Skip to main content

Posts

Showing posts from June, 2021

Integrity of Intellectual Property in CyberSpace

In the current times, with the advent of the cyber wave, an idea is one’s only till he keeps to himself, once disclosed, it suspends itself into the ownership of everybody, and the inceptor can't commandeer himself of it. The idea tends to spread, for the good and shared guidance of man, and improvement of his state, thus appearing to have been particularly and generously planned. Innovations then, at that point despite constraints, in nature are difficult to be a subject of property with their wide-reaching and international phenomenon not being confined to a specific political domain lending to its multi-jurisdictional nature.   Innovation is vital as it has altered the life of every person in the world. Intellectual property laws, therefore, can and should play a role in stimulating innovation. Intellectual property rights limit the public access to make works based upon other work and excessively promotes the overproduction of inventoried works. They also discourage any i

Dark Web: Safe or unsafe? Truth Revealed!

  The dark web is the part of the internet that is not visible to search engines. With the advancement in technology, digitization has resulted in different types of attacks. We can talk to anyone as long as we have an internet connection. The main concern is with privacy and anonymity in mind.  A team of computer scientists and mathematicians working for one branch of the US navy which is known as the Naval Research laboratory (NRL), developed a new technology known as Onion Routing. It allows anonymous communication where the source and destination cannot be determined by the third party. A network using the Onion Routing technique is classified as Darknet. The NRL released the Onion Routing Technique and it became The Onion Router, also known as TOR. Advantages of Dark Web  Humans are allowed to hold privacy and express their views freely. Privacy is considered to be critical for honest persons through the different criminals and stalkers.  The growing tendency of employers to track

Protection of Intellectual Property in the Cyberspace: A New Perspective

Introduction During the pandemic when every corporate/office/firm is working remotely and the world has experienced rapid advancement in the field of e-commerce and e-business, the corporates and businesses need to protect their Intellectual Property in cyberspace. Cybercrimes are not limited to identity theft and frauds but also involve infringement of the Intellectual Property rights of the proprietors. Intellectual Property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce [1] . In layman’s language, IP is the creative work of the human intellect. The rights of Intellectual Property is an invisible, intangible right to a product of man’s brain. Thus, Intellectual Property at times is described as “knowledge goods” [2] . Intellectual Property includes copyrights, trademarks, geographical indications, patents, utility models, plant varieties, industrial designs, trade secrets etc. In thi

Cyber Stalking: A Socio-legal Study

P. Bociji correctly states, “The Internet is a reflection of society, including some of its darker aspects, such as crime”. Chasing and intruding on someone else’s computer or digital data make stalking a crime. Nearly a decade of prominent criminological research - concrete, concise and universally accepted definitions are still not available in this area. Cyberstalking, like traditional offline stalking, is fueled by rage, power, control, and anger that may have been precipitated by the victim’s action or, in some cases, the victim’s inaction. Stalking incidents are increasing due to the wrongdoer’s anonymous identity. No legislation or technical assistance has been fully made practical in this area. It seems to be a unique challenge to law enforcement. Law enforcement at the local level is at a particular disadvantage as a result of jurisdictional limits. There are many examples. One anonymous account keeps sending a woman’s posted photos personally, where the recipients were not ha

Cyber-Physical Attacks: Some Invisible Threat

  In the era of digitalization, criminal minds often come up with new and advanced ways to create nuisance among the people. During the pandemic physical attacks are replaced by cyber-physical attacks at an alarming level. Physical attacks like crime, warfare, and terrorism are gradually taking place in cyberspace which causes more damage as it is impossible to predict the intensity of attack and attack can cause damage without any political, social, and moral outrage.  Cyber-Physical Attacks are the security breach in cyberspace which has its impact on the physical environment. The attacker can seize the communication system between the systems. In cyber-physical attacks, the attackers gain complete access to a computer system and can operate the machinery and industrial equipment and can control the operations of the equipment to damage the property, physical assets, injuries, and even death. For example, they can turn off the lights in the buildings, force the drone to land on the e