User talk:Akshita mittal

Impact of supply chain management practices on the overall performance of IKEA
Impact of supply chain management practices on the overall performance of IKEA

Table of Contents Introduction. 3 Research Aim and Objectives. 4 Research Questions. 4 Literature review.. 5 Supply Chain of IKEA. 5 Significant forces of change impacting the strategies of the supply chain. 6 Strategies utilised by IKEA as a part of its supply chain management 6 Research Methodology. 8 Research paradigm.. 8 Research strategy. 8 Data collection method. 8 Data analysis. 8 Research Limitations. 9 Summary. 10 Gantt chart 11 References. 12 Introduction Supply chain management can be defined as a procedure of managing an interconnected network of businesses that provides services and goods to the end consumers (Wieland, 2021). Supply chain management means managing the goods and service flow between locations and businesses and comprises the storage and movement of raw materials and finished goods also so that order fulfilment can take place from point of origin to the consumption point. This research focuses on the supply chain management procedure of IKEA. The strategic supply chain management concept and its application is a topic that is under discussion (Sund et al., 2020). The whole procedure is complicated and that is why it needs excellent communication and also understanding established between the suppliers and the manufacturers. Also, it can be referred to as a business strategy type that impacts the efficiency and profitability of the respective organisation or company. If the whole procedure of management is broken down to a simplex analysis it comprises five major procedures type that is: Plan, source, develops, deliver, return. IKEA is an organisation that deals with a broad range of home accessories, services and commodities. It is a retail organisation that deals majorly with home furniture equipment products and accessories and it also provides all the required essentials. The main reason why IKEA is very popular is because of its quality of products and lower costs. Today IKEA has more than 300 stores all over the globe and it is also referred to as one of the most sought household product selling organisations. The origination of IKEA was in Sweden in 1943 (Sund et al., 2020). The major competitors of IKEA comprise both online and retail furniture stores. Accordingly, Home depot and The one are the major competitors in the retail furniture industry. The outlets of IKEA around the globe have characteristics that enable both the consumers and organisation to advantage through activities of shopping. Also, the company has 27 offices of trade services in 23 nations, 15 consumer distribution centres in 17 nations, and 43 production units of industry in 11 nations. Intense training is provided to them is a staff of IKEA to make sure that there is the maintenance of quality in the overall procedure of supply chain management that involves procuring, storing manufacturing, and delivery procedures (Jonsson et al., 2017). Experienced and competent professionals are hired by the company to make sure that its resources are utilised efficiently. Additionally, the franchisees and the partners had also been directed to confirm international established standards set through which the concept and values of IKEA are proliferated. Research Aim and Objectives This research aims to “Analyse the impact of supply chain management practices on the overall performance of IKEA”. The objectives of this research are: ·      To understand the concept of supply chain management in a business ·      To analyse the practices of supply chain management in IKEA ·     To evaluate the impact of supply chain management practices on the overall performance of IKEA Research Questions RQ1: What is the concept of supply chain management and its practises in a business? RQ2: What is the supply chain management procedure of IKEA and what practices does the company use? RQ3: How does the supply chain management practices impact the overall performance of IKEA?

Literature review Before analysing how the supply chain management is done at IKEA, it is important to look at several reasons why the management of the supply chain is so important for a business. The initial target for any organisation that is in the manufacturing and retail industry is to encourage better experience and service to consumers. Providing consumers with a product of good quality at an appropriate place and at the appropriate time at a satisfactory cost is one of the major objectives that can be attained through proper management of the supply chain. This type of continuous supply of quality based products helps a company or a business to maintain a steady base of consumers and also provides immense support for the growth of a company or a business in the long run. As said by Jiang et al (2018), It also provides help to the company in various aspects like decreasing the operational cost of the organisation, improving the financial and economical position of the company, and improving the quality aspects of society and human life. IKEA is one of the hugest retail organisations in the globe which is almost 9000 distinct types of products in its stores. The major vision goal of IKEA is to provide goods of the best quality at lower prices. It is to be noted that most of these stores of IKEA are located in the countries which are economically developed in America, Asia, Europe, and the Middle East and thereby it pays attention to operating in those markets which are highly lucrative. According to Sandybayev (2017), In this context, IKEA forms strategy according to the needs of its operating individual international markets and it also focuses on aligning its worldwide operations with the objectives of profit earning and expansion. Thus, IKEA pays major attention to offering a product range with high quality and it is promoted as a brand that is a one-stop destination for asthenic furniture. Attention is majorly paid to one minimalizing error and wastage during the procedure of operation. This enables the organisation to enhance its continuous operational efficiency and it enables IKEA to implement its strategic policy of decreasing prices. Theoretical and conceptual framework The framework of supply chain management integrates all the planning of the supply chain and the procedures of execution from the management of demand to consumer delivery. The major characteristics of the framework of supply chain management comprise joint planning and time horizon along with the compatibility of the corporate philosophies and the breadth of the base of the supplier. The framework of supply chain management comprises the policies of the supply chain along with the participants of the supply chain, the life cycle activities of the supply chain, supply chain support functions, continuous improvement and enablers of supply chain management. This theoretical and conceptual framework will help in analysing the supply chain of the company IKEA. Supply Chain of IKEA The supply gene procedure of IKEA demonstrates that the operations of the organisation are performed through distinct levels or stages. The major focus of IKEA is to make sure that the satisfaction of customers is attained through the provision of immense value and convincing during the whole experience of shopping. Commodities that fulfil the needs of the consumers are provided along with the needed services that provide help to the consumer to conveniently determine purchase utilise and transport the commodities. A broad variety of commodities are available at the IKEA stores for the consumers to select from and the designing of the stores are done in a manner that enables the consumers to conveniently view the products. The staff of IKEA are placed in distinct sections so that too help consumers. IKEA facilitate easy or convenient packaging through the self-assembly flat packs which comprise the important and necessary instruments and instructions. Facilities like a food court, parking, mini cinema, supervised play area for children has also been established by IKEA so that a great experience can be provided to consumers and value can be added to the brand name. Significant forces of change impacting the strategies of the supply chain The strategies of supply chain management of IKEA are impacted by its ability to maintain accurate standards of quality, efficiently satisfy the requirements of consumers, minimise the impact on the environment, and generate a higher level of profitability. Major attention is paid to adopting to the modifying needs of the consumer by updating the annual product portfolio. Also, the focus of IKEA is on ensuring that the utmost convenience is provided to consumers so that they can easily obtain and utilise the commodities. As said by Jonsson et al (2017), The relationship for long term is maintained with the partners and suppliers so that to make sure that all materials are appropriate according to the standards of quality and requirements of quantity. Partners and suppliers are incorporated into the procedure of not company to make sure environmental sustainability and additionally major attention to the low cost enables the minimization of errors and wastage and also complements the price decreasing strategy of the organisation whereby enhancing consumer attraction and operational efficiency. Strategies utilised by IKEA as a part of its supply chain management The major strategies utilised by IKEA are product diversification and cost leadership. IKEA pays attention to minimising its cost of production through the following measures: ·     Waste minimization ·     Decreasing errors in operation by enhancing the efficiency of employees ·       Stakeholder incorporation and commitment toward quality As per the view of Jonsson et al (2017), Product diversification is done by IKEA by paying attention to innovation and introducing a huge range of new products annually. IKEA also entered the industry of food which enabled the organisation to expand its operations increase its offerings of products and services. IKEA also has included the use of low flow and high flow facilities of warehouses. In facilities with high flow, the retrieval and storage systems are operated usually by machines. Additionally, IKEA also does not limit its raw material supply from the branded and popular companies off supplier but the company also buy its raw materials from single man suppliers and small traders.

Research Methodology Research paradigm Four major types of research paradigms are used during the procedure of completing the research. These four types are positivism, realism, pragmatism and interpretivism. The philosophy is linked with methodology as the philosophy is concerned with knowledge and abstraction. The philosophy of a research in the methodology is a framework that provides guidance on how the research should be conducted on the basis of ideas. This research will be based on positivist research philosophy because it adheres to the point of view that only factual knowledge is included in this study (Pandey and Pandey, 2021). The major aim of the positivism research philosophy is to formulate reliability and validity for the research. The main reason behind selecting the positivism research philosophy for this research is because it will allow the researcher to cover a broad range of scenarios in a shorter period. Research strategy A strategy of research is a plan of action that is formulated step by step to provide direction to the efforts and thoughts of the researcher. Through research strategy, a researcher can conduct the research systematically. Two types of major research strategies are there which are quantitative and qualitative. This research will be conducted by utilising a qualitative research strategy which implies that non-numerical type of data will be included in the research so that it can be described in a detailed manner (Mohajan, 2018). The reason behind selecting a qualitative research strategy is because it helps in demonstrating the data in a detailed manner and the analysis of qualitative research is easy as compared to quantitative research (Mohajan, 2018). The topic of this research also demands that a qualitative research strategy should be adopted for this research. Data collection method Two major types of data collection methods are there which are primary data collection and secondary data collection procedure. Secondary sources will be used to collect data for this research. Secondary data collection implies that the data will be collected from the sources like authentic websites, journals, books, and articles which contains data which is already been collected by some previous researcher or author. However, it is important to note that data will only be taken from a particular source after a proper analysis of the reliability and validity of that source (Bairagi and Munot, 2019). The authenticity and accuracy of that source will also be double checked so that the formulated research can be considered reliable and valid. Data analysis As mentioned above the research will be prepared to utilise a qualitative secondary type of data and that is why the data analysis will also be done by using the qualitative data analysis procedure. Thematic data analysis procedure will be used to identify repeated themes and patterns in the data. The reason behind selecting this data analysis is because the data will be collected from previously held interviews and previous research associated with a similar topic. Research Limitations The major limitation of this research will be associated with the secondary collection of data because it might be possible that the data collected is old. And also noise strong evidence is available regarding the impact of management procedures adopted by IKEA on the development prospect of the nation. Also, the topic of this research does not comprise other major aspects of management procedures in a business.

Summary The major conclusion that can be drawn from this research proposal is that management of the supply chain aids an organisation in its aspects of profitability and growth. It was found after analysing the supply chain management practices of IKEA that the company’s efficiency has drastically increased because of the procedures adopted by it. Also, the attention paid by IKEA to consumer satisfaction helps the company to remain competitive in the external market.

Gantt chart Three months Two months Two months Three months Main research context Idea development Research background Aim and objectives development Literature review theoretical framework Collection and analysis of articles literature review Data collection and analysis Data items Conclusion research questions Written format research development Final research conclusion and required recommendations References Bairagi, V. and Munot, M.V. eds., 2019. Research methodology: A practical and scientific approach. CRC Press.https://books.google.com/books?hl=en&lr=&id=wxaGDwAAQBAJ&oi=fnd&pg=PP1&dq=research+methodology&ots=vvSFV1-xr5&sig=cRkSMz440-MK0HVsZ3yeFum0c6c Jiang, Y., Jia, F. and Gong, Y., 2018. IKEA: global sourcing and the sustainable leather initiative. International Food and Agribusiness Management Review, 21(5), pp.627-640.https://www.wageningenacademic.com/doi/abs/10.22434/IFAMR2017.0109 Jonsson, P., Rudberg, M. and Holmberg, S., 2017. Centralised supply chain planning at IKEA. Supply Chain Management: An International Journal.https://www.emerald.com/insight/content/doi/10.1108/SCM-05-2012-0158/full/html Mohajan, H.K., 2018. Qualitative research methodology in social sciences and related subjects. Journal of Economic Development, Environment and People, 7(1), pp.23-48.https://www.ceeol.com/search/article-detail?id=640546 Pandey, P. and Pandey, M.M., 2021. Research methodology tools and techniques. Bridge Center.http://dspace.vnbrims.org:13000/jspui/bitstream/123456789/4666/1/RESEARCH%20METHODOLOGY%20TOOLS%20AND%20TECHNIQUES.pdf Sandybayev, A., 2017. Strategic Supply Chain Management Implementation: Case Study of IKEA. Noble International Journal of Business and Management Research, 1(1), pp.5-9.https://www.napublisher.org/pdf-files/NIJBMR-451-5-9.pdf Sund, T., Lööf, C., Nadjm-Tehrani, S. and Asplund, M., 2020. Blockchain-based event processing in supply chains—A case study at IKEA. Robotics and Computer-Integrated Manufacturing, 65, p.101971.https://www.sciencedirect.com/science/article/pii/S0736584519301905 Wieland, A., 2021. Dancing the supply chain: Toward transformative supply chain management. Journal of Supply Chain Management, 57(1), pp.58-73.https://onlinelibrary.wiley.com/doi/abs/10.1111/jscm.12248 Akshita mittal (talk) 10:55, 5 September 2022 (UTC)

AN OVERVIEW ON CYBERCRIME IN DIGITAL WORLD WITH SPECIAL REFERENCE TO INDIAN LEGAL FRAMEWORK
AN OVERVIEW ON CYBERCRIME IN DIGITAL WORLD WITH SPECIAL REFERENCE TO INDIAN LEGAL FRAMEWORK

Student name

Student code

= Abstract =

Internet has made the flow of data and information by providing worldwide connection of loosely held networks between different networks easier. Security issues have been a major concern from the past few years with data and information being transferred between networks at distant locations. Criminal activities are performed by few people by using internet such as unauthorised access to other networks, scams and other such activities. Cyber-crimes are referred to the criminal activities related to internet. Online activities have been gaining popularity such as online shopping, online banking and other such activities, it is a term that we often hear in the news nowadays. Therefore cyber law was introduced in contacts to punish and stop the cyber criminals. The laws the web is referred to the cyber law which includes the legal framework which deals with cyber space, the internet and with other legal concerns such as online privacy or online security. However different sections have been divided to this research keeping the objectives in mind to present a brief overview over cyber-crimes, different types of cyber-crimes, the perpetrators of cybercrime hackers and crackers and the evolution of cyber laws in India. The research further highlights the legal framework and several preventive measures which can be utilised in India to prevent this Hitech crime.

Keywords: cyber law, cyber-crime, internet, cyber space, online privacy, online security, high-tech crime, crackers, hackers, unauthorised access

= Acknowledgement = I am indebted to my supervisor for your support guidance and patience. This research work has been benefited greatly from your meticulous feedback and wealth of knowledge. I am extremely grateful that you took me as a student and continue to have faith in me over the research year.

I acknowledge the generous support from library which has helped me to conduct academic research by providing support and resources. In fact, library did the most of work in this thesis for collecting the data from several sources available on the internet. The availability of resources in the library helps to reduce the cost of research work.

Most importantly, I am grateful call my family is loving, unconditional and unequivocal support throughout this procedure. Their guidance and motivation has help me to work continuously over this research work.

Thank you

Table of Contents

Abstract 2

Acknowledgement 3

Table of cases. 5

Table of statue. 6

Abbreviations. 7

Introduction. 8

1.1 Background of Research. 8

1.1.1 History of Cyberlaw in India. 11

1.1.2 Introduction to Cyber Law.. 11

1.1.3 Need for Cyber Laws in India. 12

1.1.4 Important Terms related to Cyber Laws. 13

1.1.5 Amendments made in Indian Penal Code, 1860 by the IT Act, 2000. 13

1.1.6 Amendments made in Indian evidence act, 1872 by the IT act, 2000. 13

1.2 Research Aim and Objectives. 13

1.3 Research Questions. 13

1.4 Research Rationale. 13

1.5 Research Structure. 14

= Table of cases =

= Table of statue =

Information technology act, 2000

Indian penal code, 1860

Indian evidence act, 1872

= Abbreviations = IT: information technology

PDA

PC:

WTO: world trade organisation

DoE: department of electronics

Chapter 1

= Introduction = The introduction chapter of the research includes the background of the study which will establish a foundation for further chapters of the research. It has included research aim and objectives, questions, research rationale, and research organization. It has presented the bases on which the research will be processed.

As we all know that this is the digital era where most of the things are done usually over the internet starting from online dealing to online transactions. Anyone can assess the resources of the internet from anywhere since the web is considered a worldwide phase. Few the people are using internet technology for criminal functions such as scams, or unauthorised access to others network. Cyber-crime is referred to the crime/offense or the criminal activities related to the internet. In context to eradicate or punish the cyber criminals the term cyber law was introduced. The legal system in context to cyber law deals with cyber space, the internet, and with the legal concerns. It covers a broad area, assess, and utilisation of the internet, encompassing many sub-topics and freedom of expression as well as online security or online privacy. Usually, it is alluded as the law of the web.

1.1 Background of Research
The lives of the humans have become easier with the invention of computer, as across the world it has been used for several objectives starting from the individual to large businesses. Simply, the definition of computer is the machine that can store or process/manipulate information or instructions that are instructed by the user. The erroneous objectives were being considered by most of computer users while using the computer either for others benefit or for their personal advantages since decades. This gave birth to the term “Cyber Crime”. In the simple terms the cybercrime can be explained as the law that governs the cyberspace why there is no fixed definition for defining this term. The cyber law comprehended cybercrimes, data protection and privacy, digital and electronic signatures and other such areas. The first IT act of India was recommended by the UN general assembly which was based on “United Nations Model Law on Electronic Commerce [UNCITRAL] Model”.

The internet that is cyberspace has made the flow of information and data between different network more effectively and easier ways. There are several objectives for a user to use internet technology ranging from online transactions to online dealing. A major concern for the administrator is related to the security issues. Cyber crime is defined as the crimes committed by using computer network or computer and generally exist over the internet/cyber space. The offences that take place over information system or electronic communication or refer to cybercrime. A device is used by the cyber criminals to have access to confidential business information, government information and user personal information or to disable or device. Under cyber crime without the consent of the owners selling any privacy data or information is present. Hackers are the other word for criminals performing such activities. Therefore, cyber crimes are also referred to computer-related crimes, digital crimes, the new age crime, Hitech crying, or electronic crimes and e-crimes.

A lot of damage has been caused by the cybercrime nowadays to organisations, governments as well as individuals. In order to eradicate crimes related to internet several laws and methods have been established. The purpose of introduction of cyber law in India is to deal with legal system to handle legal issues related to cyber space, online privacy or online security. The law that governs the digital and electronic signatures, cyber space cyber crimes, data protection and privacy are referred to the cyber law. In 2000, in India the first information technology act was recommended by UN General assembly. This act was passed on the “United Nations model law of electronic commerce model”.

Relatively a new type of crime has been present across the world namely “Cybercrime”. Any illegal behaviour that occurs on or via the medium of the internet, computers or other technology recognised by the “Information Technology Act” is described as cybercrime. In modern India the most common crime is cybercrime and it has a terrible effect. Not only a significant damage caused by the cyber crime to the government and society but they also disguise their identities to a large extent. Over the internet, technically proficient criminals carry out a variety of unlawful acts. In a broader sense, the internet or the computer is used as a target, a tool or both to conduct any illicit is defined as cybercrime. In the Indian courts the term cybercrime has been constructed in some cases, although it is not defined in any act or statute passed by the Indian Legislature. The modern society growing reliance on technology can be miss used with an uncontrollable evil of cybercrime. In daily life the usage of computer and other related technology has been used fast and has been evolved into a requirement that supports user convenience. It is an unquantifiable and unlimited medium. Email spoofing, cyber terrorism, cyber stalking, email Bombay Inc, cyber defamation, cyber pornography, and other newly emerging cyber crimes are only a few of the new emerging cyber crimes. Some of traditional crimes may fall under the category of cyber-crimes if they are committed by using medium of internet or a computer.

Cybercrime has become a major concern with the increase in the use of computer in the society. The dependency of the humans has been increased with the advancement of the technology on internet for all their requirements. The humans are provided to every thing by the internet while sitting at one place. Online studying, online shopping, social networking, online jobs, every possible thing is that human can think of can be done through the medium of internet.

There are several differences from other crimes happening in the society to the cyber crimes as it uses the medium of internet. Also, the reason behind it is that cyber criminals are unknown and they have no geographical boundaries. It is impacting business to citizens, stakeholders from government alike. However cyber crimes in India have been raised with the increased use of communication and information technology. Therefore, this research has been based on introduction of cybercrime, different types of cyber crimes, different existing Indian laws dealing with cybercrime, amendments and analysing the cybercrime happening in India.

In simple term cybercrime covers the crime such as credit card frauds, illegal downloading, child pornography, scams, creation or distribution of virus, scams, cyber terrorism, phishing, Bank robbery, industrial espionage, kidnapping children via chat rooms, spam and so on.

Also, the traditional crimes are also covered under cyber crimes if any illicit activities are performed by using computers or networks. Cybercrime is increasing day by day, now a days it has become a fashion to earn money by fraud calls or to take revenge through hacking others accounts.

The classic crimes have been facilitated by the usage of the technology is cybercrime such as planned strikes, misrepresentation, robbery and first such as a warning system before entering and unapproved area. A nation state level, government and individuals, all of this is feasible. A good outcome is provided by the world where no legislation and law forcing agency at present in the event of the country assault were major focus leads to economic, military or political coercion.

“Virtual only” form can be taken by the cybercrime offences such as dissemination of illegal documents, images or sensitive data. This category has been included by professional programmer groups with: from an unknown person to government, they provide digital specific products and ventures to anyone which includes responsibility and assault of administration denial of traded of systems. Cyber only sort of misbehaviour will only become more prevalent as more humans are spending their time online over the internet. In the near future this trend will continue to push law enforcement into the internet without a doubt.

In Indian context any statute has not precisely defined the term cybercrime even the information technology act of 2000 which addresses cybercrime but does not define the word.

In the Oxford dictionary a specific definition is not present for the cybercrime but it explains that cyber crime is a criminal activity committed through computers or the internet.

1.1.1 History of Cyberlaw in India
An outcome of for the resolution of journal assembly of United nation dated 30 January 1997 is the information technology act which adopted the model law of electronic commerce, and adopted the model law of electronic commerce on international trade law. Inter alia the recommendation by this resolution has presented that model law is favourable consideration for all states while revising enacting new law, of various cyber nations that uniformity may be observed in the legal system which is applicable to the alternatives to paper-based storage or communication methods of information or data.

In July 1998 the bill was drafted by the Department of electronics. However, on December 16, 1999 the houses introduced the bill when the new IT minister was formed after a gap of almost 1 and half year. The commerce ministry has undergone substantial alternation by providing recommendation related to matters of e-commerce pertaining to world trade organisation obligations. This joint draft vetted by Company affairs and Ministry of Law. The 42 members Parliamentary standing community referred to the bill after its introduction in the house following demands from the members. Several suggestions were provided by standing community to be incorporated in the bill. Therefore, the ministry of information technology considered those suggestion by approving before incorporating the law related to cyber crime. One of the suggestions that was highly debated what is related to the maintenance of a register by a cyber café owner of the names and addresses of all people visiting their Café and also a list of websites they have surfed.

1.1.2 Introduction to Cyber Law
The well-defined area of law is the internet law which suggest regulation to the people about the usage of the internet. Categorically Internet law has been divided into civil laws and criminal laws. Any regulation or law that includes the internet people who use computers, smartphones and other such related technologies is cyber law. The cyber space is the virtual world of the internet and the laws governing this field are referred to the cyber law and all the citizen in this space come under the ambit of these laws as it carries a kind of universal jurisdiction.

All aspects of activities and transactions on or involving the internet, cyber space and world wide web for included in the cyber law. The laws encompassed in the cyberlaw are related to

·      Data privacy and protection

·      Intellectual property

·      Electronic and digital signatures

·      Cybercrimes

1.1.3 Need for Cyber Laws in India
People are becoming more digitally sophisticated in techno-savvy world like today. In 21st century people are becoming more transactional with e-commerce, E governance, E procurement and E business. Through cyber laws all the issues related to the internet crime are handled.

Figure 1Number of cybercrime cases reported state wise, 2015–16

Source:

Almost everyone is impacted by the cyber law in today’s highly digitalised world. Such as:

·      Customers are progressively using Visa for shopping.

·      Almost all exchange in shares is in Demit form.

·      Government structures involving organisation law structure, personal assessment forms, and so on are presently filled in electric forms.

·      Almost all businesses widely delete on their computer systems, what’s more, keep their significant information in electronic form.

·      Email seizing, phishing assaults, cyber damage, hacking, six entertainments, forswearing of administration and so on at turning out to be common.

·      Cyber wrongdoing cases, such as source code burglary, online offer exchanging extortion, Visa misrepresentation, infection assaults, text avoidance, web based financial fakes.

·      Significant proof is found in computer systems even in non-digital wrongdoing cases such as murder, capturing, separation, charge.

·      For the communication purposes most of the individual use SMS messages, PDAs, and emails.

1.1.4 Important Terms related to Cyber Laws
Affixing an electronic signature with its cognate expressions and grammatical variations implies the adoption of any procedure or methodology by an individual to authenticate an electronic record by electronic signature means.

Access with its cognate expressions and grammatical variation implies getting entry into communicating or instructing with automatic, logical, or memory function computer resources.

Asymmetric Crypto System implies a secure key pair system comprising a private key for forming a digital signature and a public key for verifying the signature.

Certifying authority implies an individual who has been granted a license for issuing the certificate of electronic signature under section 24.

Communication device implies personal digital assistants and cell phones or a combination of both or any other type of device utilized for sending or communicating or transmitting any video or text and can also be image or audio.

Computer implies any optical-electronic magnetic or other high-speed data processing device or any type of system which can perform arithmetic, logical along with memory functions by electronic manipulations along with optical or magnetic impulses and comprises all output, input, computer, software, and processing facilities which are related or connected to the computer in the computer network or computer system.

Computer networks can be described as the interconnection of one or more than one device for computer systems through the utilization of microwave or satellite or wireless media can also be used.

Computer resources imply the computer system or computer or the computer database or computer network

The computer system can be described as a collection of devices or a single device comprising output and input support devices and excluding the calculators which are not capable and programmable of being utilized in conjunction with any type of outside files which contain electronic instructions or computer programmers or any type of output data that performs automatic and logical functions.

1.1.5 Amendments made in Indian Penal Code, 1860 by the IT Act, 2000
Amendment associated with the Indian Penal Code was there in sec.91 and a first IT Act 2000 schedule. Under the information technology Act 2008 enactment section .91 was eradicated concerning provisions with the Indian Penal Code that were there in Part 3 of the amendment act.

They made amendments to the Indian Penal Code are:

Amendment to Sec.4

In Section and 4, the clause stated the following shall be inserted namely: (3) Any individual in any type of place beyond and without India committing any type of offence targeting a resource of computer situated in India ii) For the explanation the following explanation will be substituted namely (a) The term offence comprises every committed act externally India which if committed inside India would be punishable.

Amendment of Sec .40

In (2) clause, After the 117 figure the figures 118, 119, and 120 shall be inserted

Amendment of Sec .118

In the 118 sections for the terms voluntarily conceals, by any illegal omission or act the existence of a design, the terms voluntarily concealed by any type of omission or act or by the utilization of any information or encryption hiding tool the existence of a design will be substituted.

Amendment of Sec .118

In 118 Section 4, the terms voluntarily conceal by any legal omission or act, The design existence of the terms voluntarily conceals by any omission or act or by the utilization of any information hiding tool or encryption, the existence of a design will be substituted.

Amendments of Sec .464

In 464 Section 4 the terms, digital signature wherever they happen, the terms electronic signature will be substituted.

1.1.6 Amendments made in Indian evidence act, 1872 by the IT act, 2000
Amendment of Sec.3

In Section 3 associating to the claws of interpretation in the pairing paragraph at the end for the terms digital signature and digital signature certificate, the terms electronic signature certificate and an electronic signature will be substituted.

Insertion of new Sec .45A- Opinion of examiner of electronic evidence – 45A

When in proceeding an opinion has to be formed by the quote on any type of matter associating to any transmission of information or the storing of information in any resource of computer or any other digital or electronic form the examiner of electronic evidence opinion referred to in section 79A of the information technology Act 2000.

Amendment of Sect\.47A

In this section for their terms, digital signature the terms electronic signature will be substituted and further terms digital signature certificate the terms electronic signature certificate will be substituted.

Amendment of Sec.85A

In this section for the terms, digital signature wherever they happen the terms electronic signature will be substituted.

Amendment of Sec.85C

In this section for their terms, digital signature certificate the terms electronic signature certificate will be substituted

Amendment of Sec .90A

In this section, the terms digital signature at both the places where they happen and the terms electronic signature will be substituted

1.2 Research Aim and Objectives
This qualitative research has aim to present the legal framework of India in context to the cybercrime and its evolution from the beginning which also includes the history. The three main objectives are been kept in the mind throughout the research work they are as follows:

·      To generate awareness among the masses on cyber law in Indian context in order to eradicate or punish for cybercrimes.

·      To observe the present preventive measures apart from legal framework which can provide the users of the internet with the safe environment.

·      To analyse the criminal activities/ crimes such as scams or unauthorised access to other networks that are taking place through computers or cyberspace specially the internet.

1.3 Research Questions
The research questions that have been answered in this qualitative research are presented below:

RQ1: what is the requirement of cyber law awareness in the people which can help to eradicate or punish for cybercrimes?

RQ2: what are the preventive measures apart from legal framework in Indian context which can provide a safe environment to the users of the internet?

RQ3: what are the criminal activities/crimes that take place in the cyberspace or through computers specially in the internet?

1.4 Research Rationale
The research rationally deals with the legal frame of India but also provides the basic understanding of the cyber crime in general context. The research has been included with the introduction of the cyber law in reference to the Indian legal framework. It has provided the history of cyber law in India. It deals with the important terms related to the cyber law with their understanding to the reader. It has provided the legal framework understanding of information technology act, 2000. It has also provided the knowledge about amendments that were made in Indian penal code, 1860 and Indian evidence act 1872 by the information Technology act 2000.

1.5 Research Structure
The research structure that has been followed is the basic thesis structure which has been explained below:

The initial chapter of the thesis focuses over the introduction which includes the background of the study by explaining history, requirement of cyber law in India, important terms related to cyber law, amendments that were made in Indian penal code 1860 by the information technology act 2000 and amendments made in Indian evidence act 1872 by the information technology act 2000. Further it includes the research aim and objectives, research questions which will guide the whole research work additionally research rationally which presents the scope of the research. In the second chapter literature review has been presented which will include the review of literature from the secondary sources by providing qualitative data related to the research. The data will be collecting from different sources which are pre-existed by different authors in different secondary sources such as websites, books, articles, and journals. The third Chapter has been explaining the research methodology that has been used in collection and analysis of the data throughout the research work which describes various research methodologies available and the selected research method for this research with the reason of selection. The fourth chapter presents the discussion of the collected data and research which has been presented throughout the research. The last chapter will include the conclusion and recommendation for the legal framework in India in context to the cyber law. At the end personal reflection will be provided which will include the learnings and throughout the experience of this research.

Reference

Singh, N., Suman, M.S. and Sahil, M., 2022. A Basic Outline Of Iprs Laws With Cyber Law: An Indian Perspective. Journal of Positive School Psychology, pp.4406-4412. https://mail.journalppw.com/index.php/jpsp/article/view/8162

Verma, M., 2021. Are Laws Pertaining to Cyber Crimes in India Sufficient in the Current Scenario. ''Issue 1 Int'l JL Mgmt. & Human., 4'', p.1637. https://heinonline.org/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/ijlmhs9&section=137

Jalan, P.K. and Rathi, S., 2020. Indian Cyber Laws on Cyber Crime: Analysis. ''Issue 3 Int'l JL Mgmt. & Human., 3'', p.1558. https://heinonline.org/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/ijlmhs5&section=150

Patil, J., 2022. Cyber Laws in India: An Overview. Indian Journal of Law and Legal Research, 4(01), pp.1391-1411. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4049059

Pajankar, S., 2020. Cyber crimes and cyber laws in India. Delta National Journal Of Multidisciplinary Research, 7(1), pp.25-29. https://www.indianjournals.com/ijor.aspx?target=ijor:delta&volume=7&issue=1&article=004

Rao, P. and Tiwari, A.K., 2020. Laws related to cyber-crime in India. Research Journal of Engineering and Technology, 11(2), pp.41-44. https://search.proquest.com/openview/e3103304714ecd8dd73a217a485d2a25/1?pq-origsite=gscholar&cbl=1096445 Akshita mittal (talk) 10:57, 5 September 2022 (UTC)

Sexual Harassment
Sexual Harassment

Table of Contents

Introduction. 3

History. 4

Situations in which sexual harassment happens. 4

Workplace sexual harassment 5

Evolution of laws in distinct jurisdictions. 5

Sexual harassment situation in Pakistan. 6

Sexual harassment laws in Pakistan. 6

Sexual harassment case law in Pakistan. 6

Comparison between Pakistan and United Kingdom laws associated with sexual harassment 7

References. 8

= Introduction = Sexual harassment is a kind of harassment that comprises the utilization of implicit or explicit overtones which is sexual comprising the inappropriate and unwelcome promises of rewards or anything in exchange for favors related to sex. It comprises a range of different actions from verbal transgressions to assault or sexual abuse (Jhonson et al., 2019). Harassment can happen in various distinct settings of society like the workplace, school, home, or churches. In the modern context of law sexual harassment is against the law and generally, laws surrounding the practice of sexual harassment do not restrict off hand comments, simple teasing, or some minor incidents and that is because a civility code is not imposed.

= History = Around 20 years after the federal codes identified first sexual harassment as a type of sex discrimination is still debate continues about what is the actual meaning of sexual harassment and why it may be sex discrimination and what type of law. The sexual harassment practice is quite old if it is defined as unwanted sexual relations which are imposed by the dominant superiors. Approximately 8 to 9% of females report the cases of sexual harassment and it was the most rated by research that half of the moment had been harassed in their workplace (Anwar et al., 2019). The initial development of the understanding of law in the modern context was established in the 1970s associated with sexual harassment and all the associated concepts have been present in various cultures (Anwar et al., 2019).

A series of cases of sexual harassment in the 1970s and 1980s have led to the qualification of the concept of sexual harassment in the laws of the United States. Sexual harassment became the identified type of sexual discrimination because of decades of feminist activism. A legal framework was provided by Catharine McKinnon through which the claims of sexual harassment were eventually won legally (Keplinger et al., 2019). At a similar time because of similar advances in feminism more females entered high status and high-paying positions. In response, there was the emergence of some new types of sexual harassment in the 1980s so that females can be restricted from all of these. This research aims to analyse sexual harassment and related laws and jurisdictions (Keplinger et al., 2019).

Research Questions

RQ1: What is the meaning of sexual harassment?

RQ2: What are the laws and jurisdictions related to sexual harassment?

RQ3: How the laws of sexual harassment differs in Pakistan and United Kingdom?

= Situations in which sexual harassment happens = Sexual harassment might happen in various scenarios or circumstances and in various places like colleges, factories, schools’ workplaces, and theatres. Generally, power is within the hands of the perpetrator over the victim or there has been any kind of authority differences in political, social, employment, or educational, relationships, and also in age (Ali and Siddiqi, 2019). The relationships of harassment are specified in various manners:

·      The perpetrator can be a coworker or a client or it might be a legal guardian or parent and sometimes a teacher and a friend

·      Harassment can happen in various locations as mentioned above like in workplaces educational institutions or public (Ali and Siddiqi, 2019).

·      Harassment can happen whether or not there is a presence of a witness and it might be possible that the perpetrator is unaware that this kind of behavior is offensive or comprises sexual harassment of the victim (Ali and Siddiqi, 2019).

·      Harassment incidents can happen in scenarios in which the targeted individual might not be completely aware of or might not understand what is occurring

·      Also, it might be possible that the incident is a one-time occurrence

= Workplace sexual harassment = In the workplace, sexual harassment is very common and it is considered a type of sex discrimination. Two kinds of sexual harassment at the workplace are there the first one is referred to as a hostile work environment and the second one is referred to as quid pro quo. Sexual harassment in a hostile work environment can occur in two manners and the first one is when some coworker makes a person or a female target with demeaning comments or unwelcome sexually suggestive comments (Ali and Siddqui, 2019). It also includes some type of offensive gestures and touching offensively and these offences can be quite severe and this implies that the harassment happens sufficiently to impact the ability of a person to do his or her job in a normal way.

Quid pro quo sexual harassment happens when a manager or a supervisor demander asks for sexual favors in return for something like a promotion or employment benefit. However, it is to be noted that sometimes, Somethings are there which cannot be considered sexual harassment like casual jokes or any isolated incidents (Ali and Siddqui, 2019).

= Evolution of laws in distinct jurisdictions = A European Union directive has considered the concept or the practice of sexual harassment as a significant subject. The United States presented a statement associated with equal opportunity of employment that it is illegal to hell an individual because of his gender whether the person is an applicant or employee. The general recommendation of the United Nations defines the practice of sexual harassment of females to comprise some unwelcome sexually identified behavior like physical advances and contact and showing sexual demands for pornography whether by actions or words. This type of conduct can be quite humiliating and might comprise a safety and health issue. Various similarities and differences exist all around the world in relation to definitions and laws of sexual harassment. In United Kingdom one of the most prevalent law associated with sexual harassment is the Equality Act of 2010 which provides emphasis to one workplace protection of employees and associated provisions (Aina-Pelemo, 2020). However, it is also true that in the past United Kingdom does not have particular legislation which can address sexual harassment in the Workplace like in India. However, in 2021, the government of the United Kingdom introduced legislation for employers to take some proactive steps for preventing sexual harassment on the job (Aina-Pelemo, 2020). The aspect of legislation included introducing protection for harassed employees by third parties like clients and customers and including protection from sexual orientation and racial discrimination. This was one of the first major statuary modifications in the United Kingdom to occur (Jaijee et al., 2021).

= Sexual harassment situation in Pakistan = Always Pakistan has struggled to protect the basic rights of humans but particularly the rights of women. When taking into consideration the incident associated with sexual harassment in the country of Pakistan it can be easily demonstrated by these figures that the situation is quite threatening: There were 54 cases of rapes in Lahore in the year 2018 yet by the February and 2020 this number enhanced to 73 rape incidents comprising 5 gang rapes (Hadi, 2018). The main type of violence against females that Pakistan is specifically struggling with is workplace sexual harassment. The organizations of the private sector appeared to be more involved in various cases associated with sexual harassment because of the lack of security of jobs and the absence of any kind of regulatory mechanism (Anwar et al., 2019).

= Sexual harassment laws in Pakistan = Before 2010 there was no law in Pakistan associated with sexual harassment to protect its people. In 2010 a law was enacted, which was Protection against harassment of women at workplace Act 2010 where there was an in-depth definition of sexual harassment by law. Pakistan has noticed an increase in cases of sexual harassment in recent years (Deeba, 2021). There have been cases of horrific gang rape and a case of a young girl who was assaulted by a huge crowd of more than 400 people and all of this was outcome in the appropriate structure of law (Ahmad, 2019). In 2010 it was the first time that Pakistan made law on sexual harassment and before this law, no clear definition of harassment was there whether in the workplace or in public (Deeba, 2021)a. In 2010 Pakistan also amended the 509 sections of the Pakistan Penal Code. Now it defines clearly harassment and comprises harassment at the workplace also. The maximum level of punishment has also been raised called perpetrator and insulting the modesty of a female is a crime in Pakistan and is illegal (Aina-Pelemo, 2020).

= Sexual harassment case law in Pakistan = One of the cases of sexual harassment in Pakistan is of Asif Saleem. Petitioner was an assistant professor in the Lahore university (Godier and Fossey, 2018). Also, the petitioner was a student of Phd. An inquiry was started on the complaint of the student and after Mr. Saleem was found guilty and he was given dismissal from his service. An appeal was filed by him before the ombudsperson but that appeal was dismissed (Aina-Pelemo, 2020). The judgement of this case has provided contribution to the harassment definition of workplace. This judgement also provided upliftment to the status of female.

= Comparison between Pakistan and United Kingdom laws associated with sexual harassment = It is not possible to establish an appropriate comparison between the laws associated with sexual harassment in Pakistan and the United Kingdom because Pakistan made a law associated with sexual harassment in the year 2010 while the United Kingdom already has various laws since 1975 (Godier and Fossey, 2018). The country Pakistan only has two men legislation or laws which deal with the term sexual harassment. While on the other hand the United Kingdom has been taking a lot of actions and working for various years for the safety of its female citizens in public places as well as at the workplace. Additionally, the Equality Act 2010 in the United Kingdom has covered the issue of sexual harassment which defines the included behavior in the term and also clearly defines who can claim sexual harassment (Godier and Fossey, 2018). The United Kingdom is also planning to criminalize sexual harassment in public and also the government of the United Kingdom introduced laws in the year 2021 for employers to take some significant proactive steps so that sexual harassment can be prevented on the job (Collier and Raney, 2018).

= References = Ahmad, S., 2019. The passage of anti-sexual harassment legislation in Pakistan. Emotions, Mobilisations and South Asian Politics, 46. https://books.google.com/books?hl=en&lr=&id=HnKhDwAAQBAJ&oi=fnd&pg=PT200&dq=sexual+harassment+pakistan&ots=rTjUkAQEWw&sig=Ev1Q9I2ND7t7qP5mybvuegcdTXI

Aina-Pelemo, A., 2020. Sexual Harassment and the Law.

Ali, A. and Siddiqi, R., 2019. Sexual Harassment At Work Place: A Study Of Women Political Workers In Pakistan. Pakistan Journal of Applied Social Sciences, 10(1), pp.1-20. http://socialsciencejournals.pjgs-ws.com/index.php/PJASS/article/view/98

Anwar, F., Österman, K. and Björkqvist, K., 2019. Three types of sexual harassment of females in public places in Pakistan. Çağdaş Tıp Dergisi, 9(1), pp.65-73. https://dergipark.org.tr/en/pub/gopctd/article/468324

Anwar, F., Österman, K. and Björkqvist, K., 2019. Three types of sexual harassment of females in public places in Pakistan. Çağdaş Tıp Dergisi, 9(1), pp.65-73. https://dergipark.org.tr/en/pub/gopctd/article/468324

Collier, C.N. and Raney, T., 2018. Understanding sexism and sexual harassment in politics: A comparison of Westminster parliaments in Australia, the United Kingdom, and Canada. Social Politics: International Studies in Gender, State & Society, 25(3), pp.432-455. https://academic.oup.com/sp/article-abstract/25/3/432/5076125

Deeba, M.F., 2021. Protection of Women against Sexual Harassment-Social Barricades and Implementation of Laws in Pakistan. Journal of International Women's Studies, 22(4), pp.134-151. https://vc.bridgew.edu/jiws/vol22/iss4/10/

Godier, L.R. and Fossey, M., 2018. Addressing the knowledge gap: sexual violence and harassment in the UK Armed Forces. BMJ Military Health, 164(5), pp.362-364. https://militaryhealth.bmj.com/content/164/5/362.abstract

Hadi, A., 2018. Workplace sexual harassment and its underreporting in Pakistan. European Journal of Interdisciplinary Studies, 4(1), pp.148-153. https://revistia.org/index.php/ejis/article/view/5618

Jaijee, S.K., Kamau-Mitchell, C., Mikhail, G.W. and Hendry, C., 2021. Sexism experienced by consultant cardiologists in the United Kingdom. Heart, 107(11), pp.895-901. https://heart.bmj.com/content/107/11/895.abstract

Johnson, P.A., Widnall, S.E. and Benya, F.F., 2018. Sexual harassment of women. ''Climate, culture, and consequences in academic sciences, engineering, and medicine. Washington: National Academy of Sciences''. https://www.puees.unam.mx/curso2021/materiales/Sesion8/Bookshelf_NBK507206.pdf

Kahsay, W.G., Negarandeh, R., Dehghan Nayeri, N. and Hasanpour, M., 2020. Sexual harassment against female nurses: a systematic review. BMC nursing, 19(1), pp.1-12. https://link.springer.com/article/10.1186/s12912-020-00450-w

Keplinger, K., Johnson, S.K., Kirk, J.F. and Barnes, L.Y., 2019. Women at work: Changes in sexual harassment between September 2016 and September 2018. PloS one, 14(7), p.e0218313. https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0218313 Akshita mittal (talk) 11:00, 5 September 2022 (UTC)

September 2022
Hello, Akshita mittal. This is your user talk page; the purpose of this page is for notification and communication with other Wikipedia editors. It is not a workspace for articles in progress or self-promotion. Please use your user sandbox or the draft article space to practice editing or create new articles. Thank you. — rsjaffe 🗣️ 14:02, 5 September 2022 (UTC)