SlideShare a Scribd company logo
MISSION
CHRIST is a nurturing ground for an individual’s
holistic development to make effective contribution to
the society in a dynamic environment
VISION
Excellence and Service
CORE VALUES
Faith in God | Moral Uprightness
Love of Fellow Beings
Social Responsibility | Pursuit of Excellence
Data analytics on cybercrime – An Indian
Perspective
Leo L
Research Scholar,
CHRIST (Deemed to be University)
Email: l.leo@res.christuniversity.in
Dr. Sangeetha R
Associate Professor,
Department of Management Studies
CHRIST (Deemed to be University)
Excellence and Service
CHRIST
Deemed to be University
Introduction
● Cybercrime, also known as Internet crime or Digital crime, is a fast growing
mode of crime at present. Digital platforms have given plenty of positive
opportunities, but at the same time it is misused by criminals for fraudulent
activity.Cybercrime is a growing threat in the virtual world because
individuals and organizations are relying more on internet at an increasing
rate.
● Ginni Rometty (2016), IBM’s chairman, stated that cybercrime is the biggest
threat to every profession, industry and every company in the world.
Accenture (2019) in its report predicts the total value of cybercrime to be
around 5.2 trillion US Dollars worldwide over a five year period, from 2019
to 2023. Steve Morgan (2019) Cyber security Ventures estimates that
cybercrime’s global damages will cost six trillion US Dollars every year by
2021.
Excellence and Service
CHRIST
Deemed to be University
Review of Literature
● Samrin Sulaiman (2019) has examined the public awareness on cybercrime with special
reference to Chennai. The researcher has concluded that the criminals use the internet to
conduct fraudulent activities against many organisations and the general public, such as
credit/debit card scams, personal data theft and phishing.
● Navneet Kaur (2018) has identified various kinds of cybercrimes towards individuals and
organisations. It is a conceptual paper based on secondary data, as the researcher has given
a theoretical meaning and concepts of types of cybercrimes. The researcher has concluded
that laws and regulations are very essential to fight the cybercrimes.
● Muhammad Dharma (2018) has examined the effect of cybercrimes on the buyer’s level of
confidence on internet shopping resulting in fraud victimisation in E-commerce sites. The data
is based on secondary sources.
● Djanggih, h. (2018) determined and analysed the impact of cybercrime on children as victims.
The results of this descriptive analysis show that the development of cybercrime affecting
children as victims increase every year, in various forms.
● Yerra Shankar Rao (2020) carried out a study to describe the concepts of cybercrime and
suggest suitable ways to overcome it. The results have shown that no law has the potential to
completely eliminate digital crime. It is a conceptual paper based on secondary data.
Excellence and Service
CHRIST
Deemed to be University
Review of Literature
● Rennie Naidoo (2020) analysed and interpreted COVID-19 related cybercrime data from
across the globe. The researcher mentioned that the number of cybercrimes has increased,
especially during the pandemic, triggering off fake charities, relief programmes, social media
profiles, websites, emails, products and work-from-home jobs.
● Kamini Dashora (2011) has made a study on various problems related to the cybernet and
also suggested some ideas to overcome it. Some of the problems include hacking, phishing,
cybersquatting and cyber terrorism. It is concluded that it helps to take preventive methods,
such as updating antivirus, control over cookies and avoiding using credit or debit cards.
● Md Shamimul Hasan (2015) research is carried out to protect students by creating awareness
and provide some empirical evidence to assist policy makers in combating cybercrime. This
paper also suggests remedies to young generations, to diminish the risk of being victims in
cybercrime
● Malathi A, Babboo SS and Anbarasi A (2011) state that data mining plays an important role in
combating crime-related issues. The law administration and intelligence analysis can further
help in decision-making.
● McClendon, L., & Meghanathan, N (2015) show that data mining is an important tool that can
be used to detect crime and prevent it
Excellence and Service
CHRIST
Deemed to be University
Data and Methodology
● The research is based on descriptive analysisdata and statistics are taken
from secondary sources, such as websites, NCB reports, journals and
articles. The study has explored the cybercrime statistics of the past four-
year’s (2016-2019) statistics, while data mining is done for 2020.
● It has information on different types of cybercrime, such as identity theft,
banking frauds, online cheating, tampering computers, publishing obscene
materials and fake accounts.
● The study is carried out according to the state and metropolitan cities, which
also identify the motives behind the cybercrimes, such as fraud, anger or
revenge, distortion, stealing data and political motives.
● Analysis is carried out using statistical techniques like Correlation, Standard
Deviation and Regression related to GDP, Unemployment and Literacy rates.
Excellence and Service
CHRIST
Deemed to be University
Top ten statewise Cyber Crimes from 2016 to 2020
SN State 2016 2017 2018 2019 2020
(Estimated)
% Share
(2019)
Population
(Lakhs)
Crime
Rate
(2019)
1 Karnataka 1101 3174 5839 12020 14389 27 659.7 18.2
2 Telangana 593 1209 1205 2691 2997 6 372.8 7.2
3 Assam 696 1120 2022 2231 2894 5 344.2 6.5
4 Uttar Pradesh 2639 4971 6280 11416 13237 25.6 2259.7 5.1
5 Maharashtra 2380 3604 3511 4967 5533 11.2 1225.3 4.1
6 Andhra
Pradesh
616 931 1207 1886 2182 4.2 523.2 3.6
7 Odisha 317 824 843 1485 1748 3.3 437.3 3.4
8 Jharkhand 259 720 930 1095 1431 2.5 375.8 2.9
9 Meghalaya 39 39 74 89 107 0.2 32.3 2.8
10 Rajasthan 941 1304 1104 1762 1844 4 776 2.3
11 Union
Territories
130 203 151 244 255 0.3 240.8 0.6
12 Other States 2606 3697 4082 4660 5109 10.7 6129.1 0.76
Total 12317 21796 27248 44546 51723 100 13376.1 3.3
Source: NCRB Report
Excellence and Service
CHRIST
Deemed to be University
Motives behind Cyber Crime Statewise – 2016 to 2019
Cyber Crime Motives 2016 2017 2018 2019
2020
(Estimat
ed)
2019(
%)
Personal Revenge
1056
628 794 1207 1076 2.71
Anger 714 461 581 452 1.30
Fraud 5987 12213 15051 26891 31423 60.37
Extortion 571 906 1050 1842 2082 4.14
Causing Disrepute 448 1002 1212 1874 2256 4.21
Prank 121 321 296 1385 1473 3.11
Sexual Exploitation 1255 1460 2030 2266 2654 5.09
Political Motives 40 139 218 316 405 0.71
Terrorist Activities - 110 44 199 207 0.45
Inciting Hate against
Country/Community 152 206 218 49 82 0.11
Disrupt Public Service 33 55 21 28 22 0.06
Sale/purchase of illegal drugs 14 8 6 10 6 0.02
Developing own business 141 156 198 181 210 0.41
Spreading Piracy 23 90 671 45 369 0.10
Steal Information 18 10 16 93 92 0.21
Source: NCRB Report
Excellence and Service
CHRIST
Deemed to be University
Descriptive statistics of dependent and independent
variables
S.N State Cyber
crimes
(2019)
Other
crimes
(X1)
GDP
(X2)
Unemployme
nt rate
(X3)
Literacy
rate 2011
(X4)
1 Karnataka 12020 151671 154439882 0.9 75.37
2 Telangana 2691 128563 86103090 2.3 60.2
3 Assam 2231 130552 31588121 0.9 72.19
4 Uttar Pradesh 11416 617162 166822924 9.4 67.68
5 Maharashtra 4967 504466 263279231 4.9 82.34
6 Andhra
Pradesh
1886 143865 86295708 5.4 67.02
7 Odisha 1485 120040 49222925 4.4 72.89
8 Jharkhand 1095 61111 29720373 17 66.41
9 Meghalaya 89 3808 3348064 2.5 74.43
10 Rajasthan 1762 302632 94258604 15 66.11
Mean(X
̄ ) 3964.2 220351.2 96507892 6.27 70.464
Standard Deviation(𝜎) 4276.8 200912.3 78824966 5.72 6.236
Coefficient of
Variation(C.V)
107.88 91.17 81.67 91.29 8.85
Excellence and Service
CHRIST
Deemed to be University
Top ten cybercrimes in metropolitan cities of India
from 2016 to 2020
City 2016 2017 2018 2019 2020
(Estimated)
% (2019) Population
(Lakhs)
Crime
Rate
Bengaluru 762 2743 5253 10555 12801 57.45 85 124.2
Lucknow 361 608 962 1262 1563 6.87 29 43.5
Hyderabad 291 328 428 1379 1448 7.51 77.5 17.8
Jaipur 532 685 415 544 486 2.96 30.7 17.7
Ghaziabad 62 118 191 347 412 1.89 23.6 14.7
Mumbai 980 1362 1482 2527 2778 13.75 184.1 13.7
Kanpur 136 229 229 365 412 1.99 29.2 12.5
Patna 167 79 115 202 176 1.10 20.5 9.9
Pune 269 318 153 309 251 1.68 50.5 6.1
Surat 66 105 155 228 273 1.24 45.8 5
Other Metro
Cities
546 687 715 654 739 3.56 564.5 1.2
Total 4172 7262 10098 18372 21335 100 1140.4 16.1
Source: NCRB Report *Estimation for 2020 is calculated using linear regression *Crime Rate 2019 = Population/No of crimes
Excellence and Service
CHRIST
Deemed to be University
Findings:
● The highest number (12,020) of crime has taken place in Karnataka, in 2019,
this could be because Bengaluru in Karnataka is regarded as Silicon Valley of
India due to its leading role in the IT sector.
● A majority of crime is related to Financial/Banking scam, in which the
criminals mostly operate in the area of money-related offences to hack bank
accounts, ATMs, Debit/Credit card and OTP scams.
● SLL (Special Local Law) crimes such as gambling, copyright, and trademarks
are decreasing gradually.
● There are 26,891 (60% in 2019) criminals, who are motivated to commit
fraudulent activities through identity theft, cheating and fake profiles. Not all
the cybercrimes are financially motivated, but some also involve sexual
exploitation, anger, personal revenge, pranks or political motives.
Excellence and Service
CHRIST
Deemed to be University
Findings:
● The highest rate (57%) of cybercrimes has taken place in Bengaluru (10,555
cases in 2019) compared to other cities.
● Correlation analysis between the cybercrimes with other crimes (0.59) and
GDP (0.65) in India, which has a positive moderate correlation.
● it was found that cybercrimes are continuously growing at an alarming rate of
more than 30%, while nowhere was it shown to be declining.
● It is found that that there is a slight correlation (0.20) between literacy and
crime. Innocents with low digital knowledge fall prey to cybercrimes.
Excellence and Service
CHRIST
Deemed to be University
Suggestions and recommendations:
● Avoid using e-mail, credit or debit card and e-banking facilities while browsing
through a public internet or Wi-Fi.
● Let your password contain a mix of uppercase, lowercase and
alphanumericals. Never share it with anyone.
● Protect your computers through antivirus software and update it frequently.
● Download the apps only from reliable sources. Avoid giving unnecessary
permissions such as contacts, cameras, files and location.
● Never share your bank login credentials, One Time Password (OTP), Debit
card or credit card details or ATM PIN with anyone, even if they claim to be
bank employees.
● Be cautious while sharing identity proof documents such as aadhar, PAN
Change the password at least once every six months on all your devices and
applications.
● Always report cybercrime complaints at https://cybercrime.gov.in/.
Excellence and Service
CHRIST
Deemed to be University
Limitations and Scope
● The research is based on past four years data only
● Though internet is global, attempt is made at India level
● There is a scope for further study at sector level
● The research can be further explored around the globe while major factors
influencing cybercrimes can be explored.
Excellence and Service
CHRIST
Deemed to be University
Conclusion:
● The study noted that there were motives to develop businesses illegally,
which would affect the genuine ones and also halt paying of taxes to the
Government of India, therefore affecting economic progress. Cybercrimes can
bring down the state and country’s performance.
● Ch, Rupa et al. (2020) mention in their research that cybercrime will cost
nearly $6 trillion per annum by 2021, as per the cyber security ventures report
in 2020. It also states that existing literature in the area of cyber-attacks is
insufficient to compute and forecast malicious attack, especially with
unstructured data.
● Mittal (2019) says that android-based applications can be developed using
machine learning algorithms that could help government and police
departments.
Excellence and Service
CHRIST
Deemed to be University
References:
● Djanggih, h. (2018). The phenomenon of cybercrimes which impact children as victims in
indonesia. Yuridika, 33(2), 212.
● Er. Navneet Kaur, Introduction of Cyber Crime and its Type, International Research Journal of
Computer Science, ISSN: 2393- 9842, 2018, Vol 5, Issue 8, Page 435- 439(Kaur 2018)
● Muhammad Dharma Tuah Putra Nasution, Andysah Putera Utama Siahann, Yossie Rossanty,
Solly Aryza, The Phenomenon of Cyber Crime and Fraud Victimisation In Online Shop,
International Journal of Civil Engineering and Technology, ISSN: 0976- 6316, 2018, Vol 9,
Issue 6, Page 1583- 1592 (Siahaan and Muhammad Dharma Tuah, n.d.)
● Rao, Y. S., Pradhan, D., Charana Panda, T., & Rath, R. (2020). Digital Crime and its Impact in
Present Society. International Journal of Engineering Research and Technology (IJERT), 8(1).
Retrieved from www.ijert.org
● Naidoo, R. (2020). A multi-level influence model of COVID-19 themed cybercrime. European
Journal of Information Systems, 29(3), 306–321.
https://doi.org/10.1080/0960085X.2020.1771222
Excellence and Service
CHRIST
Deemed to be University
● Kamini Dashora(2011). Cyber Crime in the Society: Problems and Preventions. Journal of
Alternative Perspectives in the Social Sciences ( 2011) Vol 3, No 1, 240-259
● Monalisa Hati (2016). Cyber Crime: A Threat to the Nation and its Awareness, Journal of
Advanced Research in Computer and Communication Engineering ISO 3297:2007 Certified
Vol. 5, Issue 7, July 2016
● Md Shamimul Hasan et al. (2015). Perception and Awareness of Young Internet Users
towards Cybercrime: Evidence from Malaysia , Journal of Social Science Volume 11, Issue 4
Pages 395-404
● Dambo Itari, Ezimora Okezie Anthony, Nwanyanwu Mercy, Cyber Space Technology: Cyber
Crime, Cyber Security and Models of Cyber Solution, a Case Study of Nigeria, International
Journal of Computer Science and Mobile Computing, ISSN: 2320- 088X, 2017, Vol 6, Issue
11, Page 94- 113(Dambo Itari, Ezimora Okezie Anthony, Nwanyanwu Mercy 2017)
● Lin, K. Y., & Lu, H. P. (2011). Why people use social networking sites: An empirical study
integrating network externalities and motivation theory. Computers in human behavior, 27(3),
1152-1161.
Excellence and Service
CHRIST
Deemed to be University
Thank you

More Related Content

What's hot

Building Construction Details
Building Construction DetailsBuilding Construction Details
Building Construction Details
cocongkening
 
Lecture 1-aerial photogrammetry
Lecture 1-aerial photogrammetryLecture 1-aerial photogrammetry
Lecture 1-aerial photogrammetry
Vidhi Khokhani
 
6 i-longwave radiation
6 i-longwave radiation6 i-longwave radiation
6 i-longwave radiation
Riccardo Rigon
 
building defects & remidies
building  defects & remidiesbuilding  defects & remidies
building defects & remidies
Kirtika Gupta
 
Retaining wall
 Retaining wall  Retaining wall
Retaining wall
kamariya keyur
 
Brick Masonry
Brick MasonryBrick Masonry
Brick Masonry
Joynul Abadin Rasel
 
ACH 122 Lecture 04a (Excavation & Foundations P1)
ACH 122 Lecture 04a (Excavation & Foundations P1)ACH 122 Lecture 04a (Excavation & Foundations P1)
ACH 122 Lecture 04a (Excavation & Foundations P1)
Anne Arundel Community College
 
Shear walls
Shear wallsShear walls
Shear walls
Rajat Nainwal
 

What's hot (8)

Building Construction Details
Building Construction DetailsBuilding Construction Details
Building Construction Details
 
Lecture 1-aerial photogrammetry
Lecture 1-aerial photogrammetryLecture 1-aerial photogrammetry
Lecture 1-aerial photogrammetry
 
6 i-longwave radiation
6 i-longwave radiation6 i-longwave radiation
6 i-longwave radiation
 
building defects & remidies
building  defects & remidiesbuilding  defects & remidies
building defects & remidies
 
Retaining wall
 Retaining wall  Retaining wall
Retaining wall
 
Brick Masonry
Brick MasonryBrick Masonry
Brick Masonry
 
ACH 122 Lecture 04a (Excavation & Foundations P1)
ACH 122 Lecture 04a (Excavation & Foundations P1)ACH 122 Lecture 04a (Excavation & Foundations P1)
ACH 122 Lecture 04a (Excavation & Foundations P1)
 
Shear walls
Shear wallsShear walls
Shear walls
 

Similar to Data analytics on cybercrime

Nature and Patterns of Urban Crimes With Special Reference to Colombo City in...
Nature and Patterns of Urban Crimes With Special Reference to Colombo City in...Nature and Patterns of Urban Crimes With Special Reference to Colombo City in...
Nature and Patterns of Urban Crimes With Special Reference to Colombo City in...
International Journal of Research and Innovation in Social Science (IJRISS)
 
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
AIRCC Publishing Corporation
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
IRJET Journal
 
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data MiningAn Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
Waqas Tariq
 
Vietnam in the digital era 2020
Vietnam in the digital era 2020Vietnam in the digital era 2020
Vietnam in the digital era 2020
Chuong Nguyen
 
Vietnam in the digital era 2020
Vietnam in the digital era 2020Vietnam in the digital era 2020
Vietnam in the digital era 2020
Duy, Vo Hoang
 
New Research Articles 2019 May Issue International Journal of Data Mining & K...
New Research Articles 2019 May Issue International Journal of Data Mining & K...New Research Articles 2019 May Issue International Journal of Data Mining & K...
New Research Articles 2019 May Issue International Journal of Data Mining & K...
IJDKP
 
Conference presentation MQI Degree College-14-5-22.pptx
Conference presentation MQI Degree College-14-5-22.pptxConference presentation MQI Degree College-14-5-22.pptx
Conference presentation MQI Degree College-14-5-22.pptx
Mohammad Rafee
 
CYBER CRIMES IN INDIA
CYBER CRIMES IN INDIACYBER CRIMES IN INDIA
CYBER CRIMES IN INDIA
IRJET Journal
 
Bad netiquette of_digital_citizen_in_sri_lanka
Bad netiquette of_digital_citizen_in_sri_lankaBad netiquette of_digital_citizen_in_sri_lanka
Bad netiquette of_digital_citizen_in_sri_lanka
Manahari Darshika Pemarathna
 
The Importance of Indeterminate and Unknown Factors in Nourishing Crime: A Ca...
The Importance of Indeterminate and Unknown Factors in Nourishing Crime: A Ca...The Importance of Indeterminate and Unknown Factors in Nourishing Crime: A Ca...
The Importance of Indeterminate and Unknown Factors in Nourishing Crime: A Ca...
MOHDSAIFWAJID1
 
Analysis Of Demographic Characteristics Based On Data Of Social Network Users
Analysis Of Demographic Characteristics Based On Data Of Social Network UsersAnalysis Of Demographic Characteristics Based On Data Of Social Network Users
Analysis Of Demographic Characteristics Based On Data Of Social Network Users
Sarah Morrow
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
IJARIIT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
praveen1792
 
Strategic Database Security Management and Cybercrime Reduction among Youths ...
Strategic Database Security Management and Cybercrime Reduction among Youths ...Strategic Database Security Management and Cybercrime Reduction among Youths ...
Strategic Database Security Management and Cybercrime Reduction among Youths ...
ijtsrd
 
The Role of Brand Trust Mediates the Effect of Perceived Risk and Brand Image...
The Role of Brand Trust Mediates the Effect of Perceived Risk and Brand Image...The Role of Brand Trust Mediates the Effect of Perceived Risk and Brand Image...
The Role of Brand Trust Mediates the Effect of Perceived Risk and Brand Image...
AJHSSR Journal
 
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET Journal
 
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...
ijistjournal
 
3213ijist01
3213ijist013213ijist01
3213ijist01
jh1234jh
 
Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...
Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...
Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...
ijtsrd
 

Similar to Data analytics on cybercrime (20)

Nature and Patterns of Urban Crimes With Special Reference to Colombo City in...
Nature and Patterns of Urban Crimes With Special Reference to Colombo City in...Nature and Patterns of Urban Crimes With Special Reference to Colombo City in...
Nature and Patterns of Urban Crimes With Special Reference to Colombo City in...
 
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary...
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data MiningAn Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
 
Vietnam in the digital era 2020
Vietnam in the digital era 2020Vietnam in the digital era 2020
Vietnam in the digital era 2020
 
Vietnam in the digital era 2020
Vietnam in the digital era 2020Vietnam in the digital era 2020
Vietnam in the digital era 2020
 
New Research Articles 2019 May Issue International Journal of Data Mining & K...
New Research Articles 2019 May Issue International Journal of Data Mining & K...New Research Articles 2019 May Issue International Journal of Data Mining & K...
New Research Articles 2019 May Issue International Journal of Data Mining & K...
 
Conference presentation MQI Degree College-14-5-22.pptx
Conference presentation MQI Degree College-14-5-22.pptxConference presentation MQI Degree College-14-5-22.pptx
Conference presentation MQI Degree College-14-5-22.pptx
 
CYBER CRIMES IN INDIA
CYBER CRIMES IN INDIACYBER CRIMES IN INDIA
CYBER CRIMES IN INDIA
 
Bad netiquette of_digital_citizen_in_sri_lanka
Bad netiquette of_digital_citizen_in_sri_lankaBad netiquette of_digital_citizen_in_sri_lanka
Bad netiquette of_digital_citizen_in_sri_lanka
 
The Importance of Indeterminate and Unknown Factors in Nourishing Crime: A Ca...
The Importance of Indeterminate and Unknown Factors in Nourishing Crime: A Ca...The Importance of Indeterminate and Unknown Factors in Nourishing Crime: A Ca...
The Importance of Indeterminate and Unknown Factors in Nourishing Crime: A Ca...
 
Analysis Of Demographic Characteristics Based On Data Of Social Network Users
Analysis Of Demographic Characteristics Based On Data Of Social Network UsersAnalysis Of Demographic Characteristics Based On Data Of Social Network Users
Analysis Of Demographic Characteristics Based On Data Of Social Network Users
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Strategic Database Security Management and Cybercrime Reduction among Youths ...
Strategic Database Security Management and Cybercrime Reduction among Youths ...Strategic Database Security Management and Cybercrime Reduction among Youths ...
Strategic Database Security Management and Cybercrime Reduction among Youths ...
 
The Role of Brand Trust Mediates the Effect of Perceived Risk and Brand Image...
The Role of Brand Trust Mediates the Effect of Perceived Risk and Brand Image...The Role of Brand Trust Mediates the Effect of Perceived Risk and Brand Image...
The Role of Brand Trust Mediates the Effect of Perceived Risk and Brand Image...
 
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
 
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...
 
3213ijist01
3213ijist013213ijist01
3213ijist01
 
Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...
Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...
Effectiveness of Public Private Partnership Strategies in Urban Crime Managem...
 

Recently uploaded

DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
bmucuha
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
xclpvhuk
 
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCAModule 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
yuvarajkumar334
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
aqzctr7x
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
taqyea
 
Build applications with generative AI on Google Cloud
Build applications with generative AI on Google CloudBuild applications with generative AI on Google Cloud
Build applications with generative AI on Google Cloud
Márton Kodok
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
Social Samosa
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
ihavuls
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
bmucuha
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
mkkikqvo
 
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
a9qfiubqu
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
ElizabethGarrettChri
 
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
wyddcwye1
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
y3i0qsdzb
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
jitskeb
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 

Recently uploaded (20)

DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
 
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCAModule 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
 
Build applications with generative AI on Google Cloud
Build applications with generative AI on Google CloudBuild applications with generative AI on Google Cloud
Build applications with generative AI on Google Cloud
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
 
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
 
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
一比一原版巴斯大学毕业证(Bath毕业证书)学历如何办理
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 

Data analytics on cybercrime

  • 1. MISSION CHRIST is a nurturing ground for an individual’s holistic development to make effective contribution to the society in a dynamic environment VISION Excellence and Service CORE VALUES Faith in God | Moral Uprightness Love of Fellow Beings Social Responsibility | Pursuit of Excellence Data analytics on cybercrime – An Indian Perspective Leo L Research Scholar, CHRIST (Deemed to be University) Email: l.leo@res.christuniversity.in Dr. Sangeetha R Associate Professor, Department of Management Studies CHRIST (Deemed to be University)
  • 2. Excellence and Service CHRIST Deemed to be University Introduction ● Cybercrime, also known as Internet crime or Digital crime, is a fast growing mode of crime at present. Digital platforms have given plenty of positive opportunities, but at the same time it is misused by criminals for fraudulent activity.Cybercrime is a growing threat in the virtual world because individuals and organizations are relying more on internet at an increasing rate. ● Ginni Rometty (2016), IBM’s chairman, stated that cybercrime is the biggest threat to every profession, industry and every company in the world. Accenture (2019) in its report predicts the total value of cybercrime to be around 5.2 trillion US Dollars worldwide over a five year period, from 2019 to 2023. Steve Morgan (2019) Cyber security Ventures estimates that cybercrime’s global damages will cost six trillion US Dollars every year by 2021.
  • 3. Excellence and Service CHRIST Deemed to be University Review of Literature ● Samrin Sulaiman (2019) has examined the public awareness on cybercrime with special reference to Chennai. The researcher has concluded that the criminals use the internet to conduct fraudulent activities against many organisations and the general public, such as credit/debit card scams, personal data theft and phishing. ● Navneet Kaur (2018) has identified various kinds of cybercrimes towards individuals and organisations. It is a conceptual paper based on secondary data, as the researcher has given a theoretical meaning and concepts of types of cybercrimes. The researcher has concluded that laws and regulations are very essential to fight the cybercrimes. ● Muhammad Dharma (2018) has examined the effect of cybercrimes on the buyer’s level of confidence on internet shopping resulting in fraud victimisation in E-commerce sites. The data is based on secondary sources. ● Djanggih, h. (2018) determined and analysed the impact of cybercrime on children as victims. The results of this descriptive analysis show that the development of cybercrime affecting children as victims increase every year, in various forms. ● Yerra Shankar Rao (2020) carried out a study to describe the concepts of cybercrime and suggest suitable ways to overcome it. The results have shown that no law has the potential to completely eliminate digital crime. It is a conceptual paper based on secondary data.
  • 4. Excellence and Service CHRIST Deemed to be University Review of Literature ● Rennie Naidoo (2020) analysed and interpreted COVID-19 related cybercrime data from across the globe. The researcher mentioned that the number of cybercrimes has increased, especially during the pandemic, triggering off fake charities, relief programmes, social media profiles, websites, emails, products and work-from-home jobs. ● Kamini Dashora (2011) has made a study on various problems related to the cybernet and also suggested some ideas to overcome it. Some of the problems include hacking, phishing, cybersquatting and cyber terrorism. It is concluded that it helps to take preventive methods, such as updating antivirus, control over cookies and avoiding using credit or debit cards. ● Md Shamimul Hasan (2015) research is carried out to protect students by creating awareness and provide some empirical evidence to assist policy makers in combating cybercrime. This paper also suggests remedies to young generations, to diminish the risk of being victims in cybercrime ● Malathi A, Babboo SS and Anbarasi A (2011) state that data mining plays an important role in combating crime-related issues. The law administration and intelligence analysis can further help in decision-making. ● McClendon, L., & Meghanathan, N (2015) show that data mining is an important tool that can be used to detect crime and prevent it
  • 5. Excellence and Service CHRIST Deemed to be University Data and Methodology ● The research is based on descriptive analysisdata and statistics are taken from secondary sources, such as websites, NCB reports, journals and articles. The study has explored the cybercrime statistics of the past four- year’s (2016-2019) statistics, while data mining is done for 2020. ● It has information on different types of cybercrime, such as identity theft, banking frauds, online cheating, tampering computers, publishing obscene materials and fake accounts. ● The study is carried out according to the state and metropolitan cities, which also identify the motives behind the cybercrimes, such as fraud, anger or revenge, distortion, stealing data and political motives. ● Analysis is carried out using statistical techniques like Correlation, Standard Deviation and Regression related to GDP, Unemployment and Literacy rates.
  • 6. Excellence and Service CHRIST Deemed to be University Top ten statewise Cyber Crimes from 2016 to 2020 SN State 2016 2017 2018 2019 2020 (Estimated) % Share (2019) Population (Lakhs) Crime Rate (2019) 1 Karnataka 1101 3174 5839 12020 14389 27 659.7 18.2 2 Telangana 593 1209 1205 2691 2997 6 372.8 7.2 3 Assam 696 1120 2022 2231 2894 5 344.2 6.5 4 Uttar Pradesh 2639 4971 6280 11416 13237 25.6 2259.7 5.1 5 Maharashtra 2380 3604 3511 4967 5533 11.2 1225.3 4.1 6 Andhra Pradesh 616 931 1207 1886 2182 4.2 523.2 3.6 7 Odisha 317 824 843 1485 1748 3.3 437.3 3.4 8 Jharkhand 259 720 930 1095 1431 2.5 375.8 2.9 9 Meghalaya 39 39 74 89 107 0.2 32.3 2.8 10 Rajasthan 941 1304 1104 1762 1844 4 776 2.3 11 Union Territories 130 203 151 244 255 0.3 240.8 0.6 12 Other States 2606 3697 4082 4660 5109 10.7 6129.1 0.76 Total 12317 21796 27248 44546 51723 100 13376.1 3.3 Source: NCRB Report
  • 7. Excellence and Service CHRIST Deemed to be University Motives behind Cyber Crime Statewise – 2016 to 2019 Cyber Crime Motives 2016 2017 2018 2019 2020 (Estimat ed) 2019( %) Personal Revenge 1056 628 794 1207 1076 2.71 Anger 714 461 581 452 1.30 Fraud 5987 12213 15051 26891 31423 60.37 Extortion 571 906 1050 1842 2082 4.14 Causing Disrepute 448 1002 1212 1874 2256 4.21 Prank 121 321 296 1385 1473 3.11 Sexual Exploitation 1255 1460 2030 2266 2654 5.09 Political Motives 40 139 218 316 405 0.71 Terrorist Activities - 110 44 199 207 0.45 Inciting Hate against Country/Community 152 206 218 49 82 0.11 Disrupt Public Service 33 55 21 28 22 0.06 Sale/purchase of illegal drugs 14 8 6 10 6 0.02 Developing own business 141 156 198 181 210 0.41 Spreading Piracy 23 90 671 45 369 0.10 Steal Information 18 10 16 93 92 0.21 Source: NCRB Report
  • 8. Excellence and Service CHRIST Deemed to be University Descriptive statistics of dependent and independent variables S.N State Cyber crimes (2019) Other crimes (X1) GDP (X2) Unemployme nt rate (X3) Literacy rate 2011 (X4) 1 Karnataka 12020 151671 154439882 0.9 75.37 2 Telangana 2691 128563 86103090 2.3 60.2 3 Assam 2231 130552 31588121 0.9 72.19 4 Uttar Pradesh 11416 617162 166822924 9.4 67.68 5 Maharashtra 4967 504466 263279231 4.9 82.34 6 Andhra Pradesh 1886 143865 86295708 5.4 67.02 7 Odisha 1485 120040 49222925 4.4 72.89 8 Jharkhand 1095 61111 29720373 17 66.41 9 Meghalaya 89 3808 3348064 2.5 74.43 10 Rajasthan 1762 302632 94258604 15 66.11 Mean(X ̄ ) 3964.2 220351.2 96507892 6.27 70.464 Standard Deviation(𝜎) 4276.8 200912.3 78824966 5.72 6.236 Coefficient of Variation(C.V) 107.88 91.17 81.67 91.29 8.85
  • 9. Excellence and Service CHRIST Deemed to be University Top ten cybercrimes in metropolitan cities of India from 2016 to 2020 City 2016 2017 2018 2019 2020 (Estimated) % (2019) Population (Lakhs) Crime Rate Bengaluru 762 2743 5253 10555 12801 57.45 85 124.2 Lucknow 361 608 962 1262 1563 6.87 29 43.5 Hyderabad 291 328 428 1379 1448 7.51 77.5 17.8 Jaipur 532 685 415 544 486 2.96 30.7 17.7 Ghaziabad 62 118 191 347 412 1.89 23.6 14.7 Mumbai 980 1362 1482 2527 2778 13.75 184.1 13.7 Kanpur 136 229 229 365 412 1.99 29.2 12.5 Patna 167 79 115 202 176 1.10 20.5 9.9 Pune 269 318 153 309 251 1.68 50.5 6.1 Surat 66 105 155 228 273 1.24 45.8 5 Other Metro Cities 546 687 715 654 739 3.56 564.5 1.2 Total 4172 7262 10098 18372 21335 100 1140.4 16.1 Source: NCRB Report *Estimation for 2020 is calculated using linear regression *Crime Rate 2019 = Population/No of crimes
  • 10. Excellence and Service CHRIST Deemed to be University Findings: ● The highest number (12,020) of crime has taken place in Karnataka, in 2019, this could be because Bengaluru in Karnataka is regarded as Silicon Valley of India due to its leading role in the IT sector. ● A majority of crime is related to Financial/Banking scam, in which the criminals mostly operate in the area of money-related offences to hack bank accounts, ATMs, Debit/Credit card and OTP scams. ● SLL (Special Local Law) crimes such as gambling, copyright, and trademarks are decreasing gradually. ● There are 26,891 (60% in 2019) criminals, who are motivated to commit fraudulent activities through identity theft, cheating and fake profiles. Not all the cybercrimes are financially motivated, but some also involve sexual exploitation, anger, personal revenge, pranks or political motives.
  • 11. Excellence and Service CHRIST Deemed to be University Findings: ● The highest rate (57%) of cybercrimes has taken place in Bengaluru (10,555 cases in 2019) compared to other cities. ● Correlation analysis between the cybercrimes with other crimes (0.59) and GDP (0.65) in India, which has a positive moderate correlation. ● it was found that cybercrimes are continuously growing at an alarming rate of more than 30%, while nowhere was it shown to be declining. ● It is found that that there is a slight correlation (0.20) between literacy and crime. Innocents with low digital knowledge fall prey to cybercrimes.
  • 12. Excellence and Service CHRIST Deemed to be University Suggestions and recommendations: ● Avoid using e-mail, credit or debit card and e-banking facilities while browsing through a public internet or Wi-Fi. ● Let your password contain a mix of uppercase, lowercase and alphanumericals. Never share it with anyone. ● Protect your computers through antivirus software and update it frequently. ● Download the apps only from reliable sources. Avoid giving unnecessary permissions such as contacts, cameras, files and location. ● Never share your bank login credentials, One Time Password (OTP), Debit card or credit card details or ATM PIN with anyone, even if they claim to be bank employees. ● Be cautious while sharing identity proof documents such as aadhar, PAN Change the password at least once every six months on all your devices and applications. ● Always report cybercrime complaints at https://cybercrime.gov.in/.
  • 13. Excellence and Service CHRIST Deemed to be University Limitations and Scope ● The research is based on past four years data only ● Though internet is global, attempt is made at India level ● There is a scope for further study at sector level ● The research can be further explored around the globe while major factors influencing cybercrimes can be explored.
  • 14. Excellence and Service CHRIST Deemed to be University Conclusion: ● The study noted that there were motives to develop businesses illegally, which would affect the genuine ones and also halt paying of taxes to the Government of India, therefore affecting economic progress. Cybercrimes can bring down the state and country’s performance. ● Ch, Rupa et al. (2020) mention in their research that cybercrime will cost nearly $6 trillion per annum by 2021, as per the cyber security ventures report in 2020. It also states that existing literature in the area of cyber-attacks is insufficient to compute and forecast malicious attack, especially with unstructured data. ● Mittal (2019) says that android-based applications can be developed using machine learning algorithms that could help government and police departments.
  • 15. Excellence and Service CHRIST Deemed to be University References: ● Djanggih, h. (2018). The phenomenon of cybercrimes which impact children as victims in indonesia. Yuridika, 33(2), 212. ● Er. Navneet Kaur, Introduction of Cyber Crime and its Type, International Research Journal of Computer Science, ISSN: 2393- 9842, 2018, Vol 5, Issue 8, Page 435- 439(Kaur 2018) ● Muhammad Dharma Tuah Putra Nasution, Andysah Putera Utama Siahann, Yossie Rossanty, Solly Aryza, The Phenomenon of Cyber Crime and Fraud Victimisation In Online Shop, International Journal of Civil Engineering and Technology, ISSN: 0976- 6316, 2018, Vol 9, Issue 6, Page 1583- 1592 (Siahaan and Muhammad Dharma Tuah, n.d.) ● Rao, Y. S., Pradhan, D., Charana Panda, T., & Rath, R. (2020). Digital Crime and its Impact in Present Society. International Journal of Engineering Research and Technology (IJERT), 8(1). Retrieved from www.ijert.org ● Naidoo, R. (2020). A multi-level influence model of COVID-19 themed cybercrime. European Journal of Information Systems, 29(3), 306–321. https://doi.org/10.1080/0960085X.2020.1771222
  • 16. Excellence and Service CHRIST Deemed to be University ● Kamini Dashora(2011). Cyber Crime in the Society: Problems and Preventions. Journal of Alternative Perspectives in the Social Sciences ( 2011) Vol 3, No 1, 240-259 ● Monalisa Hati (2016). Cyber Crime: A Threat to the Nation and its Awareness, Journal of Advanced Research in Computer and Communication Engineering ISO 3297:2007 Certified Vol. 5, Issue 7, July 2016 ● Md Shamimul Hasan et al. (2015). Perception and Awareness of Young Internet Users towards Cybercrime: Evidence from Malaysia , Journal of Social Science Volume 11, Issue 4 Pages 395-404 ● Dambo Itari, Ezimora Okezie Anthony, Nwanyanwu Mercy, Cyber Space Technology: Cyber Crime, Cyber Security and Models of Cyber Solution, a Case Study of Nigeria, International Journal of Computer Science and Mobile Computing, ISSN: 2320- 088X, 2017, Vol 6, Issue 11, Page 94- 113(Dambo Itari, Ezimora Okezie Anthony, Nwanyanwu Mercy 2017) ● Lin, K. Y., & Lu, H. P. (2011). Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Computers in human behavior, 27(3), 1152-1161.
  • 17. Excellence and Service CHRIST Deemed to be University Thank you