scholarly journals Cyber Crimes against the State: A Study on Cyber Terrorism in India

Webology ◽  
2020 ◽  
Vol 17 (2) ◽  
pp. 65-72
Author(s):  
Dr.T. Ambika ◽  
Dr.K. Senthilvel

The computer and network are utilized each and every aspect of humans wherein the internet gives equal opportunities for every aspect of human development. As the client of the internet becomes progressively differing and the scope of online communication extends, there is development in the digital violations for example break of online agreements, execution of online torts and violations, and so forth. The development of computer technology has many times proved that individuals and some groups in the country are using computer technology to threaten international governments and citizens of a country. This research paper clarifies the different types of cyber crime descriptively and particularly analyze cyber crimes against the state.

The internet helps us in providing information as well as storing all our data, with the rapid increase in our modern technology; it has become very difficult to keep our private information safe. The Internet has also bred a new kind of crime CYBER-CRIME. The other name for Cyber crimes are "Internet Games" and "yahoo yahoo". Common internet users are unaware of Cyber crimes like hacking, identity theft, Credit/debit card frauds, cyber terrorism and many more crimes. This paper attempts to draw out the awareness level of students about cyber crime.


Author(s):  
Hasina Masud Khadas

Cybercrime involves a computer and a network and a computer is an object used for crime. The computer also can be used as a tool to commit an offense. The computer can also be the target of the crime. The internet is a wonderful place to engage us with a lot more of activities……but for whom? There is a possibility that many of us can become victims of the criminals hacking the internet. This paper highlights the overview of cybercrime, the main causes of cybercrimes, the different types of cybercrimes, and their prevention methods.


GIS Business ◽  
2019 ◽  
Vol 14 (3) ◽  
pp. 196-201
Author(s):  
S S KARTHIK KUMAR

Crime is a common word that we always hereof in this era of globalization. Crimes refer to any violation of law or the commission of an act forbidden by law. Crime and criminality have been associated with man since time immemorial. Cyber crime is a new type of crime that occurs in these years of Science and Technology. There are a lot of definitions for cyber crime. It is defined as crimes committed on the internet using the computer as either a tool or a targeted victim. In addition, cyber crime also includes traditional crimes that been conducted with the access of Internet. For example hate crimes, telemarketing Internet fraud, identity theft, and credit card account thefts. In simple word, cyber crime can be defined as any violence action that been conducted by using computer or other devices with the access of internet.


Author(s):  
Rashmi Aggarwal

Cyber law is law of the Internet; hence, any crime on the Internet is basically cyber crime. It is committed on cyber space, but all the pre mediation is an act of individual/s, who are the perpetrators of crime with malicious intentions and commission of these acts. Cyber crimes were initially perceived as a subset of Information Technology (IT) laws, which governed the digital dissemination of both digitalized information and software. Digital information includes information security and electronic commerce. However, as the world became subservient to digitalization, cyber/Internet laws became more pronounced in their origin and are now a special branch of Internet laws. These laws include study of Internet access and usage, privacy rights, freedom of expression, and extra territorial jurisdiction issues. This chapter analyzes the cyber laws in India and raises the issues of criticality of provisions relating to dispute resolution in India.


2018 ◽  
Vol 3 (2) ◽  
pp. 84-97
Author(s):  
Asad Munir ◽  
Ghulam Shabir

Cybercrime is a criminal act committed using computing devices and the Internet. It ranges from downloading pirated movies to destabilizing national economies. Nonfinancial crimes range from phishing to top-notch crimes such as cyber terrorism. Comprehensive detail of such crimes has been revealed through this empirical study. It investigates the level of awareness, crime sophistication, the extent of the vulnerability, and legislation in Pakistan. Important aspects of cyber laws in Pakistan have been put forth. The survey-based study was carried out on university students. Data reveals that the graduate and postgraduate students being the huge consumers of SNS are at a higher risk of being prey to cybercriminals. Students although they have some information on cybercrimes they have very little knowledge on how to stay safe on the internet. Knowledge of cyber laws such as PECO is desirable to be made a part of the syllabi.


Author(s):  
Bayisa Kune Mamade ◽  
Diriba Mangasha Dabala

The advancement of information communication technology has triggered a revolution in using the Internet for legitimate educational purposes on university campuses. Therefore, the Internet has changed the way of human communication and contributed to the development of mankind. On the other hand it is regrettable that its revolution has helped malicious users to exploit it for the malign purpose to commit a cyberspace crime that has in turn negatively affected fellow users who were preyed on by cyber predators. This work aimed to examine the awareness of cybersecurity, the measures taken to protect against cyberattacks and the state of victimization among professors at Ambo University. Thus, the present study comes up with the following findings. First, the result shows that the respondents’ cybersecurity awareness was significantly influenced by cyber-crime victimization, fields of study, and protection measures. Second, the current study also depicts that the respondents’ protection measures were connected to and influenced by cyber-crime victimization, education level, and cyber-security awareness. Finally, the study’s findings show that being a cyber-crime victim has been linked to predictors’ variables: protection measures and the level of cybersecurity awareness.


Internet has become an innovative relief for the modern generation, at it also promote a burden on the society. The internet acts as the genesis and breeding ground for a new kind of crime called the “cyber crime”. Common internet users are not aware of cyber crimes and they are not conscious on the precautionary aspects to over come such attacks from taking place. This paper aims to analyze the awareness levels of internet users towards various forms of cyber crimes. This study was conducted in Krishna and Guntur districts of Andhra Pradesh. Descriptive Research Design was adopted for the study and a sample size of 160 respondents were selected using Random Sampling Technique involving both the genders among the internet users. The findings of the study shows that the awareness levels of the internet users towards cyber crimes in the study area are very low and they have very less perception towards various forms of cyber crimes that exists in the modern times.


2020 ◽  
Vol 3 (1) ◽  
pp. 55-68
Author(s):  
Yumelfi Futra

Cyber ​​Crimeis a form of virtual crime by utilizing computer which connected to the internet network, and exploiting other devices or computers that is connected to the internet. Cybercrime was previously regulated in the regulation Number 36 Year 1999 concerning Telecommunications, however this regulation has not been able to accommodate virtual and computer crimes. To anticipate the development of information technology, regulation Number 19 Year 2016 concerning Amendments to regulation Number 11 of 2008 concerning Electronic Information and Transactions was issued. In Sawahlunto City in 2019, several cyber-crime incidents were found, such as online extortion, fraud through online , and theft of Wi-Fi wireless streams, therefore a research was conducted on how the cyber-crime events that occurred in Sawahlunto City in 2019 , regulations governing cyber, the causes and obstacles in handling the cyber-crime. The data used are secondary supporting data collected through library research and primary data as supporting data which is carried out through field studies with interview techniques. The results showed that: the discovery of cyber-crimes that occurred in Sawahlunto City in 2019 such as online extortion, online fraud and theft of Wi-Fi wireless streams, knowing the regulations on cyber-crime, namely the ITE Regulation and knowing the factors and obstacles in handling cyber-crimes that occurred in the City Sawahlunto in 2019.


2018 ◽  
Vol 10 (1) ◽  
pp. 01-15
Author(s):  
Lukmanul Hakim

Cyber crime or cyber crime is basically an impact of technological developments that have changed the habit of the community that was originally conventional into a more modern habits or can be called a high technology society. This change of habit has resulted in a crime with the use of electronic devices as a crime medium. The main factor that resulted in the switching of these habits is the development of information technology combined with communication media and computer technology, which then produces a new device called Internet. The emergence of the Internet has resulted in a new interaction pattern in the life of society, which initially more real (real) changed into patterns of interaction masayakat which can be said to be virtual Keywords: Bank, Data Theft, Cyber.PERTANGGUNGJAWABAN LEMBAGA PERBANKAN TERHADAP PENCURIAN DATA NASABAH


Author(s):  
Ogochukwu Thaddaeus Emiri

The purpose of this chapter is to examine the concept of cyber crime as it relates to cybercafés, forms of cyber crime, the role of the Internet, and suggest measures of cyber crime control and prevention in cybercafés. This chapter unveils the various forms of cyber crime and preventive measures with the view to addressing insecurity on the Internet and methods of protecting cybercafés systems. This chapter revealed some forms of cyber crimes to include computer viruses, data dwindling, hacking, data leakages, trapdoors, scavenging, e-mail bombing, and so forth, and equally suggested preventive measures such as user education, legal regulations against cyber crimes, international cooperation, restricting system use, limiting access to certain programs, and so forth.


Sign in / Sign up

Export Citation Format

Share Document