Research Publication Rating and Indexing
Add Index Article Form
Home
Add Index Article
Journal Id
*
Journal Title
*
Name of Article
*
Year of publication
*
DOI Number
*
First Author Name
*
First Author Affiliation
*
Second Author Name
Second Author Affiliation
Third Author Name
Third Author Affiliation
Fourth Author Name
Fourth Author Affiliation
Fifth Author Name
Fifth Author Affiliation
Sixth Author Name
Sixth Author Affiliation
Seventh Author Name
Seventh Author Affiliation
Article Abstract
Since the onset of the internet age, an infamous Data Entrepreneur, Clive Humby, proclaimed that “data is new oil” [1] and today we are witnessing his assertions turning into a reality as individuals are moving across every direction seeking strategies for mining data, much like oil. certain are morally sound, such as collecting with consent, which is neither coerced nor without our own free will, whilst others frequently accumulate these data unilaterally by forcing us into accepting certain “terms and conditions” while without them, we cannot utilize the service given by them. In addition, there are some cyber-attacks by perpetrators, with the most unsettling usage we have ever witnessed, it’s also employed by the governments of several states, including ours, using spywares to target their rivals as well as other individuals in order to obtain an edge over their rivals. In this study, we will explore each of these issues in brief, from computer usage to the government exploiting this data for various objectives from “segmenting to blocking”, as well as certain sections of the Information Technology Act [2] (hereinafter IT Act) dealing with these attacks on our privacy.
Article Keywords
*
Article Link
*