https://lawjournals.celnet.in/index.php/njcsl/issue/feedNational Journal of Cyber Security Law2025-05-07T11:11:03+00:00Mr. Gagan Kumar (Associate Editor)[email protected]Open Journal Systems<p>National Journal of Cyber Security Law publishes original research and review articles in the interdisciplinary cyber domain. It is a research Journal on various Cyber Security challenges. Scholarly contributions in this discipline are welcome to cover the various aspects of cybersecurity. National Journal of Cyber Security Law provides a hub around which the interdisciplinary Cyber Security community can form a robust knowledge base. This journal is committed to provide quality research & review literature that is very significant for students, academicians and experts in real-world implications and solutions.</p>https://lawjournals.celnet.in/index.php/njcsl/article/view/1816Cyberbullying and Mental Health: A Social Work Perspective on Prevention and Intervention2025-04-30T10:02:32+00:00Bhupal Bhattacharya[email protected]Sarmistha Bhattacharya[email protected]<p>Cyberbullying has emerged as a significant public health concern, particularly affecting the mental health and well-being of young individuals. The expansion of digital communication platforms has increased the risk of harassment, leading to anxiety, depression, and even suicidal ideation among victims. This paper examines the psychological impacts of cyberbullying, the role of social workers in intervention and prevention, and the effectiveness of existing policies. By emphasizing trauma-informed care, community education, and policy advocacy, social workers can play a crucial role in mitigating the adverse effects of cyberbullying and promoting safer online spaces.</p>2025-03-28T00:00:00+00:00Copyright (c) 2025 National Journal of Cyber Security Lawhttps://lawjournals.celnet.in/index.php/njcsl/article/view/1832The Global Development of ICT: A Quest for an Assessment on the Uncertainty Impacts on Country’s’ Development Challenge to Fight Against Corruption 2025-05-07T11:11:03+00:00Saphy Lal Bullu[email protected]<p>As a new platform, the development of ICT has a huge link to society since it creates private communication or telecommunication, both offer and acceptance can be communicated via electronic means and provide a new route to corrupt behaviours. The vast number of associations has grown through a new trend of ICT networks. People take such advancements in technology as an opportunity to conduct unlawful activities. That ideology led the author of this article to assess whether the development of ICT facilitates a loophole for corrupt activities to nourish or not. Objectives: The fifth aspect will be articulated in this article to assess whether the development of ICT brings challenges to the fight against corruption. The first part provides an overview of ICT; the second highlights the conceptual framework of ICT, its development trends, forms, and characteristics; Thirdly part presents the understanding of corruption, its forms, and the criminalisation of corrupt acts; the fourth presents an assessment from the demonstration made in part two and three to explore whether the development of ICT brings new challenges to eliminate and control corrupt activities; and at the final to provide a new solution for improvements/ changes to fight against corruption. Findings: Even though the development of ICT brings challenges and opportunities in our daily lives, the findings indicate that the same development provides a new challenge to fight against corruption since there are loopholes for<br>unlawful activities to be conducted by public officials and individuals to make sure some process or procedures are hindered.Methodology: The qualitative and quantitative methodological approaches are based on analyzing and assessing secondary data collection by demonstrating an overview of Information technology, its development, and its characteristics, to explore whether it is creating a new challenge to fight against corrupt transactions or otherwise. These two methodological approaches contributed toward a better understanding of the usefulness and relevance of Information technology and initiatives to combat corruption; finally, the descriptive analysis took place to gather all relevant sources which assist in data presentation and findings.</p>2025-05-07T00:00:00+00:00Copyright (c) 2025 National Journal of Cyber Security Lawhttps://lawjournals.celnet.in/index.php/njcsl/article/view/1830Prospects of Information Technology in reference to Cyber Terrorism2025-05-07T08:19:03+00:00Saquib Ahmed[email protected]Bhupinder Singh[email protected]<p>The modern world that we live in is often called a global village. Technology has annihilated time and distance and thus has brought everything at the spur of a click. The world run on information technology where internet is the lifeline for the flow of information, business and governance. This information technology revolution has been endowed with its own possibilities and perils. Cyber-terrorism and Cyber-crimes are the ugly fallouts of the free access to internet with which societies and states are<br>grappling with the world over. Cyber terrorism is an organized criminal activity committed by one person or group of persons or countries to disturb a genuine economic or political transaction. It could involve the planning and execution of attacks on networks, computer systems, and telecommunications infrastructures, as well as the electronic exchange of information and the making of threats. Examples include hacking into computer systems, inserting viruses into vulnerable networks, defacing websites, launching denial-of-service attacks, or making terrorist threats through electronic communication. If cyber criminals are today's equivalent of the small-time thugs who prey on the gullible and innocent, the cyber terrorists are those organized groups which have their own agenda to destabilize the regimes by wreaking a terror havoc. This they have to do no longer with killing innocent people by bullets and bomb blasts. This they do by targeting those centres of power which ensure a smooth functioning of our world as we know it. The study undertaken in this paper highlights the various aspects and threats of this problem and the possible way outs at the disposal of the governments to curb and annihilate this monster.</p>2025-05-07T00:00:00+00:00Copyright (c) 2025 National Journal of Cyber Security Lawhttps://lawjournals.celnet.in/index.php/njcsl/article/view/1815Beyond the Firewall: Understanding the Complexities of Cybersecurity in India2025-04-30T08:43:00+00:00Darsheen Kaur Thapar[email protected]<p>The contemporary landscape of security is significantly shaped by the evolving challenges of cybersecurity within our technology-driven world, particularly as information and communication technologies (ICTs) become increasingly central to global economies and infrastructure. The anticipated rise in cyberattacks, fueled by our growing dependence on digital systems, targets a wide<br>range of entities, including individuals, organizations, and governmental bodies. Furthermore, the strategic significance of ICTs, perceived by some nations as a potential arena for conflict and a crucial instrument for national security, underscores the vulnerabilities inherent in our interconnected world. This paper examines the role of cybersecurity in the broader context of security considerations, with a specific focus on India's perspective to enhance understanding of this critical issue.</p>2025-03-28T00:00:00+00:00Copyright (c) 2025 National Journal of Cyber Security Lawhttps://lawjournals.celnet.in/index.php/njcsl/article/view/1831Cyber Insurance: Legal Challenges and Regulatory Responses 2025-05-07T08:38:19+00:00Katneni Charan[email protected]Shruti Sabale[email protected]<p>Cyber insurance has become a necessity for organizations to reduce risks from cyber-attacks. But cyber insurance law and regulation is highly complicated and problematic. These include unclear policy language, problems with cyber-related blame, privacy regulations, and the threat of moral hazard. Also, the regulatory response has lacked swiftness to accommodate, leaving policy language in heterogeneous forms and jurisdictional uniformity. This paper addresses these issues, examines existing regulation, and presents solutions to the legal grey areas in the cyber insurance space. With a focus on the most pressing issues and a review of the judiciary, the paper will help to deliver a comprehensive overview of the changing cyber insurance landscape and recommend areas for further improvement in regulatory coherence, policy clarity and legal protections for both insurers and insureds.</p>2025-05-07T00:00:00+00:00Copyright (c) 2025 National Journal of Cyber Security Law