Media Research
Media Research
Media Research
SESSION-2018-2021
1|Page
2|Page
ACKNOWLEDGEMENT
I Aniket Varshney would like to express my gratitude to Mr. Mohit Kumar (Assistant
Professor) for helping me throughout the projects and encouraging me at every step. I would
like to express my earnest gratitude to UNITED COLLEGE OF EDUCATION affiliated to
Guru Gobind Singh Indraprastha University for giving me the opportunity to undertake this
project.
Aniket Varshney
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is
a unique and important contribution to the literature on cybercrime. It explores
gendered dimensions of cybercrimes like adult bullying, cyber stalking,
hacking, defamation, morphed pornographic images, and electronic
blackmailing. These and other tactics designed to inflict intimidation, control,
and other harms are frequently committed by perpetrators who, for many
reasons, are unlikely to be identified or punished. Scholars, researchers, law
makers, and ordinary women and their supporters will gain a better
understanding of cyber victimization and discover how to improve responses to
cyberc
Chapter 1
Introduction
The world of internet today has become a parallel form of life and living. People are capable
of doing things which were not imaginable a few years ago. Modern Era is the time of
technology and it is all about efficiency and speed. It is about ensuring face-to-face
interaction, connecting, and empowering you by giving you more access and control to the
kind of care you get as well as service you receive. The internet is fast becoming a way of life
for billions of people and also a way of living because of growing dependence and trust of
mankind on these machines. Internet though offers great benefit to society, also present
opportunities for crime using new and highly sophisticated technological tools. Although
internet is one of the fastest modes of communication and has spread its sphere, covering all
possible shades of mankind. But as the saying goes – “every good side has a bad side too”.
The same is true with the computer and internet technologies too.
Although, the number of people using the internet in India is increasing day by day but there
is some gender disparity which is clearly visible among the social network users. This can be
seen in various fields such as the number of people using the internet as well asthe number of
people using Facebook or Twitter or Instagram and so on. The imbalanced number of users
on the internet is the major contributor of this phenomenon. It is very closely related to the
escalating incidents of cybercrimes against females. Coming to the legal framework in India
to combat cybercrimes, essentially, there are majorly two statues that address cybercrimes
against females. Namely, they are the Indian Penal Code, 1860 and The IT Act, 2000. The
IPC does not specifically talk about cybercrimes, rather it is general criminal law, which
defines the different offences and specifies punishments to be awarded for the commission of
those offences. It should be taken into notice that the offences listed in the code are addressed
for their commission in physical or tangible or the real world. The provisions of the IPC are
relevant to cyber violence against females via legislative amendments and judicial
interpretations. The IT Act covers majorly commercial and economic crimes but there are no
specific provisions to cover cybercrimes against women.
Access to the internet is the need of every person and therefore, it is rapidly turning into a
necessity for financial prosperity and is being viewed as a basic human right. Thus, it is
important to make sure that this digital public space is a guarded and enabling place for all,
including females of all ages.
The rapid technological advancements like the internet clearly threaten to leave the law behind.
The offences which take place on or using the medium of the internet are known as cyber
crimes. This includes a plethora of illegal activities. The term ‘Cyber crime’ is an umbrella
term under which many illegal activities may be grouped together. Because of the anonymous
nature of the internet, there are many disturbing activities occurring in the cyberspace which
may enable the perpetrators to indulge in various types of criminal activities which are called
cyber crimes. Cyber crime as defined internationally by the U.N. Congress on Prevention of
Cyber crime and Treatment of Offenders 6 comprises two categories as follows: • Cyber
crime in a narrow sense connotes a computer crime and includes any illegal behavior directed
by means of electronic operations that targets the security of computer systems and the data
processed by them. • Cyber crime in a broader sense includes all computer related crimes and
consists of any illegal behavior committed by means of, or in relation to, a computer system
or network, including such crimes as illegal possession and offering or distributing
information by means of computer system or network. In the Indian context, cyber crime may
be defined as a voluntary and willful act or omission that adversely affects a person or
property or a person’s computer systems and made punishable under the Information
Technology Act, 2000 or liable to penal consequences under the Indian Penal Code. The
Indian Legislature doesn’t provide the exact definition of Cyber crime in any statute, even the
Information Technology Act, 2000; which deals with cyber crime doesn’t defined the term of
cyber crime. However in general the term cyber crime means any illegal activity which is
carried over or with the help of internet or computers.
Harassment through e-mails
Cyber Stalking
Cyber Defamation
Cyber pornography
Email spoofing
Cyber morphing
The penalties for these crimes include fines, imprisonment for up to two
years or more. Cybercrime against women in India is on at the alarming
stage and it may pose as a major threat to security of a person as a whole.
In India the term “cybercrime” includes sexual crimes and sexual abuses
on the internet. India is considered as one of the very few countries to
enact IT act 2000 to combat cybercrimes. This act widely covers the
commercial and economic crimes which is clear from the preamble of the
IT act.
Section 65, deals with the offences such as tampering with data.
Section 66, deals with hacking with systems
Section 67 publishing of information which is obscene in electronic
forms
Section 70 access to protected system
Section 72 breach of confidentiality and privacy
Section 74 publication for fraudulent purpose
Section 67 of information technology act ,2000 which dealt with
obscene publication in the internet. He was sentenced for life
imprisonment and a pecuniary fine of rupees 1 , 25,000 under the
Immoral trafficking act, 1956.
Review of Literature
Cyber crimes are a serious issue in India now. A book dedicated to the cause is a welcome
addition to the books on crime in general. India being one of the fastest growing
economies in the world and the development of communication technology in India has
also grown in leaps and bounds. The first record of cyber crimes against women, in India,
was in 2013 which indicates to the fact that women are and have been easy targets of such
crimes. Debarati Halder and K. Jaishankar do precisely this. They write on the types of
cyber crimes in India, legal provisions and ways to combat the crimes. They bring in the
question of gender from the very beginning keeping the discussion tight and simple. The
Foreword written by Professor Antonopoulos explains the book aptly: Simple and lucid
explanations for a delightful reading.
The book contains nine chapters out of which five are dedicated to different forms of
cyber crimes, two on legal provisions, practices and investigations, and the last chapter on
ways to combat the offence. The introductory chapter of the book discusses on
Information and Communication Technology (ICT), its development in India, the
background of writing the book and an apt justification citing different lawsuits and
instances of the crime worldwide. Chapters from second to sixth are dedicated to the
types of crimes. The second chapter is on freedom of speech as enshrined in the
Constitution and also a source of misuse of the Internet. The authors take up cases to
illustrate how women were victimised on the Internet, which on the one hand gives
women the power to express themselves and on the other hand is a source of their
desolation. The third chapter deals with other types of cyber crimes: Gender bullying and
trolling. The authors first explain what the terms mean and then show how bullies
targeting women have taken to the Internet and digital communication technology. The
fourth chapter explores another type: Online grooming. Grooming is a trap that at first
establishes a vicious network that facilitates crime. Loneliness from depression, breaking
down of families and other social factors gives way to the use of Internet by women. The
chapter discusses the methodologies of grooming, its possible results and legal solutions.
The fifth chapter opens up the issue of infringement of privacy in cyber space such as
hacking, stalking, voyeurism and the like. The sixth chapter deals with online sexual
offences such as
discussions on obesity, pornography, obscenity, sexting and legal debates concerning
those. Sometimes, fake avatars are created to victimise women. The last two chapters deal
with legal provisions, responsibility of the Internet and digital communication technology
service providers. The legal debate on the ‘right to forget’ and its application on the
Internet companies are dealt with in this chapter. The eighth chapter opens up the issue of
procedural practices for investigation and process of prosecuting the Internet crimes
targeting women. The authors deal with the orthodox mindset of the victims and practical
problems like absence of mutual legal assistance treatises dealing with cyber crimes. The
last chapter, the ninth, serves the issue by taking up several measures for combating cyber
crimes against women in India. The authors give importance to the issue of sensitisation
and uphold a model policy or guidelines for the protective use of Internet including
various social networking sites. The book is completed with a glossary and an annexure.
The Glossary includes terms that are used in identifying a crime and a criminal and those
used in prosecution. The Annexure deals with models for the prevention of online
victimisation of women, proposal of cyber rights for women, code of conduct in the cyber
space, all of which can be of immense use for future debate and research in the field.
The book can be a treasure for scholars and policymakers. Internet, as we know, has no
boundaries and has a greater audience. The harassment and abuse of people sitting in
different geographical and social locations, literate and illiterate, can also be varied and
complex. Anonymity of the perpetrator, use of free speech adds to the problem of a huge
lacuna regarding check and balance, and the ethical standards in this regard. The authors
not only discuss the layers in the complex problem but also come up with possible
solutions in the form of models. Among a few good books on crime, mostly written on
from a Western perspective, this book, completely dedicated to Indian situation, is a
welcome addition to the bibliography on crimes in India. The publisher also needs to be
applauded for the initiative.
2. Forty-eight hours of non-stop abuse
A survey of 500 Indian internet users revealed the extent to which online violence affects
everyday women and marginalized individuals. Of those 500, 97 percent identified
themselves as women, and 3 percent as other, a category that encompasses transgendered
people. Nearly half of respondents were between ages 18 and 25, with another third
between 25 and 35. Most respondents were from the major Indian cities of Delhi,
Mumbai, Bangalore, Chennai, Hyderabad, and Kolkata. Fifty percent of respondents said
they were educated to postgraduate level, and 32 percent to college level. Forty-eight
percent were professionals and thirty-five percent were students. Nearly 100 percent said
they regularly use technological devices like mobile phones, computers, laptops, or
tablets. When asked which social media platforms they use frequently, 95 percent of
respondents said Facebook, followed by Instagram (52 percent), Twitter (50 percent),
Snap Chat (18 percent), and Tumblr (14 percent). Eighty percent of respondents reported
that social media applications, besides providing a platform for personal activities like
sharing pictures, are their primary source of news, a trend also observed in the United
States and other countries.12 Among messaging services, WhatsApp was used by 93
percent of respondents compared to Telegram, which was used by 8 percent.
This activity appeared to be perpetuated by men or under accounts associated with male
names, according to 85 percent of respondents. “My daughter and I posted online about how
women (including us) had been beaten and detained illegally by Delhi Police in December
2012 for protesting peacefully against a gang-rape. [Another time,] I questioned Yakub
Memon’s hanging by calling it judicial murder,” one said. Yakub Memon was convicted of
carrying out bomb attacks in Mumbai in 1993 and executed in 2015. “On both occasions, I
received rape and death threats, mostly from men…the abusers also got hold of my phone
number and address!”
4.Cyber violence and victimization against women in India
The information technology sector in India has seen a quantum leap since 1990s which is still
continuing. Almost every household with moderate economic condition have internet access.
In other words, internet has brought the world in our living rooms. People from the age group
of 13 to 70 years who have access to the internet are continually using this either at home, or
at workplaces, or at cyber cafes, or at education institutions etc (Halder and Jaishankar 2010:
1). Thus, it has exposed the society to a new world in which we can share our ideas and
culture values and can enjoy all opportunities. But it is not a danger free zone. Cyber space
has become an instrument for offenders to victimize or infringe women, the most vulnerable
targets on internet after children. Internet has opened flood gates for various crimes against
women in the cyber space. Even though, draftsmen and other world leaders who participate in
EU conventions for establishing strict rules to control cyber crime against children, never
considered victimization of women in the cyber space as a big issue like child pornography or
hacking etc. which require an attention (HalDer and JaishanKar 2009: 5-6). Modern
innovations have made life easier for women across the world, but side by side, these have
also led to rise in the crimes of electronic violence against women, so-called eVAM. Cheekay
Cinco of the Association for progressive communications says that, “Violence against women
is mutating because of technology (Manila 2011) 2 . This is why cyber crime against women
is increasing day by day. Internet and electronic network has exposed women to cyber-
stalking, cyber defamation, harassments, email spoofing, pornography, psychological torture
and sexual abuse etc. Generally, women remain ignorant of these crimes and their inherent
danger. Celina Jaitley, a Bollywood actress, had filed a complaint with Mumbai Police
against two websites including a foreign one which have allegedly morphed her pictures and
upload them to promote lingerie products. Yet, most women are still unaware of these crimes,
until theycome to know about the truth, it gets too late by then (Geetha 2011). 3 Thus, cyber
space has become really a play ground for some fraudulent people who try to victimize
women through online harassment. The study conducted by Ms Jyoti Rattan reveals that
about 60 per cent of all websites are sexual in content. Twenty per cent of them solicited their
visitors, 13 per cent went voluntarily and the rest were pictorially lured. The increasing
popularity of chat rooms and the vulnerability of personal data to criminal access make
women and children the easiest targets in the ambit of guilty crimes.” There is no doubt that
cyber crimes are easy to commit with
very little resources, but the damage can be huge to the security of women. The internet
technology came into existence only in 1986, but it has shown unparalleled aggressive
growth. For example, electricity was first harnessed in 1831, but it was not until 1882 that the
first power station was built, and it was another 50 years before electricity powered 80 per
cent of the factories and households across the United States. Radio was in existence 38 years
before 50 million people used it; TV took 13 years to reach the same benchmark. It was 16
years before 50 million people used a personal computer. Once the internet was made
available to the general public, it took only four years for 50 million people to go on-line
(Prashar 2004).”
This case was decided by M. R. Natu in July, 2015 who was the then Additional Chief
Metropolitan Magistrate. This judgement was the first conviction awarded in any case of
cyber stalking against a woman. Initially, in 2009, the woman started chatting with the
accused Yogesh Prabhu on a social networking website. Yogesh proposed her for marriage
and she turned the proposal down. After this also, she received messages continuously but
she stopped responding towards them and ignored them as she suspected his strange
behavior. She blocked him on the website so that he couldn’t finds her. However, he kept
stalking her and after few months, he started sending her emails consisting of obscene images
and video clips from an unknown account. Seeing this, she lodged a police complaint which
was later taken up by the Cyber Crime Investigation Cell for investigation. The IP (Internet
Protocol) address of the device was tracked down and it was found to be of a firm named
„Vashi‟ of which, Yogesh Prabhu was an employee. The investigation was done and the
accused was convicted under Section 509 of IPC and Section 66E of the IT Act which was
the then followed provisions.
6. Suhas Katti v. State of Tamil Nadu
This case was decided by a court of Chennai in November, 2004. It was the first conviction
awarded in any case of cyber pornography of a woman. The victim was a divorcee and she
started receiving messages by the accused after she had turned down the proposal of marriage
given by him. The accused man was sending her obscene, annoying and defaming pictures in
a chat group of Yahoo by a fake email ID in the name of a female. The victim was also being
called by people on phone who believed that she was soliciting for sexual activities. The
victim lodged a police complaint stating the above problems being caused to her which were
further investigated by the Chennai Cyber Crime Cell. On the completion of the investigation,
the accused was convicted for a period of 2 years of rigorous imprisonment and a fine
amounting to Rs. 500, further, one-year simple imprisonment and Rs. 500 fines, this sentence
was awarded under Section 469 and Section 509 of IPC respectively. Moreover, he was
awarded conviction of rigorous imprisonment for 2 years and fine of Rs. 4000 under section
67 of the IT Act.
This case is important as it shows that cases of cybercrimes are taken very seriously by the
courts. The modesty of the victim was caused indignation by the accused. The accused video
clipped the same in his mobile and then blackmailed her to do favors for him. A criminal
complaint was filed by the victim under Section 507 OF IPC, Section 354D of IPC and
Section 66A of the IT Act. The petition was filed in the MP High Court pleading for
overturning on the premise of a settlement reached at between the victim and the accused.
The HC denied to do this and affirmed that these offences affect the society at large and any
kind of private settlement between the parties won’t stop the proceedings of the case.
8. Easily available information of the victims:
Social networking websites are made for people to connect to each other even at long
distances and also to let people know each other. To show the presence of a profile, the users
have to put their personal data like age, phone number, residential address, marital status, and
so on. Though some of these websites give users the publication of their information as an
option and even making profiles with fake names is totally allowed but the first-time
registrants, including females give away their private info on the internet through these
websites without even knowing the menacing effect of publishing such information. This
information is visible to the public and is then used by the perpetrator to victimize women.
9. Victimization of women
Indian society is predominantly patriarchal in nature, and this is a major reason for women
becoming victims of cyber crime. The cause behind it is that men attach respectability of a
family on the honor of the women members, which makes women vulnerable. In India,
gender differences cast a tremendous effect on nurturing practices. Partial computer illiteracy
refers to the incomplete or fractional knowledge in handling or operating computer system
and its application. Computer literacy does not only include browsing the internet through
Google or the use of social networking websites like Facebook, Twitter, or Orkut. Computer
literacy should include privacy protection, protection from spy ware, internet viruses like
Trojans, tracking cookies etc. One of the possible explanations of this could be because of the
fact that in India the advent of the computer was marked up by the snowball effect. This
could be explained by the fact that initially very few people had learned computers by taking
the help of the professionals. People started practicing computers with the help of their
friends, peers, classmates etc. This resulted in computer literacy, but that was incomplete, and
therefore, it had led to partial computer illiteracy. The concept of computer illiteracy could be
explained in terms of gender differences also. Researches show that many surveys have been
conducted to investigate the impact of gender difference on computer literacy. To a large
extend the results revealed that computer literacy rate of males are higher than that of
females.
Objective
The main objective of conducting this research on the topic, Cybercrime on women are listed
below:
• Create ways for women and representatives of minority groups to escalate reports of
harassment, particularly incidents involving multiple accounts or lasting several days,
indications that the activity is organized.
• Employ local staff, particularly grievance officers, to ensure that workers can adequately
evaluate complaints about posts made in local languages based on local cultural context.
• Facebook should revisit its real-name policy and make it more flexible, especially for
marginalized genders and sexualities, journalists, and whistle-blowers under threat. Right to
privacy and anonymity are fundamental rights and Facebook must uphold them. Harassment
continues despite the requirement, yet victims fear it can be used against them.
• Ensure the Cyber Crime Prevention against Women and Children is accessible via mobile
internet as an app that functions even where bandwidth is low. Ensure that users’ privacy is
protected and that it is they are not subject to monitoring.
• Implement the law against individuals responsible for inciting and carrying out online
violence against women and marginalized communities, regardless of their political or
religious agenda.
• Bhartiya Janata Party leaders should strongly condemn online harassment conducted in the
name of Hindu nationalism. Party members and supporters responsible for harassment should
be held accountable.
For law enforcement:
• Foster an environment in which individuals feel confident enough to report online abuse to
authorities, even if this challenges cultural norms and takes time.
• Stop dismissing reports of sexualized or gender-based abuse because they take place on the
internet.
• Educate officers that the response to online harassment is not to stop the victim using the
internet.
• Inform officers about the laws that apply to online harassment, and how to direct
complainants to appropriate legal recourse.
Methodology
The methodology chapter explains how the research has been conducted, allowing readers to
evaluate the readability and validity of the research.
While conceptualizing or conducting any research on the topic which is very much familiar
with the general public, its always a good option, to deal the real-life problem by finding the
data at hand, and it becomes necessary to collect and analyze the data which is actual and
based on the facts and figures.
While conducting any research, one finds different ways of collecting the appropriate data
which differ considerably in context of money costs, time and other resources at the disposal
of the researcher.
The language used was English because the audience were very much comfortable in that
language, moreover they themselves responded in English. Questionnaire was decided
thoroughly with much care to be effective enough to explore all nuances of emotions or to
evoke true responses. Interviewees were thoroughly observed while being interviewed and all
the visible emotions and expressions were noted down. The interview proceedings were
recorded for future reference and analysis.
There are two types of data which are used at the time of research. The most basic and
difficult one is the ‘Primary Data’ which is extracted by the researcher and the information
included in that data is 100% authentic. Primary data can be collected either through
experiment or through survey. If the researcher conducts an experiment, he observes some
quantitative measurements, or the data, with the help of which he examines the truth
contained in his hypothesis. But in the case of a survey, data can be collected by any one or
more of the following ways:
1. Quantitative Methods
Quantitative method of research lies in the Primary Data, and this method emphasized
on objective measurement and the statistical, mathematical or numerical data which
we can either collect through polls, forming surveys or by conducting personal
interview.
In the quantitative research for valid generalizable results, the methods which are
taken are enough to detail for another researcher to replicate the study. Quantitative
research focuses on gathering numerical data and generalizing it across groups of
people or to explain a particular phenomenon.
If compared there are a wide range of statistical techniques which are available to
analyze the quantitative data, starting from the simple graphs to show the data through
test of correlations between two or more items. There are numerous activities which
are involved under the category of Quantitative Methods of Research.
2. Online Survey
Survey research is conducted as the collection of data which gets attained by asking
individuals questions either in person, on paper, by phone or online. A Survey is
defined as a research method used for collecting data from a pre-defined group of
respondents to gain information and insights on various topics of interest. Conducting
the surveys, us one of the forms of primary research, which is the gathering data first-
hand its source. An online survey is set of structured questions, that the respondent
completes over the internet, generally through filling out a form. An online survey is
an easier way to reach out to the respondents as it is less time consuming than the
traditional way of gathering information through one-to-one interaction and also less
expensive.
Conducting survey is one of the primary researches. While conducting the online
survey, I found the data attained by asking individual questions in person or through
preparing the questionnaire. The information collected may also be accesses
subsequently by other parties in secondary research. Through online survey, I got to
know the beliefs and values of selected group of individuals, whom I have chosen for
the demographic sampling. These demographics include age, gender, ethnicity or
income levels.
By conducting the survey for my desired topic, I studied and analyze beliefs of the
people regarding my topic. It is the most extensively used method in various economic
and business surveys. Before applying this method, usually a Pilot Study for testing
the questionnaire is conduced which reveals the weaknesses, if any, of the
questionnaire? Questionnaire to be used must be prepared very carefully so that it may
prove to be effective in collecting the relevant information.
The data is usually obtained through the use of standardized procedures whose
purpose is to ensure that each respondent is able to answer the questions at a level
playing field to avoid biased opinions that could influence the outcome of the research
or study. A survey involves asking people for information through a questionnaire,
which can be distributed on paper, although with the arrival of new technologies it is
more common to distribute them using digital media such as social networks, email,
QR codes or URLs.
The online survey which has been conducted was the most effective and doable choice
to study the attitude of people towards advertising.
Population- All the student, and people related to advertising background, parents and
teachers.
3. Existing Data
This is the secondary form of research, where we take the existing data on our topic and
make the desired changes to make it a part of our research. The secondary data or desk
research is a research method which do involves using already existing data. Existing
data is summarized and collated to increase the overall effectiveness of research.
The Secondary Research does include research material which gets published in
research reports and similar documents. Nowadays these documents can be easily
found on the internet. Gone are the days, when the information was only restricted to
the public library’s websites, and data obtained from already filled in surveys etc.
Some governmental and non-governmental agencies also store data, which can be
used for research purpose and can be retrieved from them.
Data-Interpretation
1. Gender
As this survey was circulated to maximum number of people, but it ended up with this ration.
Where the women audience found themselves more intact with my topic and submitted their
answers.
2. Age
This demographical representation shows, that I have targeted the people mostly from the age
group of 20-30. As it is easier for them to relate with my topic. The young adults and the mid
adults have a wider approach towards life and they have interpreted the meaning of each
question is a really effective manner.
3. Occupation
As I have previously told, that I have targeted Young adults and Mid adults. Young people,
often see the ads with different narratives and they are the active audiences of maximum
advertisement. So, it’s very clear that maximum of them is still pursuing their Masters and
PhD in the desired subjects. So, they have mentioned themselves in the list of students.
In this demonstrated graph we are trying to tell in this that if you know the punishment of the
cyber morphing and if you know then you can tell in it that you know it or not, it is being told
in this.
8. If something bad has happened to you online, who did you tell?
In this demonstrated graph we try to know that when someone behaves badly with us online,
then who do we tell first of all, then this is the end and as you can see, it is being shown that
most of us have bad activity which is with us It is about what we tell our friends or the
policemen. This show is happening in this graph as I conduct
10. If you get cyber bulling on internet , so what is your second step to solve it
In this demonstrated graph we are trying to tell that if someone is bully you on social media
or irritate you on social media, what is your second step, then in this you can see that the
highest number of reports are many and the number of reports is 54.9
In this graph, we can see that only 50% of people are aware of cyber law and 50% of
people do not know.
You all can see why the victim does not punish his culprit, out of which you can see 30% of
the people do not get punished due to fear and intimidation, out of which 23% people do not
do it for their honour or respect. Do not do this for the sake of them and 17% of them do not
listen because their report does not work and out of which 15% people do not know how to
punish their criminals, show them that they are doing wrong and 13 % People can't do it
because of threat.
15. Do you think that the laws in effect are able to control cyber criminals?
What do you think how beneficial cyber crime is in its country, how do its laws affect the
people, then let us see in this graph, of which 33% people do not mean cyber crime, I am
happy with the law of cyber crime because they are responsible Is not or does not work in
them, and 25% refused to say that it is of no use.
CONCLUSION
https://yourstory.com/herstory/2020/10/crisis-internet-
safety-women-social-media-cybercrime
https://www.ijeat.org/wp-
content/uploads/papers/v8i6S3/F13130986S319.pdf
https://www.ncbi.nlm.nih.gov/search/all/?term=cyber+cri
me+in+india
https://feminisminindia.com/wp-
content/uploads/2016/05/FII_cyberbullying_report_websit
e.pdf
http://www.cybercrimejournal.com/
APPENDIX
Link of Google form:
https://docs.google.com/forms/d/e/1FAIpQLSdyO0ilec6mU_Lgk8plGbyj1btwA0f2w6J1
a1L7VX-4J_sYMw/viewform