Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Internet Crime Complaint Center, in 2009 released its latest Kant informed the bank that an amount of Rs.50, 000 has been
annual report on victims' complaints received and referred to debited from his account without his knowledge [9].
law enforcement. From January 1, 2008 December 31, 2008, Analysis:
the IC3 (Internet Crime Complaint Center's) website received
275,284 complaint submissions. This is a (33.1%) increase
when compared to 2007 when 206,884 complaints were
received. These filings were composed of complaints primarily
related to fraudulent and non-fraudulent issues on the Internet
[7].
Fig2.
Fig1. Percentage of Complaints Setup. The menace of cyber crime is not the sole responsibility of
State and its instrumentalities. The citizens as well as the
Non-delivered merchandise and/or payment were, by far,
netizens are equally under a solemn obligation to fight against
the most reported offense, comprising 32.9% of referred
the cyber crime. In fact, they are the most important and
complaints.
effective cyber crime eradication and elimination mechanism.
The only requirement is to encourage them to come forward for
Internet auction fraud accounted for 25.5% of referred
the support of fighting against cyber crime. The government
complaints.
can give suitable incentives to them in the form of monetary
Credit/debit card fraud made up 9.0% of referred awards. It must, however, be noted that their anonymity and
complaints. security must be ensured before seeking their help. The courts
are also empowered to maintain their anonymity if they provide
In order to combat the increasing cases of cyber crime, this any information and evidence to fight against cyber related
year officers are being trained for six weeks in computer crime. The ultimate solution to any problem is not to perform a
hardware and software, computer networks, communication surplus of statutes but their rigorous and dedicated
networks, network protocols, wireless networks and network enforcement. The courts may apply the existing laws in a
security at Guru Gobind Singh Indraprastha University progressive, updating and purposive manner. It must be
(GGSIPU). appreciated that it is not the enactment of a law but the
Following are some general security tips for users as displayed desire, will and efforts to accept and enforce it in its true letter
in the Mumbai Police cyber crime Website. and spirit, which can grant the most strongest, secure and safest
1. Take a test before opening e-mail attachment, install and use protection for any purpose. The enforcement of these rights
an anti-Virus programme. requires a qualitative effort and not a quantitative effort.
2. Use strong password. Thus, till a law dealing expressly with cyber crime is enacted,
3. Protect your Website [8] we must not feel shy and hesitant to use the existing provisions.
6. Case study of Jammu:
Manager of Axis bank on 1st Nov. 2008 lodged a complaint at
Bahu fort Police station, Jammu that one Mr. Deepak Nargotra, FUTURE SCOPE
an account holder of the same bank had befooled some The most effective way of controlling cyber crimes, is to make
customers of the same bank through internet by sending fraud people aware of different crimes by different modes of mass
e-mails on behalf of axis bank to provide customers with their media, as still it plays 43% part on awareness among masses
banking details as the same were needed to be updated by because 60% people afraid negative publicity in reporting the
clicking on a fraudulent self made link. The customers cases.
assuming it to be from the axis bank send their username and And further there is a need of making the application of the
password. It was later, when one of the customers namely TC laws more stringent to check such crimes.
REFERENCES
[1]. Cooper, W. (2007), Information
technology and internet culture, available at:
www.brandeis.edu/pubs/ jove/HTML/V6/iculture.html
(accessed 4 January 2007).
[2]. National ICT Security and Emergency Response Center
(NISER), Is Cyber crime reigning on a no mans land?
available at: www.niser.org.my/
Resources.html (accessed 25 January 2007).
[3]. K.P. Chow, Digital Evidence Search Kit, SADFE05 0-
7695-2478-8/05 2005 IEEE. [4].
Walden, I., Crime and Security in Cyberspace, Cambridge
Review of International Affairs, Vol. 18, Number 1 2005, pp.
51-68.
[5] Patki, A.B. et.al, Cyber crime information system for
cybernetics awareness, ISBN: 0-7695-1922-9, IEEE, 2003.
[6] Arthur, K.K. et.al, Considerations Towards a Cyber Crime
Profiling System, ISBN: 978-0-7695-3102-1,IEEE, 2008.
[7] Lee, H.C. et.al, Cyber crime and challenges for crime
investigation in the information era, ISBN: 978-1-4244-2414-
6, IEEE, 2008.
[8] Kabeer, S. et.al, The Relationship between Cyber Crime
and Mental Illness, ISBN: 978-1-42443547-0, IEEE, 2008.
[9] Kwan, L. et.al, Towards a Methodology for Profiling
Cyber Criminals, ISSN: 1530-1605
ISBN: 978-0-7695-3075-8, IEEE, 2009.