Page 143 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 143
E-Commerce and E-Business
Mr. Ram asked a nearby Internet browsing center owner to set up his Internet
connection. While doing this, the owner got to know Mr. Ram’s username and
password. The owner then sold this information to another Internet browsing
center. A week later, Mr. Ram discovered that his allotted Internet hours were
almost over. From the total of 100 hours bought by Mr. Ram, 94 hours were
already used by the third party within the week.
9. Logic Bomb: These programs are created to do something only when a certain event occurs.
Some viruses may be termed logic bombs because they are inactive all through the
year and become active only on a particular date.
10. Intellectual Property Crime: Intellectual property crime is generally known as piracy or
counterfeiting. Piracy involves willful copyright infringement. Whereas, counterfeiting is willful
trade mark infringement.
Sachin, a software professional from Bangalore was booked for stealing the source
code of a product being developed by his employers. He started his own firm and
allegedly used the stolen source code to launch a new software product.
In Australia’s largest copyright infringement case, three university students
received criminal sentences for running a Web site which offered more than 1,800
pirated songs for download. The court warranted 18-month suspended sentences
for two of the students and an additional fine of US$5,000 for one of them.
11.2.3 Reporting a Cybercrime
Crime in a society will remain at a tolerable level if it is detected early and the criminals are identified
and awarded appropriate punishment. This will dissuade other individuals from indulging in such acts
in the future. An unreported crime encourages the criminal to commit further such acts, apart from
taking away the deterrence for others. Proper reporting helps the policy makers to know about the
trends and allocate the resources to adequately tackle newer crimes.
Individuals do not report crime as they are concerned about the loss of reputation or negative publicity.
However, most law enforcement agencies are aware of this and take steps to keep crime details
confidential.
The following details must be provided by the complainant while addressing a complaint to the head of
cybercrime investigation cell:
1. Name of the complainant.
2. Mailing address and telephone number of the complainant.
3. Details on how the offence was committed, along with names and addresses of suspects, and any
other relevant information.
The content of the application varies with the type of fraud faced by the victim. The following details
must be provided by the complainant for the respective fraud faced:
Cyber Stalking
Cyber stalking is the most common type of crime and the victim’s report should contain the following:
1. E-mails or messages received.
2. Phone numbers of any obscene callers.
3. Web site address which contains the victim’s profile.
136 LOVELY PROFESSIONAL UNIVERSITY