International Journal of Social Science & Economic Research
Submit Paper

Title:
CONSUMER VIGIL ON CYBER CRIME ISSUES AND CHALLENGES IN VILLUPURAM : A STUDY ON IMPACT LEVEL OF AWARENESS WITH SOCIAL MEDIA PARTICIPATION

Authors:
Dr. R. RAMACHANDRAN

|| ||

Dr. R. RAMACHANDRAN
Assistant Professor, Department of Commerce, Annamalai University, Annamalai Nagar - 608 002, Tamil Nadu, India

MLA 8
RAMACHANDRAN, Dr. R. "CONSUMER VIGIL ON CYBER CRIME ISSUES AND CHALLENGES IN VILLUPURAM : A STUDY ON IMPACT LEVEL OF AWARENESS WITH SOCIAL MEDIA PARTICIPATION." Int. j. of Social Science and Economic Research, vol. 3, no. 10, Oct. 2018, pp. 5490-5506, ijsser.org/more2018.php?id=383. Accessed Oct. 2018.
APA
RAMACHANDRAN, D. (2018, October). CONSUMER VIGIL ON CYBER CRIME ISSUES AND CHALLENGES IN VILLUPURAM : A STUDY ON IMPACT LEVEL OF AWARENESS WITH SOCIAL MEDIA PARTICIPATION. Int. j. of Social Science and Economic Research, 3(10), 5490-5506. Retrieved from ijsser.org/more2018.php?id=383
Chicago
RAMACHANDRAN, Dr. R. "CONSUMER VIGIL ON CYBER CRIME ISSUES AND CHALLENGES IN VILLUPURAM : A STUDY ON IMPACT LEVEL OF AWARENESS WITH SOCIAL MEDIA PARTICIPATION." Int. j. of Social Science and Economic Research 3, no. 10 (October 2018), 5490-5506. Accessed October, 2018. ijsser.org/more2018.php?id=383.

References
[1]. Aghatise E. J. (2006): Level of Awareness of Internet Intermediaries Liability. (HND Project work) Unpublished. Auchi Polytechnic, Auchi, Edo State, Nigeria.
[2]. Alpna (2016), "Cyber Crime-Its Types, Analysis and Prevention Techniques", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 5, May 2016 ISSN: 2277 128X
[3]. Angel cruz,chief information security officer state of Texas, cyber security tips, monthly newsletter 2013,volume
[4]. Atul Kum ar, Sr. Analyst, Chiranshu Ahuja, Sr. Analyst, Cyber Security Research Developments Global and Indian Context, A NASSCOM Initiative
[5]. Atul M. Tonge1, Suraj S. Kasture2, Surbhi R. Chaudhari3 IOSR Journal of Computer Engineering (IOSR-JCE) CSE, Cyber security: challenges for society, ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 2 (May. - Jun. 2013).
[6]. Baskerville, R., 1991, Risk Analysis: An Interpretive Feasibility Tool in Justifying Information Systems Security, European Journal of Information Systems, 1(2): 121-130.
[7]. Berinato, S. (2002), Enron IT: A take of Excess and Chaos, CIO.com, March 5 http://www.cio.com/executive/edit/030502_enron.html, Visited: 28/01/2012
[8]. Bowen, Mace (2009), Computer Crime, Available at: http://www.guru.net/, Visited: 28/01/2012. By Jessica Stanicon (2009), Available at: http://www.dynamicbusiness.com/articles/articles-news/one-in-five-victims-ofcybercrime3907.html, Visited: 28/01/2012.
[9]. CAPEC (2010), CAPEC-117: Data Interception Attacks, Available at: http://capec.mitre.org/data/definitions/117.html, Visited: 28/01/2012.
[10]. Computer Hope (2012), Data Theft, Available at: http://www.computerhope.com/jargon/d/ datathef.htm, Visited: 28/01/2012.
[11]. Crime Desk (2009), Million Online Crimes in the Year: Cyber Crime Squad Established, Available at: http://www.thelondondailynews.com/million-online-crimes-year-cybercrime-squad-established-p-3117.html, Visited: 28/01/2012.
[12]. Cyber Trust and Crime Prevention, Mid-Term Review, November 2005 - January 2009, Available at: http://www.bis.gov.uk/assets/bispartners/foresight/docs/cyber/ctcp_midterm_ review.pdf, Visited: 28/01/2012
[13]. Cyberlawtimes (2009), Available at: http://www.cyberlawtimes.com/forums/index.php?board =52.0, Visited: 10/31/09
[14]. D. Ariz. (April 19, 2000), American Guarantee & Liability Insurance Co. v. Ingram Micro, Inc. Civ. 99-185 TUC ACM, 2000 U.S. Dist. Lexis 7299.
[15]. D'Amico, A., 2000, What Does a Computer Security Breach Really Cost?, The Sans Institute DSL Reports (2011), Network Sabotage, Available at: http://www.dslreports.com/forum/r26182468-Network-Sabotage-or-incompetentmanagers-trying-to-, Visited: 28/01/2012. en.wikipedia.org/wiki/Cyber_security_standards
[16]. Er. Harpreet Singh Dalla, Ms. Geeta HOD, Department of CSE & IT Patiala Institute of Engineering & Technology for Women, Patiala, India, Cyber Crime - A Threat to Persons, Property, Government and Societies, Volume 3, Issue 5, May 2013 ISSN: 2277 128X Forensic technology services cybercrime survey report 2014 kpmg.com/in
[17]. Gordon, L. A. et al., 2003, A Framework for Using Insurance for Cyber-Risk Management, Communications of the ACM, 46(3): 81-85.
[18]. Hancock, B., 2002, Security Crisis Management-The Basics, Computers & Security, 21(5): 397-401.
[19]. Harish Chander 2012, "Cyber Laws and IT Protection", PHI Learning
[20]. Hemraj Saini and Yerra Shankar Rao (2012), "Cyber-Crimes and their Impacts: A Review", International Journal of Engineering Research and Applications (IJERA) ISSN: 2248- 9622 www.ijera.com Vol. 2, Issue 2, Mar-Apr, pp.202-209.
[21]. Hemraj Saini and Yerra Shankar Rao (2012), "Cyber-Crimes and their Impacts: A Review", International Journal of Engineering Research and Applications (IJERA) ISSN: 2248- 9622 www.ijera.com Vol. 2, Issue 2, Mar-Apr, pp.202-209.
[22]. Hoffer, J. A., and D. W. Straub, 1989, The 9 to 5 Underground: Are You Policing Computer Crimes?, Sloan Management Review (Summer 1989): 35-43
[23]. IMDb (2012), Unauthorized Attacks, Available at: http://www.imdb.com/title/tt0373414/, Visited: 28/01/2012
[24]. India emerging as major cyber crime centre (2009), Available at: http://wegathernews.com/ 203/india-emerging-as-major-cyber-crime-centre/, Visited: 10/31/09
[25]. Jamal Raiyn, A survey of Cyber Attack Detection Strategies, International Journal of Security and Its Applications Vol.8, No.1 (2014).
[26]. Janhavi J Deshmukh and Surbhi R Chaudhari, Cyber crime in Indian scenario - a literature snapshot, International Journal of Conceptions on Computing and Information Technology Vol.2, Issue 2, April' 2014; ISSN: 2345 - 9808.
[27]. Kelly, B. J., 1999, Preserve, Protect, and Defend, Journal of Business Strategy, 20(5): 22-26.
[28]. Kevin G. Coleman (2011), Cyber Intelligence: The Huge Economic Impact of Cyber Crime, Available at: http://gov.aol.com/2011/09/19/cyber-intelligence-the-huge-economicimpact-of-cyber-crime/, Visited: 28/01/2012
[29]. Leagal Info (2009), Crime Overview Aiding And Abetting Or Accessory, Available at: http://www.legalinfo.com/content/criminal-law/crime-overview-aiding-and-abetting-oraccessory. html, Visited: 28/01/2012
[30]. Longe, O.B. (2004): Proprietary Software Protection and Copyright issues in contemporary Information Technology. (M.Sc Thesis) Unpublished. Federal University of Technology, Akure, Nigeria.
[31]. Lyman, J., 2002, In Search of the World's Costliest Computer Virus, http://www. newsfactor.com/perl/story/16407.html. 2002.
[32]. Newswise (2009), China Linked to 70 Percent of World's Spam, Says Computer Forensics Expert, Available at: http://www.newswise.com/articles/view/553655/, Visited: 28/01/2012.
[33]. Nigel Jones, Director or the Cyber Security Knowledge Transfer Network, was featured in the daily telegraph (May 6, 2008), Cyber Security KTN,
[34]. Nilkund Aseef, Pamela Davis, Manish Mittal, Khaled Sedky, Ahmed Tolba (2005), CyberCriminal Activity and Analysis,White Paper, Group 2.
[35]. Oracle (2003), Security Overviews, Available at: http://docs.oracle.com/cd/B13789_01/ network.101/ b10777/overview.htm, Visited: 28/01/2012.
[36]. Panda T.C. (2012), "Cyber-Crimes and their Impacts", International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 2, Mar-Apr, pp.202-209.
[37]. Pooja Aggarwal, Piyush Arora and Neha (2014), "Review on Cyber Crime and Security", International Journal of Research in Engineering and Applied Sciences (IJREAS), ISSN : 2249-9210, c IJREAS, Vol. 02, Issue 01, Jan.
[38]. Poonam (2014), "Review on Cyber Crime and Security", International Journal of Research in Engineering and Applied Sciences (IJREAS), ISSN : 2249-9210, C IJREAS, Vol. 02, Issue 01, Jan 2014
[39]. Power, R., 2001, 2001 CSI/FBI Computer Crime and Security Survey, Computer Security Issues and Trends, 7(1): 1-18.
[40]. Prasun Sonwalkar (2009), India emerging as centre for cybercrime: UK study, Available at: http://www.livemint.com/2009/08/20000730/India-emerging-as-centre-for-c.html, Visited: 10/31/09
[41]. PTI Contents (2009), India: A major hub for cybercrime, Available at: http://business.rediff.com/ slide-show/2009/aug/20/slide-show-1-india-major-hub-for-cybercrime.htm, Visited: 28/01/2012.
[42]. Ryder D. Rodney 2007, "Guide to Cyber Laws", Nagpur Wadhawa and Company.
[43]. S. Sai Sushanth, "Cyber Law: Various Aspects of Cyber Legal System", Cyber Times International Journal of Technology and Management.
[44]. Seema Vijay Rane & Pankaj Anil Choudhary, April 2012-September 2012, "Cyber Crime and Cyber Law in India", Cyber Times International Journal of Technology and Management, Vol. 5 Issue 2
[45]. Shantosh Rout (2008), Network Interferences, Available at: http://www.santoshraut.com/ forensic/ cybercrime.htm, Visited: 28/01/2012
[46]. Sheri R.K. & Chhabru S.T.N 2002, "Cyber Crime", New Delhi, Pentagon Press
[47]. Smith, R. G., Holmes, M. N. & Kaufmann, P. (1999): Nigerian Advance Fee Fraud., Trends and Issues in Crime and Criminal Justice, No. 121, Australian Institute of Criminology, Canberra (republished in The Reformer February 2000, pp. 17-19).
[48]. Sona Malhotra (2016), "Cyber Crime-Its Types, Analysis and Prevention Techniques", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 5, May 2016 ISSN: 2277 128X.
[49]. Sprecher, R., and M. Pertl, 1988, Intra-Industry Effects of the MGM Grand Fire, Quarterly Journal of Business and Economics, 27: 96-16.
[50]. Stephen Northcutt et al. (2011), Security Predictions 2012 & 2013 - The Emerging Security Threat, Available at: http://www.sans.edu/research/security-laboratory/article/securitypredict 2011, Visited: 29/01/2012.
[51]. Sumanjit Das and Tapaswini Nayak, "impact of cyber crime: issues and challenges||, International Journal of Engineering Sciences & Emerging Technologies, October 2013. ISSN: 22316604 Volume 6, Issue 2, pp: 142-153 cIJESET.
[52]. Sylvester, Linn (2001): The Importance of Victimology in Criminal Profiling. Available online at: http://isuisse.ifrance.com/emmaf/base/impvic.html
[53]. Vineet Kandpal and **R. K. Singh, Latest Face of Cybercrime and Its Prevention In India, International Journal of Basic and Applied Sciences Vol. 2. No. 4. 2013
[54]. Virus Glossary (2006), Virus Dissemination, Available at: http://www.virtualpune.com/citizencentre/html/cyber_crime_glossary.shtml, Visited: 28/01/2012
[55]. Wow Essay (2009), Top Lycos Networks, Available at: http://www.wowessays.com/ dbase/ab2/ nyr90.shtml, Visited: 28/01/2012.

Abstract:
Cyber crime is not an old sort of crime to the world. It is defined as any criminal activity which takes place on or over the medium of computers or internet or other technology recognised by the Information Technology Act. Cyber crime is the most prevalent crime playing a devastating role in Modern India. Not only the criminals are causing enormous losses to the society and the government but are also able to conceal their identity to a great extent. There are number of illegal activities which are committed over the internet by technically skilled criminals. Taking a wider interpretation it can be said that, Cyber crime includes any illegal activity where computer or internet is either a tool or target or both. The present study aims to find out the consumer caution and vigil about cyber crime issues and challenges. A samples of 200 consumer selected randomly were studied. An interview schedule method of survey was used to find out the consumer awareness about cyber crime issues and challenges. Primary data were collected by using a structured interview scheduled and analysed with relevant interpretations. Anova, t-test, Correlation and regression analysis were applied to test the hypotheses. The findings and observations are the result and outcome of the analysis made during the research study.

IJSSER is Member of