Empirical Study of Cyber Crimes in India using Data Analytics


  • Gujarat Forensic Sciences University, Gandhinagar, Gujarat, India
  • NIFM, Institution of Ministry of Finance, India


The progression of technology has prepared man reliant on Internet for all his needs. Internet has given man trouble-free entrée to the whole thing while sitting at one position. Social networking, online shopping, storing data, gaming, online studying, online jobs, every promising thing that man can imagine of can be made through the means of internet. Internet is used in approximately every bubble. With the development of the internet and its associated payback also developed the thought of cyber crimes. Computer crime or cybercrime in India has been embryonic hastily. Cyber crimes can be distinct as the prohibited acts where the computer is used moreover as an instrument or an idea or in assistance. The expression is a wide-ranging term that covers crimes like phishing, credit card frauds, bank robbery, illegal downloading, industrial espionage, child pornography, kidnapping children via chat rooms, scams, cyber terrorism, creation and/or distribution of viruses, Spam and many more that are addressed by the Information Technology Act, 2000.


Analytics, Computers, Crime, Cyber, Data

Full Text:


2012 Trends Report: Application Security Risks. Cenzic, Inc; 2012 Mar 11.

James RE. Business analytics: Methods, models and decisions; Pearson.

Fonseca J, Vieira M, Madeira H. Testing and comparing web vulnerability scanning tools for SQL injection and XSS attacks. Dependable Computing, 2007. PRDC 2007. 13th Pacific Rim International Symposium on. IEEE, 2007

Lopez J, Oppliger R, Pernul G. Authentication and authorization infrastructures (AAIs): A comparative survey. Computers and Security. 2004; 23(7):578–90. https://doi.org/10.1016/j.cose.2004.06.013.

Meier JD, et al. Improving web application security: threats and countermeasures. Microsoft Corporation; 2003.

Teodoro N, Serrão C. Web application security: Improving critical web-based applications quality through in-depth security analysis. Society (i-Society), 2011 International Conference on. IEEE; 2011

Winston WL. Microsoft excel data analysis and business modelling. Prentice Hall of India.


  • There are currently no refbacks.