Cyber Crime
Cybercrime:Introduction,Nature,Elements, Classification. History of Cyber Crime.
Cyber Hacking
Cyber Hacking: Essential Elements, Types & Forms, Legislative Approach in India, and Socio Legal Impact of Cyber Hacking in India.
Cyber Terrorism: Concept, National Security, Modes, Prevention & Control,
Theories of Criminal Behaviour in Cyber Space :
Criminology, Penology, Criminal Law, Differential Association Theory, Differential Reinforcement Theory, Social Learning Theory.
Cyber Crime Investigation
Initializing a Search and Seizure Operation Tracking & Tracing Emails, Recovery of Digital Evidence, Setting up a Cyber Crime Investigation Cell.
Cyber Forensics: Basic Forensic Principles, Forensic Imaging & Verification, Data Recovery and Analysis
Cyber Law ( Offences & Punishments )
The Information Technology Act, 2000, Offences under the Indian Penal Code, 1860, Issues relating to investigation and adjudication of cyber crimes in India, Digital Evidence IT act 2000 and other legal provisions.
] Casey, E. Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet. London: Academic Press,2011
[2] Farmer, Dan. & Charles, Mann C. Surveillance nation.Technology Review; Vol. 106, No. 4, 2003
[3] Harrison, A. Privacy group critical of release of carnivore data.Computerworld; Vol. 34, No. 41, 2006
[4] Internet Tax Freedom Act of 1998: 112 Stat. 2681–2719.Retrieved from: http://www.cbo.gov/doc.cfm?index=608&type=0). Accessedon : 29th January, 2012.
[5] Katz, Mira L. & Shapiro, Carl. Technology Adoption in the Presence of Network Externalities. Journal of Political Economy; Vol. 94, No.4, 1986.
[6] Ogut, Hulisi. Menon, Nirup. & Ragunathan, Srinivasia. CyberInsurance and IT Security Investment: Impact of IndependentRisk. Proceedings of the Workshop on the Economics of Information Security (WEIS), Cambridge, MA: HarvardUniversity, 2005.
[7] Richards, James. Transnational Criminal Organizations,Cybercrime, and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators.Boca Raton, FL: CRC Press, 1999
[8] Roland, Sarah E. The Uniform Electronic Signatures in Global and National Commerce Act: Removing Barriers to E-Commerce or Just Replacing Them with Privacy and Security Issues?. Suffolk University Law Review; Vol. 35, 2001
[9] Tipton, Harold F. & Krause, Micki. Information security management handbook (5th ed.). London: Taylor & Francis e-Library, 2005.
[10] Whitman, Michael E. & Mattord, Herbert J.2005.. Principles ofinformation security (2nd ed.). Boston: Thomson CourseTechnology,
[11]Barkha,B.&RamMohan,U.(2011)Cyber Law & Crimes. Hyderabad : Asian Law House..
[12]Jaishankar, K. (2008). Space Transition Theory of cyber crimes. In Schmallager, F., & Pittaro, M. (Eds.), Crimes of the Internet. Upper Saddle River, NJ: Prentice Hall.
[13] Dasgupta,M.(2009). Cyber Crime in India –A Comparative Study. Kolkata,Eastern Law House.