Cyber crime and its effects on youth saidul islam criminologist in bangladesh

Page 1

Cyber Crime and its effects on youth: An empirical study on MBSTU students. Saidul Islam, Criminologist in Bangladesh

Abstract This paper explores the relevant patterns of cybercrime and its effects on the youths and the future planning of youths to engage against cybercrime. Realizing the importance of these two issues cybercrime and its effects has been undertaken to provide objective data, information and taking appropriate measures to improve the present condition. Cybercrime define as a criminal offence involving a computer as the object of the crime, or the tool used to commit a material component of the offence This study empirically investigate the present feature of cyber crime, its nature, types, causes, and its effects and relationship between cybercrime and Internet users and measure the victims of cyber crime. It is done by a questioner survey which is included open-ended and close ended question on 80 respondent contained sociodemographic characteristic, patterns of crime, determine the harmful condition, open opinion and analysis the causal factors among them. In conclusion we agreed that a general remedial measure which more effective in reorientating and empowering the youths to positively utilizes their internet skill. Thus, curbing cybercrime would require a process of utilizing internet.


Chapter one

1.1. Introduction Cyber-crime in all of its forms is one of the fastest growing areas of criminality. More and more criminals are exploiting the speed; convenience and anonymity that modern technologies offer to commit a diverse range of crimes, including attacks against computer data and systems, identity theft, the distribution of child sexual abuse images, and Internet auction fraud. The global nature of the Internet allows criminals to commit almost any illegal activity any wherein the world, which makes it essential for all countries to adapt their domestic offline controls to cover crimes carried out in cyberspace. We read about it in newspapers very often. Let's look at the dictionary definition of Cyber crime: "It is a criminal activity committed on the internet. This is a broad term that describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to lose money". The following working definition has increasingly been accepted by Canadian law enforcement agencies: "a criminal offence involving a computer as the object of the crime, or the tool used to commit a material component of the offence. "Generally speaking, based on the definition created by the Canadian Police College and by other research sources (Carter: 1995; Davis and Hutchison: 1997), there are two broad categories of cyber-crime. The first category is defined where the computer is the tool of the crime.

This

category includes crimes that law enforcement has been fighting in the physical world but now is seeing with increasing frequency on the Internet. Some of these crimes include child pornography, criminal harassment, fraud, intellectual property violations and the sale of illegal substances and goods. The second category is defined where the computer is the object of the crime. Cybercrime consists of specific crimes dealing with computers and networks. These are new


crimes that are specifically related to computer technology and the Internet. For example, hacking or unauthorized use of computer systems, defacing websites, creation and malicious dissemination of computer viruses. In addition to cyber-crime, there is also “computer-supported crime” which covers the use of computers by criminals for communication and document or data storage. This type of crime is not included in the definition of cyber-crime used in this report. (Carter: 1995; Davis and Hutchison: 1997) The terms “computer crime”, “computer-related crime”, “high-tech crime”, “cybercrime” and “Internet crime” are often used interchangeably when police and other information sources are discussed. Crimes committed primarily through Internet contact include: credit card fraud, identity theft, child pornography, indecent chat-room behavior...Cyber crime is a term used broadly to describe criminal activity in which computers or networks are a tool, a target, or a place of criminal activity. These categories are not exclusive and many activities can be characterized as falling in one or more categories. Computer crime has been defined as ‘any illegal act fostered or facilitated by a computer, whether the computer is an object of a crime, an instrument used to commit a crime, or a repository of evidence related to a crime’ (Royal Canadian Mounted Police, 2000). Some of the most prominent types include child pornography. Software piracy and network security breaches. (Royal Canadian Mounted Police, 2000) Finally this research will present some patterns of cybercrime and its effects and consequences of this crime in specific region i.e. MBSTU area within the student of all department who relates to this type crimes.

1.2. Statement of the problem Cybercrime or computer crime is a form of crime where the internet or computer is used as tools to commit this crime. Some causes or factor which affected to commit a


cybercrime like_ capacity to store data in comparatively small space, easy to access, complexity to do work, negligence and loss of evidence. The focus of this paper is to investigate about cyber-status of individual perception and their victimization by cybercrime. Key questions to be addressed are: *

What is cyber-crime?

*

How do I secure my wireless networking?

* How do I avoid getting spammed? *

How prevalent are cyber-crimes?

*

What types of cybercrime are related in this area?

*

What effects create cyber-crimes have on the students?

*

What the security challenges of cloud computing?

*

What measure should be taken by govt. and mass people to prevent these ones?

This paper begins with a brief overview of cyber-crime. This study seeks to analyze the effectiveness of Cybercrime on the youths at MBSTU university’s students, especially by looking at where they use internet or computer.

1.3. Objectives of the study The main objectives of the study are to review the present situation of youths on the effects of cybercrime in MBSTU. This objective is to investigate overall condition


about cybercrime, its effects, and causes of cybercrime and criminogenic traits of youth’s cyber-user at MBSTU. A representative sample of the students of MBSTU was selected for study. The study mainly aims to investigate their situation, perception, and economic loss of using computer for the reason of cybercrime on computer. (a) To know the types of cybercrime in the campus. (b) To measure the victims of cyber crimes (c) To identify other promoted crime. (d) To identify the effect of cyber crime in this campus. (e) To determine about relationship between cybercrime and Internet users.

1.4 .Limitation of the study

The study is only based on empirical findings gathered through survey because of the unavailability and inaccessibility of data source. Sometimes respondent are not communicate and avoid some uncertain question. Respondent are not agree to give


information in short period. The survey is limited to sampled respondents. For time limitation, the scope of the study is limited and other factor influence for retraining data collection. The study intends mainly to focus on present status of cybercrime and its effect on youths. Unavailability of information and small sample size are the major limitations of the study to interpret the research topic. Sometimes respondent has inadequate knowledge about this topic. The analysis of the findings is only based on some tools like percentage, frequency distribution, graphs, cross tabulation etc.

Chapter Two 2.1. Literature Review The book Cybercrime: vandalizing the information society allows us look at the problem of cybernetic crime from a more disengaging position. The author states in the preface that the book is intended as an introduction to the topic of crimes that occur in the Internet. Although the term cybercrime is usually restricted to describing criminal activity in which the computer or network is an essential part of the crime,


this term is also used to include traditional crimes in which computers or networks are used to enable the illicit activity. *

Examples of cybercrime which the computer or network is a tool of the criminal activity include spamming and criminal copyright crimes, particularly those facilitated through peer-to-peer networks.

*

Examples of cybercrime in which the computer or network is a target of criminal activity include unauthorized access (i.e, defeating access controls).

*

Examples of cybercrime in which the computer or network is a place of criminal activity include theft of service (in particular, telecom fraud) and certain financial frauds.

Face book Increasing cybercrime Hacking is not unknown to us. Now hacking is the major issue in the hole world. Hacker are associated with other in a fair. In 2009, a fair of the cyber hacker arranged for this reason hacking tendency grow rapidly. Besides hacking another criminal tendency increase day by day. In this column categories different patterns of cyber crime like stock spam, DDos, shooting, internal data theft, hacking face book ID, adware, use pirate software and describe the nature and the consequence of cybercrime. This is the feature of this column which is use in this research. ( Asrarful Alam (9 September 2011, Daily caller khontho)

According to a study performed by Shirley(11 August 2003) , a specialist in psychology of the University of San Francisco, the majority of teenagers who hack and invade computer systems are doing it for fun rather than with the aim of causing harm. Shirley McGuire mentioned that quite often parents cannot understand the motivation of the teenage hackers. She performed an anonymous experiment, questioning more than 4,800 students in the area of San Diego. Her results were presented at the American Psychological Association conference: *

38% of teenagers were involved in software piracy;


*

18% of all youngsters confessed of entering and using the information stored on other personal computer or website;

*

13% of all the participants mentioned they performed changes in computer systems or computer files. (APA,2003)

(Net: http://www.iap.nl.com/speeches_annual_conference_2003_ Washington/investigating cybercrime_related_offences_speech_by_han_bong_jo.html)

Microsoft Research: Cybercrime Surveys are Useless Barely a week goes by that woeful statistics on the proliferation of cyber crime don't make headlines in the trade and mainstream press. But a new study by Microsoft Research finds that many of those surveys are as rife with catastrophic statistical errors as to make their conclusions almost useless. Cyber crime surveys are “so compromised and biased that no faith whatever can be placed in their findings," said the paper's authors, Microsoft researchers Cormac Herley and Dinei FlorĂŞncio.

A number of issues that negatively impact cybercrime surveys, among them: finding survey populations that represent the general public, the relative rarity of cybercrime incidents, especially when balanced of against the huge volume of legitimate online activity, and the effect of so-called "outlier" incidents that can create catastrophic statistical errors, Microsoft said. (Brian Donohue, Paul Roberts; 2001) Crime and the Internet The Internet is one of the greatest sensations of recent times. It has become a symbol of our technological ingenuity and offers humankind an awesome array of benefits. However, the thrill of those prospects has been accompanied by public fears about the


potential scale of criminal opportunities that can arise. Fears, which, in the absence of reliable information to the contrary, have been nurtured and sustained by media sensationalism. Yet, our practical experience of the Internet is that few of these fears have actually been realized. Furthermore, there is clearly emerging a body of evidence to show that the criminal reality of the Internet is not the all engulfing “cybertsunami�, but, like the terrestrial world, a large range of frequently occurring smallimpact crimes. One could argue that criminologists have been slow to explore these emerging fears and new criminal behaviors, and engage in debate about them in order to develop useful bodies of knowledge that could enlighten the public and provide the basis for informed policy. In the criminologists' defense, however, it could be argued that there is wisdom in exercising caution and in waiting for reliable trends of behavior to emerge. But in the first years of the new millennium, the questions about what cybercrimes are, what their impact will be and how we should respond to them remain largely unanswered: the time for understanding is now. (David S. Wall, 2006)

The Computer Software Copyright Act of 1980 In the best tradition of most books on information society, this one opens with the description of the development of information society and the spread of the Internet from the very beginning.. The concrete terms defining patent and copyright laws made it difficult to determine where computer software fit in the picture until the Computer Software Copyright Act of 1980. This act copyrights software as a 'literary work.' (Forester, 32). Software piracy has been commonplace since data storage systems for computers, such as floppy disks and hard drives, became readily available to the public. Today, the more publicized cases of software piracy usually focus on businesses sharing a few copies of software for many computers and overseas piracy rings who copy and resell software that is either outrageously expensive or unavailable in these countries


Spam is a crime in which bulk email is sent out unsolicited for commercial purposes. Laws prohibiting spam have been in place in some form for quite some time, but specific laws making spam illegal (anti-spam laws) are quite new. Cyber crime… and Punishment The growing danger from crimes committed against computers, or against information on Computers, is beginning to claim attention in national capitals. In most countries around the world, however, existing laws are likely to be unenforceable against such crimes. Self-protection, while essential, is not sufficient to make cyberspace a safe place to conduct business. The rule of law must also be enforced. Countries where legal protections are inadequate will become increasingly less able to compete in the new economy.

As cyber crime increasingly breaches national borders, nations

perceived as havens run the risk of having their electronic messages blocked by the network.

This report analyzes the state of the law in 52 countries. It finds that only ten of these nations have amended their laws to cover more than half of the kinds of crimes that need to be addressed. It is clear that a great deal of additional work is needed before organizations and individuals can be confident that cyber criminals will think twice before attacking valued systems and information. (Source by McConnelInternational;CYBERCRIME…AND PUNISHMENT? 1999)

Bangladesh perspectives of cybercrime and its effects On 23 August 2004 an email was sent to Bengali newspaper “The Daily Prothom Alo” threatening to kill Sheikh Hasina , the praiminister of Bangladesh government


and two day later on 25 August 2004 another email were sent to the Bangladesh Police Headquarter threatening via email.( Daily ittefaq April 11,2010)

One of the recent researches showed that a new cybercrime is being registered every 10 seconds in Britain. During 2006 the computer crooks were able to strike 3.24 million times. Some crimes performed on-line even surpassed their equivalents in real world. In addition, experts believe that about 90% of cybercrimes stay unreported.

2.2. Conceptual framework

Cybercrime Types

Threatening via E-mail pornography

Frauding

Creaking Software’s or piracy

Unauthorized access Mailing and transmitting videos Warning Rationally destroy data

online


Complex in operating system Effects on youths

Personal Psychological victims Morale disorder offender Relationship breaks down Role frustration Reduce productivity

Social/ cultural

Economical

Break social harmony

Economic loss of

Isolated from the society

Gain pleasure by

Grow different subculture Status frustration Damage reputation

Loss of time

Data theft, mail threatening, Online pornography watch, Eve-teasing A conceptual framework is used in research to outline possible courses of action or to present a preferred approach to an idea or thought. Conceptual frameworks (theoretical frameworks) are a type of intermediate theory that attempt to connect to all aspects of inquiry (e.g., problem definition, purpose, literature review, methodology, data collection and analysis). Conceptual frameworks can act like maps that give coherence to empirical inquiry. Because conceptual frameworks are potentially so close to empirical inquiry, they take different forms depending upon the research question or problem. It is a group of concepts that are broadly defined and systematically organized to provide a focus, a rationale, and a tool for the integration and interpretation of information. Usually expressed abstractly through word models, a conceptual framework is the conceptual basis for many theories, such as communication theory and general systems theory. Conceptual frameworks also provide a foundation and organization for the educational plan in schools of nursing. Cybercrime is one kind of criminal activities created by the people. In this conceptual framework here first show the concept cybercrime. Then show the types 0f cybercrime. Then show how commits cybercrime. There are several effects of effects on the youths. Like social/cultural, economical and personnel. Where lock some factor


to influence to commit this crime. And this research found that cybercrime creates other forms of crime. From these happened cybercrime and its effects is the main focus of this research.

2.3. Theoretical framework Cyberspace presents an exciting new frontier for criminologists. Virtual reality and computer mediated communications challenge the traditional discourse of criminology, introducing new forms of deviance, crime, and social control. As such, very few theoretical explanations of cyber crime exist. Routine Activity Theory According to Lawrence Cohen and Marcus Felson, a crime occur only if there is someone who intends to commit a crime (likely offender), something or someone to be victimized (a suitable target) and no person present to prevent or observe the crime ( the absence of a capable guardian).(Cohen & Marcus 7919: 590-595) In this study, using this approach because of the component which effects to commit computer crime and modus oparendi to be use.( Adler, Mueller, Laufer; 2004) Subculture Theory


A subculture may be defined as a group that maintains a distinctive set of values, norms, and lifestyles which sometimes differs from the overall culture of the society. Cloward and Ohlin have identified three major types delinquent subculture: the criminal, the conflict, the retreats. Conflict subculture is found in areas where there is no alliance between the criminal and the conventional elements. This subculture features violence and/ or threat of violence as method of getting status. (Ram Ahuja, 1996 ) Differential association Theory The late Edwin H. Sutherland is widely recognized as the most important criminologist of twentieth century. He is best known for formulating the ‘differential association’ theory. Sutherland presented differential association primarily as a processual theory of how individual comes to commit crimes. His theory also has a structural dimension which included statements proposing that conflict and social disorganization are the underlying causes of crime, because they determine the pattern of differential association. (Roland L. Akers; 1920- 1993) Some researchers have tried to explain cybercrimes with traditional theories, such as Social Learning Theory ( Skinner and Fream 1997; Rogers 1999; 2001), Kohlberg’s Moral Development Theory and Differential Reinforcement Theory ( Rogers 2001 ), Cohen’s Strain Theory ( O’ Connor 2003 ), Deindividuation Theory ( Demetriou and Silke 2003 ), Gottfredson and Hirschi’s General Theory of Crime ( Foster 2004 ), and multiple Theories ( McQuade 2005; Tylor et.al 2005; Drain et. al 2006 ). However, these theoretical explanations were found to be inadequate as an overall explanation for the phenomenon of cybercrimes, because cybercrimes are different from crime of physical space. The Space Transition Theory There is a need for a theory for the cybercrimes. Therefore, this paper is directed at theory building for the explanation of criminal behavior in the cyberspace, and presents the Space Transition Theory. “Space Transition Theory” is an explanation


about the nature of the behavior of the persons who bring out their conforming and nonconforming behavior in the physical space and cyberspace ( Jaishankar 2008 ). Space Transition involves the movement of persons from one space to another. ‘Space Transition Theory’ is developed in order to explain the causation of crimes in the cyberspace. Space Transition Theory is published in a book title “crimes of the Internet” edited by Frank Schmalleger & Michael Pitaro, published by Prentice Hall (2008: 283-301). In this study, emphasize the criminal behavior which spread out from unfortunately when one person is engage in computer network or internet.

2.4. Working Definition What is this cybercrime? We read about it in newspapers very often. Let’s look at the dictionary definition of cybercrime: “It is a criminal activity committed on the internet. This is a board term that describes everything from electronic cracking to denial of service attacks that cause electronic sites to lose money”. Youth means the age groups are belongs to 18-25 years Computer crime, or cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Net crime refers to criminal exploitation of the Internet. Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime has become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. Computer crime has been defined as ‘any illegal act fostered or facilitated by a computer, whether the computer is an object of a crime, an instrument used to commit a crime, or a repository of evidence related to a crime’. Some of the most prominent types include online pornography, Software piracy and network security breaches.


Chapter Three 3. Methodology of the study Methodology is a system of explicit and procedures upon which research is based and against which claims for knowledge are evaluated. Methodology contains the all process of the study. In methodology discuss the process area of selection, population and sample selection, data collection methods and techniques, and data analysis techniques.

3.1. Study Area This research work is related with cybercrime its effects on youths. For starting on this study need appropriate field that can response to the question paper. Given priority on these matters purposively choose Mawlana Bhashani Science And Technology University, Tangail as a study area. There are some reasons to choose this university as this study area. Most of them are belong is this study in here. So, huge amount data are available.

3.2. Sampling Design


The entire set of relevant units of analysis, or data is called the population. In this research the populations are those who may relate the research in the students of MBSTU. Here, a large number of students in this university. For this research accuracy and to saving time, it was not possible to study in a large number of populations. So a sampling was needed to do a meaningful work & to find out proper findings. Here population was not known, so non probability sampling was used. For this reason, Purposive sampling that is a process where sampling a sample based on prior experiences with the population of interest.

3.3. Data Collection Method Survey method is used in this research for data collection. Sample Survey method is common features of this Survey. A questionnaire was obtained with some questions which collected by interview survey. Then the respondents are asked those questions to answer. The answers given by the respondents were noted in the questionnaire form.

3.4. Data Processing After the collection of data I edit the data. In the time of data collection I use openended and close-ended questionnaire in interview schedule questionnaire. After collection the data, all finding data convert to coding. And through this coding I make this questionnaire as close-ended questionnaire.

3.5. Data Analysis In data analysis, analyze this data through SPSS Program in computer. Here at first analysis this data by univariate analysis for describing data with frequency distributions and graphic presentation such as pie chart, bar chart, histogram. Then analyze the data by bi-variate analyzes with cross tabulation.


Chapter Four

4. Research findings 4.1. Socio- demographic analysis Demography is the statistical study of human population. It can be a very general science that can be applied to any kind of dynamic human population, that is, one that changes over time or space (see population dynamics). It encompasses the study of the size, structure and distribution of these populations, and spatial and/or temporal changes in them in response to age, sex, religion, social status, educational qualification. The term demographics refers to characteristics of a population Demographic analysis can be applied to whole societies or to groups defined by criteria such as age, sex, family status, education, religion. Institutionally, demography is usually considered a field of sociology, though there are a number of independent demography departments. Formal demography limits its object of study to the measurement of population’s processes, while the broader field of social demography population studies also analyzes the relationships between economic, social, cultural and biological processes influencing a population. Demographic profiling is essentially an exercise in making generalizations about groups of people. As with all such generalizations many individuals within these groups will not conform to the profile - demographic information is aggregate and probabilistic information about groups, not about specific individuals. Critics of demographic profiling argue that such broad-brush generalizations can only offer such limited insight and that their practical usefulness is debatable. However, if the conclusions drawn are statistically valid and reproducible, these criticisms are not as well founded.


Most demographic information is also culturally biased. The generational cohort information above, for example, applies primarily to North America (and to a lesser extent to Western Europe) and it may be unfruitful to generalize conclusions more widely as different nations face different situations and potential challenges

Table 4.1.1: Age of the respondent

Age

Frequency

Percent

18-20 years

15

18.8

21-22years

11

13.8

23-24years

49

61.3

25-27 years

5

6.3

Total

80

100.0

Age is one of the important demographic characters. Age may refer to: the length of time that an organism has lived. In this research found that respondent age limit belongs to 18-27 which is defined as youths. The present study, in this table we can see that there are about 18.8(percent) belong in the age group of 18 - 20 years and 13.8(percent) of them are 21-22 years, and 61.3(percent) of them are belong 23 - 24 and 6.3(percent) of them are belong 25-27of all respondent. This study shows that highest amount of crime were committed or related or faced by the age group. This study shows that highest amount of crime were committed or related or faced by the age group of 23-24 in the society.


Chart 4.2.1: sex of the respondent

Figure: Sex of the respondent

Males are more involved in outside activities. For these reasons male have more possibility than female to get contact with crime and show criminality. It is recognized that the rate of crime is high than female. From this chart we can see that there are 64(Percent) respondents out of 100 are male and 36(Percent) respondents out of 100 are female of total respondent (show above figure).

Table 4.1.2: Religion of the respondent

Religion

Frequency

Percent

Islam

65

81.3

Hindu

15

18.8

Total

80

100.0

From this table we can see that there are 81.3(Percent) respondents out of 100 are Islam and 18.8(Percent) respondents out of 100 is Hindu of total respondent. Here we can see that respondent is heterogeneous characteristics.


Table 4.1.3: Living place of the respondent Living place

Frequency

Percent

Mess

23

28.8

Home

5

6.3

University hall

51

63.8

others

1

1.3

Total

80

100.0

In this table we can see that there are 28.8(Percent) respondents out of 100 are living in mess and 6.3 (Percent) respondents out of 100 are living in home and 63.8 (Percent) respondents out of 100 are living in university hall and 1.3(Percent) are living other place of total respondent Table 4.1.4: Guardian's occupation Guardian's occupation

Govt. employer Non-govt. employer Business Teacher Farmer Others Total

Frequency

Percent

23 5 15 11 9 17 80

28.8 6.3 18.8 13.8 11.3 21.3 100.0

In this table we can see that there are 28.8(Percent) respondents out of 100 where their Guardian's occupation was govt. employer and 6.3 (Percent) are non-govt. employer


and 18.8 (percent) are business men and 13.8 (percent) are teacher and 11.3 (percent) are farmer and 21.3 (percent) other occupation of the respondent.

Chart 4.2.2: Monthly expenditure of the respondent.


Figure: Monthly expenditure of the respondent

Monthly expenditure shows t he economic status of one society which is associated with the Development of technology and sometimes may increase the scope of cyber criminality and victimization. In general tradition, crime patterns depends on their economic condition. In this research, show that monthly expenditure sometimes influence individual to commit cybercrime. In this figure we can see that most of the respondents are monthly expend 3000-3500 taka and comparatively fewer respondents expend monthly 5000-5500 taka and other respondents are monthly expend less 2000 taka.

Table 4.2.1: Types of net connection are you chosen. Use net

Types of net

Frequency

Percent


Yes

Modem

38

47.5

With mobile

41

51.3

Others

1

1.3

80

100.0

Total

In this table we can see that there are 47.5% respondents out of 100 are use modem for browsingand51.3% respondents out of 100 are use mobile for net browsing and 1.3% respondents out of 100 are use other way for net browsing of total respondent.

Table 4.2.2: Reason for like this connection. Like this connection

Frequency

Percent

High speed

14

17.5

Small disturbance of connection

10

12.5

Lower cost

17

21.3

Specific time to use

18

22.5

Both

21

26.3

Total

80

100.0

The study found that there are 17.5% respondents out of 100 are like this connection for high speed and 12.5% respondents out of 100 are like this connection for small disturbance of connection and 21.3% respondents out of 100 are like this connection for lower cost and 22.5% respondents out of 100 are like this connection for specific time to use and 26.3% respondents out of 100 are like this connection for both of total respondent.

Table 4.2.3: Purpose of use internet of the respondent. Browse

Frequency

Percent

For study For software

51 1

63.8 1.3


For mail or chatting For share document For others information All of above Total

10 1 3 14 80

12.5 1.3 3.8 17.5 100.0

The study found that there are 63.8% respondents out of 100 are browsing internet for study and 1.3% respondents out of 100 are browsing internet for software and 12.5% respondents out of 100 are browsing internet for mail or cheating and 1.3% respondents out of 100 are browsing internet for share document and 3.8% respondents out of 100 are browsing internet for others information like job market searching and 17.5% respondents out of 100 are browsing internet for all of above of total respondent. Table 4.2.4: Faced or conduct cybercrime and (how and why). face or conduct or relates Yes

how and why

Frequency

Percent

9

11.3

7 9 1 2 52 80

8.8 11.3 1.3 2.5 65.0 100.0

Unnecessary friend request and massages Virus attacks Account hacking Cheat by mail Commit software piracy

No Total

In this study present that net browser are faced or conducted or related of cyber crime. For this question we found that about65.0% are not faced or conducted or related of cyber crime and 11.3% are faced or conducted or related of unnecessary friend request and massage, and 8.8% are faced or conducted or related of virus attacks and 11.3% are faced or conducted or related of account hacking and 1.3% are faced or conducted or related cheat by mail and 2.5% are committed software piracy. Table 4.2.5: Types of crimes are faced or conducted.

face or Crime types conduct or relates Yes unnecessary mail

Frequency

Percent

8

10.0


File theft Use pirate software Online pornography Virus and warm attacks All of above

4 1 1 5 9 52 80

No Total

5.0 1.3 1.3 6.3 11.3 65.0 100.0

In this study present that net browser are faced or conducted or related of cyber crime. For this question we found that about 65.0% are not faced or conducted or related of cyber crime and 10.0% are faced or conducted or related of unnecessary mail and5.0% are faced file theft, and 1.3% are conducted pirates software and 1.3% are faced or conducted or related online pornography and 6.3% are faced virus and warm attacks and 11.3% are faced or conducted or related all of above of total respondent.

Software piracy Software piracy can be defined as "copying and using commercial software purchased by someone else". Software piracy is illegal. Each pirated piece of software takes away from company profits, reducing funds for further software development initiatives. The roots of software piracy may lie in the early 1960s, when computer programs were freely distributed with mainframe hardware by hardware manufacturers (e.g. AT&T, Chase Manhattan Bank, General Electric and General Motors). In the late 1960s, manufacturers began selling their software separately from the required hardware.

Table 4.2.6: Registered or licensed software of the computer. Licensed Yes No Total

Frequency

Percent

26 54 80

32.5 67.5 100.0


Every software should be Registered or licensed in every computer. But unfortunately sometimes it is not possible. So in my research, show statistical view about which person maintain this commitment we will show that about 32.5% respondent are able to registered and about 67.5% respondent are not able to registered or licensed. Chart 4.2.3: software piracy is one kinds of computer crime. Figure: software piracy According to the computer software copyright act of 1980 “software piracy is one kinds of computer crime. For this reason, in my study area most of the respondent about 89% is said yes and 11% are said software piracy was not a crime. Don't use pirated software or distribute commercial software to students or colleagues. It is important that policies go beyond individual classrooms, and that schools / districts develop software management, acquisition and implementation policies

Online pornography Pornography, representation of sexual behavior in books, pictures, statues, motion pictures, and other media that is intended to cause sexual excitement. The word pornography, derived from the Greek porni (“prostitute”) and graphein (“to write”), was originally defined as any work of art or literature depicting the life of prostitutes. Online pornography is define as below(1) the depiction of erotic behavior (as in pictures or writing) intended to cause sexual excitement, (2) material (as books or a photograph) that depicts erotic behavior and is intended to cause sexual excitement, (3) the depiction of acts in a sensational manner so as to arouse a quick intense emotional reaction . Table 4.2.7: Browse online pornography in uncertain mind and feeling after getting pornography on online. Browse online pornography Yes

Feeling Create bad Impacts on mind Feel excitement and get pleasure

Frequency

Percent

9

11.3

13

16.3


Not so good Others

9 4 45 80

No Total

11.3 5.0 56.3 100.0

Browse online pornography is one of the major types of cybercrime. In this study found that about 56.3% respondents are not browse online pornography in uncertain mind and others respondents are browsed online pornography and they share their feeling that is about 11.3% respondent feel its create bad Impacts on mind and 16.3% respondent feel excitement and get pleasures and11.35% respondent feel it’s not so good and 5.0% respondent feel other thinks that not mention by the respondent. Table 4.2.8: Faced or conducted to any virus and warms attack or spam or unnecessary massages and their types. faced or conducted or related to any virus Yes

No Total

Types

Trojan attacks and auto run. Exe. Unnecessary massage and spammed massage Locked or hacking ID Others

Frequency

Percent

28

35.0

16

20.0

3 2 31 80

3.8 2.5 38.8 100.0

In this study present that net browser are faced or conducted or related to any virus and warms attack or spam or unnecessary massages. From this table we found that about 38.8% are not faced or conducted or related to any virus and warms attack or spam or unnecessary massages and 35.0% are faced of Trojan attacks and auto run. Exe. And 20.0% are faced unnecessary massage and spammed massage, and 3.8% are faced ID locked and hacked and 2.5% are faced or conducted or related others of total respondent.


Chart 4.2.4: Faced or threaten or harassed by E-mail.

Figure: harassment by E-mail

A working definition of email harassment might be, "electronic communication via the Internet, intended to belittle, intimidate, abuse, or threaten another." The email harassment might encompass one or multiple categories of legally protected categories, such as sexual harassment, racial, religious, age, or disability harassment. The type of harassment isn't the crux but the mode of harassment-sending harassing messages via email. Threaten or harassed by E-mail is one of the serious factor for increasing cybercrime. So in my research, show statistical view about 25.0% are threaten or faced or harassment by e-mail and 75.0% are not at all.

Chart 4.2.5: Cybercrime is harmful for both user and computer network and their types.

Figure: Types of harms of the respondent

In this study also found that committing cybercrime is harmful for both user and computer network. Where 20.0% said that this crime is not harmful for both user and qqq q

q

qqqqqqqqqq


computer network and other respondent agree that cybercrime is harmful for both user and computer. for

this reason, we show that 12.5% respondent created physical

harms and 16.3% respondent created Mental or psychological harms and 2.5% respondent created social harms and 17.5% respondent are damaged computer and 3.8% respondent are destroyed software and11.3% respondent economically loss and 6.3% respondent are loosed of time and 10.0% respondent are more than one of the above and this will graphically presented below.

Table 4.2.9: Other forms of crime to be committed. commit other forms of crime

Others crime

Yes

Online pornography Defamation Data theft Fraud and cheating Eve-teasing E-mail threatening Robbery and money laundering kidnapping Others

No Total

Frequency

Percent

10 6 13 5 11 4 5 2 5 19 80

12.5 7.5 16.3 6.3 13.8 5.0 6.3 2.5 6.3 23.8 100.0

The study found that cybercrime promote tendency to commit other forms of crime. In this table, we can see that about 23.8% respondent are not believe that cybercrime promote tendency to commit other forms of crime and other respondent believe that cybercrime promote tendency to commit other forms of crime. So, about 12.5% respondent are committed online pornography and 7.5% respondent are committed defamation or harassment and 16.3% respondent are committed data theft and 6.3% respondent are committed fraud and cheating and 13.8% respondent are committed eve-teasing and 5.0% respondent are committed E-mail threatening and 6.3% respondent are committed robbery and money laundering and 2.5% respondent are committed kidnapping and 6.3% respondent are committed others forms of crime.


Chart 4.2.6: Other forms of crime to be committed

Figure: Other forms of crime to be committed

Cybercrime is the latest and perhaps the most complicated problem in the cyber world. “Cybercrime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct situating crime.� Any criminal activity that uses a computer either as an instrumentality, target or means for perpetuating further crimes comes within the ambit of cybercrime. So this figure show that about 16.3% respondent are commit data theft and then 13.8%responden commit eve-teasing and about 12.5% respondent are committed are highest then other forms of crime( show above figure).

Table 4.2.10: Effects create by cybercrime.

Cyber crime affects more than the financial integrity of a business. There are many very real and damaging consequences associated with Internet crime. Understanding the effects of cyber crime is an important first step in comprehending the necessity of security measures on a computer network. Effects are created by cybercrime

Frequency

Percent

Social and mental harassment

29

36.3

Loss of time to study

7

8.8


increase criminal tendency

17

21.3

Virus effect on computer Economic loss Both positive and negative effect

13 6 8

16.3 7.5 10.0

Total

80

100.0

Cybercrime and its effect on the respondent which is the main focus of my study. In this table we can see that there are 36.3% respondents out of 100 are focus on social and mental harassment, 8.8% are focus on loss of time to study, 21.3% are focus on increase crime tendency, 16.3% are Focus on virus effect on computer, 7.5% are focus on economic loss and 10.0% are Both positive and negative effect of the respondent.

Chart 4.2.7: Enacting cyber law strictly (frequency’s percentage).

Figure: Enacting cyber law

Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet. It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression, and jurisdiction. The Study found that most of the respondents about 77 (percent) respondent out of 100 (percent) are agree for enacting cyber law strictly and 23 (percent)) respondent out of 100 (percent) are not agree for enacting cyber law.


4.3. Recommendation of the respondent Recommendation is a suggestion that something is good or suitable for a particular purpose. This research found some recommendation for protecting cybercrime. Some of this recommendation more effective to preventive cybercrime.

Table 4.3.1: Governmental steps to prevent cybercrime.

Governmental steps

Frequency

Percent

Public awareness building

13

16.3

Careful to use net

1

1.3

Enforcing cyber law

46

57.5

Create cyber police

2

2.5

Take proper action

17

21.3

Create monitoring system

1

1.3

Total

80

100.0

Government should take preventive measure to protect cybercrime. Sometimes governmental policy and their awareness building type programmers are effective to prevent these types of crime. In this table we can see that the respondent thinking about the measure should be taken by government to prevent this criminal tendency. Here about 16.3% respondent was said about public awareness building, 1.3% said careful to internet, 57.5% said about enforcing cyber law, 2.5% said to create cyber police, 21.3% said for take proper action and 1.3% said to create monitoring system for protecting cybercrime.


Table 4.3.2: General people should work to protect this criminality.

General people work

Frequency

Percent

Awareness building

46

57.5

Increase humanity

8

10.0

Work safely and carefully

13

16.3

Develop their mind

7

8.8

Consciousness must be grow

6

7.5

Total

80

100.0

Sometimes general people work together for protecting this criminality. Remove criminal tendency is not individual consciousness of the society; sometimes it is a group task and create awareness among this criminal tendency. In this table we can see that the respondent thinking about the measure should be taken by general people to protect this criminality. Here about 57.5% respondent was said about awareness building, 10.0% said increase humanity, 16.3% said about work safely and carefully, 8.8% said to develop their mind, and 7.5% said Consciousness must be grow for protecting cybercrime.

4.3.3: Suggestion to criminal justice system to prevent cybercrime.


Criminal justice system steps

Frequency

Percent

Implementation law properly

18

22.5

Punished strictly

26

32.5

Creating cyber policing system

20

25.0

Modifying CJS system

7

8.8

Increase protection

9

11.3

Total

80

100.0

Criminal justice system refers to the collective institutions through which an accused offender passes until the accusations have been disposed of or the assessed punishment concluded. The criminal justice system consists of three main parts: (1) law enforcement (police, sheriffs, marshals); (2) adjudication (courts which include judges, prosecutors, defense lawyers); and (3) corrections (prison officials, probation officers, and parole officers). In a criminal justice system, these distinct agencies operate together under the rule of law and are the principal means of maintaining the rule of law within society. Normally, the first contact an offender has with the criminal justice system is through police who investigates a suspected wrong-doing and make an arrest. Next is the court, where disputes are settled and justice is administered. In the U.S. guilt or innocence is decided through the adversarial system. If the accused is found guilty s/he turned over to the correctional authorities from the court system In this table we can see that the respondent thinking about the measure should be taken by criminal justice system to prevent cybercrime. Here about 22.5% respondent was said about Implementation law properly, 32.5% said punished strictly, 25.0% said about creating cyber policing system, 8.8% said modifying Criminal justice system and 11.3% said for increase protection for protecting cybercrime.

Chart 4.2.8: Suggestion to criminal justice system to prevent cybercrime.


Figure: Suggestion to criminal justice system to prevent cybercrime. According to the respondent opinion we can see that criminal justice system should be punished strictly where respondent respond about 28 respondent for protecting this crime and comparative low respond to create cyber policing system i.e. about20 respondent respond and few about 7 respondent respond for modifying CJS system. (Show figure07)

Table 4.3.4: Responsibilities of the website owner to protect cybercrime.


responsibilities of the website owner

Frequency

Percent

Improve security system Create Anti-hacking website

30 6

37.5 7.5

Building monitoring system

13

16.3

Prone website should be blocked

12

15.0

Protect their website by using password

19

23.8

Total

80

100.0

The responsibilities of the website owner is restraint hacker, improve security system, building monitoring system and to protect website by using password for protecting cyber crime. All web site developers should be aware of the importance of copyright. All creative work is copyrighted as soon as it is put into tangible form, regardless of whether it displays a notice or not. If you do not have permission from the copyright holder, do not put copyrighted material on your web site. In this table we can see that the respondent thinking about the responsibilities of the website owner to protect cybercrime. Here about 37.5% respondent was said about Improve security system7.5% said Create Anti-hacking website, 16.3% said about Building monitoring system, 15.0% said Prone website should be blocked and 23.8% said for Protecting their website by using password for protecting cybercrime. So, do not assume that something is in the public domain simply because you see it on someone else’s site. If you are not sure, don’t use it! Faculty members using copyrighted material under Fair Use guidelines should password protect that material.

Table 4.3.5: Respondents opinion for protecting cybercrime.

Recommendations

Frequency

Percent


Make and implementation of cyber law

14

17.5

Use cyber security system

2

2.5

use safely and carefully

10

12.5

Reward punishment

3

3.8

Awareness building

51

63.8

Total

80

100.0

In this research found that respondent opinion was measurable for protecting cybercrime. Sometimes recommendation or opinion is good or suitable for purpose. In this table also give the information about the own opinion to protect this crime. Here about 17.5% respondent was said make and implementation of cyber law, 2.5% said use cyber security system, 12.5% said use safely and carefully, 3.8% said reward punishment and 63.8% said about awareness building for protecting cybercrime.

Cross tabulation 01: Types of harms are creating Vs harmful for both user and computer network. Types of harms are create Vs harmful for both user and computer network Types of harms are create

N/A Physical

Frequency (Percentage)% Frequency

Harmful for both user and computer network Yes No 2 14 3.1% 87.5% 10 0

Total 16 20.0% 10


Mental/psychological Social Damage computer Destroy software economic loss Time loss Above more than one Total

(Percentage)% Frequency (Percentage)% Frequency (Percentage)% Frequency (Percentage)%

15.6% 11 17.2% 2 3.1% 14 21.9%

.0% 2 12.5% 0 .0% 0 .0%

12.5% 13 16.3% 2 2.5% 14 17.5%

Frequency (Percentage)% Frequency (Percentage)% Frequency (Percentage)% Frequency (Percentage)% Frequency (Percentage)%

3 4.7% 9 14.1% 5 7.8% 8 12.5% 64 100.0%

0 .0% 0 .0% 0 .0% 0 .0% 16 100.0%

3 3.8% 9 11.3% 5 6.3% 8 10.0% 80 100.0%

In this cross table we can see the relationship between types of harm and harmful for both user and computer network. From this table it can be seen that the respondents who said cyber crime create physical harm, they all (15.6%) said cyber crime is harmful for both user and computer network. Respondents who said the harm is mental or psychological, from them 17.2 percent said cyber crime is harmful for both user and computer network. Respondents who said the harm is social, they all (3.1%) said cyber crime is harmful for both user and computer network. Respondents who said that harm is damaging computer, all of them 21.9 percent said cyber crime is harmful for both user and computer network.

All of the respondents who said harm is destroy software, they (4.7 %) said cyber crime is harmful for both user and computer network. All of the respondents who said harm is economic loss, they (14.1%) said cyber crime is harmful for both user and computer network. All of the respondents who said harm is time loss, they (7.8%) percent said cyber crime is harmful for both user and computer network. Respondents who said cyber crime create more harms, they all (12.5%) said cyber crime is harmful


for both user and computer network. Here 20 percent data is N/A because the respondents give answer No for the question of cyber crime in harmful. This study show that maximum respondents said cyber crime is harmful for both user and computer. Who also said damage computer is the main harm of cyber crime.

Cross tabulation 02: Internet user Vs faced or conducted different types of crimes

Cross tabulation

faced or conducted different types of crimes Not faced or cond uct

unnece ssary mail

File theft

Use pirate softwar e

Onlin e porno graph y

Virus and warm attack s

Total All of abov e


Interne t user

Total

Ye s

frequency

52

8

4

1

1

5

9

80

percentag e%

65.0 %

10.0%

5.0 %

1.3%

1.3%

6.3%

11.3 %

100.0 %

frequency

52

8

4

1

1

5

9

80

percentag e%

65.0 %

10.0%

5.0 %

1.3%

1.3%

6.3%

11.3 %

100.0 %

In this cross tabulation, we can see the relation between two variable this are internet user and faced or conducted different type of crime where found that about 65.5% respondent are not faced or conducted or related to this crime and other respondent are faced or conducted or related to cyber crime. This table also show that about 10.0% respondent faced on unnecessary mail and 5.0% respondent faced on file theft and 1.3% respondent are conduct software piracy and1.3% respondent are faced on online pornography and6.3% respondent faced on virus and warms attacks. And here 11.3% respondent are faced on unnecessary mail, file theft ,online pornography, virus and warms attacks.

Chapter Five 5.1. Conclusion Now-a-days cybercrime is a newly developed crime and the patterns and nature of this crime is increasing broadly around the world. So the issue of cyber security must get priority and ensure protection in every level of cyber user. In this study present that net browser are faced or conducted or related to any virus and warms attack or spam or unnecessary massages. From this study we found that about 38.8% are not faced or conducted or related to any virus and warms attack or spam or unnecessary massages and 35.0% are faced of Trojan attacks and auto run.


Exe. And 20.0% are faced unnecessary massage and spammed massage, and 3.8% are faced ID locked and hacked and 2.5% are faced or conducted or related others Cybercrime and its effect on the respondent which is the main focus of my study . This study found that most of respondent said cyber crime create social and mental harms and they believe that cyber crime create criminal tendency and sometime create economic crisis of the respondent so we can say that cyber crime has both positive and negative effect of the respondent. The study also found that cybercrime promote tendency to commit other forms of crime like online pornography, defamation or harassment, fraud and cheating, Internet data theft, eve-teasing, email threatening, and forms of crime. Finally cyber crime and its effects are more concerning issue in present days, so we must concern about this issue and protect other who committed cybercrime by increasing awareness about the bad impact of cyber crime among the youths.

5.2. Recommendation The introduction of new technologies always presents an initial challenge for law enforcement agencies should take proper action and build punishment system. Government should take proper action about protecting cybercrime And general people should be taken remedial measure like work safely and carefully, increase awareness building, develop their mind and consciousness building for protecting this criminality. Given the responsibilities of the website owner or authorities in protecting their sites by improving security system, using password and building monitoring system. In this study area found that maximum respondent argue that cyber crime can protect by awareness building and developing policing system and rewarding punishment.

Prevention is undoubtedly, better then cure. So he recommendation should-


 Government should employed cyber security expert people for protecting cyber

crime and consequences.  The security system of the website should provide by website authorities.  Cyber law should be enacted in our country and should ensure every net browser

obey this law strictly.  The internet facilities in this area should be ensured and monitoring by using

detecting system.  The student should be awarded about cybercrime.  The student should be taught safely use and carefully operate computer and

internet.  The student should be developing their mind and avoided this crime committing

tendency and created humanity.  Take proper action to computer abuser and give proper treatment method for

preparing law abiding citizen.  Government should be enacted cyber law and implement this in every spear of life.

By this way, we can solve this criminal tendency easily and swiftly.

5.3. References Adamski A. (1998), Crimes Related to the Computer Network. Threats and Opportunities: A

Criminological Perspective. Helsinki, Finland: European Institute

for Crime Prevention and Control, affiliated with the United Nations (HEUNI).Retrieved on December 15 2006, from http://www.ulapland.fi/home/oiffi/enlist/resources/HeuniWeb.htm Adler, Freda (2004), “Criminology” fifth edition . New York; Mcgraw-Hill217-219.


Akers, Ronald L. (1994), “Criminological theories” University of Florida; Roxbury Publishing company. “A Global Survey of Cybercrime Legislation”, International Legal Instruments, (2004), http://www.cybercrimelaw.net/tekster/international_agencys.html. Bohm, Robert M.; Haley Keith N. (2005), “ Introduction to Criminal Justice” (fourth edition) New York; Mcgraw-Hill. Baker Therese L. (1999), “Doing Social Research” Third

edition . Singapore;

Mcgraw-Hill. “Convention on Cybercrime”, European Treaty Series - No 185, Council of Europe,

Cyber Crime…And Punishment? Archaic Laws Threaten Global Information”, a report prepared by McConnell International “Cybercrime”, Mingail S., Canada Law Book Inc., 2003, http://www.canadalawbook.ca/headlines/headline317_arc.html

Cyber Millennium Challenges And Opportunities,A.P.H.Publishing Corporation Chris Reed and John Angel,fourth edition,universal law publishing co.pvt.ltd

Computer Crimes Act 1997 (Malaysia), 09 0ctomber 2007 www.laweddie.com/wordpress/current-cyber-laws-in-malaysia

Computer Misuse Act (of Singapore) Cybercrime Act 2001 (Australia)


“C.5 Criminal Aspects of Cyberspace (Girasa, 2002)”, http://telecomm.boisestate.edu/ntcomm405.fall.2003/Presentations/C5_CyberCrime.ht m David & Chava Frankfort Nachmias (1996), “Research Methods in the Social Sciences” fifth edition, British Library Cataloguing in Publication Data, New York . Debra Littlejohn Shinder,

“Jurisdictional Issues and other Special Problems in

Enforcing and Prosecuting”, MCSE Freedman

B.

J.

“The

Cybercrime”,10December2001,

Council

of

Europe

Convention

on

http://www.cle.bc.ca/CLE/Analysis/Collection/01-

internetcybercrime? practiceAreaMessage=true&practiceArea=Criminal Law Geese G. Z. (2003), “The State of the Law on Cyber jurisdiction and Cybercrime on the Internet”, California Pacific School of Law. Han “Investigation and Prosecution of Terrorist-related Offences Involving Use of the Internet”. Hudson A. Barbara: Understanding Justice; an introduction to ideas perspectives and controversies in modern penal theory. http://www.en.wikipedia.org/wiki http://www.ncsl.org/public/governn/htm http://www.ncsl.org/programs/lis/cip/cyberterrorism.htm/ http://www.wikipedia.co.in . http://www.iap.nl.com/speeches_annual_conference_2003_washington/investigating_t errorism_related_offences_speech_by_han_bong_jo.html

Ian Walden,computer crimes and investigations,publication:oxford university press


Jaishankar K. (2007). Cyber Criminology: Evolving a novel discipline with a new journal. International Journal of Cyber Criminology, Vol 1 Issue 1 January 2007.Retrieved on March 15 2007, from http://www40.brinkster.com/ccjournal/editorial.htm Jewkes Yvonne (2006). Comment on the book 'Cyber crime and Society by Majid Yar, Sage Publications. Retrieved on December 15 2006, from http://www.sagepub.co.uk/booksProdDesc.nav?prodId=Book227351

Kothari C. R.; “Research Methodology”: Methods & Techniques; second edition. Littlewood, A. (2003) ‘Cyberporn and moral panic: an evaluation of press reactions to pornography on the internet’, Library and Information Research, 27(86), 8–18. “Malaysian Law and Computer Crime”, Chong Yew, Wong, GSEC Practical Assignment v1.2f Maxfield Michael G.; Babbie Earl: Research Methods for Criminal Justice and Criminology` National Cyber Security Alliance. “Cyber Bullying and Harassment ” (accessed April 25, 2010) Oyesanya F., (2004)“Nigeria: Haven for Terrorist Internet Communication?”, 4 August 2004, http://www.nigeriavillagesquare1.com/articles/femi_oyesanya/oyesanya.html Paranjape N.V. (2005), “Criminology and Penology” (Twelfth edition) Central law publication. Reffer Pavan Dugal,Cyberlaw-The Indian Perspective ,Reprint Second Edition


“Regional Working Parties”, http://www.interpol.int/Public/TechnologyCrime/WorkingParties/ Severino H. Gana (2006)“Prosecution of Cybercrimes Through Appropriate Cyber Legislation in The Republic of Philippines”, a white paper prepared by, Jr., Assistant Chief State Prosecutor, Department Of Justice, Republic Of Philippines.

Senna Joseph J; Siegel Larry J.“Introduction to Criminal Justice”. Thomas, D. and Loader, B. (2000) ‘Introduction – cyber crime: law enforcement, security and surveillance in the information age’, in: D. Thomas and B. Loader (Eds.), Cyber crime: Law Enforcement, Security and Surveillance in the Information Age,London: Routledge. United States Computer Emergency Readiness Team. “Dealing with Cyberbullies ” (accessed April 25, 2010)

Williams P.“Organized Crime and Cybercrime: Synergies, Trends and Responses”, http://www.iwar.org.uk/ecoespionage/resources/state/internet-crime.htm.


Appendix 01 Mawlana Bhashani Science & Technology University Santosh, Tangail -1902. Research topic: Cyber Crime and Its effects on youth. An empirical study on MBSTU. Questionnaire

Respondent ID Part A: Socio-demographic characteristic  Age :  Sex:

1) Male  Religion: 1) Islam

2) Female. 2) Hindu

3) Christian

4) Buddhist

5) Others

4. Which Department is you study? 1) CSE 2) ICT 3) TE 4) BGE 5) CPS 6) ESRM 7) FTNS 8) Chemistry 9) Physics 10) Mathematics 11) Statistics 12) BBA 5. What is your academic year? 1) First Year 4) Fourth Year

2) Second Year 5) Fifth Year.

3) Third Year

6. Which semester you study in? 1) First Semester 2) Second Semester 7. Family status: 1) Lower class

2) Middle class

3) Higher class

4) Others


8. Living place: 1) Mess

2) Home

3) University hall

4) others

9. Monthly expenditure: 10. Guardian’s occupation: 1) Government employer 2) Non-Government employer 3) Business 4) Teacher 5) Farmer 6) Others

Part B: Subject related Question 11. Do you know about internet? 1) Yes

2) No

12. If yes, what type of net are you connected? 1) Broad band

13. Why like this connection? 1) High speed 3) Lower cost above.

2) Modem

3) With mobile

4) Others

2) Small disturbance of connection 4) Specific time to use 5) all of the

14. What types of information are browse? 1) For study 3) For mail or chat

2) For software 4) For share documents

5) For others information (such as job or scholarship searching) 15. Do you know about Cybercrime or computer crime? 1) Yes

2) No


16. Are you face or conduct or related of this crime?  Yes

2) No

17. If yes, how and why? ………………………………………………………………………………… … 18. If yes, what types of crime are Unnecessary mail

2) File theft 3 ) Use pirates software 4) Online pornography 5) Virus& warms attack 6) both 19. In your computer all software are registered or licensed? 1) Yes 2) No 20. Do you know software piracy is one kinds of computer crime? 1) Yes

2) No

21. Do you ever browse online pornography in uncertain mind?  Yes

2) No

22. If yes, what is your feeling after getting pornography on online? ………………………………………………………………………………… …… 23. Have you faced or conducted or related to any virus & warm attack or spam or unnecessary massage? 1) Yes 2) No 24. If yes, what types? ……………………………………………………………………………….. 25. Have you faced or threaten or harassment by E-mail? 1) Yes

2) No


26. Do you believe that committing this crime is harmful for both user and computer network? 1) Yes 2) No 27. If yes, what type of harms are_? 1)………………………...... 2)………………………….. 3)……………….................. 4)…………………………. 5)………………………….. 28. Do you believe that this crime promote tendency to commit others forms of crime? 1) Yes

2) No

29. If yes, what types of crime to be committed? 1)………………………...... 2)………………………….. 3)……………….................. 4)…………………………. 5)…………………………..

30. What types of effects are created by cybercrime? …………………………………………………………………………………. 31. Do you believe that Cyber law should enacted strictly in our country? 1) Yes

C. Recommendations:

2) No


32. What measures should be taken by the government to prevent this criminal tendency? ………………………………………………………………………………… ………………………………………………………………………………… ………… 33. What measures should be taken by general people to prevent this criminality? ………………………………………………………………………………… ………………………………………………………………………………… ………… 34. What measures should be taken by the criminal justice system to protect cyber crime?

………………………………………………………………………………… …………............................................................................................................... ............ 35. What are the responsibilities of the Website owner to protect cyber crime that you think? ………………………………………………………………………………… …………………………....................................................................................... ........... 36. What is your recommendation to protect cybercrime? ………………………………………………………………………………… ………………………………………………………………………………… …………


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.