You are on page 1of 4

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 4, July August 2013 ISSN 2278-6856

Evolution of Cybercrimes in India


1

RAVIKUMAR S. PATEL, 2DR.DHAVAL KATHIRIYA


1

Research Scholar, Mewar University Chittorgarh, Rajasthan

Director-Information Technology, Anand Agriculture University Anand 388 110 (Gujarat-INDIA)

Abstract: Internet has entered in all the spheres of human


life since the digital world came into existence. The fields like trade, education, corporate sectors, transportation, and communication are highly influenced by internet. Internet plays pivotal role to make human beings comfortable in their routine life. India is also one of the major countries to access the internet facility. As we know that every invention has negative as well positive effects. The internet is also not exceptional from that. The illegal actions related to internet are known as Cyber Crime in terms of research. Cyber Crime has become the topical issue of researchers. In 21th Centuries Cyber crime is major issue in India. Cyber crime refers to any crime committed that involves internet and any intelligent devices or any illegal (Unlawful) activity performed on internet. The main reason behind the increasing this types of activities is vulnerabilities of Indian cyber laws and procedure of handling the cybercrime related cases.

crime mainly divided into three categories cybercrime against the person, property and government. There is no one exhaustive definition of the term "Cyber law". However, simply put, Cyber law is a term which refers to all the legal and regulatory aspects of Internet and the World Wide Web. Anything concerned with or related to, or emanating from, any legal aspects or issues concerning any activity of natives and others, in Cyberspace comes within the ambit of Cyber law

2. TYPES OF CYBER CRIMES:


Mainly three types of cybercrimes are occurred in cyber world. [A]. Financial cybercrime [B]. Web related cybercrime [C]. others (hacking) Financial cybercrime means criminal perform the illegal activities in terms of money. It includes cheating, credit card frauds, online gambling, salami attacks, and hacking. The second types of cybercrime known as web related cyber crime means its related with websites or portal. It includes cyber pornography, illegal article sale, cyber defamation, website hacking, and data loss. Third types of cyber crime is hacking include many illegal activities performed by hackers or criminals. It includes Email spoofing, phishing, IP spoofing, logic bombs, virus attacks, and any types hacking.

Index Terms Cyber crimes, Cyber laws, cyber Security,


Indian Penal Code, Cyber Space, IT Act 2000

1. INTRODUCTION
Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act; 2000.that involves cyber crime, hacking, phishing, Email Spoofing. In the current scenario the modern person can steal more with a computer than with a gun. Tomorrows person may be able to do more damage with a computer than with a missile. Cyber space is broad spectrum including cyber crime, computer, net banking, web engineering, storage media, networking tools. In a current scenario any computer expert able to destroy our cyber legal framework means if any people having a computer and internet connection means it is fully open system for hackers and that why computer experts and hackers hack the any system and perform illegal activities with the help of these weapons and thats why we required legal framework means cyber laws for executing all transaction in smooth way. In a current era cyber experts or hackers are very smart and use the latest technology for hacking they know all the cyber laws and find out the loopholes within that law and perform the illegal activities. Cyber

3. OBJECTIVES OF THE RESEARCH:


First I m trying to explain the objectives of research in common terms, The objective of research is to find the answers to certain questions through the application of scientific procedure. The general objective of a study states what researchers expect to achieve by the study in general terms. It is possible to break down a general objective into smaller, logically connected parts. These are normally referred to as specific objectives. Specific objectives should systematically address the various research questions. They should specify what you will do in your study, where and for what purpose. The purpose of our research is first to study and analysis of different types of cyber crimes and illegal activities which is done through the network or internet. In the current era Internet is a very hazardous weapon of hackers so, many types of cyber crimes occurs in current Page 240

Volume 2, Issue 4 July August 2013

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 4, July August 2013 ISSN 2278-6856
scenario like E-mail spoofing, Virus dissemination, hacking, phishing, credit card frauds, software piracy etcThere are so many modes of criminal activity on the internet that the traditional policing methods and the laws that bind criminals at times lose jurisdiction in cyber crime cases. This is why there are so many crimes being committed online A Cyber law is the law governing cyber space. Cyber space is a very broad term and it includes all things which are related with cyber crimes and laws such as Computers, networks, hardware, software, data storage devices, internet, E-mails and all intelligent devices. The growth of Electronic commerce has propelled the need for vibrant and effective regulatory mechanisms which would further strengthen the legal infrastructure, so crucial to the success of electronic commerce. All these regulatory mechanisms and legal infrastructure come within the domain of cyber law. TABLE I 2 0 0 200 200 7 8 9 1 6 25 30 0 0 0 5 3 1 0 0 0 0 4 0 3 8 6 4 9 0 0 0 0 0 1 4 1 6 0 1 0 0 5 1 2 0 1 0 1 6 17 0 6 0 0 57 65 9 37 0 0 0 0 3 11 4 0 21 0 2 2 0
1 2 0 4 8 20 0 6 0 0 97 64 16 53 1 0 0 0 2 28 27 0 18 0 7 14 13

No . 1
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28

Name of State
Andhra Pra. Aruna.l Pra. Assam Bihar Chhattisgar h Goa Gujarat Haryana Himachal Pra. J&K Jharkhand Karnataka Kerala Madhya Pra. Maharashtr a Manipur Meghalaya Mizoram Nagaland Orissa Punjab Rajasthan Sikkim Tamil Nadu

201 0 105 3 18 2 4 15 35 1 17 5 0 153 148 30 142 0 0 1 0 7 41 52 0 52 0 32 10 49

201 1 349 13 31 25 2 16 52 42 12 14 8 151 227 90 306 0 6 3 0 7 59 122 3 37 0 101 6 43

4. RESEARCH METHODOLOGY:
The formal meaning of research is invention or scientific investigation or scientific enquiry to extract truth or discover new ideas by scientific way. Scientific research has been playing an important role in the progress and enrichment of todays era. A systematic and scholarly application of scientific method, interpreted in its broadest sense to the solution of different problems. Descriptive research includes surveys and fact-finding enquiries of different kinds. The major purpose of descriptive research is description of the state of affairs as it exists at present. Research can either be applied (or action) research or fundamental (to basic or pure) research. Applied research aims at finding a solution for an immediate problem facing a society or an industrial/business organization, whereas fundamental research is mainly concerned with generalizations and with the formulation of a theory. Quantitative research is based on the measurement of quantity or amount. It is applicable to phenomena that can be expressed in terms of quantity. Qualitative research, on the other hand, is concerned with qualitative phenomenon. Conceptual research is that related to some abstract idea(s) or theory. It is generally used by philosophers and thinkers to develop new concepts or to reinterpret existing ones. On the other hand, empirical research relies on experience or observation alone, often without due regard for system and theory. It is data-based research, coming up with conclusions which are capable of being verified by observation or experiment. With help of this all method we are collect the various cyber crime data.

Tripura Uttar Pra. Uttarakhan d West Bengal

5. STATISTICS OF CYBERCRIMES IN INDIA:


[A]. CYBER CRIMES CASE REGISTERED UNDER THE INFORMATION TECHNOLOGY ACT 2000:

Volume 2, Issue 4 July August 2013

Page 241

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 4, July August 2013 ISSN 2278-6856
CHART I [CYBER CRIMES CASE REGISTERED IN 2007] [B]. CYBER CRIME CASE REGISTERED UNDER INDIAN PENAL CODE IN INDIA: TABLE II 201 No. Name of State 2007 2008 2009 0 1
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Andhra Pra. Arunachal Pra. Assam Bihar Chhattisgarh Goa Gujarat Haryana Himachal Pra. J&K Jharkhand Karnataka Kerala Madhya Pra. Maharashtra Manipur Meghalaya Mizoram Nagaland Orissa Punjab Rajasthan Sikkim Tamil Nadu Tripura Uttar Pra. Uttarakhand West Bengal

2011 23 1 0 13 76 2 15 3 0 0 25 9 18 13 87 0 0 0 0 5 20 24 1 8 0 13 0 14

53 0 0 0 52 1 2 1 0 0 0 1 0 158 1 0 0 0 0 2 35 0 0 5 0 0 0 2

78 0 1 0 19 0 16 0 0 0 0 0 2 2 2 0 0 0 0 12 36 0 0 4 0 0 0 2

8 0 2 0 46 4 16 0 0 0 0 0 7 1 108 0 0 0 0 11 28 1 0 19 0 3 0 10

66 0 0 0 46 1 20 0 0 1 0 23 8 5 104 0 0 1 0 5 27 3 0 25 0 9 1 11

CHART II [CYBER CRIMES CASE REGISTERED IN 2011]

6. CONCLUSION:
It is my solo paper means here we want to justify the statistics of cyber crime. Here we study and analysis about the current cyber crimes in India through the literature survey, government annual reports, verbal communication with ethical hackers and many more techniques like Questionnaires and from the head of cyber cell from different states in India. We also study and analysis the different cyber crimes case studies which is occurred in different states in India and Indian cyber laws framework is compared with other country framework. Cybercrime is a million dollar problem in India. Cyber laws enforcement must look for ways to keep the solution of problems in current era. So, here we are find out the Volume 2, Issue 4 July August 2013 Page 242

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 4, July August 2013 ISSN 2278-6856
problems of our cyber laws framework through the statistical data of cyber crimes cases in India. Here we are representing the cybercrimes cases occurred during the 2007 to 2011 and find out the results which is continuously increase the cybercrimes cases every year. We are used various techniques for the collection of accurate data and finally we are collected statistical data of cyber crimes in India. Based on that data we are conclude that after 2008 cyber crimes cases are increased very hasty. so here we finds some of the issue in our cyber frameworks as well as Indian cyber laws because our information technology act not protecting our cyber space world and we are not executing cyber transaction in safe mode. So, my next paper based on that issue and give the proposed framework for the solution of this all issues as well as perform the internet transaction in safe and smooth way. [12] Introduction to Indian cyber laws, Asian School of Cyber Laws [13] Information security awareness, Department of electronics and information technology, government of India [14] Overview of computer and internet laws in India, Bureau of parliamentary studies and training. [15] Cyber crime scenario in india, Dr.B.Muthukumaran,Chief Consultant, Gemini Communication Ltd.

REFERENCES:
[1] Karnika Seth, Evolving strategies for enforcement of cyber , New Delhi, 31 Jan 2010, National Consultation Meeting on Cyber law. [2] B orger E., A logical operational semantics for full Prolog. Part I: Selection core and control. in: CSL'89. 3rd Workshop on Computer Science Logic (E.B orger, H.Kleine B uning, M.M. Richter, Eds). Springer LNCS, vol. 440, 1990, pp. 36-64. IBM Germany IWBS Report 111, March 1990 [3] National crime records bureau.(NCRB). [4] Alex Roney, MathewCyber Crimes: Threats and Protection, 201O International Conference on Networking and Information Technology [5] Bhanu Sahu,Identify Uncertainty of Cyber Crime and Cyber Laws, 2013 International Conference on Communication Systems and Network Technologies [6] Apurba Kumar Roy,Role of Cyber Law and its Usefulness in Indian IT Industry, 1st Intl Conf. on Recent Advances in Information Technology | RAIT2012 | [7] Ugochukwu Onwudebelu,Real Time SMS-Based Hashing Scheme for Securing Financial Transactions on ATM Systems, 3rd IEEE International Conference on Adaptive Science and Technology (ICAST 2011) [8] Ayaz Khan,Digital Forensics and Crime Investigation: Legal Issues in Prosecution at National Level, 2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering [9] Jan Kallberg,Towards Cyber Operations The New Role of Academic Cyber Security Research and Education ISI 2012, June 11-14, 2012, Washington, D.C., USA [10] Benjamin J. Brooker,,A Framework for the Evaluation of State Breach Reporting Laws [11] Cyber crime investigation cell, Crime branch Mumbai. Verbal communication. Volume 2, Issue 4 July August 2013 Page 243

You might also like