• +91-9555269393
  • info@ijdssh.com

International Journal of Development in Social Sciences and Humanities

(By Aryavart International University, India)

International Peer Reviewed (Refereed), Open Access Research Journal

E-ISSN:2455-5142 | P-ISSN:2455-7730
Impact Factor(2020): 5.790 | Impact Factor(2021): 6.013

IJDSSH
Typically replies within an hour

IJDSSH
Hi there

How can I help you?
Chat with Us

Paper Details

LEVERAGING THE PROVISION IN THE INDIAN CYBER CRIMINAL LAW TO ENHANCE ITS SAFEGUARDS AND PREVENTION APPROACH

Vol. 10, Jul-Dec 2020 | Page: 100-107

Yashika Nagpal
Amity Law School, Delhi (Affiliated to Guru Gobind Singh Indraprastha University)

Received: 14-08-2020, Accepted: 24-09-2020, Published Online: 06-10-2020


. Download Full Paper

Abstract

The term "cyber crime" refers to crimes that involve the use of a communication channel or device as a medium, whether it be a laptop, desktop, PDA, mobile phone, watch, or a vehicle, directly or indirectly. Government and corporate leaders should be concerned about cyber-attacks, according to the "Global Risks for 2012" study. The impact of cybercrime on victims can last for years since it is difficult to identify and impossible to stop once it has occurred. This is a word we hear a lot in the media because of the growing popularity of online banking and shopping, both of which need sensitive personal and financial data. Now that we know what this crime is and how it operates against us, we can better defend ourselves. This paper presents a brief overview of all about cyber criminals and crime with its Evolution, Causes, Types, CYBER law, importance of cyber law, cyber law required, components of cyber law, prevent cyber crime, and find conclusion

Reference
  1. Authored by Laxmi Narayan Opposite NKT college, Ganpat JairamKharkar Marg, Shivanjali CHS,Kharkar Alley,Thane, Maharashtra
  2. Authored by Dr. Mrs. Pratibha Cyber laws and Information Technology Dr. Mrs
  3. Cyber Crimes And The Cyber Laws in India.Cyber Stalking & the Impact of its
  4. An overview of cyber laws Vs cybercrimes: in Indian
  5. cyber law and cyber security in developing and emerging economies Zeninab karake- Shalhoub, Lubna Al Qasimi.
  6. March 2012K. Elissa, “Title of paper if known,” unpublished.
  7. Birk, D.; Gajek, S.; Grobert, F.; Sadeghi, A.-R.; , 'Phishing Phishers - Observing and Tracing Organized Cybercrime,' Internet Monitoring and Protection, 2007. ICIMP 2007. Second International Conference on , vol., no., pp.3, 1-5 July 2007
  8. International Conference on , vol., no., pp.3, 1-5 July 2007 8. McCombie, S.; Pieprzyk, J., 'Winning the Phishing War: A Strategy for Australia,' Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second , vol., no., pp.79,86, 19-20 July 2010.
  9. Neufeld, D.J.; , 'Understanding Cybercrime,' System Sciences (HICSS), 2010 43rd Hawaii International Conference on , vol., no., pp.1-10, 5-8 Jan.2010
  10. Mesko, G.; Bernik, I.; , 'Cybercrime: Awareness and Fear: Slovenian Perspectives,' Intelligence and Security Informatics Conference (EISIC), 2011 European , vol., no., pp.28-33, 12-14 Sept. 2011
  11. Cybercrime at a glance,' Spectrum, IEEE , vol.43, no.4, pp.17,, April 2006
  12. Yasinsac, A.; Erbacher, R.F.; Marks, D.G.; Pollitt, M.M.; Sommer, P.M., 'Computer forensics education,' Security & Privacy, IEEE , vol.1, no.4, pp.15,23, July-Aug. 2003 doi: 10.1109/MSECP.2003.1219052
  13. S.C Bhatt, D. Pant, 'Cyber Crime in India,' IJARCS, vol. 2 No.5 pp. 153-156, Sept-Oct 2011
  14. M. Sharma, Pragati. G, “Challenges and Countermeasures for Web Applications” , IJARCS, vol. 2 No.3 pp. 381-384, May-June 2011