附註:Includes bibliographical references and index.
Chapter 1. Principles of data privacy and security in a cyber world -- Chapter 2. Data access, privacy, protection methods, and challenges: a systematic literature review -- Chapter 3. Privacy and other legal concerns in the wake ofdeepfake technology: comparative study of India, US, and China -- Chapter 4. Social media and cyber security: investigating the risk in Nigeria -- Chapter 5. The European Union's proposed artificial intelligence legislation and the path ahead for Asian approaches to artifical intelligence -- Chapter 6. Blockchain technology in the agricultural supply chain: a case study of India -- Chapter 7. Gauging the scale of intertwinement: juggling between the use of biometric data andright to privacy -- Chapter 8. Cybersquatting: need for protection of domain names in the realm of cyberspace -- Chapter 9. Evolution of cryptocurrency: analysing the utility, legality, and regulatory framework in India -- Chapter 10. Cryptocurrency: a detailed study -- Chapter 11. Blockchain technology efficiently managing information and cyber security -- Chapter 12. The cryptocurrency "pump-and-dump": social media and legal and ethical ambiguity -- Chapter 13. Considerations for blockchain-based online dispute resolution -- Chapter 14. A decade in pixels: analyzing incidents of state-sponsored surveillance from the last decade -- Chapter 15. A Survey on privacy-preserving data publishing models for big data--Chapter 16. Critical appraisal of challenges to online consumer fissures in information technology law in India -- Chapter 17. OTT platforms and their distributorship agreement with content makers: a study from the perspective of competition law and policy in India and other jurisdictions -- Chapter 18. Mapping the changing contours of electronic evidence in India -- Chapter 19. The vulnerability of children in cyberspace -- Chapter 20. Artificial intelligence: the need of the hour.
摘要:"This handbook examines the legislations on internet, data security and their effects on user engagement and cyber-crime while contextualizing the inter- relationship between technology and law and addressing the need for additionalregulations to safeguard user identification, data and privacy"