This book explores the core principles, technological advancements, and legal challenges of Industry 5.0’s digital transformation.
Table of ContentsPreface
1. AI & IP: Ownership Rights in Industry 5.0Pulkit Mogra
1.1 Introduction
1.2 Evolution of Artificial Intelligence System
1.3 Rights Upon the Fruits of AI: #TheConundrum
1.4 The Antidote to Conundrum: Work Made for Hire (WMFH) Model
Conclusion
References
2. Cybersecurity and Crime in Industry 4.0: An Analysis of Legal Aspects of CybercrimeJeevesh Sharma and Ashima Jain
2.1 Introduction
2.2 Industry 4.0
2.3 Cybercrime in the Digital Economy
2.3.1 Cybercrime and Organization
2.4 Cybercrime Statistics—Global Context
2.4.1 Cybercrime—Indian Context
2.4.2 Government Initiatives to Curb Cyber Frauds
2.4.3 Cybercrime Trends with Statistics
2.5 Cybersecurity
2.5.1 Measures to Protect from Cyberattacks
2.6 Legal Perspectives of Cybercrime and Their Penalty-Cases
2.6.1 Legal Aspects of Cybercrimes with Cases
2.7 Challenges of Cybersecurity
2.8 Conclusion
References
Weblinks
Case Links
3. Toward an Intelligent Cybersecurity System: The Role of Machine LearningOly Mishra and Vijaya Geeta Dharmavaram
3.1 Introduction
3.2 Machine Learning Paradigms
3.3 Machine Learning Applications
3.4 Machine Learning Applications in Cybersecurity
3.5 Machine Learning in Cybersecurity—Few Cases
3.6 Issues and Limitations of Machine Learning in Cybersecurity
3.7 Future Directions
3.8 Conclusion
References
4. ATP the New-Age Threat Vector and Cyberattack TrendsAkashdeep Bhardwaj and Sam Goundar
4.1 Introducing Advanced Persistent Threats
4.2 New-Age APT Attacks
4.3 Cyberattacks Trends
4.4 Reconnaissance
4.5 Initial Compromise
4.6 Establishing a Foothold
4.7 Exfiltration
4.8 Consolidation
4.9 Covering Tracks
4.10 Conclusion
References
5. Online Privacy in Artificial Intelligence Algorithms: Ethical and Legal Impacts of Technological Development and ExposureAditi Bharti and Gagandeep Kaur
5.1 Introduction
5.2 Understanding Artificial Intelligence
5.3 Impact of Artificial Intelligence on Personal Data
5.4 General Data Protection Regulation and Artificial Intelligence
5.5 Right to be Forgotten: Legal and Ethical Considerations of Data Processing by an AI
5.5.1 Can AI Actually Forget?
5.5.2 Privacy by Design
5.6 Conclusion
References
6. Exacerbation and Combat of Cyberattacks: The Dual Paradox of Machine LearningDevika Sharma and Saket Sharma
6.1 Introduction
6.2 Concept of Machine Learning
6.3 Technologies Involved in Machine Learning and Their Impact on Cybersecurity
6.3.1 Big Data
6.3.2 Blockchain Technology
6.3.3 User and Entity Behavioral Analytics (UEBA)
6.4 Growing Role of Machine Learning in Cybersecurity
6.5 Applications of Machine Learning in Cybersecurity
6.6 Demerits of Using Machine Learning in Cybersecurity
6.7 Legal Framework for Cybersecurity in India
6.7.1 The Information Technology Rules (IT Rules)
6.7.2 The Digital Personal Data Protection Act, 2023
6.7.3 Indian Computer Emergency Response Team (CERT-IN)
6.8 Conclusion
References
7. Hacking the System: A Deep Dive into the World of E-Banking CrimeSwati Gupta
7.1 Introduction
7.2 Literature Review
7.2.1 Cyber Risk in the Financial Industry
7.2.2 E-Banking Crime
7.2.3 Reasons for the Rise in E-Banking Crimes
7.2.3.1 Theoretical Perspectives on the Rise in E-Banking Crimes
7.2.4 Impact of E-Banking Crimes on the Financial Sector
7.2.4.1 Theoretical Perspectives on the Impact of E-Banking Crimes
7.3 Combating E-Banking Crimes
7.3.1 Challenges in Combating E-Banking Crimes
7.4 E-Banking Crimes: Emerging Economies
7.4.1 India
7.4.2 Nigeria
7.5 Conclusion
References
8. Is Love a Crime-Decoding Cybercrimes in Online Dating and Risk MitigationLatika Choudhary and Hardik Daga
8.1 Introduction to Online Dating
8.1.1 The “Cons” of Online Dating
8.1.2 Do the Pros Outweigh the Cons?
8.2 Cybercrimes via Online Dating
8.3 Exploring the Law of India
8.3.1 Privacy and Online Dating
8.4 Laws Governing Dating Apps in India
8.4.1 The Constitution of India
8.4.2 The Indian Penal Code 1860
8.4.3 Information Technology Act 2000
8.4.4 Personal Data Protection Bill 2022
8.5 A Ray of Hope—is Mitigation Possible
References
9. Critical Analysis of the Role of Intermediaries with Respect to Cybercrimes in CyberspaceAnwesha Pathak
Introduction
References
10. Cybercrime and AI: Issues and SolutionsGagandeep Kaur, Darashiny Nivasan and Tanupriya Choudhury
10.1 Introduction
10.1.1 Definition
10.2 Literature Review
10.3 Nature of Artificial Intelligence
10.4 Artificial Intelligence Tools for Cybersecurity
10.5 Legal Challenges
10.6 Comparison of Indian and International Law
10.7 Conclusion
10.8 Suggestions
References
11. The Illusion of Bitcoin: The Rise and Fall of a Revolutionary CryptocurrencyRavi Kant
11.1 Mystery of Bitcoin: An Overview
11.1.1 What is Bitcoin?
11.1.2 History of Bitcoin
11.1.3 Bitcoin and the Economic Enterprise
11.2 The Rise and Fall of Bitcoin
11.2.1 Gaining Popularity
11.2.2 Losing Pursuit
11.3 The Illusion of Bitcoin
11.4 Bitcoin and Cybersecurity
11.4.1 Decentralization and Its Potential Security Weaknesses
11.4.2 Vulnerabilities in Bitcoin Wallets
11.4.3 Cybersecurity Issues in Bitcoin Exchanges
11.4.4 Blockchain Attacks and Manipulation
11.5 Measures to Enhance Bitcoin Security
11.5.1 Multi-Factor Authentication
11.5.2 Encryption
11.5.3 Decentralized Storage
11.5.4 Cold Storage
11.5.5 Multi-Sig Wallets
11.6 Case Studies of Bitcoin Security Breaches
11.6.1 Mt. Gox Hack
11.6.2 Bitfinex Hack
11.6.3 Nicehash Hack
11.6.4 Dao Hack
11.6.5 Parity Wallet Hack
11.7 Bitcoin and the Financial Industry
11.7.1 Impact of Bitcoin on the Economic Enterprise
11.7.2 Indian Economy
11.7.3 International Economy
11.8 Social and Political Implications of Bitcoin
11.9 Bitcoin’s Role in Crime
11.10 The Future of Bitcoin
11.10.1 Improved Security Measures
11.10.2 Bitcoin Regulations
11.10.3 Artificial Intelligence
11.10.4 Quantum Computing
11.10.5 Emergence of New Cryptocurrencies
11.11 Conclusion
11.12 Way Forward
References
12. Cybercrime Against Women in India: Challenges and Possible SolutionsAvneet Kaur
12.1 Introduction
12.2 History and Origin of Cybercrimes
12.3 Literature Review
12.4 Reasons for the Growth of Cybercrimes Against Women
12.4.1 Psychological Reason
12.4.2 Sociological Reasons
12.4.3 Lack of Awareness in India
12.4.4 Knowledge of Computer
12.4.5 Easy Availability and Addiction to the Internet
12.5 Different Types of Cybercrime Against Women
12.5.1 Cyber Harassment
12.5.2 Cyber Pornography
12.5.3 Cyberstalking
12.5.4 Cyber Defamation
12.5.5 Morphing
12.5.6 Email Spoofing
12.6 Implication of Cybercrimes on Women
12.7 Legal Provisions Against Cybercrimes
12.8 Provisions for Cybercrimes Under IT ACT 2000
12.9 Landmark Cases in Cybercrime Against Women
12.9.1 Jayanta Kumar Das Versus State of Odisha
12.9.2 Fatima Riswana Versus State Rep. by A.C.P., Chennai & Ors38
12.9.3 State of Tamil Nadu Versus Suhas Kutti
12.9.4 Avnish Bajaj Versus State (N.C.T.) of Delhi
12.10 Shortcomings in the Indian Legal System
12.11 Suggestions
Conclusion: A Way Forward
References
13. Emerging Legal Challenges in the Artificial World of MetaverseRajesh Kumar and Megha M. Patel
13.1 Introduction
13.2 The Ideas Behind the Metaverse
13.2.1 The Market of the Metaverse
13.3 The Application of the Metaverse in Different Industries
13.3.1 Potential Benefits of the Metaverse
13.4 Issues and Challenges after Introducing the Metaverse
13.5 Approaching Metaverse Problems from a Global Perspective
13.5.1 Preview of the Judicial Trail Map in the U.S.
13.6 Conclusion
References
14. Cyberterrorism: In an Era of Information WarfareMohamad Ayub Dar and Megha Ojha
14.1 Introduction
14.2 The Surge in Cyberterrorism
14.3 Background
14.3.1 Meaning and Definition of Cyberterrorism
14.3.2 Dynamics of Cyberterrorism and Cyberterrorist Attacks
14.3.3 Terrorist Attacks
14.3.4 Cyberterrorism: Definitions
14.3.5 Origin of Cyberterrorism
14.4 Methodology Used
14.5 Effects of Cyberterrorism on Society and Government
14.6 Techniques and Methods Used for Cyberterrorism
14.7 Countries Affected the Most by Cyberterrorism
14.8 Ukraine and Russia War and Cyberterrorism
14.9 Combating Cyberterrorism
14.9.1 Indian Law Dealing with Cyberterrorism
14.9.2 International Law Dealing with Cyberterrorism
14.10 Conclusion
References
15. Freedom of Speech and Expression on Social Media—A Comparison of India and ChinaSanyogita Singh and Vikram Singh
15.1 Introduction
15.1.1 Why Protect Freedom of Speech?
15.1.2 Why Restrict (Regulate) Speech?
15.2 Review of Literature
15.3 Online Speech Regulations—India vs. China
15.3.1 Online Speech Regulations in India
15.3.2 Online Speech Regulations in China
15.4 Intermediary Responsibilities—India vs. China
15.4.1 Responsibilities of Social Media Intermediaries in India
15.4.1.1 Government Departments as Intermediaries
15.4.2 Responsibilities of Social Media Intermediaries in China
15.5 Conclusion
References
16. Environment and Cybercrime in the World: Mitigating the Impact of Cybercrime on the EnvironmentPracheta Rathore and Jai Malaviya
16.1 Introduction
16.1.1 What is Cybercrime?
16.1.2 Importance of the Topic
16.1.3 Overview of the Chapter
16.2 Impact of Cybercrime on the Environment
16.2.1 Production of E-Waste
16.2.2 Use of Energy
16.2.3 Financial and Economic Systems
16.2.4 Damage to Critical Infrastructure
16.3 Mitigating the Impact of Cybercrime
16.3.1 Awareness Raising and Best Practices for Cybersecurity
16.3.2 Responsible Disposal of Electronic Waste
16.3.3 Energy-Efficient Technologies
16.3.4 Government and Company Policies
16.4 Future of the Environment and Cybercrime
16.4.1 Emerging Trends in Cybercrime
16.4.2 The Role of Technology in Protecting the Environment
16.4.3 Collaboration and International Cooperation
16.5 Conclusion
References
17. Face Recognition Based on Smart Attendance System Using PythonP. Monisha, Prakash N., E. Udayakumar, Tamilselvan S. and Kumareshan N.
17.1 Introduction
17.2 Methodology
17.3 Face Database
17.4 Implementation of CNN and SVM Algorithm
17.5 Features and Benefits Features of the System
17.6 Conclusion
References
Index Back to Top