(2016-17) Cyber Crime

Paper Code: 
JMC-144 J
Credits: 
4
Contact Hours: 
60.00
Max. Marks: 
100.00
Objective: 

Objectives:

This course will enable students to:

  • Understand at all kinds of cybercrimes which are targeted against persons, property or nations.
  • Aim towards   providing a distinct approach to deal with emerging cybercrimes.
  • Know about various law enforcement agencies in India at the Central and State level in building legal capacity for detection, investigation, and prosecution of cybercrimes as also for cooperation with various international players. 
  • Observe the emerging challenges on cybercrime specifically in India.

 

Cyber Crime

Cybercrime:Introduction,Nature,Elements, Classification. History of Cyber Crime.

 

 

Cyber Hacking

Cyber Hacking: Essential Elements, Types & Forms, Legislative Approach in India, and Socio Legal Impact of Cyber Hacking in India.

Cyber Terrorism: Concept, National Security, Modes, Prevention & Control,

 

Theories of Criminal Behaviour in Cyber Space :

 Criminology, Penology, Criminal Law, Differential Association Theory, Differential Reinforcement Theory, Social Learning Theory.

 

Cyber Crime Investigation

Initializing a Search and Seizure Operation Tracking & Tracing Emails, Recovery of Digital Evidence, Setting up a Cyber Crime Investigation Cell. Cyber Forensics: Basic Forensic Principles, Forensic Imaging & Verification, Data Recovery and Analysis

 

Cyber Law ( Offences & Punishments )

The Information Technology Act, 2000, Offences under the Indian Penal Code, 1860, Issues relating to investigation and adjudication of cyber crimes in India, Digital Evidence IT act 2000 and other legal provisions.

 

References: 

[1] Casey, E. Digital Evidence and Computer Crime: ForensicScience, Computers and the Internet. London: Academic Press,2011

 

[2] Farmer, Dan. & Charles, Mann C. Surveillance nation.Technology Review; Vol. 106, No. 4, 2003

 

[3] Harrison, A. Privacy group critical of release of carnivore data.Computerworld; Vol. 34, No. 41, 2006

 

[4] Internet Tax Freedom Act of 1998: 112 Stat. 2681–2719.Retrieved from:http://www.cbo.gov/doc.cfm?index=608&type=0). Accessedon : 29th January, 2012.

 

[5] Katz, Mira L. & Shapiro, Carl. Technology Adoption in thePresence of Network Externalities. Journal of PoliticalEconomy; Vol. 94, No.4, 1986.

 

[6] Ogut, Hulisi. Menon, Nirup. & Ragunathan, Srinivasia. CyberInsurance and IT Security Investment: Impact of IndependentRisk. Proceedings of the Workshop on the Economics of Information Security (WEIS), Cambridge, MA: HarvardUniversity, 2005.

 

[7] Richards, James. Transnational Criminal Organizations,Cybercrime, and Money Laundering: A Handbook for LawEnforcement Officers, Auditors, and Financial Investigators.Boca Raton, FL: CRC Press, 1999

 

 [8] Roland, Sarah E. The Uniform Electronic Signatures inGlobal and National Commerce Act: Removing Barriers toE-Commerce or Just Replacing Them with Privacy andSecurity Issues?. Suffolk University Law Review; Vol. 35,2001

 

 [9] Tipton, Harold F. & Krause, Micki. Information securitymanagement handbook (5th ed.). London: Taylor & Francise-Library, 2005.

 

[10] Whitman, Michael E. & Mattord, Herbert J.2005.. Principles ofinformation security (2nd ed.). Boston: Thomson CourseTechnology,

 

[11]Barkha,B.&RamMohan,U.(2011)Cyber Law & Crimes. Hyderabad : Asian Law House..

 

[12]Jaishankar, K. (2008). Space Transition Theory of cyber crimes. In Schmallager, F., & Pittaro, M. (Eds.), Crimes of the Internet. Upper Saddle River, NJ: Prentice Hall.

 

[13] Dasgupta,M.(2009). Cyber Crime in India –A Comparative Study. Kolkata,Eastern Law House.

 

 

 

Academic Year: