
Library Catalogue

| 000 -LEADER | |
|---|---|
| fixed length control field | 02458nam a2200145Ia 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20260209120132.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 260209s9999||||xx |||||||||||||| ||und|| |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Vivekha Pon |
| 245 #0 - TITLE STATEMENT | |
| Title | Cyber crimes and investigation : a critical analysis |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | BangaloreBangalore |
| Name of publisher, distributor, etc. | NLSIU |
| Date of publication, distribution, etc. | 2013 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 86 p. ; 25 cm. |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | TABLE OF CONTENTS CHAPTER I – INTRODUCTION; 1. Introduction; 2. Meaning of cyber crime; 3. History of cyber crimes; 4. Definition of cyber crime; CHAPTER II - KINDS OF CYBER CRIMINALS AND TYPES OF CYBER CRIMES; 1. Kinds of cyber criminals; 2. General cyber crimes; 3. Specific types of cyber crimes; CHAPTER III - IMPACTS OF CYBER CRIME; 1. Potential economic impact; 2. Impact on market value; 3. Impact on consumer trust; 4. Area ripe for exploitation: National Security; CHAPTER IV -INVESTIGATION OF CYBER CRIMES AND THE LEGISLATIONS RELATED TO THE SAME; 1. Applicability of Cr.P.C in investigation of cyber- crimes; 2. Definition of investigation; 3. Classification of offences under the Information Technology Act, 2000; 4. Who can investigate under the IT Act, 2000; 5. Preventive action; 6. Practical aspects involved in investigation of cyber crime; 7. Procedure followed while investigating a cyber crime; 8. Investigation of cyber crime through electronic evidence; 9. Problems involved in application of traditional criminal laws in investigation of cyber crimes; 10. Tools of investigation of cybercrimes; 11. Leading electronic evidence before the court of law; 12. Difficulty involved in investigation of cyber crimes; 13. Legislations dealing with cyber crimes in India; 14. Important Sections of IT Act, 2000; 15. Developments in the IT law; 16. Criticism on the laws relating to cyber crimes in India; 17. Criminal liability under Indian Criminal law and the information technology Act, 2000; 18. Cyber crime convention; CHAPTER V - CASE STUDIES RELATED TO CYBER CRIMES; CHAPTER VI - METHODS TO EFFECTIVELY COMBAT CYBER CRIMES; 1. Methods to effectively combat cyber crime; 2. Importance of data protection; 3. Origin and development of laws on data protection; 4. Cybercrime countermeasures; CHAPTER VII- CONCLUSION AND SUGGESTIONS; ANNEXURE – BIBLIOGRAPHY; 1. List of statutes and conventions; 2. List of cases; 3. List of journals; 4. List of books; 5. List of articles. |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Dr. S.B.N. Prakash - GuideDr. S.B.N. Prakash - Guide |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="https://dans.nls.ac.in/handle/123456789/1797">https://dans.nls.ac.in/handle/123456789/1797</a> |
| Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|
| . | . | 09.02.2026 | LLM468 | 09.02.2026 | 09.02.2026 | Dissertation |