The techno-legal dynamics of cyber crimes in Industry 5.0
tarafından
 
Kaur, Gagandeep, editor

Başlık
The techno-legal dynamics of cyber crimes in Industry 5.0

Yazar
Kaur, Gagandeep, editor

ISBN
9781394242177
 
9781394242153
 
9781394242160

Fiziksel Tanımlama
1 online resource (416 pages)

Seri
Industry 5.0 Transformation Applications
 
Industry 5.0 transformation applications.

İçerik
Preface -- 1 AI & IP: Ownership Rights in Industry 5.0 1 Pulkit Mogra -- 1.1 Introduction -- 1.2 Evolution of Artificial Intelligence System -- 1.3 Rights Upon the Fruits of AI: #TheConundrum -- 1.4 The Antidote to Conundrum: Work Made for Hire (WMFH) Model -- 2 Cybersecurity and Crime in Industry 4.0: An Analysis of Legal Aspects of Cybercrime 19 Jeevesh Sharma and Ashima Jain -- 2.1 Introduction -- 2.2 Industry 4.0 -- 2.3 Cybercrime in the Digital Economy -- 2.4 Cybercrime Statistics--Global Context -- 2.5 Cybersecurity -- 2.6 Legal Perspectives of Cybercrime and Their Penalty-Cases -- 2.7 Challenges of Cybersecurity -- 2.8 Conclusion -- 3 Toward an Intelligent Cybersecurity System: The Role of Machine Learning 43 Oly Mishra and Vijaya Geeta Dharmavaram -- 3.1 Introduction -- 3.2 Machine Learning Paradigms -- 3.3 Machine Learning Applications -- 3.4 Machine Learning Applications in Cybersecurity -- 3.5 Machine Learning in Cybersecurity--Few Cases -- 3.6 Issues and Limitations of Machine Learning in Cybersecurity -- 3.7 Future Directions -- 3.8 Conclusion -- 4 ATP the New-Age Threat Vector and Cyberattack Trends 55 Akashdeep Bhardwaj and Sam Goundar -- 4.1 Introducing Advanced Persistent Threats -- 4.2 New-Age APT Attacks -- 4.3 Cyberattacks Trends -- 4.4 Reconnaissance -- 4.5 Initial Compromise -- 4.6 Establishing a Foothold -- 4.7 Exfiltration -- 4.8 Consolidation -- 4.9 Covering Tracks -- 4.10 Conclusion -- 5 Online Privacy in Artificial Intelligence Algorithms: Ethical and Legal Impacts of Technological Development and Exposure 79 Aditi Bharti and Gagandeep Kaur -- 5.1 Introduction -- 5.2 Understanding Artificial Intelligence -- 5.3 Impact of Artificial Intelligence on Personal Data -- 5.4 General Data Protection Regulation and Artificial Intelligence -- 5.5 Right to be Forgotten: Legal and Ethical Considerations of Data Processing by an AI -- 5.6 Conclusion -- 6 Exacerbation and Combat of Cyberattacks: The Dual Paradox of Machine Learning 101 Devika Sharma and Saket Sharma -- 6.1 Introduction -- 6.2 Concept of Machine Learning -- 6.3 Technologies Involved in Machine Learning and Their Impact on Cybersecurity -- 6.4 Growing Role of Machine Learning in Cybersecurity -- 6.5 Applications of Machine Learning in Cybersecurity -- 6.6 Demerits of Using Machine Learning in Cybersecurity -- 6.7 Legal Framework for Cybersecurity in India -- 6.8 Conclusion -- 7 Hacking the System: A Deep Dive into the World of E-Banking Crime 121 Swati Gupta -- 7.1 Introduction -- 7.2 Literature Review -- 7.3 Combating E-Banking Crimes -- 7.4 E-Banking Crimes: Emerging Economies -- 7.5 Conclusion -- 8 Is Love a Crime-Decoding Cybercrimes in Online Dating and Risk Mitigation 149 Latika Choudhary and Hardik Daga -- 8.1 Introduction to Online Dating -- 8.2 Cybercrimes via Online Dating -- 8.3 Exploring the Law of India -- 8.4 Laws Governing Dating Apps in India -- 8.5 A Ray of Hope--is Mitigation Possible -- 9 Critical Analysis of the Role of Intermediaries with Respect to Cybercrimes in Cyberspace 171 Anwesha Pathak -- 10 Cybercrime and AI: Issues and Solutions 199 Gagandeep Kaur, Darashiny Nivasan and Tanupriya Choudhury -- 10.1 Introduction -- 10.2 Literature Review -- 10.3 Nature of Artificial Intelligence -- 10.4 Artificial Intelligence Tools for Cybersecurity -- 10.5 Legal Challenges -- 10.6 Comparison of Indian and International Law -- 10.7 Conclusion -- 10.8 Suggestions -- 11 The Illusion of Bitcoin: The Rise and Fall of a Revolutionary Cryptocurrency 237 Ravi Kant -- 11.1 Mystery of Bitcoin: An Overview -- 11.2 The Rise and Fall of Bitcoin -- 11.3 The Illusion of Bitcoin -- 11.4 Bitcoin and Cybersecurity -- 11.5 Measures to Enhance Bitcoin Security -- 11.6 Case Studies of Bitcoin Security Breaches -- 11.7 Bitcoin and the Financial Industry -- 11.8 Social and Political Implications of Bitcoin -- 11.9 Bitcoin's Role in Crime -- 11.10 The Future of Bitcoin -- 11.11 Conclusion -- 11.12 Way Forward -- 12 Cybercrime Against Women in India: Challenges and Possible Solutions 265 Avneet Kaur -- 12.1 Introduction -- 12.2 History and Origin of Cybercrimes -- 12.3 Literature Review -- 12.4 Reasons for the Growth of Cybercrimes Against Women -- 12.5 Different Types of Cybercrime Against Women -- 12.6 Implication of Cybercrimes on Women -- 12.7 Legal Provisions Against Cybercrimes -- 12.8 Provisions for Cybercrimes Under IT ACT 2000 -- 12.9 Landmark Cases in Cybercrime Against Women -- 12.10 Shortcomings in the Indian Legal System -- 12.11 Suggestions -- 13 Emerging Legal Challenges in the Artificial World of Metaverse 285 Rajesh Kumar and Megha M. Patel -- 13.1 Introduction -- 13.2 The Ideas Behind the Metaverse -- 13.3 The Application of the Metaverse in Different Industries -- 13.4 Issues and Challenges after Introducing the Metaverse -- 13.5 Approaching Metaverse Problems from a Global Perspective -- 13.6 Conclusion -- 14 Cyberterrorism: In an Era of Information Warfare 309 Mohamad Ayub Dar and Megha Ojha -- 14.1 Introduction -- 14.2 The Surge in Cyberterrorism -- 14.3 Background -- 14.4 Methodology Used -- 14.5 Effects of Cyberterrorism on Society and Government -- 14.6 Techniques and Methods Used for Cyberterrorism -- 14.7 Countries Affected the Most by Cyberterrorism -- 14.8 Ukraine and Russia War and Cyberterrorism -- 14.9 Combating Cyberterrorism -- 14.10 Conclusion -- 15 Freedom of Speech and Expression on Social Media--A Comparison of India and China 331 Sanyogita Singh and Vikram Singh -- 15.1 Introduction -- 15.2 Review of Literature -- 15.3 Online Speech Regulations--India vs. China -- 15.4 Intermediary Responsibilities--India vs. China -- 15.5 Conclusion -- 16 Environment and Cybercrime in the World: Mitigating the Impact of Cybercrime on the Environment 351 Pracheta Rathore and Jai Malaviya -- 16.1 Introduction -- 16.2 Impact of Cybercrime on the Environment -- 16.3 Mitigating the Impact of Cybercrime -- 16.4 Future of the Environment and Cybercrime -- 16.5 Conclusion -- 17 Face Recognition Based on Smart Attendance System Using Python 373 P. Monisha, Prakash N., E. Udayakumar, Tamilselvan S. and Kumareshan N. -- 17.1 Introduction -- 17.2 Methodology -- 17.3 Face Database -- 17.4 Implementation of CNN and SVM Algorithm -- 17.5 Features and Benefits Features of the System -- 17.6 Conclusion -- References -- Index.

Özet
This book explores the core principles, technological advancements, and legal challenges of Industry 5.0's digital transformation. Industry 5.0 has enhanced the operational efficiency of the entire manufacturing process by incorporating multiple emerging technologies; however, high-tech cybercrimes have prompted legal scholars worldwide to rethink the fundamental principles of technology and law. The Techno-Legal Dynamics of Cyber Crimes in Industry 5.0 shows how advanced technologies, such as artificial intelligence, the Internet of Things, and robotics, are integrated within manufacturing environments. It explores the intricate relationship between legal systems and technological advancements and addresses the rise of cybercrime following Industry 5.0's digital transformation. Focusing on the interaction between technology and law, the book investigates current cyberlaw issues and solutions. It draws insights from diverse experts, including scholars, legal professionals, and industry leaders, emphasizing effective regulations to minimize cyber threat risks for Industry 5.0. By adopting an international viewpoint, this book sheds light on various dimensions of nascent cybercrimes and legislative efforts worldwide aimed at governing them effectively. Audience This book should be read by legal scholars, lawyers, judges, legal and information technology researchers, cybersecurity experts, computer and software engineers, and students of law and technology. Regulators, policymakers, international trade specialists, and business executives should read it as well.

Notlar
John Wiley and Sons

Konu Terimleri
Computer security.
 
Industry 5.0 -- Security measures.
 
Business.
 
Electronic books.
 
Sécurité informatique.
 
Affaires.
 
Ordinateurs.
 
Livres numériques.
 
business (commercial function)
 
computers.
 
e-books.
 
Computers & Information Technology.
 
Industries.
 
BUSINESS & ECONOMICS.

Tür
Electronic books.

Yazar Ek Girişi
Kaur, Gagandeep,
 
Choudhury, Tanupriya
 
Balamurugan, S.

Elektronik Erişim
https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177


KütüphaneMateryal TürüDemirbaş NumarasıYer Numarası[[missing key: search.ChildField.HOLDING]]Durumu/İade Tarihi
Çevrimiçi KütüphaneE-Kitap599801-1001QA76.9 .A25Wiley E-Kitap Koleksiyonu