Heterogeneous Framework for Indian Cybercrime Cases
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 8
Abstract
The internet has served as the global language of the virtual world since the beginning of the digital world and the Internet in India is increasing rapidly .Internet served seriously in many more areas in current scenario like Trade, education, sports, and research. Internet is treated as coin because it having two sides merits and demerits. A major problem of internet in current scenario is “Cyber Crime”. Here we study and analysis about the current cyber crimes in India through the literature survey, government annual reports, verbal communication with ethical hackers and many more techniques like Questionnaires and from the head of cyber cell from different states in India. We also study and analysis the different cyber crimes case studies which is occurred in different states in India and Indian cyber laws framework is compared with other country framework. So, finally we conclude that, our cyber laws frameworks having some of the vulnerabilities and problems for executing cyber cases compare to other countries. So we propose a heterogeneous approach or model for executing our legal framework smoothly against the cybercrimes in current scenario.
Authors and Affiliations
Ravikumar S. Patel, Dr. Dhaval Kathiriya
Method To Enhance The Capacity Of Embedding Data In Jpeg Images
A novel method of reversible data hiding is proposed here. The technique relies on data hiding in encrypted JPEG images is used. As we know that encryption is an effective method of privacy protection .All previous m...
Methods To Enhance The Security And Embedding Capacity Of Steganography
The major requirement for most of the steganographic method is to improve the security to the hidden data and to enhance the amount of data that can be embedded into the cover medium. The paper mainly studies on the...
Security Measures To Prevent Vampire Attacks To Protect Routing Infrastructure
A Vampire attack is the composition and transmission of a message that sources more power to be consumed by the network than if an open node transmitted a message of the same size to the same destination although usi...
Filtered Wall: An Automated System to Filter Unwanted Messages from OSN User Profiles
In recent years, Online Social Networks (OSNs) have become an important part of daily life. Users build explicit networks to represent their social relationships. Users can upload and share information related to the...
Automatic Weed Detection System And Smart Herbicide Sprayer Robot For Corn Fields
The goal of this paper is to develop an automatic plantation system.Here fruit and weed in the plantation is detected and herbicide is sprayed for the weed affected area.The temperature of the field is monitored inor...