SlideShare una empresa de Scribd logo
1 de 11
A Presentation By:

                                      DEEPIKA JOSHI
                                      Asst. Prof. (IT & HR)
                                      Jaipuria Institute of Management Studies
                                      Indirapuram, Ghaziabad, India

                                      Email Id : dsagta@gmail.com
                                      Mobile : 9899882346




                      Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011   Jaipuria Institute of Management Studies,
                      Ghaziabad.
Oh what a tangled web we weave, when first we practice to deceive”
                                                           : Sir Walter Scott


      With the information highway having entered
      our very homes, we are all at increasing risk of
      being affected by Cybercrime.

      Everything about our lives is in some manner
      affected    by    computers.      Under    the
      circumstances its high time we sat up and took
      notice of the events shaping our destinies on
      the information highway.

      Cybercrime is everyone’s problem. And its
      time we did something to protect ourselves.
      Information is the best form of protection.



                              Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011           Jaipuria Institute of Management Studies,
                              Ghaziabad.
“Technology changes everything, crime included” (Clarke, 2004)




   BIG numbers and online crime go together. One
   well-worn assertion is that cybercrime revenues
   exceed those from the global trade in illegal
   drugs. Another nice round number is the $1
   trillion-worth of intellectual property that, one
   senator claimed earlier this year, cybercriminals
   snaffle annually.

                Source: Economist.com 14/Nov/2011



                              Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011           Jaipuria Institute of Management Studies,
                              Ghaziabad.
"What your mind can conceive and believe, it can achieve".
                                                                             Napoleon Hill

   As we foster our self with special
   acquaintance and special aptitude in
   society, along with that power, comes
   accountability to use it for the
   betterment of the society.


   Living in a society is governed by few
   norms of social behavior accepted by all.
   Although living in a real society and in an
   e-society is entirely different as in real
   society we know our boundaries and the
   socially accepted behavior whereas in e-
   society boundaries are blurred and we are
   not aware of the fact that the things we are
   doing are accepted by the e-society or not.




                                 Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011              Jaipuria Institute of Management Studies,
                                 Ghaziabad.
Types of Cyber crimes
   •   Credit card frauds
   •   Cyber pornography
   •   Sale of illegal articles-narcotics,
       weapons, wildlife
   •   Online gambling
   •   Intellectual Property crimes- software
       piracy, copyright infringement,
       trademarks violations, theft of                                             Crime
       computer source code                                             Crime      Against
   •   Email spoofing                                                   Against    Govt.
   •   Forgery                                              Crime       Property
   •   Defamation                                           against
   •   Cyber stalking (section 509 IPC)                     Person
   •   Phising
   •   Cyber terrorism




                                Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011             Jaipuria Institute of Management Studies,
                                Ghaziabad.
Risks at Cyberspace


                      Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011   Jaipuria Institute of Management Studies,
                      Ghaziabad.
In the News…….
     Cyber crime is now a bigger threat to India Inc than physical crime. In a recent survey by IBM, a
     greater number of companies (44%) listed cyber crime as a bigger threat to their profitability
     than physical crime (31%).


     The cost of cyber crime stems primarily from loss of revenue, loss of market capitalization,
     damage to the brand, and loss of customers, in that order.


     About 67% local Chief Information Officers (CIOs) who took part in the survey perceived cyber
     crime as more costly, compared to the global benchmark of 50%.


     •   1 out of 5 children received a sexual solicitation or approach over the Internet in a
         one-year period of time (www.missingchildren.com)

     •   California warns of massive ID theft – personal data stolen from computers at
         University of California, Berkeley (Oct 21, 2004 IDG news service)

     •   Microsoft and Cisco announced a new initiative to work together to increase
         internet security (Oct 18, 2004 www.cnetnews.com)



                                   Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011                Jaipuria Institute of Management Studies,
                                   Ghaziabad.
THEORIES BEHIND THE CRIMES




TRADITIONAL                                                           NEW

   SOCIAL PROCESS THEORY: SOCIAL INFLUENCES
                                                                    BMC THEORY:   BULGING    MIDDLE
                                                                    CLASS
   SOCIAL STRUCTURE THEORY: RUNDOWN
                                                                    ANTI-SOCIAL PROCESS THEORY:
   TRAIT THEORY: BASIC NATURE
                                                                    Because They Are Being Groomed
   RATIONAL CHOICE THEORY: WILLINGNESS                              To Commit the Crime

   SOCIAL CONFLICT THEORY: SOCIETAL FORCES                          AGOG THEORY: CURIOSITY    LEADS
                                                                    THEM TO ENJOYMENT.


                                                                     BRAGGER   THEORY:   IMPRESSION
                                                                     MAKING




                                 Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011              Jaipuria Institute of Management Studies,
                                 Ghaziabad.
CONCLUSION

    Traditional crime theory presents crime stimulating factors as:-

    •Choice,
    •Social process,
    •Heredity & Upbringing,
    •Societal Forces & Mental Disorders

    Whereas, in the present Techno-Era ,criminals are much more
    educated, technically equipped with higher IQ and the targeted
    people to look upon as criminals (i.e. Poor people) in traditional
    theories have been overlapped by the Bulging Middle Class
    theory.


                         Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011      Jaipuria Institute of Management Studies,
                         Ghaziabad.
Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011   Jaipuria Institute of Management Studies,
                      Ghaziabad.
QUESTIONS




                      Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011   Jaipuria Institute of Management Studies,
                      Ghaziabad.

Más contenido relacionado

Destacado

StyleUp project presentation
StyleUp project presentationStyleUp project presentation
StyleUp project presentationStyleup_CRM
 
Orthodontic Procedures Presentation
Orthodontic Procedures PresentationOrthodontic Procedures Presentation
Orthodontic Procedures Presentationguest31a6b4b7
 
Quickstep laminate brochure
Quickstep laminate brochureQuickstep laminate brochure
Quickstep laminate brochureKavaler
 
Case study - Application Peugeot of my birth year
Case study -  Application Peugeot of my birth yearCase study -  Application Peugeot of my birth year
Case study - Application Peugeot of my birth yearKRDS
 
Annnual report JSC IDGC of Center and Volga Region 2011
Annnual report JSC IDGC of Center and Volga Region 2011Annnual report JSC IDGC of Center and Volga Region 2011
Annnual report JSC IDGC of Center and Volga Region 2011Walker_Ol
 
Tarian Tradisional
Tarian TradisionalTarian Tradisional
Tarian Tradisionalbmfirdaus
 

Destacado (9)

StyleUp project presentation
StyleUp project presentationStyleUp project presentation
StyleUp project presentation
 
Orthodontic Procedures Presentation
Orthodontic Procedures PresentationOrthodontic Procedures Presentation
Orthodontic Procedures Presentation
 
Quickstep laminate brochure
Quickstep laminate brochureQuickstep laminate brochure
Quickstep laminate brochure
 
Case study - Application Peugeot of my birth year
Case study -  Application Peugeot of my birth yearCase study -  Application Peugeot of my birth year
Case study - Application Peugeot of my birth year
 
Annnual report JSC IDGC of Center and Volga Region 2011
Annnual report JSC IDGC of Center and Volga Region 2011Annnual report JSC IDGC of Center and Volga Region 2011
Annnual report JSC IDGC of Center and Volga Region 2011
 
2
22
2
 
Tarian Tradisional
Tarian TradisionalTarian Tradisional
Tarian Tradisional
 
Pres nlc 2013 net
Pres nlc 2013 netPres nlc 2013 net
Pres nlc 2013 net
 
Crowcon Portable Gas Detectors
Crowcon Portable Gas DetectorsCrowcon Portable Gas Detectors
Crowcon Portable Gas Detectors
 

Similar a Cyber Crimes a Behavioral Study

Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017
Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017
Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017Codemotion
 
Accelerating innovation through diversity in Artificial Intelligence
Accelerating innovation through diversity in Artificial Intelligence  Accelerating innovation through diversity in Artificial Intelligence
Accelerating innovation through diversity in Artificial Intelligence Swathi Young
 
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...AJHSSR Journal
 
20240104 HICSS Panel on AI and Legal Ethical 20240103 v7.pptx
20240104 HICSS  Panel on AI and Legal Ethical 20240103 v7.pptx20240104 HICSS  Panel on AI and Legal Ethical 20240103 v7.pptx
20240104 HICSS Panel on AI and Legal Ethical 20240103 v7.pptxISSIP
 
How do we train AI to be Ethical and Unbiased?
How do we train AI to be Ethical and Unbiased?How do we train AI to be Ethical and Unbiased?
How do we train AI to be Ethical and Unbiased?Mark Borg
 
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AIDataScienceConferenc1
 
Let's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational designLet's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational designNikita Lukianets
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...Sherry Jones
 
Togy Jose: Organizational Network Analytics - Revealing the Real Networks
Togy Jose: Organizational Network Analytics - Revealing the Real NetworksTogy Jose: Organizational Network Analytics - Revealing the Real Networks
Togy Jose: Organizational Network Analytics - Revealing the Real NetworksEdunomica
 
Personal identity Management
Personal identity ManagementPersonal identity Management
Personal identity ManagementGeorge Roberts
 
ZDoolyconfAI.pdf
ZDoolyconfAI.pdfZDoolyconfAI.pdf
ZDoolyconfAI.pdfzdooly
 
Research & Business about Artificial Intelligence: A Point of View
Research & Business about Artificial Intelligence: A Point of ViewResearch & Business about Artificial Intelligence: A Point of View
Research & Business about Artificial Intelligence: A Point of ViewPietro Leo
 
The Principle of Non-Discrimination in the Infosphere: A New Ethics
The Principle of Non-Discrimination in the Infosphere:  A New EthicsThe Principle of Non-Discrimination in the Infosphere:  A New Ethics
The Principle of Non-Discrimination in the Infosphere: A New EthicsMichal Černý
 
Automatic group happiness intensity analysis.
Automatic group happiness intensity analysis.Automatic group happiness intensity analysis.
Automatic group happiness intensity analysis.LeMeniz Infotech
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...Lisa Muthukumar
 
artificial intelligence - in need of an ethical layer?
artificial intelligence - in need of an ethical layer?artificial intelligence - in need of an ethical layer?
artificial intelligence - in need of an ethical layer?Inge de Waard
 
Algorithmic Bias - What is it? Why should we care? What can we do about it?
Algorithmic Bias - What is it? Why should we care? What can we do about it? Algorithmic Bias - What is it? Why should we care? What can we do about it?
Algorithmic Bias - What is it? Why should we care? What can we do about it? University of Minnesota, Duluth
 

Similar a Cyber Crimes a Behavioral Study (20)

Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017
Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017
Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017
 
Accelerating innovation through diversity in Artificial Intelligence
Accelerating innovation through diversity in Artificial Intelligence  Accelerating innovation through diversity in Artificial Intelligence
Accelerating innovation through diversity in Artificial Intelligence
 
The causes of corruption
The causes of corruptionThe causes of corruption
The causes of corruption
 
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
 
20240104 HICSS Panel on AI and Legal Ethical 20240103 v7.pptx
20240104 HICSS  Panel on AI and Legal Ethical 20240103 v7.pptx20240104 HICSS  Panel on AI and Legal Ethical 20240103 v7.pptx
20240104 HICSS Panel on AI and Legal Ethical 20240103 v7.pptx
 
How do we train AI to be Ethical and Unbiased?
How do we train AI to be Ethical and Unbiased?How do we train AI to be Ethical and Unbiased?
How do we train AI to be Ethical and Unbiased?
 
Testing slides
Testing slidesTesting slides
Testing slides
 
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
 
Let's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational designLet's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational design
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
 
Togy Jose: Organizational Network Analytics - Revealing the Real Networks
Togy Jose: Organizational Network Analytics - Revealing the Real NetworksTogy Jose: Organizational Network Analytics - Revealing the Real Networks
Togy Jose: Organizational Network Analytics - Revealing the Real Networks
 
Personal identity Management
Personal identity ManagementPersonal identity Management
Personal identity Management
 
ZDoolyconfAI.pdf
ZDoolyconfAI.pdfZDoolyconfAI.pdf
ZDoolyconfAI.pdf
 
Research & Business about Artificial Intelligence: A Point of View
Research & Business about Artificial Intelligence: A Point of ViewResearch & Business about Artificial Intelligence: A Point of View
Research & Business about Artificial Intelligence: A Point of View
 
The Principle of Non-Discrimination in the Infosphere: A New Ethics
The Principle of Non-Discrimination in the Infosphere:  A New EthicsThe Principle of Non-Discrimination in the Infosphere:  A New Ethics
The Principle of Non-Discrimination in the Infosphere: A New Ethics
 
Automatic group happiness intensity analysis.
Automatic group happiness intensity analysis.Automatic group happiness intensity analysis.
Automatic group happiness intensity analysis.
 
Foresight Friday 19.01.2018 - Kari Hiekkanen
Foresight Friday 19.01.2018 - Kari Hiekkanen Foresight Friday 19.01.2018 - Kari Hiekkanen
Foresight Friday 19.01.2018 - Kari Hiekkanen
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
 
artificial intelligence - in need of an ethical layer?
artificial intelligence - in need of an ethical layer?artificial intelligence - in need of an ethical layer?
artificial intelligence - in need of an ethical layer?
 
Algorithmic Bias - What is it? Why should we care? What can we do about it?
Algorithmic Bias - What is it? Why should we care? What can we do about it? Algorithmic Bias - What is it? Why should we care? What can we do about it?
Algorithmic Bias - What is it? Why should we care? What can we do about it?
 

Más de Uttarakhand Open University

Más de Uttarakhand Open University (11)

University 2.0
University 2.0University 2.0
University 2.0
 
Transforming Universities for e-learning
Transforming Universities  for e-learningTransforming Universities  for e-learning
Transforming Universities for e-learning
 
Mobile learning a new approach in teacher education
Mobile learning   a new approach in teacher educationMobile learning   a new approach in teacher education
Mobile learning a new approach in teacher education
 
Importance of Learning Governance in Distance Education by information and co...
Importance of Learning Governance in Distance Education by information and co...Importance of Learning Governance in Distance Education by information and co...
Importance of Learning Governance in Distance Education by information and co...
 
E Teaching strategies
E  Teaching strategiesE  Teaching strategies
E Teaching strategies
 
Integrating ICT into Teaching Learning
Integrating ICT into Teaching LearningIntegrating ICT into Teaching Learning
Integrating ICT into Teaching Learning
 
ICTs for Teaching and Learning in ODL – A Study
ICTs for Teaching and Learning in ODL – A StudyICTs for Teaching and Learning in ODL – A Study
ICTs for Teaching and Learning in ODL – A Study
 
Challenges in ICT for Education
Challenges in ICT for EducationChallenges in ICT for Education
Challenges in ICT for Education
 
Academic Support Through E-Learning To Open And Distance Learners: A Case Stu...
Academic Support Through E-Learning To Open And Distance Learners: A Case Stu...Academic Support Through E-Learning To Open And Distance Learners: A Case Stu...
Academic Support Through E-Learning To Open And Distance Learners: A Case Stu...
 
Use of OERs and Non-OERs at , Asia e University (AeU), Malaysia
Use of OERs and Non-OERs at , Asia e University (AeU), MalaysiaUse of OERs and Non-OERs at , Asia e University (AeU), Malaysia
Use of OERs and Non-OERs at , Asia e University (AeU), Malaysia
 
The Road to Excellence QAMLM
The Road to Excellence QAMLMThe Road to Excellence QAMLM
The Road to Excellence QAMLM
 

Último

Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 

Último (20)

Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 

Cyber Crimes a Behavioral Study

  • 1. A Presentation By: DEEPIKA JOSHI Asst. Prof. (IT & HR) Jaipuria Institute of Management Studies Indirapuram, Ghaziabad, India Email Id : dsagta@gmail.com Mobile : 9899882346 Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 2. Oh what a tangled web we weave, when first we practice to deceive” : Sir Walter Scott With the information highway having entered our very homes, we are all at increasing risk of being affected by Cybercrime. Everything about our lives is in some manner affected by computers. Under the circumstances its high time we sat up and took notice of the events shaping our destinies on the information highway. Cybercrime is everyone’s problem. And its time we did something to protect ourselves. Information is the best form of protection. Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 3. “Technology changes everything, crime included” (Clarke, 2004) BIG numbers and online crime go together. One well-worn assertion is that cybercrime revenues exceed those from the global trade in illegal drugs. Another nice round number is the $1 trillion-worth of intellectual property that, one senator claimed earlier this year, cybercriminals snaffle annually. Source: Economist.com 14/Nov/2011 Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 4. "What your mind can conceive and believe, it can achieve". Napoleon Hill As we foster our self with special acquaintance and special aptitude in society, along with that power, comes accountability to use it for the betterment of the society. Living in a society is governed by few norms of social behavior accepted by all. Although living in a real society and in an e-society is entirely different as in real society we know our boundaries and the socially accepted behavior whereas in e- society boundaries are blurred and we are not aware of the fact that the things we are doing are accepted by the e-society or not. Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 5. Types of Cyber crimes • Credit card frauds • Cyber pornography • Sale of illegal articles-narcotics, weapons, wildlife • Online gambling • Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of Crime computer source code Crime Against • Email spoofing Against Govt. • Forgery Crime Property • Defamation against • Cyber stalking (section 509 IPC) Person • Phising • Cyber terrorism Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 6. Risks at Cyberspace Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 7. In the News……. Cyber crime is now a bigger threat to India Inc than physical crime. In a recent survey by IBM, a greater number of companies (44%) listed cyber crime as a bigger threat to their profitability than physical crime (31%). The cost of cyber crime stems primarily from loss of revenue, loss of market capitalization, damage to the brand, and loss of customers, in that order. About 67% local Chief Information Officers (CIOs) who took part in the survey perceived cyber crime as more costly, compared to the global benchmark of 50%. • 1 out of 5 children received a sexual solicitation or approach over the Internet in a one-year period of time (www.missingchildren.com) • California warns of massive ID theft – personal data stolen from computers at University of California, Berkeley (Oct 21, 2004 IDG news service) • Microsoft and Cisco announced a new initiative to work together to increase internet security (Oct 18, 2004 www.cnetnews.com) Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 8. THEORIES BEHIND THE CRIMES TRADITIONAL NEW SOCIAL PROCESS THEORY: SOCIAL INFLUENCES BMC THEORY: BULGING MIDDLE CLASS SOCIAL STRUCTURE THEORY: RUNDOWN ANTI-SOCIAL PROCESS THEORY: TRAIT THEORY: BASIC NATURE Because They Are Being Groomed RATIONAL CHOICE THEORY: WILLINGNESS To Commit the Crime SOCIAL CONFLICT THEORY: SOCIETAL FORCES AGOG THEORY: CURIOSITY LEADS THEM TO ENJOYMENT. BRAGGER THEORY: IMPRESSION MAKING Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 9. CONCLUSION Traditional crime theory presents crime stimulating factors as:- •Choice, •Social process, •Heredity & Upbringing, •Societal Forces & Mental Disorders Whereas, in the present Techno-Era ,criminals are much more educated, technically equipped with higher IQ and the targeted people to look upon as criminals (i.e. Poor people) in traditional theories have been overlapped by the Bulging Middle Class theory. Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 10. Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 11. QUESTIONS Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.