0% found this document useful (0 votes)
127 views

Effect of Cybercrime On Teenagers For Technology

This is my first research paper on cybercrime aspects on children. I hope helpful for all the forensic, law, and cyber forensic students.

Uploaded by

Manisha Varsani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
127 views

Effect of Cybercrime On Teenagers For Technology

This is my first research paper on cybercrime aspects on children. I hope helpful for all the forensic, law, and cyber forensic students.

Uploaded by

Manisha Varsani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Introduction

Internet is a virtual networking medium that can be connected and used on a variety of devices
these days. It enables the users to send, receive, collect, store, update, delete and many others operations
of the data access. Internet usage is expanding its boundaries every day. A few of major uses of e
commerce, e learning, knowledge sharing, social connectivity, media, file transfer, communicate and
collaborate with others.

Therefore cyber-crimes increasing day by day all over world. Cyber-crimes is not only hacking and
cracking, but now also include extortion, child pornography, money laundering, swindle, software
pirating, and corporate espionage are so on cyber-crimes.
India is at 2nd place regarding the 50 lakhs Facebook users are age between13 to17 years old. The 30
million twitter users. What`s app users are around one million. It`s expected that in next one year, mobile
internet users will be three hundred twenty million and total internet users shall be over the five hundred
million. We have large network of users but we just have only 23 cyber-crime cell in india. So it`s very
thought-provoking the control on online crimes and operative safety instructions and guidelines making
inflexibly executed by children.
Internet safety messages need to be timely, age specific, culturally sensitive and match the values and
laws of the society in which the child or young person lives.

 Online risks and threats for children in India


Digital technologies offer significant developmental and educational benefits for children. However, the
growing access and use of ICT by children also increases their exposure to potential risks of online abuse
and exploitation. Cyber offences against children are spreading and diversifying as new methods are used
to harass manipulation and exploit children.
Types of online crime against teenagers are follows as:
Identity theft
Online grooming/child sexual exploitation
Social media
Sexting
Smartphone/tablet
Online extortion.
Online gaming like Pubg, Blue whale
Online bullying
 Identity theft - Identity theft is a form of fraud that occurs when a dishonest person gets hold
of your personal information and uses it to their advantage to steal directly from you, or commit a
crime in your name. Identity thieves are increasingly using personal information displayed on
social media sites to access the information that they need.
 Online grooming/child sexual exploitation - Grooming is when someone builds an
emotional connection with children to gain their trust for the purposes of sexual abuse, sexual
exploitation or trafficking. Children and young people can be groomed online or face to face, by a
stranger or by someone, they know. Groomers will use a variety of ways to get what they want.
The precise number of child victims of online sexual exploitation in India or across the world is unknown.
According to the International Association of Internet Hotlines, the number of webpages containing child
sexual abuse material (CSAM) increased by 147% from 2012 to 2014, with children 10 years old or
younger portrayed in 80% of these materials. Cyberspace provides fertile ground for children to be
groomed, enticed and solicited into sexual activity for financial gains. In what is commonly termed as
commercial sexual exploitation of children, someone other than the child usually benefits from a
commercial transaction in which he/she is made available for sexual purposes. Images and videos of
children and young people are also used for prolonged sexual exploitation through blackmail or sex
extortion.

 Grooming - Online Dating - It is also worth mentioning that adults can be groomed as well,
especially through online dating sites. Moreover, many users of these sites can also be victims of
romance swindles.
 Other forms of online grooming - Extremist groups and/or individuals are using social media
to radicalize individuals, especially young people. They tend to target groups of people who can
be easily led because of their state of mind, their upbringing or their experiences. Sometimes
individuals may actively search for online radical content, in doing so extremist individuals can
manipulate to their own advantage and use this interest to initiate contact.
Halder and Jaishankar (2014) note that “Grooming and trapping children can be done by many ways;
including simple chatting in that that “If the victim accepts the groomer as „friend‟, it becomes easier for
the groomer to acquire information about the maturity status of the victim. This is mainly acquired from
the status messages that are shared by the victim, unclaimed pictures with messages embossed on them,
which may be shared from other friends‟ collections, and so on. In case the child has an open profile, it
becomes even easier for the perpetrator to trap him/her.”

 Criminal Gang / Drug Dealing Involvement - There are cases around the country as well as
all over the world where children have being groomed to join criminal gangs for drug dealing.
The use of children by criminal gangs has seen as beneficial and profitable primarily for the
reason that gang members can exert their control. Groomers also use material gifts or promise of
money in a bid to entice them. Many companies sell drugs online in contravention of Indian laws,
which do not permit sale or purchase of drugs on an e-commerce site. They may also explore
Darknet markets using Tor, the popular system for anonymous web browsing.

 Smartphone and tablet


Unlike a desktop computer where you are restricted to being in one place, smartphones and tablets allow
you to carry out your online tasks anywhere you want. The increased uses of smartphones and tablets has
aided our convenience but at the same time have generated a risk. In doing so, it has attracted interest of
criminals who want to hack your devices for your personal and sensitive data. This is predominantly used
for fraud purposes. It is therefore imperative to take precautions to reduce the likelihood of this occurring.
The near complete integration of cameras into mobile phones has led to a “selfie” culture that puts youth
in an unprecedented position: they now have the power to produce their own potentially problematic
content featuring images of themselves.
Selfie is a genuine mental condition and people who feel compelled to continually post pictures of them
on social media. This is one types of addiction and narcissism. The term was first coined in 2014
American Psychiatric Association was considering it as a disorder. The kind of selfie disorder is divided
to three parts as borderline selfie, acute selfie, and chronic selfie.
The “selfie” phenomenon Self-portrait photographs or “selfies” to be posted on social media using mobile
phones and, if resources permit the selfie stick, have become popular. There can be solo selfies, selfies
with a partner and selfies in a group. The increase in the number of cases of fatal accidents during selfie
sessions are also a matter of concern. According to a report in the Washington Post, India suffered more
selfie related deaths in 2015 than anywhere else in the world. Approximately half of the world‟s 27 deaths
linked to the pictures people took of themselves happened in India. Indeed, Mumbai police identified 15
sites around the city as “no selfie zones” after two people drowned in the Arabian Sea in January 2016,
and announced plans to install warning signs and deploy lifeguards.

 Social media - One of the most popular activities on the internet is joining social networking
sites. These sites provide opportunity to conduct many types of activities including
communication and sharing. Below are some tips for safe social networking that will help to keep
you safe across all social media outlets including Facebook, Twitter, what`s up, Snapchat and
Instagram and many more.
Sexting - “Sexting” is a term used to describe the sharing of intimate images or video with another
person. They can be sent using any device that allows you to share media and messages. The reasons as to
why people sext differs, it can be deliberate where the person sending the content means it to happen. It
can also range from peer pressure or boosting self-esteem.
 Risks of sexting
That photos or videos end up being shared between adults they don't know.
Blackmail - An offender may threaten to share the pictures unless they receive money or more images,
Images posted online can attract the attention of sex offenders.
Emotional distress - It can lead to feeling embarrassed or humiliated. This can result in self-harming or
in some cases suicide.
Bullying - If images are shared with their peers or in school, the child may be bullied.

 Online gaming addiction - In a recent case from India, two gaming-addicted brothers required
a month of rehabilitation in the ward of the Ram Manohar Lohia Hospital in New Delhi. Several
reports and articles in the media, which have been suggesting an increasing in cases of an Internet
and a gaming addiction, highlighted this case as an example of the perils of teenagers spending
excessive amounts of time on online gaming.
Playing games online and using consoles or games on a computer can be great fun, but you need to be
careful about how much you play and whom you play with. It is important that if you chat with other
gamers you protect your privacy and don‟t share personal information. If you are unsure whether a game
is suitable, ask your parents or a trusted adult to check its classification and reviews for you.

 Online bullying - What is bullying? Bullying is the act of intentionally causing harm to another
person through verbal harassment, physical assault or other more subtle methods of coercion such
as manipulation. In everyday language, bullying often describes a form of harassment perpetrated
by an abuser who possesses more physical and/or social power and dominance than the victim
does. The victim of bullying is sometimes referred to as a target. The harassment can be verbal,
physical and/or emotional.
Through services such as e-mail, forums, chat rooms, blogs, Instant Messaging programmes, SMS and
MMS, and video cameras, it is possible to keep in touch with old friends or make new ones in real time
and in all parts of the world and to exchange ideas, play games, carry out research, etc. Although most of
these services and the ways they are used are positive, in some cases, these same tools can be used to
offend, deride, defame and annoy Internet users; and furthermore, violent or offensive off-line behaviour
becomes magnified when filmed with mobile phones and exchanged or posted on the Net.
Bullying among children is generally indicative of an imbalance of power or strength demonstrated
through intentional or unintentional aggression repeated over time. It is known to involve hitting or
punching (physical bullying); teasing or name-calling (verbal bullying); intimidation through gestures or
social exclusion (nonverbal bullying or emotional bullying); and sending insulting messages by e-mail
(cyber bullying).

 Cyber bullying: Acts of harassment, embarrassment, taunting, insulting or threatening behaviour


towards a victim by using Internet, e-mail or other electronic communication devices. In such
crimes Sections 66A, 66C and 66E along with Section 506, 509 IPC can be invoked depending
upon the nature and facts of the case. Cyber bullying may involve “abuse and/or harassment by
teasing or insulting, victims‟ body shape, intellect, family background, dress sense, mother
tongue, place of origin, attitude, race, caste, class, name calling, threating for viral
document/images/videos, using modern telecommunication networks such as mobile phones
(SMS/MMS) and Internet (chat rooms, emails, notice boards and groups)”. It can happen anytime
or anywhere, so it can feel like there is no escape. The 24/7 nature of online activity means you
can be in contact at any time.

The 2014 report of the Parliamentary Committee on Information Technology recognized that the
online bullying of teenagers by their peers was probably far more common than other offences. Online
and offline bullies display their power against another person by repeatedly manipulating the knowledge
of the targeted child‟s context and sensitivities. While such hurtful online behaviour is unlikely to be
considered as an offence under Indian law, the severity, frequency of such messages can cause significant
distress to the targeted child. The incidence of such exposure is bound to increase as mobile technology,
images and videos become easier to access.
As per the Teens, Tweens and Technology Survey commissioned by Intel Securities in India in
2015, 52% of teenagers indicated that they had themselves bullied people over social media. The main
reasons for their behaviour cited by cyber bullies were that other children were mean to them or they just
did not like the other child. Online threats of stalking, violence, rape and death can be emotionally
draining. Moreover, the effect of intimidation is further enhanced when the threatening message is shared
with others and is followed by cyber stalking. A child‟s private information or weaknesses exploits the
developmental need of children to feel accepted and appreciated by their peers and feeds on their
psychological insecurities. Being ridiculed, expelled from the peer group or discriminated against can
have deeply harmful effects on a child. Of course, this is not unique to online social exclusion,
particularly in the context of widespread caste-based discrimination.
Therefore, you are aware of the different forms it can take and what can be done to avoid becoming a
victim:
1. Avoid circulate your personal data thoughtlessly, as this could make you easily identifiable and more
prone to acts of bullying and intimidation by others your own age.
2. Once information is posted online it is out of your control and available to anyone and open to any sort
of use. You need to be completely clear on this concept, what may seem like an innocent joke could wind
up having very irritating and hurtful consequences for others,
3. It is important to refrain from reacting to provocations received via SMS , MMS, instant messages, in
offensive or defamatory e-mails, in chat rooms or during online encounters with other users. Instead you
need to employ certain strategies that can exclude or limit the actions of those attempting to provoke you
such as: many games allow for the exclusion of undesirable, when chat rooms are monitored, it is
possible to save the offending text from the chat and report it to the monitor, abuses can be reported to
service providers or, in the case of abuse via mobile phones, the report can be sent to the mobile phone
company, in the more serious cases, such as cases involving physical threats, it is advisable that the police
also be informed, it is possible to trace the e-mail account from which the offensive message was sent, but
practically impossible to prove who actually used it to send the message. The online bully could also hack
into someone else‟s account and use it for his/her offensive Behaviour and therefore letting the blame fall
on the unfortunate person whose e-mail account was wrongfully used, most e-mail programmes offer
filters to block unwanted incoming e-mails.
4. Many instant messaging programmes offer the possibility of creating a list of names that users can
choose to block. In this way, you can prevent unwanted people from making contact with you. An Instant
Messaging (IM) system lets you know when one of your known and approved contacts is online and, at
that point, you can begin a chat session with the person you feel like talking with; there are quite a
number of different IM systems, and Yahoo Messenger!

Tell your parents, a teacher or someone within the school staff you feel you can trust. Even telling
your friends could be helpful.
You can also report to the service provider or mobile operator, even to the police if it`s serious.
Remember to save the evidence of the bullying, as this will be important when you tell someone. Bullying
is not acceptable either in an online or in an offline environment. In a many countries, there are national
or local organizations that you can turn to for help. In some countries, such as Canada, „cyber-bullying‟ is
considered an actual criminal act.

Defining and Differentiating ‘Online Risks’ - classified in four ways: 4 C`s


 Content risk: Teenagers receiving mass-distributed content. This may expose them to age-
inappropriate material such as pornography, extreme violence, or content involving hate speech
and radicalization.
 Conduct risk: Teenagers participating in an interactive situation. This includes bullying, sexting,
harassing, being aggressive or stalking; or promoting harmful behaviour such as self-harm,
suicide, pro-anorexia, bulimia, illegal drug use or imitating dangerous behaviour.
 Contact risk: Teenagers being victims of interactive situations. This includes being bullied, harassed or
stalked; meeting strangers; threats to privacy, identity and reputation (for example, through embarrassing
photos shared without permission, a house location being identified, someone impersonating a user, users
sharing information with strangers); and violence, threats and abuse directly aimed at individual users
and/or groups of users.
 Control risk: The internet data access for easy to everyone so the control of risk management is in a risk
identification, risk estimation, risk avoidance, risk limitation, evaluation and so on. The concept of in
information technology in the assessment is part of the risk communication, review monitoring and review
for internet data.

What would we do?


 Do not divulge personal information or post it on social media sites in response to emails, calls
and texts
 Ensure what you post online does not contain any information that may be used against you in
committing fraud
 Take precautions when performing online transactions, be sure the site is secure and the company
is known to be reputable
 Carefully check your monthly statements for any unauthorized or missing transactions
 File sensitive documents securely, don‟t just throw them in the bin, shred them before disposing
safely
 Consider using a credit reference agency, such as Experian, and check it regularly for unusual or
unexpected changes
 Ensure websites are secure prior to submitting your credit card number.
 Do your homework to ensure the business or website is legitimate.
 Attempt to obtain a physical address, rather than a P.O. Box or mail drop.
 Be aware of missed bills, which could indicate your account has been taken over.
 Be cautious of swindles requiring you to provide your personal information.
 Never give your credit card number over the phone unless you make the call.
 Monitor your credit statements monthly for any fraudulent activity.
 Report unauthorized transactions to your bank or Credit Card Company as soon as possible.
 Review a copy of your credit report at least once a year.
Passwords:
 Do not share your PIN or Passwords
 Choose a very strong password with 8 characters or more
 Do not reuse your passwords across multiple sites
 Do not use passwords which could be easily guessed or obtained through social media
 Use two-factor authentication whenever possible. This requires you to enter a PIN, usually
sent to your mobile phone when you log in to assist in proving your identity

 Child pornography/ online sexual exploitation:


 All organizations should have clear and strong HR policies on how to deal with content on child
pornography (CP)/ child sexual abuse material (CSAM) or sexually explicit material
Organizations should have clear rules for use of electronic devices provided by the organization.
If any employee is found possessing obscene or indecent content, proper investigation and action
should be taken against them.
 The organization should report any incidence of sharing and storage of obscene content with in
the organization to the police. The copy of the content should be saved as evidence with restricted
access.
 All other copies of the content should be deleted They can also report through cyber-crime
reporting portal (www.cybercrime.gov.in)
Take your time - Sometimes when you are excited about someone, your instincts and judgment may
become confused. Always remember to take care and think about the situation at hand.
Report it - You can report an adult or stranger if they've sent you a sexual message/image, asked you to
send them a sexual message/image, sent anything that makes you feel uncomfortable or asked you to meet
up with them.
Online predators are hard to identify at first; they may seem like a normal person just like anyone else.
However, behind a screen their intentions are unknown. They will use fake accounts with fake profile
pictures and fake information that makes it difficult to tell who you are talking to and what age they are.
 Keep Control
 Keep control over the information you post
 Limit the information about yourself. Don‟t post personal information like your full name,
address, phone number, or any kind of financial or personal information
 Criminals could obtain this information to help them commit fraud against you
 Be cautious about information that can be used to identify you or locate you offline
 Do you really need location settings turned on? Sharing your location means that people can find
out where you frequent or where you are
 Privacy
 Use privacy controls to restrict access to your page
 Check your privacy settings and ensure that they are right for you. If your privacy settings are set
to public, anyone can usually view your posts whether you are friends or not. This might also
include things like where you are, and who you are with Try and keep your privacy settings high
to ensure you are only sharing with people you know.
 Don’t talk to strangers
 Don‟t accept friend requests from people that you do not know
 Don`t joining any group they do not about anything and what`s activity going on this type of
groups. Sometimes it‟s can happen any terrorist activity or any other fraud people working on
their.
 Never engage a stranger in conversation online
 Avoid using websites that let you chat to people anonymously, you never know who you are
really talking to.

Since 2011, social media platforms have been using Photo DNA technology developed by Microsoft to
scan every uploaded photo to control the distribution of CSAM. Child pornography images are deleted
immediately and the account is blocked and examined by a team of experts. The images classified as
illegal are added to a global photo DNA database. If there is reason to believe that a child is in immediate
danger, the case is referred to a local law enforcement agency or reported. Globally, Internet companies
have been working with law enforcement for many years to stop illegal material being shared on the web.
Generally, child sexual abuse images are removed and reported to the designated authorities. In order to
coordinate these efforts, close collaborations have been built between Internet companies and NCMEC,
the Child Exploitation and Online Protection Centre (CEOP) (United Kingdom), IWF, INTERPOL, the
FBI and many local, federal and international law enforcement organizations and departments.
New challenges have now emerged with the rapid rise and adoption of over-the-top messaging platforms
such as WhatsApp, Snapchat, WeChat and Viber, Telegram. Such platforms have created a whole new
ecosystem of use and potential abuse of children, given their person-to-person nature and removal of
messages from servers once delivered. Mobile Internet access via pre-paid options, while convenient for
consumers, create significant challenges for law enforcement as well as for service providers in tracking
illegal behaviour and identifying offenders.
What would we do?
 Tell someone you trust, like a parent, teacher, family member, friend
 Save or print all messages from a bully for the purpose of documenting behavior and future
evidence
 Report - Most social networks will allow you to report offensive material. After taking a
screenshot, you should report it to the service provider
 Block - The easiest way to stop someone bothering you online is to block their account from
contacting you
 Do not retaliate or respond to abusive messages.

 Social engineering – Is an approach to information through misinterpretation. It is the


conscious manipulation of people to obtain information realizing that a security breach is
occurring.
Dos
 Alert your network administration for any suspicious or unusual activity in your organization
 If you believe your financial accounts may be compromised, contact your financial institution
immediately and close any accounts that may have been compromised. Watch for any
unexplainable charges to your account.
 Immediately change any passwords you might have revealed.
 Watch for other signs of identity theft.
Do Not‟s
 Do not provide personal information or information about your organization, including its
structure or networks, unless you are certain of a person`s authority to have the information.
 Do not reveal personal or financial information in email, and do not respond to email solicitations
for this information. this includes following links send in email.

 Cybercrime cells and cyber forensic capacities in India


There are currently 23 police cybercrime cells in India. 93 Some states have one cyber cell
while many larger states have more than one. The Code of Criminal Procedure for conventional crimes
and a set of investigation manuals with procedures for search, seizure analysis and presentation of digital
evidence in court guide these cyber cells. The standard operating procedures (SOPs) for cybercrime
investigations and a Cybercrime Investigation Manual developed by the Data Security Council of India
(DSCI) has been in use since 2011 and has harmonized the investigation processes. Cyber forensic
laboratories are attached to some of the cyber cells for undertaking computer, network and mobile
forensics and for training on cybercrime and cyber forensic evidence.
National crime record bureau (NCRB) has been designated as central nodal agency under cyber-crime
prevention against women and children (CCPWC) scheme. The NCRB has been mandated to manage
technical and operational functions of the online cybercrime reporting portal and associated work if
cybercrime prevention against women and children scheme under the administrative control of the cyber
and information security (CIS) division of ministry of home affairs.(New Delhi – India)
In cyber law in India under IT act are under section 66 is hacking with computer system, section 66B is
receiving stolen computer or communication device, section 66C is using password of another person,
section 67A is publishing images containing sexual acts, section 67B is publishing child porn or predating
children online and so on. The indian law prevent and control for cyber-crimes against the harsh action
for teenagers protection and safety.

In Gujarat state - http://cskgujarat.gov.in/ Cyber Suraksha Kavach aims to secure the state and citizens
of Gujarat against cyber adversaries by building much needed cyber resilience for citizens, businesses and
other organizations in the state of Gujarat. Cyber Suraksha Kavach develops and promotes a culture of
cyber security and safer Internet usage practices to make people, especially children and other gullible
users, aware of fundamental DOs and DON‟Ts.

 Case study

The recent case in south Delhi in one instagram group name is „BOIS Locker Room‟ is an
online group allegedly involving teenage boys from Delhi schools casually talking about rape, sexual
objectification and slut-shaming school girls has set off a storm on social media. Delhi police has filed
case linked to the Instagram group, which has now been deactivated. The cyber-crime division also has
written to Facebook owned Instagram for details on the group that is every parent`s worst nightmare.
Then after several social media users posted screenshots on Instagram and Twitter of an online group
called „bois Locker Room‟

The Delhi commission for women chairperson Swati Maliwal called for the arrest of those associated
with the group. The DCW has sent notices to Instagram and Delhi police. We want these boys to be
arrested immediately and the strongest action to be taken against them. The one who has been nabbed so
far is a 15-year-old student of a prominent school in south Delhi. 22 other boys have been identified and
they would be called for investigation the police said on 5 may 2020. The detained accused would be
produced before the juvenile justice board (JJB).
A case registered under section 465 forgery, 471 using forged document, 469 forgery for purpose of
harming reputation, 509 intending to insult the modesty of any women of the IPC and 67 and 67A of the
information technology (IT) act at cyber cell of Delhi police.

This incident the Facebook response is „we absolutely do not allow behaviour that promotes sexual
violence of exploits anyone, especially women and young people, and have actioned content violating our
community standards as we made aware of it. We have policies that disallow the sharing of
nonconsensual intimate imagery, as well as threats to share such imagery and we take this issue very
seriously. Ensuring our community can express themselves in a safe and respectful way is our top
priority‟

Next in the case the twist is the girl with fake account made „gang rape‟ comment to test boy`s character.
In its investigation into the bois locker room case the police has stumbled upon a conversation on
snapchat where a girl, posing as a male, suggested a sexual assault plan to a boy just to test his „values
and character’. Therefore we show the how is the incident nowadays growing in the country?

 Conclusion
Criminal behavior on the Internet, or cyber-crime, presents as one of the Major challenges
of the future to India and International law enforcement. As ICT become even more pervasive, aspects of
electronic crime will feature in all forms of criminal behavior, even those matters currently regarded as
offences that are more traditional. It already features in many international crime-involving drug
trafficking, smuggling, cyber terrorism and money laundering. Digital evidence will become very
common market, even in traditional crimes, and we must be prepared to deal with these new challenges.
Law enforcement agencies around the world are working together to develop new partnerships, new
forensic approaches and new responses to cyber-crime in order to safeguard safety and security on the
Internet. New expertise, technologies and investigative modus operandi, applied in a universal context,
will be required to detect, prevent and respond to cybercrime. This “new business” will be characterized
by new forms of crime, a far comprehensive scope and scale of offending and victimization, the need to
respond in much more timely way, and challenging technical and legal complexities.
Therefore end of the brief these are a:
STOP. Before you use the Internet, take time to understand the risks and learn how to spot potential
problems.
THINK. Take a moment to be certain the path is clear ahead. Watch for warning signs and consider how
your actions online could affect your safety, or your family‟s.
CONNECT. Enjoy the Internet with greater confidence, knowing you‟ve taken the right steps to safety
net yourself.

 References
 Australian Communications and Media Authority. (2013). Like, post, share: Young Australians’
experience of social media. Melbourne, Australia.
 A guide to cybercrime and online safety-block the web monsters
www.westyorkshire.police.uk/BlockTheWebMonsters
 Baas, N., de Jong, M. D., & Drossaert, C. H. (2013). Children‟s perspectives on cyberbullying:
insights based on participatory research. Cyberpsychology, Behavior, and Social Networking,
16(4), 248-253. Netherlands
 Berkman Center for Internet & Society. (2008). Enhancing Child Safety and Online
Technologies: Final Report of the Internet Safety Technical Task Force to the Multi-State
Working Group on Social Networking of State Attorneys General of the United States. Boston,
MA: Harvard University. United States
 "CYBER CRIME CHANGING EVERYTHING – An empirical study" (Neelesh Jain, Vibhash
Shrivastava) International Journal of Computer Application - 2014 (Issue 4, Volume 1)
 Cyber crime a new challenge for CBI, www.rediff.com, March 12, 2003
 Department of Electronics and Information Technology, „Cybercrime, cyber security and right to
privacy‟, 52nd Report, New Delhi, February
2014.http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technolo
gy_52.pdf
 Get Safe Online - Free online security advice - https://www.getsafeonline.org
 Government of India, Ministry of Home Affairs, National Crime Records Bureau, Crime in India
Report, 2014.
 The Internet Watch Foundation - https://www.iwf.org.uk/
 International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue:
06 | June -2017 (A brief study on Cyber Crime and Cyber Law‟s of India) www.irjet.net
 Jaishankar, K., Cyber Bullying: Profi le and Policy Guidelines. Tirunelveli: Department of
Criminology and Criminal Justice, Manonmaniam Sundaranar University, 2009.
 Microsoft, Global Youth Online Behaviour Survey, 2012. Standing Committee on Information
Technology (2013-14), Fifteenth Lok Sabha, Ministry of Communications and Information
Technology
 National crime record bureau journal October 2018 vol. 1 (government of india)
(www.ncrb.gov.in)
 Refer Annex 3: Cybercrime Investigation Cells in India
 Sexual Harassment on the Internet.
https://www.unc.edu/courses/2010spring/law/357c/001/internet harassment/internet-
harassment.html
 Telephone conversation with Rakshit Tandon, India cybersecurity specialist, January 2016.
 The phrase “child sexual abuse material” is increasingly preferred to describe sexually explicit
representation of children in place of the term “child pornography” as it dispels the notion of
consent on the part of the child in any way and reflects the grave nature of the content
 The Child Exploitation and Online Protection (CEOP) https://www.ceop.police.uk/Ceop-Report/
 The India Express, Six youths arrested for 2 „rapes‟ at Fort Kochi‟, 25 January 2016.
http://indianexpress.com/article/india/india-news-india/sixyouths-arrested-for-2-rapes-at-fort-
kochi/#sthash.Faewe4ni.dpuf
 The Washington Post, „More people died taking selfies in India last year than anywhere else in
the world‟, 14 January 2016. www.washingtonpost.com/news/worldviews/wp/2016/01/14/more-
people-die-taking-selfies-in-india-than-anywhere-else-in-the-world/
 Youth Internet Safety: Risks, Responses, and Research Recommendations – center for technology
innovation at brookings - Adina Farrukh, Rebecca Sadwick, and John Villasenor (2014)
URL
 https://www.usa.gov/online-safety (internet crime education)
 http://intelsecurityapac.com/digitalsafety/2015/10/27/research-india-ttt
 https://www.history.com/internet
 https://theconversation.com/why-do-people-risk-their-lives-or-the-lives-of-others-for-the-perfect-
selfi e-55937
 www.wikipedia.org
 www.thrillist.com/vice/how-to-buy-illegal-drugs-online-with-the-darknet-tor-bitcoin-and-more-
explained
 www.infosecawareness.in

You might also like