Computer Crime Research Center

You are about to join the

Discussion : India: Cyber Crimes “an unlawful act where in the computer is either a tool or a target or both” – In Indian Legal Perspective

Discussion is closed !

1-15 > 16-30 > 31-45 > 46-60> Total 59 comments

2007-01-13 20:16:02 -
Christmas on the Net

2007-01-13 17:12:22 -
Cool design

2006-11-05 00:06:31 -
internet has provided us many security facilities which r altough helpful to many but r used in a disasterous manner by others. thus some alterations should be made in the software so that the wrong doers could be caught more easily than ever.this'll b better for the netizens.

2006-10-14 02:54:04 -
hello friends i am student of MCA i am littelbit aware about cyber crime i want more information
about cyber crime if any budy intersted to send me information through email
i am very thankful to him/her

a read that articles and comments taht's very good

2006-05-07 07:19:52 -
Published both in print (by Serial Publications) and online (open access)

Aim and Scope:

International Journal of Cyber Crimes and Criminal Justice (IJCCCJ) is a peer reviewed interdisciplinary journal published biannually and devoted to the study of cyber crime, cyber criminal behavior, cyber victims, cyber laws and cyber investigations. IJCCCJ will be both print (published by Serials Publication) and online (open access) Journal. IJCCCJ will focus on all aspects of cyber/computer crime: Forms of Cyber Crime, Impact of Cyber crimes in the real world, Policing Cyber space, Cyber-terrorism, International Perspectives of Cyber Crime, developing cyber safety policy, intrusion investigations, information security, Cyber Victims, Cyber offender behavior, cyber crime law, Cyber Pornography, Physical Computer Security, Privacy & Anonymity on the Net, Internet Fraud & Identity Theft, Mobile Phone Safety, Online Gambling, Copyright and Intellectual property Law, Detection of Distributed Denial of Service Attacks, Firewall Testing and Digital Forensics. As the discipline of Cyber Criminology approaches the future, facing the dire need to document the literature in this rapidly changing area has become more important than ever before. The IJCCCJ will be a nodal centre to develop and disseminate the knowledge of cyber crimes to the academic and lay world. The journal publishes theoretical, methodological, and applied papers, as well as book reviews.

Submission of Manuscripts:

All manuscripts must be submitted in APA format. Please follow APA guidelines for Manuscript Preparation, including title page for blind review, referencing, and tables and figures. All manuscripts will undergo blind review by two or more reviewers. Each manuscript must be accompanied by a statement that it has not been published elsewhere and that it has not been submitted simultaneously for publication elsewhere. Authors are responsible for obtaining permission to reproduce copyrighted material from other sources and are required to sign an agreement for the transfer of copyright to the publisher. All accepted manuscripts, artwork, and photographs become the property of the publisher. IJCCCJ welcomes articles throughout the year. The IJCCCJ encourages quality scholarship articles from relevant academic disciplines as well as from practitioners in the private and public sector. IJCJS is receptive to scholarship coming from a variety of theoretical perspectives and methodological approaches. All research should be understood and examined through a transnational perspective. Articles previously published or submitted for publication in any other journal will not be accepted.

All articles must be grounded on relevant and recent scholarship in the fields of our interest. The maximum length should not exceed twenty five pages (6000 words), including notes and illustrations. Please avoid footnotes, however, endnotes are encouraged. References in the notes should conform to the mode specified in APA Style. Manuscripts should be submitted as MS Word attachment to the Editor-in-Chief at The Editor-in-Chief reserves the right to edit submissions if accepted for publication. Every effort will be made to inform contributors of the outcome of the peer review process in a timely manner. The review process is via e-mail, and should take no more than 4 to 6 weeks with the possible help of selected experts. This process is launched as and when papers are submitted to us.

Please send completed manuscripts by email to
Dr. K.Jaishankar
Editor-in-Chief, IJCCCJ,
Department of Criminology and Criminal Justice
Manonmaniam Sundaranar University
Abishekapatti, Tirunelveli 627 012
Tamil Nadu India

2006-02-21 10:23:17 -
Yet there is more need to devlope more powerful softwares to detect cyber crimeand there must be special carrier course in computer forensic.

Prasant singh yadav
Lecturer of cyber crime
"Institute of basic science"
dr. B.R Ambedkar university(Agra university)
agra u.p
mobile no. 09927013036

2005-12-22 15:29:05 -
The article is a real eye opener for the indian community but is the investigation authority as well the juduciary really geared up for the same??!! This is the immediate question that crops up in the mind.

Utkarsh Jani
Advocate Gujarat High Court
Contact: 09825555612;07926751466

2005-09-29 11:50:06 -
The information technology is a double edge sword, which can be used for destructive as well as constructive work. Thus, the fate of many ventures depends upon the benign or vice intentions, as the case may be, of the person dealing with and using the technology. For instance, a malicious intention forwarded in the form of hacking, data theft, virus attack, etc can bring only destructive results. These methods, however, may also be used for checking the authenticity, safety and security of one’s technological device, which has been primarily relied upon and trusted for providing the security to a particular organisation. For instance, the creator of the “Sasser worm” has been hired as a “security software programmer” by a German firm, so that he can make firewalls, which will stop suspected files from entering computer systems. This exercise of hiring those persons who are responsible for causing havoc and nuisance is the recognition of the growing and inevitable need of “self protection”, which is recognised in all the countries of the world. In fact, a society without protection in the form of “self help” cannot be visualised in the present electronic era. The content providers, all over the world, have favoured proposed legislations in their respective countries, which allow them to disable copyright infringers’computers. In some countries the software developers have vehemently supported the legislations which allows them to remotely disable the computer violating the terms and conditions of the license allowing the use of the software. This position has, however, given birth to a debate about the desirability, propriety and the legality of a law providing for a disabling effect to these “malware”. The problem is further made complicate due to absence of a uniform law solving the “jurisdictional problem”. The Internet recognises no boundaries, hence the attacker or offender may belong to any part of the world, where the law of the offended country may not be effective. This has strengthened the need for a “techno-legal’ solution rather than a pure legal recourse, which is not effective in the electronic era.

Kindly see for more details.

Kindly see for Cyber law in India.

Praveen Dalal
Consultant and Advocate
Delhi High Court, India.
Tele: 9899169611

2005-09-17 18:30:22 -
Thank you very much!

2005-09-17 11:47:07 -
its complete article on cyber crime, helpful to understand this,thanx

2005-09-17 11:47:04 -
its complete article on cyber crime, helpful to understand this,thanx

2005-07-25 04:50:24 -

2005-07-25 04:48:11 -
Ang baboy!!!!!!!!!!!!!!!!!!!!!!! CAN U PLS SHUT UP!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

2005-07-25 04:46:31 -
Ang panget naman gandahan nyo damihan nyo ung inetrnet crimes

1-15 > 16-30 > 31-45 > 46-60>
Total 59 comments
Copyright © 2001-2013 Computer Crime Research Center
CCRC logo