Documente Academic
Documente Profesional
Documente Cultură
on MBSTU students.
Saidul Islam, Criminologist in Bangladesh
Abstract
This paper explores the relevant patterns of cybercrime and its effects on the youths
and the future planning of youths to engage against cybercrime. Realizing the
importance of these two issues cybercrime and its effects has been undertaken to
provide objective data, information and taking appropriate measures to improve the
present condition. Cybercrime define as a criminal offence involving a computer as
the object of the crime, or the tool used to commit a material component of the offence
This study empirically investigate the present feature of cyber crime, its nature, types,
causes, and its effects and relationship between cybercrime and Internet users and
measure the victims of cyber crime. It is done by a questioner survey which is
included open-ended and close ended question on 80 respondent contained sociodemographic characteristic, patterns of crime, determine the harmful condition, open
opinion and analysis the causal factors among them.
In conclusion we agreed that a general remedial measure which more effective in reorientating and empowering the youths to positively utilizes their internet skill. Thus,
curbing cybercrime would require a process of utilizing internet.
Chapter one
1.1. Introduction
Cyber-crime in all of its forms is one of the fastest growing areas of criminality. More
and more criminals are exploiting the speed; convenience and anonymity that modern
technologies offer to commit a diverse range of crimes, including attacks against
computer data and systems, identity theft, the distribution of child sexual abuse
images, and Internet auction fraud. The global nature of the Internet allows criminals
to commit almost any illegal activity any wherein the world, which makes it essential
for all countries to adapt their domestic offline controls to cover crimes carried out in
cyberspace.
We read about it in newspapers very often. Let's look at the dictionary definition of
Cyber crime: "It is a criminal activity committed on the internet. This is a broad term
that describes everything from electronic cracking to denial of service attacks that
cause electronic commerce sites to lose money".
The following working definition has increasingly been accepted by Canadian law
enforcement agencies: "a criminal offence involving a computer as the object of the
crime, or the tool used to commit a material component of the offence.
"Generally speaking, based on the definition created by the Canadian Police College
and by other research sources (Carter: 1995; Davis and Hutchison: 1997), there are
two broad categories of cyber-crime.
The first category is defined where the computer is the tool of the crime.
This
category includes crimes that law enforcement has been fighting in the physical world
but now is seeing with increasing frequency on the Internet. Some of these crimes
include child pornography, criminal harassment, fraud, intellectual property violations
and the sale of illegal substances and goods.
The second category is defined where the computer is the object of the crime. Cybercrime consists of specific crimes dealing with computers and networks. These are new
crimes that are specifically related to computer technology and the Internet. For
example, hacking or unauthorized use of computer systems, defacing websites,
creation and malicious dissemination of computer viruses. In addition to cyber-crime,
there is also computer-supported crime which covers the use of computers by
criminals for communication and document or data storage. This type of crime is not
included in the definition of cyber-crime used in this report. (Carter: 1995; Davis and
Hutchison: 1997)
The terms computer crime, computer-related crime, high-tech crime, cybercrime and Internet crime are often used interchangeably when police and other
information sources are discussed.
Crimes committed primarily through Internet contact include: credit card fraud,
identity theft, child pornography, indecent chat-room behavior...Cyber crime is a term
used broadly to describe criminal activity in which computers or networks are a tool, a
target, or a place of criminal activity. These categories are not exclusive and many
activities can be characterized as falling in one or more categories.
Computer crime has been defined as any illegal act fostered or facilitated by a
computer, whether the computer is an object of a crime, an instrument used to commit
a crime, or a repository of evidence related to a crime (Royal Canadian Mounted
Police, 2000). Some of the most prominent types include child pornography. Software
piracy and network security breaches. (Royal Canadian Mounted Police, 2000)
Finally this research will present some patterns of cybercrime and its effects and
consequences of this crime in specific region i.e. MBSTU area within the student of
all department who relates to this type crimes.
cybercrime like_ capacity to store data in comparatively small space, easy to access,
complexity to do work, negligence and loss of evidence.
The focus of this paper is to investigate about cyber-status of individual perception
and their victimization by cybercrime.
Key questions to be addressed are:
What is cyber-crime?
How do I secure my wireless networking?
How do I avoid getting spammed?
How prevalent are cyber-crimes?
about cybercrime, its effects, and causes of cybercrime and criminogenic traits of
youths cyber-user at MBSTU.
A representative sample of the students of MBSTU was selected for study. The study
mainly aims to investigate their situation, perception, and economic loss of using
computer for the reason of cybercrime on computer.
(a) To know the types of cybercrime in the campus.
(b) To measure the victims of cyber crimes
(c) To identify other promoted crime.
(d) To identify the effect of cyber crime in this campus.
(e) To determine about relationship between cybercrime and Internet users.
The study is only based on empirical findings gathered through survey because of the
unavailability and inaccessibility of data source. Sometimes respondent are not
communicate and avoid some uncertain question. Respondent are not agree to give
information in short period. The survey is limited to sampled respondents. For time
limitation, the scope of the study is limited and other factor influence for retraining
data collection. The study intends mainly to focus on present status of cybercrime and
its effect on youths. Unavailability of information and small sample size are the major
limitations of the study to interpret the research topic. Sometimes respondent has
inadequate knowledge about this topic. The analysis of the findings is only based on
some tools like percentage, frequency distribution, graphs, cross tabulation etc.
Chapter Two
2.1. Literature Review
The book Cybercrime: vandalizing the information society allows us look at the
problem of cybernetic crime from a more disengaging position. The author states in
the preface that the book is intended as an introduction to the topic of crimes that
occur in the Internet. Although the term cybercrime is usually restricted to describing
criminal activity in which the computer or network is an essential part of the crime,
this term is also used to include traditional crimes in which computers or networks are
used to enable the illicit activity.
Examples of cybercrime which the computer or network is a tool of the
criminal activity include spamming and criminal copyright crimes, particularly
those facilitated through peer-to-peer networks.
Examples of cybercrime in which the computer or network is a target of
criminal activity include unauthorized access (i.e, defeating access controls).
Examples of cybercrime in which the computer or network is a place of
criminal activity include theft of service (in particular, telecom fraud) and
certain financial frauds.
Face book
Increasing cybercrime
Hacking is not unknown to us. Now hacking is the major issue in the hole world.
Hacker are associated with other in a fair. In 2009, a fair of the cyber hacker arranged
for this reason hacking tendency grow rapidly. Besides hacking another criminal
tendency increase day by day. In this column categories different patterns of cyber
crime like stock spam, DDos, shooting, internal data theft, hacking face book ID,
adware, use pirate software and describe the nature and the consequence of
cybercrime. This is the feature of this column which is use in this research.
( Asrarful Alam (9 September 2011, Daily caller khontho)
18% of all youngsters confessed of entering and using the information stored
on other personal computer or website;
13% of all the participants mentioned they performed changes in computer
systems or computer files. (APA,2003)
(Net: http://www.iap.nl.com/speeches_annual_conference_2003_
Washington/investigating
cybercrime_related_offences_speech_by_han_bong_jo.html)
A number of issues that negatively impact cybercrime surveys, among them: finding
survey populations that represent the general public, the relative rarity of cybercrime
incidents, especially when balanced of against the huge volume of legitimate online
activity, and the effect of so-called "outlier" incidents that can create catastrophic
statistical errors, Microsoft said. (Brian Donohue, Paul Roberts; 2001)
Crime and the Internet
The Internet is one of the greatest sensations of recent times. It has become a symbol
of our technological ingenuity and offers humankind an awesome array of benefits.
However, the thrill of those prospects has been accompanied by public fears about the
potential scale of criminal opportunities that can arise. Fears, which, in the absence of
reliable information to the contrary, have been nurtured and sustained by media
sensationalism. Yet, our practical experience of the Internet is that few of these fears
have actually been realized. Furthermore, there is clearly emerging a body of evidence
to show that the criminal reality of the Internet is not the all engulfing cybertsunami, but, like the terrestrial world, a large range of frequently occurring smallimpact crimes. One could argue that criminologists have been slow to explore these
emerging fears and new criminal behaviors, and engage in debate about them in order
to develop useful bodies of knowledge that could enlighten the public and provide the
basis for informed policy. In the criminologists' defense, however, it could be argued
that there is wisdom in exercising caution and in waiting for reliable trends of
behavior to emerge. But in the first years of the new millennium, the questions about
what cybercrimes are, what their impact will be and how we should respond to them
remain largely unanswered: the time for understanding is now. (David S. Wall, 2006)
Spam is a crime in which bulk email is sent out unsolicited for commercial purposes.
Laws prohibiting spam have been in place in some form for quite some time, but
specific laws making spam illegal (anti-spam laws) are quite new.
Cyber crime and Punishment
The growing danger from crimes committed against computers, or against information
on
Computers, is beginning to claim attention in national capitals. In most countries
around the world, however, existing laws are likely to be unenforceable against such
crimes. Self-protection, while essential, is not sufficient to make cyberspace a safe
place to conduct business. The rule of law must also be enforced. Countries where
legal protections are inadequate will become increasingly less able to compete in the
new economy.
perceived as havens run the risk of having their electronic messages blocked by the
network.
This report analyzes the state of the law in 52 countries. It finds that only ten of these
nations have amended their laws to cover more than half of the kinds of crimes that
need to be addressed. It is clear that a great deal of additional work is needed before
organizations and individuals can be confident that cyber criminals will think twice
before attacking valued systems and information.
(Source by McConnelInternational;CYBERCRIMEAND PUNISHMENT? 1999)
and two day later on 25 August 2004 another email were sent to the Bangladesh Police
Headquarter threatening via email.( Daily ittefaq April 11,2010)
One of the recent researches showed that a new cybercrime is being registered every
10 seconds in Britain. During 2006 the computer crooks were able to strike 3.24
million times. Some crimes performed on-line even surpassed their equivalents in real
world. In addition, experts believe that about 90% of cybercrimes stay unreported.
Cybercrime
Types
Frauding
Creaking Softwares
or piracy
Unauthorized access
Mailing and transmitting videos
Warning
Rationally destroy data
Complex in operating system
online
Effects on youths
Personal
Psychological
victims
Morale disorder
offender
Relationship breaks down
Role frustration
Reduce productivity
Social/ cultural
Economical
Economic loss of
Gain pleasure by
Loss of time
other forms of crime. From these happened cybercrime and its effects is the main
focus of this research.
about the nature of the behavior of the persons who bring out their conforming and
nonconforming behavior in the physical space and cyberspace ( Jaishankar 2008 ).
Space Transition involves the movement of persons from one space to another. Space
Transition Theory is developed in order to explain the causation of crimes in the
cyberspace. Space Transition Theory is published in a book title crimes of the
Internet edited by Frank Schmalleger & Michael Pitaro, published by Prentice Hall
(2008: 283-301).
In this study, emphasize the criminal behavior which spread out from unfortunately
when one person is engage in computer network or internet.
Chapter Three
3. Methodology of the study
Methodology is a system of explicit and procedures upon which research is based and
against which claims for knowledge are evaluated. Methodology contains the all
process of the study.
In methodology discuss the process area of selection, population and sample selection,
data collection methods and techniques, and data analysis techniques.
The entire set of relevant units of analysis, or data is called the population. In this
research the populations are those who may relate the research in the students of
MBSTU.
Here, a large number of students in this university. For this research accuracy and to
saving time, it was not possible to study in a large number of populations. So a
sampling was needed to do a meaningful work & to find out proper findings. Here
population was not known, so non probability sampling was used. For this reason,
Purposive sampling that is a process where sampling a sample based on prior
experiences with the population of interest.
Chapter Four
4. Research findings
4.1. Socio- demographic analysis
Demography is the statistical study of human population. It can be a very general
science that can be applied to any kind of dynamic human population, that is, one that
changes over time or space (see population dynamics). It encompasses the study of the
size, structure and distribution of these populations, and spatial and/or temporal
changes in them in response to age, sex, religion, social status, educational
qualification.
The term demographics refers to characteristics of a population
Demographic analysis can be applied to whole societies or to groups defined by
criteria such as age, sex, family status, education, religion. Institutionally, demography
is usually considered a field of sociology, though there are a number of independent
demography departments. Formal demography limits its object of study to the
measurement of populations processes, while the broader field of social demography
population studies also analyzes the relationships between economic, social, cultural
and biological processes influencing a population.
Demographic profiling is essentially an exercise in making generalizations about
groups of people. As with all such generalizations many individuals within these
groups will not conform to the profile - demographic information is aggregate and
probabilistic information about groups, not about specific individuals. Critics of
demographic profiling argue that such broad-brush generalizations can only offer such
limited insight and that their practical usefulness is debatable. However, if the
conclusions drawn are statistically valid and reproducible, these criticisms are not as
well founded.
Age
Frequency
Percent
18-20 years
15
18.8
21-22years
11
13.8
23-24years
49
61.3
25-27 years
6.3
Total
80
100.0
Age is one of the important demographic characters. Age may refer to: the length of
time that an organism has lived. In this research found that respondent age limit
belongs to 18-27 which is defined as youths. The present study, in this table we can
see that there are about 18.8(percent) belong in the age group of 18 - 20 years and
13.8(percent) of them are 21-22 years, and 61.3(percent) of them are belong 23 - 24
and 6.3(percent) of them are belong 25-27of all respondent. This study shows that
highest amount of crime were committed or related or faced by the age group. This
study shows that highest amount of crime were committed or related or faced by the
age group of 23-24 in the society.
36%
male
64%
female
Males are more involved in outside activities. For these reasons male have more
possibility than female to get contact with crime and show criminality. It is recognized
that the rate of crime is high than female. From this chart we can see that there are
64(Percent) respondents out of 100 are male and 36(Percent) respondents out of 100
are female of total respondent (show above figure).
Religion
Frequency
Percent
Islam
65
81.3
Hindu
15
18.8
Total
80
100.0
From this table we can see that there are 81.3(Percent) respondents out of 100 are
Islam and 18.8(Percent) respondents out of 100 is Hindu of total respondent. Here we
can see that respondent is heterogeneous characteristics.
Frequency
Percent
Mess
23
28.8
Home
6.3
University hall
51
63.8
others
1.3
Total
80
100.0
In this table we can see that there are 28.8(Percent) respondents out of 100 are living
in mess and 6.3 (Percent) respondents out of 100 are living in home and 63.8 (Percent)
respondents out of 100 are living in university hall and 1.3(Percent) are living other
place of total respondent
Govt. employer
Non-govt. employer
Business
Teacher
Farmer
Others
Total
Frequency
Percent
23
5
15
11
9
17
80
28.8
6.3
18.8
13.8
11.3
21.3
100.0
In this table we can see that there are 28.8(Percent) respondents out of 100 where their
Guardian's occupation was govt. employer and 6.3 (Percent) are non-govt. employer
and 18.8 (percent) are business men and 13.8 (percent) are teacher and 11.3 (percent)
are farmer and 21.3 (percent) other occupation of the respondent.
Types of net
Frequency
Percent
Yes
Modem
38
47.5
With mobile
41
51.3
Others
1.3
80
100.0
Total
In this table we can see that there are 47.5% respondents out of 100 are use modem
for browsingand51.3% respondents out of 100 are use mobile for net browsing and
1.3% respondents out of 100 are use other way for net browsing of total respondent.
Frequency
Percent
High speed
14
17.5
10
12.5
Lower cost
17
21.3
18
22.5
Both
21
26.3
Total
80
100.0
The study found that there are 17.5% respondents out of 100 are like this connection
for high speed and 12.5% respondents out of 100 are like this connection for small
disturbance of connection and 21.3% respondents out of 100 are like this connection
for lower cost and 22.5% respondents out of 100 are like this connection for specific
time to use and 26.3% respondents out of 100 are like this connection for both of total
respondent.
Frequency
Percent
51
1
10
63.8
1.3
12.5
1
3
14
80
1.3
3.8
17.5
100.0
The study found that there are 63.8% respondents out of 100 are browsing internet for
study and 1.3% respondents out of 100 are browsing internet for software and 12.5%
respondents out of 100 are browsing internet for mail or cheating and 1.3%
respondents out of 100 are browsing internet for share document and 3.8%
respondents out of 100 are browsing internet for others information like job market
searching and 17.5% respondents out of 100 are browsing internet for all of above of
total respondent.
Table 4.2.4: Faced or conduct cybercrime and (how and why).
face or
conduct
or relates
Yes
Frequency
Percent
11.3
7
9
1
2
52
80
8.8
11.3
1.3
2.5
65.0
100.0
No
Total
In this study present that net browser are faced or conducted or related of cyber crime.
For this question we found that about65.0% are not faced or conducted or related of
cyber crime and 11.3% are faced or conducted or related of unnecessary friend request
and massage, and 8.8% are faced or conducted or related of virus attacks and 11.3%
are faced or conducted or related of account hacking and 1.3% are faced or conducted
or related cheat by mail and 2.5% are committed software piracy.
Table 4.2.5: Types of crimes are faced or conducted.
face
or Crime types
conduct
or relates
Yes
unnecessary mail
File theft
Use pirate software
Frequency
Percent
8
4
1
10.0
5.0
1.3
Online pornography
Virus and warm attacks
All of above
1
1.3
5
6.3
9
11.3
No
52
65.0
Total
80
100.0
In this study present that net browser are faced or conducted or related of cyber crime.
For this question we found that about 65.0% are not faced or conducted or related of
cyber crime and 10.0% are faced or conducted or related of unnecessary mail and5.0%
are faced file theft, and 1.3% are conducted pirates software and 1.3% are faced or
conducted or related online pornography and 6.3% are faced virus and warm attacks
and 11.3% are faced or conducted or related all of above of total respondent.
Software piracy
Software piracy can be defined as "copying and using commercial software purchased
by someone else". Software piracy is illegal. Each pirated piece of software takes
away from company profits, reducing funds for further software development
initiatives. The roots of software piracy may lie in the early 1960s, when computer
programs were freely distributed with mainframe hardware by hardware
manufacturers (e.g. AT&T, Chase Manhattan Bank, General Electric and General
Motors). In the late 1960s, manufacturers began selling their software separately from
the required hardware.
Frequency
Percent
26
54
80
32.5
67.5
100.0
person maintain this commitment we will show that about 32.5% respondent are able
to registered and about 67.5% respondent are not able to registered or licensed.
Chart 4.2.3: software piracy is one kinds of computer crime.
Software piracy
89%
11%
Yes
No
Online pornography
Pornography, representation of sexual behavior in books, pictures, statues, motion
pictures, and other media that is intended to cause sexual excitement. The
word pornography, derived from the Greek porni (prostitute) and graphein (to
write), was originally defined as any work of art or literature depicting the life of
prostitutes. Online pornography is define as below(1) the depiction of erotic behavior (as in pictures or writing) intended to cause sexual
excitement, (2) material (as books or a photograph) that depicts erotic behavior and is
intended to cause sexual excitement, (3) the depiction of acts in a sensational manner
so as to arouse a quick intense emotional reaction .
Table 4.2.7: Browse online pornography in uncertain mind and feeling after
getting pornography on online.
Browse online
pornography
Yes
Feeling
Create bad Impacts
on mind
Feel excitement and
get pleasure
Not so good
Others
No
Total
Frequency
Percent
11.3
13
16.3
9
4
45
80
11.3
5.0
56.3
100.0
Browse online pornography is one of the major types of cybercrime. In this study
found that about 56.3% respondents are not browse online pornography in uncertain
mind and others respondents are browsed online pornography and they share their
feeling that is about 11.3% respondent feel its create bad Impacts on mind and 16.3%
respondent feel excitement and get pleasures and11.35% respondent feel its not so
good and 5.0% respondent feel other thinks that not mention by the respondent.
Table 4.2.8: Faced or conducted to any virus and warms attack or spam or
unnecessary massages and their types.
faced or
conducted or
related to any
virus
Yes
No
Total
Types
Frequency
Percent
28
35.0
16
20.0
3
2
31
80
3.8
2.5
38.8
100.0
In this study present that net browser are faced or conducted or related to any virus
and warms attack or spam or unnecessary massages. From this table we found that
about 38.8% are not faced or conducted or related to any virus and warms attack or
spam or unnecessary massages and 35.0% are faced of Trojan attacks and auto run.
Exe. And 20.0% are faced unnecessary massage and spammed massage, and 3.8% are
faced ID locked and hacked and 2.5% are faced or conducted or related others of total
respondent.
Harassed by E-mail
75%
25%
Yes
No
Chart 4.2.5: Cybercrime is harmful for both user and computer network and
their types.
Harmful condition
Percent
20
17.5
16.3
12.5
11.3
10
6.3
2.5
3.8
In this study also found that committing cybercrime is harmful for both user and
computer network. Where 20.0% said that this crime is not harmful for both user and
qqq q
qqqqqqqqqq
computer network and other respondent agree that cybercrime is harmful for both user
and computer. for
harms and 16.3% respondent created Mental or psychological harms and 2.5%
respondent created social harms and 17.5% respondent are damaged computer and
3.8% respondent are destroyed software and11.3% respondent economically loss and
6.3% respondent are loosed of time and 10.0% respondent are more than one of the
above and this will graphically presented below.
Others crime
Frequency
Percent
forms
of crime
Yes
Online pornography
Defamation
Data theft
Fraud and cheating
Eve-teasing
E-mail threatening
Robbery and money laundering
kidnapping
Others
No
Total
10
6
13
5
11
4
5
2
5
19
80
12.5
7.5
16.3
6.3
13.8
5.0
6.3
2.5
6.3
23.8
100.0
The study found that cybercrime promote tendency to commit other forms of crime. In
this table, we can see that about 23.8% respondent are not believe that cybercrime
promote tendency to commit other forms of crime and other respondent believe that
cybercrime promote tendency to commit other forms of crime. So, about 12.5%
respondent are committed online pornography and 7.5% respondent are committed
defamation or harassment and 16.3% respondent are committed data theft and 6.3%
respondent are committed fraud and cheating and 13.8% respondent are committed
eve-teasing and 5.0% respondent are committed E-mail threatening and 6.3%
respondent are committed robbery and money laundering and 2.5% respondent are
committed kidnapping and 6.3% respondent are committed others forms of crime.
12.5
7.5
6.3
6.3
6.3
2.5
Cybercrime is the latest and perhaps the most complicated problem in the cyber world.
Cybercrime may be said to be those species, of which, genus is the conventional
crime, and where either the computer is an object or subject of the conduct situating
crime. Any criminal activity that uses a computer either as an instrumentality, target
or means for perpetuating further crimes comes within the ambit of cybercrime. So
this figure show that about 16.3% respondent are commit data theft and then
13.8%responden commit eve-teasing and about 12.5% respondent are committed are
highest then other forms of crime( show above figure).
Cyber crime affects more than the financial integrity of a business. There are many
very real and damaging consequences associated with Internet crime. Understanding
the effects of cyber crime is an important first step in comprehending the necessity of
security measures on a computer network.
Effects are created by cybercrime
Frequency
Percent
29
36.3
7
17
8.8
21.3
13
6
8
16.3
7.5
10.0
Total
80
100.0
Cybercrime and its effect on the respondent which is the main focus of my study. In
this table we can see that there are 36.3% respondents out of 100 are focus on social
and mental harassment, 8.8% are focus on loss of time to study, 21.3% are focus on
increase crime tendency, 16.3% are Focus on virus effect on computer, 7.5% are focus
on economic loss and 10.0% are Both positive and negative effect of the respondent.
Frequency
23%
78%
Yes
No
Cyber law or Internet law is a term that encapsulates the legal issues related to use of
the Internet. It is less a distinct field of law than intellectual property or contract law,
as it is a domain covering many areas of law and regulation. Some leading topics
include internet access and usage, privacy, freedom of expression, and jurisdiction.
The Study found that most of the respondents about 77 (percent) respondent out of
100 (percent) are agree for enacting cyber law strictly and 23 (percent)) respondent
out of 100 (percent) are not agree for enacting cyber law.
Governmental steps
Frequency
Percent
13
16.3
1.3
46
57.5
2.5
17
21.3
1.3
Total
80
100.0
Frequency
Percent
Awareness building
46
57.5
Increase humanity
10.0
13
16.3
8.8
7.5
Total
80
100.0
Sometimes general people work together for protecting this criminality. Remove
criminal tendency is not individual consciousness of the society; sometimes it is a
group task and create awareness among this criminal tendency. In this table we can
see that the respondent thinking about the measure should be taken by general people
to protect this criminality. Here about 57.5% respondent was said about awareness
building, 10.0% said increase humanity, 16.3% said about work safely and carefully,
8.8% said to develop their mind, and 7.5% said Consciousness must be grow for
protecting cybercrime.
Frequency
Percent
18
22.5
Punished strictly
26
32.5
20
25.0
8.8
Increase protection
11.3
Total
80
100.0
Criminal justice system refers to the collective institutions through which an accused
offender passes until the accusations have been disposed of or the assessed
punishment concluded. The criminal justice system consists of three main parts: (1)
law enforcement (police, sheriffs, marshals); (2) adjudication (courts which include
judges, prosecutors, defense lawyers); and (3) corrections (prison officials, probation
officers, and parole officers). In a criminal justice system, these distinct agencies
operate together under the rule of law and are the principal means of maintaining the
rule of law within society.
Normally, the first contact an offender has with the criminal justice system is through
police who investigates a suspected wrong-doing and make an arrest. Next is the
court, where disputes are settled and justice is administered. In the U.S. guilt or
innocence is decided through the adversarial system. If the accused is found guilty
s/he turned over to the correctional authorities from the court system
In this table we can see that the respondent thinking about the measure should be
taken by criminal justice system to prevent cybercrime. Here about 22.5% respondent
was said about Implementation law properly, 32.5% said punished strictly, 25.0% said
about creating cyber policing system, 8.8% said modifying Criminal justice system
and 11.3% said for increase protection for protecting cybercrime.
Frequency
Percent
30
6
37.5
7.5
13
16.3
12
15.0
19
23.8
Total
80
100.0
The responsibilities of the website owner is restraint hacker, improve security system,
building monitoring system and to protect website by using password for protecting
cyber crime. All web site developers should be aware of the importance of copyright.
All creative work is copyrighted as soon as it is put into tangible form, regardless of
whether it displays a notice or not. If you do not have permission from the copyright
holder, do not put copyrighted material on your web site.
In this table we can see that the respondent thinking about the responsibilities of the
website owner to protect cybercrime. Here about 37.5% respondent was said about
Improve security system7.5% said Create Anti-hacking website, 16.3% said about
Building monitoring system, 15.0% said Prone website should be blocked and 23.8%
said for Protecting their website by using password for protecting cybercrime. So, do
not assume that something is in the public domain simply because you see it on
someone elses site. If you are not sure, dont use it! Faculty members using
copyrighted material under Fair Use guidelines should password protect that material.
Recommendations
Frequency
Percent
14
17.5
2.5
10
12.5
Reward punishment
3.8
Awareness building
51
63.8
Total
80
100.0
In this research found that respondent opinion was measurable for protecting
cybercrime. Sometimes recommendation or opinion is good or suitable for purpose.
In this table also give the information about the own opinion to protect this crime.
Here about 17.5% respondent was said make and implementation of cyber law, 2.5%
said use cyber security system, 12.5% said use safely and carefully, 3.8% said reward
punishment and 63.8% said about awareness building for protecting cybercrime.
Cross tabulation 01: Types of harms are creating Vs harmful for both user and
computer network.
Types of harms are create Vs harmful for both user and
computer network
Types of
harms are
create
N/A
Physical
Frequency
(Percentage)%
Frequency
(Percentage)%
Total
16
20.0%
10
12.5%
Mental/psychological
Social
Damage computer
Destroy software
economic loss
Time loss
Above more than one
Total
Frequency
(Percentage)%
Frequency
(Percentage)%
Frequency
(Percentage)%
11
17.2%
2
3.1%
14
21.9%
2
12.5%
0
.0%
0
.0%
13
16.3%
2
2.5%
14
17.5%
Frequency
(Percentage)%
Frequency
(Percentage)%
Frequency
(Percentage)%
Frequency
(Percentage)%
Frequency
(Percentage)%
3
4.7%
9
14.1%
5
7.8%
8
12.5%
64
100.0%
0
.0%
0
.0%
0
.0%
0
.0%
16
100.0%
3
3.8%
9
11.3%
5
6.3%
8
10.0%
80
100.0%
In this cross table we can see the relationship between types of harm and harmful for
both user and computer network. From this table it can be seen that the respondents
who said cyber crime create physical harm, they all (15.6%) said cyber crime is
harmful for both user and computer network. Respondents who said the harm is
mental or psychological, from them 17.2 percent said cyber crime is harmful for both
user and computer network. Respondents who said the harm is social, they all (3.1%)
said cyber crime is harmful for both user and computer network. Respondents who
said that harm is damaging computer, all of them 21.9 percent said cyber crime is
harmful for both user and computer network.
All of the respondents who said harm is destroy software, they (4.7 %) said cyber
crime is harmful for both user and computer network. All of the respondents who said
harm is economic loss, they (14.1%) said cyber crime is harmful for both user and
computer network. All of the respondents who said harm is time loss, they (7.8%)
percent said cyber crime is harmful for both user and computer network. Respondents
who said cyber crime create more harms, they all (12.5%) said cyber crime is harmful
for both user and computer network. Here 20 percent data is N/A because the
respondents give answer No for the question of cyber crime in harmful. This study
show that maximum respondents said cyber crime is harmful for both user and
computer. Who also said damage computer is the main harm of cyber crime.
Cross tabulation
Interne
t user
Ye
s
frequency
unnece
ssary
mail
File
theft
Use
pirate
softwar
e
Onlin Virus
e
and
porno warm
graph attack
y
s
1
1
5
Total
All
of
abov
e
9
80
Total
percentag
e%
65.0
%
10.0%
5.0
%
1.3%
1.3%
6.3%
11.3
%
100.0
%
frequency
52
80
percentag
e%
65.0
%
10.0%
5.0
%
1.3%
1.3%
6.3%
11.3
%
100.0
%
In this cross tabulation, we can see the relation between two variable this are internet
user and faced or conducted different type of crime where found that about 65.5%
respondent are not faced or conducted or related to this crime and other respondent are
faced or conducted or related to cyber crime. This table also show that about 10.0%
respondent faced on unnecessary mail and 5.0% respondent faced on file theft and
1.3% respondent are conduct software piracy and1.3% respondent are faced on online
pornography and6.3% respondent faced on virus and warms attacks.
And here 11.3% respondent are faced on unnecessary mail, file theft ,online
pornography, virus and warms attacks.
Chapter Five
5.1. Conclusion
Now-a-days cybercrime is a newly developed crime and the patterns and nature of this
crime is increasing broadly around the world. So the issue of cyber security must get
priority and ensure protection in every level of cyber user.
In this study present that net browser are faced or conducted or related to any virus
and warms attack or spam or unnecessary massages. From this study we found that
about 38.8% are not faced or conducted or related to any virus and warms attack or
spam or unnecessary massages and 35.0% are faced of Trojan attacks and auto run.
Exe. And 20.0% are faced unnecessary massage and spammed massage, and 3.8% are
faced ID locked and hacked and 2.5% are faced or conducted or related others
Cybercrime and its effect on the respondent which is the main focus of my study .
This study found that most of respondent said cyber crime create social and mental
harms and they believe that cyber crime create criminal tendency and sometime create
economic crisis of the respondent so we can say that cyber crime has both positive
and negative effect of the respondent. The study also found that cybercrime promote
tendency to commit other forms of crime like online pornography, defamation or
harassment, fraud and cheating, Internet data theft, eve-teasing, email threatening, and
forms of crime.
Finally cyber crime and its effects are more concerning issue in present days, so we
must concern about this issue and protect other who committed cybercrime by
increasing awareness about the bad impact of cyber crime among the youths.
5.2. Recommendation
The introduction of new technologies always presents an initial challenge for law
enforcement agencies should take proper action and build punishment system.
Government should take proper action about protecting cybercrime And general
people should be taken remedial measure like work safely and carefully, increase
awareness building, develop their mind and consciousness building for protecting this
criminality. Given the responsibilities of the website owner or authorities in protecting
their sites by improving security system, using password and building monitoring
system. In this study area found that maximum respondent argue that cyber crime can
protect by awareness building and developing policing system and rewarding
punishment.
Government should employed cyber security expert people for protecting cyber
crime and consequences.
The security system of the website should provide by website authorities.
Cyber law should be enacted in our country and should ensure every net browser
obey this law strictly.
The internet facilities in this area should be ensured and monitoring by using
detecting system.
The student should be awarded about cybercrime.
The student should be taught safely use and carefully operate computer and
internet.
The student should be developing their mind and avoided this crime committing
tendency and created humanity.
Take proper action to computer abuser and give proper treatment method for
preparing law abiding citizen.
Government should be enacted cyber law and implement this in every spear of life.
By this way, we can solve this criminal tendency easily and swiftly.
5.3. References
Adamski A. (1998), Crimes Related to the Computer Network. Threats and
Opportunities: A
for Crime Prevention and Control, affiliated with the United Nations
(HEUNI).Retrieved on December 15 2006, from
http://www.ulapland.fi/home/oiffi/enlist/resources/HeuniWeb.htm
Adler, Freda (2004), Criminology fifth edition . New York; Mcgraw-Hill217-219.
edition . Singapore;
Mcgraw-Hill.
Convention on Cybercrime, European Treaty Series - No 185, Council of Europe,
B.
J.
The
Cybercrime,10December2001,
Council
of
Europe
Convention
on
http://www.cle.bc.ca/CLE/Analysis/Collection/01-
internetcybercrime?
practiceAreaMessage=true&practiceArea=Criminal Law
Geese G. Z. (2003), The State of the Law on Cyber jurisdiction and Cybercrime on
the Internet, California Pacific School of Law.
Han Investigation and Prosecution of Terrorist-related Offences Involving Use of the
Internet.
Hudson A. Barbara: Understanding Justice; an introduction to ideas perspectives and
controversies in modern penal theory.
http://www.en.wikipedia.org/wiki
http://www.ncsl.org/public/governn/htm
http://www.ncsl.org/programs/lis/cip/cyberterrorism.htm/
http://www.wikipedia.co.in
.
http://www.iap.nl.com/speeches_annual_conference_2003_washington/investigating_t
errorism_related_offences_speech_by_han_bong_jo.html
Appendix 01
Mawlana Bhashani Science & Technology University
Santosh, Tangail -1902.
Research topic: Cyber Crime and Its effects on youth. An empirical study on MBSTU.
Questionnaire
Respondent ID
Part A: Socio-demographic characteristic
Age :
Sex:
1) Male
Religion:
1) Islam
2) Female.
2) Hindu
3) Christian
4) Buddhist
5) Others
2) Second Year
5) Fifth Year.
3) Third Year
2) Middle class
3) Higher class
4) Others
8. Living place:
1) Mess
2) Home
3) University hall
4) others
9. Monthly expenditure:
10. Guardians occupation:
1) Government employer 2) Non-Government employer
3) Business
4) Teacher
5) Farmer 6) Others
2) No
2) Modem
3) With mobile
4) Others
2) For software
4) For share documents
2) No
2) No
2) No
2) No
23. Have you faced or conducted or related to any virus & warm attack or spam or
unnecessary massage?
1) Yes
2) No
24. If yes, what types?
..
25. Have you faced or threaten or harassment by E-mail?
1) Yes
2) No
26. Do you believe that committing this crime is harmful for both user and computer
network?
1) Yes
2) No
27. If yes, what type of harms are_?
1)......
2)..
3)..................
4).
5)..
28. Do you believe that this crime promote tendency to commit others forms of crime?
1) Yes
2) No
C. Recommendations:
2) No
32. What measures should be taken by the government to prevent this criminal
tendency?
33. What measures should be taken by general people to prevent this criminality?
34. What measures should be taken by the criminal justice system to protect cyber
crime?
...............................................................................................................
............
35. What are the responsibilities of the Website owner to protect cyber crime that you
think?
.......................................................................................
...........
36. What is your recommendation to protect cybercrime?