Bhartiya Bhasha, Siksha, Sahitya evam Shodh

  ISSN 2321 - 9726 (Online)   New DOI : 10.32804/BBSSES

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 57    Submit Your Rating     Cite This   Download        Certificate

VARIOUS ASPECTS OF CYBER CRIME AND INDIAN CYBER LAW

    1 Author(s):  KRISHAN

Vol -  5, Issue- 11 ,         Page(s) : 16 - 26  (2014 ) DOI : https://doi.org/10.32804/BBSSES

Abstract

Crime, in whatever forms it is, directly or indirectly, always affects the society. In today’s world, there is immense increase in the use of Internet in every field of the society and due to this increase in usage of Internet, a number of new crimes have evolved. Such crimes where use of computers coupled with the use of Internet is involved are broadly termed as Cyber Crimes.

1. Bandura, A. (2001). Social cognitive theory of mass communication. Media Psychology, 3,265-299. 
2. Baron, L. S. (1988). Legitimate violence, violent attitudes, and rape: A test of cultural spillover theory. Annals of the New York Academy of Sciences, 528(1), 79-110. DOI: 10.1111/j.1749-6632.1988.tb50853.x. 
3. Furnell, S. (2002).Cyber crime: Vandalizing the information society. London: Addison Wesley.
4. Gordon, M. P., Loef, M. P., Lucyshyn, W., & Richardson, R. (2004). CSI/FBI computer crime and security survey. Los Angeles: Computer Security Institute.
5. Grabosky, P., & Smith, R. (2001). Telecommunication fraud in the digital age: The convergence of technologies. In D. Wall (Ed.) Crime and the Internet (pp. 23-45). London: Routledge.Jaishankar, K. (2008). Space transition theory of cyber crimes. In F. Schmalleger & M. 
6. Pittaro (Eds.), Crimes of the Internet (pp. 283−301). Upper Saddle River, NJ: Prentice Hall.
7. RUSSEL
G. SMITH
ET
AL, CYBER
CRIMINALS
ON
TRIAL
5 (2004) 
D. PARKER, FIGHTING
COMPUTER
CRIME
242
(1988)
8. Computer
 Misuse
 Act
 (1990),
 ch.
 18,
 the
 full
 text
 of
 it
 is
 available
 at:
http://www.opsi.gov.uk/acts/acts1990/Ukpga_19900018_en_1.htm
(last
accessed
14
June
2010).Robert
Ditzion
et
al.,
Computer
Crimes,
40
AMERICAN
CRIMINAL
LAW
REVIEW
(AM. CRIM. L. REV.)285
(2003),
286.
9. Julie A.Tower, Hacking
 Vermont's
 Computer
 Crimes
 Statute,
 25
VERMONT
 LAW
REVIEW 945
 (2001),
 950
 (citing
National
 Institute
 of
 Justice,
 U.S.
Department
 of
 Justice,
 Computer
 Crime:
 Criminal
 Justice
 Resource
 Manual
 2
(1989)). 
10. Brian
C.
Lewis,
Prevention
of
Computer
Crime
Amidst
International
Anarchy,
AMERICAN
CRIMINAL
LAW
REVIEW (AM.CRIM. L. REV.) 1353
 (2004(,
1355)
11. Elizabeth
A.
Glynn,Computer
Abuse:
The
Emerging
Crime
and
the
Need
for
Legislation,12
FORDHAM
URBAN
LAW
JOURNAL
(FORDHAM
URB. L.J.)
73
(1984),
74‐5.
 
12. BERNADETTE
H. SCHNELL
& CLEMENS
MARTIN, CYBERCRIME
– A REFERENCE
HANDBOOK
XII
(2004)

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details