Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 53

MEDIA RESEARCH LAB (353)

CYBER CRIME ON WOMEN


Submitted in the partial fulfilment of requirement

For the award of degree of


Bachelor of Arts (Journalism and Mass Communication)
To

GURU GOBIND SINGH INDRAPRASTHA

UNIVERSITY NEW DELHI

Submitted to: - Mr. Mohit Kumar By: - Aniket


Varshney (Assistant professor) (50227102418)

SESSION-2018-2021

UNITED COLLEGE OF EDUCATION


(Affiliated to GGISPU, New Delhi)
Greater Noida, Knowledge Park
III

1|Page
2|Page
ACKNOWLEDGEMENT
I Aniket Varshney would like to express my gratitude to Mr. Mohit Kumar (Assistant
Professor) for helping me throughout the projects and encouraging me at every step. I would
like to express my earnest gratitude to UNITED COLLEGE OF EDUCATION affiliated to
Guru Gobind Singh Indraprastha University for giving me the opportunity to undertake this
project.

This acknowledgement is incomplete without thanking and expressing a profound gratitude


to PROF. (DR.) SANJAY SHRIVASTAVA (Head of Department) who has always guided
and encouraged me towards right direction and without his guidance and support this project
would not have been possible.

Aniket Varshney

3rd year student

Bachelors of Journalism and Mass Communication


CERTIFICATE

This is to certify that Aniket Varshney, student of Bachelor of Journalism &


Mass Communication BA(JMC), Batch of 2018, United College of Education,
affiliated to GGSIPU bearing enrolment no.50227102418, has undertaken the
guidance & supervision of Mr. Mohit Kumar (Assistant Professor).
TOPIC OF RESEARCH

Cyber Crime on Women


INDEX

S.NO. CONTENT SIGNATURE

1. Chapter-1: Introduction 7-12 pages

2. Chapter-2: Review of 13-9 pages


Literature

3. Chapter- 3: Objective 20-26 pages


and Methodology

4. Chapter-4: Data 27-34 pages


Analysis

5. Chapter-5: Conclusion 35-38 pages

6. Chapter-6: Bibliography 39 page

7. Appendix 40-41 pages


Abstract

Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is
a unique and important contribution to the literature on cybercrime. It explores
gendered dimensions of cybercrimes like adult bullying, cyber stalking,
hacking, defamation, morphed pornographic images, and electronic
blackmailing. These and other tactics designed to inflict intimidation, control,
and other harms are frequently committed by perpetrators who, for many
reasons, are unlikely to be identified or punished. Scholars, researchers, law
makers, and ordinary women and their supporters will gain a better
understanding of cyber victimization and discover how to improve responses to
cyberc
Chapter 1

Introduction

The world of internet today has become a parallel form of life and living. People are capable
of doing things which were not imaginable a few years ago. Modern Era is the time of
technology and it is all about efficiency and speed. It is about ensuring face-to-face
interaction, connecting, and empowering you by giving you more access and control to the
kind of care you get as well as service you receive. The internet is fast becoming a way of life
for billions of people and also a way of living because of growing dependence and trust of
mankind on these machines. Internet though offers great benefit to society, also present
opportunities for crime using new and highly sophisticated technological tools. Although
internet is one of the fastest modes of communication and has spread its sphere, covering all
possible shades of mankind. But as the saying goes – “every good side has a bad side too”.
The same is true with the computer and internet technologies too.

Although, the number of people using the internet in India is increasing day by day but there
is some gender disparity which is clearly visible among the social network users. This can be
seen in various fields such as the number of people using the internet as well asthe number of
people using Facebook or Twitter or Instagram and so on. The imbalanced number of users
on the internet is the major contributor of this phenomenon. It is very closely related to the
escalating incidents of cybercrimes against females. Coming to the legal framework in India
to combat cybercrimes, essentially, there are majorly two statues that address cybercrimes
against females. Namely, they are the Indian Penal Code, 1860 and The IT Act, 2000. The
IPC does not specifically talk about cybercrimes, rather it is general criminal law, which
defines the different offences and specifies punishments to be awarded for the commission of
those offences. It should be taken into notice that the offences listed in the code are addressed
for their commission in physical or tangible or the real world. The provisions of the IPC are
relevant to cyber violence against females via legislative amendments and judicial
interpretations. The IT Act covers majorly commercial and economic crimes but there are no
specific provisions to cover cybercrimes against women.
Access to the internet is the need of every person and therefore, it is rapidly turning into a
necessity for financial prosperity and is being viewed as a basic human right. Thus, it is
important to make sure that this digital public space is a guarded and enabling place for all,
including females of all ages.

The rapid technological advancements like the internet clearly threaten to leave the law behind.

What is Cyber Crime?

The offences which take place on or using the medium of the internet are known as cyber
crimes. This includes a plethora of illegal activities. The term ‘Cyber crime’ is an umbrella
term under which many illegal activities may be grouped together. Because of the anonymous
nature of the internet, there are many disturbing activities occurring in the cyberspace which
may enable the perpetrators to indulge in various types of criminal activities which are called
cyber crimes. Cyber crime as defined internationally by the U.N. Congress on Prevention of
Cyber crime and Treatment of Offenders 6 comprises two categories as follows: • Cyber
crime in a narrow sense connotes a computer crime and includes any illegal behavior directed
by means of electronic operations that targets the security of computer systems and the data
processed by them. • Cyber crime in a broader sense includes all computer related crimes and
consists of any illegal behavior committed by means of, or in relation to, a computer system
or network, including such crimes as illegal possession and offering or distributing
information by means of computer system or network. In the Indian context, cyber crime may
be defined as a voluntary and willful act or omission that adversely affects a person or
property or a person’s computer systems and made punishable under the Information
Technology Act, 2000 or liable to penal consequences under the Indian Penal Code. The
Indian Legislature doesn’t provide the exact definition of Cyber crime in any statute, even the
Information Technology Act, 2000; which deals with cyber crime doesn’t defined the term of
cyber crime. However in general the term cyber crime means any illegal activity which is
carried over or with the help of internet or computers.
 Harassment through e-mails
 Cyber Stalking
 Cyber Defamation
 Cyber pornography
 Email spoofing
 Cyber morphing

I. Harassment through e-mails: It is not a new thing. It is very similar to


harassing through letters. It includes blackmailing, bullying, threatening
and even cheating via email. Through E-harassments are similar to the
letter harassment but creates problem quite often when posted from fake
ids.
II. Cyber Stalking: It is one the most knowing or talked about and
committed net crimes in the modern world. It is defined as pursuing
stealthily. Following a person movement across the internet by posting
messages sometimes threatening on the bulletin boards accessed by the
victim and by constantly bombarding the victim through emails,
messages or calls etc. constitutes cyber stalking.
III. Cyber Defamation: Cyber tort including libel and defamation is another
common cybercrime against women on the internet. This occurs when
defamation takes place with the help of computers or internet. For
example, someone post defamatory stuffs about someone on a website or
sends mails containing defamatory content to all of that person’s friends
or family members. It is mostly committed by hacking someone’s id
(social media handles). It is also done by creating fake social media
accounts of that person, which resembles to be a genuine one to others on
any website.
IV. Cyber Pornography: It is one of the most dangerous threat to the female
netizens. This would include pornographic websites or magazines
produced using computers to publish and print the material and the
internet to download and transmit pornographic pictures, photos, writings
etc. Internet has provided a medium for the facilitation of crimes like
pornography, especially cyber porn. Today, 50% of the web sites contain
pornographic material on the internet. This turns dangerous to a women
integrity as cyber criminals use photos of women and fix them with nude
photographs or videos and the photograph or video resembles of that
women only.
V. Morphing: Editing of the original picture by unauthorized user or fake
identity is termed as morphing. It was identified that female’s pictures are
downloaded by fake id and again re-posted/uploaded on different
websites by creating fake profiles after editing it.
VI. Email spoofing: An email which misrepresents its origin is a spoofed
mail. It shows its origin to be different from which actually origin.
IMPACT OF CYBER CRIME

Under this technological development the most effected victim is women.


The social media sites have developed a new arena for socializing.
Irrespective of any distinction, women, in the society are exulting with
this liberation to the fullest. From online shopping to net banking, from e-
ticketing to e- tax filling, it has made the life of Indian women easy. It has
enabled women to fight for equality even within the confines of their
society. They can now share their experiences to world, to voice their
hard work and success in life. The internet is serving as boon, but on the
other side it has made the life of women insecure due to rise of
cybercrimes.
Women of all ages and milieu are in jeopardy with the coming of internet.
While many women victimized online, what makes Indian women rare?
India is predominantly patriarchal and orthodox country and women who
are victimized are mostly blamed and online victims are no exception,
penetration of info. And communication technologies offer great
opportunities and more and more users getting connected. The cost of
owning internet enabled devices has also facilitated to this growth. The
rise in penetration of ICT, has spurred a growth in ICT based business
and services.IT- enabled initiatives like govt. to citizen services, public
distribution system, healthcare, e-learning and mobile banking etc.
CYBER LAWS IN INDIA

The penalties for these crimes include fines, imprisonment for up to two
years or more. Cybercrime against women in India is on at the alarming
stage and it may pose as a major threat to security of a person as a whole.
In India the term “cybercrime” includes sexual crimes and sexual abuses
on the internet. India is considered as one of the very few countries to
enact IT act 2000 to combat cybercrimes. This act widely covers the
commercial and economic crimes which is clear from the preamble of the
IT act.

 Section 65, deals with the offences such as tampering with data.
 Section 66, deals with hacking with systems
 Section 67 publishing of information which is obscene in electronic
forms
 Section 70 access to protected system
 Section 72 breach of confidentiality and privacy
 Section 74 publication for fraudulent purpose
 Section 67 of information technology act ,2000 which dealt with
obscene publication in the internet. He was sentenced for life
imprisonment and a pecuniary fine of rupees 1 , 25,000 under the
Immoral trafficking act, 1956.
Review of Literature

1.Debarati Halder and K. Jaishankar

Cyber crimes are a serious issue in India now. A book dedicated to the cause is a welcome
addition to the books on crime in general. India being one of the fastest growing
economies in the world and the development of communication technology in India has
also grown in leaps and bounds. The first record of cyber crimes against women, in India,
was in 2013 which indicates to the fact that women are and have been easy targets of such
crimes. Debarati Halder and K. Jaishankar do precisely this. They write on the types of
cyber crimes in India, legal provisions and ways to combat the crimes. They bring in the
question of gender from the very beginning keeping the discussion tight and simple. The
Foreword written by Professor Antonopoulos explains the book aptly: Simple and lucid
explanations for a delightful reading.

The book contains nine chapters out of which five are dedicated to different forms of
cyber crimes, two on legal provisions, practices and investigations, and the last chapter on
ways to combat the offence. The introductory chapter of the book discusses on
Information and Communication Technology (ICT), its development in India, the
background of writing the book and an apt justification citing different lawsuits and
instances of the crime worldwide. Chapters from second to sixth are dedicated to the
types of crimes. The second chapter is on freedom of speech as enshrined in the
Constitution and also a source of misuse of the Internet. The authors take up cases to
illustrate how women were victimised on the Internet, which on the one hand gives
women the power to express themselves and on the other hand is a source of their
desolation. The third chapter deals with other types of cyber crimes: Gender bullying and
trolling. The authors first explain what the terms mean and then show how bullies
targeting women have taken to the Internet and digital communication technology. The
fourth chapter explores another type: Online grooming. Grooming is a trap that at first
establishes a vicious network that facilitates crime. Loneliness from depression, breaking
down of families and other social factors gives way to the use of Internet by women. The
chapter discusses the methodologies of grooming, its possible results and legal solutions.
The fifth chapter opens up the issue of infringement of privacy in cyber space such as
hacking, stalking, voyeurism and the like. The sixth chapter deals with online sexual
offences such as
discussions on obesity, pornography, obscenity, sexting and legal debates concerning
those. Sometimes, fake avatars are created to victimise women. The last two chapters deal
with legal provisions, responsibility of the Internet and digital communication technology
service providers. The legal debate on the ‘right to forget’ and its application on the
Internet companies are dealt with in this chapter. The eighth chapter opens up the issue of
procedural practices for investigation and process of prosecuting the Internet crimes
targeting women. The authors deal with the orthodox mindset of the victims and practical
problems like absence of mutual legal assistance treatises dealing with cyber crimes. The
last chapter, the ninth, serves the issue by taking up several measures for combating cyber
crimes against women in India. The authors give importance to the issue of sensitisation
and uphold a model policy or guidelines for the protective use of Internet including
various social networking sites. The book is completed with a glossary and an annexure.
The Glossary includes terms that are used in identifying a crime and a criminal and those
used in prosecution. The Annexure deals with models for the prevention of online
victimisation of women, proposal of cyber rights for women, code of conduct in the cyber
space, all of which can be of immense use for future debate and research in the field.

The book can be a treasure for scholars and policymakers. Internet, as we know, has no
boundaries and has a greater audience. The harassment and abuse of people sitting in
different geographical and social locations, literate and illiterate, can also be varied and
complex. Anonymity of the perpetrator, use of free speech adds to the problem of a huge
lacuna regarding check and balance, and the ethical standards in this regard. The authors
not only discuss the layers in the complex problem but also come up with possible
solutions in the form of models. Among a few good books on crime, mostly written on
from a Western perspective, this book, completely dedicated to Indian situation, is a
welcome addition to the bibliography on crimes in India. The publisher also needs to be
applauded for the initiative.
2. Forty-eight hours of non-stop abuse

A survey of 500 Indian internet users revealed the extent to which online violence affects
everyday women and marginalized individuals. Of those 500, 97 percent identified
themselves as women, and 3 percent as other, a category that encompasses transgendered
people. Nearly half of respondents were between ages 18 and 25, with another third
between 25 and 35. Most respondents were from the major Indian cities of Delhi,
Mumbai, Bangalore, Chennai, Hyderabad, and Kolkata. Fifty percent of respondents said
they were educated to postgraduate level, and 32 percent to college level. Forty-eight
percent were professionals and thirty-five percent were students. Nearly 100 percent said
they regularly use technological devices like mobile phones, computers, laptops, or
tablets. When asked which social media platforms they use frequently, 95 percent of
respondents said Facebook, followed by Instagram (52 percent), Twitter (50 percent),
Snap Chat (18 percent), and Tumblr (14 percent). Eighty percent of respondents reported
that social media applications, besides providing a platform for personal activities like
sharing pictures, are their primary source of news, a trend also observed in the United
States and other countries.12 Among messaging services, WhatsApp was used by 93
percent of respondents compared to Telegram, which was used by 8 percent.

3. I received rape and death threats

This activity appeared to be perpetuated by men or under accounts associated with male
names, according to 85 percent of respondents. “My daughter and I posted online about how
women (including us) had been beaten and detained illegally by Delhi Police in December
2012 for protesting peacefully against a gang-rape. [Another time,] I questioned Yakub
Memon’s hanging by calling it judicial murder,” one said. Yakub Memon was convicted of
carrying out bomb attacks in Mumbai in 1993 and executed in 2015. “On both occasions, I
received rape and death threats, mostly from men…the abusers also got hold of my phone
number and address!”
4.Cyber violence and victimization against women in India

The information technology sector in India has seen a quantum leap since 1990s which is still
continuing. Almost every household with moderate economic condition have internet access.
In other words, internet has brought the world in our living rooms. People from the age group
of 13 to 70 years who have access to the internet are continually using this either at home, or
at workplaces, or at cyber cafes, or at education institutions etc (Halder and Jaishankar 2010:
1). Thus, it has exposed the society to a new world in which we can share our ideas and
culture values and can enjoy all opportunities. But it is not a danger free zone. Cyber space
has become an instrument for offenders to victimize or infringe women, the most vulnerable
targets on internet after children. Internet has opened flood gates for various crimes against
women in the cyber space. Even though, draftsmen and other world leaders who participate in
EU conventions for establishing strict rules to control cyber crime against children, never
considered victimization of women in the cyber space as a big issue like child pornography or
hacking etc. which require an attention (HalDer and JaishanKar 2009: 5-6). Modern
innovations have made life easier for women across the world, but side by side, these have
also led to rise in the crimes of electronic violence against women, so-called eVAM. Cheekay
Cinco of the Association for progressive communications says that, “Violence against women
is mutating because of technology (Manila 2011) 2 . This is why cyber crime against women
is increasing day by day. Internet and electronic network has exposed women to cyber-
stalking, cyber defamation, harassments, email spoofing, pornography, psychological torture
and sexual abuse etc. Generally, women remain ignorant of these crimes and their inherent
danger. Celina Jaitley, a Bollywood actress, had filed a complaint with Mumbai Police
against two websites including a foreign one which have allegedly morphed her pictures and
upload them to promote lingerie products. Yet, most women are still unaware of these crimes,
until theycome to know about the truth, it gets too late by then (Geetha 2011). 3 Thus, cyber
space has become really a play ground for some fraudulent people who try to victimize
women through online harassment. The study conducted by Ms Jyoti Rattan reveals that
about 60 per cent of all websites are sexual in content. Twenty per cent of them solicited their
visitors, 13 per cent went voluntarily and the rest were pictorially lured. The increasing
popularity of chat rooms and the vulnerability of personal data to criminal access make
women and children the easiest targets in the ambit of guilty crimes.” There is no doubt that
cyber crimes are easy to commit with
very little resources, but the damage can be huge to the security of women. The internet
technology came into existence only in 1986, but it has shown unparalleled aggressive
growth. For example, electricity was first harnessed in 1831, but it was not until 1882 that the
first power station was built, and it was another 50 years before electricity powered 80 per
cent of the factories and households across the United States. Radio was in existence 38 years
before 50 million people used it; TV took 13 years to reach the same benchmark. It was 16
years before 50 million people used a personal computer. Once the internet was made
available to the general public, it took only four years for 50 million people to go on-line
(Prashar 2004).”

5. Yogesh Prabhu v. State of Maharashtra

This case was decided by M. R. Natu in July, 2015 who was the then Additional Chief
Metropolitan Magistrate. This judgement was the first conviction awarded in any case of
cyber stalking against a woman. Initially, in 2009, the woman started chatting with the
accused Yogesh Prabhu on a social networking website. Yogesh proposed her for marriage
and she turned the proposal down. After this also, she received messages continuously but
she stopped responding towards them and ignored them as she suspected his strange
behavior. She blocked him on the website so that he couldn’t finds her. However, he kept
stalking her and after few months, he started sending her emails consisting of obscene images
and video clips from an unknown account. Seeing this, she lodged a police complaint which
was later taken up by the Cyber Crime Investigation Cell for investigation. The IP (Internet
Protocol) address of the device was tracked down and it was found to be of a firm named
„Vashi‟ of which, Yogesh Prabhu was an employee. The investigation was done and the
accused was convicted under Section 509 of IPC and Section 66E of the IT Act which was
the then followed provisions.
6. Suhas Katti v. State of Tamil Nadu

This case was decided by a court of Chennai in November, 2004. It was the first conviction
awarded in any case of cyber pornography of a woman. The victim was a divorcee and she
started receiving messages by the accused after she had turned down the proposal of marriage
given by him. The accused man was sending her obscene, annoying and defaming pictures in
a chat group of Yahoo by a fake email ID in the name of a female. The victim was also being
called by people on phone who believed that she was soliciting for sexual activities. The
victim lodged a police complaint stating the above problems being caused to her which were
further investigated by the Chennai Cyber Crime Cell. On the completion of the investigation,
the accused was convicted for a period of 2 years of rigorous imprisonment and a fine
amounting to Rs. 500, further, one-year simple imprisonment and Rs. 500 fines, this sentence
was awarded under Section 469 and Section 509 of IPC respectively. Moreover, he was
awarded conviction of rigorous imprisonment for 2 years and fine of Rs. 4000 under section
67 of the IT Act.

7. Saddam Hussain v. State of Madhya Pradesh

This case is important as it shows that cases of cybercrimes are taken very seriously by the
courts. The modesty of the victim was caused indignation by the accused. The accused video
clipped the same in his mobile and then blackmailed her to do favors for him. A criminal
complaint was filed by the victim under Section 507 OF IPC, Section 354D of IPC and
Section 66A of the IT Act. The petition was filed in the MP High Court pleading for
overturning on the premise of a settlement reached at between the victim and the accused.
The HC denied to do this and affirmed that these offences affect the society at large and any
kind of private settlement between the parties won’t stop the proceedings of the case.
8. Easily available information of the victims:

Social networking websites are made for people to connect to each other even at long
distances and also to let people know each other. To show the presence of a profile, the users
have to put their personal data like age, phone number, residential address, marital status, and
so on. Though some of these websites give users the publication of their information as an
option and even making profiles with fake names is totally allowed but the first-time
registrants, including females give away their private info on the internet through these
websites without even knowing the menacing effect of publishing such information. This
information is visible to the public and is then used by the perpetrator to victimize women.

9. Victimization of women

Indian society is predominantly patriarchal in nature, and this is a major reason for women
becoming victims of cyber crime. The cause behind it is that men attach respectability of a
family on the honor of the women members, which makes women vulnerable. In India,
gender differences cast a tremendous effect on nurturing practices. Partial computer illiteracy
refers to the incomplete or fractional knowledge in handling or operating computer system
and its application. Computer literacy does not only include browsing the internet through
Google or the use of social networking websites like Facebook, Twitter, or Orkut. Computer
literacy should include privacy protection, protection from spy ware, internet viruses like
Trojans, tracking cookies etc. One of the possible explanations of this could be because of the
fact that in India the advent of the computer was marked up by the snowball effect. This
could be explained by the fact that initially very few people had learned computers by taking
the help of the professionals. People started practicing computers with the help of their
friends, peers, classmates etc. This resulted in computer literacy, but that was incomplete, and
therefore, it had led to partial computer illiteracy. The concept of computer illiteracy could be
explained in terms of gender differences also. Researches show that many surveys have been
conducted to investigate the impact of gender difference on computer literacy. To a large
extend the results revealed that computer literacy rate of males are higher than that of
females.
Objective
The main objective of conducting this research on the topic, Cybercrime on women are listed
below:

 To know how cybercrime on women is increasing in India


 To find out the women feel safe on internet.
 To find out which social media is biggest platform of crime.
Recommendations

For social media platforms:

• Create ways for women and representatives of minority groups to escalate reports of
harassment, particularly incidents involving multiple accounts or lasting several days,
indications that the activity is organized.

• Employ local staff, particularly grievance officers, to ensure that workers can adequately
evaluate complaints about posts made in local languages based on local cultural context.

• Facebook should revisit its real-name policy and make it more flexible, especially for
marginalized genders and sexualities, journalists, and whistle-blowers under threat. Right to
privacy and anonymity are fundamental rights and Facebook must uphold them. Harassment
continues despite the requirement, yet victims fear it can be used against them.

For the government:

• Encourage women to report when criminals violate their rights online.

• Ensure the Cyber Crime Prevention against Women and Children is accessible via mobile
internet as an app that functions even where bandwidth is low. Ensure that users’ privacy is
protected and that it is they are not subject to monitoring.

• Implement the law against individuals responsible for inciting and carrying out online
violence against women and marginalized communities, regardless of their political or
religious agenda.

• Bhartiya Janata Party leaders should strongly condemn online harassment conducted in the
name of Hindu nationalism. Party members and supporters responsible for harassment should
be held accountable.
For law enforcement:

• Foster an environment in which individuals feel confident enough to report online abuse to
authorities, even if this challenges cultural norms and takes time.

• Stop dismissing reports of sexualized or gender-based abuse because they take place on the
internet.

• Educate officers that the response to online harassment is not to stop the victim using the
internet.

• Inform officers about the laws that apply to online harassment, and how to direct
complainants to appropriate legal recourse.
Methodology

The methodology chapter explains how the research has been conducted, allowing readers to
evaluate the readability and validity of the research.

While conceptualizing or conducting any research on the topic which is very much familiar
with the general public, its always a good option, to deal the real-life problem by finding the
data at hand, and it becomes necessary to collect and analyze the data which is actual and
based on the facts and figures.

While conducting any research, one finds different ways of collecting the appropriate data
which differ considerably in context of money costs, time and other resources at the disposal
of the researcher.

The language used was English because the audience were very much comfortable in that
language, moreover they themselves responded in English. Questionnaire was decided
thoroughly with much care to be effective enough to explore all nuances of emotions or to
evoke true responses. Interviewees were thoroughly observed while being interviewed and all
the visible emotions and expressions were noted down. The interview proceedings were
recorded for future reference and analysis.

There are two types of data which are used at the time of research. The most basic and
difficult one is the ‘Primary Data’ which is extracted by the researcher and the information
included in that data is 100% authentic. Primary data can be collected either through
experiment or through survey. If the researcher conducts an experiment, he observes some
quantitative measurements, or the data, with the help of which he examines the truth
contained in his hypothesis. But in the case of a survey, data can be collected by any one or
more of the following ways:

1. Quantitative Methods
Quantitative method of research lies in the Primary Data, and this method emphasized
on objective measurement and the statistical, mathematical or numerical data which
we can either collect through polls, forming surveys or by conducting personal
interview.
In the quantitative research for valid generalizable results, the methods which are
taken are enough to detail for another researcher to replicate the study. Quantitative
research focuses on gathering numerical data and generalizing it across groups of
people or to explain a particular phenomenon.

If compared there are a wide range of statistical techniques which are available to
analyze the quantitative data, starting from the simple graphs to show the data through
test of correlations between two or more items. There are numerous activities which
are involved under the category of Quantitative Methods of Research.

2. Online Survey
Survey research is conducted as the collection of data which gets attained by asking
individuals questions either in person, on paper, by phone or online. A Survey is
defined as a research method used for collecting data from a pre-defined group of
respondents to gain information and insights on various topics of interest. Conducting
the surveys, us one of the forms of primary research, which is the gathering data first-
hand its source. An online survey is set of structured questions, that the respondent
completes over the internet, generally through filling out a form. An online survey is
an easier way to reach out to the respondents as it is less time consuming than the
traditional way of gathering information through one-to-one interaction and also less
expensive.

Conducting survey is one of the primary researches. While conducting the online
survey, I found the data attained by asking individual questions in person or through
preparing the questionnaire. The information collected may also be accesses
subsequently by other parties in secondary research. Through online survey, I got to
know the beliefs and values of selected group of individuals, whom I have chosen for
the demographic sampling. These demographics include age, gender, ethnicity or
income levels.
By conducting the survey for my desired topic, I studied and analyze beliefs of the
people regarding my topic. It is the most extensively used method in various economic
and business surveys. Before applying this method, usually a Pilot Study for testing
the questionnaire is conduced which reveals the weaknesses, if any, of the
questionnaire? Questionnaire to be used must be prepared very carefully so that it may
prove to be effective in collecting the relevant information.

The data is usually obtained through the use of standardized procedures whose
purpose is to ensure that each respondent is able to answer the questions at a level
playing field to avoid biased opinions that could influence the outcome of the research
or study. A survey involves asking people for information through a questionnaire,
which can be distributed on paper, although with the arrival of new technologies it is
more common to distribute them using digital media such as social networks, email,
QR codes or URLs.

The online survey which has been conducted was the most effective and doable choice
to study the attitude of people towards advertising.

Population- All the student, and people related to advertising background, parents and
teachers.

Sample Size- 101

Sampling Technique- Probability Sampling

Research Method- Online survey

Tool of data collection- Questionnaire

3. Existing Data
This is the secondary form of research, where we take the existing data on our topic and
make the desired changes to make it a part of our research. The secondary data or desk
research is a research method which do involves using already existing data. Existing
data is summarized and collated to increase the overall effectiveness of research.

The Secondary Research does include research material which gets published in
research reports and similar documents. Nowadays these documents can be easily
found on the internet. Gone are the days, when the information was only restricted to
the public library’s websites, and data obtained from already filled in surveys etc.
Some governmental and non-governmental agencies also store data, which can be
used for research purpose and can be retrieved from them.
Data-Interpretation

1. Gender

As this survey was circulated to maximum number of people, but it ended up with this ration.
Where the women audience found themselves more intact with my topic and submitted their
answers.

2. Age

This demographical representation shows, that I have targeted the people mostly from the age
group of 20-30. As it is easier for them to relate with my topic. The young adults and the mid
adults have a wider approach towards life and they have interpreted the meaning of each
question is a really effective manner.
3. Occupation

As I have previously told, that I have targeted Young adults and Mid adults. Young people,
often see the ads with different narratives and they are the active audiences of maximum
advertisement. So, it’s very clear that maximum of them is still pursuing their Masters and
PhD in the desired subjects. So, they have mentioned themselves in the list of students.

4. How aware are you about cyber-crimes?


In the demonstrated graph shown in this picture, it is showing how people aware about are
cybercrime as you all know that cybercrime is increasing day by day and people adopt any
methods to do this, then in this research We saw how people do cybercrime and how much
people know about it because it is very important to know so much in today's era.

5. How many times have you been a victim of cyber-crimes?

6. Have you ever experienced any of these situations?


In this demonstrated graph we are trying to show how much people know and whether or not
they have ever experienced such things as cyber bullying cyber pornography cyber stocking
& cyber morphing, all of this because all these things are spreading day by day and we are
trying to express how people feel about them and how much has happened to people.

7. Do you know what is the punishment of cyber morphing?

In this demonstrated graph we are trying to tell in this that if you know the punishment of the
cyber morphing and if you know then you can tell in it that you know it or not, it is being told
in this.
8. If something bad has happened to you online, who did you tell?

In this demonstrated graph we try to know that when someone behaves badly with us online,
then who do we tell first of all, then this is the end and as you can see, it is being shown that
most of us have bad activity which is with us It is about what we tell our friends or the
policemen. This show is happening in this graph as I conduct

9. In which social media app, you get bully?


In this demonstrated graph, we are trying to tell which social media platform where girls are
persecuted as if we can all speak cybercrime falls here, in this picture you can see that
Instagram is not secure for women’s, you can guess that this social media app for girls can
prove to be quite fatal.

10. If you get cyber bulling on internet , so what is your second step to solve it

In this demonstrated graph we are trying to tell that if someone is bully you on social media
or irritate you on social media, what is your second step, then in this you can see that the
highest number of reports are many and the number of reports is 54.9

11. Do you feel it is essential to be safe online?


Do you know when you use any social media or you do not know that your social media app
is also tracking your ID, some people think that, then they told that we would like to tell in it
The picture you are seeing is that you think that people are safe. On the online social media,
we get 47% of the answer that people believe that social media is right for them. 27% people
say that we agree

12. Do you know any cybercrime law?

In this graph, we can see that only 50% of people are aware of cyber law and 50% of
people do not know.

13. Are women safe on the internet?


So in this graph, you can see that 58% of women are not safe, out of which 9% are 31% may
not be able to say anything.

14. Why victims do not repost cybercrimes?

You all can see why the victim does not punish his culprit, out of which you can see 30% of
the people do not get punished due to fear and intimidation, out of which 23% people do not
do it for their honour or respect. Do not do this for the sake of them and 17% of them do not
listen because their report does not work and out of which 15% people do not know how to
punish their criminals, show them that they are doing wrong and 13 % People can't do it
because of threat.
15. Do you think that the laws in effect are able to control cyber criminals?

What do you think how beneficial cyber crime is in its country, how do its laws affect the
people, then let us see in this graph, of which 33% people do not mean cyber crime, I am
happy with the law of cyber crime because they are responsible Is not or does not work in
them, and 25% refused to say that it is of no use.
CONCLUSION

Cyber crime goes unreported as Indian women are unaware of such


offences. While people do not live in cyber space, they come and go
like any other place. This nature provides the offenders the chance to
escape after the commission of cyber crime. The biggest problem of
the cyber crimes lying within their mind. Many websites and blogs
provides security tips for the safety of women and children while
using internet . But still the cyber crime against women is on the rise.
IT act 2000 defines some crimes and their punishment but all these
are mostly dealing with economical and financial issue. Issues directly
affecting the women and the children are nowhere discussed in the
act. Typical cyber crime like morphing , stalking and email spoof are
not considered as offences in the act. These are the issues affecting the
women at large and when they are not protected by the statue, this
loophole encourages the criminals to pursue with these shameful
activities.

To reduce and prevent it or to be precise, to protect their modesty


being outraged through the means of internet, the INDIAN system
needs to come up with some amendments in the present statues, both
in IT Act and IPC to define and punish for such activities affecting the
women at large. Victims are silent bear all embarrassment, and thus,
punish them only for the crime which is done against them. They do
not realize that offender deserves that punishment, not the victims.
Crime not being
reported and unfortunately gives rise to the crime rate as the fear of
being caught or punished vanishes from the minds of offenders.

It concludes that the visibility to overcome the cyber crimes against


women as a whole is challenging and the only way is to understand
cyber crimes. Government needs to strengthen the legal system to
lower cyber crimes, because criminals consider it much easier than
traditional crimes due to less chance of being caught and fewer
penalties. Secondly, what needs to be changed is the sense or attitude
of the society towards women, not to consider woman as a
commodity. People have to understand that violence against women is
nothing but a manifestation of gender discrimination and inequality in
gender power relations. Thirdly, women should understand that the
time has come to reject the silence or reticence and come forward for
fighting against cyber crimes and for their rights. Fourthly, it requires
a regular research and attention on cyber crimes. It needs to be studied
in detail which should be funded by government. Fifthly, police
personnel must be given training in order to tackle and handle cyber
crimes. For this purpose, workshops and seminars on cyber space
education must be organized. Women should also participate in such
type of activities. Again but, in the end, people has to change their
mindsets towards women and should develop the sense of
commonality because cleanliness starts from home.
Several forms of cybercrimes against women are in action in India
during the present times. The need of the internet and its importance
has made it a vital part of everybody’s life. People of all ages use
internet and it brings with itself both pros and cons. Cybercrimes
against women is not limited to India, rather it is a global
phenomenon. Also, it is a huge matter of concern among countries
because of its continuous growth. The legal provisions enacted to
tackle cases of cybercrimes are not adequate enough to fully counter
them. The ground realities of what women facing cybercrimes
experience are not completely reflected by these laws. The initial step
in the direction of providing legal remedy to victims is to make sure
that online experience of threat or harassment or violence or
intimidation caused to women is precisely translated into written
regulation via amendments in the two main statutes. Thus, to combat
cyber violence against women in India, not only severe legislative
changes are required but also awareness is needed on the large scale.
These reforms cannot be brought by just a group of people, rather
several institutions like NGOs, women assistance cells as well as the
government need to join hands to bring them in action.
Bibliography

https://yourstory.com/herstory/2020/10/crisis-internet-
safety-women-social-media-cybercrime

https://www.ijeat.org/wp-
content/uploads/papers/v8i6S3/F13130986S319.pdf

https://www.ncbi.nlm.nih.gov/search/all/?term=cyber+cri
me+in+india

https://feminisminindia.com/wp-
content/uploads/2016/05/FII_cyberbullying_report_websit
e.pdf

http://www.cybercrimejournal.com/
APPENDIX
Link of Google form:
https://docs.google.com/forms/d/e/1FAIpQLSdyO0ilec6mU_Lgk8plGbyj1btwA0f2w6J1
a1L7VX-4J_sYMw/viewform

You might also like