Theconceptofcyber Crimenaturescope
Theconceptofcyber Crimenaturescope
Theconceptofcyber Crimenaturescope
net/publication/256008668
CITATIONS READS
9 21,034
1 author:
SEE PROFILE
All content following this page was uploaded by Vijaykumar Shrikrushna Chowbe on 01 March 2023.
ABSTRACT :
Cyber crime is whether myth or reality? Nothing is crime unless
prescribe by law. But most of the categories of cyber crime is still beyond the
reach of law. Even there is lack of unanimous consensus over the commonly
agreed definition of ‘cyber crime.
Introduction
The advent of e-technology has brought variety of opportunities and
some of these, not surprisingly, are of a criminal nature. The Cyberspace
created by computer technology provides a medium of doing many things in
efficient manner. The use of machine replacing human hands provided
greater opportunities and options. The automation of companies, banks,
educational institution, and railway reservation are reflections displayed
everywhere that manifest dependence of human society on these tiny
computers. Today, old-fashioned paper-based working pattern is merely
outdated, as it is unable to keep pace with speedy life of modern world.
Societies world over in the last century have been largely concerning
about crime affecting the physical persons and property. They have
accordingly evolved state systems of law and enforcement to deal with the
forms of crimes. Rapid industrialization and urbanization has brought new
forms of crimes involving wider concerns of social order, safety, and security.2
1
Associate Professor and Head, Post Graduate Teaching Department of Law, Sant Gadge Baba Amravati
University, Amravati [State University]. Suggestion, correction or criticism, if any, may be addressed at
[email protected].
2 http://www,nytimes.com, David Post (Cyber law specialist, Temple Law School), 'Netiquette',
visited on 8th Aug, 1999.
Page 1 of 21
Electronic
Electroniccopy
copyavailable
availableat:
at:https://ssrn.com/abstract=1766238
http://ssrn.com/abstract=1766238
The concept of Cyber Crime : Nature & Scope
3 Reuters, 'Digital world still feeds no paper', The Hindu Business Line, 8th Oct, 2000.
4 See, Schedule V of the Information Technology (Certifying Authorities) Rules, 2000.
Page 2 of 21
Electronic
Electroniccopy
copyavailable
availableat:
at:https://ssrn.com/abstract=1766238
http://ssrn.com/abstract=1766238
The concept of Cyber Crime : Nature & Scope
Page 4 of 21
5 Jain Atul : Cyber Crime - Issues Threats and Management Vol. 1, Isha Books Delhi, pg. 3.
6 Charles Nesson & Anita Ramasastry, Cyber crime,
http://Cyber.law.harvard.edu/studygroup/Cybercrime.html Last updated: June 22, 2002,
accessed on 26 April 2005, 21:30:45
7 Jain Atul, Cyber Crime : Issues Threats and Management, (Vol I) Isha Books Delhi, pg. 4
Page 5 of 21
language. Digital technology surrounded our life to such a great extend that
everybody is being acquainted with it. Particularly, the new generation for
whom computer knowledge is an essential part of curriculum, and where
knowledge diffusion is with the help of computer it is very easy for them to
have convenience accessible means to commit crime in Cyber-space.
Incidences are there, where initially, computer is learned either out of
curiosity, pleasure or compulsion (may be official or educational) or latter on
learning knowledge turned into delinquency. The user-friendly software has
added fuel to the fire making Cyber delinquency much pleasant and easy.
This is true, particularly with regard to pornography, vulgar chatting, and
piracy. Today, anybody with minimum computer literacy is sufficient to have
access to Cyber-criminality and the chances are very less of being trapped by
the preventive agencies. These features make Cyber-crimes more dangerous
and alarming.
v. Difficulties in tracing the Cyber crime
If one is enough fortunate to overcome these difficulties of locating,
investigating and fixing the criminal liability, the next complexities he has to
face about the collection, examination, scrutiny, instigation and recording and
reading the evidences and witnesses. Speaking with example, suppose in the
example of Cyber-stalking cited above, perpetrator used computer for the
purpose of hacking and stalking the web site of pizza parlour via Internet,
how can the recording and reading of evidence is possible even if, the
instrumentality of an offence i.e. computer has been seized? Again, whether
does legal system has capable of recognized such evidence in electronic form?
Suppose, again the hacking or stalking has been committed from paid Cyber-
café, then how the presence of criminal can be located? In short, such
problems make Cyber-criminality more severe and serious in this
millennium.
In addition to that, as due to Internet facilities, Cyberspace don't
recognized boundaries, barriers or line of control of the nations, the problem
of jurisdiction also create problem in Cyber-criminality. Thus the potentiality
of Cyber criminals to morph into new and different forms of antisocial activity
evading the reach of existing penal law create challenges for law enforcement
around the world. Cyber criminals can exploit gaps in their national criminal
law to victimize their fellow citizens with impunity. They can also exploit
gaps in the criminal laws of other countries to victimize the citizens of those
and other nations.8
8 Jain Atul : Cyber Crime - Issues Threats and Management Vol. 1, Isha Books Delhi, pg. 4
Page 7 of 21
13 Diwan Parag, & Shammi Kapoor, Cyber & E-Commerce Laws, Bharat Publishing House, 2000.
14 Vishwambharan, Anupama., 'The information super highway', The Indian Express, 12 May
1999.
15 Menon Shailaja, Protection of Intellectual Property in Cyber Space, AuthorPress Delhi, Pg. 5.
16 Cyber laws : Intellectual property and e-commerce security - Edited by Krishna Kumar,
Dominant Publishers and Distributors, New Delhi, pg. 295.
Page 11 of 21
made to add more human qualities to adroit i.e. artificial robots. In post-
modern era, each object is losing human sensitivity evaporating its
conceptualized base with its referenced boundaries, emotions, happiness,
sorrow, love, affections, responsibility, values and much more 'life' itself.
New technologies today provided sky-less limit and speed breaking the
boundaries.
Conceptualizing Cyber Crime - Definition, Analysis and
explanation
iii. Legal literature only prescribe, not describe Cyber
crime
The law only prescribes the things but do not describe it.17 Particularly,
penal laws prescribe the punishment but do not attempt to describe the crime
and its nature. Therefore, the legal literature hardly helps in this regards. It
is unwise, therefore, to describe here Cyber Crimes, as "acts that are
punishable by the Information Technology Act, 2000." Because the
Information Technology Act, 2000 neither define nor describe any of the
Cyber Crime. It has only stipulated certain act as an offence and prescribed
punishment under Chapter XI titling "Offences".18 However, various jurists,
thinkers have attempted to define the term Cyber crime from various angles.
Here in this portion we are going to consider some of the definition of Cyber
crime in order to elaborate and understand term.
iv. Conceptualizing Cyber Crime - Mapping different
dimensions
To deal, it is essential to limit the concept within the word's
boundaries. It is helpful to encompass it within a literal periphery.
Elaborating any concept from definitional point view is an attempt to attach
some meaning full words for its explanation. Defining the concept is nothing
but to endeavoring 'Why the things are things and not otherwise'. In other
words, by definition of Cyber crime, we are trying to explain why Cyber crime
is Cyber crime and not otherwise. The overall definitional part deals with the
aspect of separating Cyber crime from other crimes and clarifies from other
so-call similar words. Thus, it is an activity of putting similar things together
and isolating it from dissimilar things.
17 For e.g. S. 40 of Indian Penal Code, 1860 only prescribe 'Offence' denotes a thing made punishable
by this code' but do not describe what is meant by Offence.
18 In 2008, an amendment has been made to add few more offences in the Information
Technology Act, 2000
Page 12 of 21
22 See, Singh Balwinder, Addl, Sec, Central Vigilance Commission, Government of India, An
article on Internet (in .pdf format) entitled, Cyber Crime - A new challenge for the police
23 http://www.cidap.gov.in/documents/Cyber%20Crime%20-
%20A%20new%20challenge%20for%20the%20Police_129200525502%20PM.pdf
24 http://www.legalserviceindia.com/articles/article.html - The Menace Of Cyber Crime by
Anusuya Sadhu, Final year law student Symbiosis, Pune
25 see McConnell’s : ‘International Cyber-crimes & punishment – http://www.Cybercrimes.net
Accessed on 26.12.2004
26 http://www.niser.org.my/news/2004_11_22_01.html Accessed on 30.01.2005
27 http://www.niser.org.my/news/2004_11_22_01.html accessed 30.01.2005
Page 14 of 21
Page 16 of 21
200029 deals30 with some of the Cyber crimes, but all the catefories of Cyber
crime have not been covered by the act,31 and therefore, some of the Cyber
crime still falls out of the legal reservoir. In short, the test of 'unlawfulness'
makes only some of the Cyber-crime within the preview and keeps most of it
outside. The same criticism can be made about those definitions describing
Cyber crime as 'illegal' or 'criminal' act.
Secondly, it is wrong to say that Cyber crime is 'harmful' act, though
most of the Cyber crime may be, but there are some of the categories of
Cyber-crime, which are not strictly, consider as harmful. For example, viruses
are not harmful, unless and until they are activated. There are some of the
viruses, which lay within the hard disc and activated only after clicking a
particular program. Therefore, unless a specific program is not comes into
operation, these viruses lie as usual and do not sustain harm. Another
example can be given of those persons who use fake identity but while surfing
they cast votes, give their opinion, take part in good discussion, or even make
some academic conferences while chatting. In such situation, the person
whose identity has been used, sometime benefited by such act. The incidence
can be compare with the famous case of Ashby V. White where the person
whose legal rights were violated did not suffer any harm, loss or damage in
monetory sense. Thus, harm, loss, or damage cannot be considered as the
only criterion for describing any act illegal. Actually, it is misuse, not harm,
which is basic ingredient here to be considered.
Thirdly, again, the terms like 'against computer', 'on computer' seems
to be misleading. These definitions make all those acts as a Cyber crime,
which is committed on, by or against the computer. Thus, it will include the
act like theft of keyboard, mouse pad, hitting a computer by stick, or even
making electric power off while computer is in operation, which causes loss
of data! Logically, all these acts are committed on either by or against the
computer, but cannot consider as categories of Cyber-crimes.
Fourthly, the terminologies like 'Cyberspace', 'computer networking',
'technology', or 'Internet' needs further clarification and in absence of such
clarity, any definition that includes such words make situation more vague
and worse than before.
The definition, at this point, that seem more accurately describing
Cyber crimes is -
"Cyber crime is harmful act or misusing computer technology."
29 (21 of 2000)
30 See Chapter XI 'Offenses' of Information Technology Act, 2000. Section 65 to 69.
31 Though the Information Technology [Amendment] Act, 2008 has added few more categories
of crime in the list, but this additions are still inadequate to accommodate the entire list of
cyber crime under the one umbrella of the Information Technology Act, 2000
Page 17 of 21
33 Jain Atul, Cyber Crime: Issues Threats and Management, (Vol I) Isha Books Delhi, pg. 4
Page 20 of 21
Page 21 of 21