Preview

Cyber Defamation

Powerful Essays
Open Document
Open Document
8121 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Defamation
“The reputation of a man is like his shadow, gigantic when it precedes him, and pigmy in its proportions when it follows”
----Alexander de Talleyrand- Perigord

INTRODUCTION
The term ‘cyber crime’ is a misnomer. This term has nowhere been defined in any statute /Act passed or enacted by the Indian Parliament. The concept of cyber crime is not radically different from the concept of conventional crime. Both include conduct whether act or omission, which cause breach of rules of law and counterbalanced by the sanction of the state.
Cyber crime is the latest and perhaps the most complicated problem in the cyber world. “Cyber crime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”.
A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both” The computer may be used as a tool in the following kinds of activity- financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber defamation, cyber stalking. The computer may however be target for unlawful acts in the following cases- unauthorized access to computer/ computer system/ computer networks, theft of information contained in the electronic form, e-mail bombing, data didling, salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system, physically damaging the computer system.
In this project I am going to discuss CYBER DEFAMATION in detail.

What is defamation?
Defamation can be understood as the intentional infringement of another person's right to his good name. It is the wrongful and intentional publication of words or behaviour concerning another person, which

You May Also Find These Documents Helpful

  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Because the wide world of technology has developed at such an astounding pace, there are many problems for victims as well as investigators of cyber crime and computer-related crimes. First, we must familiarize ourselves with the definitions of cyber crime and computer-related crime. For this paper, we will define cyber crime as the use of a computer as a tool to commit a crime or as a crime committed where a computer is the target. We will define computer-related crime as a traditional crime where a computer is used to carry out, record actions, or provide evidence of a crime. The beginnings of the problem of investigating cyber crime come in the form of reporting. For many reasons cyber crimes tend to go unreported or severely underreported. Another problem is that law enforcement officials (as well as parents and their children) do not have adequate training, allocation of funds, coordination with other agencies, or proper understanding of applicable laws that pertain to cyber crime. From all angles cyber crime is a difficult problem to tackle, and there is a definite need for law enforcement to catch up with the technology of cyber space, which is quickly becoming a feeding ground for illegal and illicit activity.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Dashora, K. (2011). Cyber Crime in the Society: Problems and Preventions. Journal of Alternative Perscriptives in the Social Sciences, 240-259.…

    • 2090 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    capstone analysis

    • 535 Words
    • 2 Pages

    Cybercrime is an issue that should not be taken lightly. Crimes that are committed online can damage an individual’s life or cause major chaos. This paper will discuss what cybercrime is and how it has contributed to the overall rise in crime rates over the last ten years. This paper will also discuss recommendations to combat cybercrime and crimes associated with cybercrime and hackers, along with how cybercrime will affect the future of the criminal justice system.…

    • 535 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Crime Patterns

    • 382 Words
    • 2 Pages

    Now a day in this world cyber crime is on the rise. Everywhere you look everyone uses a computer for messaging, banking, keeping in contact with families, gaming, and many other things. Cyber crime is presenting big problems for criminologists nowadays, 1.) it is rapidly evolving, new things being built every day. 2.) It is difficult to detect through law enforcement channels, 3.) planning or coordinating its control demands technical skills that match those of the perpetrators.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    “A simple definition of cyber-crime would be unlawful acts wherein the computer is either a tool or a target or both.”1…

    • 819 Words
    • 4 Pages
    Good Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Cyber Crime in America

    • 624 Words
    • 3 Pages

    Cyber crime, also referred to as computer crime comprises of all crimes that are committed using a computer or with the help of a computer. Cyber crime is not a single activity but instead there are various activities that may be categorized as cyber crimes. However, the major activities involved include illegal or unauthorized access of information or data, interception of data from the computer illegally, unauthorized damaging or deletion of data from the computer, misuse of devices and committing fraud by electronic means (Broadhurst, 2005).…

    • 624 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Cyberbullying In Canada

    • 1966 Words
    • 8 Pages

    It has been a routine that when someone needs something, he or she can proceed to the Internet for his or her need to be catered. But on the other side of the Internet, crimes after crimes spread. Anything that takes place in cyberspace, or all electronic or internet means of communication can potentially produce cyber victims. A Cybercriminal use the computer as their object…

    • 1966 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Cyber war Vs Cyber terrorism

    • 3714 Words
    • 13 Pages

    In this time and era, we have witnessed the emergence of electronic resources as the most important development of the modern day communication system. Technologies such as cellular phones, home computers, the internet and websites have added another dimension to the way we live our lives today. This presentation seeks to address and analyse the negative and positive aspects in view of the introduction of computers and telecommunications techniques as follows: Firstly, it raises awareness with regard to the new age of crimes, termed as cyber crimes. The paper focuses, in particular, on the difference between the two common types of cyber crimes, cyber war and cyber terrorism. Secondly, the paper examines the limitations and impact of having graduates through e-learning. Thirdly and lastly, the paper discusses on whether computer practitioners should be required to have a practicing license as it is with other professionals such as doctors, lawyers and teachers.…

    • 3714 Words
    • 13 Pages
    Good Essays
  • Powerful Essays

    Cyber-crimes can be divided into two broad categories; the first category involves attacks on computer hardware and software tools, such as botnets, network intrusions, and malware. The category involves cybercrimes of financial nature such as online fraud and penetration of online financial services (Brenner, 2010). Others include phishing, corporate account takeover and theft of intellectual properties. Cyber-crimes are committed across geographical boundaries, with the perpetrators taking advantage of the internet to propel their criminal activities. The convenience, anonymity and increased profitability of cyber-crimes have increased the proliferation of cyber-crimes in recent years. Eighty percent of modern cyber-crimes are estimated to originate from organized criminal activities. Prevalence of the crime can be attributed to the establishment of fraud-as-service, increased profitability and increasing diversification of the digital media platforms (ITU,…

    • 3110 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    The unlawful acts committed by an individual or a group using computers as a tool and cyberspace as a medium is known as cyber torts.Internet provides a reasonable amount for criminal enterprises. The various acts and laws passed by Indian government has thrown light on the advancement and progress of cyber technology.…

    • 679 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber terrorists usually use the computer as a tool, target, or both for their unlawful act either to gain information which can result in heavy loss/damage to the owner of that intangible sensitive information. Internet is one of the means by which the offenders can gain such price sensitive information of companies, firms, individuals, banks, intellectual property crimes (such as stealing new product plans, its description, market programme plans, list of customers etc.), selling illegal articles, pornography etc. this is done through many methods such as phishing, spoofing, pharming, internet phising, wire transfer etc. and use it to their own advantage without the consent of the individual.…

    • 2401 Words
    • 10 Pages
    Powerful Essays