Sunteți pe pagina 1din 55

Cyber Crime and its effects on youth: An empirical study

on MBSTU students.
Saidul Islam, Criminologist in Bangladesh

Abstract
This paper explores the relevant patterns of cybercrime and its effects on the youths
and the future planning of youths to engage against cybercrime. Realizing the
importance of these two issues cybercrime and its effects has been undertaken to
provide objective data, information and taking appropriate measures to improve the
present condition. Cybercrime define as a criminal offence involving a computer as
the object of the crime, or the tool used to commit a material component of the offence
This study empirically investigate the present feature of cyber crime, its nature, types,
causes, and its effects and relationship between cybercrime and Internet users and
measure the victims of cyber crime. It is done by a questioner survey which is
included open-ended and close ended question on 80 respondent contained sociodemographic characteristic, patterns of crime, determine the harmful condition, open
opinion and analysis the causal factors among them.
In conclusion we agreed that a general remedial measure which more effective in reorientating and empowering the youths to positively utilizes their internet skill. Thus,
curbing cybercrime would require a process of utilizing internet.

Chapter one

1.1. Introduction
Cyber-crime in all of its forms is one of the fastest growing areas of criminality. More
and more criminals are exploiting the speed; convenience and anonymity that modern
technologies offer to commit a diverse range of crimes, including attacks against
computer data and systems, identity theft, the distribution of child sexual abuse
images, and Internet auction fraud. The global nature of the Internet allows criminals
to commit almost any illegal activity any wherein the world, which makes it essential
for all countries to adapt their domestic offline controls to cover crimes carried out in
cyberspace.
We read about it in newspapers very often. Let's look at the dictionary definition of
Cyber crime: "It is a criminal activity committed on the internet. This is a broad term
that describes everything from electronic cracking to denial of service attacks that
cause electronic commerce sites to lose money".
The following working definition has increasingly been accepted by Canadian law
enforcement agencies: "a criminal offence involving a computer as the object of the
crime, or the tool used to commit a material component of the offence.
"Generally speaking, based on the definition created by the Canadian Police College
and by other research sources (Carter: 1995; Davis and Hutchison: 1997), there are
two broad categories of cyber-crime.
The first category is defined where the computer is the tool of the crime.

This

category includes crimes that law enforcement has been fighting in the physical world
but now is seeing with increasing frequency on the Internet. Some of these crimes
include child pornography, criminal harassment, fraud, intellectual property violations
and the sale of illegal substances and goods.
The second category is defined where the computer is the object of the crime. Cybercrime consists of specific crimes dealing with computers and networks. These are new

crimes that are specifically related to computer technology and the Internet. For
example, hacking or unauthorized use of computer systems, defacing websites,
creation and malicious dissemination of computer viruses. In addition to cyber-crime,
there is also computer-supported crime which covers the use of computers by
criminals for communication and document or data storage. This type of crime is not
included in the definition of cyber-crime used in this report. (Carter: 1995; Davis and
Hutchison: 1997)
The terms computer crime, computer-related crime, high-tech crime, cybercrime and Internet crime are often used interchangeably when police and other
information sources are discussed.
Crimes committed primarily through Internet contact include: credit card fraud,
identity theft, child pornography, indecent chat-room behavior...Cyber crime is a term
used broadly to describe criminal activity in which computers or networks are a tool, a
target, or a place of criminal activity. These categories are not exclusive and many
activities can be characterized as falling in one or more categories.
Computer crime has been defined as any illegal act fostered or facilitated by a
computer, whether the computer is an object of a crime, an instrument used to commit
a crime, or a repository of evidence related to a crime (Royal Canadian Mounted
Police, 2000). Some of the most prominent types include child pornography. Software
piracy and network security breaches. (Royal Canadian Mounted Police, 2000)
Finally this research will present some patterns of cybercrime and its effects and
consequences of this crime in specific region i.e. MBSTU area within the student of
all department who relates to this type crimes.

1.2. Statement of the problem


Cybercrime or computer crime is a form of crime where the internet or computer is
used as tools to commit this crime. Some causes or factor which affected to commit a

cybercrime like_ capacity to store data in comparatively small space, easy to access,
complexity to do work, negligence and loss of evidence.
The focus of this paper is to investigate about cyber-status of individual perception
and their victimization by cybercrime.
Key questions to be addressed are:
What is cyber-crime?
How do I secure my wireless networking?
How do I avoid getting spammed?
How prevalent are cyber-crimes?

What types of cybercrime are related in this area?

What effects create cyber-crimes have on the students?


What the security challenges of cloud computing?
What measure should be taken by govt. and mass people to prevent these
ones?
This paper begins with a brief overview of cyber-crime. This study seeks to analyze
the effectiveness of Cybercrime on the youths at MBSTU universitys students,
especially by looking at where they use internet or computer.

1.3. Objectives of the study


The main objectives of the study are to review the present situation of youths on the
effects of cybercrime in MBSTU. This objective is to investigate overall condition

about cybercrime, its effects, and causes of cybercrime and criminogenic traits of
youths cyber-user at MBSTU.
A representative sample of the students of MBSTU was selected for study. The study
mainly aims to investigate their situation, perception, and economic loss of using
computer for the reason of cybercrime on computer.
(a) To know the types of cybercrime in the campus.
(b) To measure the victims of cyber crimes
(c) To identify other promoted crime.
(d) To identify the effect of cyber crime in this campus.
(e) To determine about relationship between cybercrime and Internet users.

1.4 .Limitation of the study

The study is only based on empirical findings gathered through survey because of the
unavailability and inaccessibility of data source. Sometimes respondent are not
communicate and avoid some uncertain question. Respondent are not agree to give

information in short period. The survey is limited to sampled respondents. For time
limitation, the scope of the study is limited and other factor influence for retraining
data collection. The study intends mainly to focus on present status of cybercrime and
its effect on youths. Unavailability of information and small sample size are the major
limitations of the study to interpret the research topic. Sometimes respondent has
inadequate knowledge about this topic. The analysis of the findings is only based on
some tools like percentage, frequency distribution, graphs, cross tabulation etc.

Chapter Two
2.1. Literature Review
The book Cybercrime: vandalizing the information society allows us look at the
problem of cybernetic crime from a more disengaging position. The author states in
the preface that the book is intended as an introduction to the topic of crimes that
occur in the Internet. Although the term cybercrime is usually restricted to describing
criminal activity in which the computer or network is an essential part of the crime,

this term is also used to include traditional crimes in which computers or networks are
used to enable the illicit activity.
Examples of cybercrime which the computer or network is a tool of the
criminal activity include spamming and criminal copyright crimes, particularly
those facilitated through peer-to-peer networks.
Examples of cybercrime in which the computer or network is a target of
criminal activity include unauthorized access (i.e, defeating access controls).
Examples of cybercrime in which the computer or network is a place of
criminal activity include theft of service (in particular, telecom fraud) and
certain financial frauds.
Face book
Increasing cybercrime
Hacking is not unknown to us. Now hacking is the major issue in the hole world.
Hacker are associated with other in a fair. In 2009, a fair of the cyber hacker arranged
for this reason hacking tendency grow rapidly. Besides hacking another criminal
tendency increase day by day. In this column categories different patterns of cyber
crime like stock spam, DDos, shooting, internal data theft, hacking face book ID,
adware, use pirate software and describe the nature and the consequence of
cybercrime. This is the feature of this column which is use in this research.
( Asrarful Alam (9 September 2011, Daily caller khontho)

According to a study performed by Shirley(11 August 2003) , a specialist in


psychology of the University of San Francisco, the majority of teenagers who hack
and invade computer systems are doing it for fun rather than with the aim of causing
harm. Shirley McGuire mentioned that quite often parents cannot understand the
motivation of the teenage hackers. She performed an anonymous experiment,
questioning more than 4,800 students in the area of San Diego. Her results were
presented at the American Psychological Association conference:
38% of teenagers were involved in software piracy;

18% of all youngsters confessed of entering and using the information stored
on other personal computer or website;
13% of all the participants mentioned they performed changes in computer
systems or computer files. (APA,2003)

(Net: http://www.iap.nl.com/speeches_annual_conference_2003_
Washington/investigating
cybercrime_related_offences_speech_by_han_bong_jo.html)

Microsoft Research: Cybercrime Surveys are Useless


Barely a week goes by that woeful statistics on the proliferation of cyber crime don't
make headlines in the trade and mainstream press. But a new study by Microsoft
Research finds that many of those surveys are as rife with catastrophic statistical
errors as to make their conclusions almost useless. Cyber crime surveys are so
compromised and biased that no faith whatever can be placed in their findings," said
the paper's authors, Microsoft researchers Cormac Herley and Dinei Florncio.

A number of issues that negatively impact cybercrime surveys, among them: finding
survey populations that represent the general public, the relative rarity of cybercrime
incidents, especially when balanced of against the huge volume of legitimate online
activity, and the effect of so-called "outlier" incidents that can create catastrophic
statistical errors, Microsoft said. (Brian Donohue, Paul Roberts; 2001)
Crime and the Internet
The Internet is one of the greatest sensations of recent times. It has become a symbol
of our technological ingenuity and offers humankind an awesome array of benefits.
However, the thrill of those prospects has been accompanied by public fears about the

potential scale of criminal opportunities that can arise. Fears, which, in the absence of
reliable information to the contrary, have been nurtured and sustained by media
sensationalism. Yet, our practical experience of the Internet is that few of these fears
have actually been realized. Furthermore, there is clearly emerging a body of evidence
to show that the criminal reality of the Internet is not the all engulfing cybertsunami, but, like the terrestrial world, a large range of frequently occurring smallimpact crimes. One could argue that criminologists have been slow to explore these
emerging fears and new criminal behaviors, and engage in debate about them in order
to develop useful bodies of knowledge that could enlighten the public and provide the
basis for informed policy. In the criminologists' defense, however, it could be argued
that there is wisdom in exercising caution and in waiting for reliable trends of
behavior to emerge. But in the first years of the new millennium, the questions about
what cybercrimes are, what their impact will be and how we should respond to them
remain largely unanswered: the time for understanding is now. (David S. Wall, 2006)

The Computer Software Copyright Act of 1980


In the best tradition of most books on information society, this one opens with the
description of the development of information society and the spread of the Internet
from the very beginning.. The concrete terms defining patent and copyright laws made
it difficult to determine where computer software fit in the picture until the Computer
Software Copyright Act of 1980. This act copyrights software as a 'literary work.'
(Forester, 32). Software piracy has been commonplace since data storage systems for
computers, such as floppy disks and hard drives, became readily available to the
public. Today, the more publicized cases of software piracy usually focus on
businesses sharing a few copies of software for many computers and overseas piracy
rings who copy and resell software that is either outrageously expensive or
unavailable in these countries

Spam is a crime in which bulk email is sent out unsolicited for commercial purposes.
Laws prohibiting spam have been in place in some form for quite some time, but
specific laws making spam illegal (anti-spam laws) are quite new.
Cyber crime and Punishment
The growing danger from crimes committed against computers, or against information
on
Computers, is beginning to claim attention in national capitals. In most countries
around the world, however, existing laws are likely to be unenforceable against such
crimes. Self-protection, while essential, is not sufficient to make cyberspace a safe
place to conduct business. The rule of law must also be enforced. Countries where
legal protections are inadequate will become increasingly less able to compete in the
new economy.

As cyber crime increasingly breaches national borders, nations

perceived as havens run the risk of having their electronic messages blocked by the
network.

This report analyzes the state of the law in 52 countries. It finds that only ten of these
nations have amended their laws to cover more than half of the kinds of crimes that
need to be addressed. It is clear that a great deal of additional work is needed before
organizations and individuals can be confident that cyber criminals will think twice
before attacking valued systems and information.
(Source by McConnelInternational;CYBERCRIMEAND PUNISHMENT? 1999)

Bangladesh perspectives of cybercrime and its effects


On 23 August 2004 an email was sent to Bengali newspaper The Daily Prothom
Alo threatening to kill Sheikh Hasina , the praiminister of Bangladesh government

and two day later on 25 August 2004 another email were sent to the Bangladesh Police
Headquarter threatening via email.( Daily ittefaq April 11,2010)

One of the recent researches showed that a new cybercrime is being registered every
10 seconds in Britain. During 2006 the computer crooks were able to strike 3.24
million times. Some crimes performed on-line even surpassed their equivalents in real
world. In addition, experts believe that about 90% of cybercrimes stay unreported.

2.2. Conceptual framework

Cybercrime
Types

Threatening via E-mail


pornography

Frauding

Creaking Softwares
or piracy

Unauthorized access
Mailing and transmitting videos
Warning
Rationally destroy data
Complex in operating system

online

Effects on youths

Personal
Psychological
victims
Morale disorder
offender
Relationship breaks down
Role frustration
Reduce productivity

Social/ cultural

Economical

Break social harmony

Economic loss of

Isolated from the society

Gain pleasure by

Grow different subculture


Status frustration
Damage reputation

Loss of time

Data theft, mail threatening,


Online pornography watch,
Eve-teasing
A conceptual framework is used in research to outline possible courses of action or to
present a preferred approach to an idea or thought. Conceptual frameworks
(theoretical frameworks) are a type of intermediate theory that attempt to connect to
all aspects of inquiry (e.g., problem definition, purpose, literature review,
methodology, data collection and analysis). Conceptual frameworks can act like maps
that give coherence to empirical inquiry. Because conceptual frameworks are
potentially so close to empirical inquiry, they take different forms depending upon the
research question or problem.
It is a group of concepts that are broadly defined and systematically organized to
provide a focus, a rationale, and a tool for the integration and interpretation of
information. Usually expressed abstractly through word models, a conceptual
framework is the conceptual basis for many theories, such as communication theory
and general systems theory. Conceptual frameworks also provide a foundation and
organization for the educational plan in schools of nursing.
Cybercrime is one kind of criminal activities created by the people. In this conceptual
framework here first show the concept cybercrime. Then show the types 0f
cybercrime. Then show how commits cybercrime. There are several effects of effects
on the youths. Like social/cultural, economical and personnel. Where lock some factor
to influence to commit this crime. And this research found that cybercrime creates

other forms of crime. From these happened cybercrime and its effects is the main
focus of this research.

2.3. Theoretical framework


Cyberspace presents an exciting new frontier for criminologists. Virtual reality and
computer mediated communications challenge the traditional discourse of
criminology, introducing new forms of deviance, crime, and social control. As such,
very few theoretical explanations of cyber crime exist.
Routine Activity Theory
According to Lawrence Cohen and Marcus Felson, a crime occur only if there is
someone who intends to commit a crime (likely offender), something or someone to
be victimized (a suitable target) and no person present to prevent or observe the crime
( the absence of a capable guardian).(Cohen & Marcus 7919: 590-595) In this study,
using this approach because of the component which effects to commit computer
crime and modus oparendi to be use.( Adler, Mueller, Laufer; 2004)
Subculture Theory

A subculture may be defined as a group that maintains a distinctive set of values,


norms, and lifestyles which sometimes differs from the overall culture of the society.
Cloward and Ohlin have identified three major types delinquent subculture: the
criminal, the conflict, the retreats. Conflict subculture is found in areas where there is
no alliance between the criminal and the conventional elements. This subculture
features violence and/ or threat of violence as method of getting status. (Ram Ahuja,
1996 )
Differential association Theory
The late Edwin H. Sutherland is widely recognized as the most important
criminologist of twentieth century. He is best known for formulating the differential
association theory. Sutherland presented differential association primarily as a
processual theory of how individual comes to commit crimes.
His theory also has a structural dimension which included statements proposing that
conflict and social disorganization are the underlying causes of crime, because they
determine the pattern of differential association. (Roland L. Akers; 1920- 1993)
Some researchers have tried to explain cybercrimes with traditional theories, such as
Social Learning Theory ( Skinner and Fream 1997; Rogers 1999; 2001), Kohlbergs
Moral Development Theory and Differential Reinforcement Theory ( Rogers 2001 ),
Cohens Strain Theory ( O Connor 2003 ), Deindividuation Theory ( Demetriou and
Silke 2003 ), Gottfredson and Hirschis General Theory of Crime ( Foster 2004 ),
and multiple Theories ( McQuade 2005; Tylor et.al 2005; Drain et. al 2006 ).
However, these theoretical explanations were found to be inadequate as an overall
explanation for the phenomenon of cybercrimes, because cybercrimes are different
from crime of physical space.
The Space Transition Theory
There is a need for a theory for the cybercrimes. Therefore, this paper is directed at
theory building for the explanation of criminal behavior in the cyberspace, and
presents the Space Transition Theory. Space Transition Theory is an explanation

about the nature of the behavior of the persons who bring out their conforming and
nonconforming behavior in the physical space and cyberspace ( Jaishankar 2008 ).
Space Transition involves the movement of persons from one space to another. Space
Transition Theory is developed in order to explain the causation of crimes in the
cyberspace. Space Transition Theory is published in a book title crimes of the
Internet edited by Frank Schmalleger & Michael Pitaro, published by Prentice Hall
(2008: 283-301).
In this study, emphasize the criminal behavior which spread out from unfortunately
when one person is engage in computer network or internet.

2.4. Working Definition


What is this cybercrime? We read about it in newspapers very often. Lets look at the
dictionary definition of cybercrime: It is a criminal activity committed on the
internet. This is a board term that describes everything from electronic cracking to
denial of service attacks that cause electronic sites to lose money.
Youth means the age groups are belongs to 18-25 years
Computer crime, or cybercrime, refers to any crime that involves a computer and
a network.
The computer may have been used in the commission of a crime, or it may be the
target.
Net crime refers to criminal exploitation of the Internet. Such crimes may threaten a
nations security and financial health.
Issues surrounding this type of crime has become high-profile, particularly those
surrounding cracking, copyright infringement, child pornography, and child grooming.
There are also problems of privacy when confidential information is lost or
intercepted, lawfully or otherwise.
Computer crime has been defined as any illegal act fostered or facilitated by a
computer, whether the computer is an object of a crime, an instrument used to commit
a crime, or a repository of evidence related to a crime. Some of the most prominent
types include online pornography, Software piracy and network security breaches.

Chapter Three
3. Methodology of the study
Methodology is a system of explicit and procedures upon which research is based and
against which claims for knowledge are evaluated. Methodology contains the all
process of the study.
In methodology discuss the process area of selection, population and sample selection,
data collection methods and techniques, and data analysis techniques.

3.1. Study Area


This research work is related with cybercrime its effects on youths. For starting on this
study need appropriate field that can response to the question paper.
Given priority on these matters purposively choose Mawlana Bhashani Science And
Technology University, Tangail as a study area. There are some reasons to choose this
university as this study area. Most of them are belong is this study in here. So, huge
amount data are available.

3.2. Sampling Design

The entire set of relevant units of analysis, or data is called the population. In this
research the populations are those who may relate the research in the students of
MBSTU.
Here, a large number of students in this university. For this research accuracy and to
saving time, it was not possible to study in a large number of populations. So a
sampling was needed to do a meaningful work & to find out proper findings. Here
population was not known, so non probability sampling was used. For this reason,
Purposive sampling that is a process where sampling a sample based on prior
experiences with the population of interest.

3.3. Data Collection Method


Survey method is used in this research for data collection. Sample Survey method is
common features of this Survey. A questionnaire was obtained with some questions
which collected by interview survey. Then the respondents are asked those questions
to answer. The answers given by the respondents were noted in the questionnaire
form.

3.4. Data Processing


After the collection of data I edit the data. In the time of data collection I use openended and close-ended questionnaire in interview schedule questionnaire. After
collection the data, all finding data convert to coding. And through this coding I make
this questionnaire as close-ended questionnaire.

3.5. Data Analysis


In data analysis, analyze this data through SPSS Program in computer. Here at first
analysis this data by univariate analysis for describing data with frequency
distributions and graphic presentation such as pie chart, bar chart, histogram. Then
analyze the data by bi-variate analyzes with cross tabulation.

Chapter Four

4. Research findings
4.1. Socio- demographic analysis
Demography is the statistical study of human population. It can be a very general
science that can be applied to any kind of dynamic human population, that is, one that
changes over time or space (see population dynamics). It encompasses the study of the
size, structure and distribution of these populations, and spatial and/or temporal
changes in them in response to age, sex, religion, social status, educational
qualification.
The term demographics refers to characteristics of a population
Demographic analysis can be applied to whole societies or to groups defined by
criteria such as age, sex, family status, education, religion. Institutionally, demography
is usually considered a field of sociology, though there are a number of independent
demography departments. Formal demography limits its object of study to the
measurement of populations processes, while the broader field of social demography
population studies also analyzes the relationships between economic, social, cultural
and biological processes influencing a population.
Demographic profiling is essentially an exercise in making generalizations about
groups of people. As with all such generalizations many individuals within these
groups will not conform to the profile - demographic information is aggregate and
probabilistic information about groups, not about specific individuals. Critics of
demographic profiling argue that such broad-brush generalizations can only offer such
limited insight and that their practical usefulness is debatable. However, if the
conclusions drawn are statistically valid and reproducible, these criticisms are not as
well founded.

Most demographic information is also culturally biased. The generational cohort


information above, for example, applies primarily to North America (and to a lesser
extent to Western Europe) and it may be unfruitful to generalize conclusions more
widely as different nations face different situations and potential challenges

Table 4.1.1: Age of the respondent

Age

Frequency

Percent

18-20 years

15

18.8

21-22years

11

13.8

23-24years

49

61.3

25-27 years

6.3

Total

80

100.0

Age is one of the important demographic characters. Age may refer to: the length of
time that an organism has lived. In this research found that respondent age limit
belongs to 18-27 which is defined as youths. The present study, in this table we can
see that there are about 18.8(percent) belong in the age group of 18 - 20 years and
13.8(percent) of them are 21-22 years, and 61.3(percent) of them are belong 23 - 24
and 6.3(percent) of them are belong 25-27of all respondent. This study shows that
highest amount of crime were committed or related or faced by the age group. This
study shows that highest amount of crime were committed or related or faced by the
age group of 23-24 in the society.

Chart 4.2.1: sex of the respondent

Sex of the respondent

36%
male
64%

female

Figure: Sex of the respondent

Males are more involved in outside activities. For these reasons male have more
possibility than female to get contact with crime and show criminality. It is recognized
that the rate of crime is high than female. From this chart we can see that there are
64(Percent) respondents out of 100 are male and 36(Percent) respondents out of 100
are female of total respondent (show above figure).

Table 4.1.2: Religion of the respondent

Religion

Frequency

Percent

Islam

65

81.3

Hindu

15

18.8

Total

80

100.0

From this table we can see that there are 81.3(Percent) respondents out of 100 are
Islam and 18.8(Percent) respondents out of 100 is Hindu of total respondent. Here we
can see that respondent is heterogeneous characteristics.

Table 4.1.3: Living place of the respondent


Living place

Frequency

Percent

Mess

23

28.8

Home

6.3

University hall

51

63.8

others

1.3

Total

80

100.0

In this table we can see that there are 28.8(Percent) respondents out of 100 are living
in mess and 6.3 (Percent) respondents out of 100 are living in home and 63.8 (Percent)
respondents out of 100 are living in university hall and 1.3(Percent) are living other
place of total respondent

Table 4.1.4: Guardian's occupation


Guardian's occupation

Govt. employer
Non-govt. employer
Business
Teacher
Farmer
Others
Total

Frequency

Percent

23
5
15
11
9
17
80

28.8
6.3
18.8
13.8
11.3
21.3
100.0

In this table we can see that there are 28.8(Percent) respondents out of 100 where their
Guardian's occupation was govt. employer and 6.3 (Percent) are non-govt. employer
and 18.8 (percent) are business men and 13.8 (percent) are teacher and 11.3 (percent)
are farmer and 21.3 (percent) other occupation of the respondent.

Chart 4.2.2: Monthly expenditure of the respondent.

Figure: Monthly expenditure of the respondent

Monthly expenditure shows t he economic status of one society which is associated


with the Development of technology and sometimes may increase the scope of cyber
criminality and victimization. In general tradition, crime patterns depends on their
economic condition. In this research, show that monthly expenditure sometimes
influence individual to commit cybercrime. In this figure we can see that most of the
respondents are monthly expend 3000-3500 taka and comparatively fewer respondents
expend monthly 5000-5500 taka and other respondents are monthly expend less 2000
taka.

Table 4.2.1: Types of net connection are you chosen.


Use net

Types of net

Frequency

Percent

Yes

Modem

38

47.5

With mobile

41

51.3

Others

1.3

80

100.0

Total

In this table we can see that there are 47.5% respondents out of 100 are use modem
for browsingand51.3% respondents out of 100 are use mobile for net browsing and
1.3% respondents out of 100 are use other way for net browsing of total respondent.

Table 4.2.2: Reason for like this connection.


Like this connection

Frequency

Percent

High speed

14

17.5

Small disturbance of connection

10

12.5

Lower cost

17

21.3

Specific time to use

18

22.5

Both

21

26.3

Total

80

100.0

The study found that there are 17.5% respondents out of 100 are like this connection
for high speed and 12.5% respondents out of 100 are like this connection for small
disturbance of connection and 21.3% respondents out of 100 are like this connection
for lower cost and 22.5% respondents out of 100 are like this connection for specific
time to use and 26.3% respondents out of 100 are like this connection for both of total
respondent.

Table 4.2.3: Purpose of use internet of the respondent.


Browse
For study
For software
For mail or chatting

Frequency

Percent

51
1
10

63.8
1.3
12.5

For share document


For others information
All of above
Total

1
3
14
80

1.3
3.8
17.5
100.0

The study found that there are 63.8% respondents out of 100 are browsing internet for
study and 1.3% respondents out of 100 are browsing internet for software and 12.5%
respondents out of 100 are browsing internet for mail or cheating and 1.3%
respondents out of 100 are browsing internet for share document and 3.8%
respondents out of 100 are browsing internet for others information like job market
searching and 17.5% respondents out of 100 are browsing internet for all of above of
total respondent.
Table 4.2.4: Faced or conduct cybercrime and (how and why).
face or
conduct
or relates
Yes

how and why

Frequency

Percent

11.3

7
9
1
2
52
80

8.8
11.3
1.3
2.5
65.0
100.0

Unnecessary friend request and


massages
Virus attacks
Account hacking
Cheat by mail
Commit software piracy

No
Total

In this study present that net browser are faced or conducted or related of cyber crime.
For this question we found that about65.0% are not faced or conducted or related of
cyber crime and 11.3% are faced or conducted or related of unnecessary friend request
and massage, and 8.8% are faced or conducted or related of virus attacks and 11.3%
are faced or conducted or related of account hacking and 1.3% are faced or conducted
or related cheat by mail and 2.5% are committed software piracy.
Table 4.2.5: Types of crimes are faced or conducted.

face
or Crime types
conduct
or relates
Yes
unnecessary mail
File theft
Use pirate software

Frequency

Percent

8
4
1

10.0
5.0
1.3

Online pornography
Virus and warm attacks
All of above

1
1.3
5
6.3
9
11.3
No
52
65.0
Total
80
100.0
In this study present that net browser are faced or conducted or related of cyber crime.
For this question we found that about 65.0% are not faced or conducted or related of
cyber crime and 10.0% are faced or conducted or related of unnecessary mail and5.0%
are faced file theft, and 1.3% are conducted pirates software and 1.3% are faced or
conducted or related online pornography and 6.3% are faced virus and warm attacks
and 11.3% are faced or conducted or related all of above of total respondent.

Software piracy
Software piracy can be defined as "copying and using commercial software purchased
by someone else". Software piracy is illegal. Each pirated piece of software takes
away from company profits, reducing funds for further software development
initiatives. The roots of software piracy may lie in the early 1960s, when computer
programs were freely distributed with mainframe hardware by hardware
manufacturers (e.g. AT&T, Chase Manhattan Bank, General Electric and General
Motors). In the late 1960s, manufacturers began selling their software separately from
the required hardware.

Table 4.2.6: Registered or licensed software of the computer.


Licensed
Yes
No
Total

Frequency

Percent

26
54
80

32.5
67.5
100.0

Every software should be Registered or licensed in every computer. But unfortunately


sometimes it is not possible. So in my research, show statistical view about which

person maintain this commitment we will show that about 32.5% respondent are able
to registered and about 67.5% respondent are not able to registered or licensed.
Chart 4.2.3: software piracy is one kinds of computer crime.

Software piracy

89%

11%

Yes
No

Figure: software piracy


According to the computer software copyright act of 1980 software piracy is one
kinds of computer crime. For this reason, in my study area most of the respondent
about 89% is said yes and 11% are said software piracy was not a crime.
Don't use pirated software or distribute commercial software to students or colleagues.
It is important that policies go beyond individual classrooms, and that schools /
districts develop software management, acquisition and implementation policies

Online pornography
Pornography, representation of sexual behavior in books, pictures, statues, motion
pictures, and other media that is intended to cause sexual excitement. The
word pornography, derived from the Greek porni (prostitute) and graphein (to
write), was originally defined as any work of art or literature depicting the life of
prostitutes. Online pornography is define as below(1) the depiction of erotic behavior (as in pictures or writing) intended to cause sexual
excitement, (2) material (as books or a photograph) that depicts erotic behavior and is
intended to cause sexual excitement, (3) the depiction of acts in a sensational manner
so as to arouse a quick intense emotional reaction .

Table 4.2.7: Browse online pornography in uncertain mind and feeling after
getting pornography on online.
Browse online
pornography
Yes

Feeling
Create bad Impacts
on mind
Feel excitement and
get pleasure
Not so good
Others

No
Total

Frequency

Percent

11.3

13

16.3

9
4
45
80

11.3
5.0
56.3
100.0

Browse online pornography is one of the major types of cybercrime. In this study
found that about 56.3% respondents are not browse online pornography in uncertain
mind and others respondents are browsed online pornography and they share their
feeling that is about 11.3% respondent feel its create bad Impacts on mind and 16.3%
respondent feel excitement and get pleasures and11.35% respondent feel its not so
good and 5.0% respondent feel other thinks that not mention by the respondent.
Table 4.2.8: Faced or conducted to any virus and warms attack or spam or
unnecessary massages and their types.
faced or
conducted or
related to any
virus
Yes

No
Total

Types

Trojan attacks and auto


run. Exe.
Unnecessary massage and
spammed massage
Locked or hacking ID
Others

Frequency

Percent

28

35.0

16

20.0

3
2
31
80

3.8
2.5
38.8
100.0

In this study present that net browser are faced or conducted or related to any virus
and warms attack or spam or unnecessary massages. From this table we found that
about 38.8% are not faced or conducted or related to any virus and warms attack or

spam or unnecessary massages and 35.0% are faced of Trojan attacks and auto run.
Exe. And 20.0% are faced unnecessary massage and spammed massage, and 3.8% are
faced ID locked and hacked and 2.5% are faced or conducted or related others of total
respondent.

Chart 4.2.4: Faced or threaten or harassed by E-mail.

Harassed by E-mail

75%

25%

Yes
No

Figure: harassment by E-mail

A working definition of email harassment might be, "electronic communication via


the Internet, intended to belittle, intimidate, abuse, or threaten another." The email
harassment might encompass one or multiple categories of legally protected
categories, such as sexual harassment, racial, religious, age, or disability harassment.
The type of harassment isn't the crux but the mode of harassment-sending harassing
messages via email. Threaten or harassed by E-mail is one of the serious factor for
increasing cybercrime. So in my research, show statistical view about 25.0% are
threaten or faced or harassment by e-mail and 75.0% are not at all.

Chart 4.2.5: Cybercrime is harmful for both user and computer network and
their types.

Harmful condition
Percent

20

17.5

16.3
12.5

11.3

10
6.3

2.5

3.8

Figure: Types of harms of the respondent

In this study also found that committing cybercrime is harmful for both user and
computer network. Where 20.0% said that this crime is not harmful for both user and
qqq q

qqqqqqqqqq

computer network and other respondent agree that cybercrime is harmful for both user
and computer. for

this reason, we show that 12.5% respondent created physical

harms and 16.3% respondent created Mental or psychological harms and 2.5%
respondent created social harms and 17.5% respondent are damaged computer and
3.8% respondent are destroyed software and11.3% respondent economically loss and
6.3% respondent are loosed of time and 10.0% respondent are more than one of the
above and this will graphically presented below.

Table 4.2.9: Other forms of crime to be committed.


commit
other

Others crime

Frequency

Percent

forms
of crime

Yes

Online pornography
Defamation
Data theft
Fraud and cheating
Eve-teasing
E-mail threatening
Robbery and money laundering
kidnapping
Others

No
Total

10
6
13
5
11
4
5
2
5
19
80

12.5
7.5
16.3
6.3
13.8
5.0
6.3
2.5
6.3
23.8
100.0

The study found that cybercrime promote tendency to commit other forms of crime. In
this table, we can see that about 23.8% respondent are not believe that cybercrime
promote tendency to commit other forms of crime and other respondent believe that
cybercrime promote tendency to commit other forms of crime. So, about 12.5%
respondent are committed online pornography and 7.5% respondent are committed
defamation or harassment and 16.3% respondent are committed data theft and 6.3%
respondent are committed fraud and cheating and 13.8% respondent are committed
eve-teasing and 5.0% respondent are committed E-mail threatening and 6.3%
respondent are committed robbery and money laundering and 2.5% respondent are
committed kidnapping and 6.3% respondent are committed others forms of crime.

Chart 4.2.6: Other forms of crime to be committed

Other forms of crime


Percent
16.3
13.8

12.5

7.5

6.3

6.3

6.3
2.5

Figure: Other forms of crime to be committed

Cybercrime is the latest and perhaps the most complicated problem in the cyber world.
Cybercrime may be said to be those species, of which, genus is the conventional
crime, and where either the computer is an object or subject of the conduct situating
crime. Any criminal activity that uses a computer either as an instrumentality, target
or means for perpetuating further crimes comes within the ambit of cybercrime. So
this figure show that about 16.3% respondent are commit data theft and then
13.8%responden commit eve-teasing and about 12.5% respondent are committed are
highest then other forms of crime( show above figure).

Table 4.2.10: Effects create by cybercrime.

Cyber crime affects more than the financial integrity of a business. There are many
very real and damaging consequences associated with Internet crime. Understanding
the effects of cyber crime is an important first step in comprehending the necessity of
security measures on a computer network.
Effects are created by cybercrime

Frequency

Percent

Social and mental harassment

29

36.3

Loss of time to study


increase criminal tendency

7
17

8.8
21.3

Virus effect on computer


Economic loss
Both positive and negative effect

13
6
8

16.3
7.5
10.0

Total

80

100.0

Cybercrime and its effect on the respondent which is the main focus of my study. In
this table we can see that there are 36.3% respondents out of 100 are focus on social
and mental harassment, 8.8% are focus on loss of time to study, 21.3% are focus on
increase crime tendency, 16.3% are Focus on virus effect on computer, 7.5% are focus
on economic loss and 10.0% are Both positive and negative effect of the respondent.

Chart 4.2.7: Enacting cyber law strictly (frequencys percentage).

Frequency

23%

78%

Yes
No

Figure: Enacting cyber law

Cyber law or Internet law is a term that encapsulates the legal issues related to use of
the Internet. It is less a distinct field of law than intellectual property or contract law,
as it is a domain covering many areas of law and regulation. Some leading topics
include internet access and usage, privacy, freedom of expression, and jurisdiction.
The Study found that most of the respondents about 77 (percent) respondent out of
100 (percent) are agree for enacting cyber law strictly and 23 (percent)) respondent
out of 100 (percent) are not agree for enacting cyber law.

4.3. Recommendation of the respondent

Recommendation is a suggestion that something is good or suitable for a particular


purpose. This research found some recommendation for protecting cybercrime. Some
of this recommendation more effective to preventive cybercrime.

Table 4.3.1: Governmental steps to prevent cybercrime.

Governmental steps

Frequency

Percent

Public awareness building

13

16.3

Careful to use net

1.3

Enforcing cyber law

46

57.5

Create cyber police

2.5

Take proper action

17

21.3

Create monitoring system

1.3

Total

80

100.0

Government should take preventive measure to protect cybercrime. Sometimes


governmental policy and their awareness building type programmers are effective to
prevent these types of crime. In this table we can see that the respondent thinking
about the measure should be taken by government to prevent this criminal tendency.
Here about 16.3% respondent was said about public awareness building, 1.3% said
careful to internet, 57.5% said about enforcing cyber law, 2.5% said to create cyber
police, 21.3% said for take proper action and 1.3% said to create monitoring system
for protecting cybercrime.

Table 4.3.2: General people should work to protect this criminality.

General people work

Frequency

Percent

Awareness building

46

57.5

Increase humanity

10.0

Work safely and carefully

13

16.3

Develop their mind

8.8

Consciousness must be grow

7.5

Total

80

100.0

Sometimes general people work together for protecting this criminality. Remove
criminal tendency is not individual consciousness of the society; sometimes it is a
group task and create awareness among this criminal tendency. In this table we can
see that the respondent thinking about the measure should be taken by general people
to protect this criminality. Here about 57.5% respondent was said about awareness
building, 10.0% said increase humanity, 16.3% said about work safely and carefully,
8.8% said to develop their mind, and 7.5% said Consciousness must be grow for
protecting cybercrime.

4.3.3: Suggestion to criminal justice system to prevent cybercrime.

Criminal justice system steps

Frequency

Percent

Implementation law properly

18

22.5

Punished strictly

26

32.5

Creating cyber policing system

20

25.0

Modifying CJS system

8.8

Increase protection

11.3

Total

80

100.0

Criminal justice system refers to the collective institutions through which an accused
offender passes until the accusations have been disposed of or the assessed
punishment concluded. The criminal justice system consists of three main parts: (1)
law enforcement (police, sheriffs, marshals); (2) adjudication (courts which include
judges, prosecutors, defense lawyers); and (3) corrections (prison officials, probation
officers, and parole officers). In a criminal justice system, these distinct agencies
operate together under the rule of law and are the principal means of maintaining the
rule of law within society.
Normally, the first contact an offender has with the criminal justice system is through
police who investigates a suspected wrong-doing and make an arrest. Next is the
court, where disputes are settled and justice is administered. In the U.S. guilt or
innocence is decided through the adversarial system. If the accused is found guilty
s/he turned over to the correctional authorities from the court system
In this table we can see that the respondent thinking about the measure should be
taken by criminal justice system to prevent cybercrime. Here about 22.5% respondent
was said about Implementation law properly, 32.5% said punished strictly, 25.0% said
about creating cyber policing system, 8.8% said modifying Criminal justice system
and 11.3% said for increase protection for protecting cybercrime.

Chart 4.2.8: Suggestion to criminal justice system to prevent cybercrime.

Figure: Suggestion to criminal justice system to prevent cybercrime.


According to the respondent opinion we can see that criminal justice system should be
punished strictly where respondent respond about 28 respondent for protecting this
crime and comparative low respond to create cyber policing system i.e. about20
respondent respond and few about 7 respondent respond for modifying CJS system.
(Show figure07)

Table 4.3.4: Responsibilities of the website owner to protect cybercrime.

responsibilities of the website owner

Frequency

Percent

Improve security system


Create Anti-hacking website

30
6

37.5
7.5

Building monitoring system

13

16.3

Prone website should be blocked

12

15.0

Protect their website by using password

19

23.8

Total

80

100.0

The responsibilities of the website owner is restraint hacker, improve security system,
building monitoring system and to protect website by using password for protecting
cyber crime. All web site developers should be aware of the importance of copyright.
All creative work is copyrighted as soon as it is put into tangible form, regardless of
whether it displays a notice or not. If you do not have permission from the copyright
holder, do not put copyrighted material on your web site.
In this table we can see that the respondent thinking about the responsibilities of the
website owner to protect cybercrime. Here about 37.5% respondent was said about
Improve security system7.5% said Create Anti-hacking website, 16.3% said about
Building monitoring system, 15.0% said Prone website should be blocked and 23.8%
said for Protecting their website by using password for protecting cybercrime. So, do
not assume that something is in the public domain simply because you see it on
someone elses site. If you are not sure, dont use it! Faculty members using
copyrighted material under Fair Use guidelines should password protect that material.

Table 4.3.5: Respondents opinion for protecting cybercrime.

Recommendations

Frequency

Percent

Make and implementation of cyber law

14

17.5

Use cyber security system

2.5

use safely and carefully

10

12.5

Reward punishment

3.8

Awareness building

51

63.8

Total

80

100.0

In this research found that respondent opinion was measurable for protecting
cybercrime. Sometimes recommendation or opinion is good or suitable for purpose.
In this table also give the information about the own opinion to protect this crime.
Here about 17.5% respondent was said make and implementation of cyber law, 2.5%
said use cyber security system, 12.5% said use safely and carefully, 3.8% said reward
punishment and 63.8% said about awareness building for protecting cybercrime.

Cross tabulation 01: Types of harms are creating Vs harmful for both user and
computer network.
Types of harms are create Vs harmful for both user and
computer network
Types of
harms are
create

N/A
Physical

Frequency
(Percentage)%
Frequency
(Percentage)%

Harmful for both user


and computer network
Yes
No
2
14
3.1%
87.5%
10
0
15.6%
.0%

Total
16
20.0%
10
12.5%

Mental/psychological
Social
Damage computer
Destroy software
economic loss
Time loss
Above more than one
Total

Frequency
(Percentage)%
Frequency
(Percentage)%
Frequency
(Percentage)%

11
17.2%
2
3.1%
14
21.9%

2
12.5%
0
.0%
0
.0%

13
16.3%
2
2.5%
14
17.5%

Frequency
(Percentage)%
Frequency
(Percentage)%
Frequency
(Percentage)%
Frequency
(Percentage)%
Frequency
(Percentage)%

3
4.7%
9
14.1%
5
7.8%
8
12.5%
64
100.0%

0
.0%
0
.0%
0
.0%
0
.0%
16
100.0%

3
3.8%
9
11.3%
5
6.3%
8
10.0%
80
100.0%

In this cross table we can see the relationship between types of harm and harmful for
both user and computer network. From this table it can be seen that the respondents
who said cyber crime create physical harm, they all (15.6%) said cyber crime is
harmful for both user and computer network. Respondents who said the harm is
mental or psychological, from them 17.2 percent said cyber crime is harmful for both
user and computer network. Respondents who said the harm is social, they all (3.1%)
said cyber crime is harmful for both user and computer network. Respondents who
said that harm is damaging computer, all of them 21.9 percent said cyber crime is
harmful for both user and computer network.

All of the respondents who said harm is destroy software, they (4.7 %) said cyber
crime is harmful for both user and computer network. All of the respondents who said
harm is economic loss, they (14.1%) said cyber crime is harmful for both user and
computer network. All of the respondents who said harm is time loss, they (7.8%)
percent said cyber crime is harmful for both user and computer network. Respondents
who said cyber crime create more harms, they all (12.5%) said cyber crime is harmful
for both user and computer network. Here 20 percent data is N/A because the

respondents give answer No for the question of cyber crime in harmful. This study
show that maximum respondents said cyber crime is harmful for both user and
computer. Who also said damage computer is the main harm of cyber crime.

Cross tabulation 02: Internet user Vs faced or conducted different types of


crimes

Cross tabulation

Interne
t user

Ye
s

frequency

faced or conducted different types of crimes


Not
faced
or
cond
uct
52

unnece
ssary
mail

File
theft

Use
pirate
softwar
e

Onlin Virus
e
and
porno warm
graph attack
y
s
1
1
5

Total
All
of
abov
e
9

80

Total

percentag
e%

65.0
%

10.0%

5.0
%

1.3%

1.3%

6.3%

11.3
%

100.0
%

frequency

52

80

percentag
e%

65.0
%

10.0%

5.0
%

1.3%

1.3%

6.3%

11.3
%

100.0
%

In this cross tabulation, we can see the relation between two variable this are internet
user and faced or conducted different type of crime where found that about 65.5%
respondent are not faced or conducted or related to this crime and other respondent are
faced or conducted or related to cyber crime. This table also show that about 10.0%
respondent faced on unnecessary mail and 5.0% respondent faced on file theft and
1.3% respondent are conduct software piracy and1.3% respondent are faced on online
pornography and6.3% respondent faced on virus and warms attacks.
And here 11.3% respondent are faced on unnecessary mail, file theft ,online
pornography, virus and warms attacks.

Chapter Five
5.1. Conclusion
Now-a-days cybercrime is a newly developed crime and the patterns and nature of this
crime is increasing broadly around the world. So the issue of cyber security must get
priority and ensure protection in every level of cyber user.
In this study present that net browser are faced or conducted or related to any virus
and warms attack or spam or unnecessary massages. From this study we found that
about 38.8% are not faced or conducted or related to any virus and warms attack or
spam or unnecessary massages and 35.0% are faced of Trojan attacks and auto run.
Exe. And 20.0% are faced unnecessary massage and spammed massage, and 3.8% are
faced ID locked and hacked and 2.5% are faced or conducted or related others

Cybercrime and its effect on the respondent which is the main focus of my study .
This study found that most of respondent said cyber crime create social and mental
harms and they believe that cyber crime create criminal tendency and sometime create
economic crisis of the respondent so we can say that cyber crime has both positive
and negative effect of the respondent. The study also found that cybercrime promote
tendency to commit other forms of crime like online pornography, defamation or
harassment, fraud and cheating, Internet data theft, eve-teasing, email threatening, and
forms of crime.
Finally cyber crime and its effects are more concerning issue in present days, so we
must concern about this issue and protect other who committed cybercrime by
increasing awareness about the bad impact of cyber crime among the youths.

5.2. Recommendation
The introduction of new technologies always presents an initial challenge for law
enforcement agencies should take proper action and build punishment system.
Government should take proper action about protecting cybercrime And general
people should be taken remedial measure like work safely and carefully, increase
awareness building, develop their mind and consciousness building for protecting this
criminality. Given the responsibilities of the website owner or authorities in protecting
their sites by improving security system, using password and building monitoring
system. In this study area found that maximum respondent argue that cyber crime can
protect by awareness building and developing policing system and rewarding
punishment.

Prevention is undoubtedly, better then cure. So he recommendation should-

Government should employed cyber security expert people for protecting cyber
crime and consequences.
The security system of the website should provide by website authorities.
Cyber law should be enacted in our country and should ensure every net browser
obey this law strictly.
The internet facilities in this area should be ensured and monitoring by using
detecting system.
The student should be awarded about cybercrime.
The student should be taught safely use and carefully operate computer and
internet.
The student should be developing their mind and avoided this crime committing
tendency and created humanity.
Take proper action to computer abuser and give proper treatment method for
preparing law abiding citizen.
Government should be enacted cyber law and implement this in every spear of life.

By this way, we can solve this criminal tendency easily and swiftly.

5.3. References
Adamski A. (1998), Crimes Related to the Computer Network. Threats and
Opportunities: A

Criminological Perspective. Helsinki, Finland: European Institute

for Crime Prevention and Control, affiliated with the United Nations
(HEUNI).Retrieved on December 15 2006, from
http://www.ulapland.fi/home/oiffi/enlist/resources/HeuniWeb.htm
Adler, Freda (2004), Criminology fifth edition . New York; Mcgraw-Hill217-219.

Akers, Ronald L. (1994), Criminological theories University of Florida; Roxbury


Publishing company.
A Global Survey of Cybercrime Legislation, International Legal Instruments, (2004),
http://www.cybercrimelaw.net/tekster/international_agencys.html.
Bohm, Robert M.; Haley Keith N. (2005), Introduction to Criminal Justice (fourth
edition) New York; Mcgraw-Hill.
Baker Therese L. (1999), Doing Social Research Third

edition . Singapore;

Mcgraw-Hill.
Convention on Cybercrime, European Treaty Series - No 185, Council of Europe,

Cyber CrimeAnd Punishment? Archaic Laws Threaten Global Information, a


report prepared by McConnell International Cybercrime, Mingail S., Canada Law
Book Inc., 2003,
http://www.canadalawbook.ca/headlines/headline317_arc.html

Cyber Millennium Challenges And Opportunities,A.P.H.Publishing Corporation


Chris Reed and John Angel,fourth edition,universal law publishing co.pvt.ltd

Computer Crimes Act 1997 (Malaysia), 09 0ctomber 2007


www.laweddie.com/wordpress/current-cyber-laws-in-malaysia

Computer Misuse Act (of Singapore)


Cybercrime Act 2001 (Australia)

C.5 Criminal Aspects of Cyberspace (Girasa, 2002),


http://telecomm.boisestate.edu/ntcomm405.fall.2003/Presentations/C5_CyberCrime.ht
m
David & Chava Frankfort Nachmias (1996), Research Methods in the Social
Sciences fifth edition, British Library Cataloguing in Publication Data, New York .
Debra Littlejohn Shinder,

Jurisdictional Issues and other Special Problems in

Enforcing and Prosecuting, MCSE


Freedman

B.

J.

The

Cybercrime,10December2001,

Council

of

Europe

Convention

on

http://www.cle.bc.ca/CLE/Analysis/Collection/01-

internetcybercrime?
practiceAreaMessage=true&practiceArea=Criminal Law
Geese G. Z. (2003), The State of the Law on Cyber jurisdiction and Cybercrime on
the Internet, California Pacific School of Law.
Han Investigation and Prosecution of Terrorist-related Offences Involving Use of the
Internet.
Hudson A. Barbara: Understanding Justice; an introduction to ideas perspectives and
controversies in modern penal theory.
http://www.en.wikipedia.org/wiki
http://www.ncsl.org/public/governn/htm
http://www.ncsl.org/programs/lis/cip/cyberterrorism.htm/
http://www.wikipedia.co.in
.
http://www.iap.nl.com/speeches_annual_conference_2003_washington/investigating_t
errorism_related_offences_speech_by_han_bong_jo.html

Ian Walden,computer crimes and investigations,publication:oxford university press

Jaishankar K. (2007). Cyber Criminology: Evolving a novel discipline with a new


journal. International Journal of Cyber Criminology, Vol 1 Issue 1 January
2007.Retrieved on March 15 2007, from
http://www40.brinkster.com/ccjournal/editorial.htm
Jewkes Yvonne (2006). Comment on the book 'Cyber crime and Society by Majid Yar,
Sage Publications. Retrieved on December 15 2006, from
http://www.sagepub.co.uk/booksProdDesc.nav?prodId=Book227351

Kothari C. R.; Research Methodology: Methods & Techniques; second edition.


Littlewood, A. (2003) Cyberporn and moral panic: an evaluation of press reactions to
pornography on the internet, Library and Information Research, 27(86), 818.
Malaysian Law and Computer Crime, Chong Yew, Wong, GSEC Practical
Assignment v1.2f
Maxfield Michael G.; Babbie Earl: Research Methods for Criminal Justice and
Criminology`
National Cyber Security Alliance. Cyber Bullying and Harassment (accessed April
25, 2010)
Oyesanya F., (2004)Nigeria: Haven for Terrorist Internet Communication?, 4
August 2004,
http://www.nigeriavillagesquare1.com/articles/femi_oyesanya/oyesanya.html
Paranjape N.V. (2005), Criminology and Penology (Twelfth edition) Central law
publication.
Reffer Pavan Dugal,Cyberlaw-The Indian Perspective ,Reprint Second Edition

Regional Working Parties,


http://www.interpol.int/Public/TechnologyCrime/WorkingParties/
Severino H. Gana (2006)Prosecution of Cybercrimes Through Appropriate Cyber
Legislation in The Republic of Philippines, a white paper prepared by, Jr., Assistant
Chief State Prosecutor, Department Of Justice, Republic Of Philippines.

Senna Joseph J; Siegel Larry J.Introduction to Criminal Justice.


Thomas, D. and Loader, B. (2000) Introduction cyber crime: law enforcement,
security and surveillance in the information age, in: D. Thomas and B. Loader (Eds.),
Cyber crime: Law Enforcement, Security and Surveillance in the Information
Age,London: Routledge.
United States Computer Emergency Readiness Team. Dealing with Cyberbullies
(accessed April 25, 2010)

Williams P.Organized Crime and Cybercrime: Synergies, Trends and Responses,


http://www.iwar.org.uk/ecoespionage/resources/state/internet-crime.htm.

Appendix 01
Mawlana Bhashani Science & Technology University
Santosh, Tangail -1902.
Research topic: Cyber Crime and Its effects on youth. An empirical study on MBSTU.
Questionnaire

Respondent ID
Part A: Socio-demographic characteristic
Age :
Sex:
1) Male
Religion:
1) Islam

2) Female.
2) Hindu

3) Christian

4) Buddhist

5) Others

4. Which Department is you study?


1) CSE 2) ICT 3) TE 4) BGE
5) CPS 6) ESRM 7) FTNS
8) Chemistry 9) Physics 10) Mathematics 11) Statistics 12) BBA
5. What is your academic year?
1) First Year
4) Fourth Year

2) Second Year
5) Fifth Year.

3) Third Year

6. Which semester you study in?


1) First Semester 2) Second Semester
7. Family status:
1) Lower class

2) Middle class

3) Higher class

4) Others

8. Living place:
1) Mess

2) Home

3) University hall

4) others

9. Monthly expenditure:
10. Guardians occupation:
1) Government employer 2) Non-Government employer
3) Business
4) Teacher
5) Farmer 6) Others

Part B: Subject related Question


11. Do you know about internet?
1) Yes

2) No

12. If yes, what type of net are you connected?


1) Broad band

13. Why like this connection?


1) High speed
3) Lower cost
above.

2) Modem

3) With mobile

4) Others

2) Small disturbance of connection


4) Specific time to use
5) all of the

14. What types of information are browse?


1) For study
3) For mail or chat

2) For software
4) For share documents

5) For others information (such as job or scholarship searching)


15. Do you know about Cybercrime or computer crime?
1) Yes

2) No

16. Are you face or conduct or related of this crime?


Yes

2) No

17. If yes, how and why?

18. If yes, what types of crime are Unnecessary mail


2) File theft
3 ) Use pirates software 4) Online pornography
5) Virus& warms attack 6) both
19. In your computer all software are registered or licensed?
1) Yes
2) No
20. Do you know software piracy is one kinds of computer crime?
1) Yes

2) No

21. Do you ever browse online pornography in uncertain mind?


Yes

2) No

22. If yes, what is your feeling after getting pornography on online?

23. Have you faced or conducted or related to any virus & warm attack or spam or
unnecessary massage?
1) Yes
2) No
24. If yes, what types?
..
25. Have you faced or threaten or harassment by E-mail?
1) Yes

2) No

26. Do you believe that committing this crime is harmful for both user and computer
network?
1) Yes
2) No
27. If yes, what type of harms are_?
1)......
2)..
3)..................
4).
5)..
28. Do you believe that this crime promote tendency to commit others forms of crime?
1) Yes

2) No

29. If yes, what types of crime to be committed?


1)......
2)..
3)..................
4).
5)..

30. What types of effects are created by cybercrime?


.
31. Do you believe that Cyber law should enacted strictly in our country?
1) Yes

C. Recommendations:

2) No

32. What measures should be taken by the government to prevent this criminal
tendency?

33. What measures should be taken by general people to prevent this criminality?

34. What measures should be taken by the criminal justice system to protect cyber
crime?

...............................................................................................................
............
35. What are the responsibilities of the Website owner to protect cyber crime that you
think?

.......................................................................................
...........
36. What is your recommendation to protect cybercrime?

S-ar putea să vă placă și