International E-publication: Publish Projects, Dissertation, Theses, Books, Souvenir, Conference Proceeding with ISBN.  International E-Bulletin: Information/News regarding: Academics and Research

Socio-Economic Conditions of Cybercrime Victims in India: A Study of Karnataka State, India

Author Affiliations

  • 1Department of Criminology and Forensic Science, Karnatak University’s, Karnatak Science College, Dharwad- 580 001, Karnataka, India

Res. J. Forensic Sci., Volume 12, Issue (1), Pages 9-15, January,29 (2024)

Abstract

Contemporary Socio-Economic environment is evolving becoming more security conscious. Currently people are taking a greater number of steps to get safety and security from both the government and the industry including online services. A dual economy, low income and educational levels, which result in poor levels of human development, high unemployment rates, high levels of income inequality, and flimsy democratic institutions are some of the main economic and social traits of a developing nation. Just as there are many different kinds of crimes that can be done, so too can the types of people that perpetrate cybercrimes. Cybercriminals can include young hackers, resentful workers and insiders, or foreign terrorists and spies. When a computer is used in their crimes, these criminals become into cybercriminals. It goes without saying that cybercrime is a major problem in Karnataka, costing the state and its people a great deal of money. The fact that criminals are frequently effective in hiding their identities is the most pressing issue. The commonest Cybercrime observed was the Cyber stalking and least encountered was the Morphing. Victim being the commonest manner of Cyber stalking (54%) with residing in Urban setup belonging to Middle socioeconomic strata (53.34%).

References

  1. UNDP (2006)., Country evaluation: Assessment of development results Honduras, New York: United Nations Development Programme Evaluation Office., Retrieved from http://web.undp.org/evaluation/documents/ADR/ ADR_Reports/ADR_Honduras.pdf.
  2. Lewis, A. (1954)., Economic development with unlimited supplies of labour., Manchester School of Economic and Social Studies, XXII (May 1954), 139–91.
  3. P.N. Sangalad, (2012)., Farmers’ Suicides in India as an Socio-Economical Phenomenon: A Study of Karnataka State., International Journal of Criminology and Sociological Theory, 5(3), 964- 971.
  4. Kshetri, N. (2010)., Diffusion and effects of cyber-crime in developing economies., Third World Quarterly, 31(7), 1057-1079.
  5. Chenery, H. B. (1975)., The structuralist approach to development policy., The American Economic Review, 65(2), Papers and Proceedings of the Eighty-seventh Annual Meeting of the American Economic Association, 310–316.
  6. Choi, K. (2015)., Cyber-criminology and digital investigation., El Paso: LFB Scholarly Publishing LLC.
  7. Wolak, J., Mitchell, K. J., & Finkelhor, D. (2006)., Online Victimization of Youth: Five Years Later.,
  8. Kshetri, N. (2009)., Positive externality, increasing returns, and the rise in cybercrimes., Communications of the ACM, 52(12), 141-144.
  9. GOI (2015)., Ministry of Electronics & Information Technology, Government of India., http://meity.gov.in/sites/upload_files/dit/files/ncsp_060411.pdf last visited 13/08/2015
  10. Klimburg, A. (Ed.). (2012)., National cyber security framework manual., NATO Cooperative Cyber Defense Center of Excellence.
  11. Jaishankar, K. (2008)., Space transition theory of cyber crimes, crimes of the internet.,
  12. Punia, C. K. (2009)., Cyber Laws. New Delhi: Sumit Enterprises.,
  13. Paranjape, N. (2012)., Criminology and Penology with Victimology, Allahbad.,
  14. Anonymous, (2012)., India battles against cybercrime., Retrieved from http://www.indolink. com/displayArticleS.php?id=102112083833.
  15. Rid, T. (2012)., Think again: cyber war., Foreign Policy, (192), 80.
  16. Anonymous (2012)., Spam capital’ India arrests six in phishing probe., Retrieved from http://www.bbc.co. uk/news/technology-16392960.
  17. King, R. (2011)., Cloud, mobile hacking more popular: Cisco., Retrieved from http://www.zdnet. com/cloud-mobile-hacking-more-popular-cisco-1339328060/.
  18. Aaron, G., Rasmussen, R., & Routt, A. (2012)., Global phishing survey: Trends and domain name use in 2H2011, APWG., http://www.antiphishing.org/reports/APWG_ Global PhishingSurvey_2H2011. pdf.
  19. Kshetri, N. (2010)., The economics of click fraud., IEEE Security & Privacy, 8(3), 45-53.
  20. Internet Crime Complaint Center (2011)., 2010 internet crime report., Retrieved from http://www.ic3. gov/media/annualreport/2010_ic3report.pdf.
  21. AAG IT Services (2023)., The latest cyber crime statistics., https://aag-it.com/the-latest-cyber-crime-statistics/ 2023
  22. Internet World Stats (2016)., Top 20 Countries with the Highest Number of Internet Users., available at accessed on 7 July, 2016.
  23. Bossler AM. (2017)., Need for debate on the implications of honeypot data for restrictive deterrence policies in cyberspace., Criminol. Public Policy, 16, 681–88.
  24. D’Arcy J. and Herath T. (2011)., A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings., Eur. J. Inf. Syst., 20, 643–58.
  25. Holt, T. J., & Bossler, A. M. (2014)., An assessment of the current state of cybercrime scholarship., Deviant behavior, 35(1), 20-40.
  26. Granovetter, M., Action, E., & Structure, S. (1985)., The problem of embeddedness., American journal of sociology, 91(3), 481-510.
  27. Parto, S. (2005)., Economic activity and institutions: Taking Stock., Journal of Economic Issues, 39(1), 21–52.
  28. Baumol, W. J. (1990)., Entrepreneurship: Productive, unproductive, and destructive., Journal of Political Economy, 98(5), 893–921.
  29. North, D. C. (1990)., Institutions, institutional change and economic performance., Cambridge: Harvard University Press.
  30. UNDP (2006)., Country evaluation: Assessment of development results Honduras, New York: United Nations Development Programme Evaluation Office., Retrieved fromhttp://web.undp.org/evaluation/documents/ADR/ADR_Reports/ADR_Honduras.pdf.
  31. Lewis, A. (1954)., Economic development with unlimited supplies of labour., Manchester School of Economic and Social Studies, XXII (May 1954), 139–91.
  32. Chenery, H. B. (1975)., The structuralist approach to development policy., The American Economic Review, 65(2), Papers and Proceedings of the Eighty-seventh Annual Meeting of the American Economic Association, 310–316.
  33. Kshetri, N. (2010)., Diffusion and effects of cybercrime in developing economies., Third World Quarterly, 31(7), 1057–1079.
  34. Acemoglu, D. (2005)., Political economy of development and underdevelopment., Gaston Eyskens Lectures, Leuven, Department of Economics, Massachusetts Institute of Technology, Retrieved from http://economics.mit.edu/ files/1064.
  35. Acemoglu, D., Johnson, S., & Robinson, J. A. (2005)., Institutions as a fundamental cause of long-run growth., Handbook of economic growth, 1, 385-472.
  36. Datta, P., Panda, S. N., Tanwar, S. and Kaushal, R. K. (2020)., A technical review report on cyber crimes in India., In 2020 International Conference on Emerging Smart Computing and Informatics (ESCI), 12–14 March 2020, Pune, India, eds., 269–275. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/ ESCI48226.2020.9167567
  37. Kethineni, S. (2020)., Cybercrime in India: Laws, regulations, and enforcement mechanisms., In The Palgrave handbook of international cybercrime and cyber deviance, eds. Holt, T. and Bossler, A., 305–326. London: Palgrave Macmillan. https://doi. org/10.1007/978-3-319-78440-3_7
  38. Joshi, Y. and Singh, A. (2013)., A study on cybercrime and security scenario in India., International Journal of Engineering and Management Research, 3(3), 13–18.
  39. NCRB (2021)., National Crime Records Bureau., Minister of Home Affairs New Delhi (2021)\
  40. Gavrov, Sergey; Klyukanov, Igor (2015)., Modernization, Sociological Theories of"., In Wright, James D. (ed.). International Encyclopedia of the Social &Behavioral Sciences. Vol. 15 (2nd ed.). Oxford: Elsevier Science. pp. 707–713.