Welcome to Guest !
 
       IUP Publications
              (Since 1994)
Home About IUP Journals Books Archives Publication Ethics
     
  Subscriber Services   |   Feedback   |   Subscription Form
 
 
Login:
- - - - - - - - - - - - - - - - - -- - - - - - - - - - - -
-
   
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
Focus

Internet Phishing: Techno-Legal Approach

The advancements in information technology has undoubtedly benefited the net users in gathering information for different purposes. The large-scale access to websites by different groups has also concurrently encouraged different forms of cyber crimes such as phishing, cyberbullying, cybersquatting and hacking causing damages to the economic and personal interests. Among different forms of cyber crimes the practice of phishing is considered as a criminally fraudulent process where the fake websites prompt the users to disclose their personal information on the pretext of authenticity or security through an electronic communication with a webpage similar to the legitimate one.

Phishing is most commonly carried out by e-mail or instant messaging. The other popular means of phishing are the creation of malicious website content. Such content in a fake website is hosted and operated by the phisher himself with ill motives to gain personal advantages. The emergence of the social networking sites has also facilitated the access to personal information. Lack of complete knowledge of the computer systems, absence of security indicators, visual deception text, images masking underlying text, windows masking underlying windows and lack of precautionary guidelines for the users are the some of the key areas which phishers exploit to gather personal information. Bank customers and companies offering online payment services are frequently targeted by the phishers to obtain sensitive data.

The menace of phishing has to be combated efficiently and effectively to protect the interests of net users. The application of several techniques and precautions including strict enforcement of cyber laws can considerably reduce the phishing activity. Adoption of strong anti-phishing tools at the client end, server end, enterprise level through a combination of information security technologies and techniques with high level of constant monitoring and investigation might bring down the phishing attacks. Tools like strong e-mail filters which reject spam mails, multilevel authentication, desktop technologies, and browser plug-ins are cost-efficient and can be used as anti-phishing kits in reducing the phishing attacks and financial losses.

The paper, "Cyber Warfare: Jokes, Hoaxes, or Hypes?", by Xingan Li discusses the potential impact of cyberwar and its relation to other deadly means of weapons like nuclear war, chemical and biological weapons. The development of cyber domain has become a platform for terrorist and extremist groups to expand their criminal activities. It emphasizes the various modes of cyberwar and its effect on the society. It explains the importance of cyber security and the enforcement of cyber laws to overcome potential threat of cyber warfare.

Tabrez Ahmad in the paper, "Copyright Infringement in Cyberspace and Network Security: A Threat to E-Commerce", discusses the legal issues connected with the copyright, cybersquatting, domain name and jurisprudence. The lack of appropriate laws and gaps in the enforcement of cyber laws has further increased the problems of the copyright holder. The growth of network technologies and e-commerce has complicated network security issues and hence the need for framing appropriate policies by the government to effectively tackle the issue of copyright infringement on the Internet.

The paper, "Formulating Specialized Legislation to Address the Growing Spectre of Cybercrime: A Comparative Study", by F Cassim refers to various forms of cybercrime practices prevalent in different countries and suggests the means to overcome such problems. The growth of information technologies has prompted many developed countries like the US, the UK to amend legislations to prevent cyber crimes. The other developing and underdeveloped countries have also realized the necessity of strong legislations, and initiated various steps to counterattack the menace of cyber crimes.

Michael Risch in the paper, "Virtual Third Parties", throws light on the Third Party Beneficiary (TPB) doctrine in the virtual worlds, the rights they possess, and discusses the disputes in the virtual worlds. It highlights that in transactions such as exchange of virtual cash, property, sound and pictures in virtual world involve third parties in the contractual relationship between the user and virtual world provider. The article advocates that the TPB doctrine protects the non-parties and it confers right on the nonparty to sue for breach of a contract. It discusses the contractual provisions such as anti-cheating, property ownership, legal compliance, anti-harassment and identification clauses which lead to disputes. This paper concludes that TPB doctrine allows participants to claim their rights and no new law is required to entertain TPB claims.

James B Speta in the paper, "The Shaky Foundations of the Regulated Internet", emphasizes the relevancy of the Comcast order to regulate the Internet. It refers to the Federal Communication Commission (FCC) authority on the Internet, its claims on Internet jurisdiction and its role in the Internet age. This paper examines the policy matters concerned with the regulation of Internet and existence of limited jurisdiction is not a feasible method to govern Internet age.

The paper, "A Comparative Study of Shrink-Wrap License", by Jiao Xue focuses on the computer-related litigations of various countries and the means to resolve such disputes. This paper refers to various cyber laws of the US, the UK and China and their role in the regulation of cyber crimes. It further focuses on the problems and interests of the software users and identifies the gaps which require urgent changes in the cyber laws.

The paper, "Online Auctions: An Overview", by L Padmavathi traces the evolution of auctions by highlighting its mechanism, advantages and challenges. It refers to the various issues and legislations related to online consumer protection in several countries and critically examines the PayPal option of payment at eBay and states that PayPal protects both the buyer as well as the seller from fraudulent practices. This paper makes a note of various legislations that protects online consumers.

-- C Sri Krishna
Consulting Editor

<< Back
Search
 

  www
  IUP

Search
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Click here to upload your Article

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Automated Teller Machines (ATMs): The Changing Face of Banking in India

Bank Management
Information and communication technology has changed the way in which banks provide services to its customers. These days the customers are able to perform their routine banking transactions without even entering the bank premises. ATM is one such development in recent years, which provides remote banking services all over the world, including India. This paper analyzes the development of this self-service banking in India based on the secondary data.

The Information and Communication Technology (ICT) is playing a very important role in the progress and advancement in almost all walks of life. The deregulated environment has provided an opportunity to restructure the means and methods of delivery of services in many areas, including the banking sector. The ICT has been a focused issue in the past two decades in Indian banking. In fact, ICTs are enabling the banks to change the way in which they are functioning. Improved customer service has become very important for the very survival and growth of banking sector in the reforms era. The technological advancements, deregulations, and intense competition due to the entry of private sector and foreign banks have altered the face of banking from one of mere intermediation to one of provider of quick, efficient and customer-friendly services. With the introduction and adoption of ICT in the banking sector, the customers are fast moving away from the traditional branch banking system to the convenient and comfort of virtual banking. The most important virtual banking services are phone banking, mobile banking, Internet banking and ATM banking. These electronic channels have enhanced the delivery of banking services accurately and efficiently to the customers. The ATMs are an important part of a bank’s alternative channel to reach the customers, to showcase products and services and to create brand awareness. This is reflected in the increase in the number of ATMs all over the world. ATM is one of the most widely used remote banking services all over the world, including India. This paper analyzes the growth of ATMs of different bank groups in India.
International Scenario

If ATMs are largely available over geographically dispersed areas, the benefit from using an ATM will increase as customers will be able to access their bank accounts from any geographic location. This would imply that the value of an ATM network increases with the number of available ATM locations, and the value of a bank network to a customer will be determined in part by the final network size of the banking system. The statistical information on the growth of branches and ATM network in select countries.

Indian Scenario

The financial services industry in India has witnessed a phenomenal growth, diversification and specialization since the initiation of financial sector reforms in 1991. Greater customer orientation is the only way to retain customer loyalty and withstand competition in the liberalized world. In a market-driven strategy of development, customer preference is of paramount importance in any economy. Gone are the days when customers used to come to the doorsteps of banks. Now the banks are required to chase the customers; only those banks which are customercentric and extremely focused on the needs of their clients can succeed in their business today.

more...

 
View Previous Issues
Cyber Law