Sunteți pe pagina 1din 56

ABSTRACT

The advancement in emerging internet technology and its wide spread knowledge leads
to security issues, cyber crime, internet hackers and intruders. The charisma of internet
enhances the network structures that develop enormous online theft, fraud, are called as
cyber attacks or cyber crime. In our paper we propose the cybercrime and the types of its
illegal activities using the internet. Either national or international cybercrime creates
huge negative impacts over society. We analyze the cybercrime web data due to social
media using data mining techniques. Social networking websites are used as a medium
of interaction and communication among all the people across the world. Due to over use
and lack of awareness leads to increase the cyber crimes by several aspects. Data mining
applied in acquiring negative impacts in social network sites. The data mining algorithm
is used to analyze the crime data.

Key Words: Internet technology, cyber crime, social media, data mining technique,
negative impact analysis.

Cybercrime is a kind of crime that happens in "cyberspace", that is, happens in the world
of computer and the Internet. Although many people have a limited knowledge of
"cybercrime", this kind of crime has the serious potential for severe impact on our lives
and society, because our society is becoming an information society, full of information
exchange happening in "cyberspace". Thus, it is necessary to introduce cybercrime
detailed.

While there are several textbooks talking about cybercrime, but focusing on the statutes
and laws relevant this new breed of crime, few papers or textbooks focus on the
"computer science" itself. In other words, most of materials talk about the "crime" of
"cybercrime", but this paper will talk more about "cyber". In this paper, first, we will
introduce the definition, origins and evolution of cybercrime. Second, the three
categories of cybercrime,

which are target cybercrime, tool cybercrime, computer incidental, are presented in each
section respectively, where some latest cases will be studied. Finally, the summary will
be given. Keywords: Survey, Cybercrime,CyberCrime, Cyber-crime, Cyber crime,
Computer crime
IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Chapter 1

INTRODUCATION

INTRODUCATION

A lot of us have a limited knowledge of crime occurring in “ cyberspace”, known as


cybercrime which happens on computer and the internet , however , cybercrime has a
severe potential for remarkable impact on the lives of individuals and our society.
Therefore , a detailed introduction on of cybercrime needs to be presented. There are
many terms used to describe cybercrime . The former descriptions were “computer
crime”, “computer- related crime “, or crime by computer “, with the pervasion of digital
technology, some new terms like “high-technology” or” information –age” crime were
added to the definition. Also Internet brought other new terms like “high –technology”
“cybercrime” and “net ”crime . other forms include “digital”, ”electronic”, “virtual”,
“ÏT”, ”high tech” and technology –enabled crime . However, on the one hand , each of
them didn’t cover the whole meaning of cybercrime , because there is no incorporation
of networks on the other hand , terms such as “high – tech” or “electronic “crime might
be too broad to specify that the crime is the exact cybercrime , since other fields also
have “hi-tech “developments like nanotechnology and bioengineering . Currently ,
although no one term has become totally dominant in use “cybercrime “is the term used
most pervasively . In general ,cybercrime has three categories

1. Target cybercrime : The crime in which a computer is the target of the offense.
2. Tool cybercrime: The crime in which a computer is used as a committing the
offense.
3. Computer incidental : The crime in which a computer plays a minor role in
committing the offense.

The boundaries of these categories ,actually ,are not so clear .For example ,if someone
uses high –tech hacking into a computer or server, getting some thinking valuable , it’s
hard to say it must be a “theft “in tool cybercrime or a “hacking” in target cybercrime .so

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 2


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

why do we still categorize cybercrime ? I think we can analyze cybercrime better and
more efficiently by this way . Although there are some intersection , with categorization ,
we will focus on each part of cybercrime respectively and then a comprehensive concept
finally.

Cyber crime is a crime which involves the use of digital technologies in commission of
offence , directed to computing and communication technologies . The modern
techniques that are proliferating towards the use of internet activity results in creating
exploitation , vulnerability making a suitable way for transferring confidential data to
commit an offence through illegal activity involves like attacking on information center
data system , theft ,child pornography built images , online transaction fraud ,internet
sale fraud also development in internet malicious activities such as virus , worm and
third party abuse like phishing ,email scams etc. The universal approach of network
needs to recover from committing illegal activity in all world and to stop the criminal
nature by protecting unlawful activity by enforcing different level of firewall setting
within its offline control for every by enforcing different level of firewall setting within
its offline control for every nation in order to monitor and prevent crimes carried out in
cyberspace. Network security controls are used to prevent the access of hacking in
networks which includes firewall, virtual private networks and encryption algorithms .
Out of these , the vertical private network (VPN) provides end users with a way to
privately. Access information on their network over a public network infrastructure such
as internet .

The world we are in today is all about information technology (IT) because we are in the
age of information technology and the people with the right information , with proper
way of disseminate this information and processing them is considered as the most
successful. Information technology is the transfer of information using
telecommunication and micro-based computer system . nowadays, the computer has
replaced manual records , and the fraudulent input document has been substituted by
manipulating data held in a computer system. This manipulat6ion does not need to be
sophisticated . computers have become the mainstay of business and government
processes. Business has been using them for years and in most countries, there are drives
towards electronic or joined up government . This is to allow the people to access
government services from their desktop in their own home . Cybercrime , like every
digital industry , in outsourcing . Though the U.S. still produces more malware , spam

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 3


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

and viruses than any country in the world , illicit IT jobs are increasingly scattered
across an anarchic and international Internet , where labor is cheap , legitimate IT jobs
are scarce and scammers are insulated from the laws that protect their victims by
thousands of miles. As Thomas Friedman might say , the criminal underworld is flat.

The statistics that have been obtained and reported about demonstrate the seriousness
Internet crimes in the world . Just the “phishing” emails mentioned in a previous
paragraph produce one billion dollars for their perpetrators (Dalton 1) . In a FBI survey
in early 2004, 90 percent of the 500 companies surveyed reported a security breach and
80 percent of those suffered a financial loss (fisher 22) .A national statistic in 2003 stated
that four billion dollars in credit card fraud are lost each year . only two percent of credit
card transaction take place over the Internet but fifty percent of the four billion ,
mentioned before are from the transaction online (Burden and palmer 5) .All these
finding are just an illustration of the misuse of the Internet and a reason why Internet
crime has to be slowed down.

Internet crime is crime committed on the Internet , using the Internet and by means if the
Internet .

Computer crime is a general term that embraces such crimes as phishing , credit card
frauds, bank robbery , illegal downloading, industrial espionage , child pornography ,
kidnapping children via chat rooms , scams cyber terrorism , creation and /or
distribution of viruses, spam and so on . All such crimes are computer related and
facilitated crimes.

With the evolution of the Internet , along came another revolution of crime where
the Perpetrators commit acts of crime and crime and wrongdoing on the world wide web.
Internet crime takes many faces and is committed in diverse fashions . The number of
users and their diversity in their diversity in their makeup has exposed the Internet to
everyone . Some criminals in the Internet have grown up understanding this
superhighway of information , unlike the older generation of users . This is why Internet
crime has been exposed to the world and some remain a mystery up until they are
perpetrated against someone or some company .

The different types of Internet crime vary in their design and how easily they are able to
be committed . Internet crimes can be separated into two different categories. There are

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 4


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

crimes that bare only committed while being on the Internet and are created exclusively
because of the world wide wed. The typical crimes in criminal history are now being
brought to a whole different level of information and ingenuity . Such new crimes
devoted to the Internet are email ”Phishing “, hijacking domain names , virus imitation ,
and cyber vandalism , A couple of these crimes are activities that have been exposed and
introduced into the world, people have been trying to solve virus problems by installing
virus protection software and other software that can project their computers. Other
crimes such as email “phishing “are not as known to the public until an individual
receives one of these fraudulent emails. These emails are cover faced by the illusion that
the email is from your bank or another bank. When a person reads the email he/she is
informed of a problem with he / she personal account or another individual wants to send
the person some of their money and deposit it directly into their account. The email asks
for your personal account information and when a person gives this information away ,
they are financing the work of a criminal.

MEANING AND DEFINITION OF CYBERCRIME :

MEANING:

Cybercrime is defined as crime in which a computer is the object of the crime (hacking ,
phishing , spamming ) or is used as a tool to commit an offense (child pornography , hate
crimes). Cybercriminals may use computer technology to access personal information ,
business trade secrets or use the internet for exploitative or malicious purpose . criminals
can also use computers for communication and document or data storage . criminals who
perform these illegal activates are often referred to as hackers.

The Indian legislature doesn’t provide the exact definition of cyber crime in any statute
, even the information Technology Act,2000; which deals with cyber crime doesn’t
defined the team of cybercrime .However in general the term cybercrime means any
illegal activity which is carried over or with the help of internet or computers .

DEFINITION OF CYBERCRIME

Dr . Debarati Halder and Dr k jaishakr define cybercrime as “offences that are


committed against individuals or groups of individuals with a criminal motive to
intentionally harm the reputation of the victim directly or indirectly , using modern

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 5


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

telecommunication networks such as Internet (chat rooms, emails, notice boards and
groups) and mobile phones (SMS/MMS)”

We do not have any precise definition of cyber crime; however following is the
general definitions of team cyber crime;

The oxford Dictionary defined the team of cybercrime as “criminal activities carried
out by means of computers or the Internet .”

“cyber crime may be said to be those species, of which , genus is the conventional
crime and where either the computer is an object or subject of the conduct constituting
crime”

“cyber crime means any criminal or other offence that is facilitated by or involves the
use of electronic communications or information systems, including any device or the
internet or any one or more of them “

Professor S.T viswanathan has given in three definitions in his book the Indian cyber
lows with cyber glossary is as follows –

1 Any illegal action in which a computer is the tool or object of the crime I .e any
crime , the means or purpose of which is to influence the function of a computer,

2 Any incident associated with computer technology in which a victim suffered or


could have suffered loss and a perpetrator by intention, made or could have made a gain

3 Computer abuse is considered as any illegal , unethical or unauthorized behavior


relating to the automatic processing and transmission of data.

HISTORY OF CYBERCRIME

The history of cybercrime is short compared with traditional crimes. The first
published report of cybercrime occurred in the 1960s, when computers were large
mainframe systems. Since mainframes were not connected with other ones and only few
people can access them , the cybercrimes were always “ insider” cybercrimes, which
means employment allowed them to access into mainframe computers. Actually , in the
1970s, the cybercrime which was “computer crime “in fact was different from the
cybercrime we face with today, because of no Internet in that era . In following decades,
the increasing of computer net work and personal computers transformed “computer

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 6


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

crime” into real cybercrime .since Internet was invented ,people began to exchange
information based on networks of computers, also keep data in computer rather than
paper. At the same time , the cybercrime was not only restricted in target cybercrime ,
but expanded into tool cybercrime and computer incidental . this process is similar to the
process of learning one language . In childhood , we learn language itself ; then when we
grow up and are good at it , we will use it to communicate is to divide it into three
categories that are said in the magic of language itself ; tool cybercrime is similar to
fraud or harassment on street or in other face –to face ways , but the place in which tool
cybercrime happens is not physical environment but cyberspace; computer sronic proof
is save in computer or the camera captures the criminal withdrawing money in a bank
generally, these three categories are elaborated in the three following sections and in
each section some latest cases will be studied.

History and Evolution of Cybercrime During the period of 1950’s, it would be an


astonished feeling for everyone who uses palmtops and microchips today,

Prof. R.K.Chaubey, “An Introduction to Cyber Crime and Cyber law”, Kamal Law
House, 2012 successful computer was built and the size of the computer was so big that
it takes the space of entire room and they were too expensive to operate. The functioning
of these computer were not understandable to large number of people and only select
people with expertise had direct access to such computers, and has the knowledge to
operate them. For obvious reasons, the computer technology was extremely expensive
and beyond the purchasing capacity of almost the entire population until IBM’s came
into being wherein it introduced its stand-alone “personal computer” in 1981 and
exposing many to the rewards of quick data access and manipulation that, up to that time,
had been realized by few. The Personal computers become cheaper and become
household item at the start of 21st century in India. The Internet was first started by the
US department of defence, after World War II with the idea to have a network which
could work in the event of disaster or war and securely transmit information. The First
Network was known as ARPANET, with the development of Transmission Control
Protocol/Internet Protocol, World Wide Web and Hypertext the internet become rage all
over the world. With the growth of Internet the quality and variety of information grew.
However at that point nobody anticipated the opportunities’ the internet is going to
provide the technology savvy criminals. In India the internet services started by the state-
owned “Videsh Sanchar Nigam Limited “in year 1995 and in 1998 the government has

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 7


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

ended the monopoly of VSNL and market is opened to private operators. At that point,
the internet users in India are 0.1% of total population, and now India has become the 2
nd largest country in terms of internet users after china with 33.22% people using
internet.

NATURE OF CYBERCRIME :-

This section demonstrates that cyber crime is highly complex, self reinforcing,
technologically advanced, geographically widespread and indiscriminate by examining
the history, tools, industrial nature, perpetrators and victims of cyber crime.

Why should learn about cyber crime

we should learn about cyber crime because


 Every body is using computers.
 From white collar criminals to terrorist organizations and from
teenagers to adults .
 Conventional crimes like forgery , extortion, kidnapping etc. Are
being committed with the help of computers
 New generation is growing up with computers.
 MOST IMPORTANT- monetary transactions are moving on to the

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 8


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

CHAPTER -2
DESIGN OF THE STUDY

STATEMENT OF PROBLEM :-

The convergence of computer network and telecommunications facilitated


by the digital technologies has given birth to a common space called ‘cyberspace’. This
cyberspace has become a platform for a galaxy of human activities which converge on
the internet. The cyberspace has, in fact, become the most happening place today.
Internet is increasingly being used for communication, commerce, advertising, banking,
education, research and entertainment. There is hardly any human activity that is not
touched by the internet.

The growing importance of Information Technology can be visualized from


the fact that in India for the first time a Delhi based businessman has made a digital will
of the secret information saved in his e-mail account. Digital will is a foreign concept
which is gaining momentum in India also. Therefore, Internet has something to offer to
everybody and in the process it only increases and never diminishes.

The ‘cyber manthan’ has bestowed many gifts to humanity but they come with
unexpected pitfalls. It has become a place to do all sort of activities which are prohibited
by law. It is increasingly being used for pornography, gambling, trafficking in human
organs and prohibited drugs, hacking, infringing copyright, terrorism, violating
individual privacy, money laundering, fraud, software piracy and corporate espionage, to
name a few.

Despite such a great influence of computers and internet on day-to-day


lives, the fact remains that only a fraction of people know what computer and internet is
all about? There is a paucity of systematic study which elaborately discusses the basic
concepts of cyber world like meaning, evolution, generations, types, characteristics and
major components of computers; forms of networks, history of Internet in India, services
and limitations of Internet etc. Most of the books and thesis directly deals with the
concept of cyber crimes without thinking that to understand computer and internet
crimes, one needs to understand first the computers and internet. This study is a sincere
effort in this direction.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 9


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Well, the new medium which has suddenly confronted humanity does not
distinguish between good and evil, between national and international, between just and
unjust, but it only provides a platform for the activities which take place in human
society. Law as the regulator of human behaviour has made an entry into the cyberspace
and is trying to cope with its manifold challenges.4 Though various countries have their
domestic cyber laws, but the problem is that most of the books deal with cyber laws of
individual nations. In this research work an attempt has been made to do a comparative
study of the cyber laws of different countries.

A legal framework for the cyber world was conceived in India in the form
of Ecommerce Act, 1998. Afterwards, the basic law for the cyberspace transactions in
India has emerged in the form of the Information Technology Act, 2000 which was
amended in the year 2008. The IT Act amends some of the provisions of our existing
laws i.e. the Indian Penal Code, 1860; the Indian Evidence Act, 1872; the Bankers Book
Evidence Act, 1891 and the Reserve Bank of India Act, 1934. Though since 2000 the IT
Act is in place in India for curbing cyber crimes, but the problem is that still this statute
is more on papers than on execution because lawyers, police officers, prosecutors and
Judges feel handicapped in understanding its highly technical terminology. Through this
thesis the researcher has tried to interpret its technical provisions into simple language
which can be understood even by laymen.

Since cyber crime is not a matter of concern for India only but it is a
global problem and therefore the world at large has to come forward to curb this menace.

As a saying in criminology goes – “a crime will happen where and only when
the opportunity avails itself.” Until recently, we were aware of only traditional types of
crimes like murder, rape, theft, extortion, robbery, dacoity etc. But now with the
development and advancement of science and technology there came into existence
machines like computers and facilities like internet. The internet has opened up a whole
new virtual heaven for the people both good and bad, clever and naive to enter and
interact with lot of diverse cultures and sub-cultures, geography and demographics being
no bar. The very same virtues of internet when gone in wrong hands or when exploited
by people with dirty minds and malicious intentions, make it a virtual hell. Stories of
copyright theft, hacking and cracking, virus attacks and plain hoaxes etc. have mounted

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 10


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

up in the last few years. There is no single 3 cyber stalking, cyber ragging6 etc. and also
the US, UK and Indian approaches towards these offences.

The law enforcement officials have been frustrated by the inability of the
legislators to keep cyber crime legislation ahead of the fast moving technological curve.
At the same time, the legislators face the need to balance the competing interests
between individual rights such as privacy and free speech, and the need to protect the
integrity of the world’s public and private networks. Moreover while investigating cyber
crimes, the investigating agencies and law enforcement officials follow the same
techniques for collecting,

Apart from tangible rights, some intangible rights called as ‘intellectual property rights’
such as trademarks, copyrights and patents etc. are also infringed in the cyberspace
There is no dearth of specific books on IPRs, but books on IPRs vis-à-vis cyberspace are
not much in number. This study has tried to undertake a collaborative approach on IPRs
and cyber world. The purpose of this study is to cover the complete scenario of internet
crimes, their magnitude and nature, and make an insight into the people who are
responsible for it. This research work will also take a comprehensive view of the
governmental efforts being done in India and abroad to stop such crimes and will look
closely on their success and failures. An effort will also be made to vigorously analyze
the various perspectives of IT Act, 2000; its inns and outs including its shortcomings and
the possible means and ways to overcome them.

A major reason for lesser computer crime during this period was a lack of
widespread access to computers and network . In those ‘prehistoric ‘ days of computer
crime , there was no wide spread public access to networks no internet , and no laws
regarding computer activities . In fact the only people who had any access to computers
and networks tended to be university professors, students and researches

OBJECTIVE OF THE STUDY:-

 To explore about cyber crime ,


 To create awareness about cyber crime to the mass and
 To gain more knowledge about cyber crime.
 To determine the advent of cyber crime .

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 11


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

AIM OF THE CYBER CRIME

The main aim is to study the judicial interpretation of the prevalent cyber
laws at the global level. The endeavour is to determine all the important facets of cyber
crimes in various countries of the world including UK, USA and India. The study also
attempts to find possible 5 implications of the recently evolved cyber crimes. The
significance of the study is to decipher the cyber law as developed in India as well as to
do critical comparative analysis of the cyber laws as developed in other countries. The
study is important both from the theoretical and practical point of view. On a theoretical
level, it reveals the judicial appreciation of all the important facets regarding cyber
crimes. On the practical level, it clearly shows the extent to which judicial approach
meets the requirements of the day by protecting the people against various cyber
offences. The result of the study would provide hitherto unknown criteria to evaluate the
legislative and judicial philosophy in the research area. The practical utility of the work
lies in the fact that policy making institutions may remove ambiguities surrounding the
cyber laws. They may also enact specific cyber There is a tremendous scope of cyber
law in India as the number of activities through internet is on increase with the
changing times, the requirement for cyber laws and their application is gathering
momentum and hence the career option as a cyber-lawyer seems very lucrative
option for students.

SCOPE OF THE CYBER CRIME

The requirements of being a successful cyber lawyer:

 Capability of analyzing a problem along with a deep understanding of the


subject.
 Good observer and ready to accept challenges
 The person should be technically aware of the changes taking place in the IT
sector.
 Being quick and concerned to look at the web as an information provider are
the other two qualities.
As for this branch of law is concerned, there are several job opportunities which are on
its way for students who aspire to be into cyber law. One can join as a cyber-consultant

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 12


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

in an IT firm, police departments or in banks, or as research assistants in a law firm, or a


technology firms, or as advisers to web developers, in the ministry of information &
technology or in corporate houses and various law enforcement agencies.

The research has been focused on the cases recorded and handled by the
Bangalore police department as the preferred location for undertaking the study for the
research , as there is dearth in the terms of research or study in the state . obtaining
information from the cybercrime handling authorities is very difficult , as they like to
keep privacy and confidentiality in managing the case. Due to the restrictions in
providing permission to collect information for their privacy policy ,some of the offices
could not cooperate due to the time constraint . The research had some difficulties while
obtaining permission for conducting even the pilot study in their departments. The
primary data are collected only from the cases registered. The cases registered again in
specific in Bangalore . The published sources of information and other major sources of
data collection .

Hypotheses of the Study

Hypotheses:-

In consistent with the objectives, following hypotheses were formed by the researcher:

H1. “Cyber Cafe Visitors are aware about cyber security and fall short to take
precautions to avoid Cyber-crime.”

H2. “The Cyber Cafe rules and regulations have adversely affected Cyber Cafe.”

H3. “Cyber Cafe Owners feel that there is a lacuna in the audit done”

1) H1. “Cyber Cafe Visitors are aware about cyber security and fall short to

take precautions to avoid Cyber-crime”

This hypothesis has been tested by using the awareness of Cyber Cafe Visitors regarding
cyber Security and precautions they take to avoid Cyber-crime. To study the awareness
and precaution factors, factor analysis is used to develop concise multiple item scales for
measuring various constructs. This test is carried out by using Bartlett‟s test of

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 13


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Sphericity which checks the determinant of correlation matrix into consideration which
converts it into a chi-square statistics. Another condition needs to be fulfilled before
factor analysis would be carried out Kaiser –MeyerOlkin (KMO) statistics. To study the
awareness and precautions to avoid Cybercrime the cyber security awareness parameters
was considered. This parameter is based on the questionnaire of Visitors .

2) H2. “The Cyber Cafe rules and regulations have adversely affected Cyber

Cafe.”

This hypothesis has been tested by using the primary data collected from Owner
regarding the rules and regulations followed in Cyber Cafe and their effect on Cyber
Cafe business. To study the adverse effect of rules and regulations of Cyber Cafe, the
parameters such maintaining log registers, type of cubicle and its height,electronically
maintained records, document verification, web camera, decline in Cyber Cafe Visitors
etc. were considered and Z- Statistics at the 5% level of significance is used. This
parameter is based on the questionnaire of Owners.

3) H3. “Cyber Cafe Owners feel that there is a lacuna in the audit done”

This hypothesis has been tested by using the primary data collected from Owner

regarding the audit done in Cyber Cafe by government official. In this case Z Statistics at
the 5% level of significance is used. This parameter is based on the questionnaire of
Owners.

METHODOLOGY:-

Data mining offers with the discovery of unpredicted patterns and hidden new ideas
which can be in tremendous databases It serves as an automatic instrument that uses
multiple evolved computational strategies, together with synthetic intelligence (the usage
of computer systems to perform logical services), to discover wholly and signify big
knowledge units involving one or more information sources, opting for colossal,
recognizable patterns, traits, and relationships now not easily detected via normal
analytical procedures on my own. This knowledge then may support with quite a lot of
functions, such because the prediction of future activities or behaviours. The
development of new intelligent tools for automated data mining has led to design and
construct the successful systems that show early promise in their ability to scale up to the

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 14


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

handling of voluminous data sets. We are using clustering and k-means creates groups
from a set of objects so that the members of a group are more similar. It’s a popular
cluster analysis technique for exploring a data.

1. TYPE OF RESEARCH METHOD USED


It is propose to use survey method , descriptive study of research .

2. SAMPLING AND DESIGN


One of the best ways to achieve unbiased results in a study is through
random sampling. Random sampling includes choosing subjects from a population
through unpredictable means. In its simplest form, subjects all have an equal chance
of being selected out of the population being researched. In random sampling, three
methods are most common when conducting surveys.
Random number tables, more recently known as random number
generators, tell researchers to select subjects at an interval generated randomly.
Mathematical algorithms for pseudo-random number generators may also be used.
Post-facto design for Autopsy is administered to find out the sequential
pattern. Post-facto design has two main: Prospective and Retrospective designs: find
naturally occurring groups (thus, "after the fact") and follow them forward
(prospective) or trace their histories (retrospective).
It is not practically possible to collect the primary data from all the
virtually accused. This has been taken to have an in-depth study, attempting to cover
any type of cyber crimes like source code tampering, bomb threat SMS, copy rights
and so on. However attempt is made to justify the design made in this research. From
this, generalization can be made by extending the findings from one to many, from
typical to universal, and from microcosm to macrocosm.

3. SAMPLE SIZE :-

The sample size is 50 out of the total population of 557, which is representative sample
cut across all categories of the crimes registered and unregistered. Random and stratified
techniques is used to identify the samples Out of the 50 samples identified, 18 are
rejected, as these respondents are not traceable during the study. As a result 481 are valid
samples and it constitutes 8.63 %, hence taken for the research study. The secondary

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 15


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

sources- published and mimeo (Un Published) are relied upon to articulate further data
for the research

The study is related to the Cyber Cafe in Bangalore city. The researcher has
considered the Bangalore urban region for the study. This study is primarily focused on
cyber security management awareness and implementation in Bangalore urban region.
Also it focuses on impact of Cyber-crime on Visitor and study and identifies problems
faced by Cyber Cafe Owners. The scope of the research is limited to

1. Cyber Cafe –Owners

2. Cyber Cafe - Visitors

It is known for its educational facilities, having more than a hundred


educational institutes and nine universities, as well as its growing industrial facilities.
Bangalore city is an administrative canter and now an important industrial hub with
reference to IT. Bangalore was called "The Oxford of the East" by Jawaharlal Nehru,
India's first Prime Minister, due to the well-known academic and research institutions in
the city. Bangalore attracts students from every nook and corner of the world. Foreign
students find Bangalore very peaceful and safe compared to other educational cities of
India. Bangalore economy is driven by its manufacturing industry, although information
technology has become increasingly prominent in the last decade. Now Bangalore is
transforming 36 into a vibrant modern city with cafe bubbling activities in the IT and Hi-
Tech sectors. Bangalore is India‟s first wireless city. Intel Technology Pvt. Ltd, PMC
and Microsense have joined hands to commercially roll out the first phase of a 802.16d
Wi-Fi and WiMAX network in the city. During the course of the present study the
researcher has focused on the study of the cyber security in the Bangalore region as well
as on Cyber Cafe Owners to observe how cyber security is implemented and observe
awareness of cyber security among Cyber Cafe Visitors. The geographical location of
Bangalore city and ward offices are indicated by the map

4. PRIMARY DATA :-
The primary data was collected by using the Questionnaire-cum-
schedule method. The tool for the data collection was constructed by the researcher
which was pre tested by a pilot study. The tool was standardized by deleting the

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 16


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

insignificant questions and after the validation the Tool was used for this research.
As there is no standard tool available for this type of research constructed the tool
based on the review of related literature and the objectives of the study. The
instruments used during the study included a web-based survey, telephone
interviews, e-mail statements, face-to-face interviews, case studies and
questionnaires.

Questionnaires : The following steps were used for collecting the primary data.
Distributing the questionnaire & getting it filled by the concerned respondents. For
this purpose an online questionnaire as well as the manual method was used for
collecting data. Personally visiting the Cyber Cafe for interviews and manual
collection of data from Cyber Cafe. Personally visiting the Cyber Cafe as Visitors for
observation purpose.

5. SECONDARY DATA:-

The Secondary data is used to study the awareness of Cyber security


with the help of earlier research studies made by others. It is also used to find out
security management in Cyber Cafe. It is helpful to study the objectives and hypotheses
framed for the present study.

The secondary data is collected from reputed journals and magazines,


newspapers, articles, internet websites and archives. For collecting this data the
researcher has visited various libraries.

Limitations of the Study

The researcher being from a technical field may not be able to understand
terminologies which are not related to the subject like process of amendment in cyber
security law, legal formalities if Cyber Cafe Owners want to run other business along
with internet service etc. Since a number of registered and unregistered Cyber Cafes are
found in Bangalore city, expanding the sample frame for the survey had to be restricted
in the sample size.

1. The research is limited to only from Cyber Cafe in Bangalore city due to
time limitation in obtaining data across larger geographical area.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 17


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

2. The research is limited to only the registered Cyber Cafe in Bangalore city so
as to understand whether registered Cyber Cafe Owners are aware about cyber security
49 and how they implement it. Unregistered Cyber Cafes are not considered even though
they are in vast numbers.

3. The detail study of role of police in examining the cyber security is not
considered for the study but an brief overview is considered for their routine visit to
Cyber Cafe as per rules and regulations

4. The other activities such as travel agencies, photocopying, property agents,


lottery centres etc. was also done by Cyber Cafe Owners who was not focused by
researcher since it did not affect the cyber security of Cyber Cafe but were also
considered illegal as they were working without license for it.

5. The problem told by most of the Owners related to corruption and bribe by
government officers are also not considered since the focus of the study is cyber security.

References period :-

The project period range is 6 weeks

REVIEW OF LITERATURE OF CYBER CRIME ON SOCITY :-

1. Agarwal, S.C.

, in his article “Training on Cyber Law, Cyber Crime and Investigation by Police: Need
of Awareness and Requirements” 35 has stated that the law enforcement officials
throughout the world are severely handicapped in tackling the new wave of cyber crimes.
He has gone to the extent of saying that you “either have to take a cop and make him a
computer expert or take a computer specialist and make him a cop”.36 He has suggested
that we have to set up a Cyber Crime Investigation and Training Cell in all the States for
imparting training to the police personnel, public prosecutors and judicial officers.37

2. Ahmad, Farooq

in his article “Interplay of Internet Domain Names and TrademarkLaw”,38 has observed
that internet domain names have spawned unprecedented legal issues which do not have
express solution. Though the courts have accorded equal protection to trademarks and

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 18


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

domain names, but still domain names are at stake due to highly technical nature of
computers and internet the role of Uniform Domain Name Dispute Resolution Policy
(UDRP) in protecting domain names.39

3. . Behra, Abhimanyu

in his article “Cyber Crime and Law in India”,40 has discussed various types of
cyber crimes and also suggested strategies to curb them.

4. Dalal, A.S.,

“Jurisdiction in Cyberspace”,41 has elaborately examined the jurisdictional


issue in trans-border cyber crimes and calls for an effective international regime to tackle
the recently evolved cyber menace..

5. Heuven and Botterman(2003)

Opine that e-frauds and identity thefts have caused financial loss on a global level
and is a challenge for the nation’s infrastructure and security. Further, cyber criminals
are using networks to commit traditional crimes online such as child pornography and
pirated software .Legislation and effective enforcement is needed to counter attack
viruses, hackers and terrorists. However, the authors have not discussed the effects of
cyber crime on society. They have limited themselves on technical issues.

6. Brenner (2010)

The fact that common man has a limited knowledge about the crimes
which occur in cyberspace. Online crimes nowadays have an impact on the lives of
individuals and on society as a whole. Cyber crime as Brenner explains is not a new form
of crime. The information that we post online makes us vulnerable to cybercrime.
Brenner discusses hackers as ‘computer whizzes’ who attack websites for online
extortion. The crucial point is that a lack of sufficient number of law enforcement and
security experts in the field of cyber crime makes us more vulnerable to cyber attacks.
However, the techniques which are deployed to prevent computer intrusions are far
behind the techniques used by cyber criminals. The author criticizes law enforcement
agencies while he himself has not analyzed as how technology can be used effectively to
control cyber crime.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 19


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

7. Furnell (2002)

Examines the development of information society and the history of


Internet. He talks about various tools and skills that are used in hacking. He characterizes
malware viruses and malware incidents. Not only this, Furnell observes social, political
and commercial impacts of hacking. He describes hackers as the members of an
emerging subculture in modern society. He also identifies the causes of the development
of negative stereotypes of hackers. But Furnell has not discussed the means and
measures to control hacking

8. Arquilla (2001)

25 views ‘Net war’ as a term that is derived from the effects of


Information revolution. The author evaluates organized terrorist groups who are using
Information Technology, particularly in the middle east countries. He also suggests a
Counterterrorism policy. Network oriented terrorists also use information technology for
making disruptive attacks. It includes hacking computer system through e-bombs and
spamming to deface web sites. Pakistan’s Lashkar-e-Taiba claimed to attack Indian
military websites in early 2000. Thus Technological Revolution has ushered an era of
Internet Activism. The author emphasizes on counter net war. The rise of net war and its
early effects on society implies a greater need for governments to come together and
work together against ‘Net war’. Even though he talks about controlling net war, he
could not suggest ways to counter attack the terrorist or cyber criminals. He also limits
his study to Middle East countries. .

9. Nandan Kamath

The book “Law relating to Computers, Internet and E-commerce: A Guide to


Cyber Laws and the Information Technology Act, 2000”19has commented on the
emerging field of ‘electronic evidence’ in the cases of cybercrimes. He has made an in-
depth study about the admissibility and authenticity of electronic records, burden of
proof in cyber offences, and of certain other concepts like production and effect of such
evidences, video-conferencing, forensic computing and best evidence rule etc.20e

10. Rodney D. Ryder

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 20


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

The book “Guide to Cyber Laws (Information Technology Act,2000, E-


commerce, Data Protection and the Internet)30 has exhaustively dthe provisions of
the Information Technology Act, 2000 as amended in the year 2008. He has pointed
out some grey areas of the Act and has also suggested the remedial reforms in order
to provide more teeth and nail to the Act.

CHAPTER SCHEME:

The proposed mini project will be presented in 5 chapters they are as follows:

CHAPTER 1: Introduction

CHAPTER 2: Design of the study

CHAPTER 3: Profile of the present crime scenario in the society

CHAPTER 4: Data analysis and interpretation

CHAPTER 5: Summary of findings, suggestions and conclusions

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 21


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Chapter 3

Profile of the present crime scenario in the society

CYBER CRIME
Cybercrime, or computer-oriented crime, is the crime that involves a computer and
a network. The computer may have been used in the commission of a crime, or it may be
the target.Cybercrimes can be defined as: "Offences that are committed against
individuals or groups of individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm, or loss, to the victim directly
or indirectly, using modern telecommunication networks such as Internet (networks
including but not limited to Chat rooms, emails, notice boards and groups) and mobile
phones (Bluetooth/SMS/MMS)". Cybercrime may threaten a person or a nation's security
and financial health. Issues surrounding these types of crimes have become high-profile,
particularly those surrounding hacking, copyright infringement, unwarranted mass-
surveillance, extortion, child pornography, and child grooming. There are also problems
of privacy when confidential information is intercepted or disclosed, lawfully or
otherwise. Debarati Halder and K. Jaishankar further define cybercrime from the
perspective of gender and defined 'cybercrime against women' as "Crimes targeted
against women with a motive to intentionally harm the victim psychologically and
physically, using modern telecommunication networks such as internet and mobile
phones". Internationally, both governmental and non-state actors engage in cybercrimes,
including espionage, financial theft, and other cross-border crimes. Cybercrimes crossing
international borders and involving the actions of at least one nation state is sometimes
referred to as cyber warfare.

A report (sponsored by McAfee), published in 2014, estimated that the annual damage to
the global economy was $445 billion.Approximately $1.5 billion was lost in 2012 to
online credit and debit card fraud in the US. In 2018, a study by Center for Strategic and
International Studies (CSIS), in partnership with McAfee, concludes that close to $600
billion, nearly one percent of global GDP is lost to cybercrime each year.

Computer crime encompasses a broad range of activities.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 22


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Financial fraud crimes:-

Computer fraud is any dishonest misrepresentation of fact intended to let another to do or


refrain from doing something which causes loss. In this context, the fraud will result in
obtaining a benefit by:

 Altering in an unauthorized way. This requires little technical expertise and is


common form of theft by employees altering the data before entry or entering false
data, or by entering unauthorized instructions or using unauthorized processes;
 Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized
transactions. This is difficult to detect;
 Altering or deleting stored data;

Other forms of fraud may be facilitated using computer systems, including bank
fraud, carding, identity theft, extortion, and theft of classified information.

A variety of internet scams, many based on phishing and social engineering, target
consumers and businesses.

Cyber terrorism:-

Government officials and information technology security specialists have documented a


significant increase in Internet problems and server scans since early 2001. But there is a
growing concern among government agencies such as the Federal Bureau of
Investigations (FBI) and the Central Intelligence Agency (CIA) that such intrusions are
part of an organized effort by cyber terrorists, foreign intelligence services, or other
groups to map potential security holes in critical systems. A cyber terrorist is someone
who intimidates or coerces a government or an organization to advance his or her
political or social objectives by launching a computer-based attack against computers,
networks, or the information stored on them.

Cyber terrorism in general can be defined as an act of terrorism committed through the
use of cyberspace or computer resources (Parker 1983). As such, a simple propaganda
piece in the Internet that there will be bomb attacks during the holidays can be
considered cyber terrorism. There are also hacking activities directed towards
individuals, families, organized by groups within networks, tending to cause fear among

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 23


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

people, demonstrate power, collecting information relevant for ruining peoples' lives,
robberies, blackmailing etc.

Cyber extortion :-

Cyber extortion occurs when a website, e-mail server, or computer system is subjected to
or threatened with repeated denial of service or other attacks by malicious hackers. These
hackers demand money in return for promising to stop the attacks and to offer
"protection". According to the Federal Bureau of Investigation, cybercrime extortionists
are increasingly attacking corporate websites and networks, crippling their ability to
operate and demanding payments to restore their service. More than 20 cases are
reported each month to the FBI and many go unreported in order to keep the victim's
name out of the public domain. Perpetrators typically use a distributed denial-of-service
attack. However, other cyber extortion techniques exist such as doing extortion and bug
poaching.

Cyber warfare:-

The U.S. Department of Defence (DoD) notes that the cyberspace has emerged as a
national-level concern through several recent events of geostrategic significance. Among
those are included, the attack on Estonia's infrastructure in 2007, allegedly by Russian
hackers. "In August 2008, Russia again allegedly conducted cyber-attacks, this time in a
coordinated and synchronized kinetic and non-kinetic campaign against the country
of Georgia. The December 2015 Ukraine power grid cyber-attack has also been
attributed to Russia and is considered the first successful cyber-attack on a power grid.
Fearing that such attacks may become the norm in future warfare among nation-states,
the concept of cyberspace operations impacts and will be adapted by war fighting
military commanders in the future.

Computer as a target :-

These crimes are committed by a selected group of criminals. Unlike crimes using the
computer as a tool, these crimes require the technical knowledge of the perpetrators. As
such, as technology evolves, so too does the nature of the crime. These crimes are
relatively new, having been in existence for only as long as computers have—which
explains how unprepared society and the world in general is towards combating these
crimes. There are numerous crimes of this nature committed daily on the internet.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 24


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Crimes that primarily target computer networks or devices include:

 Computer viruses
 Denial-of-service attacks
 Malware (malicious code)

Computer as a tool :-

When the individual is the main target of cybercrime, the computer can be considered as
the tool rather than the target. These crimes generally involve less technical expertise.
Human weaknesses are generally exploited. The damage dealt is
largely psychological and intangible, making legal action against the variants more
difficult. These are the crimes which have existed for centuries in the offline
world. Scams, theft, and the likes have existed even before the development in high-tech
equipment. The same criminal has simply been given a tool which increases their
potential pool of victims and makes them all the harder to trace and apprehend.[14]

Crimes that use computer networks or devices to advance other ends include:

 Fraud and identity theft (although this increasingly uses malware, hacking or
phishing, making it an example of both "computer as target" and "computer as tool"
crime)
 Information warfare
 Phishing scams
 Spam
 Propagation of illegal obscene or offensive content, including harassment and threats

The unsolicited sending of bulk email for commercial purposes (spam) is unlawful in
some jurisdictions.

Phishing is mostly propagated via email. Phishing emails may contain links to other
websites that are affected by malware. Or, they may contain links to fake online
banking or other websites used to steal private account information.

Obscene or offensive content:-

The content of websites and other electronic communications may be


distasteful, obscene or offensive for a variety of reasons. In some instances these

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 25


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

communications may be illegal.The extent to which these communications are unlawful


varies greatly between countries, and even within nations. It is a sensitive area in which
the courts can become involved in arbitrating between groups with strong beliefs.One
area of Internet pornography that has been the target of the strongest efforts at
curtailment is child pornography, which is illegal in most jurisdictions in the world.

Online harassment

Whereas content may be offensive in a non-specific way, harassment directs obscenities


and derogatory comments at specific individuals focusing for example on gender, race,
religion, nationality, sexual orientation. This often occurs in chat rooms, through
newsgroups, and by sending hate e-mail to interested parties. Harassment on the internet
also includes revenge porn. There are instances where committing a crime using a
computer can lead to an enhanced sentence. For example, in the case of United States v.
Neil Scott Kramer, Kramer was served an enhanced sentence according to the U.S.
Sentencing Guidelines Manual §2G1.3(b)(3) for his use of a cell phone to "persuade,
induce, entice, coerce, or facilitate the travel of, the minor to engage in prohibited sexual
conduct." Kramer argued that this claim was insufficient because his charge included
persuading through a computer device and his cellular phone technically is not a
computer. Although Kramer tried to argue this point, U.S. Sentencing Guidelines Manual
states that the term computer "means an electronic, magnetic, optical, electrochemically,
or other high-speed data processing device performing logical, arithmetic, or storage
functions, and includes any data storage facility or communications facility directly
related to or operating in conjunction with such device."

Connecticut was the U.S. state to pass a statute making it a criminal offense to harass
someone by computer. Michigan, Arizona, and Virginia and South Carolina have also
passed laws banning harassment by electronic means.

Harassment as defined in the U.S. computer statutes is typically distinct from cyber
bullying, in that the former usually relates to a person's "use a computer or computer
network to communicate obscene, vulgar, profane, lewd, lascivious, or indecent
language, or make any suggestion or proposal of an obscene nature, or threaten any
illegal or immoral act," while the latter need not involve anything of a sexual nature.

Although freedom of speech is protected by law in most democratic societies (in


the US this is done by the First Amendment), it does not include all types of speech. In

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 26


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

fact spoken or written "true threat" speech/text is criminalized because of "intent to harm
or intimidate", that also applies for online or any type of network related threats in
written text or speech. The US Supreme Court definition of "true threat" is "statements
where the speaker means to communicate a serious expression of intent to commit an act
of unlawful violence to a particular individual or group".

Cyber Crimes Includes

E mail bombing:

This is a serious crime in which a person sends a numbers of emails to the


inbox of the target system/person. Mail bombs will usually fill the allotted space on an e-
mail server for the users e-mail and can result in crashing the e-mail server

Hacking:

Among the all types of cybercrime it is the most dangerous and serous thread to
the internet and e-commerce. Hacking simply refers to the breaking into the computer
system and steals valuable information (data) from the system without any permission.
Hacking is done by hackers now the question arises who are hackers; hackers are in b/w
client & server and able to spoof the data/info. Duplication the IP address illegally.

Spreading computer virus:

It is a set of instruction which is able to perform some malicious operations.


Viruses stop the normal function of the system programs and also to the whole computer
system. They can also ruin/mess up your system and render it unusable without
reinstallation of the operating system A computer viruses can be spread through—Emails
,Cds ,Pen drives (secondary storage),Multimedia, Internet.

Phishing:

phishing simply refers to steal information like passwords, credit card details,
usernames etc. over the internet. Phishing is typically carried out by email spoofing and
instant messaging. In this type of crime hackers make a direct link which directs to the
fake page /website which looks and feel like identical to the legitimate one.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 27


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Identity theft: It simply refers to fraud or cheat others by make their wrong identity of
others. It involves stealing money or getting other benefits by pretending to someone else
Information Technology (Amendment)Act, 2008, crime of identity theft under Section
66-C.Whoever, fraudulently or dishonestly make use of the electronic signature,
password or any other unique identification feature of any other person, known as
identity theft For which criminal shall be punished with imprisonment of either
description for a term which may extend to three years and shall also be liable to fine
which may extend to rupees one lakh.

Internet fraud:

Internet fraud can occur in chat rooms, email, message boards or on websites. In
internet fraud criminal can send fake info to the victim in cases like online purchasing,
real estate, pay BAL, Work-at-home donation processing etc.

Malicious Software:

These are Internet-based software or programs that are used to disrupt a network.
The software is used to gain access to a system to steal sensitive information or data or
causing damage to software present in the system.

Domain hijacking:

It is the act of changing the registration of a domain name without the


permission of its original registrant.

SMS Spoofing:

SMS Spoofing allows changing the name or number text messages appear to
come from. Voice Phishing: The term is a combination of "voice" and phishing. Voice
phishing is use to gain access of private, personal and financial information from the
public. Voice phishing uses a landline telephone call to get information.

Cyber trafficking:

It may be trafficking in weapons, drugs, human beings, which affect the large
numbers of persons.2012, respectively. As per the information reported to and tracked by
Indian Computer Response Team (CERT-In), a total number of 308, 371 and 78
government websites were hacked during the years 2011, 2012 and 2013 respectively

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 28


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

and 16,035 incidents related to spam, malware infection and system break-in were
reported in 2013.

Cybercrime Prevention Strategies

More recent versions of Cybercrime is considered one the most dangerous threats for the
development of any state; it has a serious impact on every aspect of the growth of a
country. Government entities, non-profit organizations, private companies and citizens
are all potential targets of the cybercriminal syndicate. Cyber criminals are no different
than traditional criminals in that they want to make their money as quickly and easily as
possible. Cybercrime prevention can be achieved fairly quickly and in a cost-effective
manner The prevention of cyber-criminal activities is the most critical aspect in the fight
against cybercrime. It’s mainly based on the concepts of awareness and information
sharing. A proper security posture is the best defence against cybercrime. Every single
user of technology must be aware of the risks of exposure to cyber threats, and should be
educated about the best practices to adopt in order to reduce their “attack surface” and
mitigate the risks.

Best Practices for Prevention of Cybercrime

Below mentioned security guidelines and good practices may be followed to minimize
the security risk of cybercrime:

By updating the computers:

keep your computer current with the latest patches and updates. one of the best
ways to keep attackers away from your computer is to apply patches and other software
fixes when they become available. By regularly updating your computer, you block
attackers from being able to take advantage of software flaws (vulnerabilities) that they
could otherwise use to break into your system. While keeping your computer up-to-date
will not protect you from all attacks, it makes it much more difficult for hackers to gain
access to your system, blocks many basic and automated attacks completely, and might
be enough to discourage a less-determined attacker to look for a more vulnerable
computer elsewhere. choose strong passwords and keep them safe passwords are a fact
of life on the internet today—we use them for everything from ordering flowers and
online banking to logging into our favorite airline Web site to see how many miles we
have accumulated. The following tips can help make your online experiences secure

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 29


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Selecting a password that cannot be easily guessed is the first step toward keeping
passwords secure and away from the wrong hands. Strong passwords have eight
characters or more and use a combination of letters, numbers and symbols (e.g., # $ % !
?). Avoid using any of the following as your password: your login name, anything based
on your personal information such as your last name, and words that can be found in the
dictionary. Try to select especially strong, unique passwords for protecting activities like
online banking.

Keep your passwords in a safe place and try not to use the same password for every
service you use online.

Change passwords on a regular basis, at least every 90 days. This can limit the damage
caused by someone who has already gained access to your account. If you notice
something suspicious with one of your online accounts, one of the first steps you can
take is to change your password.

Protect your computer with security software:

Several types of security software are necessary for basic online security.
Security software essentials include firewall and antivirus programs. A firewall is usually
your computer's first line of defense-it controls who and what can communicate with
your computer online. You could think of a firewall as a sort of "policeman" that watches
all the data attempting to flow in and out of your computer on the Internet, allowing
communications that it knows are safe and blocking "bad" traffic such as attacks from
ever reaching your computer. The next line of defence many times is your antivirus
software, which monitors all online activities such as email messages and Web browsing
and protects an individual from viruses, worms, Trojan horse and other type’s malicious
programs. More recent versions of antivirus programs, such as Norton Antivirus, also
protect from spyware and potentially unwanted programs such as adware. Having
security software that gives you control over software you may not want and protects
you from online threats is essential to staying safe on the Internet. Your antivirus and
antispyware software should be configured to update itself, and it should do so every
time you connect to the Internet. Integrated security suites such as Norton Internet
Security combine firewall , antivirus, antispyware with other features such as anti-spam
and parental controls have become popular as they offer all the security software needed

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 30


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

for online protection in a single package. Many people find using a security suite an
attractive alternative to installing and configuring several different types of security
software as well as keeping them all up-to date.

Protect your personal information:

Exercise caution when sharing personal information such as your name, home
address, phone number, and email address online. To take advantage of many online
services, you will inevitably have to provide personal information in order to handle
billing and shipping of purchased goods. Since not divulging any personal information is
rarely possible, the following list contains some advice for how to share personal
information safely online:

Keep an eye out for phony email messages. Things that indicate a message may be
fraudulent are misspellings, poor grammar, odd phrasings, Web site addresses with
strange extensions, Web site addresses that are entirely numbers where there are
normally words, and anything else out of the ordinary. Additionally, phishing messages
will often tell you that you have to act quickly to keep your account open, update your
security, or urge you to provide information immediately or else something bad will
happen. Don't take the bait.

Don't respond to email messages that ask for personal information. Legitimate
companies will not use email messages to ask for your personal information. When in
doubt, contact the company by phone or by typing in the company Web address into
your Web browser. Don't click on the links in these messages as they make take you to
fraudulent, malicious Web sites.

Pay attention to privacy policies on Web sites and in software. It is important to


understand how an organization might collect and use your personal information before
you share it with them.

Guard your email address. Spammers and phishes sometimes send millions of messages
to email addresses that may or may not exist in hopes of finding a potential victim.
Responding to these messages or even downloading images ensures you will be added to
their lists for more of the same messages in the future. Also be careful when posting your
email address online in newsgroups, blogs or online communities. Online offers that look
too good to be true usually are. The old saying "there's no such thing as a free lunch" still

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 31


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

rings true today. Supposedly "free" software such as screen savers or smiley’s, secret
investment tricks sure to make you untold fortunes, and contests that you've surprisingly
won without entering are the enticing hooks used by companies to grab your attention.

Review bank and credit card statements regularly: The impact of identity theft and
online crimes can be greatly reduced if user can catch it shortly after their data is stolen
or when user gets symptoms. Regularly check bank and credit card’s statements. Now,
many banks and services use fraud prevention systems that call out unusual purchasing
behaviour.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 32


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

CHAPTER 4

DATA ANALYSIS AND INTEPRETAION

TABLE 4.1 genders of the respondents

Options no of Respondents Aggregate %

Male 30 60

Female 20 40

Overall 50 100

ANALYSIS

The table 4.1 showing the 60% (30) of respondents are male ,40% (20) respondents
are female . majority of the respondents male .

GRAPGH 4.1 GENER OF THE RESPONDENTS

MALE
FEMALE
TOTALE

INTERPRTATION

From the above graph we can observe the majority of the respondents were male .and
lowest respondents were female.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 33


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

TABLE 4.2 Age of the respondent

PARTICULARS NO OF RESPONDENTS AGGREGATE %

Below 25 27 54
26-30 8 16
31-35 6 12
35-40 5 10

Above 40 4 8
Overall 50 100

Graph 4.2 Age of the respondents

60

50

40

no of the respondents
30
aggregate
20

10

0
below 25 26 to 30 31 to 35 36 to 40 above 40

Interpretation

The above graph shows that the majority of the respondents i.e 54 % of the respondents
aged below 25 years and only 10% respondents aged above 40 years.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 34


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

TABLE 4.3 Marital status of the respondent

Married Unmarried Total

15 35 50

Graph 4.3 marital status of the respondent

Marital status

15

married
unmarried

35

INTERPRETATION

The above graph showing marital status of the respondents, majority of the respondents
were unmarried (35). Lowest respondents were married (15).

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 35


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

TABLE 4.4 Monthly income

Level of income No of respondents Aggregate%


Below 15000 15 30
15000-25000 20 40
25000-35000 8 16
35000-40000 7 14
Over all 50 100

Graph 4.4 Monthly inome

40
30
40

30
16
15 20
20 14

10 no of respondents
8
0 7 aggreagte

INTERPRETAYTION

Graph 4.4 showing monthly income, the majority of the respondents earn 15000 to
25000 and lowest respondents earn monthly income were 35000 to 40000.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 36


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

TABLE 4.5 our country have a current policy on cybercrime


Options No of respondents Aggregate %
Yes 22 44
No 28 56
Total 50 100
Graph 4.5 country have a current policy on cybercrime

160

140

120

100
AGGREGATE %
80
NO OF RESPONDENTS
60

40

20

0
YES NO TOTAL

Interpretation

Graph 4.5 showing that, our country have a current policy on cyber crime ,
majority respondents are no lowest respondent were yes .

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 37


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

TABLE 4.6 Do you know internet


OPTION NO OF Aggregate %
RESPONDE
NTS
YES 50 100
NO 0 0
OVERALL 50 100

GRAPH 4.6 DO YOU KNOW THE INTERNET

160

140

120

100 100 100

80 AGGREGATE %
NO OF RESPONDENTS
60

40
50 50
20

0 0
YES NO TOTAL

Interpretation
Graph 4.6 the above graph shows that the number of respondents have knowledge about
internet

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 38


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

TABLE 4.7 Are you using the Internet

OPTIONS No of respondent Aggregate %


Yes 40 80
No 10 20
Overall 50 100

Graph 4.7 using the Internet

160

140

120

100
100
80 80
aggregate %
60 no of respondents
40
20 40
20 50
0 10
yes
no
overall

INTERPRETATION

Graph 4.7 showing that ,using the internet , majority respondents(80%) were using
internet (40) and not using internet (10)

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 39


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Table 4.8 where we are using internet

Option No of respondents Aggregate %


At home 15 30
At office 20 40
At cyber cafe 10 20
Any other 5 10
Overall 50 100

GRAPH 4.8 using internet

40
40

35
30
30

25
20 20
20 no of respondents
15 aggregate %
15
10 10
10
5
5

0
at home at office at cyber any other
café

INTERPRETATION

Graph 4.8 The graph showing that, where we are using internet, the. majority of the
respondent using internet at office and lowest using internet at other place

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 40


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

TABLE 4.9 Are you using Internet on mobile phone

Options No of respondents Aggregate %


Yes 38 76
No 12 24
Total 50 100

GRAPH 4.9 Are you using Internet on mobile phone

120

100

80
76

60 agrregate %
no of respondents
40

24
20 38

12
0
yes no

INTERAPRITATION

Graph 4.9 The graph showing that where we using the internet on mobile phone,
majority of respondents use internet in phones rather than in cyber centres.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 41


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Table 4.10 frequently you use Internet

Option No of respondent Aggregate %


Daily 40 80
Weekly 5 10
Monthly 5 10
Yearly 0 0
overall 50 100

Graph 4.10 frequently you use Internet

150

100
80
50 aggreagte
40
0 10
5 no of respondent
10
5
0

Interpretation

Graph 4.10 showing that frequently you use the internet , the majority of the respondent
using internet daily and lowest using internet yearly .

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 42


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Table 4.11 In your family who uses Internet other than you

Options No of respondent Aggregate %


Father 10 20
Mother 10 20
Brother 15 30
Sister 15 30
Overall 50 100

Graph 4.11 in your family who uses internet other than you

30 30
30

25 20 20

20
15 15 no of respondent
10 15
10
10 aggreagte

5
0
father
mother
brother
sister

Interpretation

Graph 4.11 showing that , their family members using the internet, majority of the
respondents are brother & sister and lowest respondents were father & mother .

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 43


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Table 4.12 mostly do you do on internet

Options No of respondents Aggregate%


Search 20 40
Chatting 20 40
E mill 8 16
Video games 2 4
Over all 50 100

Graph 4.12 mostly you do on internet

70

60

50

40 40 40

30

20
16
10 20 20
8 4
0 2
searching chatting email video games

Interpretation

Graph 4.12 showing that, mostly using for searching in internet is higher than playing
video games in the internet.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 44


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Table 4.13you have your E-mail account

Options No of respondent s Aggregate

Yes 45 90

No 5 10

Over all 50 100

Graph 4.13 you have your E-mail account

140

120

100

80 aggregate

60 no of responeents

40

20

0
yes no

INTERPRETATION

Graph 4.13 In the above graph the aggregate of having email accounts is higher than the
no of respondent.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 45


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Table 4.14 you get the mail from unknown persons anytime

Options No of respondent s Aggregate %

Yes 5 10

No 45 90

Overall 50 100

GRAPH 4.14 Do you get the mail from unknown persons anytime

no of resopndents

yes
no

45

INTERPRETATION
Graph 4.14 in the above given graph there is less chances of getting Fake
emails from the internet.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 46


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

TABLE 4.15 uses Face book /twitter /blog/any other social network site

Options No of respondents Aggregate %


Yes 42 84
No 8 16
Total 50 100

Graph 4.15 use face book /twitter /blog/ any other social network site

140

120

100

84
80 Column1
aggregate %
60
no of respondents

40

20 42
16
8
0
yes no

INTERPRETATION
In the above graph the aggregate of using face book/twitter is higher in range of 100%.
And no of respondents who use these sites are 50%.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 47


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

TABLE 4.16 view about social networking site (Face book /what's up/
twitter /any other social network site

Options No of respondents Aggregate %


Yes 38 76
No 12 24
Total 50 100

Graph 4.16 view about social networking site (Face book /what's up/ twitter
/any other social network site

NO of respondents

12

yes
No

38

INTERPRETATION

Graph 4.16 In the above graph the number of respondents given positive response
toward the question and less number of respondents are given negative response towards
the question.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 48


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Table 4.17 regularly you update your anti virus

Options No of respondents Aggregate %

Daily 10 20

Weekly 15 30

Monthly 15 30

Yearly 10 20

Total 50 100

Graph 4.17 regularly you update your anti virus

no of respondents
16
15 15
14
12
10 10 10 no of respondents
8
6
4
2
0
0 2 4 6

INTERPRETATION

In the above given graph the 15 members of respondents update antivirus weekly
with the aggregate of 30. And 15 members of respondents update antivirus monthly with
the aggregate of 30. And remaining respondents update according to daily and yearly.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 49


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Chapter -5

Summary of findings, suggestions and conclusions

Findings 0f cyber crime

1. we can observe the majority of the respondents were male .and lowest
respondents were female
2. observe that the in the overall sample size 50, 54% (27)of the respondents are of
the age is below 25 years , 16% (8) respondents between26-30 years , 12% (6)
respondents between 31-35 years ,10%(5) respondents between 36-40 yerars,8%
(4) respondents between above 40 years
3. The marital status of the respondents, majority of the respondents were
unmarried (35). Lowest respondents were married (15).
4. To earn monthly income, the majority of the respondents earn 15000 to 25000
and lowest respondents earn monthly income were 35000 to 40000
5. Does our country have a current policy on cyber crime , majority respondents are
no lowest respondent were yes .
6. do you know the internet ,equal respondents were yes no.
7. The using of the internet , majority respondents(80%) were using internet (40)
and not using internet (10)
8. we are using internet, the. majority of the respondent using internet at office and
lowest using internet at other place.
9. we using the internet on mobile phone, majority of respondents use internet in
phones rather than in cyber centres.
10. you use the internet , the majority of the respondent using internet daily and
lowest using internet yearly.
11. The family members using the internet, majority of the respondents are brother
& sister and lowest respondents were father & mother .
12. The mostly using for searching in internet is higher than playing video games in
the internet.
13. The aggregate of having email accounts is higher than the no of respondent.
14. There is less chances of getting Fake emails from the internet.
15. The aggregate of using face book/twitter is higher in range of 100%. And no of
respondents who use these sites are 50%.

16. The number of respondents given positive response toward the question and less
number of respondents are given negative response towards the question.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 50


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Suggestions of cyber crime :-


I. Improvement of technology is in need of the days. Cyber crimes are such types of
crimes which can primarily be prevented along with other measures. Technological
improvement may be helpful for detection, prevention and commission of such crimes.
High standards for security and network reliability have to be required. Effective
technological "locks" to prevent end users from copying and distributing copyrighted
music in digital form.

2. Special Statutes on cyber crime is required to be passed to deal with the new form of
crimes and to protect digital data. It will include Intellectual Property crimes and crimes
relating to human rights.

3. The Government has to create a special branch of Cyber crimes and Intellectual
Property Crimes within its criminal infrastructure, so that the enforcement personnel may
take quick action against the Cyber Criminals.

4. All sorts of infrastructure facilities are required to be available to the investigating


officers, especially in regard to mobility, connectivity, use of technology. Scientific
training to be provided to the investigating officers to Page No. 211 deal with the new
problems under separate investigating agency to deal with the cyber crimes. 5. The
Economic Espionage Act like law is required to pass for the protection of trade secrets,
pragmatic steps is required to protect confidentiality of trade secrets during investigation
and prosecution.

6. An Act having objectives to prevent computer fraud and abuses are to be enacted to
combat criminal operations. It may be helpful particularly during investigation and
prosecution of criminals. It will deal with security and safety of certain computers,
computer networks and data stored on the computers and unauthorized access to
Government Computers. The Act will also deal with hackers.

7. In case of digital technology, various problems are experienced. Problems of


distribution, catching, protection of confidential information, payment mechanism of e-
commerce are few among these. In view of such situation Intellectual Property Laws till
require major amendment to deal with challenges posed by the internet and digital
revolution.

8. It has been the fact that there is some grey areas in Intellectual Property regarding
"domain name". Though the domain names are protected under relevant l.P. Law. There
is scope of further amendment of such laws to make this more clearer for ends of
effective increase of the commerce.

9. Good infrastructure and facilities be provided by the Government to the Cyber Crime
Cell and the Cyber Crime Police Station to deal with the cyber crimes. With weak
infrastructure facilities the police personnel facing tremendous problem in detecting and

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 51


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

investigating of crimes and sometimes they fell helpless. To train law-enforcement


personnel and the prosecution for understanding the technological aspects and their use
in crimes. The Government has to establish advanced cyber labs and to provide different
levels of training to police. Creating awareness on data security understanding cyber
crime, to understand how to survey a crime scene and preservation of evidence,
identification of digital evidence, understanding computer hardware and data storage.

10. It also requires the maintenancf compulsory Register of every cyber cafe for
detection of cyber criminals who are sending threat e-mails and are interested to Page
No. 212 practice such other acts involving the question of the country's safety and
security.

11. The users are not aware of using computer and Internet. The ISPs have to provide
some sort of warning on the Internet. Awareness of general public and investigation
agencies is essential. Active involvement of the Government is also essential. ISPs have
to be more accountable to the Government and also to the public for providing required
information. The Government has to frame stringent law upon the ISPs.

12. The punishment for commission of cyber crimes to be increased to deter future
offence. It must not only be deterrent but must also be exemplary.

13. For increasing awareness the emphasis has to be laid on cross-border investigation
and exchange of measures for prevention of Cyber Crimes among various nations.

14. The Interpol, the Police Organization may be utilized for speedy exchange of
information and materials required for prosecution of cyber criminals for its trans-border
nature. In absence of extradition treaty with number of countries it has been difficult to
apprehend the cyber criminals and to have necessary information from other countries
when criminal operation is being done from other countries. It is therefore urgent need of
time that Government may consider to take the help of INTERPOL. It is also intended
that necessary legal provision should be included in the proposed new Act.

15. Alike Green Bench, a Special Bench for dealing with cyber crimes may be created at
least in each and every High Courts. Special branch may also be created in every
metropolitan cities and districts.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 52


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Conclusion of cyber crime


The cyber crime is a new invention of crimes made by a class of intellectual,
sophisticated criminals. Since long time the criminal jurisprudence was totally ignorant
of such types of crimes, although these were committed in different forms during early
development of crimes and criminology. One can say that the cyber crimes started to
operate when technology reaches its peak and took new tum to satisfy human needs and
desires. Because such cnmes being committed with the help of machines and on
arithmetical formulation, are different types in nature from that of ordinary types of
crimes. These crimes contain the elements of blue colour and white colour crimes. These
are blue colour crimes because these are not very different from other prototype crimes,
though recognized by various names. These are also white colour in nature because
crimes are usually committed by a class of criminals who are having knowledge about
science and technologies. For this reason I dare to say that cyber crimes are an
amalgamation of blue colour and white colour crimes. In the selected subject of work, I
made a thorough study on the new forms of crimes. The criminals of this advanced age
endeavour to commit this new crimes with the help of computers through Internet by
exploiting cyber space. This is a new subject and the world facing problem to tackle the
situation. In Chapter I and II, I discussed about the development of computer and
Governance in cyber space. In Chapter III to V, I discussed on cyber crimes, statutes
dealing with cyber crimes and its prevention, protection and control. In Chapter VI to
VIII, I discussed on Intellectual Property Rights, the I.P. Crimes and Treaties and Human
Rights. And in last Chapter I discussed on Digital Dilemma. To realize the subject of
'cyberspace' and 'cyber crime', it is important to know the history and gradual
development of modem computer and its application. Historically the modem computer
of the first decade of 2nd century directly descended from calculating machines, like
IBM-I, Automatic Sequence Controlled calculator. The history of computer is directly
linked with the history of computation. The modem computer can work with number, its
main use for storing and manipulating information. The outcome of the computer is the
result of the contributions made by unknown persons. The cyberspace is a world in
which every (digital) product carries with it the Page No. 209 possibility of an almost
magical speed, and precision of replication. The Internet is a vast worldwide network of
powerful computer sensors which are constantly connected to each other via high speed
communication cables. All the information that is on the Internet is stored on one of the
servers. The Internet is a virtual space in which user send and receive e-mail, log in to
remote computers, brouse-databases information and send and receive programmes
contained in the computers.

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 53


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

BIBLOGRAPHY:
1. BOOKS:
 Tipton ,Harold F& Krause , Micki . information security ,management
handbook (5th ed) .London : Taylor & Francis e –library,2005
 Cyber crimes against women in India.
 Understanding cybercrime: Phenomena, challenges and legal response .
 Comprehensive Study on Cybercrime .
2. ARTICLES :
 Cyber crime in the society : problems and preventions
(kamini dashora , phD , principal p.p Patel college )
 Cyber crime threats for E – commerce.
 A Literature Review on cyber crime security in India context

 cyber security is a business risk, not just an it problem


3. JOURNAL , MAGAZINES AND NEWSPAPERS :
 Cyber crimes against woman in India.
 Magazines such business world business today , investors guide , capital
market etc .
 New papers such as economic times , financial express business line etc .
4. WEBSITES :
 https://www.techopedia.Com
 https://en.m.wikipedia.org
 https://www.japss.org
 https://www.computer.org

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 54


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

Cyber crime questionnaire:

1. 1.gender of the respondents

a)male b)female c)others

2. Age of the respondents

a)below 25 b)26 -30

c)31-35 d)36-40

3. 3.Martial status
a)Married
b) unmarried

4. .Monthly income
a)Below 15000 b) 15000-25000
c)25000-35000 d) 35000-40000
5. Does our country have a current Policy on cybercrime?

a)Yes

b)No

6. Do you know Internet?

a) Yes

b)No

7. Are you using the Internet?

a)Yes

b)No

8. If yes where we are using internet ?


a)At Home

b) At Office

c)At Cyber café

d) Any Other

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 55


IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY

9. Are you using the internet on Mobile phone?


a)Yes
b)No
10. How frequently you use Internet?

a)Daily

b) Weekly

c)Monthly

d) Yearly

11. In your family who uses the internet other than you?

a)Father

b)mother

c)brother

d) sister

12. mostly commonly why do you use internet ?


a)Searching
b)Chatting
c)e-Mailing
d)Video games
13. Do you have your e-mail account ?
a)Yes
b)No
14. Do you get the mail from unknown persons any time?
a)Yes
b)No
15. .Do you use / Face book / twitter /Blog / Any other social network site?
a) Yes
b)No
16. 16.What is view about social networking site (Face book/Whatsup/E.g Orkut /
Facbook / twitter / Any other social network site)
a)yes
b)No
17. How regularly change the computer / mail password
a) Daily
b) weekly
c) monthly
d) yearly

GOVERNMENT FIRST GRADE COLLEGE VIJAYANAGARA, BANGALORE -104 Page 56

S-ar putea să vă placă și