This document provides a research progress report for Rahul Jain from January to June 2023. It summarizes his coursework, assignments completed, literature reviewed, and proposed research plan. Rahul is pursuing a PhD in law at Bennett University under the supervision of Dr. Suvir Kapur and Dr. Bhabani Sonowal. His proposed thesis topic is on cyber crimes against children and the impact of technological advancement. The report outlines his hypothesis, research questions, objectives, and proposed chapter structure. It also lists assignments completed during coursework and an extensive literature review conducted. Rahul's tentative research plan is to continue literature review, publish an article, present research papers, and attend conferences.
Pros And Cons Of Cybercrime
Pros And Disadvantages Of Cyber Crime Essay
Cyber Crime : A Crime
Cybercrime: Two Case Studies
Cyber Crime Speech
Why Cybercrime Is Important
The Issue Of Cyber Crimes Essay
Cyber Security Threats And Crimes
Cyber Crime Essay
Cybercrime Research Paper : Cybercrime
Cyber Crime In Australia
Cyber Crimes And The Crime
Research Paper On Cybercrime
Cyber Crime
Cyber Crime And Transnational Crime Essay
CyberCrime Essay
Advantages And Disadvantages Of Cyber Crime
Disadvantages Of Cyber Crime
Essay on Computer Crimes
Cyber Crime Essay
Pros And Cons Of Cybercrime
Pros And Disadvantages Of Cyber Crime Essay
Cyber Crime : A Crime
Cybercrime: Two Case Studies
Cyber Crime Speech
Why Cybercrime Is Important
The Issue Of Cyber Crimes Essay
Cyber Security Threats And Crimes
Cyber Crime Essay
Cybercrime Research Paper : Cybercrime
Cyber Crime In Australia
Cyber Crimes And The Crime
Research Paper On Cybercrime
Cyber Crime
Cyber Crime And Transnational Crime Essay
CyberCrime Essay
Advantages And Disadvantages Of Cyber Crime
Disadvantages Of Cyber Crime
Essay on Computer Crimes
Cyber Crime Essay
Good Cybercitizens Make the Internet a Safer Place
Own your online presence. To keep yourself safe, set privacy and security settings on web services, apps, and devices to your comfort level. ...
Be a good digital citizen. ...
Respect yourself and others. ...
Practice good communications. ...
Protect yourself and your information.
Cyber Crime Essay
Cybercrime: Two Case Studies
Cyber Crime Essay
Cyber Crimes, Moral And Ethical Implication
Cybercrime And Its Effect On The Youth
Essay on Cyber Crime and Cyber Law
CyberCrime Essay
Persuasive Essay On Cybercrime
Essay on CyberCrime
Essay on Cyber Crime and National Security
Research Paper On Cybercrime
Essay on Introduction to Computer Crime
Persuasive Essay On Cybercrime
Cyber Crime In The United States
Cyber Crime Essay
The Issue Of Cyber Crimes Essay
Literature Review On Cyber Crime
Cyber Crime Essay
With the advent of Social Media and Internet Technology, children have become vulnerable to cybercrimes such as cyberbullying, cyber stalking and childabuse. This presentation is an eyeopener and spreads awareness about the cyber threats prevalent on internet and gives tips on best practices for ensuring cyber safety and educates the children and the parent on how to deal with such problems .This presentation was delivered recently by Cyber law expert, Karnika Seth in Thiruvanthpuram at a National Consultation on Legislative and Executive measures required to safeguard children online.
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
10 Criminology in the Future
Criminology in the Future
Kristopher Freitag, Javielle Watson, Michael Westphal, Starcia Zeigler
CJA/314
April 7, 2014
Judy Mazzucca
Technology is advancing in every aspect of the criminal justice system, from the investigation to the prosecution of the crimes. Crime fighting methodologies have the potential to greatly assist law enforcement in the war on crime. Some experts even think that some software and tools will be able to help prevent crime. (Yeung, n.d.). Methodologies, such as mandating DNA collection programs, biometrics, and implementing cybercrime spyware programs are on the list of the next big things of the future, when it comes to fighting crime. DNA testing helps law enforcement investigate and prosecute crimes, as well as clear the names of those who have been wrongfully convicted. There are currently about twenty states with laws requiring DNA collection at the time of the person’s arrest. The federal government also has this requirement. As, with any controversial subject, DNA testing has its critics. Some are saying that DNA testing is in violation of the Fourth Amendment, especially for those who have not been convicted of a crime. Others are concerned that DNA testing may open the doors for abuse of the genetic information being stored in the databases. (Berson, n.d.). Biometrics are automated methods of recognizing a person based on physiological or behavioral characteristics. Some of the features measured using biometrics are handwriting, voice, iris, hand geometry, vein, retinal, and fingerprints. Biometric based solutions provide personal data privacy, and confidential financial transactions, and are starting to become the foundation of an extensive array of highly secure identification and personal verification solutions. The need for highly secure identification and personal verification technologies is great, due to the increased number of transaction fraud and security breaches. This need is especially great in the areas of local, state, and federal governments. Infrastructures such as electronic banking, health and social services, law enforcement, and retail sales are already taking advantage of, and seeing the benefits of biometric technology. ("The Biometrics Consortium", n.d.).
As we become more and more dependent on technology, the increase of cybercrimes are skyrocketing, which has forced law enforcement to figure out ways of combatting cybercrimes. We have become extremely vulnerable to many cybercrimes, including social media fraud, which consists of cyber criminals using social media to steal the identities of unsuspecting people; and luring people to download malicious materials, or reveal their passwords; corporate security breaches, which consists of cyber criminals exploiting company employees via scams; and phishing, which involves cyber criminals targeting company employees by sending emails that appear to be from someone within the company. ("Homeland .
it expresses youths must follow the etiquette of social media, even facebook and twitter can disturbs the studies that can be healed by online counselling
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
This is an article/blog on the Privacy Symposium Africa 2022 on Privacy Rights and Digital rights as Human Rights. It also talks about Online Gender Based Violence , this is gender based violence that manifests in the Digital Space and Online world ie; phishing, non-consensual sharing, harrassment. This article explains why Privacy rights are essential in the modern world.
Good Cybercitizens Make the Internet a Safer Place
Own your online presence. To keep yourself safe, set privacy and security settings on web services, apps, and devices to your comfort level. ...
Be a good digital citizen. ...
Respect yourself and others. ...
Practice good communications. ...
Protect yourself and your information.
Cyber Crime Essay
Cybercrime: Two Case Studies
Cyber Crime Essay
Cyber Crimes, Moral And Ethical Implication
Cybercrime And Its Effect On The Youth
Essay on Cyber Crime and Cyber Law
CyberCrime Essay
Persuasive Essay On Cybercrime
Essay on CyberCrime
Essay on Cyber Crime and National Security
Research Paper On Cybercrime
Essay on Introduction to Computer Crime
Persuasive Essay On Cybercrime
Cyber Crime In The United States
Cyber Crime Essay
The Issue Of Cyber Crimes Essay
Literature Review On Cyber Crime
Cyber Crime Essay
With the advent of Social Media and Internet Technology, children have become vulnerable to cybercrimes such as cyberbullying, cyber stalking and childabuse. This presentation is an eyeopener and spreads awareness about the cyber threats prevalent on internet and gives tips on best practices for ensuring cyber safety and educates the children and the parent on how to deal with such problems .This presentation was delivered recently by Cyber law expert, Karnika Seth in Thiruvanthpuram at a National Consultation on Legislative and Executive measures required to safeguard children online.
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
10 Criminology in the Future
Criminology in the Future
Kristopher Freitag, Javielle Watson, Michael Westphal, Starcia Zeigler
CJA/314
April 7, 2014
Judy Mazzucca
Technology is advancing in every aspect of the criminal justice system, from the investigation to the prosecution of the crimes. Crime fighting methodologies have the potential to greatly assist law enforcement in the war on crime. Some experts even think that some software and tools will be able to help prevent crime. (Yeung, n.d.). Methodologies, such as mandating DNA collection programs, biometrics, and implementing cybercrime spyware programs are on the list of the next big things of the future, when it comes to fighting crime. DNA testing helps law enforcement investigate and prosecute crimes, as well as clear the names of those who have been wrongfully convicted. There are currently about twenty states with laws requiring DNA collection at the time of the person’s arrest. The federal government also has this requirement. As, with any controversial subject, DNA testing has its critics. Some are saying that DNA testing is in violation of the Fourth Amendment, especially for those who have not been convicted of a crime. Others are concerned that DNA testing may open the doors for abuse of the genetic information being stored in the databases. (Berson, n.d.). Biometrics are automated methods of recognizing a person based on physiological or behavioral characteristics. Some of the features measured using biometrics are handwriting, voice, iris, hand geometry, vein, retinal, and fingerprints. Biometric based solutions provide personal data privacy, and confidential financial transactions, and are starting to become the foundation of an extensive array of highly secure identification and personal verification solutions. The need for highly secure identification and personal verification technologies is great, due to the increased number of transaction fraud and security breaches. This need is especially great in the areas of local, state, and federal governments. Infrastructures such as electronic banking, health and social services, law enforcement, and retail sales are already taking advantage of, and seeing the benefits of biometric technology. ("The Biometrics Consortium", n.d.).
As we become more and more dependent on technology, the increase of cybercrimes are skyrocketing, which has forced law enforcement to figure out ways of combatting cybercrimes. We have become extremely vulnerable to many cybercrimes, including social media fraud, which consists of cyber criminals using social media to steal the identities of unsuspecting people; and luring people to download malicious materials, or reveal their passwords; corporate security breaches, which consists of cyber criminals exploiting company employees via scams; and phishing, which involves cyber criminals targeting company employees by sending emails that appear to be from someone within the company. ("Homeland .
it expresses youths must follow the etiquette of social media, even facebook and twitter can disturbs the studies that can be healed by online counselling
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
This is an article/blog on the Privacy Symposium Africa 2022 on Privacy Rights and Digital rights as Human Rights. It also talks about Online Gender Based Violence , this is gender based violence that manifests in the Digital Space and Online world ie; phishing, non-consensual sharing, harrassment. This article explains why Privacy rights are essential in the modern world.
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxshweeta209
transfer of the P.I.L filed by lawyer Ashwini Kumar Upadhyay in Delhi High Court to Supreme Court.
on the issue of UNIFORM MARRIAGE AGE of men and women.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxOmGod1
Victims of crime have a range of rights designed to ensure their protection, support, and participation in the justice system. These rights include the right to be treated with dignity and respect, the right to be informed about the progress of their case, and the right to be heard during legal proceedings. Victims are entitled to protection from intimidation and harm, access to support services such as counseling and medical care, and the right to restitution from the offender. Additionally, many jurisdictions provide victims with the right to participate in parole hearings and the right to privacy to protect their personal information from public disclosure. These rights aim to acknowledge the impact of crime on victims and to provide them with the necessary resources and involvement in the judicial process.
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
1. RESEARCH PROGRESS
REPORT
JANUARY TO JUNE,2023
RAHUL JAIN
L22SOLP0013
PHD STUDENT SCHOOL OF LAW,
BENNETT UNIVERSITY
EMAIL ID.-L22SOLP0013@BENNETT.EDU.IN
2. CHAIRPERSON- DR. SUVIR KAPUR
SUPERVISOR- DR. BHABANI SONOWAL
CO-SUPERVISOR- DR. DAKSHA SHARMA
EXPERT FROM DEPARTMENT- DR. RUCHIR
SINGH
EXPERT FROM OUTSIDE DEPARTMENT- DR.
ADITYAANSU
RAC COMPOSITION
3. DETAILS OF COURSEWORK
S.N0 SEMESTER COURSE
CODE
COURSE
TITLE
CREDITS GRADE
1. 1 LSOL603L Law and Public
Policy
4 B+
2. 1 ESEA701L Research
Methodology-1
3 B+
4. Presentation of my thesis topic in class conducted under the supervision
of Dr. Nidhi Sinha.
Prepared the Literature review of 15 research papers for the tentative
thesis topic under guidance of Dr. Nidhi Sinha.
Prepared statement of problems on my thesis topic - “Cyber Crime
against Children The impact of technological advancement” given by
Dr. Debabrata Baral.
Assignment Done During
the Course work
5. Presented the topic – “Postcolonial Legality: A Postscript from India” in the
class in the supervision of Dr. Suman Luhach.
Given Presentation in the class on Theme- “ASER Report, 2023” under the
guidance of Dr. Amit Jha.
Prepared an assignment on topic- “UGC Guidelines related to Plagiarism
and UGC care” given by Dr. Sanjay Kataria.
Cont….
6. The impact of technology advancement on cyber crimes against children is
significant. With the increasing use of technology, children are exposed to a
wide range of risks such as cyber stalking, cyber morphing, cyber spoofing,
cyber bullying, cyber defamation, child grooming, cyber threatening, child
pornography, Identity theft, online child trafficking, online extortion, sexual
harassment, violation of privacy. These crimes can have a severe impact on
children's mental health and well-being leading to anxiety, depression, and in
extreme cases, suicide.
Moreover, the anonymity provided by the internet makes it easier for
perpetrators to commit these crimes without fear of being caught. The use of
encryption techniques and anonymous communication channels further
complicates the detection and prosecution of cyber criminals.
INTRODUCTION
7. According to National Crime Record Bureau (NCRB) data, there was an
increase of more than 125% in cases of cyber crime against children reported in
2021 compared to 2020. These cases included online offences and cases
involving the publication or transmission of materials depicting children in
sexually explicit acts. In total,1102 and 1376 cases of cyber crime against
children were registered in 2020 and 2021, respectively.
It is essential to educate children about online safety and raise awareness about
the potential risks associated with technology. Parents, guardians, and educators
must work together to ensure that children have access to safe online
environments and are equipped with the necessary skills to protect themselves
from cyber crimes. Additionally, law enforcement agencies should be equipped
with the necessary tools and resources to investigate and prosecute cyber
criminals effectively.
Cont…
9. Cyber Grooming: Cyber grooming is a cyber-threat that is faced by children
across the globe and not just restricted to India. Essentially, this is a threat in
which an individual attempt to develop an emotional connection with a child,
through cyber means. The individuals practice this through various cyber means
like social media, online gaming websites etc. The individual pretends to be a
child and this leads to the children trusting them eventually. After some period of
time, when the trust between the child and the imposter gets built, the imposter
gets the ability to take advantage of the child and use the child accordingly.
Cyber crimes against
Children
10. Cyber Bullying: Cyber bullying is another major aspect of the cyber threats
faced today. Essentially, it is an act of harassing other children by the use of
obscene, abusive language. This can be achieved by sending children hurtful
content. However, it can result in severely hampering a child’s confidence. It is
imperative to understand, that if cyber bullying of a child is not identified at an
early stage, it can result in far reaching consequences. Some of the consequences
being negative impact on the mental, and emotional health of a child. This can
therefore, severely hamper their growth.
Cont…
11. Child Pornography Child Pornography is a criminal offence that constitutes the
internet-related sex crimes and visual presentation of minor in sexually explicit
activity. It is offence which involves the electronic devices such as i-pad, mobile
phones, i-phones, digital cameras, photo editing software and web camera for the
development of naked and semi-naked pictures of minors and dissemination
through social networking sites. With the advancement in technology, the vulgar
videos or images of minor can be developed and circulated with less expense and in
higher quality and it can be duplicated and distributed easily. Due online nature of
offence, the culprit has a false sense of ambiguity.
Online Transaction Fraud: Though most of the children do not have their own
bank accounts. However, they frequently use their parents’ account for doing online
transactions for gaming, shopping, etc. Criminals use several fraudulent tactics like
calling to offer you benefits with fake identity etc. to steal money from the accounts
Cont…
12. Online Gaming: Online gaming, universally has now become a part of a child’s
daily activity. Further, online gaming is not just restricted to playing games, it has
due to technological advancements and accessibility, become a way for people
across places to share their thoughts while playing. It has emerged as a kind of
social media in certain ways. However, there is a tendency to not be careful while
connecting to people through online gaming, which can cause damage. Further,
there is a risk of getting affected by spams, viruses while installing the same.
This can lead to cyber bullying through the use of coarse language, infringement
of children’s privacy since a lot of personal information is uploaded and it can be
misused, and this may also incur online transaction frauds.
Cont…
13. Online offences against children are covered by Several pieces of legislation
The principal statute in India dealing with cybercrimes against children and
adults is the Information Technology Act, 2000 under section 67-B 67, 67-A,
66E, 66C, 66D , 43A . The different rules that have been framed under it serve
to supplement it.
Protecting children from sexual offences (POCSO) Act, 2012 is a vital piece
of law that explicitly handles sexual offences perpetrated against minors.
Child pornography, cyber bullying, cyber defamation, cyber grooming, cyber
hacking, identity theft, online child trafficking, sexual harassment and
violation of privacy are all criminalized by POCSO under section
11,12,13,14,15.
Laws Related to online
offences against children
14. None of the provisions of IPC specifically deals with cybercrimes committed
against children. However, the IT Act runs parallel to some of the provisions
from IPC which penalizes certain forms of cybercrimes, including those in
relation to: financial frauds, online cheating, forgery, obscenity, cyber stalking,
sexual harassment, voyeurism, criminal intimidation.
In some situations, the applicable provisions of the IPC, POCSO, and the IT Act
overlap, and an accused may be charged with a number of offences. Anyone
found guilty under one, two, or all three acts is sentenced to the most severe
penalty.
Cont…
15. The researcher has reviewed the following literature related to the proposed
thesis topic till yet:
1. How to protect your children on the Internet : A roadmap for parents and
teachers by Gregory S. Smith This book is intended for parents of children
aged 8 to 17 who have access to the Internet, as well as for the
educators who work with these youngsters. It is possible that the Internet
and the technology that allows for online interaction and access to a wide
range of content will be harmful to youngsters. The risks are genuine, and
today's parents are faced with many perils that they are unaware of.
Simply said, the goal of this book is to raise awareness about the dangers
of the Internet by revealing some recent real-world catastrophes, as well
as to provide a practical strategy and road map to assist parents
safeguard their children from the dangers of the Internet.
Literature Review
16. 2. Information Technology: Law and Practice by Vakul Sharma Cyber laws
related to information technology, as mentioned in Vakul Sharma's book
"Information Technology: Law and Practice," are addressed in this text. His work
is easier to understand due to the abundance of real-world examples included in
his writing. He has done an extensive research on the question of jurisdiction in
the world of the internet and all the offences that are criminal under the
Information Technology Act. in order to explain these principles and decide on
jurisdiction on an international level, he has addressed numerous concepts
including the territorial principle, nationality, protective principle, passive
personality principle, effects principle, and universality principle. For the topic of
extradition for cyber offenders, he has emphasized on the problematic subject of
jurisdiction regarding cyber crimes. He has done a wonderful job by analyzing
the court decisions in order to ascertain the real purpose of the legislation behind
the passage of Act.
Cont…
17. To assess and comment on the duties and capabilities of the Controller of
Certifying Authorities, Adjudicating Officers, and Police officers under the
Information Technology Act, he has performed a thorough examination.
3. Protection of Children on Internet By Karnika Seth In the past two
decades, the development of information technology in India and other countries
has been remarkable. It has resulted in a shift in the way we communicate,
engage, do business, and seek and exchange information and expertise on the
internet. This book focuses on how the Internet affects children and why it is a
major issue for law enforcement, internet service providers, parents, educators,
and children themselves.
Cont…
18. 4. Cyber Crimes, Electronic Evidence and Investigation: Legal Issues by
Vivek Sood In his book, Vivek Sood proposes a number of methods for
combating cybercrime. He claims that since cybercrime is a technology-based
crime, the appropriate response is security technology. Some of the most widely
used security technologies are firewalls, anti-virus software, and anti-intrusion
systems. He came to the conclusion that the greatest cybercrime slogan is
"defend yourself." To confront cybercriminals and bring them to justice, he
believes that real collaboration between law enforcement authorities inside the
country and across countries is also required. In addition, he advocates for the
reinforcement of expatriation accords and their execution as necessitate in the
digital era.
Cont…
19. 5. Steven Hick and Edward Halpin in his Article “Children's Rights and the
Internet” (The Annals of the American Academy of Political and Social Science,
2001) explains the impact of the internet on children's rights around the world. It
examines both the negative and positive impacts of the internet on children's
rights, including the proliferation of child pornography and the use of the internet
by child advocates to promote and protect the rights of children.
6. Keith F Durkin and Ronald Lee DeLong in his Article “Internet crimes
against children” (Ohio Northern University & University of Dayton, 2012)
explains the sexual victimization of children online as the most prominent
manifestation of this phenomenon and discusses the two main forms of this
behavior, which involve using the internet to traffic and collect child
pornography and adults soliciting minors for sexual purposes online. In his
article they also discusses the subcultural network of pedophiles and other adults
with a sexual interest in minors that has been made possible by the internet.
Cont…
20. 7. Gagandeep Kaur in his article “Cybercrimes against Children in Digital
Age: Prevention & Precautions in India” (University of Petroleum & Energy
studies, 2021) tackles the issue of online crimes against children in India and the
reluctance of parents and children to report such crimes due to fear of
victimization and damage to family reputation. It also highlights the need for
awareness and safety measures among parents, schools, and students to combat
child online victimization.
8. Madhu Kumari in his Article “Cyber Crime and Children in Digital Era”
(Department of Journalism and Mass Communication, Banasthali Vidyapith,
Rajasthan, India, 2021) explain the legal intervention, effects on victims,
punishment, and preventative measures for a broad range of cybercrimes. In her
article she also suggests various measures to control cybercrime against
children, such as educating children about digital literacy, enhancing the digital
skills of teachers, and safeguarding children's privacy and personal information.
Cont…
21. The present legal mechanisms for aggressive Cyber Crimes linked to children
is not competent a sufficient amount to offer proficient treatments.
The Information Technology Act of 2000 appears to be inadequate and
ineffective for addressing the recent changes in the cyberspace, particularly
the increase in cybercrimes against children in India.
Due to the Legal, Technical, Jurisdictional and Operational issues and
challenges in regulating cybercrimes against children may cause difficult task
to the authorities to detect and prosecute Cyber Criminals.
Hypothesis
22. Whether the existing provisions for dealing with the problems of cybercrime
against children are adequate or if some changes are required?
Whether a separate laws or provision is needed to deal with special types of Cyber
Crimes notably, which is not mentioned in I.T Act?
What are the challenges faced by law enforcement agencies in investigation and
prosecuting cyber crimes against children?
How can technology be used to prevent and detect cyber crimes against children?
What are the risk factors that make children vulnerable to cyber crimes?
Research Questions
23. Understanding the evolution of Cyber Crime in India.
To research the rapidly expanding of Cyber Crime against children.
To observe the cyber laws which are related to children in India and to find
out the loopholes in the law if there is any,
To figure out the role of government for the handling and protection of Cyber
Crime against children and find out the steps which should be taken by the
government for checking Cyber Crime against children in India.
To learn about international efforts to reduce the threat of cybercrime against
children.
Objectives of the study
24. To evaluate the judiciary's contribution to the prevention of cybercrime against
children in India.
To strengthen and protection regarding Cyber Crime in IT law, POSCO Act, and
IPC deeply focused on relevance in each aspect of offences.
To know the gravity of Cyber Crimes adjacent to children under several laws in
India.
Cont….
25. This research study is based on an analytical study, and the traditional Doctrinal
Research Methodology was used. As a result, the explicative, exploratory,
exploratory, descriptive, and doctrinal research methods were utilized. The data for
research study came from secondary information resources. The data used in this
study came from a variety of sources, some of which are included in the Reference
section, including libraries, newspapers, papers, journals and internet sites.
a. The explicative Methodology was used to determine the nature and scope of the
research topic. This model was used to investigate the nature of Cyber Crime
against children.
b. The exploratory methodology is used to revise recently evolving thoughts,
theories, and principles.
c. The descriptive model help to recognize the status of interaction and the way that
how the laws shield the children victims of Cyber Crime.
Research Methodology
26. d. Doctrinal Research is used to get support during the analysis of legislation, case
laws, and judicial pronouncements in order to establish new principles.
e. Empirical research is used to determine how the law affects people.. For that
reason researcher used the data from NCRB (National Crime Record Bureau)
Cont….
27. 1. Introduction
2. Evolution and conceptual development of Cyber Crime– An overview
3. Legislative Framework of Cyber Crimes against children: An Assessment
4. Certain forms of Cyber Offences against children with case study
5. International legal regime relating to cyber crimes against children
6. Judicial Approach towards Cyber Crime against children
7. Conclusions and Suggestions
Proposed Chapterization
.
28. Continue with Literature Review of my thesis and prepare synopsis of the same.
Writing and Publication of my article on “COMPARITIVE ANALYSIS
BETWEEN MITAKSHARA AND DAYABHAGA ANCIENT SCHOOL OF
INDIAN JURISPRUDENCE” in UGC Care/Peer reviewed journal.
To Target Research Paper presentation on National and International Seminar.
To target and work on some good conferences for research purpose.
Tentative Research Plan
.