NLSUI OPAC header image

Cyber crimes and investigation : a critical analysis

By: Contributor(s): Publication details: BangaloreBangalore NLSIU 2013Description: 86 p. ; 25 cmOnline resources:
Contents:
TABLE OF CONTENTS CHAPTER I – INTRODUCTION; 1. Introduction; 2. Meaning of cyber crime; 3. History of cyber crimes; 4. Definition of cyber crime; CHAPTER II - KINDS OF CYBER CRIMINALS AND TYPES OF CYBER CRIMES; 1. Kinds of cyber criminals; 2. General cyber crimes; 3. Specific types of cyber crimes; CHAPTER III - IMPACTS OF CYBER CRIME; 1. Potential economic impact; 2. Impact on market value; 3. Impact on consumer trust; 4. Area ripe for exploitation: National Security; CHAPTER IV -INVESTIGATION OF CYBER CRIMES AND THE LEGISLATIONS RELATED TO THE SAME; 1. Applicability of Cr.P.C in investigation of cyber- crimes; 2. Definition of investigation; 3. Classification of offences under the Information Technology Act, 2000; 4. Who can investigate under the IT Act, 2000; 5. Preventive action; 6. Practical aspects involved in investigation of cyber crime; 7. Procedure followed while investigating a cyber crime; 8. Investigation of cyber crime through electronic evidence; 9. Problems involved in application of traditional criminal laws in investigation of cyber crimes; 10. Tools of investigation of cybercrimes; 11. Leading electronic evidence before the court of law; 12. Difficulty involved in investigation of cyber crimes; 13. Legislations dealing with cyber crimes in India; 14. Important Sections of IT Act, 2000; 15. Developments in the IT law; 16. Criticism on the laws relating to cyber crimes in India; 17. Criminal liability under Indian Criminal law and the information technology Act, 2000; 18. Cyber crime convention; CHAPTER V - CASE STUDIES RELATED TO CYBER CRIMES; CHAPTER VI - METHODS TO EFFECTIVELY COMBAT CYBER CRIMES; 1. Methods to effectively combat cyber crime; 2. Importance of data protection; 3. Origin and development of laws on data protection; 4. Cybercrime countermeasures; CHAPTER VII- CONCLUSION AND SUGGESTIONS; ANNEXURE – BIBLIOGRAPHY; 1. List of statutes and conventions; 2. List of cases; 3. List of journals; 4. List of books; 5. List of articles.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Status Barcode
Dissertation . Not for loan LLM468

TABLE OF CONTENTS CHAPTER I – INTRODUCTION; 1. Introduction; 2. Meaning of cyber crime; 3. History of cyber crimes; 4. Definition of cyber crime; CHAPTER II - KINDS OF CYBER CRIMINALS AND TYPES OF CYBER CRIMES; 1. Kinds of cyber criminals; 2. General cyber crimes; 3. Specific types of cyber crimes; CHAPTER III - IMPACTS OF CYBER CRIME; 1. Potential economic impact; 2. Impact on market value; 3. Impact on consumer trust; 4. Area ripe for exploitation: National Security; CHAPTER IV -INVESTIGATION OF CYBER CRIMES AND THE LEGISLATIONS RELATED TO THE SAME; 1. Applicability of Cr.P.C in investigation of cyber- crimes; 2. Definition of investigation; 3. Classification of offences under the Information Technology Act, 2000; 4. Who can investigate under the IT Act, 2000; 5. Preventive action; 6. Practical aspects involved in investigation of cyber crime; 7. Procedure followed while investigating a cyber crime; 8. Investigation of cyber crime through electronic evidence; 9. Problems involved in application of traditional criminal laws in investigation of cyber crimes; 10. Tools of investigation of cybercrimes; 11. Leading electronic evidence before the court of law; 12. Difficulty involved in investigation of cyber crimes; 13. Legislations dealing with cyber crimes in India; 14. Important Sections of IT Act, 2000; 15. Developments in the IT law; 16. Criticism on the laws relating to cyber crimes in India; 17. Criminal liability under Indian Criminal law and the information technology Act, 2000; 18. Cyber crime convention; CHAPTER V - CASE STUDIES RELATED TO CYBER CRIMES; CHAPTER VI - METHODS TO EFFECTIVELY COMBAT CYBER CRIMES; 1. Methods to effectively combat cyber crime; 2. Importance of data protection; 3. Origin and development of laws on data protection; 4. Cybercrime countermeasures; CHAPTER VII- CONCLUSION AND SUGGESTIONS; ANNEXURE – BIBLIOGRAPHY; 1. List of statutes and conventions; 2. List of cases; 3. List of journals; 4. List of books; 5. List of articles.