Across
- 2. ________ connection is a permanent telephone connection between two points set up by a telecommunications common carrier.
- 4. ______is one such constraint in cyber space which allows us to regulate the principle of anonymity.
- 6. Regulatory __________, seen as a problem for authorities attempting to capture activities within their web, can also be seen as a solution to problems of excessive or inappropriate regulation as it limits the capacities of authorities.
- 7. This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer.
- 8. The approach of these set of people is that the cyber space is a distinct new space and it cannot be regulated.
- 9. ________is a proven technology that lets anyone place phone calls over an internet connection, Eg: Skype, Facebbok, etc. (Shortform)
- 10. ___________ was the most prominent cyber paternalistic scholar.
Down
- 1. Lessig's analysis claims that there are four bases of regulation - competition, community, design and _______.
- 3. The adoption or increase in use of digital or computer technology by an organization, industry, country, etc.
- 5. It is often viewed as the act of sending unsolicited email usually commercial messages.
