|
Awareness of cyber culture among
Indian internet users
|
Yes
|
No
|
|
1. Knowledge of minimum age to join
cyber communities like Facebook, Orkut, Myspace etc
|
56.2%
|
43.8%
|
|
2. Allow others to use one’s own
email id / profile id /passwords etc
|
46.6%
|
53.4%
|
|
3. Use safety tips like filtering
emails, locking personal albums and information, personal walls of social
networking sites etc
|
69.9%
|
30.1%
|
|
4. Mail back to unknown senders of
spam / pornographic / erotic /phishing mails
|
37.0%
|
63.0%
|
|
5. Share personal information /
emotions with virtual friends / chat room partners etc whom you do not know
in real life
|
74.0%
|
26.0%
|
|
6. Believe in controlling free
speech while communicating in the cyber space
|
37.0%
|
63.0%
|
|
7. Read policy guidelines of social
networking sites, ISPs etc
|
28.8%
|
71.1%
|
|
8. Use pseudo names
|
45.2%
|
54.8%
|
|
Awareness of rights and reporting behaviour
|
Yes
|
No
|
|
Aware that hacking, creation of
pornography/distributing the same, distribution obscene materials etc are
criminal offences
|
80.8%
|
19.2%
|
|
Aware of his / her legal right to
protect privacy in the cyber space
|
78.1%
|
21.9%
|
|
Aware that cyber bullying, cyber
stalking, sending annoying, defaming messages etc can be penalized
|
19.2%
|
80.8%
|
|
Has reported incidences of cyber
victimization to police / lawyers / courts
|
9.6%
|
90.4%
|
|
Awareness of rights and reporting
behaviour
|
Yes
|
No
|
|
Aware that hacking, creation of
pornography/distributing the same, distribution obscene materials etc are
criminal offences
|
80.8%
|
19.2%
|
|
Aware of his / her legal right to
protect privacy in the cyber space
|
78.1%
|
21.9%
|
|
Aware that cyber bullying, cyber
stalking, sending annoying, defaming messages etc can be penalized
|
19.2%
|
80.8%
|
|
Has reported incidences of cyber
victimization to police / lawyers / courts
|
9.6%
|
90.4%
|
|
INCREASE THE EFFORT
|
INCREASE THE RISKS
|
REDUCE THE REWARDS
|
REDUCE PROVOCATIONS
|
REMOVE EXCUSES
|
|
Target harden
|
Extend guardianship
|
Conceal targets
|
Reduce frustrations
and stress
|
Set rules
|
|
Control access to facilities
|
Assist natural surveillance
|
Remove targets
|
Avoid disputes
|
Post instructions
|
|
Screen exits
|
Reduce anonymity
|
Identify property
|
Reduce arousal and temptation
|
Alert conscience
|
|
Deflect offenders
|
Use place managers
|
Disrupt markets
|
Neutralise peer pressure
|
Assist compliance
|
|
Control tools/weapons
|
Use place managers
|
Deny benefits
|
Discourage imitations
|
Control drugs and alcohol
|
|
REDUCING ENVIRONMENT OF INCIDENCE
|
INCREASING PERCIEVED EFFORT
|
INCREASING PERCEIVED RISK
|
REDUCING PERCEIVED REWARDS
|
ELIMINATING EXCUSES
|
|
Do not introduce targets Separation
of hard drives with and without access to system; Systems of parental
control; Content filters; ActiveX security controls; No access to chat rooms
(grooming)
|
Control access to system Firewall;
Update operating systems; Passwords for system access; Passwords for access
to web; Update passwords; Profiles on social network
|
Extend guardianship Forum
moderators; Echelon, Enfopol, Carnivore and Dark Web systems
|
Hide targets Use systems of
encryption; Hide personal data on social networks; Do not use bank passwords;
Perfect e-commerce systems
|
Set rules International legal
harmonisation; “Netiquette”
|
|
Identify risk zones Informational
campaigns about risks; Advise network of spam infections; White and
blacklists of web and spam; Identify bots
|
Detect and impede the attack
Antivirus; Antispyware; Antispam; systems of control for electronic banking
|
Reduce anonymity Identify IPs;
Registration on web forums; User identification systems; Biometric
identification and authentication
|
Remove targets Removable hard
drives; Alternative payment systems (PayPal); Change web addresses, domains
and
other
|
Set rules Web licence
notifications: copyright and ‘copyleft’; Privacy notifications on
Social networks
|
|
Decontamination/residue clean-up
Erase and destroy latent viruses; Bot disinfection
|
Deflect offenders’ Close networks;
Request removal of illicit content; Flagging mechanisms on social networks;
Denial of access to specific IPs.
|
Strengthen formal surveillance
Control networks through proxy; Specialized teams for cybercrime persecution
|
Remove benefits Persecution of
buyers of illicit content; persecution of money laundering
|
Strengthen moral conscience Raise
consciousness about intellectual property; Morally enforce legitimate
businesses
|
|
Separation of targets Internet2;
Creation of local security sub-networks
|
Control tools/weapons Obligatory
vigilance through IPPPS; Control data through RSS
|
Assist natural surveillance Improve
IP identification systems; Reconstruct architecture with defensive ends
|
Disrupt markets Offer economic
systems of file sharing (Spotify and others); Control direct file download
sites
|
Assist compliance new business
models (Apple); Legal hacker competitions; Strengthen open software
|
Authors: JOEL JOHN THOMAS, ABHIJITH TOJO, THERES EMMANUEL
International Journal for Legal Research and Analysis
All research articles published in International Journal for Legal Research and Analysis are open access and available to read, download and share, subject to proper citation of the original work.
Disclaimer: The opinions expressed in this publication are those of the authors and do not necessarily reflect the views of International Journal for Legal Research and Analysis.