Information Technology Act 2000 and the Potential Use of Data Analytics in Reducing Cybercrime in India

Information Technology Act 2000 and the Potential Use of Data Analytics in Reducing Cybercrime in India

Anjali Dixit
DOI: 10.4018/978-1-7998-3053-5.ch023
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cybercrime is increasing rapidly in this digitized world. Be it business, education, shopping, or banking transactions, everything is on cyberspace. Cybercrime covers a wide range of different attacks such as financial cybercrime, spreading computer viruses or malware, internet fraud, pornography cybercrime, intellectual property rights violation, etc. Due to increased cyber-attacks these days, the online users must be aware of these kinds of attacks and need to be cautious with their data online. Each country has their own laws for dealing with cybercrime. The different measures taken by the government of India to combat cybercrime are explained in this chapter. How the potential use of data analytics can help in reducing cybercrime in India is also explained.
Chapter Preview
Top

Introduction

The term “Cybercrime” needs no introduction in the present E-world. In this world, where everything is available at a click, infringements are in like manner taking place with just a click. Cybercrime in this way is considered as darker side of innovation and due to this World Wide Web (www) has now turned out to be World Wide Worry due to the digital violations. Web, however offers incredible advantage to society, likewise it also opens doors for cybercrimes utilizing new and exceptionally modern innovative devices.

Digital wrongdoing is rising as a genuine risk. The government, police departments and other cyber units do try to prevent cybercrime. Activities to check across digital dangers are coming to fruition. Indian police has started extraordinary digital cells across the nation to stop cybercrime.

The term Cyber “wrongdoing” is a misnomer. This term is not described in any standard/act passed or set up by the Indian Parliament. To battle cybercrime India got equipped with The Information Technology Act 2000. This demonstration got radically revised in year 2008. The Amended Information Technology Act isn't just viable than the previous act, in fact it is even more dominant and stringent than the previous one.

Data analytics can help in reducing cybercrime in India. Data analytics consists of a lot of techniques using which useful information can be extracted from different sets of data. There are different types of data analytics. They are as follows:

  • 1.

    Descriptive Analytics

  • 2.

    Diagnostic Analytics

  • 3.

    Predictive Analytics

  • 4.

    Prescriptive Analytics

1. Descriptive Analytics: The purpose of descriptive analytics is to show the layers of available information and present it in a digestible/coherent form. It used to understand the big picture of the any institutions process from multiple standpoints.

2. Diagnostic Analytics: It is an investigation aimed at studying the effects and developing the right kind of reaction to the situation.

3. Predictive Analytics: It helps to understand how to make a successful business decisions that bring value to companies.

4. Prescriptive Analytics: It is what to do in the future.

Data analytics can significantly reduce cybercrime in India. To find out how data analytics can reduce cybercrime in India, first what is cybercrime and all its related aspects needs to be understood.

Top

Definition Of Cybercrime

“Cybercrime” is not defined in any Indian legislation. Information Technology Act, 2000, is the only legislation which deals with the cybercrimes in India. Information Technology Act, 2000 was amended in the form of Information Technology (Amendment) Act, 2008 like mentioned earlier. However, in these both legislation there is no proper definition for “cybercrime”.

Cybercrime is something that includes a lot of malicious activities such as illegally intercepting someone’s data, copyright infringements, etc. In various dictionaries, the term cybercrime is defined as a “bad behavior which includes for example, intimidation, burglary, etc. executed utilizing a PC particularly to wrongfully find the opportunity to transmit or control information”.

Thus it can be rightly said that the term cybercrime includes various other aspects also like the use of computer and other computing devices, computer network, etc. based on which the cybercrimes can be divided into three categories that are as follows:

  • 1.

    Crimes in which the computing device is the main target. For example, to gain network access.

  • 2.

    Crimes in which the computer is used as a weapon. For example, denial of service.

  • 3.

    Crimes in which the computer is used as an accessory to crime. For example, storing illegally obtained data.

Top

How Cybercrime Works?

There is a growth in digital platforms due to technologies like Artificial Intelligence, data analytics, machine learning, cloud computing and internet of things. All these technologies are helping various digital platforms to sustain and function smoothly. However, the growth of digital platforms has increased the digital data generation.

Key Terms in this Chapter

Cyber Analyst: For digital security of a company, cyber analyst is responsible. Basically, they evaluate, plan, and implement the security systems to protect the organization from cyber threats.

Data Analysis: The process of collecting, organizing any data in proper order is comes under the data analysis. In analytical and logical reasoning to gain information these data analysis used.

Information Technology: Study, design, implementation, development of whole management of computer-based information systems are called as information technology which includes software applications and computer hardware.

Personal Computer: A multipurpose computer by its size, capabilities including price it feasible for personal use.

Cyber Security Threat: In general sense a malicious act that seeks to damage data, steal, or disrupt digital life called as cyber security threat.

Complete Chapter List

Search this Book:
Reset