This course will enable students to:
Cyber Crime
Cybercrime:Introduction,Nature,Elements, Classification. History of Cyber Crime.
Cyber Hacking
Cyber Hacking: Essential Elements, Types & Forms, Legislative Approach in India, and Socio Legal Impact of Cyber Hacking in India.
Cyber Terrorism: Concept, National Security, Modes, Prevention & Control
Theories of Criminal Behaviour in Cyber Space :
Criminology, Penology, Criminal Law, Differential Association Theory, Differential Reinforcement Theory, Social Learning Theory.
Cyber Crime Investigation
Initializing a Search and Seizure Operation Tracking & Tracing Emails, Recovery of Digital Evidence, Setting up a Cyber Crime Investigation Cell.
Cyber Forensics: Basic Forensic Principles, Forensic Imaging & Verification, Data Recovery and Analysis
Cyber Law ( Offences & Punishments )
The Information Technology Act, 2000, Offences under the Indian Penal Code, 1860, Issues relating to investigation and adjudication of cyber crimes in India, Digital Evidence IT act 2000 and other legal provisions.
[1] Casey, E. Digital Evidence and Computer Crime: ForensicScience, Computers and the Internet. London: Academic Press,2011
[2] Farmer, Dan. & Charles, Mann C. Surveillance nation.Technology Review; Vol. 106, No. 4, 2003
[3] Harrison, A. Privacy group critical of release of carnivore data.Computerworld; Vol. 34, No. 41, 2006
[4] Internet Tax Freedom Act of 1998: 112 Stat. 2681–2719.Retrieved from:http://www.cbo.gov/doc.cfm?index=608&type=0). Accessedon : 29th January, 2012.
[5] Katz, Mira L. & Shapiro, Carl. Technology Adoption in thePresence of Network Externalities. Journal of PoliticalEconomy; Vol. 94, No.4, 1986.
[6] Ogut, Hulisi. Menon, Nirup. & Ragunathan, Srinivasia. CyberInsurance and IT Security Investment: Impact of IndependentRisk. Proceedings of the Workshop on the Economics of Information Security (WEIS), Cambridge, MA: HarvardUniversity, 2005.
[7] Richards, James. Transnational Criminal Organizations,Cybercrime, and Money Laundering: A Handbook for LawEnforcement Officers, Auditors, and Financial Investigators.Boca Raton, FL: CRC Press, 1999
[8] Roland, Sarah E. The Uniform Electronic Signatures inGlobal and National Commerce Act: Removing Barriers toE-Commerce or Just Replacing Them with Privacy andSecurity Issues?. Suffolk University Law Review; Vol. 35,2001
[9] Tipton, Harold F. & Krause, Micki. Information securitymanagement handbook (5th ed.). London: Taylor & Francise-Library, 2005.
[10] Whitman, Michael E. & Mattord, Herbert J.2005.. Principles ofinformation security (2nd ed.). Boston: Thomson CourseTechnology,
[11]Barkha,B.&RamMohan,U.(2011)Cyber Law & Crimes. Hyderabad : Asian Law House..
[12]Jaishankar, K. (2008). Space Transition Theory of cyber crimes. In Schmallager, F., & Pittaro, M. (Eds.), Crimes of the Internet. Upper Saddle River, NJ: Prentice Hall.
[13] Dasgupta,M.(2009). Cyber Crime in India –A Comparative Study. Kolkata,Eastern Law House.