Importance of Cyber Crime Management

It is the main motive of state and central government to identity theft, the network intrusions and software piracy. It is a criminal activity, it begun when the hackers starts illegally accessing high level networks. The paper which gives the elaborated form of information regarding cybercrime and security measures including the prevention how to deal with cyber crime. Though they listed the hierarchy of global rankings people may not be aware of. It deals with financial crimes, cyber pornography, online gambling, intellectual property , forgery, email spoofing, virus worm attacks, web jacking, data diddling, scams, fraudulent etc. it finds that only ten of these nations have amended their laws.

However, only a small fraction of computer breaks are detected. This society is becoming more integrated with computers, which means more personal information in system network. It is more injected with centralized portal for registering complaints by CCTNS and I4C and DSCI, CDAC,CBI. It gives much convenience to the general public not to be distract in these type of problems happens in symmetric way.

Keywords: CCTNS and I4C and DSCI, CDAC,CBI, Email forensics, FRR, Data mining, digital forensics, word net query analysis.


  • GOOGLE.COM for all general/topics/regards/tax revenues.
  • wikipedia.pdf//for details of meanings;
  • for brief//headings ”1 or 2’/topics


Cyber crime is an unlawful act where the computer is used as a tool. But cyber crime is a fast- growing area of crime. As, the technology is advancing man is very dependent in the internet accessing gives him a big shot (experience) to easy access to do the shopping, gaming, online studying, social medias, searching online jobs. It is the incidence happening of cyber crime day- by-day.


Management in ancient India: The risk is minimum but the rate of return investment is very maximum, the unaware people always play with networking access and indulge in the activities of investing money in different situation of gambling, lottery and other etc., hence because the cyber crime is increasing all over the world.


  • Phishing
  • Salami attacks
  • Piracy of software
  • Disturbing adds
  • Unauthorized access
  • Pornography
  • Cyber stalking
  • Virus attacks


CCTNS and I4C and DSCI, CDAC,CBI, Email forensics, FRR CCTNS criminal and crime tracking network and systems IPC- Indian penal code I4C Indian cyber crime coordination centre DSCI- data security council of India CDAC- centre for development of advanced computing CBI- central bureau of investigation FRR- false rationing ratio CYBER LAWS IN INDIA: Cyber crimes, in India are registered under CUBE major components The IT Act (income tax) Tampering with computer source documents- sec.65 Publishing obscene information-sec.67 Breach of confidentiality and privacy-sec.72 Publishing false digital signature certificates- sec.73 The IPC Act (Indian penal code) Sending threatening messages by email-sec The SLL (State level legislation)


Some of the research works that came a Anthony d. Miyazakiand Ana Fernandez prepared a report on “Consumer perceptions of privacy and security risks for online shopping issued in “Journal of Consumer Affairs volume 35, issue 1, pages 27 44, summer 2001 Kathleen Seiders, Constantine Simonides, Douglas J Tigert prepared a report on “The impact of supercenters on traditional food retailers in four markets in International Journal of Retail & Distribution EunjuKo and Doris H Kincade prepared a report on” The impact of Quick Response Technologies on Retail Store Attributes published in “International Journal of Retail & Distribution Management Soyeon Shim, Mary Ann Eastlick and Sherry Lotz prepared a report on “Assessing the impact of internet.


This study is based on the previous studies discussed, an attempt has been made to conduct an empirical investigation into the nature and extent of the cybercrime victimization and its impact on the women victims. This chapter details the research design and methods adopted in the present study. RESEARCH DESIGN A descriptive research design is one that is concerned with describing the characteristics of a particular individual or a group.


Some of the variables of the present study are discussed below INDEPENDENT variables: Age, marital status, educational qualification, occupation, annual income, religion, community, type of family, place of stay, online Behaviour. DEPENDENT variables: Nature Of cyber crime Victimization, extent of victimization, causes for the victimization, victim offender relationship, mode of communication, Reporting Behaviour, Attitude Towards The Police, impact of victimization. Impact of cyber crime victimization: Is construed as an outcome resulting from the cyber crime victimization. The cyber crime victimization of womens results in: Financial Impact: It refers to various monetary losses incurred due to cybercrime victimization such as legal expenses, counseling and loss of pay for the respondents. Social Impact It refers to problem faced by the respondents in the family from spouse, in-laws, parents, relatives and friends due to the cyber crime victimization. career impact it refers to employment related issues such as change of office, taking up frequent leaves and loss of ability to work. academic impact it refers to issues faced by the respondents in their studies due to cyber crime victimization like discontinuation and loss of concentration. internet impact it refers to changes inn the internet usage by the respondents brought out by the cyber crime victimization. psychological impact it refers to change of mental state of the victims resulting in loss of sleep, lack of concentration and negative attitude towards day-to-day life.

OPERATIONAL DEFINITIONS OF VARIABLES CHOSEN, EXTENT OF VITTIMIZATION, Nature Of Victimization, Online Behaviour, Reporting Behaviour, Attitude Towards The Police, IMPACT OF CYBERCRIME VICTIMIZATION,(Financial Impact, Social Impact, career impact, academic impact, internet impact psychological impact) LOCALE AND UNIVERSE OF STUDY, RESEARCH TOOLS(questionnaire, part 1,2,3,4) pilot study, reliability and validity, method of data collection LIMITATIONS OF STUDY Locale and Universe of the study The universe of the study includes women victims of cyber crime who had reported their victimization to the public police. The study is confined to the city of Vellore. The respondents for the present study were the women victim who had reported their victimization in cybercrime cell, Vellore. For the present study, secondary data of women victims who had reported their victimization to the police during the period 2014 to 2017 had been collected from cybercrime cell, Vellore.

During this period, a total of 457 cases had been reported by the women victims. The researcher has intended to collect the primary data from all the victims. During the primary data collection, the researcher was unable to meet the 23 victims despite many attempts to administer the questionnaires as their houses were closed. Initially agreed to respond but, were later reluctant and unwilling to complete the questionnaires and 108 victims were not willing to participate in the study and to share their personal experience or recall their past experience and victims of recall. A total of 215 victims were found to have shifted their place of stay elsewhere.


In order to collect the primary data from the respondents chosen for the present study, two research tools have been used viz. a semi-structured questionnaire constructed by the researcher and a GHQ a standardized tool developed by David Goldberg(1979). Questionnaire: The questionnaire method was used to collect the data from the respondents as most of the victims were educated. The researcher felt that questionnaire method, compared to interview schedule, is better for the present study.


Though not all people are victims to cyber crimes, they are still at risk. Crimes by computer vary, and they don’t always occur behind the computer, but they executed by computer. The hackers identity is ranged between 12 years young to 67 years old. The hacker could live three continents away from its victim, and they wouldn’t even know they were being hacked. Crimes done behind the computers are the 21 st century’s problem. With the technology increasing, criminals don’t have to rob banks, nor do they have to be outside in order to commit any crime. They have everything they need on their lap. Their weapons aren’t guns anymore; they attack with mouse cursors and passwords. Scope for further research/pilot study: According to strydom , “piloting involves the process of ‘trying out’ the proposed instrument. Pilot study allows the researcher to test questions, focus on unclear areas in the study and to gain insight into the phenomenon under investigation. It assist in the development of effective communication patterns between the researcher and respondents.


  1. Online journals www.wikipedia.journals/
  2. for authorized journals/
  3. com//http://international journals/org/in
Did you like this example?