Enough Law of Horses and Elephants Debated…, …Let’s Discuss the Cyber Law Seriously
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
REFERENCES
Sandeep Mittal, 'A Strategic Road-map for Prevention of Drug Trafficking through Internet' (2012) 33 Indian Journal of Criminology and Criminalistics 86
Marco Gercke, Europe’s legal approaches to cybercrime (Springer 2009)
Marco Gercke, 'Understanding cybercrime: a guide for developing countries' (2011) 89 International Telecommunication Union (Draft) 93
David L Speer, 'Redefining borders: The challenges of cybercrime' (2000) 34 Crime, law and social change 259
Sandeep Mittal, 'Perspectives in Cyber Security, the future of cyber malware' (2013) 41 The Indian Journal of Criminology 18
Sandeep Mittal, 'The Issues in Cyber- Defense and Cyber Forensics of the SCADA Systems' (2015) 62 Indian Police Journal 29
Sandeep Mittal, 'A Strategic Road-map for Prevention of Drug Trafficking through Internet'
Open-ended Intergovernmental Expert Group on Cybercrime, Comprehensive Study on Cyber Crime, 2013)
https://wildequus.org/2014/05/07/sufi-story-blind-men-elephant/ (Accessed on 13/04/2017)
http://www.constitution.org/col/blind_men.htm (Accessed on 13/04/2017)
Martina Gillen, 'Lawyers and cyberspace: Seeing the elephant' (2012) 9 ScriptED 130
Frank H Easterbrook, 'Cyberspace and the Law of the Horse' (1996) U Chi Legal F 207
Ibid at 207, para 3
Joseph H Sommer, 'Against cyberlaw' (2000) Berkeley Technology Law Journal 1145
Lawrence Lessig, 'The law of the horse: What cyberlaw might teach' (1999) 113 Harvard law review 501
Andrew Murray, 'Looking back at the law of the horse: Why cyberlaw and the rule of law are important' (2013) 10 SCRIPTed 310
James Baxendale, 'FORTIETH ANNIVERSARY ISSUE: EQUINE CONSIDERATIONS AND COMPUTER LAW-REFLECTIONS FORTY YEARS ON' (2010) 36 Rutgers Computer & Tech LJ 161
Susan W Brenner, 'Toward a criminal law for cyberspace: A new model of law enforcement' (2004) 30 Rutgers Computer & Tech LJ 1
Ibid at page 104
Susan W Brenner, 'Cybercrime Metrics: Old Wine, New Bottles?' (2004) 9 Va JL & Tech 13
Susan W Brenner, 'Is There Such a Thing as' Virtual Crime'?' (2001)
Brenner, 'Toward a criminal law for cyberspace: A new model of law enforcement'
Miltiadis Kandias and others, An insider threat prediction model (Springer 2010)
Sandeep Mittal, 'Understanding the Human Dimension of Cyber Security' (2015) 34 Indian Journal of Criminology and Criminalistics 141
Majid Yar, 'The Novelty of ‘Cybercrime’ An Assessment in Light of Routine Activity Theory' (2005) 2 European Journal of Criminology 407
Ibid
Lawrence E Cohen and Marcus Felson, 'Social change and crime rate trends: A routine activity approach' (1979) American sociological review 588
Nir Kshetri, 'The simple economics of cybercrimes' (2006) 4 IEEE Security & Privacy 33
Yar, 'The Novelty of ‘Cybercrime’ An Assessment in Light of Routine Activity Theory'
Majid Yar, Cybercrime and society (Sage 2013)
Yar, 'The Novelty of ‘Cybercrime’ An Assessment in Light of Routine Activity Theory'. at page 424
Ibid
Mittal, 'A Strategic Road-map for Prevention of Drug Trafficking through Internet'
Statistics Source: Crime in India Statistics, NCRB, Ministry of Home Affairs, Government of India, New Delhi.
Karuppannan Jaishankar, 'Establishing a theory of cyber crimes'
(2007) 1 International Journal of Cyber Criminology 7
Susan W Brenner, 'Toward a criminal law for cyberspace: Product liability and other issues' (2004) 5 Pitt J Tech L & Pol'y i
Bill McCarthy, 'New economics of sociological criminology' (2002) 28 Annual Review of Sociology 417
JR Probasco and William L Davis, 'A human capital perspective on criminal careers' (1995) 11 Journal of Applied Business Research 58
Kshetri, 'The simple economics of cybercrimes'
Neal Kumar Katyal, 'Criminal law in cyberspace' (2001) 149 University of Pennsylvania Law Review 1003
Ibid
Alexandre López Borrull and Charles Oppenheim, 'Legal aspects of the Web' (2004) 38 Annual review of information science and technology 483
Though every computer or smart device has a machine address which can be easily spoofed, we are talking here specifically about geographical location. The remote access, incognito logins, encrypted platforms for communication, anonymous remailers and availability of ‘cached’ copies of frequently accessed internet resources further complicate and make impossible to attribute actions in cyberspace.
Dan L Burk, 'Jurisdiction in a World without Borders' (1997) 1 Va JL & Tech 1
Lessig, 'The law of the horse: What cyberlaw might teach'
In real space nature is represented by architecture.
That includes software that makes internet to behave as it is.
Graham Greenleaf, 'An endnote on regulating cyberspace: architecture vs law?' (1998)
Lessig, 'The law of the horse: What cyberlaw might teach'
Greenleaf, 'An endnote on regulating cyberspace: architecture vs law?'
Council of Europe, Convention on Cybercrime, 23 November 2001, available at: http://www.refworld.org/docid/47fdfb202.html [accessed 26 February 2017]
Ibid. Articles 23-35
Ibid. Preamble