• +91 7042148991
  • editor@ijlra.com
IJLRA Logo
  • Home
  • Ethics & Policy
    • Duties Of Authors
    • Editors Responsibilities
    • Reviewers Responsibilities
    • Plagiarism Policy
    • Copyright Policy
  • For Authors
    • About Us
    • Call for Paper
    • Verify Certificate
    • Track Paper
    • Copyright Form
    • How to Publish Paper
  • Issue
    • Past Issue
    • VOLUME 1
      • ISSUE 9
      • VOLUME 1 ISSUE 3
      • VOLUME 1 ISSUIE 7
      • VOLUME 1 ISSUIE 5
      • VOLUME 1 ISSUIE 6
    • VOLUME 2
      • VOLUME 2 ISSUE 5
      • VOLUME 2 ISSUE 6
      • VOLUME 2 ISSUE 7
      • VOLUME II ISSUE 7
      • VOLUME 2 ISSUIE 1
      • VOLUME 2 ISSUE 2
      • VOLUME 2 ISSUE 8
      • VOLUME 2 ISSUE 9
      • VOLUME 2 ISSUE 10
    • VOLUME 3
      • VOLUME 3 ISSUE 1
      • VOLUME 3 ISSUIE 2
  • Editorial Board
  • Verify Certificate
  • Submit Paper
IJLRA Logo
  • Home
  • Ethics & Policy
    • Duties Of Authors
    • Editors Responsibilities
    • Reviewers Responsibilities
    • Plagiarism Policy
    • Copyright Policy
  • For Authors
    • About Us
    • Call for Paper
    • Verify Certificate
    • Track Paper
    • Copyright Form
    • How to Publish Paper
  • Issue
    • Past Issue
    • VOLUME 1
      • ISSUE 9
      • VOLUME 1 ISSUE 3
      • VOLUME 1 ISSUIE 7
      • VOLUME 1 ISSUIE 5
      • VOLUME 1 ISSUIE 6
    • VOLUME 2
      • VOLUME 2 ISSUE 5
      • VOLUME 2 ISSUE 6
      • VOLUME 2 ISSUE 7
      • VOLUME II ISSUE 7
      • VOLUME 2 ISSUIE 1
      • VOLUME 2 ISSUE 2
      • VOLUME 2 ISSUE 8
      • VOLUME 2 ISSUE 9
      • VOLUME 2 ISSUE 10
    • VOLUME 3
      • VOLUME 3 ISSUE 1
      • VOLUME 3 ISSUIE 2
  • Editorial Board
  • Verify Certificate
  • Submit Paper

MANKASTU IMPEX PRIVATE LIMITED V. AIR VISUAL LIMITED, (2020) 5 SCC 399 BY - DR. LEENA MOUDGIL

Authors : DR. LEENA MOUDGIL
Registration ID : 106450 Published Paper ID: IJLRA6450
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : leenapundit@gmail.com
Page No :12 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

AGRICULTURAL INCOME A SOURCE OF MONEY LAUNDERING IN INDIA BY: REINHARD LUKE COLLACO

Authors : REINHARD LUKE COLLACO
Registration ID : 106449 Published Paper ID: IJLRA6449
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : reinhardcollaco@gmail.com
Page No :11 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

CYBER EXTORTION IN INDIA AND ITS LEGISLATIVE MEASURES BY - R. USHA

Authors : R. USHA
Registration ID : 106448 Published Paper ID: IJLRA6448
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : usharajaram.sha46@gmail.com
Page No :15 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

HUMAN RIGHTS AND PRESERVATION OF HUMAN HEALTH BY: RAJESH GOVIND DEKATE

Authors : RAJESH GOVIND DEKATE
Registration ID : 106447 Published Paper ID: IJLRA6447
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : rajdekate@rocketmail.com
Page No :32 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

A LEGISLATIVE ELUCIDATE ON TRIPLE TALAQ; ANALYSING THE GLOBAL PERSPECTIVES BY - AHAMMED RIFAI KM

Authors : AHAMMED RIFAI KM
Registration ID : 106446 Published Paper ID: IJLRA6446
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : advrifai@gmail.com
Page No :22 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

THE ART OF STATECRAFT AND INTELLIGENCE ANALYSIS IN THE KAUTILYA-ARTHASHASTRA: A CRITICAL STUDY BY - DR.S. KRISHNAN & DR. ANIL BUNDELA

Authors : DR.S. KRISHNAN  & DR. ANIL BUNDELA 
Registration ID : 106444 Published Paper ID: IJLRA6444 & IJLRA6445
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : s.krishnan22@gmail.com
Page No :34 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

Access To Information In The Uk And India. By - Dr. S. Krishnan & Ms. Rashmi Meena

Authors : Dr. S. Krishnan & Ms. Rashmi Meena
Registration ID : 106442 Published Paper ID: IJLRA6442 & IJLRA6443
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : s.krishnan22@gmail.com
Page No :32 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

NATO, CYBER DEFENSE, AND INTERNATIONAL LAW BY - DR.S. KRISHNAN

Authors : DR.S. KRISHNAN 
Registration ID : 106441 Published Paper ID: IJLRA6441
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : s.krishnan22@gmail.com
Page No :28 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

CHALLENGES FOR CHILDRENS OF PROSTITUTE ON LEGAL AND EDUCATIONAL BASIS. BY- SURAJ SAMUI & NISHU DIWAKAR

Authors : SURAJ SAMUI & NISHU DIWAKAR
Registration ID : 106439 Published Paper ID: IJLRA6439 &IJLRA6440
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : darkn6013@gmail.com & nishudiwakar542@gmail.com
Page No :29 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

ANALYSIS OF PLEA BARGAINING IN INDIA BY - SURESH VISHNU NIMASE

Authors : SURESH VISHNU NIMASE
Registration ID : 106438 Published Paper ID: IJLRA6438
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : sureshnimase1981@gmail.com
Page No :20 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google
« Previous Next »

International journal for legal research and analysis

Abbreviation:IJLRA

ISSN:2582-6433

Website:https://www.ijlra.com/

Accessibility:Open Access

License:Creative Commons 4.0

Submit Manuscript:Click here

Licensing:

All research articles published INTERNATIONAL JOURNAL FOR LEGAL RESEARCH AND ANALYSIS are fully open access. i.e. immediately freely available to read, download and share. Articles are published under the terms of a Creative Commons license which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

Disclaimer:

The opinions expressed in this publication are those of the authors. They do not purport to reflect the opinions or views of the INTERNATIONAL JOURNAL FOR LEGAL RESEARCH AND ANALYSIS or its members. The designations employed in this publication and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the INTERNATIONAL JOURNAL FOR LEGAL RESEARCH AND ANALYSIS

Ethics and Policy

  • Duties of Authors
  • Editors Responsibilities
  • Reviewrs Responsibilities
  • Plagiarism Policy
  • Copyright Policy

For Authors

  • About us
  • Call for paper
  • Verify Certificate
  • Copyright Form
  • How to Publish Paper
  • Editorial Board
  • Contact us

Citation

* Associate Professor,Vivekananda School of Legal Studies,Vivekananda Institute of Professional Studies, GGSIPU, Delhi.
[1]Mauro Rubino-Sammartano, International Arbitration: Law and Practice56 (Kluwer Law International, Delhi, 1st Indian edn., 2007).
[2] Sabyasachi Chatterjee, “Law applicable to International Commercial Arbitration”, 109- 116 JSLC 4 (2004).
[3] Dickson Oruaze Moses, Chrispas Nyombi and Tom Mortimer, “The Practicalities of Delocalisation in International Commercial Arbitration”, International Business Law Journal 2017 .
[4] Nigel Blackaby and Constatine Partasides(et.al), Redfern and Hunter on International Arbitration 165 (Oxford University Press, 2009).
[5]P.C. Markanda, Law relating to Arbitration and Conciliation 385 (Wadhwa and Company Nagpur, 5thedn, 2003).
[6]The case is decided by Full Bench Judges namely Justice R. Bhanumathi, Justice A.S. Bopanna, and JusticeHrishikesh Roy. Justice R. Bhanumathi authored the judgment.
[7] (2012) 9 SCC 552.
[8](2014) 5 SCC 1.
[9] (2018) 7 SCC 374.
[10] 2019 (17) SCALE 369. 
[11]Alan Redfern & Martin Hunter et.al., Law and Practice on International Commercial Arbitration 87 ( Sweet& Maxwell, 4thedn., 2006).   
[12] Julian DN Lew QC, Loukas A. Mistellis and Stefan M. Karol (Kluwer Law International) (referred from P.C. Markanda,Law relating to Arbitration and Conciliation, (Lexis Nexis, 2019, 9th edn) (Reprint).
[13]https://www.macmillandictionary.com/dictionary/british/administer
[14] Pearsall, The Concise Oxford Dictionary 17 (Oxford University Press, 1999).
[15] Bryan A. Garner, Black’s Law Dictionary 44 (West Group, St. Paul, Minn., 1999)

Citation

[1] Income Tax Act ,1961 ,Section 2(1)A ,Acts of Parliament ,1949(India)
[2] Income Tax Act ,1961 ,Section 10 ,Acts of Parliament ,1949(India)
[3] Tax Guru, https://taxguru.in/income-tax/agricultural-income-justification-objections.html (last visited Dec 12, 2022)
[4] Prevention of Money Laundering Act,2002,Section 3, Acts of Parliament,1949(India)
[5] The Quint, https://www.thequint.com/news/india/even-as-farmers-die-trillions-laundered-as-agricultural- income#read-more#read-more#read-more (last visited Dec 10, 2022)

Citation

[1] Kimberlee Leonard, What Is Cyber Extortion?, Updated Nov 07, 2023, What Businesses Should Know About Cyber Extortion - business.com, accessed - 24 Dec 2023.

[2] Sherri Davido,­ Matt Durrin, Karen Sprenger, Ransomware and Cyber Extortion Response and Prevention, 2023, Anddison Wesley, ISBN-13: 978-0-13-745033-6, ISBN-10: 0-13-745033-8, accessed - 29 Nov 2023.
[3] By Adrian, What to do when you receive an extortion email, Internet Security, June 19, 2020, What to do when you receive an extortion email (internetsecurity.tips), accessed -  28 Nov 2023
[4] Vaibhav Ruparel, CYBER EXTORTION, Published Oct 31, 2023, CYBER EXTORTION (linkedin.com), accessed - 26 Nov 2023.
[5] Gautam Chaudhary, All about cyber extortion, December 24, 2022, All about cyber extortion - iPleaders, accessed - 26 Nov 2023.
[6] Nehal Misra, What can I do if someone is blackmailing me online, June 5, 2021, What can I do if someone is blackmailing me online - iPleaders, accessed - 22 Nov 2023.
[7] Information Technology Act, 2000.
[8] Nehal Misra, What can I do if someone is blackmailing me online, June 5, 2021, What can I do if someone is blackmailing me online - iPleaders, accessed - 22 Nov 2023.
[9] Gautam Chaudhary, All about cyber extortion, December 24, 2022, All about cyber extortion - iPleaders, accessed - 26 Nov 2023.
[10] Economic Times, Cyber terrorists attack AIIMS-Delhi eHospital server, health data of top ministers under threat, Updated On Nov 25, 2022 at 03:49 PM IST, Cyber terrorists attack AIIMS-Delhi eHospital server, health data of top ministers under threat, ET Government (indiatimes.com), accessed - 01 Dec 2023.
[11] Times of India, MeitY reaches out to RBI, others against Wanna Cry ransomware, May 14, 2017, 22:47 IST, MeitY reaches out to RBI, others against Wanna Cry ransomware - Times of India (indiatimes.com), accessed - 01 Dec 2023.

Citation

[1] https://www.physio- pedia.com/Human_Rights_and_Health#:~:text=As%20declared%20in%201948%20in,security%20in%20the%20eve nt%20of
[2] https://www.who.int/news-room/fact-sheets/detail/human-rights-and-health
[3] https://www.drishtiias.com/daily-updates/daily-news-analysis/right-to-health- 3#:~:text=Fundamental%20Rights%3A%20Article%2021%20of,of%20the%20right%20to%20health.
[4] https://www.ohchr.org/en/special-procedures/sr-health/about-right-health-and-human-rights
[5] https://equityhealthj.biomedcentral.com/articles/10.1186/s12939-022-01634-3
[6] https://blog.ipleaders.in/right-to-health/
[7] http://hrlibrary.umn.edu/edumat/IHRIP/circle/modules/module14.htm
[8] https://www.jstor.org/stable/4065261
[9] https://www.humanrightscareers.com/issues/examples-of-human-rights/
[10] https://www.un.org/en/global-issues/human-rights
[11] https://humanrights.gov.au/our-work/education/introduction-human-rights

Citation

[1]Amiruddin v. Mst. Khatun Bibi, (1917) 39 All.371
[2] Dr.Moin Qazi, (2010) ‘Tracing the history of Triple Talaq to look to the future’ Qrius,  https://qrius.com/history-triple-talaq-future.  
[3] Shayara Bano v. Union of India &Others, (2017) 9 SCC 1
[4] Jiauddin Ahmed v. Anwara Begum, (1981) 1 GLR 358, Rukia Khatoon v. Abdul Khalique Laskar, (1981) 1 GLR 375, Nazeer v. Shemeema, 2017 (1) KLT 300.
[5] The Code of Family Law, 1984.
[6] Shahid, Ayesha, (2013) "Post-divorce maintenance for Muslim women in Pakistan and Bangladesh: A Comparative Perspective," International Journal of Law, Policy and the Family: p- 197-215.
[7] The Muslim Family Laws Ordinance, 1961.
[8] Jamila Ahmed Chowdhary, (2006) “Family Court ADR in Egypt and some exemplary provisions for other Muslim Countries.”  http://www.diac.ae/idias/journal/volume2sp2/chowdhurye.pdf.
[9] The Law of Personal Status 1929.
[10] Ropi, Ismatu. (2017) Religion and regulation in Indonesia. Springer.
[11] Kelsey Cherland, (2014) “The Development of Personal Status Law In Jordan & Iraq,” CMC Senior Theses , 89, http://scholarship.claremont.edu/cgi/viewcontent.cgi?article=1926&context=cmc_theses.
[12] The Code of Personal Status 1959.
[13] Article 79 Code of Personal Status 2004 (Law 70.03 of 2004)
[14] Article 80 The Code of Personal Status 2004.
[15] Article 81  of The  Code of Personal Status 2004
[16] Article 82 of the Code of Personal Status 2004.
[17] Article 83 of the Code of Personal Status 2004.
[18] Article 90 of the Code of Personal Status 2004.
[19] Article 1 of the Law on Talaq, 1935.
[20] Article 2 of the Law on Talaq, 1935.
[21] Article 3 of the Law on Talaq, 1935.
[22] Article 4 of the Law on Talaq, 1935.
[23] Article 140 of the Law of Personal Status 2005
[24] Article 61 of the Decree on Personal Status, 1992.
[25] Article 65 of the Decree on Personal Status, 1992.
[26] Article 66 of the Decree on Personal Status, 1992.
[27] Article 64 of the Decree on Personal Status, 1992.
[28] Article 67 of the Decree on Personal Status, 1992.
[29] Article 71 of the Decree on Personal Status, 1992.
[30] Article 102 of the Code of Personal Status, 1984
[31] Article 109 of the Code of Personal Status, 1984
[32] Article 104 and 105 of the Family Rights Law, 1962
[33] Article 28 of the Family Law,1984
[34] Article 30 of the Family Law,1984 (Law 10 of 1984 as amended by Law 15 of 1984)
[35] Article 32 of the Family Law,1984 (Law 10 of 1984 as amended by Law 15 of 1984)
[36] Ibid
[37] Article 35 of the Family Law,1984 (Law 10 of 1984 as amended by Law 15 of 1984)
[38] Article 47 of the Family Law,1984 (Law 10 of 1984 as amended by Law 15 of 1984)
[39] Article 46 of the Code of Muslim Personal Law 1977.
[40] Article 85 of the Code of Muslim Personal Law 1977.
[41] Article 161 of the Code of Muslim Personal Law 1977.

Citation


[1] The Author is an Associate Professor, Seedling School of Law and Governance, Jaipur National University, Jaipur.
[2] The Author is an Assistant Professor, School of Education, Jaipur National University, Jaipur.

Citation

Citation


[1] Associate Professor, Seedling School of Law and Governance, Jaipur National University, Jaipur. Earlier worked as an Assistant Professor in Apex Professional University, Pasighat, Arunachal Pradesh. Had worked as a Journalist in esteemed newspapers like Indian Express, Daily News Analysis, online newsportals and magazines in Ahmedabad. He had also worked as a Liaison Officer in Indian Society of International Law, New Delhi.
[2] This section is based primarily on Richard Pregent’s Symposium presentation, “Cyber Operations and Collective Self-Defense.”
[3] See, e.g., NATO, A Short History of NATO, http://www.nato.int/history/nato-history.html (last visited June 13, 2013).
[4] North Atlantic Treaty art. 5, Apr. 4, 1949, 63 Stat. 2244, 34 U.N.T.S. 243, 246.=
[5] Id. at art. 9.
[6] NATO, NATO Member Countries, http://www.nato.int/cps/en/ natolive/nato_countries.htm (last updated Apr. 9, 2013).
[7] On the Estonian cyber attacks, see ENEKEN TIKK, KADRI KASKA & LIIS VIHUL, INTERNATIONAL CYBER INCIDENTS: LEGAL CONSIDERATIONS 14?34 (2010).
[8] Jason Healey & Leendert van Bochoven, Atlantic Council, NATO’s Cyber Capabilities: Yesterday, Today, and Tomorrow, at 2 (Feb. 2012), available at http://www.atlanticcouncil.org/publications/issue-briefs/natos-cyber-capabilities-yesterday-today-and-tomorrow.
[9] See, e.g., U.S. Dep’t of Def., An Assessment of International Legal Issues in Information Operations, at 5 (May 1999) (observing that “the proliferation of global electronic communication systems and the increased interoperability of computer equipment and operating systems . . . have made information systems that are connected to any kind of network . . . vulnerable to computer network attacks”).
[10] NATO, NATO and Cyber Defence, http://www.nato.int/ cps/en/natolive/topics_78170.htm? (last updated Oct. 22, 2013) [hereinafter NATO and Cyber Defence].
[11] Healey & Bochoven, supra note 8, at 2.
[12] Id.
[13] NATO and Cyber Defence, supra note 10.
[14] Stéphane Abrial, NATO Builds Its Cyberdefenses, N.Y. TIMES (Feb. 27, 2011), http://www.nytimes.com-/2011/02/28/opinion/28iht-edabrial28.html?_r=1&# (commander of NATO’s Allied Command Transformation observing that the damage caused by the cyber attacks on Estonia “was a wake-up call for NATO”).
[15] NATO, Bucharest Summit Declaration para. 47 (Apr. 3, 2008), http://www.nato.int/cps/en/natolive/official_texts-_8443.htm.
[16] NATO, Active Engagement, Modern Defence: Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, at 16 (Nov. 2010), http://www.nato.int/nato_static/assets/pdf/pdf_publications/20120214_strategic-concept-2010-eng.pdf [hereinafter NATO Strategic Concept] (highlighting the need for NATO to “develop further our ability to prevent, detect, defend against and recover from cyber-attacks”).
[17] NATO, Lisbon Summit Declaration para. 2 (Nov. 20, 2010), http://www.nato.int/nato_static/assets/pdf/pdf_2010_11/2010_11_11DE1DB9B 73C4F9BBFB52B2C94722EAC_PR_CP_2010_0155_ENG-Summit_LISBON.pdf.
[18] NATO, Defending the Networks: The NATO Policy on Cyber Defence (2011), http://www.nato.int/nato_static/assets/pdf/pdf_2011_09/20111004_110914-policy-cyberdefence.pdf [hereinafter NATO Policy on Cyber Defence].
[19] NATO, Chicago Summit Declaration para. 49 (May 20, 2012), http://www.nato.int/cps/en/natolive/official-_texts_87593.htm?mode= pressrelease.
[20] NATO and Cyber Defence, supra note 10.
[21] NATO Cooperative Cyber Defence Centre of Excellence, https://www.ccdcoe.org (last visited Sept. 8, 2013).
[22] NATO, Defence Ministers Make Progress on Cyber Protection, http://www.nato.int/cps/en/natolive/news-_101143.htm (last updated Jun. 4, 2013).
[23] NATO, Exercising Together Against Cyber Attacks, http://www.nato.int/ cps/en/natolive/75747.htm (last updated Oct. 9, 2012).
[24] NATO, The NATO Defence Planning Process, http://www.nato.int/ cps/en/SID-F7C21EDE-DEEA4EA7/natolive/topics_49202.htm (last updated May 18, 2012).
[25] NATO Policy on Cyber Defence, supra note 18, at 1.
[26] This section is based on Alex Vandurme’s Symposium presentation on “NATO Cyber Defence: An Operational Perspective.”
[27] This part is based on David P. Fidler’s Symposium presentation on “NATO, Cybersecurity, and International Law.”
[28] NATO Strategic Concept, supra note 16, at 6, 7.
[29] NATO COOP. CYBER DEF. CTR. OF EXCELLENCE, Focus Areas, https://www.ccdcoe.org/37.html (last visited Sept. 19, 2013).
[30] Applying laws developed before the emergence of cyber threats to such threats is also sometimes called applying “law by analogy.” See, e.g., Duncan B. Hollis, Why States Need an International Law for Information Operations, 11 LEWIS & CLARK L. REV, 1023, 1029 (2007) (questioning the “law-by-analogy approach to government cyberoperations”).
[31] Convention on Cybercrime, Nov. 23, 2001, ETS No. 185, 2296 U.N.T.S. 167.
[32] WARFARE (Michael N. Schmitt ed., Cambridge University Press 2013) [hereinafter TALLINN MANUAL].
[33] See, e.g., WHITE HOUSE, DEF. SECURITY SERVICE, ADMINISTRATION STRATEGY ON MITIGATING THE THEFT OF U.S. TRADE SECRETS 1 (2013).
[34] Convention on Cybercrime (June 13, 2013), C.E.T.S. 185, http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm.
[35] TALLINN MANUAL, supra note 32, at 1.
[36] See WHITE HOUSE, supra note 33.
[37]NATO, NATO and the Fight Against Terrorism, http://www.nato.int/cps/en/ SID-8E7AA87D-4AEBB4C6/natolive/76706.htm (last updated Oct. 12, 2012).
[38] For ratification status of these instruments, see United Nations Treaty Collection, Text and Status of the United Nations Conventions on Terrorism, http://treaties.un.org/Pages/DB.aspx?path=DB/studies/page2_en.xml.
[39] See, e.g., President Barack Obama, Remarks by the President at the National Defense University (May 23, 2013), http://www.whitehouse.gov/the-press-office/2013/05/23/remarks-president-national-defense-university.
[40] See, e.g., Clapper v. Amnesty Int’l U.S., 133 S. Ct. 1138, 185 L. Ed. 2d. 264 (2013) (Supreme Court decision rejecting on standing grounds a challenge by Amnesty International and others against the constitutionality of the Foreign Intelligence Surveillance Act Amendments Act).
[41] See, e.g., Michelle Richardson, CISPA: A Legislative Threat to Privacy and Civilian Control of the Internet, AMERICAN CIVIL LIBERTIES UNION (Apr. 4, 2013), http://www.aclu.org/blog/national-security-technology-and-liberty/cispa-explainer-1-what-information-can-be-shared (critical privacy analysis of a legislative proposal in Congress that seeks to increase information sharing).
[42] Michael S. Schmidt & Nicole Perlroth, Obama Order Gives Firms Cyberthreat Information, N. Y. TIMES, Feb. 12, 2013, at A16 (reporting on the issuance by President Obama on an executive order on improving cybersecurity for critical infrastructure as an alternative to Congress’ failure to pass legislation addressing this issue).
[43] In addition to Fidler’s Symposium presentation, this section draws on Pregent’s presentation on “Cyber Operations and Collective Self-Defense.”
[44] For proposals for how NATO could address offensive cyber operations, see Healey & Bochoven, supra note 8, at 8 (recommending that NATO should consider coordination of NATO members’ offensive cyber operations and “creating a group modeled on NATO’s existing Nuclear Planning Group, to consider offensive cyber policy”).
[45] NATO’s standing rules of engagement (ROE) might theoretically provide a basis for NATO offensive cyber operations under the ROE for information operations, but reliance on such ROE for offensive cyber operations is very unlikely given existing NATO sensitivities about offensive cyber issues. On NATO ROE generally, see NATO, NATO LEGAL DESKBOOK 254–62. (2d. ed., 2010).
[46] NATO’s reluctance to address offensive cyber operations does not mean that the law of armed conflict prohibits such operations generally or in specific contexts where such operations might be militarily advantageous or ethically preferable.
[47] Michael Birnbaum, Merkel, Other European Leaders Raise Concerns on U.S. Surveillance, WASH. POST (June 10, 2013), http://www.washingtonpost.com/ world/merkel-other-european-leaders-raise-concerns-on-us-surveillance/2013/ 06/10/305eddda-d1da-11e2-a73e-826d299ff459_story.html.

Citation


[1] Articles of Constitution of India.
[2]  Equality before law The State shall not deny to any person equality before the law or the equal protection of the laws within the territory of India Prohibition of discrimination on grounds of religion, race, caste, sex, or place of birth
[3]  Right of children of sex worker
[4]  A. Gupta, Children in Red Light Areas: Societal Challenges and Legal Solutions in India, 81 Indian J. Soc. Work 213 (2020)
[5] Articles of Constitution of India.
 
[6] M. Singh, Education as Empowerment: The Case of Children of Sex Workers in India, 28 Educ. & Soc'y 77 (2018)
[7] Rachel Green, Policy Analysis: Protection of Children in Red-Light Districts, 34 Harv. Hum. Rts. J. 117, 120-121 (2021) (examining policies aimed at protecting the rights of children in red-light districts and critiquing their effectiveness).
[8] Sarah Brown, The Invisible Victims: Children of Sex Workers, 5 Int’l J. Child Rts. 213, 215 (2017)
[9] Discussing educational barriers: S. Reddy, Barriers to Education in the Red-Light Districts of India, 20 Intl Educ. J. 34 (2019)
[10] Challenges for Low-Income Families, 12 J. Soc. Welfare & Fam. Law 77, 80 (2021)
[11] “Protection of Life and Personal Liberty: No person shall be deprived of his life or personal liberty except according to procedure established by law.”
[12] Budhadev Karmaskar v. State of West Bengal (2011)
[13] Traffic in human beings and the beggar and other similar forms of forced labour are prohibited and any contravention of this provision shall be an offence punishable in accordance with the law.
[14] the State cannot deny equality before law and equal protection of law to any person within India. The expression ‘equality before law’ is a negative concept and the State has a duty to abstain from doing any act which is discriminatory in nature.
[15] A. Koirala, Legal Loopholes in Prostitution Laws in India, 6 Asian J. L. & Soc'y 108 (2019).
[16] R. Kumar, Juvenile Justice in India: Protection and Challenges, 12 Law Rev. 150 (2020).
[17] Laura Johnson & Michael Li, Challenges in Shelter Homes: The Plight of Children of Sex Workers, 22 J. Child Welfare 157, 160-161 (2023)
[18]  Budhadev Karmaskar v. State of West Bengal (2011)
[19] Julia Martinez, The Socio-Cultural Context of Sex Work in India, 12 J. Indian Soc. Studies 77, 79 (2022)
[20] Indian Penal Code, 1860, No. 45, Acts of Parliament, 1860 (India)
[21] Labour Rights and Prostitution: A Global Overview, Human Rights Watch Report, 2023, at 47
[22] Emily Tan, Decriminalisation of Prostitution: A Global Analysis, 15 Law & Soc. Change J. 88, 90-91 (2024).
[23] United Nations, Report on the Health and Safety of Sex Workers, U.N. Doc. A/HRC/35/26 (2023).
[24]  Budhadev Karmaskar v. State of West Bengal (2011),
[25] West Bengal Prevention of Immoral Trafficking Act, 1950
[26] Budhadev Karmaskar v. State of West Bengal, (2011) 11 SCC 1 (India).
[27] Gaurav Jain v. Union of India (1997) 8 SCC 114
[28] United Nations Children's Fund (UNICEF), Report on Vulnerable Children in South Asia, UNICEF Policy Brief, 2023, at 33
[29] Mark Lee, Street Prostitution and Child Victims, 18 J. Urban Studies 58, 60 (2021).
[30] David Roberts, Physical Harm to Child Prostitutes, 19 J. Child Welfare 45, 47 (2022).
[31] Susan Patel, Psychological Impact of Child Exploitation, 8 J. Child Mental Health 213, 216 (2020).
[32] Kelly Thompson, Social Services for Child Victims of Prostitution, 11 J. Soc. Policy 198, 200 (2022).
[33] Lisa Wong, Prevention of Child Exploitation: Public Awareness and Education, 14 J. Comm. Engagement 120, 123 (2023).
[34] Michael Zhang, The Underworld of Child Exploitation, 9 Harv. Hum. Rts. J. 117, 119 (2022).
[35] Sarah Chen, Psychological Impact of Child Prostitution, 7 J. Soc. Welfare & Fam. Law 112, 114 (2020).
[36] John Doe, Systemic Issues in Child Prostitution, 45 Int'l J. Hum. Rights 158, 160 (2023).
[37] Mark Lee, Corruption and Child Exploitation, 18 J. Urban Studies 58, 60 (2021).
[38] David Roberts, The Need for Reform in Child Prostitution Laws, 19 J. Child Welfare 45, 47 (2022).
[39] World Health Organisation, Health Risks in Child Prostitution, WHO Report, 2023, at 52
[40] Susan Patel, Healthcare Challenges for Child Victims of Prostitution, 8 J. Child Mental Health 213, 216 (2020),
[41] International Labour Organisation, Strategies to Combat Child Prostitution, ILO Report, 2022, at 75
[42] Michael Zhang, Debt and Desperation: Child Exploitation in Families, 9 Harv. Hum. Rts. J. 117, 119 (2022)
[43] Kelly Thompson, Breaking the Cycle of Family-Driven Prostitution, 11 J. Soc. Policy 198, 200 (2022)
[44] David Roberts, Mental Health Issues in Child Victims of Prostitution, 19 J. Child Welfare 45, 47 (2022)
[45]Jane Smith, Hidden Harm: Addressing Child Exploitation in Family Settings, 45-47 (2023)
[46] Michael Johnson & Lisa Wang, Frontline Responses to Child Abuse: The Role of Professionals in Child Protection, 32-35 (2022)
[47] Ahmed Patel, Community Action Against Child Exploitation: Education and Awareness Strategies, 60-62 (2022)
[48] John Doe, Protecting the Vulnerable: A Study on Child Exploitation and Society's Response, 87-92 (2020).
[49] Ravi Kumar, Legal Frameworks Against Child Exploitation in South Asia, 56-59 (2016)
[50] Journal of Criminal Justice and Social Work 22, no. 4 (2023): 178-182.
[51] Samuel Peterson, Protecting the Innocent Child-Friendly Approaches in Judiciary, 102-105 (2017),
[52] Anita Desai, Community Mobilization Against Child Prostitution in Asia, 47-51 (2026)
[53] Laura Jackson & Mohan Singh, Rehabilitation Strategies for Victims of Child Exploitation, 88-92 (2023)
[54] United Nations Children's Fund, Global Partnership against Child Trafficking and Prostitution, 15-20 (2017),
[55] Anjali Gupta, Childhood Trauma and Prostitution: A Study in South Asia, 82-85 (2021),
[56] Michael Johnson, “Psychological Impact of Childhood Abuse on Vulnerability to Prostitution,” International Journal of Child Welfare 15, no. 3 (2020): 210-215.
[57] Sarah Lee, Intrafamilial Abuse and Child Prostitution, 103-107 (2019)
[58] David Miller, The Role of Peer Influence in Child Exploitation, 92-95 (2022),
[59] Lisa Chang, “Drug Abuse and Sexualization in Adolescence: Pathways to Prostitution,” Journal of Adolescent Health 19, no. 2 (2021): 158-162.
[60] Mohammed Ali, Predatory Behaviors in Adult-Child Relationships, 78-82 (2023),
[61] Susan Thompson, “Psychological Consequences of Negative Peer Influence,” Child Psychology Review 34, no. 4 (2020), 245-249.
[62] John K. Anderson, Community Interventions for At-Risk Youth, 105-109 (2015)
[63] Michael Zhang, Social Traditions and Child Prostitution, 9 Harv. Cult. Rev. 117, 119 (2022),
[64] Child Marriage and Rights Violations, 20 J. Human Rights 301, 305 (2022),   
[65] Lisa Wong, Economic Justifications for Child Exploitation, 14 J. Econ. & Soc. Welfare 120, 123 (2023).
[66] Lack of Education and Harmful Customs, 33 Comparative Educ. Rev. 112, 115 (2023).
[67] Anna Kowalski, Lack of Alternatives for Children in Prostitution-Practising Families, 22 Int'l J. Soc. Welfare 134, 137 (2023).
[68] Multigenerational Approaches to Ending Family Prostitution, 45 Int'l J. Fam. Studies 158, 160 (2023).
[69] Long-Term Interventions for Family Prostitution Cycles, Oxford University Press, 2022, at 89.
[70] Navigating Sexual Development without Guidance, 15 J. Adolescent Health 77, 80 (2021)
[71] Myths in Sexuality and Their Consequences, 20 J. Human Rights 301, 305 (2022)
[72] Understanding Consent and Sexual Risks, 8 J. Youth Studies 213, 216 (2020)
[73] Kelly Thompson, The Role of Media in Shaping Sexuality, 11 J. Media Studies 198, 200 (2022)
[74] Trauma and Trust Breach in Child Abuse, 9 Harv. Psych. Rev. 117, 119 (2022)
[75] Perpetrator Influence on Child Abuse Victims, 18 J. Legal Studies 58, 60 (2021)
[76] Supporting Incest and Rape Victims, UNICEF Policy Brief, 2023, at 33.
[77] Social Efforts to Address Consequences of Incest and Rape, 12 J. Soc. Reform 203,
[78] Child Vulnerability in Impoverished Communities, Oxford University Press, 2022, at 47
[79] Education and Employment Challenges in Poverty, 15 J. Education & Poverty 77, 80 (2021)
[80] Absence of Safety Nets in Impoverished Areas, 14 J. Soc. Services 120, 123 (2023)
[81] Comprehensive Approaches to Addressing Child Prostitution, 7 J. Global Welfare 112, 114 (2020)
[82] Empowerment Through Education in Poverty-Stricken Areas, 45 Int'l J. Soc. Change 158, 160 (2023)
[83] Jane Smith, Early Marriage and Child Vulnerability, 12 J. Soc. Issues 203, 205 (2021),
[84] Cultural and Social Norms in Early Marriage, 15 J. Cultural Studies 77, 80 (2021)
[85] Abuse and Rights Violation in Early Marriages, 8 J. Legal Stud. 213, 216 (2020)
[86] The Consequences of Failed Early Marriages, 19 J. Child Welfare 45, 47 (2022)
[87] Forced Prostitution as a Survival Strategy, 7 J. Human Trafficking 112, 114 (2020)
[88] Community Infrastructure and Child Safety, 12 J. Urban Studies 203, 205 (2021),
[89] Consequences of Boredom in High-Risk Areas, 8 J. Soc. Welfare 213, 216 (2020)
[90] David Roberts, Risks in Unsupervised Environments, 19 J. Child Protection 45, 47 (2022)
[91] Mark Lee, Lack of Open Discussion on Child Rights, 18 J. Global Advocacy 58, 60 (2021)
[92] Misinformation Among Children, 33 Comparative Education Rev. 112, 115 (2023)

Citation

Citation 2

65876451 adaskdjlkh lkhlkhasd

IJLRA N. Raj Kumar ; Kamble Shivadayal . "Design of Fault Tolerance Parallel FFT’s Using Xilinx 14.5v" Iconic Research And Engineering Journals Volume 5 Issue 8 2022 Page 1-6
IEEE N. Raj Kumar ; Kamble Shivadayal . "Design of Fault Tolerance Parallel FFT’s Using Xilinx 14.5v" Iconic Research And Engineering Journals, 5(8)
  • +91-7042148991
  • editor@ijlra.com

LAW JOURNAL

  • About Us
  • Verify certificate
  • Editorial Board
  • Contact Us

IMPORTANT LINKS

  • Call for paper
  • How to Publish Paper
  • Submit Paper
  • Track your Paper Status
  • Search Issue

ETHICS & POLICY

  • Duties Of Authors
  • Editors Responsibilities
  • Reviewrs Responsibilities

© 2022 International Journal For Legal Research and Analysis

Designed by 1Web Experts