Crimes and Laws Related to Internet users: an Overview

International Journal of Economics and Management Studies
© 2017 by SSRG - IJEMS Journal
Volume 4 Issue 3
Year of Publication : 2017
Authors : Adil Rasool
pdf
How to Cite?

Adil Rasool, "Crimes and Laws Related to Internet users: an Overview," SSRG International Journal of Economics and Management Studies, vol. 4,  no. 3, pp. 6-10, 2017. Crossref, https://doi.org/10.14445/23939125/IJEMS-V4I3P102

Abstract:

The internet has become need of current world. It provides wide and extensive range of facilities including access to the global stores of Information. The Internet access allows instant access to both current and historical sources of information that results saving of time, which is more precious than gold at present time. Looking towards the other side of the same coin, there are few shortcomings while adopting Internet usage. Which is wrong usage of Internet i.e. for unethical means? In present Internet world, such means are known as Cyber crimes. To highlight such activities, present study was conducted with main focus to raise awareness regarding such crime activities; further the present study also mentioned the penalties for committing such activities as per cyber laws and I.T Act.

Keywords:

 Cyber Crime, Cyber law and I.T Act.

References:

1) Broadhurst, R. G. (2006). Developments in the global law enforcement of cyber-crime. Policing: an International Journal of Police Strategies and Management, 29(3), 408-433.
2) Casey, E. (2002). Error Uncertainty and Loss in Digital Evidence. International Journal of Digital Evidence, 1(2).
3) Chaikin, D. (2006). Network investigations of cyber attacks: the limits of digital evidence. Crime, Law and Social Change, 46, 239-256.
4) Chaski, C. E. (2005). Who’s At The Keyboard? Authorship Attribution in Digital Evidence Investigations. International Journal of Digital Evidence, 4, 1-13.
5) Downing, R. W. (2005). Shoring Up the Weakest Link: What Lawmakers Around the World Need to Consider in Developing Comprehensive Laws to Combat Cybercrime. Columbia Journal of Transnational Law, 43, 741-762.
6) Goodman, M. D., & Brenner, S. W. (2002). The Emerging Consensus on Criminal Conduct in Cyberspace. International Journal of Law and Information Technology, 10(2), 139-223. 7) Kirby, M. D. (2008). The Urgent Need for Forensic Excellence. Criminal Law Journal, 32.
8) Liao, Y. (2001). Analysis of computer crime characteristics. Journal of Information Technology and Society, 1, 119-133.
9) Luen, T. W., & Al-Hawamdeh, S. (2001, October). Knowledge management in the public sector: principles and practices in police work. Journal of Information Science, 27(5), 311-318.
10) Mitchell, K. J., Wolak, J., & Finkelhor, D. (2005). Police posing as juveniles online to catch sex offenders: Is it working? Sex Abuse, 17, 241-267.
11) Mitchell, K. J., Wolak, J., & Finkelhor, D. (2005).The Internet and family and acquaintance sexual abuse. Child Maltreat, 10, 49-60.
12) Pallaras, P. (2011). New Technology: opportunities and challenges for prosecutors. Crime, Law and Social Change, 54(1), 71-89.
13) Pocar, F. (2004). Defining Cyber-Crimes in International Legislation. European Journal on Criminal Policy and Research, 10, 27–37.