...BAR COUNCIL OF INDIA and as per the Rules of Legal Education, 2008) Effective from the academic year 2011-12 THREE YEARS’ LL.B. POGRAMME First LL. B. Semester – I FIRST LL.B. - SEMESTER 1 (MONSOON) PER WEEK CORE COURSE 101 SUBJECTS Law of Tort including MV Accident And Consumer Protection Laws Criminal Law Paper – I (General Principles of Penal Law) Criminal Law Paper – II (Specific Offences) Law of Contract Special Contract Constitutional History of India Use of Law Journals and Legal Software LECTURES 4 OTHERS 1 TOTAL 5 CREDITS (SEM)29 5 CORE COURSE 102 CORE COURSE 103 CORE COURSE 104 CORE COURSE 105 FOUNDATION 106 F SOFT SKILL 107 K 4 4 4 4 1 1 1 1 1 1 1 1 5 5 5 5 2 2 5 5 5 5 2 2 1 Semester – I Monsoon Semester CORE COURSE 101 : LAW OF TORT INCLUDING MV ACCIDENT AND CONSUMER PROTECTION LAWS Objectives of the course : With rapid industrialization, tort action came to used against manufacturers and industrial unit for products injurious to human beings. Presently the emphasis is on extending the principles not only to acts, which are harmful, but also to failure to comply with standards that are continuously changing due to advancement in science and technology. Product liability is now assuming a new dimension in developed economics. In modern era of consumer concern of goods and services, the law of torts has an added significance with this forage into the emerging law of consumer protection. It operates in disputes...
Words: 6024 - Pages: 25
...only through the hardware devices but also some great softwares. Nobody's PC and tablet can run well without the necessary software, but there' re a number of software users don't want to buy the full licensed softwares. In order to have a accurate percentage of software piracy rate, BSA (business software alliance) made a research about it. The result of the piracy rate research made the researchers shocked. On the BSA's piracy study on 2011, total worldwide software piracy rate is up to 42% (Business Software Alliance, 2011) . Software piracy has become an increasing global problem to businesses and software developers in the world during the past two decades (Shin, Gopal, Sanders, & Whinston, 2004). The software industry suffers billions dollar losses because of software piracy (Bass, 2011). There' s no denying that U.S. is generally considered as the world leader in the software industry, but America' s illegal software market is worth 9 billion dollars in 2011, which is the top 1 economy in commercial value of pirated PC software (BSA, 2011). The problem of piracy diminishes revenues and lessens investment in research and development, threatening the long term benefit of the software industry. According to the Software and Information Industry Association, the worldwide revenue of business-based PC applications was $21.6 billion in 1999, but global revenue losses due to piracy in the business application software market were calculated at $12 billion (Shin, Gopal, Sanders...
Words: 1039 - Pages: 5
...Article Tile: Specific legal issues affecting the implementation of computer-based information systems in the developing countries: a critical review of literature A paper presented to the Journal of library and information science for consideration for publication. Date: November 2015 Author: Daniel Kinyanjui (Bsc-Information Science-Moi University-Eldoret, Kenya and Currently Studying Masters of Library and Information Science at Kenyatta University-Kenya) Daniel is also the editor of institutional in-house publications at Oshwal College-Nairobi and the College Head of Library Services. Abstract Implementation of computer-based information systems (CBIS) has become increasingly important due to the growing reliance on new technologies by organisations in their operations and service delivery. There has also been realisation by individuals and businesses of the inevitability of delivering value-added services without computerized systems. Despite this awareness and the apparent growing readiness to deploy computer-based systems, there still exists a myriad of perennial challenges inhibiting the implementation of these systems. Using insights from previous studies, the paper sums up the legal issues that have been acknowledged by various scholars as major obstacles to the implementation of CBIS in developing countries. Drawing from the understanding of these challenges, the author finally attempts to advance possible strategies that can be used to overcome these...
Words: 3108 - Pages: 13
...Harvard Journal of Law & Technology Volume 21, Number 2 Spring 2008 WHAT CAN INFORMATION TECHNOLOGY DO FOR LAW? Johnathan Jenkins∗ TABLE OF CONTENTS I. INTRODUCTION ..............................................................................589 II. INCENTIVES FOR BETTER INTEGRATION OF INFORMATION TECHNOLOGY AND LAW ............................................................591 III. THE CURRENT STATE OF INFORMATION TECHNOLOGY IN LEGAL PRACTICE .......................................................................594 IV. THE DIRECTION OF LEGAL INFORMATICS: CURRENT RESEARCH .................................................................................597 A. Advances in Argumentation Models and Outcome Prediction ..............................................................................597 B. Machine Learning and Knowledge Discovery from Databases ..............................................................................600 C. Accessible, Structured Knowledge ...........................................602 V. INFORMATION TECHNOLOGY AND THE LEGAL PROFESSION: BARRIERS TO PROGRESS ......................................604 VI. CONCLUSION ..............................................................................607 I. INTRODUCTION MUCH CURRENT LEGAL WORK IS EMBARRASSINGLY, ABSURDLY, WASTEFUL. AI-RELATED TECHNOLOGY OFFERS GREAT PROMISE TO 1 IMPROVE THAT SITUATION. Many professionals now rely on information technology (“IT”) to simplify, automate, or better...
Words: 9086 - Pages: 37
...Reference Material on Ethics Books and Book Chapters Baase, S. (1997) A Gift of Fire: Social, Legal and Ethical Issues in Computing, Prentice Hall. Berleur, J. and Bruunstein, K. (Eds.) (1996) Ethics of Computing: Codes, Spaces for Discussion and Law, Chapman & Hall: London. Berleur, J. and Whitehouse, D. (Eds.) (1997) An Ethical Global Information Society: Cuture and Democracy Revisited (Proceedings of the IFIP WG 9.2/9.5 Corfu International Conference) Chapman & Hall: London. Berleur, J., Duquenoy, P. and Whitehouse, D. (Eds) (1999) Ethics and the Governance of the Internet, IFIP-SIG 9.2.2 (IFIP Framework for the Ethics of Computing), IFIP Press: Laxenburg, Austria Bowman, J.S. and Menzel, D.C. (1998) Teaching Ethics and Values in Public Administration Programs: Innovations, Strategies and Issues, SUNY Press: Albany. Cappel, J.J. and Kappelman, L. (1997) The Year 2000 Problem: An Ethical Perspective, in: Kappelman, L., (Ed.), Year 2000 Problem: Strategies and Solutions from the Fortune 100, International Thomson Computer Press, Boston, 158-163. Floridi, L. (1999) Philosophy and Computing, London: Routledge. Johnson, D.G. and Nissenbaum, H. (1995) Computers, Ethics and Social Values, Prentice Hall. Kallman, E.A. and Grillo, J.P. (1996) Ethical Decision Making and Information Technology: An Introduction with Cases, McGraw Hill. Kaplan, B., Farzanfar, R. and Friedman R.H. (1999) Research and Ethical Issues Arising from Ethnographic Interviews of Patients’...
Words: 1786 - Pages: 8
... Team Members: Shuaib Ahmed 05(4652) H.Numan Younis 39(4688) Chapter No. 1 4 “Project Proposal” 4 1.1. Abstract: 6 1.2. Introduction: 7 1.3. Literature Review: 8 1.4. Project Scope: 11 1.4.1. Users: 11 1.4.2 Administration: 11 1.5. Problem Statement: 12 1.6. Methodology: 12 1.6.1. Pattern we’ll follow: 12 1.7. Instrumentation: 14 1.7.1. Visual Studio: 14 1.7.2. SQL Server: 14 1.7.3. Database Connectivity: 15 1.8. Bootstrap Framework: 15 1.9. Application Architecture: 16 Advantages of 3-layer Architecture: 16 1.10. Features: 17 1.11. Software Requirements: 17 1.12. Hardware Requirements: 17 1.13. Advantages: 17 1.14. Applications: 17 1.14. References: 18 Chapter No. 2 20 “Project Feasibility and Costing” 20 2.1 Feasibility: 21 2.1.1. Technical Feasibility: 21 2.1.2. Schedule Feasibility: 21 2.1.3. Economic Feasibility: 21 2.1.4. Legal/Ethical Feasibility: 22 2.1.5. Operational Feasibility: 22 2.1.6. Marketing Feasibility: 22 2.1.7. Specification Feasibility: 22 2.2 Costing 22 2.2.1 FP Analysis: 23 2.2.1.1. Project Cost Estimation by Function Point Analysis: 26 2.2.1.2. General System Characteristic: 27 2.2.2. Critical Path Method (CPM) 29 2.2.2.1. Activity Chart: 29 2.2.2.2. Activity Completion Time and Estimation: 30 Activity Duration in Days: 30 Activity Sequence and Duration (Days): 31 2.2.2.3 Network Diagram: 32 2.2.2.4. Critical Path Diagram: 33 2.2.2.5. Critical Path Calculation: 33 2.2.2.6....
Words: 8251 - Pages: 34
...Global Journal of Computer Science and Technology Interdisciplinary Volume 13 Issue 2 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350 Ethical Issues in Computer use: A Study from Islamic Perspective By Abdul Kadar Muhammad Masum International Islamic University, Bangladesh Abstract - Computer users are continuously facing ethical challenges as society adopts new and increasingly complex tools and technologies. These ethical challenges can be managed by Islamic code of life. In this paper, we have studied and tried to identify, how computer affects the ethical issues of the society. In this regards, we have traced some highly related issues to the ethics of computer usage, namely – misuse of time, honesty and integrity, privacy, security, intellectual property right, and computer crime. We have also tried to explain these issues in the light of Qur’an and Hadith. At the end of this paper, we have also suggested some measures that can help in promoting proper use of computer facilities by the Muslim masses without compromising the Islamic principles. Keywords : islamic ethics, computer ethics, privacy, security, computer crime. GJCST-G Classification: K.8.m Ethical Issues in Computer use A Study from Islamic Perspective Strictly as per the compliance and regulations of: © 2013. Abdul Kadar Muhammad Masum. This is a research/review...
Words: 5242 - Pages: 21
...turning in of the 8 to 10 topics of interest list required, but it did not exclude its submission either. So I decided to add it at the end of the document post reference section. It can be disregarded if it does not need to be considered as part of the main task submission requirement. Thank you. ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Faculty Use Only ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Dr. Randy Brown Annotated Biographies Oreku, G. S., & Li, J. (2009). End user authentication (EUA) model and password for security. Journal of Organizational and End User Computing, 21(2), 28-43. Retrieved from http://search.proquest.com.proxy1.ncu.edu/docview/199920202?accountid=28180 This article proposes an End User Authentication flexibility model to form a set of services that will constitute a flexible authentication model for a modern computing systems or infrastructure. This method would provide multiple authentications that will enable suppliers access a particular network system...
Words: 2303 - Pages: 10
..."Employee Surveillance and Testing" Please respond to the following: Argue for or against the practice of electronic employee surveillance at work. Provide specific examples to support your argument. What laws, if any, may be violated by such practices? Employers want to be sure their employees are doing a good job, but employees don't want their every sneeze or trip to the water cooler logged. That's the essential conflict of workplace monitoring. New technologies make it possible for employers to monitor many aspects of their employees' jobs, especially on telephones, computer terminals, through electronic and voice mail, and when employees are using the Internet. Such monitoring is virtually unregulated. Therefore, unless company policy specifically states otherwise (and even this is not assured), your employer may listen, watch and read most of your workplace communications. One company offers technology that claims to provide insight into individual employee behavior based on the trail of "digital footprints" created each day in the workplace. This behavioral modeling technology can piece together all of these electronic records to provide behavior patterns that employers may utilize to evaluate employee performance and conduct. For example, it might look for word patterns, changes in language or style, and communication patterns between individuals. Recent surveys have found that a majority of employers monitor their employees. They are motivated by concern over litigation...
Words: 3354 - Pages: 14
...Lessons from Alibaba.com: government’s role in electronic contracting Qin Hu Xun Wu and Clement K. Wang The authors Qin Hu is a Lawyer, Legal Counsel of China Merchants Sekou Industrial Zone Company Limited, Shenzhen, China. Xun Wu is based at the Wharton School, University of Pennsylvania, Philadelphia, Pennsylvania, USA. Clement K. Wang is Associate Director (Research), NUS Enterprise Centre, National University of Singapore, Singapore. Introduction Story of Alibaba.com The development of e-commerce has been nothing short of explosive in recent years. Many believe that its growth and impact will only become more prevailing in the future. The sale of goods by US firms over the Internet, for example, is predicted to reach $1.3 trillion by 2003. By 2004, European enterprises are expected to have online sales of $1.6 trillion[1]. Companies in China, with the largest population in the world, are also probing this new source of revenue. The China Internet Network Information Center (CNNIC) issued an Annual Report in Internet Development in January 2000 that estimates that there were 22.5 million Internet users in China at the end of 2000[2]. A recent nationwide survey showed that China had more than 1,100 consumer related e-commerce Web sites by the end of the first quarter in 2000 (People’s Daily, 2000). Four Web companies, Sina.com, Sohu.com, China.com, and Netease.com have already been listed on the NASDAQ. However, the country’s e-commerce market is still in its infancy....
Words: 7693 - Pages: 31
...Human Resource Management Review 23 (2013) 105–113 Contents lists available at SciVerse ScienceDirect Human Resource Management Review journal homepage: www.elsevier.com/locate/humres Human resource information systems: Information security concerns for organizations Humayun Zafar ⁎ Department of Information Systems, Kennesaw State University, 1000 Chastain Road, MD 1101, Kennesaw, GA 30144, United States. a r t i c l e i n f o Keywords: Human resource information system Information security Information privacy Security policies Security legislation Security architecture Security training Risk analysis a b s t r a c t We explore HRIS and e-HR security by presenting information security fundamentals and how they pertain to organizations. With increasing use of enterprise systems such as HRIS and e-HR, security of such systems is an area that is worthy of further exploration. Even then, there is surprisingly little research in this area, albeit that extensive work is present in regard to HRIS privacy. While focusing on HRIS and e-HR security, we introduce aspects of HRIS and e-HR security and how it can be enhanced in organizations. A research model is also presented along with propositions that can guide future research. © 2012 Elsevier Inc. All rights reserved. 1. Introduction A human resource information system (HRIS) is an integrated computerized system used to acquire, store, manipulate, analyze, retrieve, and distribute pertinent...
Words: 7376 - Pages: 30
...James Davis Advantages and Disadvantages of E-commerce Bus 107 Debra Wilson November 22, 2010 Abstract In today’s economy, business moves at a rapid pace and shows no sign of slowing down. Many of the revolutionary changes that have taken place and supplied this economic engine with fuel are due to electronic commerce. The introduction of the computer into the workplace has brought about manifold changes and seemingly unlimited possibilities for merchants. This new technology offers many advantages for businesses but there are disadvantages as well. Each company must weigh the pros and cons while determining what direction they will take. Advantages and Disadvantages of E-commerce Electronic commerce is a fundamental part of today’s business world. It has undergone many changes since its inception and will continue to do so. The information technology field has always moved rapidly and businesses must align themselves with these changes in order to remain competitive. E-commerce has many advantages and has transformed business, as we know it. Although fewer in number, there are also disadvantages associated with e-commerce. The advantages of e-commerce are great in number and have quite a range of variation. E-commerce is still fairly young but has brought manifold changes in the way business is conducted. Businesses great and small have taken advantage of the new opportunities afforded by electronic transactions. As we move on in the twenty first century...
Words: 1937 - Pages: 8
...Masaryk University Faculty of Economics and Administration MASTER THESIS B.Sc. Dušan Mladenović Brno, 2013 Faculty of Economics and Administration | Masaryk University Marketing plan | Yugomar d.o.o. Page 8 of 117 Faculty of Economics and Administration | Masaryk University Marketing plan | Yugomar d.o.o. Masaryk University Faculty of Economics and Administration Marketing plan Master thesis Student: Advisor: 401140 Mladenović Dušan PhD Alena Klapalová Brno, 2013 Page 9 of 117 Faculty of Economics and Administration | Masaryk University Marketing plan | Yugomar d.o.o. Page 10 of 117 Faculty of Economics and Administration | Masaryk University Marketing plan | Yugomar d.o.o. Masaryk University Faculty of Economics and Administration Department of Corporate Economy Academic year 2012/2013 ASSIGNMENT OF DIPLOMA THESIS For: Mladenović Dušan Field: Business Management Title: Marketing plan Principles of t h e s i s w r i t i n g: Objective of the thesis: The main objectives of the thesis are to analyse present market situation of the chosen company concerning its marketing management problem, to analyse the market and to develop marketing plan according the results of analyses. Approach and methods used: 1. Literature search on all relevant topics (marketing strategy, marketing plan, market analyses etc.), 2. current situation and market analyses, 3. proposals of marketing plan...
Words: 31857 - Pages: 128
...working in America's favor or is it just another way for the CEOs and the executives for fortune 500 companies to manipulate the system and its people? The corporate governance system started with the corporate debacles and the ultimate crash of the stock market in the late 1920s. As a result government stepped in and created regulations such as the Securities Act of 1933 and 1934, to the ever so popular Sarbanes-Oxley Act of 2002, to the more recent Dodd-Franck Law of 2010. The aim behind these regulations is noble. They are formed to prevent fraud, misrepresentation, bring more transparency and above all, prevent another financial crisis. But, how successful are these regulations? Are we over regulated or are we in need for more regulation? Investors and common public's faith in our economy and capital markets is shattering, they are demanding accountability and responsibility in corporate behavior, and wants the government to take effective actions, in the form of regulatory systems, improved auditing, and stepped up law enforcement (Coglianese, Healey, Keating and Michael, 2004). Before we dig deep into the government regulations in place, let’s discuss the role of accounting profession, particularly the corporate financial...
Words: 2794 - Pages: 12
...HARVARD BUSINESS I SCHOOL 941-O6 "U JAY W. LORSCH KRISHNA PALEPU MELISSA BARTON RE Y44 11 Hewlett-Packard Company: CE Succession in 2010 'I) On August 6, 2010, Mark Hurd resigned as CEO of Hewlett Packard after an H.P. contractor accused him of sexually harassing her while she worke44 r the company. The H.P. board conducted an investigation to determine the merit of the allegation. They found no evidence of sexual harassment, but discovered that Hurd had failed to live up to the H.P. Standards of Business Conduct.1 Therefore, the board asked Hurd to step down. He exited with a severance package worth approximately $35 million.2 Hewlett-Packard Enters the 2 t Century Fiorina's Legacy Carly Fiorina became HJ CEO id-4 999. She presided over the highly contested acquisition of , Compaq in 2002, believing tic the jothing of the two companies would make H.P. more competitive with Dell, IBM, and Sun Microsystems in computer offerings, as well as provide substantial costsavings.3 The acquisition was approved by a shareholder vote of 51% to 49%, which left many people dissatisfied, including H.P. director, Walter Hewlett, who had initiated the proxy fight opposing the merger and who hit' lrpsiPbd in 2003. After the a cquisitio, Fiorina cut approximately 15,000 jobs; meanwhile, she failed to produce the n promised results. One year after the acquisition, H.P.'s share price had lost approximately 2 percent of its value, while IBM and Dell had seen increases in their...
Words: 8402 - Pages: 34