NLSUI OPAC header image

Cyber Crimes and Investigation: (Record no. 111402)

MARC details
000 -LEADER
fixed length control field 02645nam a2200193Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240531165806.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180710s2013 xx 000 0 und d
040 ## - CATALOGING SOURCE
Transcribing agency nls
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Vivekha Pon
245 ## - TITLE STATEMENT
Title Cyber Crimes and Investigation:
Remainder of title A Critical Analysis
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Bangalore
Name of publisher, distributor, etc. NLSIU
Date of publication, distribution, etc. 2013
300 ## - PHYSICAL DESCRIPTION
Extent 86p
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note TABLE OF CONTENTS<br/>CHAPTER I – INTRODUCTION;<br/>1. Introduction;<br/>2. Meaning of cyber crime;<br/>3. History of cyber crimes;<br/>4. Definition of cyber crime;<br/>CHAPTER II - KINDS OF CYBER CRIMINALS AND TYPES OF CYBER CRIMES;<br/>1. Kinds of cyber criminals;<br/>2. General cyber crimes;<br/>3. Specific types of cyber crimes;<br/>CHAPTER III - IMPACTS OF CYBER CRIME;<br/>1. Potential economic impact;<br/>2. Impact on market value;<br/>3. Impact on consumer trust;<br/>4. Area ripe for exploitation: National Security;<br/>CHAPTER IV -INVESTIGATION OF CYBER CRIMES AND THE LEGISLATIONS RELATED TO THE SAME;<br/>1. Applicability of Cr.P.C in investigation of cyber- crimes;<br/>2. Definition of investigation;<br/>3. Classification of offences under the Information Technology Act, 2000;<br/>4. Who can investigate under the IT Act, 2000;<br/>5. Preventive action;<br/>6. Practical aspects involved in investigation of cyber crime;<br/>7. Procedure followed while investigating a cyber crime;<br/>8. Investigation of cyber crime through electronic evidence;<br/>9. Problems involved in application of traditional criminal laws in investigation of cyber crimes;<br/>10. Tools of investigation of cybercrimes;<br/>11. Leading electronic evidence before the court of law;<br/>12. Difficulty involved in investigation of cyber crimes;<br/>13. Legislations dealing with cyber crimes in India;<br/>14. Important Sections of IT Act, 2000;<br/>15. Developments in the IT law;<br/>16. Criticism on the laws relating to cyber crimes in India;<br/>17. Criminal liability under Indian Criminal law and the information technology Act, 2000;<br/>18. Cyber crime convention;<br/>CHAPTER V - CASE STUDIES RELATED TO CYBER CRIMES;<br/>CHAPTER VI - METHODS TO EFFECTIVELY COMBAT CYBER CRIMES;<br/>1. Methods to effectively combat cyber crime;<br/>2. Importance of data protection;<br/>3. Origin and development of laws on data protection;<br/>4. Cybercrime countermeasures;<br/>CHAPTER VII- CONCLUSION AND SUGGESTIONS;<br/>ANNEXURE – BIBLIOGRAPHY;<br/>1. List of statutes and conventions;<br/>2. List of cases;<br/>3. List of journals;<br/>4. List of books;<br/>5. List of articles.<br/>
520 ## - SUMMARY, ETC.
Summary, etc. Cyber Crimes - Cases
-- Cyber Crimes - Investigation - India
-- Cyber criminals - cyber Crimes - Kinds
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Dr. S.B.N. Prakash - Guide
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://opac.nls.ac.in:8081/xmlui/handle/123456789/1797">http://opac.nls.ac.in:8081/xmlui/handle/123456789/1797</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Dissertation
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type
        National Law School National Law School   12.07.2018   LLM468 12.07.2018 12.07.2018 Dissertation