SlideShare a Scribd company logo
1 of 22
CYBER CRIME AGAINST
CHILDREN
Submitted by:
Anchalanshri Dixit
Geetika Mahur
Himanshu Patel
Overview
 Introduction
 Categories of cyber crime
 Types of cyber crime against children
 Vulnerabilities
 Statistics
 Cases
 Side effects
 Laws and legislations
 7 ways to protect your children
 Love146- a non-profitable organisation
 Conclusion
Introduction
 Cyber crime is an activity done using computers and internet.
 It is an unlawful act wherein the computer acts either as a tool or
target or both.
 Cyber crime is categorized in two ways:
 The computer as a target :- using a computer to attacks other computer,
e.g. Hacking, virus/worms attacks, Dos attack etc.
 The computer as a weapon :- using a computer to commit real world
crime e.g. cyber terrorism, credit card fraud and pornography etc.
Types of cyber crime against children
 Trafficking – illegal deal or trade in children.
 Pornology – the depiction of erotic behaviour(as in pictures, videos or writing)
intended to cause sexual excitement.
 Morphing – change smoothly from one image to another by computer
animation techniques.
 Kidnaping- abduct and hold them captive, typically to obtain a ransom.
 Exploitation- the act or fact of treating someone unfairly in order to benefit
from their work.
CHILD TRAFFICKING
 Child trafficking, according to UNICEF is defined as “any person under 18 who
is recruited, transported, transferred, harbored or received for the purpose of
exploitation, either within or outside a country”.
 There have been many cases where children just disappear overnight, as
many as one every eight minutes, according to the National Crime Records
Bureau.
 In India, there is a large number of children trafficked for various reasons
such as labor, begging, and sexual exploitation.
 India is a prime area for child trafficking to occur, as many of those trafficked
are from, travel through or destined to go to India.
CHILD PORNOGRAPHY
 Under The Information Technology (Amendment) Act, 2008, crime of Child
Pornography under Section 67-B say’s, Whoever publishes or transmits or
causes to be published or transmitted material in any electronic form that
depicts children engaged in sexually explicit act or conduct or creates text or
digital images, collects, seeks, browses, downloads, advertises, promotes,
exchanges or distributes material in any electronic form.
 Depicting children in obscene or indecent or sexually explicit manner.
 Induces children to online relationship with one or more children for and on
sexually explicit act.
 In a manner that may offend a reasonable adult on the computer resource.
 Facilitates abusing children online or records in any electronic form
pertaining to sexually explicit act with children is known as child pornography.
MORPHING, KIDNAPPING AND EXPLOITATION
 Morphing is a special effect in motion pictures and animations that changes
(or morphs) one image or shape into another through a seamless transition.
 In criminal law, kidnapping is the unlawful taking away or transportation of a
person against that person's will, usually to hold the person unlawfully. This
may be done for ransom or in furtherance of another crime, or in connection
with a child custody dispute.
 Exploitation
 Women victims often compliant of mobile phone harassment.
 This includes repeated calls, SMSs, blank calls, threatening calls and even sending
lewd MMSs.
CASES
Schoolchildren in India victims of cyber
crime
 "Almost every school-going child has access to social media these
days, but shockingly hardly any of them know about the privacy
settings on their profiles. With details of their personal lives going
public, they make themselves vulnerable to all sorts of cyber
harassment”.
An international study done by software giant Microsoft in 2012
revealed that 53% of India's children have been bullied online. AP
recorded the second highest number of cases in cyber related
crimes (429) in 2012.
SIDE EFFECTS
 Privacy is greatly reduced or does not exist.
 Expectations for life and achievements are reduced.
 Obedience and passivity are rewarded.
 Negative attitudes and being ignored is common.
 Few general friendships.
 Social isolation.
 Difficulty being accepted in activities, schools, workplaces etc.
Laws
 According to Section 67-B is CSI Communications | December 2011 | 35
applicable and Section 292/293/294
 Sending offensive or false information through computer or a
communicative device is punishable with imprisonment up to three years
and with fine.(S.66A)
 500, 506 & 509 of Indian Penal Code, 1860 are also applicable.
 the victim can file a criminal complaint, If Crime is proved accused should
punishable
 for first conviction with imprisonment for a term may extend to Five years and
with fine which may extend to ten lakh rupees.
 second conviction with imprisonment for a term may extend to Seven years and
with fine which may extend to ten lakh rupees
7 Ways to protect your kids from cyber
crime
 Use parental control software.
 Place the computer in a highly trafficked area.
 Bookmark for safety.
 Avoid downloads.
 Set limits on late-night use.
 Establish rules and take control.
 Stay in the loop!
LOVE146 - AN IMPORTANT
NGO WORKING IN THE FIELD
Conclusion
 Cybercrime against children is indeed getting the recognition it deserves.
 However, it is not going to end that easily.
 In fact , it is highly likely that cyber crime and the people behind it will
continue developing and upgrading to stay ahead of the law.
 But it can be limited by
 Checking Your Child’s Internet Activity
 Remember, parental involvement is the most effective tool.
 Antivirus software and internet protection software.
 Participate with your kids while they are surfing online.
 And guide your young ones to be brave enough.
THANK YOU …
Any Queries?????

More Related Content

What's hot

Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]Sorav Jain
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionAnsar Gill
 

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 

Similar to Cyber crime against children

RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRahuljain40418
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxchiragcdbc92
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parentsAl Rowell
 
C20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEC20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEECPAT Indonesia
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write upvictoriahoo
 
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...Synopsis of children’s consumer protection issues in kenya by daniel asher (c...
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...Daniel Asher
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention RAUSHAN KUMAR
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanaomar timawa
 

Similar to Cyber crime against children (20)

cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptx
 
Koreja
KorejaKoreja
Koreja
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
 
C20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEC20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINE
 
Cyberbullying.pptx
Cyberbullying.pptxCyberbullying.pptx
Cyberbullying.pptx
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
 
Sexting
SextingSexting
Sexting
 
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...Synopsis of children’s consumer protection issues in kenya by daniel asher (c...
Synopsis of children’s consumer protection issues in kenya by daniel asher (c...
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 

Recently uploaded

一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证
一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证
一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证eqaqen
 
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdf
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdfDMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdf
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdfReemaKhan31
 
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...gajnagarg
 
Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...gajnagarg
 
Complete Curriculum Vita for Paul Warshauer
Complete Curriculum Vita for Paul WarshauerComplete Curriculum Vita for Paul Warshauer
Complete Curriculum Vita for Paul WarshauerPaul Warshauer
 
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdfUXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdfDan Berlin
 
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...gajnagarg
 
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制yynod
 
B.tech civil major project by Deepak Kumar
B.tech civil major project by Deepak KumarB.tech civil major project by Deepak Kumar
B.tech civil major project by Deepak KumarDeepak15CivilEngg
 
Miletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdfMiletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdfGabrielaMiletti
 
Sample IT RISK REGISTER for Education Purpose
Sample IT RISK REGISTER for Education PurposeSample IT RISK REGISTER for Education Purpose
Sample IT RISK REGISTER for Education PurposeCyberGuru5
 
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...gajnagarg
 
怎样办理加利福尼亚大学伯克利分校毕业证(UC Berkeley毕业证书)成绩单学校原版复制
怎样办理加利福尼亚大学伯克利分校毕业证(UC Berkeley毕业证书)成绩单学校原版复制怎样办理加利福尼亚大学伯克利分校毕业证(UC Berkeley毕业证书)成绩单学校原版复制
怎样办理加利福尼亚大学伯克利分校毕业证(UC Berkeley毕业证书)成绩单学校原版复制yynod
 
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfreStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfKen Fuller
 
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证eqaqen
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxsportsworldproductio
 
Top profile Call Girls In Hubli [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hubli [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hubli [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hubli [ 7014168258 ] Call Me For Genuine Models We ...gajnagarg
 

Recently uploaded (20)

一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证
一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证
一比一定(购)南昆士兰大学毕业证(USQ毕业证)成绩单学位证
 
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdf
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdfDMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdf
DMER-AYUSH-MIMS-Staff-Nurse-_Selection-List-04-05-2024.pdf
 
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
 
Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In bhubaneswar [ 7014168258 ] Call Me For Genuine Mode...
 
Complete Curriculum Vita for Paul Warshauer
Complete Curriculum Vita for Paul WarshauerComplete Curriculum Vita for Paul Warshauer
Complete Curriculum Vita for Paul Warshauer
 
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...
 
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
 
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdfUXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
 
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In chittoor [ 7014168258 ] Call Me For Genuine Models ...
 
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
 
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制
 
B.tech civil major project by Deepak Kumar
B.tech civil major project by Deepak KumarB.tech civil major project by Deepak Kumar
B.tech civil major project by Deepak Kumar
 
Miletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdfMiletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdf
 
Sample IT RISK REGISTER for Education Purpose
Sample IT RISK REGISTER for Education PurposeSample IT RISK REGISTER for Education Purpose
Sample IT RISK REGISTER for Education Purpose
 
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Ratnagiri [ 7014168258 ] Call Me For Genuine Models...
 
怎样办理加利福尼亚大学伯克利分校毕业证(UC Berkeley毕业证书)成绩单学校原版复制
怎样办理加利福尼亚大学伯克利分校毕业证(UC Berkeley毕业证书)成绩单学校原版复制怎样办理加利福尼亚大学伯克利分校毕业证(UC Berkeley毕业证书)成绩单学校原版复制
怎样办理加利福尼亚大学伯克利分校毕业证(UC Berkeley毕业证书)成绩单学校原版复制
 
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfreStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
 
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptx
 
Top profile Call Girls In Hubli [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hubli [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hubli [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hubli [ 7014168258 ] Call Me For Genuine Models We ...
 

Cyber crime against children

  • 1. CYBER CRIME AGAINST CHILDREN Submitted by: Anchalanshri Dixit Geetika Mahur Himanshu Patel
  • 2. Overview  Introduction  Categories of cyber crime  Types of cyber crime against children  Vulnerabilities  Statistics  Cases  Side effects  Laws and legislations  7 ways to protect your children  Love146- a non-profitable organisation  Conclusion
  • 3. Introduction  Cyber crime is an activity done using computers and internet.  It is an unlawful act wherein the computer acts either as a tool or target or both.  Cyber crime is categorized in two ways:  The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc.  The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
  • 4. Types of cyber crime against children  Trafficking – illegal deal or trade in children.  Pornology – the depiction of erotic behaviour(as in pictures, videos or writing) intended to cause sexual excitement.  Morphing – change smoothly from one image to another by computer animation techniques.  Kidnaping- abduct and hold them captive, typically to obtain a ransom.  Exploitation- the act or fact of treating someone unfairly in order to benefit from their work.
  • 5. CHILD TRAFFICKING  Child trafficking, according to UNICEF is defined as “any person under 18 who is recruited, transported, transferred, harbored or received for the purpose of exploitation, either within or outside a country”.  There have been many cases where children just disappear overnight, as many as one every eight minutes, according to the National Crime Records Bureau.  In India, there is a large number of children trafficked for various reasons such as labor, begging, and sexual exploitation.  India is a prime area for child trafficking to occur, as many of those trafficked are from, travel through or destined to go to India.
  • 6. CHILD PORNOGRAPHY  Under The Information Technology (Amendment) Act, 2008, crime of Child Pornography under Section 67-B say’s, Whoever publishes or transmits or causes to be published or transmitted material in any electronic form that depicts children engaged in sexually explicit act or conduct or creates text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form.  Depicting children in obscene or indecent or sexually explicit manner.  Induces children to online relationship with one or more children for and on sexually explicit act.  In a manner that may offend a reasonable adult on the computer resource.  Facilitates abusing children online or records in any electronic form pertaining to sexually explicit act with children is known as child pornography.
  • 7. MORPHING, KIDNAPPING AND EXPLOITATION  Morphing is a special effect in motion pictures and animations that changes (or morphs) one image or shape into another through a seamless transition.  In criminal law, kidnapping is the unlawful taking away or transportation of a person against that person's will, usually to hold the person unlawfully. This may be done for ransom or in furtherance of another crime, or in connection with a child custody dispute.  Exploitation  Women victims often compliant of mobile phone harassment.  This includes repeated calls, SMSs, blank calls, threatening calls and even sending lewd MMSs.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. CASES
  • 14.
  • 15. Schoolchildren in India victims of cyber crime  "Almost every school-going child has access to social media these days, but shockingly hardly any of them know about the privacy settings on their profiles. With details of their personal lives going public, they make themselves vulnerable to all sorts of cyber harassment”. An international study done by software giant Microsoft in 2012 revealed that 53% of India's children have been bullied online. AP recorded the second highest number of cases in cyber related crimes (429) in 2012.
  • 16. SIDE EFFECTS  Privacy is greatly reduced or does not exist.  Expectations for life and achievements are reduced.  Obedience and passivity are rewarded.  Negative attitudes and being ignored is common.  Few general friendships.  Social isolation.  Difficulty being accepted in activities, schools, workplaces etc.
  • 17. Laws  According to Section 67-B is CSI Communications | December 2011 | 35 applicable and Section 292/293/294  Sending offensive or false information through computer or a communicative device is punishable with imprisonment up to three years and with fine.(S.66A)  500, 506 & 509 of Indian Penal Code, 1860 are also applicable.  the victim can file a criminal complaint, If Crime is proved accused should punishable  for first conviction with imprisonment for a term may extend to Five years and with fine which may extend to ten lakh rupees.  second conviction with imprisonment for a term may extend to Seven years and with fine which may extend to ten lakh rupees
  • 18. 7 Ways to protect your kids from cyber crime  Use parental control software.  Place the computer in a highly trafficked area.  Bookmark for safety.  Avoid downloads.  Set limits on late-night use.  Establish rules and take control.  Stay in the loop!
  • 19. LOVE146 - AN IMPORTANT NGO WORKING IN THE FIELD
  • 20.
  • 21. Conclusion  Cybercrime against children is indeed getting the recognition it deserves.  However, it is not going to end that easily.  In fact , it is highly likely that cyber crime and the people behind it will continue developing and upgrading to stay ahead of the law.  But it can be limited by  Checking Your Child’s Internet Activity  Remember, parental involvement is the most effective tool.  Antivirus software and internet protection software.  Participate with your kids while they are surfing online.  And guide your young ones to be brave enough.
  • 22. THANK YOU … Any Queries?????