Page 143 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 143

E-Commerce and E-Business




                                           Mr. Ram asked a nearby Internet browsing center owner to set up his Internet
                                           connection. While doing this, the owner got to know Mr. Ram’s username and
                                           password. The owner then sold this information to another Internet browsing
                                           center. A week later, Mr. Ram discovered that his allotted Internet hours were
                                           almost over. From the total  of 100 hours  bought by Mr. Ram, 94 hours were
                                           already used by the third party within the week.

                          9.   Logic Bomb: These programs are created to do something only when a certain event occurs.

                                           Some viruses may be termed logic bombs because they are inactive all through the
                                           year and become active only on a particular date.

                          10.  Intellectual Property Crime: Intellectual  property crime is generally known as piracy or
                              counterfeiting. Piracy involves willful copyright infringement. Whereas, counterfeiting is willful
                              trade mark infringement.

                                           Sachin, a software professional from Bangalore was booked for stealing the source
                                           code of a product being developed by his employers. He started his own firm and
                                           allegedly used the stolen source code to launch a new software product.


                                           In Australia’s largest copyright infringement case, three university students
                                           received criminal sentences for running a Web site which offered more than 1,800
                                           pirated songs for download. The court warranted 18-month suspended sentences
                                           for two of the students and an additional fine of US$5,000 for one of them.
                          11.2.3   Reporting a Cybercrime
                          Crime in a society will remain at a tolerable level if it is detected early and the criminals are identified
                          and awarded appropriate punishment. This will dissuade other individuals from indulging in such acts
                          in the future. An unreported crime encourages the criminal to commit further such  acts, apart from
                          taking away the deterrence for others. Proper reporting  helps the policy makers to know about the
                          trends and allocate the resources to adequately tackle newer crimes.
                          Individuals do not report crime as they are concerned about the loss of reputation or negative publicity.
                          However, most law enforcement agencies are aware  of this and take steps  to keep crime details
                          confidential.
                          The following details must be provided by the complainant while addressing a complaint to the head of
                          cybercrime investigation cell:

                          1.   Name of the complainant.
                          2.   Mailing address and telephone number of the complainant.
                          3.   Details on how the offence was committed, along with names and addresses of suspects, and any
                              other relevant information.
                          The content of the application varies with the type of fraud faced by the victim. The following details
                          must be provided by the complainant for the respective fraud faced:
                          Cyber Stalking
                          Cyber stalking is the most common type of crime and the victim’s report should contain the following:
                          1.   E-mails or messages received.
                          2.   Phone numbers of any obscene callers.

                          3.   Web site address which contains the victim’s profile.




                          136                                     LOVELY PROFESSIONAL UNIVERSITY
   138   139   140   141   142   143   144   145   146   147   148