Techno-Legal Dynamics of Cyber Crimes in Industry 5.0
Inbunden, Engelska, 2025
Av Gagandeep Kaur, Tanupriya Choudhury, S. Balamurugan, India) Kaur, Gagandeep (School of Law, UPES, Dehradun, Uttarakhand, India) Choudhury, Tanupriya (School of Computer Sciences, University of Petroleum and Energy Studies (UPES), Dehradun, Uttarakhand, India) Balamurugan, S. (Intelligent Research Consultancy Services (iRCS)
3 019 kr
Produktinformation
- Utgivningsdatum2025-03-21
- Vikt680 g
- FormatInbunden
- SpråkEngelska
- SerieIndustry 5.0 Transformation Applications
- Antal sidor416
- FörlagJohn Wiley & Sons Inc
- ISBN9781394242146
Tillhör följande kategorier
Gagandeep Kaur, PhD, is an assistant professor of law at the School of Law, University of Petroleum & Energy Studies, Dehradun, India. She specializes in cyber law, information technology law, cybercrimes, and digital copyright and has over 14 years of teaching and research experience at prestigious universities. She has authored five law books, published more than 100 articles in peer-reviewed journals, and received numerous awards. Tanupriya Choudhury, PhD, is a professor and associate dean of research at Graphic Era (Deemed to be University), Dehradun, India. He has authored more than 150 research papers and filed 25 patents. He serves as the Honorary Secretary of the Indian Engineering Teachers’ Association, a Senior Advisor in the INDO-UK Confederation of Science, Technology, and Research Ltd., London, UK, and the International Association of Professional and Fellow Engineers, Delaware, USA. S. Balamurugan, PhD, is the Director of Research and Development at Intelligent Research Consultancy Services (iRCS), Coimbatore, Tamil Nadu, India. He also holds the position of Director at the Albert Einstein Engineering and Research Labs (AEER Labs) and Vice Chairman of the Renewable Energy Society of India (RESI). He has published over 50 books, more than 200 international journal articles and conference papers, and has 35 patents.
- Preface xv1 AI & IP: Ownership Rights in Industry 5.0 1Pulkit Mogra1.1 Introduction 21.2 Evolution of Artificial Intelligence System 41.3 Rights Upon the Fruits of AI: #TheConundrum 81.4 The Antidote to Conundrum: Work Made for Hire (WMFH) Model 12Conclusion 16References 172 Cybersecurity and Crime in Industry 4.0: An Analysis of Legal Aspects of Cybercrime 19Jeevesh Sharma and Ashima Jain2.1 Introduction 202.2 Industry 4.0 212.3 Cybercrime in the Digital Economy 222.3.1 Cybercrime and Organization 242.4 Cybercrime Statistics—Global Context 242.4.1 Cybercrime—Indian Context 252.4.2 Government Initiatives to Curb Cyber Frauds 262.4.3 Cybercrime Trends with Statistics 272.5 Cybersecurity 302.5.1 Measures to Protect from Cyberattacks 312.6 Legal Perspectives of Cybercrime and Their Penalty-Cases 322.6.1 Legal Aspects of Cybercrimes with Cases 342.7 Challenges of Cybersecurity 362.8 Conclusion 38References 39Weblinks 41Case Links 413 Toward an Intelligent Cybersecurity System: The Role of Machine Learning 43Oly Mishra and Vijaya Geeta Dharmavaram3.1 Introduction 443.2 Machine Learning Paradigms 453.3 Machine Learning Applications 463.4 Machine Learning Applications in Cybersecurity 473.5 Machine Learning in Cybersecurity—Few Cases 483.6 Issues and Limitations of Machine Learning in Cybersecurity 513.7 Future Directions 523.8 Conclusion 53References 544 ATP the New-Age Threat Vector and Cyberattack Trends 55Akashdeep Bhardwaj and Sam Goundar4.1 Introducing Advanced Persistent Threats 554.2 New-Age APT Attacks 584.3 Cyberattacks Trends 654.4 Reconnaissance 684.5 Initial Compromise 694.6 Establishing a Foothold 724.7 Exfiltration 734.8 Consolidation 754.9 Covering Tracks 764.10 Conclusion 77References 785 Online Privacy in Artificial Intelligence Algorithms: Ethical and Legal Impacts of Technological Development and Exposure 79Aditi Bharti and Gagandeep Kaur5.1 Introduction 805.2 Understanding Artificial Intelligence 835.3 Impact of Artificial Intelligence on Personal Data 855.4 General Data Protection Regulation and Artificial Intelligence 885.5 Right to be Forgotten: Legal and Ethical Considerations of Data Processing by an AI 915.5.1 Can AI Actually Forget? 945.5.2 Privacy by Design 955.6 Conclusion 97References 986 Exacerbation and Combat of Cyberattacks: The Dual Paradox of Machine Learning 101Devika Sharma and Saket Sharma6.1 Introduction 1026.2 Concept of Machine Learning 1036.3 Technologies Involved in Machine Learning and Their Impact on Cybersecurity 1066.3.1 Big Data 1066.3.2 Blockchain Technology 1076.3.3 User and Entity Behavioral Analytics (UEBA) 1086.4 Growing Role of Machine Learning in Cybersecurity 1086.5 Applications of Machine Learning in Cybersecurity 1096.6 Demerits of Using Machine Learning in Cybersecurity 1126.7 Legal Framework for Cybersecurity in India 1136.7.1 The Information Technology Rules (IT Rules) 1146.7.2 The Digital Personal Data Protection Act, 2023 1146.7.3 Indian Computer Emergency Response Team (CERT-IN) 1156.8 Conclusion 115References 1177 Hacking the System: A Deep Dive into the World of E-Banking Crime 121Swati Gupta7.1 Introduction 1227.2 Literature Review 1247.2.1 Cyber Risk in the Financial Industry 1247.2.2 E-Banking Crime 1267.2.3 Reasons for the Rise in E-Banking Crimes 1297.2.3.1 Theoretical Perspectives on the Rise in E-Banking Crimes 1307.2.4 Impact of E-Banking Crimes on the Financial Sector 1317.2.4.1 Theoretical Perspectives on the Impact of E-Banking Crimes 1337.3 Combating E-Banking Crimes 1357.3.1 Challenges in Combating E-Banking Crimes 1367.4 E-Banking Crimes: Emerging Economies 1387.4.1 India 1407.4.2 Nigeria 1417.5 Conclusion 142References 1448 Is Love a Crime-Decoding Cybercrimes in Online Dating and Risk Mitigation 149Latika Choudhary and Hardik Daga8.1 Introduction to Online Dating 1508.1.1 The “Cons” of Online Dating 1518.1.2 Do the Pros Outweigh the Cons? 1528.2 Cybercrimes via Online Dating 1538.3 Exploring the Law of India 1598.3.1 Privacy and Online Dating 1608.4 Laws Governing Dating Apps in India 1618.4.1 The Constitution of India 1618.4.2 The Indian Penal Code 1860 1628.4.3 Information Technology Act 2000 1628.4.4 Personal Data Protection Bill 2022 1638.5 A Ray of Hope—is Mitigation Possible 165References 1679 Critical Analysis of the Role of Intermediaries with Respect to Cybercrimes in Cyberspace 171Anwesha PathakIntroduction 172References 19610 Cybercrime and AI: Issues and Solutions 199Gagandeep Kaur, Darashiny Nivasan and Tanupriya Choudhury10.1 Introduction 20010.1.1 Definition 20010.2 Literature Review 20210.3 Nature of Artificial Intelligence 20610.4 Artificial Intelligence Tools for Cybersecurity 20910.5 Legal Challenges 21110.6 Comparison of Indian and International Law 21510.7 Conclusion 22810.8 Suggestions 229References 23111 The Illusion of Bitcoin: The Rise and Fall of a Revolutionary Cryptocurrency 237Ravi Kant11.1 Mystery of Bitcoin: An Overview 23811.1.1 What is Bitcoin? 23811.1.2 History of Bitcoin 23911.1.3 Bitcoin and the Economic Enterprise 23911.2 The Rise and Fall of Bitcoin 24011.2.1 Gaining Popularity 24111.2.2 Losing Pursuit 24211.3 The Illusion of Bitcoin 24311.4 Bitcoin and Cybersecurity 24411.4.1 Decentralization and Its Potential Security Weaknesses 24511.4.2 Vulnerabilities in Bitcoin Wallets 24511.4.3 Cybersecurity Issues in Bitcoin Exchanges 24511.4.4 Blockchain Attacks and Manipulation 24611.5 Measures to Enhance Bitcoin Security 24611.5.1 Multi-Factor Authentication 24611.5.2 Encryption 24711.5.3 Decentralized Storage 24711.5.4 Cold Storage 24711.5.5 Multi-Sig Wallets 24711.6 Case Studies of Bitcoin Security Breaches 24811.6.1 Mt. Gox Hack 24811.6.2 Bitfinex Hack 24811.6.3 Nicehash Hack 24811.6.4 Dao Hack 24911.6.5 Parity Wallet Hack 24911.7 Bitcoin and the Financial Industry 24911.7.1 Impact of Bitcoin on the Economic Enterprise 25011.7.2 Indian Economy 25011.7.3 International Economy 25211.8 Social and Political Implications of Bitcoin 25311.9 Bitcoin’s Role in Crime 25511.10 The Future of Bitcoin 25711.10.1 Improved Security Measures 25811.10.2 Bitcoin Regulations 25811.10.3 Artificial Intelligence 25811.10.4 Quantum Computing 25811.10.5 Emergence of New Cryptocurrencies 25911.11 Conclusion 25911.12 Way Forward 260References 26112 Cybercrime Against Women in India: Challenges and Possible Solutions 265Avneet Kaur12.1 Introduction 26612.2 History and Origin of Cybercrimes 26712.3 Literature Review 26812.4 Reasons for the Growth of Cybercrimes Against Women 26912.4.1 Psychological Reason 26912.4.2 Sociological Reasons 27012.4.3 Lack of Awareness in India 27112.4.4 Knowledge of Computer 27112.4.5 Easy Availability and Addiction to the Internet 27112.5 Different Types of Cybercrime Against Women 27312.5.1 Cyber Harassment 27312.5.2 Cyber Pornography 27312.5.3 Cyberstalking 27412.5.4 Cyber Defamation 27412.5.5 Morphing 27512.5.6 Email Spoofing 27512.6 Implication of Cybercrimes on Women 27512.7 Legal Provisions Against Cybercrimes 27612.8 Provisions for Cybercrimes Under IT ACT 2000 27712.9 Landmark Cases in Cybercrime Against Women 27812.9.1 Jayanta Kumar Das Versus State of Odisha 27812.9.2 Fatima Riswana Versus State Rep. by A.C.P., Chennai & Ors 38 27812.9.3 State of Tamil Nadu Versus Suhas Kutti 27912.9.4 Avnish Bajaj Versus State (N.C.T.) of Delhi 27912.10 Shortcomings in the Indian Legal System 28012.11 Suggestions 281Conclusion: A Way Forward 282References 28313 Emerging Legal Challenges in the Artificial World of Metaverse 285Rajesh Kumar and Megha M. Patel13.1 Introduction 28613.2 The Ideas Behind the Metaverse 28813.2.1 The Market of the Metaverse 28913.3 The Application of the Metaverse in Different Industries 29013.3.1 Potential Benefits of the Metaverse 29113.4 Issues and Challenges after Introducing the Metaverse 29313.5 Approaching Metaverse Problems from a Global Perspective 29813.5.1 Preview of the Judicial Trail Map in the U.S. 29813.6 Conclusion 305References 30514 Cyberterrorism: In an Era of Information Warfare 309Mohamad Ayub Dar and Megha Ojha14.1 Introduction 31014.2 The Surge in Cyberterrorism 31014.3 Background 31114.3.1 Meaning and Definition of Cyberterrorism 31114.3.2 Dynamics of Cyberterrorism and Cyberterrorist Attacks 31114.3.3 Terrorist Attacks 31214.3.4 Cyberterrorism: Definitions 31314.3.5 Origin of Cyberterrorism 31414.4 Methodology Used 31414.5 Effects of Cyberterrorism on Society and Government 31514.6 Techniques and Methods Used for Cyberterrorism 31714.7 Countries Affected the Most by Cyberterrorism 32014.8 Ukraine and Russia War and Cyberterrorism 32114.9 Combating Cyberterrorism 32414.9.1 Indian Law Dealing with Cyberterrorism 32414.9.2 International Law Dealing with Cyberterrorism 32614.10 Conclusion 327References 32715 Freedom of Speech and Expression on Social Media— A Comparison of India and China 331Sanyogita Singh and Vikram Singh15.1 Introduction 33215.1.1 Why Protect Freedom of Speech? 33515.1.2 Why Restrict (Regulate) Speech? 33515.2 Review of Literature 33615.3 Online Speech Regulations—India vs. China 34115.3.1 Online Speech Regulations in India 34115.3.2 Online Speech Regulations in China 34215.4 Intermediary Responsibilities—India vs. China 34315.4.1 Responsibilities of Social Media Intermediaries in India 34315.4.1.1 Government Departments as Intermediaries 34515.4.2 Responsibilities of Social Media Intermediaries in China 34615.5 Conclusion 346References 34816 Environment and Cybercrime in the World: Mitigating the Impact of Cybercrime on the Environment 351Pracheta Rathore and Jai Malaviya16.1 Introduction 35216.1.1 What is Cybercrime? 35216.1.2 Importance of the Topic 35316.1.3 Overview of the Chapter 35316.2 Impact of Cybercrime on the Environment 35316.2.1 Production of E-Waste 35316.2.2 Use of Energy 35516.2.3 Financial and Economic Systems 35616.2.4 Damage to Critical Infrastructure 35616.3 Mitigating the Impact of Cybercrime 35816.3.1 Awareness Raising and Best Practices for Cybersecurity 35816.3.2 Responsible Disposal of Electronic Waste 36016.3.3 Energy-Efficient Technologies 36116.3.4 Government and Company Policies 36216.4 Future of the Environment and Cybercrime 36416.4.1 Emerging Trends in Cybercrime 36416.4.2 The Role of Technology in Protecting the Environment 36516.4.3 Collaboration and International Cooperation 36716.5 Conclusion 368References 36817 Face Recognition Based on Smart Attendance System Using Python 373P. Monisha, Prakash N., E. Udayakumar, Tamilselvan S. and Kumareshan N.17.1 Introduction 37417.2 Methodology 37617.3 Face Database 37917.4 Implementation of CNN and SVM Algorithm 38217.5 Features and Benefits Features of the System 38817.6 Conclusion 389References 390Index 393
Du kanske också är intresserad av
Cyber-Physical Systems for Innovating and Transforming Society 5.0
Tanupriya Choudhury, Abhijit Kumar, Ravi Tomar, S. Balamurugan, Ankit Vishnoi, Tanupriya (Deetya Soft Pvt. Ltd. Noida) Choudhury, India) Kumar, Abhijit (University of Petroleum and Energy Sciences, Ravi (Maharaja Surajmal Brij University) Tomar, India) Balamurugan, S. (Intelligent Research Consultancy Services (iRCS), India) Vishnoi, Ankit (Graphic Era University
2 779 kr
Generative Artificial Intelligence
R. Nidhya, D. Pavithra, Manish Kumar, A. Dinesh Kumar, S. Balamurugan, India) Nidhya, R. (Madanapalle Institute of Technology & Science, Madanapalle, India) Pavithra, D. (Dr NGP Institute of Technology, Coimbatore, Tamil Nadu, India) Kumar, Manish (Thapar Institute of Engineering and Technology, Patiala, India) Dinesh Kumar, A. (KL Deemed to be University, Vijayawada, India) Balamurugan, S. (Intelligent Research Consultancy Services (iRCS)
2 779 kr
Intelligent Robots and Cobots
V. Ramasamy, S. Balamurugan, Sheng-Lung Peng, India) Ramasamy, V. (Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology (Deemed to be University), India) Balamurugan, S. (Intelligent Research Consultancy Services (iRCS), Taiwan) Peng, Sheng-Lung (National Taipei University of Business
3 149 kr
Cloud Manufacturing
Chandrashekhar A, Sandeep Kumar Panda, S. Balamurugan, India) A, Chandrashekhar (ICFAI Foundation for Higher Education, Hyderabad, Telangana, India) Panda, Sandeep Kumar (ICFAI Foundation for Higher Education, Hyderabad, Telangana, India) Balamurugan, S. (Intelligent Research Consultancy Services (iRCS)
3 169 kr
Hyper-Customization
Ananthajothi K, R. Kanthavel, R. Dhaya, S. Balamurugan, Sheng-Lung Peng, Kingdom of Saudi Arabia) Kanthavel, R. (King Khalid University Abha, India) Balamurugan, S. (Intelligent Research Consultancy Services (iRCS), Taiwan) Peng, Sheng-Lung (National Taipei University of Business
3 249 kr
Metaheuristics for Machine Learning
Kanak Kalita, Narayanan Ganesh, S. Balamurugan, India) Kalita, Kanak (Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India) Ganesh, Narayanan (Vellore Institute of Technology Chennai Campus, India) Balamurugan, S. (Intelligent Research Consultancy Services (iRCS)
2 779 kr
Automation in the Welding Industry
Syed Quadir Moinuddin, Shaik Himam Saheb, Ashok Kumar Dewangan, Murali Mohan Cheepu, S. Balamurugan, Kingdom of Saudi Arabia) Moinuddin, Syed Quadir (King Faisal University, India) Saheb, Shaik Himam (ICFAI Foundation for Higher Education, India) Dewangan, Ashok Kumar (National Institute of Technology Delhi, Republic of Korea) Cheepu, Murali Mohan (Starwelds Inc. Busan, India) Balamurugan, S. (Intelligent Research Consultancy Services (iRCS)
2 779 kr
Optimized Computational Intelligence Driven Decision-Making
Hrudaya Kumar Tripathy, Sushruta Mishra, Minakhi Rout, S. Balamurugan, Samaresh Mishra, India) Tripathy, Hrudaya Kumar (KIIT Deemed to be University, India) Mishra, Sushruta (KIIT Deemed to be University, India) Rout, Minakhi (KIIT Deemed to be University, India) Balamurugan, S. (Intelligent Research Consultancy Services (iRCS), India) Mishra, Samaresh (KIIT Deemed to be University
2 889 kr
Predictive Analytics on Real-Time Traffic Management Systems
Sukanta Das, Santosh Kumar Sahoo, Sandeep Kumar Panda, S. Balamurugan, Sheng-Lung Peng, India) Panda, Sandeep Kumar (ICFAI Foundation for Higher Education, Hyderabad, Telangana, India) Balamurugan, S. (Intelligent Research Consultancy Services (iRCS), Taiwan) Peng, Sheng-Lung (National Taipei University of Business
3 059 kr
Decision-Making Techniques and Methods for Sustainable Technological Innovation
India) Kalita, Kanak (Dept. of Mechanical Engineering, Rajalakshmi Institute of Technology, Chennai, India) Ramesh, J. V. N. (Dept. of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Jordan) Elangovan, M. (Applied Science Research Centre, Applied Science Private University, Amman, India) Balamurugan, S. (Intelligent Research Consultancy Services (iRCS), Coimbatore, Kanak Kalita, J. V. N. Ramesh, J V N Ramesh, M. Elangovan, S. Balamurugan
2 589 kr