SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume: 3 | Issue: 3 | Mar-Apr 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Paper ID – IJTSRD23456 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1569
Impact of Cyber Crime: Issues and Challenges
Dr. Renu1, Pawan2
1Associate Professor, 2Student
1UILS, Chandigarh University, Mohali, Punjab, India
2LLM, Chandigarh University, Mohali, Punjab, India
How to cite this paper: Dr. Renu |
Pawan "Impact of Cyber Crime: Issues
and Challenges" Published in
International Journal of Trend in
Scientific Research and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-3, April 2019,
pp.1569-1572, URL:
https://www.ijtsrd.c
om/papers/ijtsrd23
456.pdf
Copyright © 2019 by author(s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an Open Access article
distributed under
the terms of the
Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/
by/4.0)
ABSTRACT
The facilities of computer technology have not come out without drawbacks.
Though it makes the life so speedy and fast, but hurled under the eclipse of
threat from the deadliest type of criminality termed as 'Cybercrime’ without
computers, entire businesses and governmentoperationswould almostceaseto
function. This proliferation of cheap, powerful, user-friendly computers has
enabled more and more people to use them and, more importantly, relyon them
as part of their normal way of life. As businesses, government agencies, and
individuals continue to rely on them more and more, so do the criminals
Restriction of cybercrimes is dependentonproperanalysisof theirbehavior and
understanding of their impacts over various levels of society. Therefore, in the
current manuscript a systematic understanding of cybercrimes and their
impacts over various areas like Soci-eco-political, consumer trust, teenager etc.
With the future trends of cybercrimes are explained.
KEYWORDS: Cybercrime, Consumer trust, Soci-eco-poltical, Security
INTRODUCTION
Cybercrime is a term used to broadly describe criminal
activity in which computers or computer networks are a
tool, a target, or a place of criminal activity and include
everything from electronic cracking to denial of service
attacks. It is also used to include traditional crimes in which
computers or networks are used toenabletheillicit activity.1
The Cybercrime can halt any railway where it is, it may
misguide the planes on its flight by misguiding with wrong
signals, it may cause any important militarydatatofallin the
hands of foreign countries, and it may halt e-media and
every system can collapse within a fraction of seconds. The
present study has been undertaken to touch some aspects,
impact and prospects of this cybertechnology with special
reference to threat poses of Cybercrime by India. Efforts
have been made to analyze legal framework available for its
control in India. To start with, it is, therefore, necessary to
demarcate the dimensions of word ‘crime’.Thus,itisbeyond
doubt that ‘crime’ is a relative phenomenon, universal in
nature and essentially all societies from ancient to modern
have been evidently demonstrating its presence.2 Each
society have been providing its own description of criminal
behavior and conduct made punishablebyexpresswillof the
political community rulingoverthesocietyand itwasalways
1 Peter Grabosky and Russell Smith, Crime in digital Age 3
(Federation Press., Sydney,1998)
2 Dr.Jyoti Rattan,Cyber laws and Information Technology 6
(Bharat law house pvt.ltd .,New Delhi,2014).
influence by religious-social-political economical values
prevailing in the given society. Thus, from time immemorial
the behavior that attracts ‘penal liability’ influenced and
characterized by overall outcome of these standards.
Parenthetically, just as concept of crime [has undergone]
change with the growth of Information Technology so the
categories of criminals who engage in such crimes. So far
Indian society is concerned, particularly during ancient
period, the definition of crime flagged by religious
interpretation.3 The period was known for complete
dominance of religion. All political and social activities in
general and 'Crime' in particular, considered tobehappened
due to the presence of super-natural power. The
Demonological theory of crime causation was an outcomeof
this period. Medieval period had evidenced the eras of
renaissance and restoration, which delivered new, and a
fresh look to ‘crime’. The concepts like utilitarian, positive
approach, analytical thinking, principles of natural justice,
and thoughts of Lessie faire, hedonistic philosophy, and pain
and pleasure theory outcome of this period which helped to
open new horizons for the study of crime. Latter period
paved the way for scientific & industrial revolution and
rational way of interpretation dominated the thinking.4
IMPACTS OF CYBER CRIME
3 Dr.Amita Verma,cyber crime and law 10 (Central law
publication .,Allahabadh,2009).
4 Supra note 3, at 7.
IJTSRD23456
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23456 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1570
Crime as an Evil Factor of Society
Despite crimeless society is myth, crime is omnipresent
phenomenon, and it is non-separablepartof social existence,
one may get irritate by the question, 'Why there is too much
ado about crime? 'No one can deny that crime is a social
phenomenon, it is omnipresent, and there is nothing new in
crime as it is one of the characteristic features of the all
societies existed so far, may it be civilized or uncivilized, and
it is one of the basic instincts of all human behavior!
However, it should bear in mind that the social concern for
high crime rate is not because of its nature, but due to
potential disturbance it causes to the society.5 In addition,
some individuals are victims of crime in a more specific
sense. The victims of crime may lose anything thathas value.
Safety, peace, money, and property are perhapsbasicvalues,
because they contribute to the satisfaction of many wishes.
Impact of Cyber Crime over Socio-Eco-Political Riders
Conceptually, crime is a dynamic and relative phenomenon
and subjected to the relative sociopolitical & economical
changes occurring in existing system of society. Therefore,
neither all-time suitable comprehensive definition
encompassing all aspects of ‘crime’ is possible at any
moment of time nor can a single definition be made
applicable to different society. With its dynamicity, it is
influenced by the changes occurring in the correlated
phenomenon and value system generated by these changes.
As evident in present scenario where money is more
valuable than values, a definite hikeinthe corruptionrelated
offences are observed where social morality is low which
influence the commission of crime attached less social
stigma than ever before. Incidentally economic crime is on
its peak. This clearly reflects that crime has its
interdependency with other social phenomenon, economic
systems and political machineries.6 Also, the population is
one of the importantfactorsinfluencingincidencesof crimes.
A positive correlation between the growth in incidences of
crime and the population of the country has been observed.
Besides population, the other factors influencing the crime
are such as situation at a particular place, rate of
urbanization, migration of population from neighboring
places,unemployment, incomeinequality,[computer literacy
in case of Cybercrime] etc. At the same time, the economic
structure of give society is also influence the economic
crimes. As every controlling systemforcrimehasmuch to do
with the political system which prescribenorms,makerules,
create preventive measure, the political structure and
system also influence the crime in given society. This clearly
demonstrates that every definition of crime has correlation
with the socio-economic and political factors.7
Impact of Cyber Crime over Teenager
These days a worst fear in teenager’s eyes are Cyber
Bullying. It is become commonoverpastfive years,generally
from the age below eighteenaremoresusceptibleand feared
from Cyber Bullying as per inspection. It is becoming an
alarming trend in our society. As per inspection of data, the
worst fear of cybercrime is on teenager’s female. Cyber
Bullying is a fear when person receives threats, negative
comments or negative pictures or comments from another
5 Sumanjit Das and Tapaswini Nayak, “ Impact of
cybercrime” 6 IJESET, issue 2, ISSN: 22316604, (oct 2013).
6 Pavan Duggal, Text Book on Cyber Law 53 (Universal law
Publication, Delhi, 2016).
7 Ibid.
person. This is all done through core technologies described
above mainly via online. Cyber Bulling can be done through
chatting, instant messaging etc. Where website like
Facebook, Orkut, Twitter user are more affected from Cyber
Bullying.8 In my analysis generally feared personcanreach a
limit of depression, humiliation and threatens. Through this
analysis we come to analyze that if person Bulled online he
or she may be depressed up to the level of self-harming.9
Impact of Cyber Crime over Private Industry
Having to use three attributes to describe cybercrime I
would use the words intrusive, silent and dangerous.10 Just
the silent mode of this type of crimes is a major problem in
combating the threat, in fact, very often the companies
realize that they have been victims of frauds or attacks until
long after the event occurred. The consequences are
disarming and retrieve the situation is sometimes
impossible, precisely the time gap between the criminal
event and its discovery provides an advantage to those who
commit crimes often unbridgeable that makes impossible
any action of persecution.11 We are assuming that the event
is discovered by the victims and this isnotalways true, many
companies are in fact over the years are victims of
cybercrime, but they are not aware, a cancer that destroys
from within.
Impact of Cyber Crime over Consumer Behavior
The information revolution, coupled with the strategic
leveraging of the Internet, has exposed a number of
relatively open societies to the dangers of cybercriminal and
cyber terrorist acts, especially in commercial business
transactions. With the development of e-commerce, this
commercial dark side has become known as cybercrime and
has taken on many forms that affect the perceptions of the
way we shop online. Corporations should realize that these
threats to their online businesses havestrategicimplications
to their business future and take proper measures to ensure
that these threats are eliminated or significantly reduced so
that consumer confidence in the Internet as an alternative
means of shopping is maintained. These counter measures,
coined as cyber security, have been developed to ensure the
safety of consumer privacy and information and allow for a
carefree shopping experience.12 There is need for the
development of models that will allow corporations tostudy
the impacts of cybercrime on online consumer confidence
and to counter through leveraging the benefits associated
with the latest developments in cyber security. With these
two facets of e-commerce impacting the online consumer,
corporations must ensure that the security measures taken
will ultimately prevail to assure that consumers will
continue to use the Internettosatisfytheirshoppingneeds.13
Impact of Cyber Crime over Business
According to the FBI and the Department of Justice, cyber-
crime is on the rise among American businesses, and it is
8 Hemraj Saini, “cyber crime and their impacts: A review” 2
IJERA, Issue 2, ISSN:2248-9622, (2012).
9 Supra note 2, at 14.
10R.C Mishra, Cyber Crime: Impact in the New Millennium
13 ( Authorspress, 2002).
11Ibid.
12Animesh Sarmah and Roshmi Sarmah, “A Brief Study on
Cyber Crime and Cyber law’s of India” 4 IRJET, Issue 6,
ISSN: 2395-0072, (2017).
13Supra note 9, at 206.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23456 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1571
costing them dearly. Cyber-crime includes a myriad of
devious criminal practices designed to breach a company's
computer security. The purpose of the electronic break and
enter can be to steal the financialinformationof thebusiness
or its customers, to deny service to the company website or
to install a virus that monitors a company's online activity in
the future.
The-Cost-Of-Protection
Companies that want to protect themselves from online
thieves have to pull out their wallets to do it. There are costs
in identifying risks, building new and safer operating
procedures, and buying protectivesoftwareand hardware.14
For businesses with complex or sensitive operations, this
often involves hiringa cyber-security consultanttodevelopa
customized solution. Not only are the upfront costs of
protection expensive, but the systems must be tested and
monitored regularly to ensure that they are still impactive
against emerging cyber-attacks. Thesecostsareoftenpassed
on to the customer through higher prices of goods and
services.
Lost-Sales
Cyber-crime isn't just for thieves anymore.A newsubculture
has emerged in the past few years: the cyber-activist. These
are the online equivalents of protesters who chain
themselves to buildings or trees. Their purpose is to shut
down a company's online operations to send a message
about the company's business practices. In the past two
years, major corporations, such as PayPal and MasterCard,
have been attacked in this way.15 In December 2010, the
PayPal website was attacked by dozensof peopleclaimingto
be part of the group, Anonymous. They attempted to
perpetrate a denial of service attack in retaliation for PayPal
shutting down payment services to Wiki Leaks. More than a
dozen hackers were arrested in that crime. While PayPaldid
not experience a full shutdown, many other businesses
aren't so lucky. A denial of service attack results in fewer
sales as customers cannot accessthecompany'sonlinestore.
It can even result in less revenue in the long-term if some
customers decide to no longer do business with a company
vulnerable to attack.
Impact of Cyber Crime over Youth
Cyber communication is society's newest way to interact.
Online social networking websites,textmessages andemails
provide users with an impactive, quick way to communicate
with people all over the world. Teens in particular spend
hours online every day, on computers or personal electronic
devices.
Friendships
Family-rescource.com states that48percentofteens believe
the Internet improves their friendships. With social
networking sites becoming increasingly popular, youth are
able to stay connected to real and online friends. Someteens
believe cyber connections help them feel confident to be
their true selves. Instant messaging programs, used by an
estimated 13 million teens, allow conversationswithfriends
to occur in real time. Online communication tools open the
door for friendships with other teens near and far.
14 Pavan Duggal, Mobile Crime and Mobile Law, 79
(Saakshar Law Publication, New Delhi, 2013)
15 Supra note 9, at 207.
Writing
While teens are frequently online, using cyber forms of
communication doesn't require formal writing skills. Quite
the opposite actually occurs; youths often use shorthand,
abbreviations or slang when writing online. The National
Commission on Writing states that 85 percent of teens use
social networking communication, but 60 percent of them
don't see this form of communication as "writing." Teens
should be aware of the difference between formal and
informal writing, and understand when the latter is not
appropriate (in school).
Cyber Bullying
Cyber bullying is a negative impact of online communication
between youth. Victims of cyber bullying often experience
rumors and lies spread on online social networks. Bullies
may post inappropriate or embarrassing pictures of their
victims. Another aspect of cyber bullying involves using
mean text messages as harassment. The National Crime
Prevention Council states that cyber bullying is a problem
for almost half of American teens. In some extreme cases,
teens have taken their own lives as a result of cyber
bullying.16
Sexual Solicitation
Sexual solicitation is a growing concern for youth who use
forms of cyber communication. Itmayoccur in chatroomsor
on social networking sites. Sexual solicitation occurs when
an adult or peer tries to engage in an online sexual
relationship. A teen may be asked to disclose personal
information, view pornography or discuss somethingsexual
online. About 70 percent of teens who are sexually solicited
online are girls. Teens should be cautious in posting
suggestive photos online and talking to strangers in chat
rooms.17
CONCLUSION
The future of the Internet is still up for grabs between
criminals and normal users. Fears of a cyber apocalypse still
abound, while the potential extent of damage that can be
caused by wide scale fraud is nearly unbounded. These
anxieties should be rationally tempered with theknowledge
that the problems are beingaddressed, althoughperhaps not
fast enough. The usefulness of the Internet has proved itself
in numerous and myriad ways that will hopefully be enough
to ensure it does not become a wasteland of criminal activity
and a bastion for the malicious. The government still has an
important role to play, but most of the prevention needs to
be done by commercial entities producing software and
those with the ability to stop fraud. Relying on consumer
education programs will only affect a percentage of possible
victims. The others need to be automatically protected
through measures that do not stress and require
considerable participation. Security needs to be easy and
impactive if it is doing work. Whether cybercrime is still a
pertinent issue ten years from nowisunknowableinasense,
but if the Internet will continue to grow, it must be solved so
that the realities of cybercrime will be proportional to real-
world crimes, if not better.
16 Karnika Seth, Computer Internet and New Technology
Law 135 (Universal Law Publication, Delhi, 2013).
17Debarati Halder and K. Shankar, Cyber Crime Against
Women in India 142 (Saga Publication India Pvt.Ltd., New
Delhi, 2017)
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23456 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1572
REFERENCES
[1] Crime in the Digital Age by Peter Grabosky and Russell
Smith, Sydney: Federation Press, 1998.
[2] Peter Grabosky and Russell Smith, Crime in digital Age
3 (Federation Press., Sydney,1998)
[3] Dr.Jyoti Rattan,Cyber laws and Information Technology
6 (Bharat law house pvt.ltd .,New Delhi,2014).
[4] Dr.Amita Verma,cyber crime and law 10 (Central law
publication .,Allahabadh,2009).
[5] Sumanjit Das and Tapaswini Nayak, “ Impact of
cybercrime” 6 IJESET, issue 2, ISSN: 22316604, (oct
2013).
[6] Pavan Duggal, Text Book on Cyber Law 53 (Universal
law Publication, Delhi, 2016).
[7] Hemraj Saini, “cyber crime and their impacts: A
review” 2 IJERA, Issue 2, ISSN:2248-9622, (2012).
[8] R.C Mishra, Cyber Crime: Impact in the New Millennium
13 ( Authorspress, 2002).
[9] Animesh Sarmah and Roshmi Sarmah, “A Brief Study
on Cyber Crime and Cyber law’s of India” 4 IRJET,Issue
6, ISSN:2395-0072, (2017).
[10] Pavan Duggal, Mobile Crime and Mobile Law, 79
(Saakshar Law Publication, New Delhi, 2013).
[11] Karnika Seth, Computer Internet and New Technology
Law 135 (Universal Law Publication, Delhi, 2013).
[12] Debarati Halder and K. Shankar, Cyber Crime Against
Women in India 142 (Saga Publication India Pvt.Ltd.,
New Delhi, 2017).

More Related Content

What's hot (20)

Prevention of Crime
Prevention of CrimePrevention of Crime
Prevention of Crime
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
White collar crime
White collar crimeWhite collar crime
White collar crime
 
1.1 what is crime
1.1 what is crime1.1 what is crime
1.1 what is crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
White collar crime
White collar crimeWhite collar crime
White collar crime
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
A Presentation on Crime and its classification
A Presentation on Crime and its classification A Presentation on Crime and its classification
A Presentation on Crime and its classification
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Corruption
CorruptionCorruption
Corruption
 
Criminology
CriminologyCriminology
Criminology
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Organized Crime
Organized CrimeOrganized Crime
Organized Crime
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Corruption
CorruptionCorruption
Corruption
 

Similar to IMPACT OF CYBER CRIME

Heights of Inhumanity in Cyberspace
Heights of Inhumanity in CyberspaceHeights of Inhumanity in Cyberspace
Heights of Inhumanity in Cyberspaceijtsrd
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxphilipnelson29183
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docxbriancrawford30935
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
 
My new proposal (1).docx
My new proposal (1).docxMy new proposal (1).docx
My new proposal (1).docxAttaUrRahman78
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethicssyed ahmed
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 
Running head ANNOTATED BIBLIOGRAPHIES ON INFORMATION SYSTEMS .docx
Running head ANNOTATED BIBLIOGRAPHIES ON INFORMATION SYSTEMS     .docxRunning head ANNOTATED BIBLIOGRAPHIES ON INFORMATION SYSTEMS     .docx
Running head ANNOTATED BIBLIOGRAPHIES ON INFORMATION SYSTEMS .docxSUBHI7
 
Cyberterrorism Research Paper
Cyberterrorism Research PaperCyberterrorism Research Paper
Cyberterrorism Research PaperRachel Phillips
 

Similar to IMPACT OF CYBER CRIME (13)

Heights of Inhumanity in Cyberspace
Heights of Inhumanity in CyberspaceHeights of Inhumanity in Cyberspace
Heights of Inhumanity in Cyberspace
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
 
My new proposal (1).docx
My new proposal (1).docxMy new proposal (1).docx
My new proposal (1).docx
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethics
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Running head ANNOTATED BIBLIOGRAPHIES ON INFORMATION SYSTEMS .docx
Running head ANNOTATED BIBLIOGRAPHIES ON INFORMATION SYSTEMS     .docxRunning head ANNOTATED BIBLIOGRAPHIES ON INFORMATION SYSTEMS     .docx
Running head ANNOTATED BIBLIOGRAPHIES ON INFORMATION SYSTEMS .docx
 
Cyberterrorism Research Paper
Cyberterrorism Research PaperCyberterrorism Research Paper
Cyberterrorism Research Paper
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

IMPACT OF CYBER CRIME

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume: 3 | Issue: 3 | Mar-Apr 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470 @ IJTSRD | Unique Paper ID – IJTSRD23456 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1569 Impact of Cyber Crime: Issues and Challenges Dr. Renu1, Pawan2 1Associate Professor, 2Student 1UILS, Chandigarh University, Mohali, Punjab, India 2LLM, Chandigarh University, Mohali, Punjab, India How to cite this paper: Dr. Renu | Pawan "Impact of Cyber Crime: Issues and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-3, April 2019, pp.1569-1572, URL: https://www.ijtsrd.c om/papers/ijtsrd23 456.pdf Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/ by/4.0) ABSTRACT The facilities of computer technology have not come out without drawbacks. Though it makes the life so speedy and fast, but hurled under the eclipse of threat from the deadliest type of criminality termed as 'Cybercrime’ without computers, entire businesses and governmentoperationswould almostceaseto function. This proliferation of cheap, powerful, user-friendly computers has enabled more and more people to use them and, more importantly, relyon them as part of their normal way of life. As businesses, government agencies, and individuals continue to rely on them more and more, so do the criminals Restriction of cybercrimes is dependentonproperanalysisof theirbehavior and understanding of their impacts over various levels of society. Therefore, in the current manuscript a systematic understanding of cybercrimes and their impacts over various areas like Soci-eco-political, consumer trust, teenager etc. With the future trends of cybercrimes are explained. KEYWORDS: Cybercrime, Consumer trust, Soci-eco-poltical, Security INTRODUCTION Cybercrime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used toenabletheillicit activity.1 The Cybercrime can halt any railway where it is, it may misguide the planes on its flight by misguiding with wrong signals, it may cause any important militarydatatofallin the hands of foreign countries, and it may halt e-media and every system can collapse within a fraction of seconds. The present study has been undertaken to touch some aspects, impact and prospects of this cybertechnology with special reference to threat poses of Cybercrime by India. Efforts have been made to analyze legal framework available for its control in India. To start with, it is, therefore, necessary to demarcate the dimensions of word ‘crime’.Thus,itisbeyond doubt that ‘crime’ is a relative phenomenon, universal in nature and essentially all societies from ancient to modern have been evidently demonstrating its presence.2 Each society have been providing its own description of criminal behavior and conduct made punishablebyexpresswillof the political community rulingoverthesocietyand itwasalways 1 Peter Grabosky and Russell Smith, Crime in digital Age 3 (Federation Press., Sydney,1998) 2 Dr.Jyoti Rattan,Cyber laws and Information Technology 6 (Bharat law house pvt.ltd .,New Delhi,2014). influence by religious-social-political economical values prevailing in the given society. Thus, from time immemorial the behavior that attracts ‘penal liability’ influenced and characterized by overall outcome of these standards. Parenthetically, just as concept of crime [has undergone] change with the growth of Information Technology so the categories of criminals who engage in such crimes. So far Indian society is concerned, particularly during ancient period, the definition of crime flagged by religious interpretation.3 The period was known for complete dominance of religion. All political and social activities in general and 'Crime' in particular, considered tobehappened due to the presence of super-natural power. The Demonological theory of crime causation was an outcomeof this period. Medieval period had evidenced the eras of renaissance and restoration, which delivered new, and a fresh look to ‘crime’. The concepts like utilitarian, positive approach, analytical thinking, principles of natural justice, and thoughts of Lessie faire, hedonistic philosophy, and pain and pleasure theory outcome of this period which helped to open new horizons for the study of crime. Latter period paved the way for scientific & industrial revolution and rational way of interpretation dominated the thinking.4 IMPACTS OF CYBER CRIME 3 Dr.Amita Verma,cyber crime and law 10 (Central law publication .,Allahabadh,2009). 4 Supra note 3, at 7. IJTSRD23456
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23456 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1570 Crime as an Evil Factor of Society Despite crimeless society is myth, crime is omnipresent phenomenon, and it is non-separablepartof social existence, one may get irritate by the question, 'Why there is too much ado about crime? 'No one can deny that crime is a social phenomenon, it is omnipresent, and there is nothing new in crime as it is one of the characteristic features of the all societies existed so far, may it be civilized or uncivilized, and it is one of the basic instincts of all human behavior! However, it should bear in mind that the social concern for high crime rate is not because of its nature, but due to potential disturbance it causes to the society.5 In addition, some individuals are victims of crime in a more specific sense. The victims of crime may lose anything thathas value. Safety, peace, money, and property are perhapsbasicvalues, because they contribute to the satisfaction of many wishes. Impact of Cyber Crime over Socio-Eco-Political Riders Conceptually, crime is a dynamic and relative phenomenon and subjected to the relative sociopolitical & economical changes occurring in existing system of society. Therefore, neither all-time suitable comprehensive definition encompassing all aspects of ‘crime’ is possible at any moment of time nor can a single definition be made applicable to different society. With its dynamicity, it is influenced by the changes occurring in the correlated phenomenon and value system generated by these changes. As evident in present scenario where money is more valuable than values, a definite hikeinthe corruptionrelated offences are observed where social morality is low which influence the commission of crime attached less social stigma than ever before. Incidentally economic crime is on its peak. This clearly reflects that crime has its interdependency with other social phenomenon, economic systems and political machineries.6 Also, the population is one of the importantfactorsinfluencingincidencesof crimes. A positive correlation between the growth in incidences of crime and the population of the country has been observed. Besides population, the other factors influencing the crime are such as situation at a particular place, rate of urbanization, migration of population from neighboring places,unemployment, incomeinequality,[computer literacy in case of Cybercrime] etc. At the same time, the economic structure of give society is also influence the economic crimes. As every controlling systemforcrimehasmuch to do with the political system which prescribenorms,makerules, create preventive measure, the political structure and system also influence the crime in given society. This clearly demonstrates that every definition of crime has correlation with the socio-economic and political factors.7 Impact of Cyber Crime over Teenager These days a worst fear in teenager’s eyes are Cyber Bullying. It is become commonoverpastfive years,generally from the age below eighteenaremoresusceptibleand feared from Cyber Bullying as per inspection. It is becoming an alarming trend in our society. As per inspection of data, the worst fear of cybercrime is on teenager’s female. Cyber Bullying is a fear when person receives threats, negative comments or negative pictures or comments from another 5 Sumanjit Das and Tapaswini Nayak, “ Impact of cybercrime” 6 IJESET, issue 2, ISSN: 22316604, (oct 2013). 6 Pavan Duggal, Text Book on Cyber Law 53 (Universal law Publication, Delhi, 2016). 7 Ibid. person. This is all done through core technologies described above mainly via online. Cyber Bulling can be done through chatting, instant messaging etc. Where website like Facebook, Orkut, Twitter user are more affected from Cyber Bullying.8 In my analysis generally feared personcanreach a limit of depression, humiliation and threatens. Through this analysis we come to analyze that if person Bulled online he or she may be depressed up to the level of self-harming.9 Impact of Cyber Crime over Private Industry Having to use three attributes to describe cybercrime I would use the words intrusive, silent and dangerous.10 Just the silent mode of this type of crimes is a major problem in combating the threat, in fact, very often the companies realize that they have been victims of frauds or attacks until long after the event occurred. The consequences are disarming and retrieve the situation is sometimes impossible, precisely the time gap between the criminal event and its discovery provides an advantage to those who commit crimes often unbridgeable that makes impossible any action of persecution.11 We are assuming that the event is discovered by the victims and this isnotalways true, many companies are in fact over the years are victims of cybercrime, but they are not aware, a cancer that destroys from within. Impact of Cyber Crime over Consumer Behavior The information revolution, coupled with the strategic leveraging of the Internet, has exposed a number of relatively open societies to the dangers of cybercriminal and cyber terrorist acts, especially in commercial business transactions. With the development of e-commerce, this commercial dark side has become known as cybercrime and has taken on many forms that affect the perceptions of the way we shop online. Corporations should realize that these threats to their online businesses havestrategicimplications to their business future and take proper measures to ensure that these threats are eliminated or significantly reduced so that consumer confidence in the Internet as an alternative means of shopping is maintained. These counter measures, coined as cyber security, have been developed to ensure the safety of consumer privacy and information and allow for a carefree shopping experience.12 There is need for the development of models that will allow corporations tostudy the impacts of cybercrime on online consumer confidence and to counter through leveraging the benefits associated with the latest developments in cyber security. With these two facets of e-commerce impacting the online consumer, corporations must ensure that the security measures taken will ultimately prevail to assure that consumers will continue to use the Internettosatisfytheirshoppingneeds.13 Impact of Cyber Crime over Business According to the FBI and the Department of Justice, cyber- crime is on the rise among American businesses, and it is 8 Hemraj Saini, “cyber crime and their impacts: A review” 2 IJERA, Issue 2, ISSN:2248-9622, (2012). 9 Supra note 2, at 14. 10R.C Mishra, Cyber Crime: Impact in the New Millennium 13 ( Authorspress, 2002). 11Ibid. 12Animesh Sarmah and Roshmi Sarmah, “A Brief Study on Cyber Crime and Cyber law’s of India” 4 IRJET, Issue 6, ISSN: 2395-0072, (2017). 13Supra note 9, at 206.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23456 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1571 costing them dearly. Cyber-crime includes a myriad of devious criminal practices designed to breach a company's computer security. The purpose of the electronic break and enter can be to steal the financialinformationof thebusiness or its customers, to deny service to the company website or to install a virus that monitors a company's online activity in the future. The-Cost-Of-Protection Companies that want to protect themselves from online thieves have to pull out their wallets to do it. There are costs in identifying risks, building new and safer operating procedures, and buying protectivesoftwareand hardware.14 For businesses with complex or sensitive operations, this often involves hiringa cyber-security consultanttodevelopa customized solution. Not only are the upfront costs of protection expensive, but the systems must be tested and monitored regularly to ensure that they are still impactive against emerging cyber-attacks. Thesecostsareoftenpassed on to the customer through higher prices of goods and services. Lost-Sales Cyber-crime isn't just for thieves anymore.A newsubculture has emerged in the past few years: the cyber-activist. These are the online equivalents of protesters who chain themselves to buildings or trees. Their purpose is to shut down a company's online operations to send a message about the company's business practices. In the past two years, major corporations, such as PayPal and MasterCard, have been attacked in this way.15 In December 2010, the PayPal website was attacked by dozensof peopleclaimingto be part of the group, Anonymous. They attempted to perpetrate a denial of service attack in retaliation for PayPal shutting down payment services to Wiki Leaks. More than a dozen hackers were arrested in that crime. While PayPaldid not experience a full shutdown, many other businesses aren't so lucky. A denial of service attack results in fewer sales as customers cannot accessthecompany'sonlinestore. It can even result in less revenue in the long-term if some customers decide to no longer do business with a company vulnerable to attack. Impact of Cyber Crime over Youth Cyber communication is society's newest way to interact. Online social networking websites,textmessages andemails provide users with an impactive, quick way to communicate with people all over the world. Teens in particular spend hours online every day, on computers or personal electronic devices. Friendships Family-rescource.com states that48percentofteens believe the Internet improves their friendships. With social networking sites becoming increasingly popular, youth are able to stay connected to real and online friends. Someteens believe cyber connections help them feel confident to be their true selves. Instant messaging programs, used by an estimated 13 million teens, allow conversationswithfriends to occur in real time. Online communication tools open the door for friendships with other teens near and far. 14 Pavan Duggal, Mobile Crime and Mobile Law, 79 (Saakshar Law Publication, New Delhi, 2013) 15 Supra note 9, at 207. Writing While teens are frequently online, using cyber forms of communication doesn't require formal writing skills. Quite the opposite actually occurs; youths often use shorthand, abbreviations or slang when writing online. The National Commission on Writing states that 85 percent of teens use social networking communication, but 60 percent of them don't see this form of communication as "writing." Teens should be aware of the difference between formal and informal writing, and understand when the latter is not appropriate (in school). Cyber Bullying Cyber bullying is a negative impact of online communication between youth. Victims of cyber bullying often experience rumors and lies spread on online social networks. Bullies may post inappropriate or embarrassing pictures of their victims. Another aspect of cyber bullying involves using mean text messages as harassment. The National Crime Prevention Council states that cyber bullying is a problem for almost half of American teens. In some extreme cases, teens have taken their own lives as a result of cyber bullying.16 Sexual Solicitation Sexual solicitation is a growing concern for youth who use forms of cyber communication. Itmayoccur in chatroomsor on social networking sites. Sexual solicitation occurs when an adult or peer tries to engage in an online sexual relationship. A teen may be asked to disclose personal information, view pornography or discuss somethingsexual online. About 70 percent of teens who are sexually solicited online are girls. Teens should be cautious in posting suggestive photos online and talking to strangers in chat rooms.17 CONCLUSION The future of the Internet is still up for grabs between criminals and normal users. Fears of a cyber apocalypse still abound, while the potential extent of damage that can be caused by wide scale fraud is nearly unbounded. These anxieties should be rationally tempered with theknowledge that the problems are beingaddressed, althoughperhaps not fast enough. The usefulness of the Internet has proved itself in numerous and myriad ways that will hopefully be enough to ensure it does not become a wasteland of criminal activity and a bastion for the malicious. The government still has an important role to play, but most of the prevention needs to be done by commercial entities producing software and those with the ability to stop fraud. Relying on consumer education programs will only affect a percentage of possible victims. The others need to be automatically protected through measures that do not stress and require considerable participation. Security needs to be easy and impactive if it is doing work. Whether cybercrime is still a pertinent issue ten years from nowisunknowableinasense, but if the Internet will continue to grow, it must be solved so that the realities of cybercrime will be proportional to real- world crimes, if not better. 16 Karnika Seth, Computer Internet and New Technology Law 135 (Universal Law Publication, Delhi, 2013). 17Debarati Halder and K. Shankar, Cyber Crime Against Women in India 142 (Saga Publication India Pvt.Ltd., New Delhi, 2017)
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23456 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1572 REFERENCES [1] Crime in the Digital Age by Peter Grabosky and Russell Smith, Sydney: Federation Press, 1998. [2] Peter Grabosky and Russell Smith, Crime in digital Age 3 (Federation Press., Sydney,1998) [3] Dr.Jyoti Rattan,Cyber laws and Information Technology 6 (Bharat law house pvt.ltd .,New Delhi,2014). [4] Dr.Amita Verma,cyber crime and law 10 (Central law publication .,Allahabadh,2009). [5] Sumanjit Das and Tapaswini Nayak, “ Impact of cybercrime” 6 IJESET, issue 2, ISSN: 22316604, (oct 2013). [6] Pavan Duggal, Text Book on Cyber Law 53 (Universal law Publication, Delhi, 2016). [7] Hemraj Saini, “cyber crime and their impacts: A review” 2 IJERA, Issue 2, ISSN:2248-9622, (2012). [8] R.C Mishra, Cyber Crime: Impact in the New Millennium 13 ( Authorspress, 2002). [9] Animesh Sarmah and Roshmi Sarmah, “A Brief Study on Cyber Crime and Cyber law’s of India” 4 IRJET,Issue 6, ISSN:2395-0072, (2017). [10] Pavan Duggal, Mobile Crime and Mobile Law, 79 (Saakshar Law Publication, New Delhi, 2013). [11] Karnika Seth, Computer Internet and New Technology Law 135 (Universal Law Publication, Delhi, 2013). [12] Debarati Halder and K. Shankar, Cyber Crime Against Women in India 142 (Saga Publication India Pvt.Ltd., New Delhi, 2017).