Across
- 2. ________ connection is a permanent telephone connection between two points set up by a telecommunications common carrier.
- 4. ______is one such constraint in cyber space which allows us to regulate the principle of anonymity.
- 6. Regulatory __________, seen as a problem for authorities who attempt to capture activities within the web, however it is also seen as a solution to the problems of excessive or inappropriate regulation as it aims in limiting the capacities and boundaries of authorities.
- 7. This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer.
- 8. The approach of these set of people is that the cyber space is a distinct new space and it cannot be regulated.
- 9. ________is a proven technology that lets anyone place phone calls over an internet connection, Eg: Skype, Facebbok, etc.
- 10. ___________ was the most prominent cyber paternalistic scholar
Down
- 1. Lessig's analysis claims that there are four bases of regulation - competition, community, design and _______.
- 3. The process where companies, indutries, countries, etc increase the use of digital or computer technology.
- 5. The act of sending unsolicited emails which are usually commercial messages.
