the Mesopotamian region) Instead of using pictures to express
a
people
words, signs were composed to correspond with spoken sounds. Afterwards, the
Phoenician alphabet (The Phoenician alphabet is an alphabet (more specifically,
an abjad) known in modern times from the Canaanite and Aramaic inscriptions found
across the
Mediterranean region. The name-comes from the Phoenician civilization)
Phoenicia was an ancient thalassocratic civilization originating in the Levant region of the
castern Mediterranean, primarily located in modern Lebanon.
9P70:I9L
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI
was created which consisted of a more simplified writing technique using symbols to
express single syllables and consonants. Later on, vowels were added and names were
given to the letters to create the alphabet that we use today
As the alphabets and the writing systems became more popular and common, there was more and
more recorded information. This resulted in finding better ways to communicate and keep record
of information.
*The first writing material was simply a pen like object to create markings in wet clay.
leather to
*This led to more usecful forms of writing materials from writing on bark, leaves,
rags to the making of modern-day paper
wrifing on the papyrus plant to making paper with
we use today.
had to confront
However, as more and more people used these new early technologies, they
a new problem.
time? This resulted
*How could of this information for a long period of
they safely store all
in different methods for record keeping such as clay
tablets and scrolls which led to books
and libraries.
It used in
a counting frame, is a calculating tool which has been used since ancient times. was
The slide rule (1600 ADs)- an analog computer that allowed users to multiply and divide.
T h e Pascaline (around 1642 AD) - a mechanical computer that allowed users to add,
T h e Leibniz's machine (1670 ADs) - a machine that was an improvement of the Pascaline
that included additional components that made it easier for users to multiply and divide.
T h e difference engine (1820 ADs) - a machine creation that could calculate numbers and
Even though these machine inventions were not as effective as the latest technologies we use today.
they play a big role in the evolution process of information technology.
During the time of the electromechanical age (between 1840 and 1940), the beginning of
telecommunication emerged. Many revolutionary technologies were invented in this stage
that led to moderm information technology systems.
First, a new method of communicating înformation was discovered with the voltaic
battery
This discovery. was the first electrical battery that created and stored electricity.
Afterwards, the telegraph was invented to communicate with others over great distances
through the use of electricity.
This led to- the development of Morse Code. (Morse code is a method used in
telecommunication to encode text characters as standardized sequences of two
different signal durations, called dots and dashes, or dits and dahs. Morse code is
named after Samuel Morse, one of the inventors of the telegraph)
This was a system built to communicate with others by breaking down the alphabet into
dots and dashes, transformed into electrical impulses and transmitted over a wire. This was
very similar to today 's digital technologies that break down information. Shortly
afterwards, the telephone and radio were invented. Later on, the first digital computer was
created. It consisted of electromechanical computing
components, data and program
readers, automatic typewriters and input/output and control readers. It was different fromn
our moderm
computers but it resulted an interest to explore
other to make the
ways system
smaller and to operate more effectively.
The Electronic Age (from 1940 to present day)
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI
*The electronic
age (from 1940 to
present day) isthe stage of intormation technology that
we
currently live in.
* t first started when clectronic equipment including computers began to take place. At the
Deginning of this stage, it was realized that clectronic vacuum tubes could be used
of clectromechanical parts. instead
T h e first
high-specd digital computer was the ENIAC, Flectronic Numerical Integrator and
Computer. (ENIAC, in full Electronic Numerical Integrator and Computer, the first
programmable general-purpose electronic digital computer, built during
the United States.
World War II by
*American physicist John Mauchly, American engineer J. Presper Eckert, Jr., and their
colleagues at the Moore School of Electrical Engineering at the University_of
Pennsylvania led a government-funded project to build an all-electronic computer.
I t was able 4o solve a large class of numerical problems through reprogramming.It was
also one thousand times faster than that of
electro-mechanical machines from the previous
age.
However, the problem with the ENTAC was that it didn't have the capacity to store program
instructions in its memory. Then, the EDSAC, Electronic Delay Storage Automatic
Calculator was created and was recognized as the first stored-program computer.
Afterwards, the world's first commercial computer was invented known LEO
as (Lyons
Eletronic Office).
The evolution of information technology and the development of computers have been
grouped into five different stages or generations. They are:
*During the first generation, computer systems used vacuum tubes. The machines were huge
and took up entire rooms.
*They consumed a large amount of electricity and therefore, were
expensive to operate.
They also generated a lot of heat which
*These first generation
resulted in malfunctions.
computers relied on machine language and could only solve one
problem ata time. It also took a long, complicated process to set a new
the machine.
up problem onto
*Punched cards and paper tape were used for
The ENIAC
input and printouts were used to display output.
was an
example of a first generation computer but it was
plugboard añd switches. programmed by
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI
I n the second generation, vacuum tubes were replaced with transistors. This was a major
improvement, allowing computers to become smaller, faster, cheaper, reliable and morc
energy-cficient.
They were also becoming more accessible sincc high-level programming languages were
developed such as COBOL and FORTRAN.
being
Second generation computers leaned away from cryptic, binary machine language to
symbolic, assembly languages which instruction.
programmed written
Magnetic core technology was also used instead of magnetic drum which made it possible
for computers to store their instructions in their memory.
little, magnetic tape and disks took the place of punched cards.
Litle by
Generation (I964-1971)
The Third
By the time the third generation arrived, there was an increase in the speed and the
efficiency of computers due to the development of integrated circuits
Transistors were made smaller and installed onsilicon chips. Punched cards and printouts
became obsolete since operating systems, keyboards and monitors were created
This allowed computers to operate many different applications at one time with one main
program to monitor and store information. Programming languages were developed that
made programming easier to do:
BASIC was one of those languages. For the first time in history, society as a whole had
access to computêrs.
We are
currently in the fifth
generation. A lot of today s research focuses on artificial
intelligence, the creation of intelligent machines that fiunction and bchave like humans.
Speech recognition, learning. planning and problem solving are some of the activities that
are being tested and performed.
Even though art/ticial intelligence is still in development, there are some applications that
are being used such as voice recognition.
Overall, the main goal is to develop devices that respond to natural language input and that
are capable of learning.
I n conclusion, information technology has been in existence for thousands of years and has
been evolving since the beginning of time - and ît is still evolving.
Human beings have been collecting information in different ways and have discovered
different forms to communicate through the use of technologies.
Infomation technology has been essential to our lives and has made a huge impact
throughout history. Without it, we wouldn't be here today with the latest, advanced
technologies.
The Islanic Empire consisted of a society that was multicultural in terms of languages,
customs, tragitions and religion.
A s Muslims went forth from Arabia to conquer the countries surrounding them, they
encompassed vast lands with peoples of different faiths and cultures.
Thus the Islamic Empire not only consisted of Muslims from three continents, Arabs,
Persians, Turks, Africans, Indians and other Asians, but also Jews, Christians and other
faiths.
&Therefore scholars from all faiths worked under the umbrella ofIslam to produce a unique
culture of knowledge and learning.
I n the paragraphs that follow each major known field of science is considered and
examined for the contributions made by scholars from the Islamic world.
Mathematical Sciences
*The mathematical sciences as practised in the slamic world during this period consisted
of mathematics, algcbra, and geomctry as well as mathematical geography, astronomy and
optics.
Mohammad Bin Ahmed in the tenth century invented the concept of zero or sifr. Thus
This led to advances in the prediction of the movement of the planets and advances in the
Muslim mathematics had inherited both the Babylonian sexagecimal system and the Indian
Hindu) deciml system, and this provided the basis for numerical techniques in
mathematic (Folkerts, 2001; Rajagopal, 1993).
Muslims bult mathematical models using the decimal system, expressing all numbers by
means of ten symbols, and each symbol accorded the value of position as well as absolute
value (Kettani, 1976).
*Thus Muslim scholars contributed and laid the foundations of modern mathematics and the
use ofmathematics in the fields of science and engineering (Høyrup, 1987).
Thabit bin Qurrgh not only translated Greek works but also argued against and elaborated
on the widely accepted views of Aristotle.
*In arithmetiç there cmerged the concept of irrational numbers with Islamic mathematicians
starting from a non-Euclidean concept.
*Both Umar Khayyam (1048- 1131) and Nasir al-Din al-Tusi (1201-1274) contributed to
research on this concept which did not have its
origins in Greek mathematics.
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI
Eastern Muslims derived numerals from Sanskrit-A'v1e*'TY* and 1, and they were
**
the first to develop the use of the zero (sifr), written as 0 by the Western Muslims and
by Eastern Muslims (Kettani, 1976, p.137).
Whereas these Eastern Muslims, had initially used the Arabic alphabets as numerals, by the
ninth century Westerm Muslims had invented and replaced them with "al-arqam al-
gubariyah-1,2,3,4.5,6,7,8 and 9-based on a number of angles equal to the weight of each
Thus the zero with the numerals made it possible for the simple expressions for numbers
to have infinite values, thereby helping solve particular problems.
word algorithm derives from his name. His algebra treatise Hisab al-jabr w'al-
be considered as the first book to be written
mugabala gives us the word algebra and can
software for
Algebra is used in computer
science in the development of algorithms and
It is also used to design formulas that are used in
working with mathematical objects.
numerical programs and for complete
scientific computations.
*Another famous contributor to this field was Umar Khayyam, who studied cubic equations
and algebra came to be regarded as a science in its own right.
Subsequently in later centuries Italians took over his methods and extended them (Anawati,
FACULTY OF LAW, JAMIA
MILLIA ISLAMIA, NEw DELHI
1976).
*Thus thhe Muslims not only developed the methods of solving quadratic equations they also
produced tables containing sine, cosine, cotangent and other trigonometrical values.
*Arabic geometry absorbed not only materials and methods of Euclid's Elements but also
the works of Apollonius and Archimedes.
*In seventeenth century Europe the problems formulated by Ibn al-Haytham (965-1041 AD)
became known as "A lhazen's problem". Again his work that was translated into Latin
Among his works were included a theory of vision and a theory of light, and vas called by
his successors of the twelfth century "Ptolemy the Second".
ALHaytham's conlributions to geomelry and number theory went well beyond the
Archimedean tradition. AL-Haytham also worked on analytical geometry and the
beginnings of the link between algebra and geometry.
Subsequently, this work led in pure mathematics to the harmonious fusion ofalgebra and
geometry that was epitomised by Descartes in geometric analysis and by Newton in the
calculus.
*Al-Haytham was a scientist who made major contributions to the fields ofmathematics,
physics and àstronomy during the latter half of the tenth century.
John Peckham in the late-thirteenth century used al-Haytham's Kitab al-Manazir and
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI
Witelo's Optics too has echoes of Kitab al-Manazir. Witelo work was used by Johannes
Kepler.
*Roger Bacon, the founder of experimental science. probably used the original Arabic works
of al-Haytham as well as Latin translations (Meyers, 1964).
*Much work was under-taken by Islamic mathematicians regarding the theory of parallels.
This theory consisted of a group of theorems whose proofs depended on Euclidean
postulates.
T h e Islamic mathematicians continued their research for over 500 years on these postulates
in order to obtain proofs and not just the acceptance of them.
However, after these problems were transmitted to Europe in the twelfth century, little
further research was done until the sixteenth century.
*Muslim scholars contributed not only to the use of logic in the development of
mathematical ideas and relationships, but also to a workable system of numeration that
included zero and led to tihe solution of equations.
*Muslims had this begun the work that led on to mathematical modelling and its application
for the purpose -of testing their theories. This knowledge and approach was slowly
transferred to Europe through Spain and Sicily.
He was also the reason behind the PCO (public cgll office) revolution. PCO booths helped
the rural areas to the world outside.
to connect even
Telephone Nigam Limited) was established
Because of his efforts, MTNL (Mahanagar
in 1984.
which helped in the spread of telephone network
The Indian economy during this period was completely controlled by the Indian
Government and there were strict restrictions and regulations for private business entities
India.
*Hence there was no major growth in the IT sector in India till 1991.
*The Indian government had strict control over the private business entities in India betore
liberalisation of economy in 1991.
* Moreover the wide area networks and internet lines were completely controlled by the
central government.
*As a result, the Indian IT sector was totally held back due to these restraints on the
functioning of the software services providers.
*The first major IT reform by the Indian Govemment was the creation of corporation called
MILLIA ISLAMIA, NEW DELHI
FACULTY OF LAW, JAMIA
onwards.
Software Technology Parks of India (STPI) from 1991
T h i s corporation provided satellite links to major IT devclopers enabling hem to transmit
with more and more clieDts and enterprises going for outsourcing
momentum
finally gain
of IT.
services made the PC
other user friendly operating
Also. the inception of Windows and
time consuming.
experience even more simple and less C and others,
level programming languages like Basic,
* Coupled with development of high
the Indian 1T brains had the perfect platform to rise in the global arena.
T h e Indian IT sector boomed and growed at gain of nearly 50% every year.
1991 reforms was the Y2K bug. Fear
Another major event for Indian IT industry post the
the US corporations outsourced all the
of complete breakdown of computer services,
a
Indians.
equipment and upgrading work to
thrown to the Indians and as a result the
*The task of rectifying the Y2K bug was
1999 was tobe edited and huge work was outsourced to the Indian IT industries.
The Indian IT industry helped provide a national GDP of more than 6% since these
has
economic reforms took place 20 years ago and today, India is known as the IT hub of the
World.
National Task Force, NTP and IT Act, 2000 helped IT sector grow in India
touching more
the world.
developed nationS
in
but at par with
those of the (NTP 1999)
1999 helped frce
The New Telecommunications Folicy the
telecommunications sector
in India. 1his neipCd availability of the infrastructuref
telecommunication.
relaled businesses were no longer the
T h e satellites, towers and other telecom
Central Government.
the telecom sector grow rapidly
in these departments heiped
T h e entry of private sector
boom in IT sector in India eventually.
resulting the innovation and development of telecom
on the
The growth of IT is totally dependent
industry. legal recognition of the electronic
T h e Information Technology Act 2000 provided
offences and contraventions
documents, digital signatures,
in striking deals with US clients as no longer the person to person
This helped long way a
Internet
Internet is one of the most wonderfiul inventions of the last century.
Now, it has become integral part of our life and it is cont1nuously making human life easier and
simpler in various ways.
From information accessing to money transfer, all kinds of tasks are pertormed using the internet.
Today, more and more people are relying on online banking and online shopping.
There are
many networks that exist in the world, often with different hardware and software.
People connected to one network often, want to communicate with
one. This
people attached to a different
requires connecting together different, and frequently incompatible networks, to make
the connection and provide the necessary translation, both in terms of hardware and software.
(ii) provides. uses or makes accessible, either publicly or privately, high level serviges layered on
the communications and related intrastructure
described herein.
New communication systems and digital technology have made dramatic changes in the way we
live and the means to transact our daily business.
Businessmen are inereasingly using computers to create, transmit and store information in
electronie form instead of traditional paper documents. It is cheaper, easier to store and retrieve
speedier to communicate.
The latest threat to privacy. propertý and peace of individuals all over the world is from abuse of
Iechinology relating to computers, their network or hardware devices, where the computer or device
may be agent of crime, the facilitator ot the crime or the target of crime.
However, the rapid evolution of Internet has also raised numerous legal issues and questions. As
the scenario continues to be still not clear, countries throughout the world are resorting to different
approaches towards controlling, regulating and facilitat1ng clectronic communication and
commerce.
Cyber Space
The New Shorter Oxford Dictionary explains the expressions Cyber Space' as
notional environment within which electronic communication occurs especially when
represented as the inside of a computer system. space perceived as such by an observer
but generated by a computer system and having no real existence, the
space of virtual
reality
Internet is a network of networks, what that means is that it is
is global network that
a
creating by linking smaller networks of computers and servers.
than Cyber-space is nothing
more a
symbolic and figurative space that exists within the
scope of Internet. It can be
said that
anything that is done via the use of
Internet, occurs within the confines of the
space, whether that is cyber-
sending an e-mail, a website, or playing a game, all of these
exist within the things
cyber-space.
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEW DELHI
a crime.
1. Tools and techniques to perpetrate
vector.
Crime itself that is the end of those plans and activities (a cyber crime IS
3.
the criminal's activities).
the ultimate objective of
Cyber crimes are committed o s i y by pasOns Who are said to be learned and
hence, it is called as white collar crime. yber crimes arc very scrious threat in the modern
era and for the times to come and pose one or he most difficult challenges before the
Information technology law provides the legal framework for collecting, storing, and
When disputes arise in the field of information technology that cannot be resolved outside
of the court system, a lawyer specializing in thes types of cases can prove a powerful
advocate compared to general legal practitioner. Information technology law firms tend to
a
hirce layers with practical experience working in the industry prior to entering the legal
profession. With such a background, a lawyer is more effective at explaining technical
concepts to a judge or jury, and he or she will likely have contacts within the industry that
make
finding consultants and expert witnesses less difficult.
Clearly, information
technology law is a niche practice. Those looking to hire an attorney should bear tnis in
mind.
yber LawS
yields legal recognition to electronic documents and a struCture to
FACULTY OF LAW, JAMIA MILLIA ISLAMIA, NEw DELHI
Support ejiling ande-commerce transactions and also proviades a legal structure to reduce,