International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 1463
ISSN 2229-5518
Nabat Arfi , Shalini Agarwal
Cybercrime is a kind of crime that happens in "cyberspace", that is, happens in the world of computer and the Internet. Although many people have a limited knowledge of "cybercrime", this kind of crime has the serious potential for severe impact on our lives and society, because our society is becoming an information society, full of information exchange happening in "cyberspace". There studies indicating cybercrime in present scenario, cybercrime and their laws and cybercrime during adolescent. As the Internet, mobile phones, and other computer technologies have flourished, criminals have found ways to use them for old-fashioned goals such as theft, fraud, intimidation, and harassment that’s why cybercrime is becoming even more serious. Elderly is that vulnerable group who has been deprieved from any information regarding latest technologies and innovation especially in the world of computers and internet . The purpose of the present study is to assess the knowledge of cybercrime among elderly.
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide. Computers are used to commit crime and users become the target of crime every day. Besides the magnitude and scope of the threat, one of the greatest challenges in fighting computer crime resides in the fundamental nature of the computing world. A lot of us have a limited knowledge of crime occurring in "cyberspace", known as cybercrime, which happens on computer and the Internet, however, cybercrime has a severe potential for remarkable impact on the lives of individuals and our society. Cybercrime is a kind of crime that happens in "cyberspace", that is, happens in the world of computer and the Internet. Although many people have a limited knowledge of "cybercrime", this kind of crime has the serious potential for severe impact on our lives and society, because our society is becoming an information society, full of information exchange happening in "cyberspace".[1]
• Author name is currently pursuing masters degree program in Department of Human Development & Family Studies in Baba Saheb Bhimrao Ambedkar University Lucknow,U.P., India ,Mobile-
919044890612. E-mail: nabat.arfi@gmail.com
• Co-Author name is Assistant Professor in Department of Human Development & Family Studies in Baba Saheb Bhimrao Ambedkar University Lucknow,U.P., India.
Crimes committed through the use of computer, internet in the mobile systems are known as cybercrimes. Here are some common cybercrimes to look out for.
IJSER © 2013 http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 1464
ISSN 2229-5518
colloquially as “spam”, is more than annoying: spam messages can be used to trick people into giving up sensitive personal information (known as “phishing”), or as carriers for computer worms and viruses. [2]
If one is of age 60 or older—and especially an older woman living alone—one may be a special target of people who sell bogus products and services by telephone. Telemarketing scams often involve offers of free prizes, low-cost vitamins and health care products, and inexpensive vacations.[3]
Hart in his work “ The Concept of Law” has said
‘human beings are vulnerable so rule of law is
required to protect them’. Applying this to the cyberspace we may say that computers are vulnerable so rule of law is required to protect and safeguard them against cyber crime. The reasons for the vulnerability of computers may be said to be:
biometric systems and bypass firewalls can be utilized to get past many a security system.
IJSER © 2013 http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 1465
ISSN 2229-5518
Unlike strangers, relatives and caregivers often have a position of trust and an ongoing relationship with the elderly. Financial exploitation occurs when the offender steals, withholds, or otherwise misuses their elderly victims' money, property, or valuables for personal advantage or profit, to the disadvantage of the elder. Their methods can include the following:
• simply taking the elder's money, property, or valuables;
• borrowing money (sometimes repeatedly) and not paying it back;
• signing or cashing pension or social
security checks without permission;
• misusing ATM or credit cards, or
using them without permission;
• doling out the elder's money to
family or friends; and
• forcing the elder to part with
resources or to sign over property.
Understanding the factors that contribute to your problem will help you frame your own local analysis questions, determine good effectiveness measures, recognize key intervention points, and select appropriate responses.
Researchers agree that elder fraud is dramatically underreported, which is problematic for several reasons. First, the failure to report means that the assistance of police, adult protective services, family members and others is not mobilized to stop the abuse. Second, even if intervention is not necessary, the underreporting of these crimes makes it very difficult for problem-oriented efforts to proceed because of a lack of information on the targets, methods and perpetrators. Finally, the lack of reporting may encourage the offenders to victimize others. Many elderly victims do not report fraud because they feel ashamed, or they
fear others will think they cannot care for themselves, which may trigger placement in a nursing home or long-term care facility. Significantly, many victims are not aware of support resources or do not know how to access them. In the case of financial exploitation, many victims have close ties to the offender and may feel protective. They may want to stop the exploitation and recover their assets, but not want the offender punished. In addition, many victims believe they are at least partially to blame.
In contrast to victims of most other forms of crime, consumer fraud victims have a participatory role that is critical to a successful transaction. Victim compliance can fall along a continuum. At one end is the completely uninvolved victim, as in the case of identity theft or credit card fraud. Toward the middle is the victim who makes a purchase or financial arrangement that is not well-informed or well-researched. At the far end is the repeat victim. Even after victimization, many people repeat high- risk behaviors.
The following are key moments that put the victim at risk in the typical fraud transaction. They have clear relevance to points of intervention:
• The victim makes the initial contact, or takes steps that lead to the initial contact, indicating receptivity to the pitch.
• The victim provides information
about him- or herself that helps the offender to carry out the fraud.
• The victim allows the conversion of a
business relationship to one of trust, and waives customary safeguards. [4]
Unauthorized access to computer systems or networks / Hacking- This kind of offence is normally referred as hacking in the generic sense. However the framers of the information technology act 2000 have no where used this term
IJSER © 2013 http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 1466
ISSN 2229-5518
so to avoid any confusion we would not interchangeably use the word hacking for
‘unauthorized access’ as the latter has wide connotation.
altering raw data just before a computer processes it and then changing it back after the processing is completed. The electricity board faced similar problem of data diddling while the department was being computerised.
prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed. e.g. the Ziegler case wherein a logic bomb was introduced in the bank’s system, which deducted 10 cents from every account and deposited it in a particular account.[1]
help you feel more comfortable with the ins and outs of navigating online and interacting on Web
sites. Once you familiarized yourself with the tricks scammers and some less reputable companies use, one can simply avoid them. There are many Web sites, books, and courses offered for every level of user. Many of these courses are offered at low cost through colleges across the state.
Important Sections Related to Cyber Crimes:- Information Technology (Amendment) Act 2008-
Sections under IT Act (2008)-
Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.
If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.
IJSER © 2013 http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 1467
ISSN 2229-5518
Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh.
Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees.
(1) Whoever with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people by-
(i) denying or cause the denial of access to any person authorized to access computer resource; or
(ii) attempting to penetrate or access a computer resource without authorisation or exceeding authorized access; or
(iii) introducing or causing to introduce any
Computer Contaminant.
and by means of such conduct causes or is likely to cause death or injuries to persons or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the life of the community or adversely affect the critical information infrastructure specified under section
70, or
Whoever intentionally puts any person in fear of any injury to that person, or to any other, and thereby dishonestly induces the person so put in fear to deliver to any property or valuable security, or anything signed or sealed which may be converted into a valuable security, commits "extortion". [7]
Centre for Cyber Victim Counseling: The mission of the CCVC is to: Help you to understand the nature of the crime that has been committed against you; help you take action against the offender; to provide counseling for the trauma you have gone through, and to help you to understand the present legal scenario and to connect you with the appropriate police service, if needed.
Cyber Law Enforcement.org: This organization has four goals: (1) To unite police officers worldwide and educate them on cybercrime, cyber law, investigative techniques and how they interact. (2) To provide investigative assistance to police departments when requested. (3) To provide online help and education for victims of cyber stalking, cyber harassment, pedophile, hacking, and virus attacks as well as access to support groups and online counseling. (4) To standardize relations and communications between police departments, Internet Service Providers, Legal system contacts and victim advocacy groups worldwide.[6]
1.to prevent cyber stalking avoid disclosing any information pertaining to oneself. This is as good as disclosing your identity to strangers in public place.
2.always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs.
3.always use latest and up date anti virus software to guard against virus attacks.
4.always keep back up volumes so that one may not suffer data loss in case of virus contamination
5.never send your credit card number to any site that is not secured, to guard against frauds.
6.always keep a watch on the sites that your children are accessing to prevent any
IJSER © 2013 http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 1468
ISSN 2229-5518
kind of harassment or depravation in children.
7.it is better to use a security programme that gives control over the cookies and send information back to the site as leaving the cookies unguarded might prove fatal. [9]
07/09/12.
laws in India”, Journal of Law, 10(1):1.
Elderly”, New Jersey Law, 2(4):1-2.
and the Internet: A case study”, The Internet
Journal of Health, Vol.3, Issue.1.
http://www.internetworld.com. Accessed on
September 2012.
index:cyber reporting organization.com.html. Accessed on October 2012.
http://delhicourts.nic.in/ejournals/CYBER%20L AW.html. Accessed on October 2012.
Review, November 2005 – January 2009, Available at: http://www.bis.gov.uk/assets/bispartners/fores ight/docs/cyber/ctcp_midterm_ review.pdf, Visited: 10/11/2012.
IJSER © 2013 http://www.ijser.org