I had chosen to write about Dr. Majid Rafizadeh’s phenomenal novel ‘ A God Who Hates Women’. It is a beautiful yet tragically moving story of a women caught in a patriarchal household. It takes us back to the times when women were seen as commodities sold off in markets. Choice was a word that women could not even imagine.
The story highlights the life of the authors mother, how she lived through oppression. This story forms around the background of a civil war. The novels throw light on the cruelties faced by women in a patriarchal society. The story begins with a short background of how the authors grandmother was born. It later shows the birth of the authors mother which turned out to be a disgrace for her own mother, since she expected a baby boy. The story continues with the atrocities faced by his mother at her own home and how she was forcefully married to a man who abused her at all chances he got. The story speaks mostly about the struggles faced by the authors mother in her journey. It shows the cruel side of patriarchy, how women carry it down more than men.
The book is set in the backdrop of a series of political tension in Syria and Iran. The author and his family have moved from Syria to Iran a couple of times and the book shows the difference in the culture in both the countries vividly. The book shows how much political leaders are influenced by religion and how they kill people cruelly who goes against them, the authors father was one such victim. Maybe the author might have also got the influence from his father, but in a much better way. The author was the founder of an organization on human rights which reported cases of human cruelty. The authors father has a very interesting character, he on one side focuses on how modern our thinking should be in various aspects of life except in the equal treatment of women. His character was rather paradoxical.
The name of the book also seems to bring out the story, about how the religion and its god were cruel to women. The people of the religion went to extreme ends to make sure that the rules of the religion are followed, sometimes inhumane practices were also used.
But one of the most important thing that the book has left out is that it hasn’t brought into consideration the larger issues faced by the people. The author has merely had an interview with the close members of his family and friends. And so we cannot really say that the book speaks about the whole of Syria. After certain parts of time in the book, it fails to show the feelings of Amira, the authors mother. How she felt about religion, her passion and how she lied to herself to live for her children. The authors life has been glossed over for most parts and it talks in the perspective of the author while the book was about his mother. More focus should have been given to her as well as the political conditions too.
Cynthia Enloe’s Book ‘Bananas, Beaches and Bases’ has been, and continues to be widely read by scholars and students of International Relations. What makes her work stand out from other works in the discipline, is her usage of a gendered lens to analyse the world of International Politics. Where are the women in International Politics? Who put them there? and who benefits from them being there? These, Enloe believes, are crucial to a thorough analysis of International Politics but have hitherto been ignored and overlooked. Another crucial question that Enloe wants us to ask is that what does the woman who is put in a particular position think about being there? How would she interpret her position? These questions would hint at what Enloe attempts to do and that is, to view International Politics from the vantage point of women.
An essential point that Enloe makes is that what’s more important is to ask questions of the existing system rather than having ready-made answers. The reason behind this is the very fact that the existing system does not put forth a wholesome picture as it doesn’t include the experiences of women. Enloe believed that the absence of women in IR was far from natural, in fact, it is constructed. This is because the existing structure is marked by manipulation by and domination of masculine culture and politics. The position of women is constructed by men and thus, for women to feature in such a system, they have to become like men. This implies that in doing so, they devalue femininity and acknowledge that the masculine traits are superior.
Typically, when people wrote in IR their focus was on making links between political and international without accounting for gender. Enloe is assertive when she points out such an understanding is far from complete. The reason behind this, she highlights in the key phrase of ‘The personal is international, the international is personal’.
For Enloe, feminist informed investigation of international politics yields valuable insights into the complex politics of masculinity. The international is much broader than mainstream experts assume and the political is well beyond the public square. In this book she focused on aspects that are not thought of as ‘consumer goods’ i.e. tropical beaches, women’s sexuality, the service of flight attendants to name a few. Enloe views women in third world countries as global political actors.
Enloe takes the case of The League of Nations to cite as an example. At the face of it, in conventional works of IR, one would think of it as a site for preventing war post the wreckage caused by the First World War. But thinking of it from the premise of women brings in a hitherto overlooked aspect of The League of Nations i.e. as a site for promoting social justice as some women emerged as international civil servants because of the same. It is important to applaud Enloe’s work for its positive impact. It has enabled an area for dialogue where many more women have now joined the conversation. These women add their experiences and findings to the conversation. The coming together of women enables a genuine exchange of ideas. Therefore, the doors to reinterpret international politics using a gendered prism has been thrown wide open to us.
There are many people who talks about it , and few screams and fight to end it…………but since ages, it’s not being possible to make a difference, and still have not got independence from it’s foul smell, where someone dwelling in it , without sense. But, should we live in this rut forever ?…And to accept ourselves as incapable of destroying it, and to live like a looser.
I have a one brilliant rule, if it comes into play that undoubtedly changes the fate of the country. Before i reveal it, let us know why this rule works besides many measures being taken were failing since decades. The main feasible condition for corruption, is lack of surveillance and awareness among people,and how it greatly damages our standard of living. So,creating awareness among all the people might sometimes work, but most of the time it rewards us with great disappointment. because, India has biggest population, it’s hard to make all of us to bring on to one platform with one voice.
But, there was no dearth of solution, if we think and the first said idea is…………. This idea works with collection of students, professors, university bodies, govt anti corruption and adminstrative bodies , police. You may wonder that how, could you connect students, professors with police? The bitter fact is, about 90% of indian passouts graduates are unskilled according to the several esteemed surveys. The main reason for it is, not having a platform to access practical knowledge, we have severe shortage of internship opportunities and real time project works. This problem can also be indirectly solved by our main idea.
The govt should make project works mandatory and give them more importance in their course, some may refrain with this idea…but if we couldn’t able to perform on projects itself, how can we able to sustain after getting to global market; initially it might be hard, but with support of our peer and lecturers we can excel gradually. Now, we all should be assigned project works by our colleges in collaboration with national education body (now MHRD), only on all governmental assets and organisations….here comes a game changing shot. But, how is it possible?
The government must allow all the students to study governmental organisations, properties, and projects build by them.(let’s say a dam, hospital etc…). This helps to make an assessment for the quality of work being done in various govt fields and organisations.The reports submitted by students can be used by anti corruption agencies and help them to understand the situation at very ground level. As it’s not possible for anti corruption agencies to keep an eye over every inch of the whole country, they can use this student community as a strongest trustworthy network as they don’t provide false reports, if in case; the professor and the whole college who guided him will be felt guilt, and leads to their lack of reputation in society. so, this locking system can help students ro not provide false reports.
All the students must be allotted some projects on live aspects(like dams, hospitals ,industries built and being run by govt) in their respective fields, and we have to start analyzing their maintenance and prepare and submit the report of it’s quality and working efficiency. Here itself, we get an opportunity to dig up the flaws went up and to make a change by preparing efficient reports of the atrocities made and corruption that underwent.
For say, i’m a student of civil engineering, got a project to understand about kaleshwaram dam and have to submit report on it. I started by when it has built, and how much cost it took, what are the materials used in it, what are the technologies use in it, why does the walls of the dam is being getting cracks just after 5 years of its inauguration, what is the reason for recent fire accident……..when i submit the detail report to the college, I am gonna get my marks The above said will be the work of every student in every field, not only engineering also health,law, agriculture,finance and every field. Instead the anti corruption bureau working on intensive ground level, they can collect all the project reports form all colleges and will be easier for them to take action, by using the information. As, it is a real time project, the professor of individual group must take care of no flaws and genuinity of information, as it will be a major source for higher govt authorities to take action. In simple, students has to set on to study the past govt projects and organisations; and the detailed project reports and student community acts as a strong surveillance framework and it bring out the corruptions of the past as well as prevents the corruptions of the future. This idea, if it honed by the bright minds of our country, it can surely be an influential act.
A tale set in a bleak future society torn by class divisions follows the experiences of secret revolutionary Darrow, who after witnessing his wife’s execution by an oppressive government joins a revolutionary cell and attempts to infiltrate an elite military academy. The novel, set on a future planet Mars, follows lowborn miner Darrow as he infiltrates the ranks of the elite Golds.
It has been seven hundred years since mankind colonized other planets. The powerful ruling class of humans has installed a rigid, color-based social hierarchy where the physically superior Golds at the top rule with an iron fist. He and his wife Eon are captured after entering a forbidden area and are arrested. While she is publicly whipped for her crime, Eon sings a forbidden folk tune as a protest against their virtual enslavement.
Pierce Brown’s action-packed story explores themes such as oppression and the important responsibilities that come with power. Darrow’s radical character transformation, which is physical as well as emotional, also demonstrates the value of sacrifice and the limitless potential in all people.
Hero Worship
by Rebekah Matthews
we get to see some of Valerie’s childhood and her previous relationships, which all show pieces of the intangible quality she keeps seeking out, what she seems to be missing in her life. She latches onto various people, alternately admitting her obsession to its object or attempting to disguise it. This felt like one of the most realistic novels I’ve ever read, which may reveal more about myself than I would like. It captures the aimless, insecure twenty-something experience.
I also just love Matthews’s writing style. It seems casual and effortless but is able to evoke scenes and emotions with subtle details. I found myself torn between wanting to just keep reading and having to put down the book frequently because I empathized too much with Valerie. I would recommend this to anyone who’s felt like they’ve needed someone too much, or anyone looking for a short submersion in someone else’s sense of self. This is one of my favorites reads of this year.
A Drama in Muslin
by George Moore
“A drama is in Muslin,” is a study of the life of a group of girlfriends. The men in the story are only silhouettes- a mere decorative background, in fact. I propose to write a similar work dealing with a group of young men, in which the women will be blotted out. Or rather constitute in their turn the decorative background. In this way I hope to produce to two books that will picture completely the youth of my own time. Written in the mid-1880s, the novel reflects the unease of the times when the activities of the Land League began increasingly to jeopardize the security of the landlords and expose the artificiality and moral inadequacies of their way of life, centred on the annual Dublin seasons and receptions at the Castle. Fresh from their convent school, Alice and Olive Barton, with the aid of their mother (one of Moore’s most brilliant portraits), are set in quest of their identities and in pursuit of a husband, for as Mrs Barton asserts ‘Marriage gives a girl liberty, gives her admiration, gives her success, a woman’s whole position depends upon it’. Alice, the more observant and intelligent of the two, quickly appreciates how completely their choices in life are conditioned by the social tensions of the age, which render words like ‘liberty’ and ‘success’ meaningless.
Blood Ties
İpek Yosmaoğlu
he region that is today the Republic of Macedonia was long the heart of the Ottoman Empire in Europe. It was home to a complex mix of peoples and faiths who had for hundreds of years lived together in relative peace. To be sure, these people were no strangers to coercive violence and various forms of depredations visited upon them by bandits and state agents. In the final decades of the nineteenth century and throughout the twentieth century, however, the region was periodically racked by bitter conflict that was qualitatively different from previous outbreaks of violence. InBlood Ties, Ipek K. Yosmaoglu explains the origins of this shift from sporadic to systemic and pervasive violence through a social history of the “Macedonian Question.”
Yosmaoglu’s account begins in the aftermath of the Congress of Berlin (1878), when a potent combination of zero-sum imperialism, nascent nationalism, and modernizing states set in motion the events that directly contributed to the outbreak of World War I and had consequences that reverberate to this day. Focusing on the experience of the inhabitants of Ottoman Macedonia during this period, she shows how communal solidarities broke down, time and space were rationalized, and the immutable form of the nation and national identity replaced polyglot, fluid associations that had formerly defined people’s sense of collective belonging. The region was remapped; populations were counted and relocated. An escalation in symbolic and physical violence followed, and it was through this process that nationalism became an ideology of mass mobilization among the common folk. Yosmaoglu argues that national differentiation was a consequence, and not the cause, of violent conflict in Ottoman Macedonia.
The edge of sadness
Edwin O’connor
In this moving novel, Father Hugh Kennedy, a recovering alcoholic, returns to Boston to repair his damaged priesthood. There he is drawn into the unruly world of the Carmody’s, a sprawling, prosperous Irish family teeming with passion and riddled with secrets. The story of this entanglement is a beautifully rendered tale of grace renewal, of friendship and longing, of loneliness and spiritual aridity giving way to hope.
The first edition of this Pulitzer Prize winner was published by Little, Brown and Company in 1961. It was 460 pages long, and the original retail price was $5.00. The first edition can be identified by the following points: “FIRST EDITION” is stated on copyright page and no blind stamp on the back boards. Note: there are book club editions that also state “FIRST EDITION”. But the book club edition has a blind stamp on the back.
When I was recommended about this book by my friend, I simply thought it to be absurd that someone could wish to die in his own will! I was horrified and curious as to what all the matter was this about. But the thing I didn’t know at that time was, life can sometimes mess your life so bad, there is no solution either than just stop thinking about it..
Me Before You is a beautiful and meaningful book written by Jojo Moyes. Not gonna spoil it for you, don’t worry, but the concept written by her is really deep. Honestly, at first, I thought ,the book would turn out to be like a fairytale, with everything just happy…but as I kept reading, the story took a quite dramatic turn. The story is about a girl named Louisa, who is a really optimistic person, measures the distance through the number of footsteps she takes and works in a cafe. She has a boyfriend, a fitness trainer, Patrick.
Fun fact – When the book was adapted into a movie, the role of Patrick was played by Matthew Lewis (yes! the one who played Neville Longbottom in Harry Potter!!)
Everything turns into a mess when she loses her job, where the story actually starts with the male lead – Will Traynor, an energetic and out going guy, until he met with a pedestrian accident after which he became a quadreplegic . When you read the book, you have so many mixed emotions that you can’t even describe it .It’s just there. I still remember myself, hugging my knees in the corner of my room, crying after reading the book. Seriously, it took me 5 freaking days to balance my thoughts with my mother grumbling as to why I was crying over a book character ( it’s not just a book character!)
My heart did a backflip after reading every page of the book. Addicted,that’s what I was, just had to know what happens next! The story also introduces us to a new concept: death. Now, you might say, that we all know what is death, okay! But…do we?
Now , not many of us know the Non – Profit society named Dignitas, in Switzerland, which offers death with dignity. Intially meaning, ‘assisted suicide’.
The method usually includes an oral dose of an antiemetic drug, followed by an overdose of pentobarbital which is given, dissolved in water, which initially tends to depress the central nervous system, making the person fall asleep. This proceeds to coma , making the person’s respiration slowdown, eventually resulting in a respiratory arrest. Dignitas was founded by Ludwig Minelli on 17 May, 1998. He was a Swiss lawyer who had specialised in human rights law. The society works for the ones who suffer with terminal and mental illnesses.
Now death is a pretty sensitive and controversial topic.We live because of some ambitions.Fro some important people. For ourselves. For a better future. Everybody hopes for such things. But is the need broken when every important thing and people are snatched away from us? The answer is..we don’t know. It’s just one of the many things, which we simply don’t know.When we know that there is no hope to live, while everyday waking up, only wishing it to be over already, where your loved ones, have moved forward in their own lives while you still lay there. Where you feel like an outsider even when you are with the closest people you know. When everyone gazes at you with pity….
But you know what? He is happy. Happy that, even he had some happy moments. Some memories which he will cherish. Because memories can’t be changed. Don’t live life to the fullest. Live a life which is worth it. This book teaches so many things in just a few lines, I myself was beyond amazed!
The conclusion? Well, just like William Henley ( a famous poet, don’t confuse him with Will Traynor!) said ,’I am the master of my fate, I am the captain of my soul.’
Our thoughts, our actions, our influences, only they matter. One gets thousands of opinions throughout his life. But guess what? Only my opinion matters in my life,because I am going to take the decision.
Phew! That was a lot of philosophy, now wasn’t it? I was so inspired by the book, I literally called all of my friends and recommended, forced more like ,to read the book. ( Ya! call me annoying)
The ending of the book is..just!
Lastly, the movie adaptation. The movie production put on a lot of hard work, trust me..but, I would still recommend the book more!
Source: Pinterest
The book is followed by a sequel, ‘After you’ published in 2015 proceeded by one sequel ‘Still me’ which were not that famous but just as great!!!!
The order of the trilogy –
Me Before You
Still me
Happy readings!!
Note: This review was not written to offend anyone.
Indian History has been the theme for many books. Whether its fiction or non-fiction, there are plenty of books which deserve to be on the list of must-read books written on the topic of history. These books give one a detailed understanding of India’s history.
Be it comprehensive historical books or fictional accounts of a historical incident, there are many options for you to choose from. If you are a person who loves both reading and history then the following 5 books are just the right choice for you.
The Argumentative Indian by Amartya Sen
Amartya Sen is an Indian Economist and writer who had won the Nobel Prize in 1998. This book is a collection of essays and it will help one understand the Indian polity. It focusses on the importance of public debate, argument and intellectual diversity in the Indian civilization of the past. Sen writes about his view on how and what will lead to the success of democracy in India.
India After Gandhi by Ramachandra Guha
Ramachandra Guha is an Indian writer and researcher whose areas of interest include society, politics and history. India After Gandhi is a book describing the journey of modern India, from post-independence from the British in 1947 until the 1990s. The book will provide one with a thorough understanding of India’s social and economic spheres. It covers the country’s political history over the later part of the 20th century.
The Last Mughal by William Dalrymple
William Dalrymple is a Scottish historian, writer, critic, art historian and curator. He has won several awards and prizes for his writings. The book is a comprehensive description of the time period when the Mughal empire started declining in India. It will be a treat for people who love reading history. It is about the last Mughal ruler, Bahadur Shah Zafar II, and it provides an account of 19th century India with the tale of the emergence of the British Raj. Another famous book by him is White Mughals which is his fifth major book, it tells the story of the love affair between James Achilles Kirkpatrick and Khair-un-Nissa Begum at the backdrop of nineteenth century Hyderabad.
The Discovery of India by Jawaharlal Nehru
Jawaharlal Nehru was India’s first prime minister and he wrote this from 1942 – 1946. This book was written by Nehru when he was imprisoned by the British. It is a tribute to the rich cultural heritage and legacy of the country. It provides an account of all major developments in the subcontinent from the period of Indus Valley Civilization to the last years of the British rule.
The Palace of Illusions by Chitra Banerjee Divakaruni
Chitra Banerjee Divakaruni is an award-winning writer, novelist and poet. The book is about the tale of the epic Mahabharata, written from the perspective of Draupadi (Panchaali). It tells the story of the woman who fights, endures a lot living in a patriarchal world. It is a historical fiction which traces the historical tale and the life of Panchaali.
IT IS 12:35 AM AND I HAVE JUST WINDED UP WITH THIS BOOK TITLED “MURDER ON THE ORIENT EXPRESS” , A DETECTIVE NOVEL. AN ANALYTICAL EXPIRIENCE IT WAS , FELT LIKE I AM THE ONLY ONE GETTING THE CASE SOLVED. A WONDERFUL NOVEL IT IS ! , AUTHORED BY AGATHA CHRISTIE. IT WAS MY FIRST NOVEL OF CHRISTIE AND IMPACT HAD BEEN GREAT , STILL THERE. BEFORE READING HER NOVELS , I ASKED ABOUT THE FEEDBACK FROM FEW PEOPLE , IT WAS BETWEEN OK AND NICE , SOME SAID “WASTE OF TIME ” . I WAS INCREDIBLY SHOCKED BY THE REVIEWS , AS , LISTEN THE ” BEST DETECTIVE ” NOVEL BY THE BEST WRITERS . I DECIDED NOT TO LISTEN OTHERS , BUT , TO TRUST MY HEART , HAVING FEELING FOR IT WHILE READING AND MY LIPS READING THE WORDS . I ORDERED IT .
WOAH ! WHAT AN EXCITING COVER ! THE BOOK HAS , IT ALEARDY SEND ME CHILLS , ONLY AND ONLY “GOOSEBUMPS” !.I EXAMINED THE BOOK FULLY FROM ITS COVER TO COLOR , FONT TO ITS THICKNESS , ITS FRAGNANCE ,YES! I AM A BOOKWORM . AFTER DOING MY USUAL RITUALS , WHEN I READ THE BLURB , INTRIGUED ME , IT SAYS :
“THE MURDERER IS WITH US – ON THE TRAIN NOW…”
JUST AFTER MIDNIGHT , THE FAMOUS ORIENT EXPRESS IS STOPPED IN ITS TRACKS BY A SNOWDRIFT .A PASSENGER LIES DEAD IN HIS COMPARTMENT , STABBED DOZEN TIMES HIS DOOR LOCKED FROM THE INSIDE .
ISOLATED BY THE STORM AND WITH A KILLER IN THEIR MOIST , DETECTIVE HERCULE POIROT MUST IDENTIFY THE PRIME SUSPECTS FROMA SCORNFUL AND IMPATIENT ARRAY OF PASSENGERS – BEFORE THE MURDERER DECIDES TO STRIKE AGAIN…
DOES N’T IT READ HORRIFYING? , IS N’T IT FILL YOUR HEART AND MIND WITH THRILL ? , WELL , MINE DID ! . IT IS WRITTEN IN THREE PARTS – PART 1 THE FACTS , PART 2 THE EVIDENCES , PART 3 HERCULE POIROT SITS BACK AND THINKS . IT IS AN EASY TO READ NOVEL BUT REQURES ALERTNESS AS A DETECTIVE ONE IT IS . THE NOVEL STARTS OFF WITH THE TAURAS EXPRESS , WHERE ALMOST ALL THE CHARACTERS ARE INTRODUCED . BUT , THE MAINS ARE HERCULE POIROT , MR BOC AND DR.CONSTANTINE , PRETTY DIFFRENT NAMES . THEY ARE THE MAIN CHARACTERS , THE INCIDENT OCCURRED ON THE ORIENT EXPRESS WHICH WAS CHANGED BY ALL THE PASSENGERS SAME IN TAURAS EXPRESS . EVERYTHING WAS PRE-PLANNED , MR RATCHET WHO WAS MUDERED , HAS MUDERED HIS DAUGHTERS , AND WHAT FASCINATING TO ME IS , EACH OF THE PERSON PRESENT ON THE TRAUN IS CONNECTED TO HIM EITHER WAYS , DIRECTLY OR INDIRECTLY. EVEN HIS SCRETARY IS SUSPECTED MR MAC QUEEN . AFTER MIDNIGHT , MR RATCHET WAS MURDERED AND STABBED TWELVE TIMES WITH FEW IMPRESSIONS WITNESSED AROUND HIS BODY . WHILE I READING IT , I FELT LIKE THE THREE MAINS ARE SURROUNDED BY THE MUDERERS , COULD N’T GUESS WHETHER ITS IS TRUE OR NOT . THE BLOODED KNIFE FOUND IN THE BAG OF MRS HUBBARD AND SCARLET GOWN IN THE LUGGAGE OF POIROT HIMSELF WHO IS HANDLING THE CASE . THEESE ALL ADD UP TO THE EVIDENCES , WHEN INQUIRING WITH THE PASSENGERS , POIROT CAME TO KNOW ABOUT THE SCARLET GOWN WORE BY A WOMAN NEAR MR RATCHET’S COMPARTMENT AND WOMANISH VOICE OF MEN , AS, POTRAYED BY THE PASSENGERS . THE MURDERER IS IN THE TRAIN NOW BUT IS HIDDEN FROM THEM SMARTLY .
WHAT YOU GUYS THINK ? WHO IS THE MURDERER ? , STAB TWELVE TIMES ! , CAN IT BE ONE OR MORE ? , DOES POIROT KILLED HIM? OR MRS HUBBARD ? , TO KNOW MORE WHAT THE PASSENGERS HAS TO TELL AND HOW THE CASE GOES AHEAD .
YOU HAVE TO READ IT !
FULL ASSURANCE TO YOU ALL , GONNA HAVE CHILLER JOURNEY!
Article name:A Study of University Students’ Motivation and Its Relationship with Their Academic Performance.
Student motivation is the element that leads students’ attitude towards learning process.God-gifted talents, best teachers and best schooling facilitate the academic performance and students’ motivation is prerequisite for students’ accomplishment. This study attempts to identify the influence of students’ motivation on their academic performance.So come on research enthusiasts let’s look into the why,how and what of student motivation through this review!
This outstanding Research article by Ali and colleagues has been published in the International Journal of Business and Management.This study attempts to identify the influence of students’ motivation on their academic performance.The sample consisted of 342 university students of different programs in various universities of Islamabad and Lahore, Pakistan.The students were asked about how motivated they are about their university experience and what really motivated them to study.
METHODOLOGY
The questionnaire was distributed among both male and female students. There were 82% male and 18% female students in the survey with an average age of 20 years.“The University Student Motivation and Satisfaction Questionnaire version 2″ (TUSMSQ2) instrument was developed by Neill (2004) to measure student’s motivation. TUSMSQ2 instrument contains 30-items.
WHAT WAS TESTED?
The questions measure both Intrinsic and Extrinsic motivation of students. There were two intrinsic motivators; Self-exploration and Altruism and four extrinsic motivators;rejection of Alternative options, career and qualifications, Social enjoyment, and Social pressure in the questionnaire. The questions were based on five point Likert scale. For each item, students rated themselves on a scale of 1 to 5; 1 being “Very False”, towards, 5 being “Very True”
BASIS/THEORY OF THE STUDY
Motivation is state of mind that stimulates activities and human body actions.Student motivation is often separated into two types: Intrinsic motivation and extrinsic motivation.
Intrinsic motivation: A student is intrinsically motivated when he or she is motivated from within. Intrinsically motivated students keenly engage themselves in learning out of oddity, interest, or enjoyment, or in order to achieve their own scholarly and personal goals.Thus students with intrinsic motivation are more enthusiastic, self driven, challenging and feel pleasure in their studies.Intrinsically motivated students tend to prefer challenging tasks.
Extrinsic motivation: It is commonly viewed that extrinsically motivated student engages in learning purely for attaining a reward or for avoiding some punishment.Extrinsic motivation means to obtain some reward or avoid some punishment external to the activity itself such as grades, stickers or teacher approval.Students with extrinsic motivation try to drag themselves with academic assignments, feel compelled to learn, and always put minimal efforts to achieve maximum appreciations.
Results
The results indicate that academic performance amplifies between the ranges of 23 percent and 34 percent due to extrinsic motivation and intrinsic motivation.Also the comparisons of variables on individual bases indicates that those students who adapt self-exploratory variable and altruism variable, rejection of alternative options variable tend to perform better, whereas student who adapt career and qualifications variable, social enjoyment variable and social pressure variable tend to perform less then expected.Also the study found positive and mutually causal relationship between student’s motivation and student’s academic performance. This relationship is reciprocal, meaning students who are more motivated perform better and student who perform better become more motivated.
implications
Any research article would be a waste without implications.This study helps in identifying the factors that will help educational thinkers to know students’ attitudes towards learning, what facilitates learning and what hinders in learning.Thus it will lead to better teaching methods and facilities to suit the student’s need thereby increasing their job competence.
So,this was a comprehensive review of a wonderful research article.Click the below button to read the article:
The Kite Runner by Khaled Hosseini is a historical fiction which is set in Afghanistan and America at the times of the Soviet Afghan War. It is one of the most loved books by readers across the world. The Times describe the book as “Heart breaking”. It was a number one New York Times bestseller for over two years, with over seven million copies sold in the United States. It has also been made into a motion picture after being a bestselling novel.
The book is a beautiful and endearing tale of two friends, Amir and Hassan who grew up together in ”a peaceful but prejudiced Kabul”. They share a beautiful bond of friendship but the surrounding social prejudice intervenes in it. During their childhood years, they spend their days flying kites along the streets of Wazir Akbar Khan district. Amir occupies a special place in Hassan’s heart and he expresses his love for Amir in a few words, ”for you, a thousand times over”. These words happen to be the book’s most iconic lines. Hassan who was the servant’s son was a Hazara and suffered tremendous social and cultural discrimination for that. During a kite flying event, an incident changes their relationship forever. Eventually Hassan and his father move out of their house.
Their lives change dramatically when the Taliban arrives in Kabul and the Soviet Afghan War changes the entire atmosphere of the country. After 5 years, Amir and his father escape the country and move to America to start a new life. Amir continues to suffer with guilt for the past. It is after he grows up to be a successful writer that he receives a call from a familiar voice of the past and goes back to Kabul. The story takes a different turn at the end when Amir discovers the truth that his relationship with Hassan was deeper than he realised.
Born in Kabul, the author draws inspiration from his own life as well but the plot and characters of the book however are fictional. The characters of the book are beautifully woven and the story is unforgettable. Several conflicts within the plot makes the readers fall in love with the characters. The book created some controversy within Afghan readers as it portrayed Pashtuns as prejudiced towards Hazara people. The racial and religious extremism is deeply saddening and the violence is frightening. The kite has been portrayed as an important symbol which represents Amir’s guilt for his betrayal towards Hassan and thus he does not fly a kite after that incident until the very end.
The book encourages its readers to look at the world in a new way and provides a different perspective for a country which has long been stigmatized. The message conveyed by the book towards the ending offers some hope for its characters and also for war torn Afghanistan as well. The book is highly recommended and it is sure to make a lasting impression on readers.
And then there were none is an enigma novel written by the queen of crime, Agatha Christie. It is one of the best seller novels which takes murder mystery to a next level.
It is a story of ten strangers who were sent invitations they could not refuse to the illustrious Soldiers Island by the wealthy Mr.Owen. All of them notice an unusual nursery rhyme framed and hung off the wall of every room titled TEN LITTLE INDIANS which goes as-
Ten little Indians standin’ in a line, One toddled home and then there were nine; Nine little Indians swingin’ on a gate, One tumbled off and then there were eight. Eight little Indians gayest under heaven One went to sleep and then there were seven; Seven little Indians cuttin’ up their tricks, One broke his neck and then there were six. Six little Indians all alive, One kicked the bucket and then there were five;
Five little Indians on a cellar door, One tumbled in and then there were four. Four little Indians upon a spree, One got fuddled and then there were three; Three little Indians out on a canoe, One tumbled overboard and then there were two Two little Indians foolin’ with a gun, One-shot t’other and then there was one;
One little Indian livin’ all alone, He got married and then there were none.
After supper, a gramophone record is played; the recording accuses each visitor of having committed murder and then asks if any of “the accused” wishes to offer a defense. This is not taken seriously by anyone. Later they find that the cook among them got dead after drinking. The next morning a lady corpse is found in her bed; she died in her sleep. One by one each one of them dies and the island becomes empty. For an instance, there were ten people and now there were none. Police inspector and crime branch do their investigations and found things, not of much importance. Later during the court hearing, one person found something which resolves the entire mystery of ten murders, and the murderer was found amongst those ten people only which is now dead.
The book completely binds thrill and suspense with an outstanding revival. The book deserves to get read once.
The first time I read ‘The Fault In Our Stars,’ my heart skipped a beat with each page turn. This was before the book became popular. I always enjoyed books and music before it the bestselling charts.
Hazel Grace and Augustus Waters are one of a kind. They were burdened by cancer and their loved one’s hidden emotions. Until they found each other, they were alone amidst the crowd. They were each-others safe havens.
Hazel Grace’s grenade dialogue scene was heart-breaking and
When the Hollywood movie came out starring Ansel Elgort and Shailene Woodley, I was slightly disappointed. Like every other book made into a movie, it lost its touch.
I felt the same way when I watched Dil Bechara. The Bollywood make was a lot different from the book. They changed the book to a song, the author to a musician, Amsterdam to Paris. More than any of that this movie was so different than the book itself. Instead of creating a new identity for itself, it was just a loose compilation of scenes.
I understand that the movie was made for the Indian youth to relate to, but in the heavily social world, we are more modern than before.
Kizie was introduced attending strangers’ funerals to share her pain realizing that she too might die soon and her loved ones would go through the same. That unexplained scene gave the movie an edge. It was a beautiful scene. She, herself didn’t realize the reason she was drawn to funerals.
Manny’s funeral scene was heartbreaking and my friend described her want to crawl into the screen and give Kizie and Manny a tight hug each.
The songs weren’t that great, commercial success wise. But A. R. Rahman’s composition was peaceful and I loved them.
However, the new comer Sanjana Sanghi, playing Kizie did wonderful on her part. She was perfect when she needed to be stiff, stubborn, emotional and in love. She has an amazing career ahead of us and will be worthy of all the opportunities to hone her skills.
Sushant Singh Rajput, as Manny was as gracious as ever. He had his charming smile and adorable personality throughout.
I would have loved if both the great actors were playing their parts in a different plot. Stirring clear of John Greens book.
The movie had 95 million views in the first 24 hours. It was a tribute to Sushant Singh Rajput. Many shed tears, not with the characters but for the actor himself.
The slideshow tribute for Sushant in the end was comforting and warm. It was sweet and made a million people shed tears for him and his premature death. We loved Sushant and he will always have a special place in our hearts forever.
In the weeks after his death, many speculations were made, cases filed, trending hashtags. But it felt good to switch off from social media and watch his last movie. Hotstar and Disney+ did a great job letting viewers stream the movie for free.
You can watch the movie on Hotstar and Disney+.
You can stream all songs of the movie on YouTube and on any other music app.
When the movie came out starring Ansel Elgort and Shailene Woodley, I was slightly disappointed. Like every other book made into a movie, it lost its touch.
I felt the same way when I watched Dil Bechara. The Bollywood make was a lot different from the book. They changed the book to a song, the author to a musician, Amsterdam to Paris. More than any of that
“Cyber” is a prefix used to describe a person, thing, or idea as part of the computer and information age. Taken from kybernetes, the Greek word for “steersman” or “governor,” it was first used in cybernetics, a word coined by Norbert Wiener and his colleagues. The virtual world of internet is known as cyberspace and the laws governing this area are known as Cyber Laws and all the netizens of this space come under the ambit of these laws as it carries a kind of universal jurisdiction.
Cyberlaw can also be described as that branch of law that deals with legal issues related to use of inter-networked information technology. In short, cyber law is the law governing computers and the internet. The growth of Electronic Commerce has propelled the need for vibrant and effective regulatory mechanisms which would further strengthen the legal infrastructure, so crucial to the success of Electronic Commerce. All these regulatory mechanisms and legal infrastructures come within the domain of Cyberlaw.
Cyberlaw is important because it touches almost all aspects of transactions and activities on and involving the internet, World Wide Web and cyberspace. Every action and reaction in cyberspace has some legal and cyber legal perspectives.
Cyberlaw encompasses laws relating to:-
Cybercrimes
Electronic and digital signatures
Intellectual property
Data protection and privacy
WHY IS CYBER LAW THE NEED OF THE HOUR IN INDIA?
Firstly, India has an extremely detailed and well-defined legal system in place. Numerous laws have been enacted and implemented and the foremost amongst them is The Constitution of India. We have inter alia, amongst others, the Indian Penal Code, the Indian Evidence Act 1872, the Banker’s Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934, the Companies Act, and so on.
However, the arrival of Internet signalled the beginning of the rise of new and complex legal issues. It may be pertinent to mention that all the existing laws in place in India were enacted way back keeping in mind the relevant political, social, economic, and cultural scenario of that relevant time.
Nobody then could really visualize about the Internet. Despite the brilliant acumen of our master draftsmen, the requirements of cyberspace could hardly ever be anticipated. As such, the coming of the Internet led to the emergence of numerous ticklish legal issues and problems which necessitated the enactment of Cyber laws.
Secondly, the existing laws of India, even with the most benevolent and liberal interpretation, could not be interpreted in the light of the emerging cyberspace, to include all aspects relating to different activities in cyberspace. In fact, the practical experience and the wisdom of judgment found that it shall not be without major perils and pitfalls, if the existing laws were to be interpreted in the scenario of emerging cyberspace, without enacting new cyber laws. Hence, the need for enactment of relevant cyber laws.
Thirdly, none of the existing laws gave any legal validity or sanction to the activities in Cyberspace. For example, the Net is used by a large majority of users for email. Yet till today, email is not “legal” in our country. There is no law in the country, which gives legal validity, and sanction to email. Courts and judiciary in our country have been reluctant to grant judicial recognition to the legality of email in the absence of any specific law having been enacted by the Parliament.
As such the need has arisen for Cyberlaw. Fourthly, the Internet requires an enabling and supportive legal infrastructure in tune with the times. This legal infrastructure can only be given by the enactment of the relevant Cyber laws as the traditional laws have failed to grant the same.
E-commerce, the biggest future of the Internet, can only be possible if necessary legal infrastructure compliments the same to enable its vibrant growth. All these and other varied considerations created a conducive atmosphere for the need for enacting relevant cyber laws in India.
CYBERCRIME ON THE RISE
As per the cybercrime data maintained by the National Crime Records Bureau (NCRB), a total of 217, 288, 420 and 966 Cyber Crime cases were registered under the Information Technology Act, 2000 during 2007, 2008, 2009 and 2010 respectively.
Also, a total of 328, 176, 276 and 356 cases were registered under Cyber Crime related Sections of Indian Penal Code (IPC) during 2007, 2008, 2009 and 2010 respectively.
A total of 154, 178, 288 and 799 persons were arrested under the Information Technology Act 2000 during 2007-2010. A total number of 429, 195, 263 and 294 persons were arrested under Cyber Crime related Sections of Indian Penal Code (IPC) during 2007-2010.
Crime head-wise and age-wise profile of the offenders arrested under Cyber Crimes (IPC) for the year 2011 reveals that offenders involved in 9 forgery cases were more in the age-group of 18-30 (46.5%) (129 out of 277). 50.4% of the persons arrested under Criminal Breach of Trust/Cyber Fraud offences were in the age group 30-45 years (65 out of 129).
Meanwhile, 9 out of 88 mega cities did not report any case of cybercrime i.e., neither under the IT Act nor under IPC Sections during the year 2011. And 53 megacities have reported 858 cases under the IT Act and 200 cases under various sections of IPC.
There was an increase of 147.3% (from 347 cases in 2009 to 858 cases in 2011) in cases under IT Act as compared to the previous year (2010), and an increase of 33.3% (from 150 cases in 2010 to 200 cases in 2011) of cases registered under various sections of IPC. Bangalore (117), Vishakhapatnam (107), Pune (83), Jaipur (76), Hyderabad (67) and Delhi (City) (50) have reported a high incidence of cases (500 out of 858 cases) registered under IT Act, accounting for more than half of the cases (58.3%) reported under the IT Act.
Delhi City has reported the highest incidence (49 out of 200) of cases reported under IPC sections accounting for 24.5% followed by Mumbai (25 or 12.5%). A major programme has been initiated on development of cyber forensics specifically cyber forensic tools, setting up of infrastructure for investigation and training of the users, particularly police and judicial officers in the use of this tool to collect and analyze the digital evidence and present them in Court.
Indian Computer Emergency Response Team (CERT-In) and Centre for Development of Advanced Computing (CDAC) are involved in providing basic and advanced training of Law Enforcement Agencies, Forensic labs and judiciary on the procedures and methodology of collecting, analyzing and presenting digital evidence.
Cyber forensic training lab has been set up at Training Academy of Central Bureau of Investigation (CBI) to impart basic and advanced training in Cyber Forensics and Investigation of Cyber Crimes to Police Officers associated with CBI.
In addition, Government has set up cyber forensic training and investigation labs in Kerala, Assam, Mizoram, Nagaland, Arunachal Pradesh, Tripura, Meghalaya, Manipur and Jammu & Kashmir.
In collaboration with Data Security Council of India (DSCI), NASSCOM, Cyber Forensic Labs have been set up at Mumbai, Bengaluru, Pune and Kolkata. DSCI has organized 112 training programmes on Cyber Crime Investigation and awareness and a total of 3680 Police officials, judiciary and Public prosecutors have been trained through these programmes.
Indian Computer Emergency Response Team (CERT-In) issues alerts, advisories and guidelines regarding cybersecurity threats and measures to be taken to prevent cyber incidents and enhance the security of Information Technology systems.
IMPORTANT TERMS RELATED TO CYBER LAWAS PER INFORMATION TECHNOLOGY ACT,2000
“Access” with its grammatical variations and cognate expressions means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network. (Sec.2(1)(a) of IT Act, 2000)
“Addressee” means a person who is intended by the originator to receive the electronic record but does not include any intermediary. (Sec.2(1)(b) of IT Act, 2000.
“Affixing Electronic Signature” with its grammatical variations and cognate expressions means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of Electronic Signature. (Sec.2(1)(d) of IT Act, 2000)
“Asymmetric Crypto System” means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature. (Sec.2(1)(f) of IT Act, 2000).
“Certifying Authority” means a person who has been granted a license to issue an Electronic Signature Certificate under section 24. (Sec.2(1)(g) of IT Act, 2000)
“Communication Device” means Cell Phones, Personal Digital Assistants (Sic), or combination of both or any other device used to communicate, send or transmit any text, video, audio, or image. (Sec.2(1)(ha) of IT Act, 2000)
“Computer” means any electronic, magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network (Sec.2(1)(i) of IT Act, 2000)
“Computer Network” means the interconnection of one or more Computers or Computer systems or Communication device through- (i) the use of satellite, microwave, terrestrial line, wire, wireless or other communication media; and (ii) terminals or a complex consisting of two or more interconnected computers or communication device whether or not the interconnection is continuously maintained. (Sec.2(1)(j) of IT Act, 2000).
“Computer Resource” means computer, communication device, computer system, computer network, data, computer database or software. (Sec.2(1)(k) of IT Act, 2000)
“Computer System” means a device or collection of devices, including input and output support devices and excluding calculators which are not programmable and capable of being used in conjunction with external files, which contain computer programmes, electronic instructions, input data, and output data, that performs logic, arithmetic, data storage and retrieval, communication control and other functions. (Sec.2(1)(l) of IT Act, 2000)
“Cybercafe” means any facility from where access to the Internet is offered by any person in the ordinary course of business to the members of the public. (Sec.2(1)(na) of IT Act, 2000)
“Cyber Security” means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction. (Sec.2(1)(nb) of IT Act, 2000) (o)
“Data” means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in a formalized manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer. (Sec.2(1)(o) of IT Act, 2000)
(p) “Digital Signature” means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3. (Sec.2(1)(p) of IT Act, 2000)
“Electronic Form” with reference to information means any information generated, sent, received or stored in media, magnetic, optical, computer memory, microfilm, computer generated micro fiche or similar device. (Sec.2(1)(r) of IT Act, 2000) “Electronic Record” means data, record or data generated, image or sound stored, received or sent in an electronic form or microfilm or computer generated microfiche. (Sec.2(1)(t) of IT Act, 2000)
“Electronic signature” means authentication of any electronic record by a subscriber by means of the electronic technique specified in the second schedule and includes a digital signature. (Sec.2(1)(ta) of IT Act, 2000)
“Function”, in relation to a computer, includes logic, control, arithmetical process, deletion, storage and retrieval and communication or telecommunication from or within a computer. (Sec.2(1)(u) of IT Act, 2000)
“Information” includes data, message, text, images, sound, voice, codes, computer programmes, software and databases or microfilm or computer generated microfiche. (Sec.2(1)(v) of IT Act, 2000)
“Intermediary” with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web 14 hosting service providers, search engines, online payment sites, online-auction sites, online market places and cyber cafes. (Sec.2(1)(w) of IT Act, 2000)
“Key Pair”, in an asymmetric cryptosystem, means a private key and its mathematically related public key, which are so related that the public key can verify a digital signature created by the private key. (Sec.2(1)(x) of IT Act, 2000)
“Originator” means a person who sends, generates, stores or transmits any electronic message or causes any electronic message to be sent, generated, stored or transmitted to any other person but does not include an intermediary. (Sec.2(1)(za) of IT Act, 2000)
“Private Key” means the key of a key pair used to create a digital signature. (Sec.2(1)(zc) of IT Act, 2000)
“Public Key” means the key of a key pair used to verify a digital signature and listed in the Digital Signature Certificate. (Sec.2(1)(zd) of IT Act, 2000)
“Secure System” means computer hardware, software, and procedure that -: (a) are reasonably secure from unauthorized access and misuse; (b) provide a reasonable level of reliability and correct operation; (c) are reasonably suited to performing the intended functions, and (d) adhere to generally accepted security procedures. (Sec.2(1)(ze) of IT Act, 2000)
“Subscriber” means a person in whose name the Electronic Signature Certificate is issued. (Sec.2(1)(zg) of IT Act, 2000)
ABOUT INFORMATION TECHNOLOGY ACT, 2000
Information Technology Act, 2000 is India’s mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format. This legislation has touched varied aspects pertaining to electronic authentication, digital (electronic) signatures, cyber crimes and liability of network service providers.
The Preamble to the Act states that it aims at providing legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “electronic commerce”, which involve the use of alternatives to paper-based methods of communication and storage of information and aims at facilitating electronic filing of documents with the Government agencies.
This Act was amended by Information Technology Amendment Bill, 2008 which was passed in Lok Sabha on 22nd December 2008 and in Rajya Sabha on 23rd December 2008. It received the assent of the President on 5th February 2009 and was notified with effect from 27/10/2009.
The IT Act of 2000 was developed to promote the IT industry, regulate eCommerce, facilitate e-governance and prevent cybercrime. The Act also sought to foster security practices within India that would serve the country in a global context.
The Amendment was created to address issues that the original bill failed to cover and to accommodate further development of IT and related security concerns since the original law was passed. The IT Act, 2000 consists of 90 sections spread over 13 chapters [Sections 91, 92, 93 and 94 of the principal Act were omitted by the Information Technology (Amendment) Act 2008 and has 2 schedules.[ Schedules III and IV were omitted by the Information Technology (Amendment) Act 2008].
SALIENT FEATURES OF THE INFORMATION TECHNOLOGY ACT, 2000
The term ‘digital signature’ has been replaced with ‘electronic signature’ to make the Act more technology-neutral.
A new section has been inserted to define ‘communication device’ to mean cell phones, personal digital assistance or combination of both or any other device used to communicate, send or transmit any text video, audio or image.
A new section has been added to define cyber cafe as any facility from where the access to the internet is offered by any person in the ordinary course of business to the members of the public.
A new section has been added to define cyber cafe as any facility from where the access to the internet is offered by any person in the ordinary course of business to the members of the public.
A new definition has been inserted for an intermediary.
A new section 10A has been inserted to the effect that contracts concluded electronically shall not be deemed to be unenforceable solely on the ground that electronic form or means was used.
The damages of Rs. One Crore prescribed under section 43 of the earlier Act of 2000 for damage to computer, computer system etc. has been deleted and the relevant parts of the section have been substituted by the words, ‘he shall be liable to pay damages by way of compensation to the person so affected’.
A new section 43A has been inserted to protect sensitive personal data or information possessed, dealt or handled by a body corporate in a computer resource which such body corporate owns, controls or operates.
If such body corporate is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, it shall be liable to pay damages by way of compensation to the person so affected.
Sections 66A to 66F has been added to Section 66 prescribing punishment for offences such as obscene electronic message transmissions, identity theft, cheating by impersonation using computer resource, violation of privacy and cyber terrorism.
Section 67 of the IT Act, 2000 has been amended to reduce the term of imprisonment for publishing or transmitting obscene material in electronic form to three years from five years and increase the fine thereof from Rs.100,000 to Rs. 500,000. Sections 67A to 67C have also been inserted.
While Sections 67A and B deal with penal provisions in respect of offences of publishing or transmitting of material containing sexually explicit act and child pornography in electronic form, Section 67C deals with the obligation of an intermediary to preserve and retain such information as may be specified for such duration and in such manner and format as the central government may prescribe.
In view of the increasing threat of terrorism in the country, the new amendments include an amended section 69 giving power to the state to issue directions for interception or monitoring or decryption of any information through any computer resource. Further, sections 69A and B, two new sections, grant power to the state to issue directions for blocking for public access of any information through any computer resource and to authorize to monitor and collect traffic data or information through any computer resource for cybersecurity.
Section 79 of the Act which exempted intermediaries has been modified to the effect that an intermediary shall not be liable for any third party information data or communication link made available or hosted by him if; (a) The function of the intermediary is limited to providing access to a communication system over which information made available by third parties is transmitted or temporarily stored or hosted; (b) The intermediary does not initiate the transmission or select the receiver of the transmission and select or modify the information contained in the transmission; (c) The intermediary observes due diligence while discharging his duties.
However, section 79 will not apply to an intermediary if the intermediary has conspired or abetted or aided or induced whether by threats or promise or otherwise in the commission of the unlawful act or upon receiving actual knowledge or on being notified that any information, data or communication link residing in or connected to a computer resource controlled by it is being used to commit an unlawful act, the intermediary fails to expeditiously remove or disable access to that material on that resource without vitiating the evidence in any manner.
A proviso has been added to Section 81 which states that the provisions of the Act shall have overriding effect. The proviso states that nothing contained in the Act shall restrict any person from exercising any right conferred under the Copyright Act, 1957.
OVERVIEW OF THE INFORMATION TECHNOLOGY ACT, 2000
The Information Technology Act was enacted with a view to give a fillip to the growth of electronic-based transactions, to provide legal recognition for e-commerce and e-transactions, to
facilitate e-governance, to prevent computer-based crimes and ensure security practices and procedures in the context of the widest possible use of information technology worldwide.
APPLICABILITY OF THE ACT
The Act will apply to the whole of India unless otherwise mentioned. It applies also to any offence or contravention thereunder committed outside India by any person.
The Act shall not apply to the following documents or transactions –
A negotiable instrument as defined in Sec.13 of the Negotiable Instruments Act, 1881;
A power of attorney as defined in Sec.1A of the Powers of Attorney Act, 1882;
A trust as defined in Section 3 of the Indian Trusts Act, 1882;
A Will as defined in Sec.2(h) of the Indian Succession Act, 1925 including any other testamentary disposition by whatever name called;
Any contract for the sale or conveyance of immovable property or any interest in such property.
SCHEME OF THE ACT
Chapter – I – Preliminary
Chapter – II – Digital Signature and Electronic Signature (Sections 3 & 3A)
Chapter – III – Electronic Governance (Sections 4 to 10A)
Chapter – IV – Attribution, Acknowledgement and Dispatch of Electronic Records (Sections 11 to 13)
Chapter – V – Secure electronic records and secure electronic signatures (Sections 14 to 16)
Chapter – VI – Regulation of Certifying Authorities (Sections 17 to 34)
Chapter – VII – Electronic Signature Certificates (Sections 35 to 39)
Chapter – VIII – Duties of Subscribers (Sections 40 to 42)
Chapter – IX – Penalties, Compensation and Adjudication (Sections 43 to 47)
Chapter X – The Cyber Appellate Tribunal (Sections 48 to 64)
Chapter XI – Offences (Sections 65 to 78)
Chapter XII – Intermediaries not to be liable in certain cases (Section 79)
Chapter XIIA – Examiner of Electronic Evidence (Section 79A)
Chapter XIII – Miscellaneous (Sections 80 to 90)
First Schedule – Documents or Transactions to which the Act shall not apply
Second Schedule – Electronic signature or Electronic authentication technique or procedure
IMPORTANT PROVISIONS OF THE ACT
A) Digital signature and Electronic signature:
Digital Signatures provide a viable solution for creating legally enforceable electronic records, closing the gap in going fully paperless by completely eliminating the need to print documents for signing. Digital signatures enable the replacement of slow and expensive paper-based approval processes with fast, low-cost, and fully digital ones.
The purpose of a digital signature is the same as that of a handwritten signature. Instead of using pen and paper, a digital signature uses digital keys (public-key cryptography). Like the pen and paper method, a digital signature attaches the identity of the signer to the document and records a binding commitment to the document.
However, unlike a handwritten signature, it is considered impossible to forge a digital signature the way a written signature might be. In addition, the digital signature assures that any changes made to the data that has been signed cannot go undetected.
Digital signatures are easily transportable, cannot be imitated by someone else and can be automatically time-stamped. A digital signature can be used with any kind of message, whether it is encrypted or plaintext. Thus Digital Signatures provide the following three features:-
(i) Authentication– Digital signatures are used to authenticate the source of messages. The ownership of a digital signature key is bound to a specific user and thus a valid signature shows that the message was sent by that user. Integrity – In many scenarios, the sender and receiver of a message need assurance that the message has not been altered during transmission. Digital Signatures provide this feature by using cryptographic message digest functions.
(ii) Integrity– In many scenarios, the sender and receiver of a message need assurance that the message has not been altered during transmission. Digital Signatures provide this feature by using cryptographic message digest functions.
(iii) Non-Repudiation – Digital signatures ensure that the sender who has signed the information cannot at a later time deny having signed it.
A handwritten signature scanned and digitally attached with a document does not qualify as a Digital Signature. An ink signature can be easily replicated from one document to another by copying the image manually or electronically. Digital Signatures cryptographically bind an electronic identity to an electronic document and the digital signature cannot be copied to another document.
B) ELECTRONIC SIGNATURE
This has also been dealt with under Section 3A of the IT Act, 2000. A subscriber can authenticate any electronic record by such electronic signature or electronic authentication technique which is considered reliable and may be specified in the Second Schedule.
Any electronic signature or electronic authentication technique will be considered reliable if-
The signature creation data or the authentication data are, within the context in which they are used, linked to the signatory or, as the case may be, the authenticator and of no other person;
The signature creation data or the authentication data were, at the time of signing, under the control of the signatory or, as the case may be, the authenticator and of no other person;
Any alteration to the electronic signature made after affixing such signature is detectable;
Any alteration to the information made after its authentication by electronic signature is detectable; and
It fulfils such other conditions which may be prescribed. An electronic signature will be deemed to be a secure electronic signature if-
(i) the signature creation data, at the time of affixing the signature, was under the exclusive control of signatory and no other person; and
(ii) the signature creation data was stored and affixed in such exclusive manner as may be prescribed. (Sec.15)
An Amendment to the IT Act in 2008 introduced the term electronic signatures. The implication of this Amendment is that it has helped to broaden the scope of the IT Act to include new techniques as and when technology becomes available for signing electronic records apart from Digital Signatures.
There are various other provisions of the IT Act which are important which are as follows:
E-Governance
Attribution, Acknowledgement and Dispatch of Electronic Records
Certifying Authorities
Controller of Certifying Authorities (CCA)
Root Certifying Authority of India (RCAI)
Certifying Authorities
Under the IT Act the licensed Certifying Authorities (CAs) are –
Safescrypt
NIC
IDRBT
TCS
MTNL
Customs and Central Excise
(n)Code Solutions CA (GNFC)
e-Mudhra
NOW LET’S COME TO THE POINT THAT “WHO CAN BECOME A CERTIFYING AUTHORITY”?
The following persons can apply for the grant of a licence to issue Digital Signature Certificates, namely:-
(a) an individual, being a citizen of India and having a capital of five crores of rupees or more in his business or profession;
(b) a company having–
(i) paid-up capital of not less than five crores of rupees; and
(ii) net worth of not less than fifty crores of rupees: No company in which the equity share capital held in aggregate by the Non-resident Indians, Foreign Institutional Investors, or foreign companies, exceeds forty-nine per cent of its capital, will be eligible for grant of licence.
(c) a firm having – (i) capital subscribed by all partners of not less than five crores of rupees; and (ii) net worth of not less than fifty crores of rupees. No firm, in which the capital held in aggregate by any Non-resident Indian, and foreign national, exceeds forty-nine per cent of its capital, will be eligible for grant of licence.
(d) Central Government or a State Government or any of the Ministries or Departments, Agencies or Authorities of such Governments.
There are various other important provisions also that are to be kept in mind in relation to the certifying authority:-
Submission of performance bond
Submission of application:- Every application for a licensed Certifying Authority should be made to the Controller in the form given in Schedule I of the Information Technology (Certifying Authorities) Rules, 2000. Rule 10 of IT (Certifying Authorities) Rules, 2000 prescribes what all are the documents to be submitted along with the application.
Issuance of licence
Security Guidelines for Certifying Authorities
Commencement of Operation by Licensed Certifying Authorities
Procedures to be followed by Certifying Authorities
Audit of Certifying Authority
Registration Authority (RA)
ELECTRONIC SIGNATURE CERTIFICATES
Provisions relating to Electronic/Digital signature certificates are covered in Chapter VII i.e. Secs.35 to 39 of the IT Act, 2000 and Rules 23 to 30 of the IT (Certifying Authorities) Rules, 2000 and IT (Certifying Authority) Regulations, 2001. A Digital Signature Certificate is an electronic document which uses a digital signature to bind together a public key with an identity — information such as the name of a person or an organization, their address, and so forth. Digital certificates are the digital equivalent (i.e. electronic format) of physical or paper certificates. Examples of physical certificates are driver’s licenses, passports or membership cards.
Depending upon the requirement of assurance level and usage of Digital Signature Certificate, the following are the classes of Digital Signature Certificates:-
1) Class -1 Certificate
2) Class – 2 Certificate
3) Class – 3 Certificate
Different types of digital signature certificates that are issued:–
1) Individual Digital Signature Certificates (Signing Certificates)
2) Server Certificates
3) Encryption Certificates
Certificate Revocation
Digital Signature Certificates are issued with a planned lifetime, which is defined through a validity start date and an explicit expiration date. A certificate may be issued with a validity of up to two years. Once issued, a Certificate is valid until its expiration date. Under such circumstances, the issuing CA needs to revoke the certificate. In case a Digital Signature Certificate is compromised, one should immediately contact the respective CA to initiate revocation. The CA will then put the certificate in the Certificate Revocation List.
Duties of Subscribers
“Subscriber” means a person in whose name the Electronic Signature Certificate is issued. Chapter VIII i.e. Secs.40 to 42 of the IT Act, 2000 deals with the duties of subscribers.
CASE LAWS
i) State of Tamil Nadu Vs Suhas Katti
The Case of Suhas Katti is notable for the fact that the conviction was achieved successfully within a relatively quick time of 7 months from the filing of the FIR. Considering that similar cases have been pending in other states for a much longer time, the efficient handling of the case which happened to be the first case of the Chennai Cyber Crime Cell going to trial deserves a special mention.
The case related to the posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also forwarded to the victim for information by the accused through a false e-mail account opened by him in the name of the victim.
The posting of the message resulted in annoying phone calls to the lady in the belief that she was soliciting. Based on a complaint made by the victim in February 2004, the Police traced the accused to Mumbai and arrested him within the next few days. The accused was a known family friend of the victim and was reportedly interested in marrying her.
She, however, married another person. This marriage later ended in divorce and the accused started contacting her once again. On her reluctance to marry him, the accused took up the harassment through the Internet. On 24-3-2004 Charge Sheet was filed u/s 67 of IT Act 2000, 469 and 509 IPC before The Hon’ble Addl. CMM Egmore by citing 18 witnesses and 34 documents and material objects.
The same was taken on file in C.C.NO.4680/2004. On the prosecution side, 12 witnesses were examined and entire documents were marked as Exhibits. The Defence argued that the offending mails would have been given either by the ex-husband of the complainant or the complainant herself to implicate the accused as accused alleged to have turned down the request of the complainant to marry her.
Further, the Defence counsel argued that some of the documentary evidence was not sustainable under Section 65B of the Indian Evidence Act. However, the court relied upon the expert witnesses and other evidence produced before it, including the witnesses of the Cyber Cafe owners and came to the conclusion that the crime was conclusively proved. Ld.
Additional Chief Metropolitan Magistrate, Egmore, delivered the judgement on 5-11-04 as follows: ” The accused is found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused is convicted and is sentenced for the offence to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offence u/s 509 IPC sentenced to undergo 1-year Simple imprisonment and to pay fine of Rs.500/- and for the offence, u/s 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/- All sentences to run concurrently.” This is considered as the first case convicted under Section 67 of the Information Technology Act 2000 in India.
ii) Syed Asifuddin and Ors. V. The State of AP. & Anr., 2005CriLJ4314
Tata Indicom employees were arrested for manipulation of the electronic 32-bit number (ESN) programmed into cell phones that were exclusively franchised to Reliance Infocomm. The court held that such manipulation amounted to tampering with computer source code as envisaged by section 65 of the Information Technology Act, 2000.
Reliance Infocomm launched a scheme under which a cell phone subscriber was given a digital handset worth Rs. 10,500/- as well as a service bundle for 3 years with an initial payment of Rs. 3350/- and monthly outflow of Rs. 600/-. The subscriber was also provided with a 1-year warranty and 3-year insurance on the handset.
The condition was that the handset was technologically locked so that it would only work with the Reliance Infocomm services. If the customer wanted to leave Reliance services, he would have to pay some charges including the true price of the handset. Since the handset was of a high quality, the market response to the scheme was phenomenal.
Unidentified persons contacted Reliance customers with an offer to change to a lower-priced Tata Indicom scheme. As part of the deal, their phone would be technologically “unlocked” so that the exclusive Reliance handsets could be used for the Tata Indicom service.
Reliance officials came to know about this “unlocking” by Tata employees and lodged a First Information Report (FIR) under various provisions of the Indian Penal Code, Information Technology Act and the Copyright Act.
The police then raided some offices of Tata Indicom in Andhra Pradesh and arrested a few Tata Tele Services Limited officials for reprogramming the Reliance handsets. These arrested persons approached the High Court requesting the court to quash the FIR on the grounds that their acts did not violate the said legal provisions.
Some of the issues raised by the defence in the case were – It is always open for the subscriber to change from one service provider to the other service provider; The subscriber who wants to change from Tata Indicom always takes his handset, to other service providers to get service-connected and to give up Tata services; The handsets brought to Tata by Reliance subscribers are capable of accommodating two separate lines and can be activated on principal assignment mobile ( NAM 1 or NAM 2).
The mere activation of NAM 1 or NAM 2 by Tata in relation to a handset brought to it by a Reliance subscriber does not amount to any crime; A telephone handset is neither a computer nor a computer system containing a computer programmed; there is no law in force which requires the maintenance of “computer source code”. Hence section 65 of the Information Technology Act does not apply.
Following were the observations of the Court –
As per section 2 of the Information Technology Act, any electronic, magnetic or optical device used for storage of information received through satellite, microwave or other communication media and the devices which are programmable and capable of retrieving any information by manipulations of electronic, magnetic or optical impulses is a computer which can be used as a computer system in a computer network.
The instructions or programmed given to a computer in a language known to the computer are not seen by the users of the computer/consumers of computer functions. This is known as source code in computer parlance. ESN and SID come within the definition of “computer source code” under section 65 of the Information Technology Act.
When ESN is altered, the offence under Section 65 of Information Technology Act is attracted because every service provider has to maintain its own SID code and also give a customer-specific number to each instrument used to avail the services provided.
OTHER IMPORTANT CASE LAWS
P.R. Transport Agency Vs. Union of India (UOI)
SMC Pneumatics (India) Private Limited v. Jogesh Kwatra
Sports and games form an essential part of human resource development. Sports is very important for the development and excellence in the international events. Over the years a number of Nationals Sports Federations (NSFs) have come up for development of specific games/ sports disciplines.
One must actively support the sportsperson so that they can achieve their objectives and reach greater heights and also break records at the International Level tournaments like the Olympics. It has been the endeavor of the Government of India to lay down procedures for effective coordination among various agencies involved in the promotion of sports and extend required infrastructure, training and other facilities to the sportsperson for achieving excellence in the international events.
Over the years a number of Nationals Sports Federations (NSFs) have come up for development of specific games/ sports disciplines. The Government of India has been actively supporting these Federations in achieving their objectives.
Guidelines of 2001 laid down the following principles, which now stand subsumed in the National Sports Development Code of India(NSCI) 2011:
i. A clear role of dileanation between NSFs, SAI and the Government.
ii. Grouping of sport disciplines into priority, general and others for the purposes of determining the entitlement for government assistance.
iii. Detailed guidelines for preparation of Long Term Development Plans (4-year cycle). Provision made for annual sanction budgets of development plans.
iv. Binding tripartite agreements between NSFs, the Department and the SAI to be drawn up.
v. An emphasis on professionalizing and upgrading the administrative and financial management of Federations.
vi. An emphasis on systems to handle players‘ grievance.
vii. The appointment of registered chartered accountants to ensure maintenance of proper and transparent accounts.
viii. Recognition of the role of sports promoters, particularly in event management.
Recent Developments
Hon‘ble High Court of Delhi, in Civil Writ Petition No.7868 of 2005, in the matter of Indian Hockey Federation, while disposing off the matter vide Order dated 02.03.2010, categorically observed that the Government guidelines governing the NSFs are valid, binding and enforceable; and the tenure clause is not in violation of the International Olympic Charter. The Hon‘ble Court also observed that the Government of India is fully competent to make regulations on NSFs and IOA. The Hon‘ble Delhi High Court further cited entry 10 and 13 of List I (Union List) which read as under:-
Entry 10: Foreign affairs, all matters which bring the Union into relation with any foreign country. Entry 13: Participation in international conferences, associations and other bodies and implementing of decisions made thereat.
Based on the above, the Hon‘ble Court observed that while an NSF has autonomy in the actual conduct of sports, Government recognition is necessary to represent the country. It further observed that international sporting events are an essential part of diplomatic relations of the nations, and several considerations like security concerns of players,apartheid, and perceived human rights violations have guided nations in decisions to participate or not to participate in sporting events in different countries.
Political and diplomatic clearances are, therefore, required by the Indian teams before participation in the international tournaments and forums. The Court pointed out that no State Government has the competence or the jurisdiction to undertake such exercise, which is the sole prerogative of the Union Government.
In another Public Interest Litigation No.195/2010 in the matter of Rahul Mehra Vs. Union of India and Others, the Hon‘ble Delhi High Court took a serious view on the mismanagement of the Sports Sector in the country and expressed deep concern at the inaction on the part of the Government in implementing and enforcing its own guidelines,particularly those relating to age and tenure.
The gist of important new initiatives taken by the Government is indicated hereunder. These have been suitably incorporated in the subsequent paragraphs of Guidelines by replacing the existing provisions and/or adding the new provisions. The new provisions supersede the earlier provisions in the 2001 Guidelines:
Gist of new initiatives taken by Government in the recent past:
1. Restoring the limits on duration of tenure of office bearers of Indian Olympic Association and all recognized National Sports Federations. (Annexure-XIII)
2. Guidelines for Good governance in the context of Basic Universal Principle of Good Governance of Olympic and Sports Movement‖. (Annexure-XIV)
3. Annual recognition of National Sports Federations.(Annexure-XV)
4. Measures to combat fraud in age of players. (AnnexureXVI)
5. Prevention of sexual harassment of women in sports, etc.(Annexure-XVII)
6. Notifying IOA and NSFs as Public Authority under Right to Information Act. (Annexure –XVIII)
7. Drawal of advance calendar of sporting events both national and international. (Annexure-XIX)
8. National Anti-Doping Rules notified vide gazette notification no 21-4/2008-ID dated 5th February, 2010 (Annexure-XX)
9. Guidelines for efficient management of Coaching Camps, Selection of Coaches, Selection of Athletes, etc. (Annexure-XXI)
10. Representation of Indian Nationals only, in National Teams (Annexure-XXII)
Objectives of Guidelines
The objective of these Guidelines are three fold:
1. Firstly to define the areas of responsibility of the various agencies involved in the promotion and development of sports.
2. Secondly, to identify NSFs eligible for coverage under these guidelines, to set priorities, and to detail the procedures to be followed by the Federations, to avail of Government sponsorship and assistance.
3. And Lastly, To state the conditions for eligibility to receive government recognition and grant.
“N” OBLE, Law is a ‘Noble’ Profession as its purpose is to conserve and preserve the moral sanctity that binds the society and it protects and upholds the law, this is depicted in Article 14 as per the Constitution of India, the State shall not deny to any person equality before law or the equal protection of the laws within the territory of India.
“E” NERGY, we are full of ‘Energy’ and ‘zeal’ due to Lawyers providing legal aid to all as “Justice delayed is Justice denied”.
“O” BEDIENT, as Lawyers we appear in Hon’ble Court in person at certain place, time and aid the person who seeks justice when the summons, notice, order, or proclamation proceeding issued from any public servant who is legally competent to the same as stated under Section 174 of Indian Penal Code.
“N” IFTY meaning Skilful. An Advocate is effective and good in proffering legal assistance, apart from being an avid Listener and an effective communicator.
Books Referred:-
Universal Law Publications :- The Constitution of India by P.M. Bakshi, 15th edition
You must be logged in to post a comment.