0% found this document useful (0 votes)
45 views

10 1109@esci48226 2020 9167567

This document provides information about the 2020 International Conference on Emerging Smart Computing and Informatics that was held from March 12-14, 2020 in Pune, India. It also includes an abstract for a technical review report on cyber crimes in India that was presented at the conference. The review report examines the increasing issue of cyber crimes in India, particularly fraud cases. It notes that fraud victims are mostly between the ages of 20-29 and that children and women are also increasingly affected.

Uploaded by

Vaishnavi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views

10 1109@esci48226 2020 9167567

This document provides information about the 2020 International Conference on Emerging Smart Computing and Informatics that was held from March 12-14, 2020 in Pune, India. It also includes an abstract for a technical review report on cyber crimes in India that was presented at the conference. The review report examines the increasing issue of cyber crimes in India, particularly fraud cases. It notes that fraud victims are mostly between the ages of 20-29 and that children and women are also increasingly affected.

Uploaded by

Vaishnavi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

2020 International Conference on Emerging Smart Computing and Informatics (ESCI)

AISSMS Institute of Information Technology, Pune, India. Mar 12-14, 2020

A Technical Review Report on Cyber Crimes in


India
Priyanka Datta Surya Narayan Panda Sarvesh Tanwar Rajesh Kumar Kaushal
Chitkara University Institute of Chitkara University Institute of Amity Institute of Information Chitkara University Institute of
Engineering and Technology Engineering and Technology Technology Engineering and Technology
Chitkara University Chitkara University Amity University Uttar Chitkara University
Punjab, India Punjab, India Pradesh, Noida, India Punjab, India
[email protected] [email protected] [email protected]* [email protected]

Abstract— In modern society the role of Internet and reported frauds were associated with online banking since it
computer system is well recognized. People are greatly is very difficult to trace cyber-criminals. For instance, in
benefited with the development of networking and cyber space April-September 2018, more than 900 cases were registered
but some people are using this development in unethical way to related to net-banking, debit or credit card, whereas in 2017-
have some illegal benefits. Recently different types of Social- 18 it was 2,059 [5].
networking attacks are witnessed by social networking sites
user. Internal Revenue Service (IRS) impersonation scams, Similarly, Cyber-crimes among children and women are
along with technical support scams are the most common type also growing rapidly in India via chat room. It had been
of tricks used by the attackers on unsuspecting victims in order increased by 50% than previous years [6]. Likewise, number
to achieve financial benefits. The ratio of cyber-crime in India of cyber-crimes related to social media across India is also
is constantly rising due to various reasons. Cyber-criminals are increasing, e.g. in the year 2017 it was 328, whereas in 2016
very difficult to trace and this advantage is fully utilize by it was 155 [7]. Internet uses are tremendously growing which
scammers. In this paper an intensive review has been done on lead to the exponential growth of cyber-crimes. There are
cyber-crime in India. The studies shows that fraud cases are many solutions present to counteract cyber-attacks.
increasing and the victims are mostly in the age group of 20 – However, these traditional solutions cannot secure Big Data
29 years. Mostly children and women are affected. Thus, from cyber-attacks completely. To overcome the cyber-
awareness programs are required for preventing or avoiding
crimes issues, corporate researchers are mainly focusing on
cyber-crime in India.
Security Analytics. Analytics can help network manager to
Keywords— Cyber Crime, Cyber Security, Online Scams surveillance and monitor real-time detection and network
streams for both suspicious and malicious patterns [3].
I. INTRODUCTION The above facts motivated us to review different types of
cyber-crimes due to which fraud cases are increasing not
In around the world, numerous users are using internet
only in India but also globally.
which is interconnected frameworks of global network.
Despite the fact that the numbers of internet users are The remainder part of the paper is organized as follows:
tremendously growing, access of internet is not uniformly Section II discuss the related works. Section III cited recent
distributed between or within nations. A prominent gap is instances of cyber-crimes. Outcome of the analysis have
there between undeveloped and developed nations in examine in Section IV. At last in Section V, conclusion of
introducing cyber security practices and arrangements [1]. the paper is delivered.
Internet though having fast development but prevalence is
accompanying a gigantic expense because of the expansion II. RELATED WORK
in cyber assaults and dangers, i.e., loss of asset and data. In
2000, the first cyber-crime was reported and till now billions Literature survey had been done explicitly to distinguish
of users have been effected [2]. In the course of the most what had been done and what had not been done by other
recent decade, cyber-crimes are expanding quickly as cyber researchers on cyber-crimes topic. It helps us to figure out
attacker are utilizing inventive thoughts consistently for how others have identified and measured key concepts of
breaking the cyber security and getting access wrongfully to cyber-crimes. It also provides evidence that may be used to
the systems and PC framework. [3]. support our findings.
People using smart mobile phone are growing rapidly Faheem Ullah and Muhammad Ali Babar [8], their paper
which lead to the concern regarding security and privacy. It identifies the most commonly reported quality architecture
is used to perform different type of activities like making and attribute of Big Data Cybersecurity Analytics (BDCA)
call, banking transaction using mobile banking and sending systems, for these purpose 75 papers had been systematically
emails. Hence security of smartphones has become a vital reviewed by the authors.
issue [4]. According to the authors survey in context of the BDCA
Banks plays a very vital role in organizing the money and reveals the following points:
channelizes it for nation’s financial benefit purpose. But x The most important quality attribute are accuracy,
recently banking industries are also facing crisis due to scalability and performance.
number of fraud cases are increasing rapidly. Majority of the

978-1-7281-5263-9/20/$31.00 ©2020 IEEE 269

Authorized licensed use limited to: Cornell University Library. Downloaded on August 19,2020 at 06:51:46 UTC from IEEE Xplore. Restrictions apply.
x The most vital architectural component is the data cyber-crimes. The reasons behind this problem are as
analytics. follows:
x Despite the consequence of modifiability, x Lack of proper training and education.
interoperability, generality, adaptability and privacy
assurance, the quality attributes are lacking explicitly x Awareness related to cybercrimes among Indian is
some of the architectural support. very poor.
In India, the law of enforcement is facing lots of
x Evaluation of dependencies among tactics, explore
problems for tackling cybercrimes whose rate is high.
quality tradeoff and the impact of codified tactics
required empirical investigation. Navjot Jyoti [12] had provides information related to
cyber-crimes, right to privacy, privacy and securing of
x Unified Modeling Language (UML) can be used to individuals private data by National Cyber Security Policy.
model the reported tactics. Crimes which include usages of electronic device along with
F Ripon Patgiri, and Umakanta Majhi [9] proposed a information are enclosed below the ambit of cyber-crimes. It
report on Big Data Security Analytics (BDSA). Their study tends to be carried out against property, person, society and
showed that BDSA requires managing and processing government at huge rate still now neither Cyber-crime is
capability on dataset. It mainly emphasized on the following defined in the IT Act 2000 nor in the IT Amendment Act
key points: 2008 and also not mention in any other legislation in India.
Different types of Cyber-crimes mentioned in this paper are:
x Anomaly detection: It consists of vulnerability, fraud
detection and intrusion detection [10]. x Hacking
x Misuse detection : For example DDOS x Cyber Stalking
x Real-time monitoring : Example, Security alarms x Spamming
x Prediction: It includes predictions and possibility x Cyber Phishing
analysis of an event.
x Cyber terrorism
x Prevention: It should be taken care, although The National Cyber Security Policy 2013 has failed to
prevention takes place after security attacks. address many issues according to various research and
Data stored at a centralized location are vulnerable target analysis report. Some of these issues are as follows:
of attacker, which may cause exposure of information.
x The declared cyber security policy has proved to be a
Therefore organization required to carefully examine
paper work alone with no actual implementation till
legitimate access of information.
date.
The huge volume of data is the main issue of BDSA.
Ensuring the security of huge volume of data had become a x Indian cyber security policy has failed to protect civil
challenge. BDSA facilitate the study of vulnerabilities, which liberties of Indians including privacy rights.
further help in breaking the security system. Loop holes of a x The offensive and defensive cyber security
system are discovered by BDSA. It also enhances the capabilities of India are still missing.
anomaly and misuse detection. Due to all this reason there is
a requirement of BDSA as a service for reducing the cost of Wakil Ghori [13] had presented security, challenging and
analysis. safety issues regarding internet banking. Different types of
fraud strategies, cyber-attacks and methods for preventing
Sreehari A et.al [11] had reviewed awareness related to them used by digital banks had also been discussed in this
cybercrime among college students at Kochi. It had also paper. Recommendations are given for enhancing the
discussed various precaution used by students while using services of digital banking to the customers. Suggestions are
internet. as follows:
The questionnaire survey had been done on 200 students x Awareness program should be taken by bank for
at Kochi for collecting the required information. The result making customers to adopt online banking.
of this survey regarding cyber-crimes awareness among
students was: x Customers are not able to trust digital banking, that’s
why bank require to trained them regarding securely
x 25.1% are very aware about cybercrime. use of digital banking.
x 51.7% know about cybercrime. x Internal security mechanism should be regularly
x 21.7% don’t know very well about cybercrime. improved by banks for providing security and privacy
to the transactions done by the customers.
x 1.4% doesn’t know anything about cybercrime.
Shweta Deshpande [14] had discussed different types of
It had been found that most of the students are just cyber-crimes that are happening against women in the
known about cybercrimes. It had also found that maximum cyberspace. The reason behind this and its solution through
of them sometime receive spam messages or call, but had not legal means had also been explained. Cyber laws in India
reported at cybercrime police cell for preventing it. had been discussed in details. Various types of cybercrime
which can be targeted against women are:
According to the author, now a day, huge number of
people depends on internet, which led to the increase in x Sending obscene e-mails.

270

Authorized licensed use limited to: Cornell University Library. Downloaded on August 19,2020 at 06:51:46 UTC from IEEE Xplore. Restrictions apply.
x Stalking women using chat rooms. • LIC had been warned regarding aadhar scam. Some
fraudsters are creating fake website to fool LIC
x Developing pornographic images. customers so that they can fraud their money.
x E-mail spoofing.
C. Mobile Banking Fraud Cases
III. CASE STUDIES Mobile banking essentially means bank will have a
webpage through which it can almost provide all services of
A. Extortion case experienced at Greater Hyderabad bank to the customers. Customers sitting at a remote location
Municipal Corporation (GHMC) [15] utilizing their smart phone or laptop can avail the services of
bank like transfer of fund, recharge, payment etc. As this
At Hyderabad, a data entry operator of GHMC was
application is very user friendly so number of users is also
caught by cyber-crime cops along with his sibling for
increasing [16]. Recently banks with mobile banking are
unscrupulously issuing Property Tax Identification Number
experiencing very complicated online services since digital
(PTIN) for plot at Rajendra nagar.
privacy and security are of high alert. Therefore banks are
An outsource worker named Jay Chand Velaga, earlier required to provide more secure and safe online banking
logged into the website of GHMS and dishonestly changed services [17]. Identity thieves, money launderers and hackers
the data and issued door number and PTIN for property for are focused on various channels and creating new types of
some benefit, his brother assist him in this illegal transaction. attacks so that they cannot be easily trapped by traditional
fraud detection system [18]. Bank customers are now using
B. Digital Fraud instances of 2017 [5] less services of online banking since the number of fraud
instances are increasing [19].
• Online scam of Rs 3700 crore was registered against
a so-called entrepreneur who had fraud almost 7 lakh Almost every day either in newspaper or in news there
people in the name of “Social Trade”. are reports on mobile banking fraud cases. Some of those
reports are presented in the following Table I.
• In ICICI Bank aadhar scam worth Rs 1.3 lakh
registered due to panic of linking aadhar with bank
account. Unauthorized person pose as bank official
and fooled bank customers by taking their OTP.

TABLE I. REPORT OF ONLINE FRAUD

Sr.No Title on the paper Date Details

1 Most online scam which we need to Updated on 2018 According to the report of Federal Trade Commission
avoid today (FTP), youth belonging to the age of 20-29 years are
more vulnerable to online scam than senior citizens.
40% of the victims are youth [10].

2 Cyber fraud cases in banks are 1st Jan 2018 Use of online banking is spreading very quickly; cyber
spiking rapidly fraud is also increasing rapidly. No of cyber fraud
cases registered in the financial year 2017-18 is almost
double from the previous year 2016-17. According to
RBI report, in 2017-18, 2,059 cyber cases are reported
amounting Rs 109.6 crore whereas in 2016-17, 1,372
cases are reported amounting Rs 42.3 crore [20]

3 In April-Sep 2018, more than 900 Feb 2019 According to RBI no of cyber fraud cases registered
cyber fraud cases are registered year wise are as follows:
involving debit/credit card or net x 2015-16 : 1,191 cases
banking. x 2016-17: 1,372 cases
x 2017-18: 2,059 cases
1. 921 cyber fraud cases are registered
between April-Sep 2018 as per RBI report
[21].

4 CID warn RBI of cyber frauds, due 16th March 2019 In last two months 30 cases are filed by cybercrime
to the use of remote access app. police [20].

271

Authorized licensed use limited to: Cornell University Library. Downloaded on August 19,2020 at 06:51:46 UTC from IEEE Xplore. Restrictions apply.
additional services they take more and more money
from victims. At last, victim end up broken hearted
and without promised money [24].
x Greeting card scams Whether it’s Diwali or Holi all
we received greeting cards in our inbox that appear
to be received from someone who care about us or
friends. It is one of the old internet scams performs by
malicious scammers for injecting malware and
harvesting users most precious data. If such emails
are opened and trigger on the card then the malicious
software automatically downloaded and installed in
the operating system. It can be any annoying program
that unexpected windows, pop-ups with ads
throughout the screen and infected the system with
Fig. 1. State wise M-Banking fraud cases registered [22] dangerous malware. If this infection take place then
the infected system start to send valuable financial
State wise M-Banking fraud cases reports is shown in the information to the server which is fraudulent and
Fig. 1. The figure depicts that Maharashtra had maximum controlled by scammers [25].
number of fraud cases reported followed by Haryana,
Karnataka, Tamil Nadu and Delhi. x Credit card or Bank loan scams are those scams
where people can easily be scammed by guarantee
IV. OUTCOME OF THE SURVEY large amount of money on behalf of bank which had
been preapproved by the bank. Through this offer
After reviewing 32 papers and latest news regarding scammers trapped people and asked them to pay
cyber-crimes, cyber security, impact of cyber-crimes in some mandatory fees for getting the sanctioned large
society had helped us to obtain the various important factors amount of money. Those who rely on them and pay
of cyber-crimes and cyber security. The preceding section the mandatory fees are victimized [23].
had analysis various results obtained during the survey.
x Hitman scams it is the most frequent online scam.
A. Why Cyber-crime instances are growing rapidly: Scammers threat victims through email to pay some
money through internet banking else they will
The fundamental reason for the rapid growth of cyber- kidnapped victim’s family member or harm them.
crimes is the lack of awareness regarding cyber-crimes and Assuring that danger is real they provide some
cyber security. Presence of cyber-crime cells are yet not victims personal details with the threatening email.
known to numerous people. Due to lack of awareness and To avoid this type of scam, nobody should post
furthermore absence of society support, mainly women’s valuable or sensitive data in the social media channel
don’t avail cyber-cells help for the cyber-crime occurring in [26].
their life. Subsequently cyber culprits are left uncaught by
cops, which lead to the rise of cyber-crimes. Likewise cyber x Online romance scams nowadays internet are playing
culprits are very difficult to trace by cops since crime is not very vital role in our social life. Almost everybody
happening physically rather it is happening logically. uses Instagram or Facebook apps regularly. Similarly
dating apps are also available which helps girls to
B. Various types of Online Scams: find their future life partner and vice versa. Scammers
Internet had tackled numerous issues all around easily can fool their online partner easily through
effectively. Sitting at home in a single click we can plan a assuring their partner that they are in real love. After
tour as well as booked lodgings, transport means from a convincing they start to collect valuable and precious
remote location. Despite the fact that internet can be trusted information regarding banking. After scamming the
yet not 100% since still there are online scams happening victim they easily move out the relation as there is no
every day. Some of the online scams are as follows: proof, since everything happens virtually [27].

x Phishing email scams are detected where x Bitcoin scams digital wallets can be easily hacked.
communication made on social network or via email. Scammers are taking advantage of it. Cyber-criminals
Cyber-criminals used to send emails or message to are stealing precious data of the victim’s from this
victims using some tricks so that victims will new technology [28].
convince and provide their sensitive and valuable data x Cyber defamation means defamation done to a
like banking credentials [23]. particular person with the help of Internet and
x The Nigerian scams involves text message, emotional computer. Defamation is defined as the intention to
email, social networking message or letter that comes harm somebody’s reputation in the eye of society. It
from a scammer, who asked people to help them for affects the welfare of the society globally. The
retrieving a huge amount of money from banks by medium through which mainly cyber defamation can
paying initially small amount of money for legal and be committed are E-mails, World Wide Web,
papers matters, on behalf of which they promise that Intranet, Discussion groups, Mailing lists and bulletin
they will return a huge amount of money. Latter boards etc [29].
scammers send some papers so that victim’s belief x Cyber Stalking in this type of cyber-crime stalker
that it is real no fraud is happening. In name of some harassed or threat their target with the help of

272

Authorized licensed use limited to: Cornell University Library. Downloaded on August 19,2020 at 06:51:46 UTC from IEEE Xplore. Restrictions apply.
technology from any remote place in the world. It can
affect both men and women but mostly women
belonging to the age 16 to 35 years are affected.

C. Statistical report of Cyber Crime:


Research on cyber-crimes is happening simultaneously to
determine the significant threats with respect to cyber-crimes
experienced by many nations, industries, banking sectors and
also by individuals. Due to cyber-crimes, nations are facing
huge monetary losses. In the preceding section we have
discuss the recent scenario of research going on cyber-
crimes.
1) Year-wise Publication
Table II below shows that how the publication on cyber-
crimes is increasing since 2000. Initially only 50
publications were there and now in 2018 the numbers had Fig. 2. Country wise consumer loss through cyber-crime in 2017
increased to 9420 and presently in 2019 it is 3280.
2) Country-wise Publication TABLE III. STATE WISE NO OF CYBER-CRIME CASES REPORTED
Internet had made our life easy in many folds, now we
State No. of Cyber
don’t need to stand in a queue for transaction of money at -crime cases Reported
bank, we can avail this facility using internet and smart
phone at our home. Similarly to send important letter we no
2014 2015 2016
need depend on postal service we can send email, it will be
delivered instantly. Though the uses of internet has many Delhi 226 177 98
benefit but still day by day its becoming a bloom for cyber
attacker and the number of cyber-crime victims are Maharashtra 1879 2195 2380
increasing. Fig. 2. shows how countries are affected due to
the rise of cyber-crimes. China is mostly affected followed Uttar Pradesh 1737 2208 2639
by USA and India. 1020 1447 1101
Karnataka

TABLE II. NO OF PUBLICATION Telangana 703 687 593

S No Year No of Publication Rajasthan 697 949 941


1 2000 50
2 2001 107 Haryana 151 224 401

3 2002 126 Punjab 226 149 102


4 2003 220
5 2004 220 Himachal Pradesh 38 50 31

6 2005 330
7 2006 371
3) Cyber-crimes instances in India
8 2007 469
In a report at Economic Times [20] mention that at
9 2008 523 Bengaluru (cyber-crime capital of India), 8 new police
10 2009 828 station for cyber-crimes were announced in December 2018
11 2010 1147 to handle the growing number of cyber-crime cases in
12 2011 1661 Bengaluru.
13 2012 2233 Cyber cases registered in India are increasing rapidly. In
14 2013 2649 India, 80% adult that is 4 out of 5 adults were victimized of
15 2014 3066 cyber-crime, the reason behind this might be high usage and
less literacy rate of E-commerce. More than 46 million users
16 2015 4304
are using online shopping, e-commerce and social
17 2016 5932 networking sites [1]. Table III depicts how various state of
18 2017 7468 India is affected by cyber-crimes in the duration 2014-2016.
19 2018 9420 Maharashtra and Uttar Pradesh are most affected state of
20 2019 3280 India.

273

Authorized licensed use limited to: Cornell University Library. Downloaded on August 19,2020 at 06:51:46 UTC from IEEE Xplore. Restrictions apply.
TABLE IV. LATEST STATE WISE NO OF CYBER-CRIME CASES we can have news regarding banking fraud cases. Due to this
REPORTED
reason bank clients are now hesitant to utilize online banking
State No. of Cyber services especially senior citizens, they still now in this
-crime cases Reported digital era, stand in queue at banks to avail banking services.
2017 2018 In India, technological hub is Bengaluru whereas now a day
Delhi 84 - it had additionally turned into the capital of cyber-crimes, to
overcome this issue government had launched 10 more
Maharashtra 2645 2945
cyber-crime cells. Each province of India has cyber cells
Karnataka 3182 5712 currently, but many people were unaware about its existence.
Telangana 325 410 Therefore to minimize cyber-crimes, more secure and
efficient technology and networking system need to be
TABLE V. DOMAIN WISE NUMBER OF CYBER CASES REGISTERED designed and implement for securing individuals vital data.
Parallelly awareness workshop need to be conducted for
Domain No of Cases Registered making individual especially women, children and senior
(2014-16)
citizens aware regarding various types of cyber-crimes and
Banking System 16,468 how cyber security measures can be implemented to secure
Social media 328 their data. Cyber-security awareness can be done through 3D
animation teaching techniques regarding cyber-crimes [32].
Email Hacking 125
It is practically difficult to nullify cyber-crimes completely
Sexual Harassment 81 without commitment taken seriously throughout the globe.
Lottery Fraud 42 We need to protect ourselves from cyber-crimes and required
Job Fraud 49
to be very alert and aware about the latest types of scamming
strategies for availing digital era benefits.
Latest scenario of various states regarding cyber cases
reported is shown in Table IV. Karnataka is having REFERENCES
maximum number of cyber cases reported in 2018 [30]. [1] R. Sarath, K. Boddu, and V. R. Bendi, “Cyber Crime and Security , a
Global Vulnerable Coercion : Obstacles and Remedies,” vol. 7, no. 5,
Table V illustrates the domain where mostly cyber- pp. 5–8, 2017.
attacks are taking place. Banking Systems are highly prone [2] C. MOUNTAIN VIEW, “Symantec Announces MessageLabs
to cyber-attack. Many national and private banks are facing Intelligence 2010 Annual Security Report.” [Online]. Available:
monetary losses [30]. https://www.symantec.com/about/newsroom/press-
releases/2010/symantec_1207_01.
[3] “Security Analytics : Big Data Analytics for Cybersecurity,” pp. 129–
D. Measures undertaken to reduce cyber-crimes: 134, 2015.
Researches are going on cyber-crimes to identify the [4] S. Alotaibi, A. Alruban, S. Furnell, and N. Clarke, “A Novel
geographical location where maximum instances of cyber - Behaviour Profiling Approach to Continuous Authentication for
crimes are experienced so that major steps to reduce cyber- Mobile Applications,” no. February, 2019.
crimes can be imposed on that area. Additionally, explore on [5] Ahluwalia, “Over 900 cases of fraud involving cards, net banking
cyber security is likewise occurring for inventing new registered in Apr-Sep 2018 Read more at:
//economictimes.indiatimes.com/articleshow/67977230.cms?utm_sou
effective and efficient techniques to countermeasure cyber- rce=contentofinterest&utm_medium=text&utm_campaign=cppst.”
crimes. Similarly, awareness program are taking place for [Online]. Available:
alerting people regarding cyber-crimes and various cyber- https://economictimes.indiatimes.com/industry/banking/finance/banki
security strategies which they can use to prevent or avoid ng/over-900-cases-of-fraud-involving-cards-net-banking-registered-
in-apr-sep-2018/articleshow/67977230.cms.
cyber-crimes. Correspondingly traditional network are
[6] C. E. Notar, S. Padgett, and J. Roden, “Cyberbullying : A Review of
replacing by Software Defined Network (SDN) for making the Literature,” vol. 1, no. 1, pp. 1–9, 2013.
the network more secure [31]. Government is also
[7] Christof Baron, “IUM Number of cyber crimes related to social media
additionally expanding the number of cyber cells to across India in 2016 and 2017,” Statista Research Department.
minimize cyber-crimes. [8] F. Ullah and M. Ali, “Architectural Tactics for Big Data
Cybersecurity Analytic Systems : A Review,” pp. 1–48, 2018.
V. CONCLUSION [9] R. Patgiri and U. Majhi, “Big Data Security Analytics : Key
Challenges,” pp. 151–154.
Some online scams are very efficient and persuading as [10] IOANA and RIJNETU, “Here are the Top Online Scams You Need to
well. Troublesome issue is that the individuals behind these Avoid Today [Updated 2019],” Heimdal Security. [Online].
scams are very hard to recognize, that is why this sort of Available: https://heimdalsecurity.com/blog/top-online-scams/.
scams are expanding every day. Above report demonstrates [Accessed: 05-Jul-2019].
that India’s rank is third on the world, where cyber-crimes [11] A. Sreehari, K. J. Abinanth, B. Sujith, and P. S. Unnikuttan, “A
are occurring frequently. Women, children and senior STUDY OF AWARENESS OF CYBER CRIME AMONG
COLLEGE STUDENTS WITH SPECIAL REFERENCE TO
citizens of society are mostly affected by cyber-crimes KOCHI,” vol. 119, no. 16, pp. 1353–1360, 2018.
according to various papers surveyed. Research works are
[12] N. Jyoti, “Cyber Security : Protection of Human Rights,” vol. 3, no. 2,
increasing gradually in the field of cyber-crimes to pp. 888–895, 2017.
understand the penetration level of it in the society. Research [13] W. Ghori, “Security Issues on Online Transaction of Digital
also shows that women belonging to the age group of 16-35 Banking,” no. 1, pp. 41–44, 2017.
years were more vulnerable to cyber-crimes. Big Data [14] S. Deshpande, “VICTIMIZATION OF WOMEN IN CYBER SPACE
security and privacy are also very important to save the AND AN ANALYSIS OF CYBER LAWS IN INDIA ISBN 978-93-
society from cyber-crimes. Banking Systems are very 84124-66-3 ͺ
vulnerable to cyber-attacks. Almost in every day newspaper,

274

Authorized licensed use limited to: Cornell University Library. Downloaded on August 19,2020 at 06:51:46 UTC from IEEE Xplore. Restrictions apply.
[15] Aditi Mallick, “GHMC outsourced staff held for fraud,” The Times of [23] C. E. Drake, J. J. Oliver, and E. J. Koontz, “Anatomy of a Phishing
India. [Online]. Available: Email,” pp. 1–8, 1841.
https://timesofindia.indiatimes.com/city/hyderabad/ghmc-outsourced- [24] Y. Park, J. Jones, D. Mccoy, E. Shi, and M. Jakobsson, “Scambaiter :
staff-held-for-fraud/articleshow/70098538.cms. [Accessed: 10-Jul- Understanding Targeted Nigerian Scams on Craigslist,” no. February,
2019]. pp. 23–26, 2014.
[16] E. Abu-shanab, “Security and Fraud Issues of E-banking,” vol. 2, no. [25] K. Information, S. Security, and I. Global, “Phishing Isn ’ t So
4, pp. 179–187, 2015. Sophisticated : Scary !,” 2004.
[17] R. G. Sarita Sharma, “Comparative Study and Analysis of Unique [26] E. Summary, P. Characteristics, C. Characteristics, and C.
Identification Number and Social Security Number,” International Characteristics, “No Title.”
Journal of Scientific Research in Computer Science and Engineering,
Vol.5, Issue.1, pp.27-30, 2017, 2017. [Online]. [27] M. T. Whitty, “The Online Romance Scam: A Serious Cybercrime,”
Available:https://www.isroset.org/journal/IJSRCSE/full_paper_view. Cyberpsychology, Behavior, and Social NetworkingVol. 15, No. 3
php?paper_id=312. Rapid Communications. [Online].
Available:https://www.liebertpub.com/doi/abs/10.1089/cyber.2011.03
[18] K. Modi and M. Bank, “Review On Fraud Detection Methods in 52.
Credit Card Transactions,” 2017.
[28] M. Vasek and T. Moore, “There ’ s No Free Lunch , Even Using
[19] W. Fadzilah, W. Yusoff, and A. B. Sade, “Electronic banking fraud ; Bitcoin : Tracking the Popularity and Profits of Virtual Currency
The need to enhance security and customer trust in online banking Scams,” 2015.
International Journal in Advances in Information Sciences and
Service Sciences,” vol. 3, no. November, 2011. [29] Legal Articles, “Cyber defamation in India,” Helpline Law Legal
Solution Worldwide. [Online]. Available:
[20] Tushar Kaushik, “Bengaluru is India’s cybercrime capital Read more http://www.helplinelaw.com/employment-criminal-and-
at: labour/CDII/cyber-defamation-in-india.html.
//economictimes.indiatimes.com/articleshow/67769776.cms?from=m
dr&utm_source=contentofinterest&utm_medium=text&utm_campaig [30] M. of S. for L. and I. P. P. Chaudhary, “Number of cyber financial
n=cppst,” The Economic Times. [Online]. Available: frauds jumps to 16,468 in 2015-16 Read more at:
https://economictimes.indiatimes.com/tech/internet/bengaluru-is- //economictimes.indiatimes.com/articleshow/57895750.cms?utm_sou
indias-cybercrime-capital/articleshow/67769776.cms?from=mdr. rce=contentofinterest&utm_medium=text&utm_campaign=cppst,”
[Accessed: 15-Jul-2019]. The Economic Times. [Online]. Available:
https://economictimes.indiatimes.com/news/politics-and-
[21] “Watch out, cyber fraud cases in banks are spiking,” The Economic nation/number-of-cyber-financial-frauds-jumps-to-16468-in-2015-
Times. [Online]. Available: 16/articleshow/57895750.cms. [Accessed: 17-Jul-2019].
https://economictimes.indiatimes.com/industry/banking/finance/banki
[31] V. Baggan and S. N. Panda, “Enhancing Network Path Restoration
ng/watch-out-cyber-fraud-cases-in-banks-are-
spiking/articleshow/67349755.cms. With Software Defined Networking,” vol. 14, no. 8, pp. 1910–1916,
2019.
[22] MOHUL GHOSH, “25k Cases Of Online Banking Fraud In 2017;
[32] S. N. Kaushal, R.K., Panda, “A meta analysis on effective conditions
Here Are Our Top Digital Fraud News!,” Trak.in. [Online].
to offer animation based teaching style,” Malaysian J. Learn. Instr.,
Available: https://trak.in/tags/business/2018/01/01/online-banking-
2019
fraud-2017/.

275

Authorized licensed use limited to: Cornell University Library. Downloaded on August 19,2020 at 06:51:46 UTC from IEEE Xplore. Restrictions apply.

You might also like