National Journal of Cyber Security Law https://lawjournals.celnet.in/index.php/njcsl <p>National Journal of Cyber Security Law publishes original research and review articles in the interdisciplinary cyber domain. It is a research Journal on various Cyber Security challenges. Scholarly contributions in this discipline are welcome to cover the various aspects of cybersecurity. National Journal of Cyber Security Law provides a hub around which the interdisciplinary Cyber Security community can form a robust knowledge base. This journal is committed to provide quality research &amp; review literature that is very significant for students, academicians and experts in real-world implications and solutions.</p> en-US [email protected] (Mr. Gagan Kumar (Associate Editor)) [email protected] (Ms. Ankita Srivastava (Journal Manager)) Wed, 30 Apr 2025 00:00:00 +0000 OJS 3.3.0.5 http://blogs.law.harvard.edu/tech/rss 60 Prospects of Information Technology in reference to Cyber Terrorism https://lawjournals.celnet.in/index.php/njcsl/article/view/1830 <p>The modern world that we live in is often called a global village. Technology has annihilated time and distance and thus has brought everything at the spur of a click. The world run on information technology where internet is the lifeline for the flow of information, business and governance. This information technology revolution has been endowed with its own possibilities and perils. Cyber-terrorism and Cyber-crimes are the ugly fallouts of the free access to internet with which societies and states are<br>grappling with the world over. Cyber terrorism is an organized criminal activity committed by one person or group of persons or countries to disturb a genuine economic or political transaction. It could involve the planning and execution of attacks on networks, computer systems, and telecommunications infrastructures, as well as the electronic exchange of information and the making of threats. Examples include hacking into computer systems, inserting viruses into vulnerable networks, defacing websites, launching denial-of-service attacks, or making terrorist threats through electronic communication. If cyber criminals are today's equivalent of the small-time thugs who prey on the gullible and innocent, the cyber terrorists are those organized groups which have their own agenda to destabilize the regimes by wreaking a terror havoc. This they have to do no longer with killing innocent people by bullets and bomb blasts. This they do by targeting those centres of power which ensure a smooth functioning of our world as we know it. The study undertaken in this paper highlights the various aspects and threats of this problem and the possible way outs at the disposal of the governments to curb and annihilate this monster.</p> Saquib Ahmed, Bhupinder Singh Copyright (c) 2025 National Journal of Cyber Security Law https://lawjournals.celnet.in/index.php/njcsl/article/view/1830 Wed, 07 May 2025 00:00:00 +0000 Beyond the Firewall: Understanding the Complexities of Cybersecurity in India https://lawjournals.celnet.in/index.php/njcsl/article/view/1815 <p>The contemporary landscape of security is significantly shaped by the evolving challenges of cybersecurity within our technology-driven world, particularly as information and communication technologies (ICTs) become increasingly central to global economies and infrastructure. The anticipated rise in cyberattacks, fueled by our growing dependence on digital systems, targets a wide<br>range of entities, including individuals, organizations, and governmental bodies. Furthermore, the strategic significance of ICTs, perceived by some nations as a potential arena for conflict and a crucial instrument for national security, underscores the vulnerabilities inherent in our interconnected world. This paper examines the role of cybersecurity in the broader context of security considerations, with a specific focus on India's perspective to enhance understanding of this critical issue.</p> Darsheen Kaur Thapar Copyright (c) 2025 National Journal of Cyber Security Law https://lawjournals.celnet.in/index.php/njcsl/article/view/1815 Fri, 28 Mar 2025 00:00:00 +0000 Acid in the Inbox: How Legal System Ignore the Severity of Digital Death and Rape Threats https://lawjournals.celnet.in/index.php/njcsl/article/view/1854 <p>This article looks into the growing crisis of online gender-based violence in India, sparked by the recent trolling of social media influencer Apoorva Mukhija. While digital spaces were once seen as platforms for free expression and connection, they are increasingly being misused to target, harass, and silence women. From rape threats and acid attack warnings to coordinated trolling campaigns, the abuse is not just alarming—it’s deeply personal and psychologically damaging. Through real-life case studies and a closer look at India’s legal framework, including the Information Technology Act, 2000 and the Bharatiya Nyaya Sanhita, 2023, the article highlights how current laws fall short in addressing the full extent of digital abuse. It also reviews efforts under the Cyber Crime Prevention against Women and Children (CCPWC) Scheme, while pointing out gaps in enforcement and victim support. The article argues for urgent legal reforms, stronger accountability from social media platforms, and better<br>training for law enforcement. It emphasizes the need for collective responsibility—by lawmakers, tech companies, and civil society—to make the internet a safer space for everyone, especially women and marginalized groups.</p> Ananya Semwal Copyright (c) 2025 National Journal of Cyber Security Law https://lawjournals.celnet.in/index.php/njcsl/article/view/1854 Fri, 30 May 2025 00:00:00 +0000 Cyber Insurance: Legal Challenges and Regulatory Responses https://lawjournals.celnet.in/index.php/njcsl/article/view/1831 <p>Cyber insurance has become a necessity for organizations to reduce risks from cyber-attacks. But cyber insurance law and regulation is highly complicated and problematic. These include unclear policy language, problems with cyber-related blame, privacy regulations, and the threat of moral hazard. Also, the regulatory response has lacked swiftness to accommodate, leaving policy language in heterogeneous forms and jurisdictional uniformity. This paper addresses these issues, examines existing regulation, and presents solutions to the legal grey areas in the cyber insurance space. With a focus on the most pressing issues and a review of the judiciary, the paper will help to deliver a comprehensive overview of the changing cyber insurance landscape and recommend areas for further improvement in regulatory coherence, policy clarity and legal protections for both insurers and insureds.</p> Katneni Charan, Shruti Sabale Copyright (c) 2025 National Journal of Cyber Security Law https://lawjournals.celnet.in/index.php/njcsl/article/view/1831 Wed, 07 May 2025 00:00:00 +0000 Cyberbullying and Mental Health: A Social Work Perspective on Prevention and Intervention https://lawjournals.celnet.in/index.php/njcsl/article/view/1816 <p>Cyberbullying has emerged as a significant public health concern, particularly affecting the mental health and well-being of young individuals. The expansion of digital communication platforms has increased the risk of harassment, leading to anxiety, depression, and even suicidal ideation among victims. This paper examines the psychological impacts of cyberbullying, the role of social workers in intervention and prevention, and the effectiveness of existing policies. By emphasizing trauma-informed care, community education, and policy advocacy, social workers can play a crucial role in mitigating the adverse effects of cyberbullying and promoting safer online spaces.</p> Bhupal Bhattacharya, Sarmistha Bhattacharya Copyright (c) 2025 National Journal of Cyber Security Law https://lawjournals.celnet.in/index.php/njcsl/article/view/1816 Fri, 28 Mar 2025 00:00:00 +0000 The Global Development of ICT: A Quest for an Assessment on the Uncertainty Impacts on Country’s’ Development Challenge to Fight Against Corruption https://lawjournals.celnet.in/index.php/njcsl/article/view/1832 <p>As a new platform, the development of ICT has a huge link to society since it creates private communication or telecommunication, both offer and acceptance can be communicated via electronic means and provide a new route to corrupt behaviours. The vast number of associations has grown through a new trend of ICT networks. People take such advancements in technology as an opportunity to conduct unlawful activities. That ideology led the author of this article to assess whether the development of ICT facilitates a loophole for corrupt activities to nourish or not. Objectives: The fifth aspect will be articulated in this article to assess whether the development of ICT brings challenges to the fight against corruption. The first part provides an overview of ICT; the second highlights the conceptual framework of ICT, its development trends, forms, and characteristics; Thirdly part presents the understanding of corruption, its forms, and the criminalisation of corrupt acts; the fourth presents an assessment from the demonstration made in part two and three to explore whether the development of ICT brings new challenges to eliminate and control corrupt activities; and at the final to provide a new solution for improvements/ changes to fight against corruption. Findings: Even though the development of ICT brings challenges and opportunities in our daily lives, the findings indicate that the same development provides a new challenge to fight against corruption since there are loopholes for<br>unlawful activities to be conducted by public officials and individuals to make sure some process or procedures are hindered.Methodology: The qualitative and quantitative methodological approaches are based on analyzing and assessing secondary data collection by demonstrating an overview of Information technology, its development, and its characteristics, to explore whether it is creating a new challenge to fight against corrupt transactions or otherwise. These two methodological approaches contributed toward a better understanding of the usefulness and relevance of Information technology and initiatives to combat corruption; finally, the descriptive analysis took place to gather all relevant sources which assist in data presentation and findings.</p> Saphy Lal Bullu Copyright (c) 2025 National Journal of Cyber Security Law https://lawjournals.celnet.in/index.php/njcsl/article/view/1832 Wed, 07 May 2025 00:00:00 +0000