SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 542
Cyber Crime: Youth in Social Decline
Md. Kabir Hossain1, Mohammad Arif2
1Assistant Professor (ICT), Bandarban Cantonment Public School & College, Bandarban, Bangladesh.
2Student, 5th Batch, Dept. of Computer Science and Engineering, University of Creative Technology Chattogram
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Information Technology (IT) is one of the
priorities of the Bangladesh government. The country is quite
advanced in this sector. New technologies such as mobilesand
the Internet have spread beyond the city limits to the
countryside. Various benefits of information technology are
becoming increasingly available to people. Now anyone can
easily communicate with anyone anywhere in the world. With
the rapid expansion of information technology, cybercrime or
IT-based crimes are also increasing rapidly. Innocent people
are victims of various crimes. Again, various conspiracies are
going on against the government using information
technology facilities to perpetuate personal interests or party
interests. Various rumors are being spread. Different groups
are being provoked. Violent communalism is spreading as
social crimes are happening.
Key Words: ICT, Cyber crime, Cyberbullying, Social Media,
Hackers, Extremists, Low enforcement agencies, ICT act, etc
1. Introduction
People from every sector in Bangladesh have poor or no
concern about how their information is disseminatedonline
and the protection of personal information which is why
cyber-crime is growing rapidly in Bangladesh. The general
public seems to have little interest in learning about this
virus and has no idea how to protect themselves from it.
Unfortunately, cyber criminals have used this to their
advantage and are looking to exploit that fear and
uncertainty for financial gain. Cyber criminals use phishing,
smishing and fraudulent websites to extort personal
information or gain access to an organisation's computer
systems in search of valuable business and financial
information. Emails and messages appear to be from an
authentic source; In fact, fraudsters present themselves as
genuine.
2. Conceptual overview of cybercrime
Cybercrime is apparently a 'crime' committed using
'computers' or 'networks' or 'hardware devices' or
'cyberspace'. The CouncilofEurope'sCybercrimeConvention
uses the term 'cybercrime' to refer to crimes ranging from
criminal activity against data to content and copyright
infringement. Cybercrime is generally defined as a crime in
which a computer is used as a target or tool to commit a
crime.
Cybercrime has many forms and new forms and techniques
are being noticed day by day. However, the main forms of
cyber crime are attached below:
Fig -1: Forms of Cybercrime
Cybercriminals are an ever-present threat in every country
connected to the Internet.Cybercriminalsconsistofdifferent
groups or categories as shown below:
Fig -2: Forms of Cyber Criminals
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 543
3. Social media and its users
Every 3 seconds a social media ID is being opened on
different platforms. According to the data of Bangladesh
Telecommunication Regulatory Commission, the number of
internet users in the country is about 112613000. And the
number of mobile sim users is about 16000000. A large part
of digital crime is being committed through social media
through deception and enticement. Hacking social media
accounts by compromising or creating fake accounts.Cyber-
bullying is the use of insulting or defamatory comments
directed at someone over the Internet or social media to
humiliate them and undermine their social status by
spreading unwanted content. Due to these reasons, the
netizens are now facing various problems in using social
media. Many are falling prey to cyber-criminals through
Facebook, Messenger, Twitter, Viber, YouTube, WhatsApp
and IMO etc. These virtual platforms exploit one's personal
vulnerability to humiliate, intimidate or lure someone into
doing something unfair. Teenagers are the first victims of
such harassment. Adults or minors areconstantlyfallinginto
this trap.
4. Cyberbullying
A large number of online social media users, including
students of various educational institutions in Bangladesh,
are victims of cyberbullying. According to data, 49 percentof
school children in the country are victims of regular cyber
bullying. According to the Ministry of Posts and
Telecommunications, three-fourths of women in the country
are victims of cyberbullying. However, this issue remains
unaddressed. Only 28 percent reported harassment online.
Others fear that they will be socially stigmatized if they
complain. In addition to cyberbullying, this type of
harassment is often happening on mobile phones, e-mails or
mobile banking. As a result,depression,inattentiontostudies
and insomnia etc. develop among the victims including
women. Even suicides are happening. Children who are
victims of cyberbullying are gradually turning to something
terrible, the effects of which are devastating and almost
irreversible. Below is a statistic showing the percentage of
children who are victims of cyberbullying in some cases.
Fig -3: Effects of cyberbullying in kids
A survey has been conducted among people of different ages
in our country and it has been found that they are the most
victims of cyber bullying through social media. The rate of
cyberbullying variesacross different social media. Below isa
survey of this:
Fig -4: People are cyberbullied in different social media
5. Extremists and their activities
An organized clique is actively trying to mislead
interested youth about the benefits of IT. Various religious
extremist ideologies are being propagated by opening
Facebook pages, groups, YouTube channels. Day by day,
crores of peopleare joining it. Strict cyber monitoringshould
be done so that no one can disturb the security of the state.
Internet access madeeasy. It hasmanyadvantages.Thereare
also some downsides. So, when we do a good deed, the bad
that comes with it will not cause a big crisis. Necessary steps
should be taken for that. Therefore, if these cybercrimes
continue, the security of the state will be under threat. It also
posesa threat to public safety. The young generation isbeing
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 544
misled. Thus makinglifemiserable for theyouthandpushing
them towards an uncertain future. Adequate measures
should be taken by creating various units or organizations to
monitor cybercrime in the interests of individuals and the
state. As we have become digitally dependent, there is no
substitute for cybercrime monitoring.
6. Digital platform and its weaknesses
Our government system is going digital. Hence,
cyberspace threats will grow more alarmingly in the future.
Social media including Facebook-YouTube should be strictly
monitored. These cannot be solved simply by closing them
and keeping users away. We are becoming dependent in
someplaces, but enemiesinsideandoutsidethecountryhave
become quite active. They are ready to harm people in every
possible way. How can it be prevented? Measures must be
taken to protect us from any form of cyber-attack. Criminal
gangs are becoming more reckless day by day as the existing
laws of the country are weak in detecting IT-related crimes.
This is undoubtedly terrifying.BTRCwasseenhelplessinthis
regard. This time during Durga Puja, there have been
incidents of communal attacks in different parts of the
country on charges of insulting religion. As a result, the
question hasarisen-whetherpopularserviceslikeFacebook,
YouTube, Twitter and Googlewill remain unregulated inthis
country or not. The question arises again and again.
According to the number of mobile phone users, Bangladesh
ranks the 10th in the world. Currently, the number of mobile
subscribers in the country is about 16 crores. As the number
of internet users increases due to accessibility, so does the
number of cyber crimes. Especially the number of crimes
centered on the social media Facebook is increasing. In this
age of technology, living without computers, internet and
mobile phones is almost impossible. Technology has become
human-oriented and has bound people in all directions. As
much as it is true and in the reality of the age its abuse is also
becoming one of the causes of human suffering. School-going
young women are the main victims of these frauds. Not only
cyber crimesare being committed to victimizewomen,cyber
criminals are also committing heinous crimes financially.
Hacking mobile phone numbers with fake messages and
stealing money from bank accounts are common.
7. Invention of new technologies and new tricks of
deception
Another major criminal trend is spreading state, social,
political and religious hatred on the Internet. We often see
news of Internet-centric fraud and crimeinthenews.Butlaw
enforcement officials say crime levels are high and many
crimes go unreported. Many donotreporttothepoliceorany
other agency for fear of losing their dignity. As a result, many
cases do not go to trial and in many cases the culprits cannot
be identified. In this case, experts are talking about our
technological limitations. It should be noted that as
cybercrime is on the rise, the criminal investigation force
needs to be trained to combat it. New technologies are being
invented almost every day and criminals are committing
crimes using those technologies. There can be no substitute
for developing a technological law enforcement force to
detect and suppress cyber criminals in the interest of
protecting the country's security and reputation. Besides,
modern laws are needed. They have not yet developed in the
country. Many countries around theworldhaveenactedlaws
to regulatesocial media. We have to pay attention tothattoo.
8. Actions by law enforcement agencies to mitigate
cyber crime
A policy of silence against cybercrime is one of the major
causes of damage. Fearing loss of family or honor, many
tolerate or repress in silence. As a result criminals take more
chances. They also lure victims into various traps to get
financial benefits. In this age of internet we all are more or
less facing a complex psychological problem like cyber
bullying. Offenders are specifically accusing or attacking a
person in public. Harassment also involves defacing
someone's photos or videos and posting them online It is a
type of cybercrime. There are specific laws and enforcement
in the country to curb these crimes like cyber bullying. Just
need to be aware of it. If the matter goes beyond the family
circle, the law should be resorted to. Avoiding the
cooperation of the policeinthiscaseisratherdangerous.This
difficult task becomes very easy by following few steps. The
first step is to file a General Diary (GD) at the police station.
Evidenceofharassmentmustbeaccompaniedbyscreenshots
or messages. Anyone who has been harassed can now get
help by calling 999 or the police Facebook page. Such issues
canalso be resolved confidentially on the MinistryofWomen
and Child Affairs hotline number 10921. Complaints canalso
be made directly to BTRC's phone and e-mail. In the online
world, there are ways to find a solution.
9. Challenges in identifying cybercriminals
Identifying, arresting and proving the charges against
cyber criminals is time consuming and challenging for cyber
security and crime departments. These challenges include
lack of Mutual Legal Assistance Treaty (MLAT) with various
countries, negligence of Internet Service Providers instoring
log data, failure to promptly report an organized crime and
lack of awareness and skilled manpower among digital
technology users.
Here some difficulties to investigate cybercrime by law
enforcement agencies. These are shown below:
 Under ICTA 2006, the offenses are non-cognizable
(Section-76(2)) and the police cannot be investigated
without a warrant. This takes away the freedom of
investigation from the law enforcement authorities.
 At present, apart from two specialized units under the
CID, no other police agency is capable of handling
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 545
cybercrimeissues and these unitsare severelylacking
in trained investigators, equipment and manpower.
 Difficulty in defining crime, jurisdictional issues,
detection techniques and collection of digitalevidence
are also complex areas in cyber crime investigation.
 There are no dedicated analytics sitescompatiblewith
global secure police communication systems to
provide real-time monitoring of cyber activities.
 Digital ForensicLaboratoryisessentialforcybercrime
investigation and detection with professional experts,
which we have a serious shortage of.
Various teams are working on cybercrime such as Digital
Forensic Investigation Team, Cyber Incident Response and
Investigation, Internet Referral and Investigation, Social
Media Monitoring, E-Fraud Investigation etc. From the
forgoing discussion certain recommendations are appended
below for due consideration:
 Formulate a National Cyber Security Policy as well
as establish an entity for overall coordinating and
directing responsibility. BTRC may be strengthened
to develop as regulatory body of cyber related
issues.
 Create appropriate structures at all level with well-
defined role and responsibilities so that human
resources with adequate skills, knowledge and
training are available to securely manage the
information infrastructure.
 Create awareness and build momentum. Conduct
extensive mediacampaignsandothercivicactivities
to build mass awarenessoncybercriminalactivities.
Initiate programs to educate everybody about their
cyber right and also edify parents on how to filter
harmful Internet contents.
 Initiate dialogs with the NGOs, donor organizations
and corporate bodies for sharing government’s
vision and tentative roadmap towards combating
cybercrime.
 Encourage senior officials of government and
government agencies to carefully learn the basic
operations of the Internet in order to work
independently.
 Enhance law enforcement capacity to prevent and
prosecute cyber attacks.
 Enact strict laws to deal with the menace of
cybercrime. Laws should create deterrence in the
minds of criminals.
 Every effort should be made for international
cooperation to enable information sharing, reduce
vulnerabilities and deter malicious users.
 A national level organization may be created for
sanitization of hardware, software and computer
related gadgets specially used in sensitive
institutions.
10. Conclusions
Our dependence on the network will only increase in the
years ahead. As technology advances, threats and
vulnerabilities change, and understanding of information
security issues improves, there is a constant need to review
cyber strategy. Those sharing videos or spreading messages
of social unrest on Facebook, YouTube or social media are
being identified. Besides, it has become necessary to find
those involved behind the rumor or video and take legal
action. Many local and foreign gangs are regularly looting
large sums of money by fooling common people in the cyber
world. Criminals are placing such apps in front of Bigo Live,
TikTok. But there is a big financial crime behind it. Cyber
crime cannot be eradicated from cyber space. It is quite
possible to check them. Historyhaswitnessedthatnolawhas
completely eradicated crime from the world. The only
possible course of action is to make people aware of their
rights and duties and to make law enforcement more
stringent in curbing crime. Computer and information
security, data protection, and privacy are all growing issues.
No single technology or product will eliminate threats and
risks. Securing our computer, information and
communications networks protects our economy and our
nation. Finally, it can be presented that the combined efforts
of the government and the people is a possible way to realize
the people's dream of digital Bangladesh and protect the
individual and national security of the state from the
aggression of cybercriminals. These misinformation and
propaganda on social media and online mustbestoppednow
and people from all walks of life must come forward.
Remember our new enemies are just a mouse click away.
REFERENCES
[1] https://ictd.gov.bd/
[2] http://www.bbs.gov.bd/
[3] https://www.thedailystar.net
[4] https://www.police.gov.bd
[5] https://www.cid.gov.bd/
[6] https://www.dosomething.org
[7] https://www.researchgate.net
[8] https://www.broadbandsearch.net
[9] https://www.youtube.com/

More Related Content

Similar to Cyber Crime: Youth in Social Decline

Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
Best Online Paper Writing Service
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
sainnrg
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
Priyatham Kanigarla
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
CA.Kolluru Narayanarao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
Kolluru N Rao
 
Cyber crime in Pakistan
Cyber crime in PakistanCyber crime in Pakistan
Cyber crime in Pakistan
Mustufain Ahmed Ansari
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
IJMIT JOURNAL
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
xosap
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
IRJET Journal
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
Rahuljain40418
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
Heights of Inhumanity in Cyberspace
Heights of Inhumanity in CyberspaceHeights of Inhumanity in Cyberspace
Heights of Inhumanity in Cyberspace
ijtsrd
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
Write My Statistics Paper Vestal
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
VipinRawat52
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
kirtigoyal328
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
Michele Thomas
 

Similar to Cyber Crime: Youth in Social Decline (19)

Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Cyber crime in Pakistan
Cyber crime in PakistanCyber crime in Pakistan
Cyber crime in Pakistan
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Heights of Inhumanity in Cyberspace
Heights of Inhumanity in CyberspaceHeights of Inhumanity in Cyberspace
Heights of Inhumanity in Cyberspace
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 

Recently uploaded (20)

bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 

Cyber Crime: Youth in Social Decline

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 542 Cyber Crime: Youth in Social Decline Md. Kabir Hossain1, Mohammad Arif2 1Assistant Professor (ICT), Bandarban Cantonment Public School & College, Bandarban, Bangladesh. 2Student, 5th Batch, Dept. of Computer Science and Engineering, University of Creative Technology Chattogram ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Information Technology (IT) is one of the priorities of the Bangladesh government. The country is quite advanced in this sector. New technologies such as mobilesand the Internet have spread beyond the city limits to the countryside. Various benefits of information technology are becoming increasingly available to people. Now anyone can easily communicate with anyone anywhere in the world. With the rapid expansion of information technology, cybercrime or IT-based crimes are also increasing rapidly. Innocent people are victims of various crimes. Again, various conspiracies are going on against the government using information technology facilities to perpetuate personal interests or party interests. Various rumors are being spread. Different groups are being provoked. Violent communalism is spreading as social crimes are happening. Key Words: ICT, Cyber crime, Cyberbullying, Social Media, Hackers, Extremists, Low enforcement agencies, ICT act, etc 1. Introduction People from every sector in Bangladesh have poor or no concern about how their information is disseminatedonline and the protection of personal information which is why cyber-crime is growing rapidly in Bangladesh. The general public seems to have little interest in learning about this virus and has no idea how to protect themselves from it. Unfortunately, cyber criminals have used this to their advantage and are looking to exploit that fear and uncertainty for financial gain. Cyber criminals use phishing, smishing and fraudulent websites to extort personal information or gain access to an organisation's computer systems in search of valuable business and financial information. Emails and messages appear to be from an authentic source; In fact, fraudsters present themselves as genuine. 2. Conceptual overview of cybercrime Cybercrime is apparently a 'crime' committed using 'computers' or 'networks' or 'hardware devices' or 'cyberspace'. The CouncilofEurope'sCybercrimeConvention uses the term 'cybercrime' to refer to crimes ranging from criminal activity against data to content and copyright infringement. Cybercrime is generally defined as a crime in which a computer is used as a target or tool to commit a crime. Cybercrime has many forms and new forms and techniques are being noticed day by day. However, the main forms of cyber crime are attached below: Fig -1: Forms of Cybercrime Cybercriminals are an ever-present threat in every country connected to the Internet.Cybercriminalsconsistofdifferent groups or categories as shown below: Fig -2: Forms of Cyber Criminals
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 543 3. Social media and its users Every 3 seconds a social media ID is being opened on different platforms. According to the data of Bangladesh Telecommunication Regulatory Commission, the number of internet users in the country is about 112613000. And the number of mobile sim users is about 16000000. A large part of digital crime is being committed through social media through deception and enticement. Hacking social media accounts by compromising or creating fake accounts.Cyber- bullying is the use of insulting or defamatory comments directed at someone over the Internet or social media to humiliate them and undermine their social status by spreading unwanted content. Due to these reasons, the netizens are now facing various problems in using social media. Many are falling prey to cyber-criminals through Facebook, Messenger, Twitter, Viber, YouTube, WhatsApp and IMO etc. These virtual platforms exploit one's personal vulnerability to humiliate, intimidate or lure someone into doing something unfair. Teenagers are the first victims of such harassment. Adults or minors areconstantlyfallinginto this trap. 4. Cyberbullying A large number of online social media users, including students of various educational institutions in Bangladesh, are victims of cyberbullying. According to data, 49 percentof school children in the country are victims of regular cyber bullying. According to the Ministry of Posts and Telecommunications, three-fourths of women in the country are victims of cyberbullying. However, this issue remains unaddressed. Only 28 percent reported harassment online. Others fear that they will be socially stigmatized if they complain. In addition to cyberbullying, this type of harassment is often happening on mobile phones, e-mails or mobile banking. As a result,depression,inattentiontostudies and insomnia etc. develop among the victims including women. Even suicides are happening. Children who are victims of cyberbullying are gradually turning to something terrible, the effects of which are devastating and almost irreversible. Below is a statistic showing the percentage of children who are victims of cyberbullying in some cases. Fig -3: Effects of cyberbullying in kids A survey has been conducted among people of different ages in our country and it has been found that they are the most victims of cyber bullying through social media. The rate of cyberbullying variesacross different social media. Below isa survey of this: Fig -4: People are cyberbullied in different social media 5. Extremists and their activities An organized clique is actively trying to mislead interested youth about the benefits of IT. Various religious extremist ideologies are being propagated by opening Facebook pages, groups, YouTube channels. Day by day, crores of peopleare joining it. Strict cyber monitoringshould be done so that no one can disturb the security of the state. Internet access madeeasy. It hasmanyadvantages.Thereare also some downsides. So, when we do a good deed, the bad that comes with it will not cause a big crisis. Necessary steps should be taken for that. Therefore, if these cybercrimes continue, the security of the state will be under threat. It also posesa threat to public safety. The young generation isbeing
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 544 misled. Thus makinglifemiserable for theyouthandpushing them towards an uncertain future. Adequate measures should be taken by creating various units or organizations to monitor cybercrime in the interests of individuals and the state. As we have become digitally dependent, there is no substitute for cybercrime monitoring. 6. Digital platform and its weaknesses Our government system is going digital. Hence, cyberspace threats will grow more alarmingly in the future. Social media including Facebook-YouTube should be strictly monitored. These cannot be solved simply by closing them and keeping users away. We are becoming dependent in someplaces, but enemiesinsideandoutsidethecountryhave become quite active. They are ready to harm people in every possible way. How can it be prevented? Measures must be taken to protect us from any form of cyber-attack. Criminal gangs are becoming more reckless day by day as the existing laws of the country are weak in detecting IT-related crimes. This is undoubtedly terrifying.BTRCwasseenhelplessinthis regard. This time during Durga Puja, there have been incidents of communal attacks in different parts of the country on charges of insulting religion. As a result, the question hasarisen-whetherpopularserviceslikeFacebook, YouTube, Twitter and Googlewill remain unregulated inthis country or not. The question arises again and again. According to the number of mobile phone users, Bangladesh ranks the 10th in the world. Currently, the number of mobile subscribers in the country is about 16 crores. As the number of internet users increases due to accessibility, so does the number of cyber crimes. Especially the number of crimes centered on the social media Facebook is increasing. In this age of technology, living without computers, internet and mobile phones is almost impossible. Technology has become human-oriented and has bound people in all directions. As much as it is true and in the reality of the age its abuse is also becoming one of the causes of human suffering. School-going young women are the main victims of these frauds. Not only cyber crimesare being committed to victimizewomen,cyber criminals are also committing heinous crimes financially. Hacking mobile phone numbers with fake messages and stealing money from bank accounts are common. 7. Invention of new technologies and new tricks of deception Another major criminal trend is spreading state, social, political and religious hatred on the Internet. We often see news of Internet-centric fraud and crimeinthenews.Butlaw enforcement officials say crime levels are high and many crimes go unreported. Many donotreporttothepoliceorany other agency for fear of losing their dignity. As a result, many cases do not go to trial and in many cases the culprits cannot be identified. In this case, experts are talking about our technological limitations. It should be noted that as cybercrime is on the rise, the criminal investigation force needs to be trained to combat it. New technologies are being invented almost every day and criminals are committing crimes using those technologies. There can be no substitute for developing a technological law enforcement force to detect and suppress cyber criminals in the interest of protecting the country's security and reputation. Besides, modern laws are needed. They have not yet developed in the country. Many countries around theworldhaveenactedlaws to regulatesocial media. We have to pay attention tothattoo. 8. Actions by law enforcement agencies to mitigate cyber crime A policy of silence against cybercrime is one of the major causes of damage. Fearing loss of family or honor, many tolerate or repress in silence. As a result criminals take more chances. They also lure victims into various traps to get financial benefits. In this age of internet we all are more or less facing a complex psychological problem like cyber bullying. Offenders are specifically accusing or attacking a person in public. Harassment also involves defacing someone's photos or videos and posting them online It is a type of cybercrime. There are specific laws and enforcement in the country to curb these crimes like cyber bullying. Just need to be aware of it. If the matter goes beyond the family circle, the law should be resorted to. Avoiding the cooperation of the policeinthiscaseisratherdangerous.This difficult task becomes very easy by following few steps. The first step is to file a General Diary (GD) at the police station. Evidenceofharassmentmustbeaccompaniedbyscreenshots or messages. Anyone who has been harassed can now get help by calling 999 or the police Facebook page. Such issues canalso be resolved confidentially on the MinistryofWomen and Child Affairs hotline number 10921. Complaints canalso be made directly to BTRC's phone and e-mail. In the online world, there are ways to find a solution. 9. Challenges in identifying cybercriminals Identifying, arresting and proving the charges against cyber criminals is time consuming and challenging for cyber security and crime departments. These challenges include lack of Mutual Legal Assistance Treaty (MLAT) with various countries, negligence of Internet Service Providers instoring log data, failure to promptly report an organized crime and lack of awareness and skilled manpower among digital technology users. Here some difficulties to investigate cybercrime by law enforcement agencies. These are shown below:  Under ICTA 2006, the offenses are non-cognizable (Section-76(2)) and the police cannot be investigated without a warrant. This takes away the freedom of investigation from the law enforcement authorities.  At present, apart from two specialized units under the CID, no other police agency is capable of handling
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 545 cybercrimeissues and these unitsare severelylacking in trained investigators, equipment and manpower.  Difficulty in defining crime, jurisdictional issues, detection techniques and collection of digitalevidence are also complex areas in cyber crime investigation.  There are no dedicated analytics sitescompatiblewith global secure police communication systems to provide real-time monitoring of cyber activities.  Digital ForensicLaboratoryisessentialforcybercrime investigation and detection with professional experts, which we have a serious shortage of. Various teams are working on cybercrime such as Digital Forensic Investigation Team, Cyber Incident Response and Investigation, Internet Referral and Investigation, Social Media Monitoring, E-Fraud Investigation etc. From the forgoing discussion certain recommendations are appended below for due consideration:  Formulate a National Cyber Security Policy as well as establish an entity for overall coordinating and directing responsibility. BTRC may be strengthened to develop as regulatory body of cyber related issues.  Create appropriate structures at all level with well- defined role and responsibilities so that human resources with adequate skills, knowledge and training are available to securely manage the information infrastructure.  Create awareness and build momentum. Conduct extensive mediacampaignsandothercivicactivities to build mass awarenessoncybercriminalactivities. Initiate programs to educate everybody about their cyber right and also edify parents on how to filter harmful Internet contents.  Initiate dialogs with the NGOs, donor organizations and corporate bodies for sharing government’s vision and tentative roadmap towards combating cybercrime.  Encourage senior officials of government and government agencies to carefully learn the basic operations of the Internet in order to work independently.  Enhance law enforcement capacity to prevent and prosecute cyber attacks.  Enact strict laws to deal with the menace of cybercrime. Laws should create deterrence in the minds of criminals.  Every effort should be made for international cooperation to enable information sharing, reduce vulnerabilities and deter malicious users.  A national level organization may be created for sanitization of hardware, software and computer related gadgets specially used in sensitive institutions. 10. Conclusions Our dependence on the network will only increase in the years ahead. As technology advances, threats and vulnerabilities change, and understanding of information security issues improves, there is a constant need to review cyber strategy. Those sharing videos or spreading messages of social unrest on Facebook, YouTube or social media are being identified. Besides, it has become necessary to find those involved behind the rumor or video and take legal action. Many local and foreign gangs are regularly looting large sums of money by fooling common people in the cyber world. Criminals are placing such apps in front of Bigo Live, TikTok. But there is a big financial crime behind it. Cyber crime cannot be eradicated from cyber space. It is quite possible to check them. Historyhaswitnessedthatnolawhas completely eradicated crime from the world. The only possible course of action is to make people aware of their rights and duties and to make law enforcement more stringent in curbing crime. Computer and information security, data protection, and privacy are all growing issues. No single technology or product will eliminate threats and risks. Securing our computer, information and communications networks protects our economy and our nation. Finally, it can be presented that the combined efforts of the government and the people is a possible way to realize the people's dream of digital Bangladesh and protect the individual and national security of the state from the aggression of cybercriminals. These misinformation and propaganda on social media and online mustbestoppednow and people from all walks of life must come forward. Remember our new enemies are just a mouse click away. REFERENCES [1] https://ictd.gov.bd/ [2] http://www.bbs.gov.bd/ [3] https://www.thedailystar.net [4] https://www.police.gov.bd [5] https://www.cid.gov.bd/ [6] https://www.dosomething.org [7] https://www.researchgate.net [8] https://www.broadbandsearch.net [9] https://www.youtube.com/