Classification of Cybercrimes and Punishments under the Information Technology Act, 2000

Author(s):  
Sree Krishna Bharadwaj H.

Cybercrimes are those crimes which are associated with the latest technology including internet. There are various forms of committing crimes using the internet. As a result newer forms of crimes have emerged in the society. Some of the newer crimes are traditional crimes which are committed through the internet such as defamation, fraud, harassment, trespass etc. It is necessary to understand what the laws in India suggest towards these kind of newer crimes happening in the society. This paper deals with the types of cybercrimes and also provides the offences and punishments under the Information Technology Act, 2000 in India.

2021 ◽  
Vol 21 (4) ◽  
pp. 52-60
Author(s):  
D.A. Brekhov ◽  

The article deals with the problems associated with the lack of a clear specification and a unified approach in the terminology used in the implementation of quantitative accounting and classification of new ways of committing crimes in the field of information technology. A typology of these crimes is proposed, which makes it possible to create a single mechanism for accounting and analytical operations in assessing the state and dynamics of cybercrime.


Author(s):  
Petar Halachev ◽  
Victoria Radeva ◽  
Albena Nikiforova ◽  
Miglena Veneva

This report is dedicated to the role of the web site as an important tool for presenting business on the Internet. Classification of site types has been made in terms of their application in the business and the types of structures in their construction. The Models of the Life Cycle for designing business websites are analyzed and are outlined their strengths and weaknesses. The stages in the design, construction, commissioning, and maintenance of a business website are distinguished and the activities and requirements of each stage are specified.


Author(s):  
Eter Basar ◽  
Ankur Pan Saikia ◽  
L. P. Saikia

Data Technology industry has been utilizing the customary social databases for around 40 years. Be that as it may, in the latest years, there was a generous transformation in the IT business as far as business applications. Remain solitary applications have been supplanted with electronic applications, conferred servers with different proper servers and committed stockpiling with framework stockpiling. Lower expense, adaptability, the model of pay-as-you-go are the fundamental reasons, which caused the conveyed processing are transformed into reality. This is a standout amongst the hugest upsets in Information Technology, after the development of the Internet. Cloud databases, Big Table, Sherpa, and SimpleDB are getting the opportunity to be more natural to groups. They featured the hindrances of current social databases as far as convenience, adaptability, and provisioning. Cloud databases are basically utilized for data raised applications, for example, stockpiling and mining of gigantic information or business information. These applications are adaptable and multipurpose in nature. Various esteem based data organization applications, such as managing an account, online reservation, e-exchange and stock organization, and so on are delivered. Databases with the help of these sorts of uses need to incorporate four essential highlights: Atomicity, Consistency, Isolation, and Durability (ACID), in spite of the fact that utilizing these databases isn't basic for utilizing as a part of the cloud. The objective of this paper is to discover the points of interest and disservices of databases generally utilized in cloud frameworks and to survey the difficulties in creating cloud databases


2020 ◽  
Author(s):  
Kunal Srivastava ◽  
Ryan Tabrizi ◽  
Ayaan Rahim ◽  
Lauryn Nakamitsu

<div> <div> <div> <p>Abstract </p> <p>The ceaseless connectivity imposed by the internet has made many vulnerable to offensive comments, be it their physical appearance, political beliefs, or religion. Some define hate speech as any kind of personal attack on one’s identity or beliefs. Of the many sites that grant the ability to spread such offensive speech, Twitter has arguably become the primary medium for individuals and groups to spread these hurtful comments. Such comments typically fail to be detected by Twitter’s anti-hate system and can linger online for hours before finally being taken down. Through sentiment analysis, this algorithm is able to distinguish hate speech effectively through the classification of sentiment. </p> </div> </div> </div>


Author(s):  
Zhiping Wang ◽  
Xinxin Zheng ◽  
Zhichen Yang

The Internet of Things (IoT) technology is an information technology developed in recent years with the development of electronic sensors, intelligence, network transmission and control technologies. This is the third revolution in the development of information technology. This article aims to study the algorithm of the Internet of Things technology, through the investigation of the hazards of athletes’ sports training, scientifically and rationally use the Internet of Things technology to collect data on safety accidents in athletes’ sports training, thereby reducing the risk of athletes’ sports training and making athletes better. In this article, the methods of literature research, analysis and condensing, questionnaire survey, theory and experiment combination, etc., investigate the safety accident data collection of the Internet of Things technology in athletes’ sports training, and provide certain theories and methods for future in-depth research practice basis. The experimental results in this article show that 82% of athletes who are surveyed under the Internet of Things technology will have partial injuries during training, reducing the risk of safety accidents in athletes’ sports training, and better enabling Chinese athletes to achieve a consistent level of competition and performance through a virtuous cycle of development.


Author(s):  
Andy Paul Harianja ◽  
Iwada Grawilser Talunohi

The development of the field of information technology is very rapid, therefore many companies, industries, shops and other business entities are using information systems to increase their business. Online sales information systems are used to carry out business processes such as distribution, sales, purchasing, marketing of goods or services by using communication networks and the internet. Online sales information systems can help people who do not have a place or shop to carry out their business. Students in this case, especially at the Catholic University of Santo Thomas, are an opportunity to take advantage of this facility in carrying out their business, especially if they do not have a place or shop to carry out their business. For this reason, an online sales information system was built that can be accessed through the website.


2010 ◽  
Vol 43 (12) ◽  
pp. 1344-1350 ◽  
Author(s):  
M. I. Gerasimova ◽  
S. F. Khokhlov
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document