Cyber Law (Component 1 Crossword)

12345678910
Across
  1. 4. Regulatory __________, seen as a problem for authorities attempting to capture activities within their web, can also be seen as a solution to problems of excessive or inappropriate regulation as it limits the capacities of authorities.
  2. 8. The process where companies, industries, countries increase the use of digital or computer technology.
  3. 10. The approach of these set of people is the the cyber space is a distinct space and it cannot be regulated.(no space in the answer)
Down
  1. 1. _______ is one such constraint in cyber space which allows us to regulate the principle of anonymity.
  2. 2. The act of sending unsolicited email which are especially commercial messages.
  3. 3. _____ was the first type of media to be digitized and has been around for more than 5000 years.
  4. 5. ________V_______is the case in which the Supreme Court of America unanimously held that the provisions of Communications decency act (CDA), 1996 as unconstitutional as it restricted free speech with respect to the First Amendment.(Answer is a short for and it contains V (versus))
  5. 6. ________ is a proven technology that lets anyone place phone calls over an internet connection. Eg: Skype and Facebook.
  6. 7. Lawrence Lessig claims that the Internet behaviour can be regulated by four constraints namely the law, architecture, social norms and __________.
  7. 9. ___________ ____ theory put forward by Lawrence Lessig in regards with constraints as a means of regulation.(no space in the answer)