Cyber Crime in the Society: Security Issues, Preventions and Challenges
Nitika Goyal1, Deepam Goyal2*
1Department of Computer Science, Guru Nanak College, Budhlada- 151202, India
2Department of Mechanical Engineering, National Institute of Technical Teachers’ Training and Research, Sector- 26, Chandigarh- 160019, India
*Corresponding Author Email: bkdeepamgoyal@outlook.com
ABSTRACT:
Due to the online availability of maximum information nowadays, the current era of digital processing is more vulnerable to cyber threats. It is really difficult to confine the cyber threat in its initial stage as enormous varieties of cyber threats are developing day by day, making it hard to understand their behavior at an early phase. Cyber threats may be initiated intentionally by someone or processed unintentionally. The intentional attacks are categorized as cyber crimes and the society has to face grave consequences due to them. The consequences which may be in the form of financial, psychological or social damage create problems for one and all. Sometimes they even pose threat to national security and peace and harmony of a country. Thus, cyber crimes need to be restricted by analyzing them thoroughly and looking into their impact on different sections of the society. An attempt has been made to study the various forms of prevalent cyber crimes and their social effects. Several preventive measures and future challenges have also been explored during this study.
KEYWORDS: Cyber Crime, Social impact, Social networking sites, Youth.
1. INTRODUCTION
The use of internet has made the current era so fast that it has become difficult to utilize time factor for betterment of performance factor. Connection of millions of computers via internet, making it easy to communicate and share information, has been appreciated by one and all. Everything has its own pros and cons and the negative side of this technology has come out in the form of cyber crimes. The word ‘cyber’ generally refers to the alleged virtual space created by internet and a crime which involves the use of a computer or computer network is termed as cyber crime [1].
Oxford dictionary defines cyber crime as ‘criminal activities carried out by means of computer or internet’ and the same defines crime as ‘an action or omission which constitutes an offence and is punishable by law’. Thus cyber crime can be defined as an action or omission, directly related to use of computer, which constitutes an offence and is punishable by law. Though the word cyber crime is being used at an expedient level for the criminal activities that make use of network technology [2] still no clear definition of cyber crime has been agreed upon [3] and so far it does not hold any formal legal meaning [4].
Some examples of cyber crimes are: unauthorized intrusion into someone’s computer or database, intentional manipulation or removal of offline or online information or causing damage to some equipment or data [5]. Cisco contends that the most disastrous cyber crime threats comprise of a blend of various online segments including the Malware, World Wide Web and Spam etc. [6].
Computer and internet play the role of a partner in cyber crimes [7]. The only reason behind drastic increase in the rate of such crimes is easily available internet facility. While using internet, we often see pop-ups asking for codes, images or communication etc. and such things, if responded to, start malicious activities on our computer. Some of the harms caused by such activities are: financial frauds, identity theft, copyright violation, cyber spying etc. The cyber criminals target either a computer system or users of the systems with the help of their own computer and internet. If the target is a computer system, a code or virus is sent to the system which disables it and in the second case, attacks such as identity theft, espionage, financial theft etc. take place [8].
Handling cyber crimes has become a bone of contention these days. So, computer manufacturers are showing serious concern towards them and taking initiatives in developing new softwares capable of early detection of criminal behavior [9]. Taking one step forward, high quality antivirus is provided as freebie on purchase of new computer system in some countries.
During past few years, the word ‘cyber crime’ has been in the limelight in media. Government, academicians and law enforcement agencies have provided considerate attention towards it. The rising use of technology and specifically internet as a tool in committing crime has been a burning issue for debate in recent days. But the fact is that there is nothing new in the use of technology to strengthen or specifically assist the criminal activities. Thus the concept of ‘hi-tech’ crime is years old and cyber crime can be considered as its extension and not an entirely new concept [4].
2. HISTORY OF CYBER CRIMES
The first ever case of cyber crime was reported in 1820 in France when a textile manufacturer, Joseph-Marie Jacquard, developed the loom. The gadget was used to help in weaving of special fabric by repeating a series of steps automatically. It induced a sense of insecurity among the employees of that textile firm that their livelihood was going to be in danger due to this automation process. This insecurity resulted in the acts of sabotage by the employees in order to discourage the owner from using this device in future [10]. Thus it was the first case of a criminal act committed due to technology.
With the passage of time, a single machine started replacing fifty workers and liberated them to do other jobs. These machines started working independently on their own after being programmed. Due to unmatched efficiency of these machines, business organisations started firing their employees. Thus man became more insecure due to technological advancement [11]. But nowadays we cannot imagine our life without technology and have become addict of it.
The dramatic growth of internet in such a short span of time makes it hard to believe that this deadly technology is less than 60 years old. The birth of internet took place from a project meant to facilitate resource sharing and support military communication by Advanced Research Project Agency in USA in the 1960s. But its commercial and scientific use grew rapidly from 1998 to 1999 [12]. Today internet can be termed as the strong base on which global superhighway of information has been built up. Until early 1990s, internet was a luxury and was not accessible to a common person but development of World Wide Web proved to be a turning point in the field of ICT both positively and somehow negatively [13].
With the quick reception and rapid advancement in the field of Internet in the last two decades, almost each and every business enterprise and individual has got fascinated towards having ‘digital’ or ‘virtual’ presence along with real world existence. Due to the sustained technological advancements, internet has become much advance than just a common source of information [14]. It facilitates real time communication encouraging worldwide prospects through speedy correspondence, social networking, information sharing, online financial activities, e-banking, e-commerce and an inconceivable exhibit of business related activities.
However, it is common that technological advancements bring about numerous and distinct benefits, on the other hand, they also open up new doors for unethical and unlawful practices. It is true that internet has many benefits but with the easily accessible huge global platform, internet provides a mean to the unscrupulous people to take maximum advantage of and to misuse the opportunities provided by one of the most revolutionary inventions in the field of technology. Thus the most undesirable side effect of internet is nowadays termed as ‘Cyber Crime’ [15].
3. CATEGORIES OF CYBER CRIME
Cyber crime is, not at all, an entirely new concept, still there is considerable uncertainty about this latest version of crime among academicians, scholars, cyber security experts and individuals. Thus, cyber crimes have been categorized into various ways as given below:
3.1 Type I and Type II crimes
Type I cyber crime is entirely technological in nature but in the second one, human beings play a more significant part [16].
3.2 Cyber Enabled and Cyber dependent crimes
Basically, cyber crime is a composite term which is used to denote two types of activities: cyber enabled and cyber dependent crimes. These activities are very similar yet equally different [17]. The crimes which are completely dependent and cannot be committed without using a computer system, internet or any other form of ICT are known as cyber dependent crimes. Such crimes are performed by spreading a virus or any other malicious code, hacking or flooding the server in order to bring down the websites or infrastructure known as DDoS attack (Distributed Denial of Service attack). Such attacks are generally targeted against a computer system or any network resource. However there are also secondary outcomes of such attacks i.e. frauds.
The conventional crimes that are augmented in the scale by using information technology are termed as cyber enabled crimes. These crimes differ from cyber dependent crimes on the fact that cyber enabled crimes can be performed without using information technology however cyber dependent crimes entirely depend upon ICT tools and cannot be committed without them. Some examples of cyber enabled crimes are:
· Frauds in the form of phishing, online banking frauds, mass market fraud or email fraud etc.
· Thefts including identity theft, impersonation etc.
· Internet facilitated sexual offending i.e. production, possession and distribution of child pornography.
3.3 Syntactic, Semantic and Blended attacks
Cyber attacks can also be categorized into three types [18]:
· Syntactic attacks
· Semantic attacks
· Blended attacks.
A syntactic attack exploits the loopholes in a hardware or software subsystem for committing a crime. Thus this type of attack looks for technical vulnerabilities in the target. Theft of data by installation of malware on a system is a typical example of syntactic attack.
If a person gains personal information from an individual by exploiting social vulnerability, such act is termed as semantic attack. Example of semantic attack is online auction fraud. Whereas, a Blended attack is performed by a cyber criminal by collecting someone’s personal information available on public platform such as social networking sites and misusing that information. For e.g. phishing attack [19].
3.4 Cyber trespass, Deception, Pornography and Violence
Cyber crimes have been divided into four categories given below: [20]
a) Cyber trespass: This category consists of crimes in which one person illegally intrude into other person’s property with the motive of causing harm e.g. hacking
b) Cyber deceptions and thefts: In this category, those cyber acts are included in which a person steals something which owns to some other person e.g. financial frauds
c) Cyber pornography: It includes the acts by which a person violates the laws on obscenity and commits some indecent act e.g. Child pornography.
d) Cyber violence: The acts which are performed with an intent of hurting a person physically or psychologically are known as acts of cyber violence e.g. Cyber bullying.
4. CATEGORIES OF CYBER CRIMINALS
Cyber criminals have different motives and follow different methods for committing a crime. Various categories of cyber criminals are listed below: [21]
a) Crackers: Most of the computer virus creators fall under this category. The motive of such criminals is usually satisfying some anti-social instinct. However, some of them do such activities just for enjoyment.
b) Hackers: Hackers often attack other person’s or organization’s computer system with different motives some of which are listed below:
· To make use of a more powerful computer
· To educate themselves or gain knowledge about various forms of hacking
· Just because they are curious about doing various experiments on hacking
· To establish themselves in the field of professional hacking
· To build a reputation among their fellow beings.
c) Pranksters: Prankster is a person who commits such acts just because he enjoys playing pranks on others. His motive is not to cause harm to anybody.
d) Career criminals: Career criminals are actual cyber criminals by profession and devote their full time and energy to such crimes. They earn a fraction of or all of their earnings through cyber crime. Some of them work on their own whereas others create organized groups to commit these crimes and actually form ‘Cyber Mafia’.
e) Cyber terrorists: Cyber terrorism is one of the latest forms of cyber crime. There are often reports of hacking of a Government website or crashing of a site with flooding by Cyber terrorists. This is quite harmful and can pose a threat to national security.
f) Cyber bulls: One of the rigorous forms of harassment on internet is cyber bullying. It is done by posting brutal stuff, trying to defame anybody on public platform, creating fake profiles by some other person’s name, posting vicious emails etc.
5. CYBER CRIME DOMAIN
Cyber crime is a global problem which is affecting every business enterprise as well as every individual using a computer system and internet. It is, in fact, taking the form of an epidemic and is as deadly as an AIDS virus. Cyber crime is posing threat to every sphere of life ranging from an individual to a business organization and even national security.
One of the form of cyber crime, financial fraud, has a drastically negative effect on the business, employees as well as its shareholders. Protection of data is a key agenda for various companies these days as an attack on such information may cause irreparable loss to their business. So they spend a handsome amount to protect their sensitive information from cyber attackers. Competitors may take away the intellectual property by attacking the company’s network. Thus cyber crime is a rapidly developing concept and a business enterprise and its shareholders may face irreversible loss by a successful cyber attack [22].
Sometimes, cyber crimes even endanger the national security if some sensitive information gets leaked or stolen on a computer network. The use of information technology as a strong tool by terrorist organizations has become a matter of serious concern after 9/11 attacks in USA. Terrorists have started using computer networks in large attacks which not only pose a threat to human lives but may also cause nationwide panic.
Cyber crime has even made its mark in the field of politics. A politically motivated DOS attack, targeting North Atlantic Treaty Organization computers, was performed in 1999 in which the attackers flooded the targeted network by bombarding e-mails containing viruses [23]. Another classic example of cyber attack against Government was reported in October, 2007 when a Russian Nationalist youth group attacked the website of Ukrainian president Viktor Yushchenko [24].
6. CONVENTIONAL CRIME VS CYBER CRIME
Cyber crime has turned into a fundamental component of the international menace and evokes deadly pictures of extremely intricate online events. It has resulted into subsequent debate pertaining to whether conventional organized crime has given the way to this deadly derivative- cyber crime or cyber crime is a by-product of evolution of internet. Criminal organizations have always used technology as a strong tool. Now the critical point of discussion is whether the technological advancement has just strengthened the commission of traditional criminal activities or whether it has prompted to the formation of a new category of organized but virtual crimes [25].
If we compare traditional crime with cyber crime, a traditional crime, for example stealing money, can be instantly detected and then steps are taken to avoid it next time. However a cyber crime, for example stealing data, is quite different as the stolen information still lies on the server itself and it will appear to be safe and sound to the owner but the executor has also got a copy of the information [26].
In this era of internet, damages always have remote inflict and come to picture after very long period and even some of them never get noticed. Thus damages caused by cyber crimes are totally different from those caused by traditional crime. Traditional crimes cause immediate damage like physical injury, loss of property etc. whereas damages caused by cyber crime i.e. loss of information is not evident immediately like financial loss. The victims of such attack do not even realize that their computer or network has been attacked. For committing a physical crime the offender should be present at the site of the crime (some exceptions are also there like crimes committed using missiles) whereas in case of cyber crime the offender reaches the target via a wired or wireless link. Thus cyber crimes can be committed from anywhere in the world and with less physical effort using the skills and knowledge only [27]. Not only individuals but the whole society and even the entire nation has been facing cyber threat and the most comfortable part of committing a crime in cyber space is that the attacker does not have risk of life or injury while performing such attacks which is more likely while committing physical crime.
7. SECURITY MEASURES FOR SOCIAL NETWORKING SITES
Though it is not mandatory to use a social networking site still we rarely meet someone who has not registered his/her presence on such a platform and if ,by chance, we come across a person without a cyber presence, our first reaction is, “In which century are you living in ?” Thus, in a world where a person, who exists in the real world only and not in the virtual one, is treated as an alien, we not only need to be well versed with the knowledge of using the technology but it becomes even more important to learn how to use this technology safely as in this world of cyber crime we are going to face a new challenge at every step. Given below are some tips which, if followed, will prove to be a bullet proof jacket and will save you from the bullets fired by cyber criminals [28]:
a) Keep you profile private and not public: The most important principle for being safe on SNS is- Do not let everybody peep into your life. Information about you should be accessible only to people in your friend list and it should not be visible to every user present at that platform.
b) Do not add strangers to your friend list: Often the cyber criminals create dummy profiles with impressive information and pictures which can attract any user. Any friend request from such users, whom we come to know just online, should not be accepted as such requests could actually be a honey trap.
c) Try not to publicize your personal information on internet: Your personal details like your contact number, residential address, date of birth etc. should not be posted on internet as publicizing such details can make you an easy target for cyber crime.
d) Be very careful while posting a photo: While posting a photograph on a social networking site, please make sure that your photos do not provide any clue about your whereabouts. Recently, some incidents of theft took place at some houses in India and after investigation, the cops came to know that the thieves got the information that the family is out for a trip to a far away place from their photos posted on social networking site.
e) Avoid posting negative aspects of your life: By posting negative things of your life on social networking sites, you are going to tell your weak points to everyone. Your friends continuously monitor your activities on web and posting negative about yourself is just like maligning your own image.
f) Never try to substitute real friends with virtual friends: It is true that social networking sites provide an amazing platform to connect with people across the globe but make sure that these virtual friends do not substitute your real friends as your real friends will stand by you in tough times and not these cyber friends.
8. CYBER CRIME: PREVENTION STRATEGIES
There are some prevalent ways to prevent cyber crime, one of them is social graph based system which has somehow proved to be helpful in identification of fake accounts and another is CAPTCHA technique which is used to identify distrustful accounts. However, not a single one out of such mechanisms has proved to be fully effective in handling this rising issue. There are some simple tips following which we can protect ourselves from being a victim of such activities [29]:
· By regular updation of computer systems
· By shielding system with high quality anti-virus
· By selecting passwords which are hard to crack.
Some of the technologies to prevent cyber crime can be employed unilaterally whereas some require bilateral or trilateral cooperation. Unilateral technique requires cooperation from one of the communicating parties in order to prevent cyber crime whereas bilateral cooperation requires cooperation from both the communicating parties. Trilateral cooperation involves a third trusted party along with both communicating parties. There are few other technologies which employ multilateral cooperation to introduce strict security features in the system. Such a cooperation involves multiple independent parties in the agreement [30].
One of the theories for crime prevention, Routine Activity Theory (RAT), states that a person having criminal tendency is motivated to commit a crime by two factors: ‘If a suitable target comes in contact’ and ‘if the target does not possess an appropriate protection mechanism’ [31]. Thus the criminal acts only after coming across a lucrative target with weak protection shield [32]. On applying criminological theory on cyber crime, it has been figured out that there are few factors which should be there to commit the cyber crime:
· Criminally/Politically/ Financially motivated person to act as criminal
· Cyber space, resources and skill required to commit the crime
· A weakly shielded system/network
· A weak legislative system (especially in case of cross border cyber crime)
Thus, cyber crimes can be prevented using the following methods:
· Increasing the effort required to commit the crime by strengthening the individual protection mechanism
· Empowering the law enforcement agencies so that chances of criminal to get caught increase manifold.
· Creating incentives for IT service providers who incorporate security features in their products.
9. YOUTH: A PREY TO CYBER CRIME
As we know that children, especially teenagers, are the soft targets of cyber crime thus parents and internet providers need to play an active role to help them from falling in the trap of cyber criminals. Parents should make sure that their child does not share his/her personal information on internet. The service providers should also take some steps to restrict such activities. Parents should continuously monitor the activities of their wards and if any of the following symptoms is observed, they need to be attentive:
· If the child starts spending large time on internet.
· If the child changes screen quickly or switches off the system when anyone comes around.
· If strangers are trying to establish a contact with your child.
To protect the youngsters from being a prey to cyber crime, the following steps should be taken:
· Parents should check their child’s computer regularly and should talk to their child about internet crimes and safety.
· Teachers should make their students aware of the adverse effects of some cyber activities.
· There should be proper firewall restrictions in schools so that students should have access to meaningful and relevant sites only.
· Internet Service Providers should take steps to help teenagers stay away from malicious sites.
By following the above small steps, the teenagers can be protected from being victims of various forms of cyber crime like cyber bullying, cyber stalking, cyber pornography etc.
10. CHALLENGES AND FUTURE DIRECTIONS
Cyber crime is a relatively new concept than traditional crime. A large number of cases of such crimes are not reported by the victims due to lack of awareness and fear of loss of reputation. Out of a small number of reported cases, a majority of these cases remain uninvestigated or unsolved due to lack of established mechanisms in the field of cyber crime [33].
In India, the cases of cyber crimes are handled mainly under The Information Technology Act, 2000 or various sections of Indian Penal Code. The cases of cyber crimes reported and resolved under The Information Technology Act, 2000 from 2011 to 2015 in India are shown in Fig 1. It has been noticed that around 40-50% of cases of cyber crime reported under Information Technology Act, 2000 remain unresolved [34].
Figure 1: Cyber Crimes in India – Cases Registered Under IT Act (2011-15)
The comparison of cyber crime cases reported and people arrested under various sections of Indian Penal Code from 2011 to 2015 in India is shown in Fig 2. The figure shows that in such cases, in only 10-20% cases no arrest has been made and approximately 80 -90% cases have been resolved [34].
Figure 2: Cyber Crimes in India – Cases Registered Under IPC (2011-15)
Figure 3 shows the comparison of aggregate number of cyber crime cases reported and resolved from 2011 to 2015 in India. In aggregate approximately 60-70 % out of total cases of reported cyber crimes could be resolved [34].
Figure 3: Cyber Crimes in India – Total Cases Registered (2011-15)
By analyzing the data given in graphs, it can be concluded that a lot of work needs to be done in the field of cyber crime to help innocent people from falling in the trap of cyber criminals. Cyber crimes seem to be inescapable but their aftereffects can be controlled using mechanisms like laws, acts, rules, regulations etc. Thus cyber crimes should also be punishable offences and fall under jurisdiction of law. But the truth is that we have not been able to develop a full fledge mechanism that can firmly control this menace, however some steps have been taken by the authorities in this direction. The biggest reason behind it is that cyber crimes do not occur in the physical world but in virtual world. Thus it is hard to collect evidences, capture the criminals and penalize them in the digital world. Another reason behind not having sound cyber laws is relatively limited knowledge of people about these crimes and the method to handle them.
Cyber crimes and cyber criminals know no borders and investigations related to cyber crime often need collection of evidence and investigation in more than one country. Thus, due to borderless feature of cyber crime we need solid international co-operation and legislations in order to give a tough fight to the menace. Continuous efforts of international organizations have provided us a legal framework which gives a solid platform to tackle cyber crimes. However, some critical issues are yet to be resolved i.e. uniform definition of such crimes and obligatory sanctions on the offenders. As domestic legislations have different approaches on these issues, thus it is pre-requisite to have a universally applicable legal framework for such matters. It is worth mentioning that international co-operation will be effective only if private sector also becomes a part of these agreements and a harmonized approach is reached upon for combating cyber crimes [35].
11. CONCLUSION
The technology boom initiated by advent of internet has given birth to a virtual world and the byproduct of this world - cyber crime. The aftereffects of cyber crime are so serious and massive to be overlooked. This paper not only addresses various forms of cyber crimes but also illustrates their disastrous effects on various sections of the society. It will encourage masses to keep a vigil on the online activities which may disrupt their critical online as well as offline information. The most serious aspect of the problem is that even now people do not take cyber related malicious activities as crimes. This paper raises an alarm for individuals, business organisations and international fraternity that now cyber crime is not affecting a particular domain but it has become a global concern and everybody need to be equally considerate on how to handle this issue. ICT industries need to play a more active role as they should concentrate on designing and developing products that not only resist cyber crime but also support in early detection and investigation of such crimes.
12. REFERENCES
[1] Matthews B. Computer crimes: cybercrime information. Facts and Resources. 2010.
[2] Shinder DL and Cross M. Scene of the cybercrime. Syngress, 2nd ed., 2008: 1-38.
[3] Fafinski S and Minassian N. UK cybercrime report 2008. New York: Garlik; 2008: 1-55.
[4] Wall D. Cybercrime: The transformation of crime in the information age. Polity Press, 2007.
[5] Essay W. Top Lycos Networks, 2012.
[6] Cisco. Annual Security Report. available on the 5th March 2009 at: http://www.cisco.com/go/securityreport; 2008
[7] Loader BD and Thomas D. Cybercrime: Law enforcement, security and surveillance in the information age. Routledge, 2000.
[8] Svensson P. Nasdaq Hackers Target Service for Corporate Boards, Retrieved from http://news.yahoo.com/s/ap/20110205/ap_on_hi_te/us_nasdaq_hackers. 2011.
[9] Balkin J. Grimmelmann J. Katz E. Kozlovski N. Wagman S. and Zarsky T. (Eds.). Cybercrime: digital cops in a networked environment. NYU Press, 2007.
[10] Maruf AM. Islam MR. and Ahamed B. Emerging cyber threats in Bangladesh: in quest of effective legal remedies. Northern University Journal of Law. 1; 2014: 112-124.
[11] Yudkowsky E. Artificial intelligence as a positive and negative factor in global risk. Global catastrophic risks. 1; 2008; 303
[12] Boni WC and Kovacich GL. I-way robbery: crime on the internet, Butterworth-Heinemann, Boston, MA, 1999: 11-122.
[13] Salifu A. The impact of internet crime on development. Journal of Financial Crime. 15(4); 2008: 432-443.
[14] Hunton P. The growing phenomenon of crime and the internet: a cybercrime execution and analysis model. Computer Law and Security Review. 25(6); 2009: 528-535.
[15] Bryant R. Investigating digital crime. John Wiley and Sons, 2008: 17-35.
[16] Gordon S and Ford R. On the definition and classification of cybercrime. Journal in Computer Virology. 2(1); 2006: 13-20
[17] McGuire M and Dowling S. Cyber crime: A review of the evidence. summary of key findings and implications. Home Office Research report. 2013: 75.
[18] Choo KKR. Smith RG. McCusker R. and Australian Institute of Criminology. Future directions in technology-enabled crime: 2007-09. Canberra: Australian Institute of Criminology. 2007.
[19] Choo KKR. The cyber threat landscape: challenges and future research directions. Computers and Security. 30(8); 2011: 719-731.
[20] Yar M. The novelty of ‘cybercrime’ an assessment in light of routine activity theory. European Journal of Criminology. 2(4); 2005: 407-427.
[21] Saini H. Rao YS. and Panda TC. Cyber-crimes and their impacts: a review. International Journal of Engineering Research and Applications. 2(2); 2012: 202-209.
[22] Joffee R. Cybercrime: the global epidemic at your network door. Network security. 7; 2010: 4-7.
[23] Kane S. Trade secret. Available from: http://legalcareers.about.com/od/glossary/g/Tradesecret.htm.2017.
[24] Hackers Launch Massive Attack on Ukrainian President’s Web Site. Available from: http://www.foxnews.com/story/0,2933,306438,00.html . (2007).
[25] McCusker R. Transnational organised cyber crime: distinguishing threat from reality. Crime, law and social change. 46(4-5); 2006: 257-273.
[26] Nykodym N. Taylor R. and Vilela J. Criminal profiling and insider cyber crime. Digital Investigation. 2(4); 2005: 261-267.
[27] Zhang Y. Xiao Y. Ghaboosi K. Zhang J. and Deng H. A survey of cyber crimes. Security and Communication Networks. 5(4); 2012: 422-437.
[28] Das B and Sahoo JS. Social networking sites-a critical analysis of its impact on personal and social life. International Journal of Business and Social Science. 2(14); 2011.
[29] Kandpal V and Singh RK. Latest face of cybercrime and its prevention in India. International Journal of Basic and Applied Sciences. 2(4); 2013: 150-156.
[30] Wolf G and Pfitzmann A. Properties of protection goals and their integration into a user interface. Computer Networks. 32(6); 2000: 685-700.
[31] Cohen LE and Felson M. Social change and crime rate trends: a routine activity approach. American sociological review. 1979: 588-608.
[32] Felson M. Crime and everyday life. New York: Pine Forge Press, 1998.
[33] Koops B. The internet and its opportunities for cybercrime. in: M. Herzog-Evans (ed.) Transnational Criminology Manual. Nijmegen: WLP, 2010: 735 – 754.
[34] Dubbudu R. Most number of cyber crimes reported in Maharashtra and Uttar Pradesh. Retreived from https://factly.in/cybercrimesinindiawhichstatetopsthechart/. 2016
[35] Pocar F. New challenges for international rules against cyber-crime. European Journal on Criminal Policy and Research. 10(1); 2004: 27-37.
Received on 22.03.2017 Accepted on 24.04.2017
©A&V Publications all right reserved
Research J. Engineering and Tech. 2017; 8(2): 73-80.
DOI: 10.5958/2321-581X.2017.00012.5