SlideShare a Scribd company logo
1 of 21
CYBER CRIME AGAINST
CHILDREN
Submitted by:
Anchalanshri Dixit
Geetika Mahur
Himanshu Patel
Overview
 Introduction
 Categories of cyber crime
 Types of cyber crime against children
 Vulnerabilities
 Statistics
 Cases
 Side effects
 Laws and legislations
 7 ways to protect your children
 Love146- a non-profitable organisation
 Conclusion
Introduction
 Cyber crime is an activity done using computers and internet.
 It is an unlawful act wherein the computer acts either as a tool or
target or both.
 Cyber crime is categorized in two ways:
 The computer as a target :- using a computer to attacks other computer,
e.g. Hacking, virus/worms attacks, Dos attack etc.
 The computer as a weapon :- using a computer to commit real world
crime e.g. cyber terrorism, credit card fraud and pornography etc.
Types of cyber crime against children
 Trafficking – illegal deal or trade in children.
 Pornology – the depiction of erotic behaviour(as in pictures, videos or writing)
intended to cause sexual excitement.
 Morphing – change smoothly from one image to another by computer
animation techniques.
 Kidnaping- abduct and hold them captive, typically to obtain a ransom.
 Exploitation- the act or fact of treating someone unfairly in order to benefit
from their work.
CHILD TRAFFICKING
 Child trafficking, according to UNICEF is defined as “any person under 18 who
is recruited, transported, transferred, harbored or received for the purpose of
exploitation, either within or outside a country”.
 There have been many cases where children just disappear overnight, as
many as one every eight minutes, according to the National Crime Records
Bureau.
 In India, there is a large number of children trafficked for various reasons
such as labor, begging, and sexual exploitation.
 India is a prime area for child trafficking to occur, as many of those trafficked
are from, travel through or destined to go to India.
CHILD PORNOGRAPHY
 Under The Information Technology (Amendment) Act, 2008, crime of Child
Pornography under Section 67-B say’s, Whoever publishes or transmits or
causes to be published or transmitted material in any electronic form that
depicts children engaged in sexually explicit act or conduct or creates text or
digital images, collects, seeks, browses, downloads, advertises, promotes,
exchanges or distributes material in any electronic form.
 Depicting children in obscene or indecent or sexually explicit manner.
 Induces children to online relationship with one or more children for and on
sexually explicit act.
 In a manner that may offend a reasonable adult on the computer resource.
 Facilitates abusing children online or records in any electronic form
pertaining to sexually explicit act with children is known as child pornography.
MORPHING, KIDNAPPING AND EXPLOITATION
 Morphing is a special effect in motion pictures and animations that changes
(or morphs) one image or shape into another through a seamless transition.
 In criminal law, kidnapping is the unlawful taking away or transportation of a
person against that person's will, usually to hold the person unlawfully. This
may be done for ransom or in furtherance of another crime, or in connection
with a child custody dispute.
 Exploitation
 Women victims often compliant of mobile phone harassment.
 This includes repeated calls, SMSs, blank calls, threatening calls and even sending
lewd MMSs.
CASES
Schoolchildren in India victims of cyber
crime
 "Almost every school-going child has access to social media these
days, but shockingly hardly any of them know about the privacy
settings on their profiles. With details of their personal lives going
public, they make themselves vulnerable to all sorts of cyber
harassment”.
An international study done by software giant Microsoft in 2012
revealed that 53% of India's children have been bullied online. AP
recorded the second highest number of cases in cyber related
crimes (429) in 2012.
SIDE EFFECTS
 Privacy is greatly reduced or does not exist.
 Expectations for life and achievements are reduced.
 Obedience and passivity are rewarded.
 Negative attitudes and being ignored is common.
 Few general friendships.
 Social isolation.
 Difficulty being accepted in activities, schools, workplaces etc.
Laws
 According to Section 67-B is CSI Communications | December 2011 | 35
applicable and Section 292/293/294
 Sending offensive or false information through computer or a
communicative device is punishable with imprisonment up to three years
and with fine.(S.66A)
 500, 506 & 509 of Indian Penal Code, 1860 are also applicable.
 the victim can file a criminal complaint, If Crime is proved accused should
punishable
 for first conviction with imprisonment for a term may extend to Five years and
with fine which may extend to ten lakh rupees.
 second conviction with imprisonment for a term may extend to Seven years and
with fine which may extend to ten lakh rupees
7 Ways to protect your kids from cyber
crime
 Use parental control software.
 Place the computer in a highly trafficked area.
 Bookmark for safety.
 Avoid downloads.
 Set limits on late-night use.
 Establish rules and take control.
 Stay in the loop!
LOVE146 - AN IMPORTANT
NGO WORKING IN THE FIELD
Conclusion
 Cybercrime against children is indeed getting the recognition it deserves.
 However, it is not going to end that easily.
 In fact , it is highly likely that cyber crime and the people behind it will
continue developing and upgrading to stay ahead of the law.
 But it can be limited by
 Checking Your Child’s Internet Activity
 Remember, parental involvement is the most effective tool.
 Antivirus software and internet protection software.
 Participate with your kids while they are surfing online.
 And guide your young ones to be brave enough.
THANK YOU …
Any Queries?????

More Related Content

What's hot

The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer SystemEjiro Ndifereke
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryMD Alauddin
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladeshBank Alfalah Limited
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 

What's hot (20)

The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladesh
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 

Viewers also liked

Future Media Association
Future Media AssociationFuture Media Association
Future Media Associationreganbw1
 
Teads Luxury Barometer June 2015
Teads Luxury Barometer June 2015Teads Luxury Barometer June 2015
Teads Luxury Barometer June 2015Teads
 
Susan's  Body Wrap~Herbal Supplements~AND ca$h bonuses INFO party".
Susan's  Body Wrap~Herbal Supplements~AND ca$h bonuses INFO party".Susan's  Body Wrap~Herbal Supplements~AND ca$h bonuses INFO party".
Susan's  Body Wrap~Herbal Supplements~AND ca$h bonuses INFO party".Susan Teeter
 
MivaCon Seattle - Taming The Cost Of Marketing
MivaCon Seattle - Taming The Cost Of MarketingMivaCon Seattle - Taming The Cost Of Marketing
MivaCon Seattle - Taming The Cost Of MarketingMiva
 
The Cool Treehouse
The Cool TreehouseThe Cool Treehouse
The Cool TreehouseDJ Hingtgen
 
Российский рынок недвижимости: перезагрузка
Российский рынок недвижимости: перезагрузкаРоссийский рынок недвижимости: перезагрузка
Российский рынок недвижимости: перезагрузкаBillion Estate
 
Portfolio Chengelo Evidence
Portfolio Chengelo EvidencePortfolio Chengelo Evidence
Portfolio Chengelo EvidenceAmantle Khachana
 
Engineering colleges in karnataka with phone no & email id
Engineering colleges in karnataka with phone no & email idEngineering colleges in karnataka with phone no & email id
Engineering colleges in karnataka with phone no & email idRAJEEV KUMAR SINGH
 
Teen programming in the communities
Teen programming in the communitiesTeen programming in the communities
Teen programming in the communitieswomaninzion
 
Portfolio
PortfolioPortfolio
PortfolioSmrcek
 
TiO2 Article from cadnews_2002_fall
TiO2 Article from cadnews_2002_fallTiO2 Article from cadnews_2002_fall
TiO2 Article from cadnews_2002_fallRichard Towne
 

Viewers also liked (14)

Future Media Association
Future Media AssociationFuture Media Association
Future Media Association
 
Teads Luxury Barometer June 2015
Teads Luxury Barometer June 2015Teads Luxury Barometer June 2015
Teads Luxury Barometer June 2015
 
Susan's  Body Wrap~Herbal Supplements~AND ca$h bonuses INFO party".
Susan's  Body Wrap~Herbal Supplements~AND ca$h bonuses INFO party".Susan's  Body Wrap~Herbal Supplements~AND ca$h bonuses INFO party".
Susan's  Body Wrap~Herbal Supplements~AND ca$h bonuses INFO party".
 
MivaCon Seattle - Taming The Cost Of Marketing
MivaCon Seattle - Taming The Cost Of MarketingMivaCon Seattle - Taming The Cost Of Marketing
MivaCon Seattle - Taming The Cost Of Marketing
 
level 3
level 3level 3
level 3
 
The Cool Treehouse
The Cool TreehouseThe Cool Treehouse
The Cool Treehouse
 
Российский рынок недвижимости: перезагрузка
Российский рынок недвижимости: перезагрузкаРоссийский рынок недвижимости: перезагрузка
Российский рынок недвижимости: перезагрузка
 
Portfolio Chengelo Evidence
Portfolio Chengelo EvidencePortfolio Chengelo Evidence
Portfolio Chengelo Evidence
 
Engineering colleges in karnataka with phone no & email id
Engineering colleges in karnataka with phone no & email idEngineering colleges in karnataka with phone no & email id
Engineering colleges in karnataka with phone no & email id
 
Teen programming in the communities
Teen programming in the communitiesTeen programming in the communities
Teen programming in the communities
 
Portfolio
PortfolioPortfolio
Portfolio
 
Windows phone training
Windows phone trainingWindows phone training
Windows phone training
 
Id3 rivera valencialucia-prod-1
Id3 rivera valencialucia-prod-1Id3 rivera valencialucia-prod-1
Id3 rivera valencialucia-prod-1
 
TiO2 Article from cadnews_2002_fall
TiO2 Article from cadnews_2002_fallTiO2 Article from cadnews_2002_fall
TiO2 Article from cadnews_2002_fall
 

Similar to CYBER CRIME AGAINST CHILDREN: 7 WAYS TO PROTECT KIDS

RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRahuljain40418
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxchiragcdbc92
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parentsAl Rowell
 
C20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEC20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEECPAT Indonesia
 
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...Synopsis of children’s consumer protection issues in kenya by daniel asher (c...
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...Daniel Asher
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention RAUSHAN KUMAR
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanaomar timawa
 

Similar to CYBER CRIME AGAINST CHILDREN: 7 WAYS TO PROTECT KIDS (20)

cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptx
 
Koreja
KorejaKoreja
Koreja
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
 
C20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEC20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINE
 
Cyberbullying.pptx
Cyberbullying.pptxCyberbullying.pptx
Cyberbullying.pptx
 
Sexting
SextingSexting
Sexting
 
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...Synopsis of children’s consumer protection issues in kenya by daniel asher (c...
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 

CYBER CRIME AGAINST CHILDREN: 7 WAYS TO PROTECT KIDS

  • 1. CYBER CRIME AGAINST CHILDREN Submitted by: Anchalanshri Dixit Geetika Mahur Himanshu Patel
  • 2. Overview  Introduction  Categories of cyber crime  Types of cyber crime against children  Vulnerabilities  Statistics  Cases  Side effects  Laws and legislations  7 ways to protect your children  Love146- a non-profitable organisation  Conclusion
  • 3. Introduction  Cyber crime is an activity done using computers and internet.  It is an unlawful act wherein the computer acts either as a tool or target or both.  Cyber crime is categorized in two ways:  The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc.  The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
  • 4. Types of cyber crime against children  Trafficking – illegal deal or trade in children.  Pornology – the depiction of erotic behaviour(as in pictures, videos or writing) intended to cause sexual excitement.  Morphing – change smoothly from one image to another by computer animation techniques.  Kidnaping- abduct and hold them captive, typically to obtain a ransom.  Exploitation- the act or fact of treating someone unfairly in order to benefit from their work.
  • 5. CHILD TRAFFICKING  Child trafficking, according to UNICEF is defined as “any person under 18 who is recruited, transported, transferred, harbored or received for the purpose of exploitation, either within or outside a country”.  There have been many cases where children just disappear overnight, as many as one every eight minutes, according to the National Crime Records Bureau.  In India, there is a large number of children trafficked for various reasons such as labor, begging, and sexual exploitation.  India is a prime area for child trafficking to occur, as many of those trafficked are from, travel through or destined to go to India.
  • 6. CHILD PORNOGRAPHY  Under The Information Technology (Amendment) Act, 2008, crime of Child Pornography under Section 67-B say’s, Whoever publishes or transmits or causes to be published or transmitted material in any electronic form that depicts children engaged in sexually explicit act or conduct or creates text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form.  Depicting children in obscene or indecent or sexually explicit manner.  Induces children to online relationship with one or more children for and on sexually explicit act.  In a manner that may offend a reasonable adult on the computer resource.  Facilitates abusing children online or records in any electronic form pertaining to sexually explicit act with children is known as child pornography.
  • 7. MORPHING, KIDNAPPING AND EXPLOITATION  Morphing is a special effect in motion pictures and animations that changes (or morphs) one image or shape into another through a seamless transition.  In criminal law, kidnapping is the unlawful taking away or transportation of a person against that person's will, usually to hold the person unlawfully. This may be done for ransom or in furtherance of another crime, or in connection with a child custody dispute.  Exploitation  Women victims often compliant of mobile phone harassment.  This includes repeated calls, SMSs, blank calls, threatening calls and even sending lewd MMSs.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. CASES
  • 14.
  • 15. Schoolchildren in India victims of cyber crime  "Almost every school-going child has access to social media these days, but shockingly hardly any of them know about the privacy settings on their profiles. With details of their personal lives going public, they make themselves vulnerable to all sorts of cyber harassment”. An international study done by software giant Microsoft in 2012 revealed that 53% of India's children have been bullied online. AP recorded the second highest number of cases in cyber related crimes (429) in 2012.
  • 16. SIDE EFFECTS  Privacy is greatly reduced or does not exist.  Expectations for life and achievements are reduced.  Obedience and passivity are rewarded.  Negative attitudes and being ignored is common.  Few general friendships.  Social isolation.  Difficulty being accepted in activities, schools, workplaces etc.
  • 17. Laws  According to Section 67-B is CSI Communications | December 2011 | 35 applicable and Section 292/293/294  Sending offensive or false information through computer or a communicative device is punishable with imprisonment up to three years and with fine.(S.66A)  500, 506 & 509 of Indian Penal Code, 1860 are also applicable.  the victim can file a criminal complaint, If Crime is proved accused should punishable  for first conviction with imprisonment for a term may extend to Five years and with fine which may extend to ten lakh rupees.  second conviction with imprisonment for a term may extend to Seven years and with fine which may extend to ten lakh rupees
  • 18. 7 Ways to protect your kids from cyber crime  Use parental control software.  Place the computer in a highly trafficked area.  Bookmark for safety.  Avoid downloads.  Set limits on late-night use.  Establish rules and take control.  Stay in the loop!
  • 19. LOVE146 - AN IMPORTANT NGO WORKING IN THE FIELD
  • 20. Conclusion  Cybercrime against children is indeed getting the recognition it deserves.  However, it is not going to end that easily.  In fact , it is highly likely that cyber crime and the people behind it will continue developing and upgrading to stay ahead of the law.  But it can be limited by  Checking Your Child’s Internet Activity  Remember, parental involvement is the most effective tool.  Antivirus software and internet protection software.  Participate with your kids while they are surfing online.  And guide your young ones to be brave enough.
  • 21. THANK YOU … Any Queries?????