National Journal of Cyber Security Law https://lawjournals.celnet.in/index.php/njcsl <p>National Journal of Cyber Security Law publishes original research and review articles in the interdisciplinary cyber domain. It is a research Journal on various Cyber Security challenges. Scholarly contributions in this discipline are welcome to cover the various aspects of cybersecurity. National Journal of Cyber Security Law provides a hub around which the interdisciplinary Cyber Security community can form a robust knowledge base. This journal is committed to provide quality research &amp; review literature that is very significant for students, academicians and experts in real-world implications and solutions.</p> en-US [email protected] (Mr. Rishabh Srivastav (Commissioning Editor)) [email protected] (Law Journals) Wed, 27 Sep 2023 09:37:28 +0000 OJS 3.3.0.5 http://blogs.law.harvard.edu/tech/rss 60 Unraveling the Truth: A Deep Dive into Forensic Investigation https://lawjournals.celnet.in/index.php/njcsl/article/view/1496 <p>Forensic investigation has become increasingly popular in recent years, thanks in part to the numerous TV shows and movies that have brought it to our attention. Indeed, the intricacies of forensic investigation extend far beyond what is portrayed on screen. In reality, forensic science plays a crucial role in resolving crimes and ensuring that offenders are held accountable. Whether it&amp;#39;s fingerprint analysis, DNA testing, or crime scene reconstruction, forensic investigation plays a critical role in criminal investigations. In this article, well take a deep dive into forensic investigation and explore the different techniques and methods used in solving crimes. Well also showcase some of the most famous and intriguing cases that have relied on forensic investigation to uncover the truth. If you have a curiosity about the scientific methods used to solve crimes, then this article is perfect for you.</p> Ngwana Yanic Zozong Copyright (c) 2023 National Journal of Cyber Security Law https://lawjournals.celnet.in/index.php/njcsl/article/view/1496 Mon, 19 Feb 2024 00:00:00 +0000 Identity Theft-a Contemporary Threat https://lawjournals.celnet.in/index.php/njcsl/article/view/1449 <p>Identity theft has historically risen in frequency as information technology has advanced, and it has since been acknowledged as the world's fastest-growing crime. Identity theft is when someone else (usually a stranger) uses an individual’s identity without their prior consent, permission, or knowledge. Such types of impressions are mainly committing fraud, which usually results in financial harm to the victim and illegal financial gain to the person who perpetrates it. However, the main issue with identity theft is that it is quite hard to detect and prevent. People who have used technology extensively, such as college students, children, and others, are also prone or can even fall prey to identity theft. It has been a major challenge for the societies of the digital age. Individual victims experience catastrophic psychological and financial losses, and the consequences to society as a whole are immense. The major topics on identity theft reviewed in this research are the definition and meaning of identity theft, statistics<br>of identity theft, it’s types and stages, recording and reporting of identity theft, law enforcement issues and response, effects, prevention, and defences of identity theft. The research further found that access to personal information about potential victims, as well as the anonymity provided by the internet, are significant facilitators of identity theft. In addition, the research has focused on the practices and operational environments of document-authenticating organizations that provide offenders with access to identification data. The researcher has followed the doctrinal and analytical method of research and at last, the inductive method which helped to arrive at a certain conclusion. Within the research, the first chapter is the Introductory part based on which whole research is created. The next two succeeding chapters consist of an Operational Introduction, and Law Enforcement Issues and Response which also includes an analysis of important international and national cases. The last chapter of the research consist of the Suggestions &amp; Recommendations, and Conclusions. The Researcher has concluded that people must be informed that not only is it unlawful to exploit others’ data, bit it is also illegal to obtain personal and sensitive information about others. Identity thieves must understand that peeping into someone’s personal life is just as detrimental as peering into someone’s restroom. Nothing in this world is more unsettling than someone professing to be someone they are not.</p> Harshit Choubey Copyright (c) 2023 National Journal of Cyber Security Law https://lawjournals.celnet.in/index.php/njcsl/article/view/1449 Sat, 16 Dec 2023 00:00:00 +0000 Code on Social Security, 2020 https://lawjournals.celnet.in/index.php/njcsl/article/view/1512 <p>A comprehensive legal framework known as the Code on Social Security, 2020 was developed in India to offer social security benefits and protections to workers in the informal sector, including gig and platform workers. It discusses the difficulties these workers encounter, including unfair treatment, exploitation, and a lack of benefits. According to the code, employers who use online platforms to hire these individuals must pay into social security coffers a percentage of their wages. However, there are<br>worries about possible abuse because platform work, gig work, and aggregators are not properly defined, and there are also insufficient enforcement mechanisms in place. The code requires improved enforcement, greater monitoring procedures for figuring out earnings, and more precise definitions in order to overcome these obstacles. It highlights how crucial it is to give unorganized workers access to social security benefits and recommends more study to determine its effects. To summarise, the<br>Code on Social Security, 2020 is a noteworthy policy change towards a more comprehensive social security system, with the goal of improving the welfare and safeguards of freelancers and platform workers in India.</p> Aanice Thomas, FazleQadir Chimthanawala, Manoneeta Banerjee Copyright (c) 2023 National Journal of Cyber Security Law https://lawjournals.celnet.in/index.php/njcsl/article/view/1512 Mon, 18 Mar 2024 00:00:00 +0000 Harnessing the Power of Artificial Intelligence in Indian Justice System: An Empirical Study https://lawjournals.celnet.in/index.php/njcsl/article/view/1482 <p>The Indian justice system, known for its complexity and backlog of cases, stands at a crossroads where technological advancements offer promising solutions. This research paper explores the growing role of Artificial Intelligence (AI) in transforming and revolutionizing various aspects of the Indian Justice System. By analyzing the current challenges and opportunities, the researcher delves into the potential applications of AI in case management, legal research, decision-making, and overall efficiency improvement. Ethical considerations and potential hurdles are also examined by the researcher to provide a comprehensive overview of AI's impact on the Indian legal landscape using empirical as well as doctrinal methods of study.</p> Janees Rafiq Copyright (c) 2023 National Journal of Cyber Security Law https://lawjournals.celnet.in/index.php/njcsl/article/view/1482 Wed, 17 Jan 2024 00:00:00 +0000 The Facebook Data Breach and its Consequences for Consumer Privacy and Cybersecurity https://lawjournals.celnet.in/index.php/njcsl/article/view/1374 <p>One of the most major occurrences in recent years, the Facebook data breach, revealed the personal information of millions of internet users and raised worries regarding customer confidentiality and cybersecurity. This article delves into the specifics of the hack, its impact on customer privacy, and its larger cybersecurity ramifications. The incident exposed the large quantity of personal information collected by social media sites, sparking debate over data collection, storage, and security. It drew<br>attention to the possible exploitation of personal data and sparked calls for stricter privacy legislation and greater transparency. Furthermore, the hack served as a warning of IT businesses' vulnerability to cyberattacks, emphasising the importance of rigorous security measures. Governments and regulatory organisations have responded by enacting stronger consumer protection laws, such as the General Data Protection Regulation (GDPR), while consumer awareness of data security and privacy has grown. The Facebook data leak acts as a catalyst for good change, stimulating discussions, reforms, and expenditures in digital privacy and data security.&nbsp;</p> Samriddha Krishna Behera Copyright (c) 2023 National Journal of Cyber Security Law https://lawjournals.celnet.in/index.php/njcsl/article/view/1374 Wed, 27 Sep 2023 00:00:00 +0000