“SOCIAL MEDIA & CYBER CRIME: A SOCIO LEGAL STUDY”
FINAL DRAFT SUBMITTED IN THE PARTIAL FULFILMENT OF THE COURSE TITLED
SOCIOLOGY OF LAW
CHANAKYA NATIONAL LAW UNIVERSITY, NYAYA NAGAR,
MITHAPUR, PATNA - 800001
SUBMITTED TO:
Dr. SANGEET KUMAR
FACULTY OF SOCIOLOGY
SUBMITTED BY:
SHUBHAM SUDHASHIL
COURSE: B.A., LL.B (Hons.)
ROLL NO: 1976
SEMESTER: 2nd
1|Page
DECLARATION BY THE CANDIDATE
I hereby declare that the work reported in the B.A., LL.B (Hons.) Project Report entitled “SOCIAL
MEDIA & CYBER CRIME: A SOCIO LEGAL STUDY” submitted at Chanakya National Law
University is an authentic record of my work carried out under the supervision of Dr. Sangeet
Kumar. I have not submitted this work elsewhere for any other degree or diploma. I am fully
responsible for the contents of my Project Report.
SIGNATURE OF CANDIDATE
NAME OF CANDIDATE: SHUBHAM SUDHASHIL
CHANAKYA NATIONAL LAW UNIVERSITY, PATNA.
2|Page
ACKNOWLEDGEMENT
I would like to thank my faculty Dr. SANGEET KUMAR whose guidance helped me a lot with
structuring my project.
I owe the present accomplishment of my project to my friends, who helped me immensely with
materials throughout the project and without whom I couldn’t have completed it in the present
way.
I would also like to extend my gratitude to my parents and all those unseen hands that helped me
out at every stage of my project.
THANK YOU,
NAME: SHUBHAM SUDHASHIL
COURSE: B.A., LL.B (Hons.)
ROLL NO: 1976
SEMESTER: 2nd
3|Page
TABLE OF CONTENTS
DECLARATION BY THE CANDIDATE ------------------------------------------------------------------------------------2
ACKNOWLEDGEMENT --------------------------------------------------------------------------------------------------------3
TABLE OF CONTENTS ---------------------------------------------------------------------------------------------------------4
1. INTRODUCTION -----------------------------------------------------------------------------------------------------------5
AIMS AND OBJECTIVES:------------------------------------------------------------------------------------------------------6
HYPOTHESIS: ---------------------------------------------------------------------------------------------------------------------7
RESEARCH METHODOLOGY: ---------------------------------------------------------------------------------------------- 7
RESEARCH QUESTION --------------------------------------------------------------------------------------------------------7
LIMITATIONS: --------------------------------------------------------------------------------------------------------------------7
METHODS OF DATA COLLECTION: --------------------------------------------------------------------------------------7
TOOLS OF DATA COLLECTION -------------------------------------------------------------------------------------------- 8
SAMPLING METHOD -----------------------------------------------------------------------------------------------------------8
2. INFLUENCE OF CYBER CRIMES IN SOCIAL MEDIA --------------------------------------------------------- 9
3. IMPACT ON PRIVACY ------------------------------------------------------------------------------------------------- 12
4. LEGAL FRAMEWORK IN INDIA ----------------------------------------------------------------------------------- 14
5. FIELD WORK ------------------------------------------------------------------------------------------------------------- 17
6. CONCLUSION/SUGGESTIONS -------------------------------------------------------------------------------------- 22
BIBLIOGRAPHY ---------------------------------------------------------------------------------------------------------------- 23
4|Page
1. INTRODUCTION
Social Networking sites have been in the limelight for more a decade. These websites have created
an epoch in the history of cyber space influencing netizens in their personal sphere as well as
professional level. Today, there are not merely medium of communication to keep in touch with
old and new friends but rather have become a public forum to voice opinions and mobilize people
for a global revolution. Popular social networking websites include Facebook, LinkedIn,
Instagram, Twitter, Snapchat etc. The growth and impact of these websites at an exponential rate
have attracted the cyber offenders to commit cybercrimes in social media posing threat to privacy
of individuals as well as national security. National Investigation Agency through its sources has
informed that every sixth cybercrime in India is committed through social media. There has been
around 70% rise in cybercrimes annually between 2013 and 2015 according to data provided by
National Crime Records Bureau (NCRB)1. According to a report from Symantec, a security
solutions provider, India ranked second among nations that were most targeted for cybercrimes
through the social media in 2014, after the US2. Today cybercrimes are manifested in many forms
to commit offences related to privacy, defamation, misrepresentation of identity, obscenity, cyber
terrorism, etc.3
The internet or the superhighway has stretched its foot from one pole to another and touching lives
of every human being. In this article we discuss about the contradictory effect of the internet also
keeping in mind, its benefits and power4. Internet is nowadays synonymous to World Wide Web
(abbreviated as WWW), which is the functional unit of internet. World Wide Web is a complex
network which involves communication amongst various people, software & services. It relies on
the various communication devices and networks and data distribution for its effective functioning.
1
Every Sixth Cybercrime In India Is Committed Through Social Media:NIA http://www.hindustantimes.com/india-
news/every-sixth-cybercrime-in-india-committed-through-social-media-nia/story-
KscgnwjcTZ0pzVeVaOiN6M.html, Retrieved 12 February 2019
2
India ranks second in cyber-attacks through social media Yuthika Bhargava April 22,
2015http://www.thehindu.com/news/national/india-ranks-second-in-cyber-attacks-through-social-
media/article7130961.ece , Retrieved 12 February 2019
3
Pandey Anubhav, “Cyber crime and social media websites”, https://blog.ipleaders.in/cyber-crime-social-media/
,Retrieved 12 February 2019
4
Gupta Dhruv, “CYBER CRIME AND SOCIAL MEDIA MARKETING” ,
http://docs.manupatra.in/newsline/articles/Upload/A8DF0F79-717C-4E9F-90A4-0859922812B6.pdf ,Retrieved 17
February 2019
5|Page
Due to its ease because of superfast progress in the technology, the information superhighway has
become a necessity for every person. Its services are utilized in every section like business,
military, common citizen and government. Like The transparency that ARPANET (The Advanced
Research Projects Agency Network) provides has made it difficult for organizations and
individuals to maintain privacy and security and as this transparency and accessibility grows it will
lead to increase in cyber-crime case5.
According to a recent rough count the rate, at which incident of cyber-crimes are increasing, is
about 107% per year.6 This rate of increase in cyber-crime in India is fearsome. Even though the
rate of growth of cybercrime and user base of web is not same but the data tell that they seem to
follow a definite, similar pattern while the increase in cybercrime in both the year 2013 & 2014 is
greater than 65%; the internet benefactor base has rose to about 18% & 27% in 2013 & 2014
respectively. In India, there were 7210 case registered under Information Technology Act and out
of which only 4246 were taken under custody in the year from 2013 – 2014. A rapid and constant
increase has been observed in the number of cases registered under Information Technology Act.
The union has also accepted that with the new technologies coming up every day and advancement
in devices, cyber-crimes are on hike in the country.7
AIMS AND OBJECTIVES:
Through this Researcher wants to find out:
If social media is secure enough.
The risks of uploading information on the internet openly.
The types of cyber-crimes that takes place.
5
Supra note 4
6
https://data.gov.in (Government of India initiative under digital India
movement) , Retrieved 17 February 2019
7
Supra note 4
6|Page
HYPOTHESIS:
The researcher tends to presume that:
There is still need for lot of improvement in maintaining the privacy of the users on these
social media sites and applications.
RESEARCH METHODOLOGY:
The researcher will be relying on doctrinal & non-doctrinal method of research to complete
the project.
RESEARCH QUESTION
1. What is cyber-crime in general?
2. What is cyber-crime in relation with social media?
3. Why do people still prefer using such social media sites despite the immense risk of breach
of privacy?
4. What provisions are there in Indian law for the prevention of cyber-crime?
LIMITATIONS:
There various hindrances can be faced by the researcher during the formation of this project such
as scarcity of time, security of people’s privacy, out of reach places for various research works.
METHODS OF DATA COLLECTION:
The researcher uses the following methods of data collection for Non-Doctrinal:
1. Interview
2. Observation
3. Questionnaire
4. Case study
7|Page
TOOLS OF DATA COLLECTION
For the purpose of research various tools such as interview schedule, observation guide,
questionnaire, historical records, camera, tape recorder, notepad and diaries etc.
SAMPLING METHOD
Sample is a collection of certain units, one respondent chosen from the Universe. Researcher has
used purposive and convenient method of sampling due to paucity of time and various limitations
while doing research.
8|Page
2. INFLUENCE OF CYBER CRIMES IN SOCIAL MEDIA
“Cybercrime” is a combination of two terms “crime” with the root “cyber” derived from the word
“cybernetic”, from the Greek, “kubernân”, which means to lead or govern. The “cyber”
environment includes all forms of digital activities, irrespective of whether they utilise single
network. Cyberspace is borderless as no Courts across the globe can claim jurisdiction. Any illegal
act which involves a computer, computer system or a computer network is cybercrime. Further,
any offence taking place on the computer can be said to be a cyber-offence. The IT Act
distinguishes between cyber contraventions and cyber offences. Former is a violation of law or
rule of procedure which may or may not attract a liability to pay a penalty as the offender faces
civil prosecution. However, an offence is an act prohibited and made punishable by fine and/ or
imprisonment as the offender faces criminal liability8
The Cybercrimes are to blame for the interruption of ordinary computer functions and has been
known to cause the collapse of a lot of companies and personal entities. Social network sites have
been in the renown for more of decades. The growth and impact of these websites at an exponential
rate have attracted the cyber offenders consign cybercrimes in social media showing off threat to
solitude of individuals as well as national safety measures. National Investigation Agency through
its sources has informed that every sixth cybercrime in India is committed to social media9.
Primarily, cyber-attacks can be found in three forms. First, they attack electronic identity. With
use of sophisticated malware tools, they get hold of sensitive personal information available in
social media and other shopping websites; they steal credit information or create fake identity in
social media. Second, attack on women and minors. Child Pornography is an industry that thrives
on the growth of the cyber space. Women and children are most frequently victimised compared
to men by sharing obscene pictures or violent videos in virtual world harming their reputation.
Youngsters are often lured by hoax messages and fake identities in social media and they fall prey
to offenders in cyberspace as well as real world. Third, attack on infrastructures. Infrastructures
8
4 Section 2(n) of the Code of Criminal Procedure, 1973 and Section 40 of Indian Penal Code, 1860.
9
The journal for indian researchers ,“INFLUENCE OF CYBER CRIME IN SOCIAL MEDIA” ,november 6, 2017,
https://tjirlegalblog.wordpress.com/2017/11/06/influence-of-cyber-crime-in-social-media/ , Retrieved 18 February
2019
9|Page
are often easy targets of the cyber terrorism. These attacks on vital services can paralyse a nation
by causing unprecedented impact on economy, health care, military, power and more10.
The Oxford Dictionary defines a social network as “A dedicated website or other application which
enables users to communicate with each other by posting information, comments, messages,
images, etc.” This could be in form of social media websites, blogs, and chat rooms. Anonymity
and fake identity are the hallmark of the cybercrimes. Lack of awareness among netizens, poor
security features associated with these websites and overuse of social media has enabled cyber
offenders to engulf these innocent people into fraudulent or any other criminal transactions.
There has been around 70% rise in cybercrimes annually between 2013 and 2015 according to data
provided by National Crime Records Bureau (NCRB)11. According to a report from Symantec, a
security solution provider, India ranked second among nations that were most targeted for
cybercrimes through the social media in 2014, after the US12.
Cybercrimes that are commonly prevalent in social media are cyber defamation, cyber obscenity
pornography, cyber stalking, hacking, privacy infringement, internet fraud, unauthorized
disruption of computer system through virus and using any person’s copyright13
In India, the law prevalent for looking into such matters is relatively new.The Information
Technology Act, 2000 is based on the General Assembly Resolution which recommended all
States to give auspicious consideration to the Model Law on Electronic Commerce during
enactment or revision of their laws14. This Act unfolds the various aspects of information
technology to promote efficiency in the delivery of government services by means of reliable
electronic records. The IT Act differentiates between cyber contraventions and cyber
10
A Study on Cyber Crime and Security Scenario in INDIA Yougal Joshi1 , Anand Singh International Journal of
Engineering and Management Research, Volume-3, Issue-3, June 2013
11
Suchetana Ray and Anirban Ghoshal, Every sixth cybercrime in India committed through social media, (Aug
25th, 2016 ), http://www.hindustantimes.com/india-news/every-sixth-cybercrime-in-india-committed-through-
social-media-nia/story-KscgnwjcTZ0pzVeVaOiN6M.html, Retrieved 18 February 2019
12
Yuthika Bhargava, India ranks second in cyber-attacks through social media,( April 22nd , 2015 ),
http://www.thehindu.com/news/national/india-ranks-second-in-cyber-attacks-through-social-
media/article7130961.ece. , Retrieved 18 February 2019
13
Legal Implications of Cyber Crimes on Social Networking Websites , Nikita Barman, International Journal of
Scientific and Research Publications, Volume 5, Issue 12, December 2015 http://www.ijsrp.org/research-paper-
1215/ijsrp-p4850.pdf , Retrieved 18 February 2019
14
Nikita Barman, Legal Implications of Cyber Crimes on Social Networking Websites, Volume 5. IJSRP 315, 316
(2015).
10 | P a g e
offences. Former is a violation of law or rule of procedure which may or may not attract a liability
to pay a penalty as the offender faces civil prosecution. An offence is an act prohibited and made
punishable by fine and/ or imprisonment as the offender faces criminal liability15.
15
The Code of Criminal Procedure, 1973, No. 2, Acts of Parliament, 1973 (India)
11 | P a g e
3. IMPACT ON PRIVACY
Privacy involves the right to control one’s personal information and the ability to determine how
that information should be obtained and used. “Right to Privacy” is recognised as Fundamental
Rights under Article 21 of the Constitution of India which deals with the right to life and liberty.
Although, right to privacy do not find explicit mention in Constitution, this has been recognised in
various judicial pronouncements. However, the ramifications of right to privacy in virtual world
are not settled issue.
The possible privacy infringement in social media can be illustrated through examples of Facebook
and Orkut. Orkut once touted as the one of the first popular social networking site lost its shine
when Facebook came into picture. Many have not deactivated their account and hence were
available in public for exploitation of sensitive personal information. Public search option
available in Facebook enables the personal information of users to be exposed to anyone who types
the name in the search engine. By opting ‘Public’ in privacy settings with respect to information
as gender, networks, username , email id, phone number, pictures and videos poses a risk to the
identity of the person. Further, use of applications and games available in social media runs a grave
risk to identity of the person. These applications do not work in secure mode. They further seek
access to all personal information16.
Cyber-attack on social media is generally understood as an infringement of the Data Protection
laws. An individual’s details like name, address, interests, family, etc. are often available on
various social media web sites. In India, data protection is governed by Sections 43A, 72A, 69 and
69B of the IT Act.
Section 43A widens the scope of data protection by inclusion of definition of “Sensitive Personal
Data or Information”, and also imposes a responsibility for “Reasonable Security Practice” to be
followed by the data handlers. In case of infringement, data handlers and cyber offenders can be
slapped with an exorbitant penalty which may even exceed Rs. 5 crores.17 Section 72A specifies
liability for intermediary if he discloses “personal information” which he accessed while providing
16
Supra note 3
17
Supra note 14
12 | P a g e
services under a contract and such disclosure was made with an intention to cause or knowledge
that he is likely to cause wrongful loss or wrongful gain to a person. Sections 69 and 69B empower
the State to issue directions for interception, monitoring and even collection of traffic data or
information through any computer resource for cyber security18.
18
Supra note 9
13 | P a g e
4. LEGAL FRAMEWORK IN INDIA
Computer Crimes can be classified into the following categories19:-
Conventional crimes through a computer which includes cyber defamation, digital forgery,
cyber pornography, cyberstalking/ harassment, internet fraud, financial crimes, online
gambling, and sale of illegal articles.
Crimes committed on computer networks include hacking/unauthorized access, denial of
service.
Crimes concerning to data modification/demolition being virus/worms/Trojan horses/logic
bomb, theft of internet hours, data diddling, salami attacks, steganography.
Crimes relating to electronic mail such as spamming/bombing, spoofing
Primarily, cyber-attacks can be found in three forms. First, they attack electronic identity. Second,
attack on women and minors. Third, attack on infrastructures. Infrastructures are often easy targets
of the cyber terrorism. These attacks on vital services can paralyze a nation by causing an
unprecedented impact on the economy, healthcare, military, power and more20.
Cyber Defamation:
Cyber defamation refers to publication of defamatory content in electronic form. In order to
determine cyber defamation, the Court has taken into consideration factors like time of occurrence,
mode of publication and jurisdiction. Being borderless, determination of jurisdiction is a difficult
job. In Joseph Gutnick v. Dow Jones & Company Inc., the High Court of Australia upheld that the
place of publication (or the jurisdiction) is the place where the defamatory statement is made and
that place is the one in which that particular information is downloaded and not where the statement
is uploaded or where the publisher’s server resided21. Cyber defamation is punishable under Indian
law by reading Section 499 of Indian Penal Code (“IPC”) and Section 4 of the IT Act. Earlier,
cyber defamation was also recognised in S.66A which penalises the publication of information
19
s.k. verma & raman mittal, Legal Dimensions of Cyberspace 233 (2004).
20
Yougal Joshi & Anand Singh, A Study on Cyber Crime and Security Scenario in INDIA, (2013)
21
Joseph Gutnick v. Dow Jones & Company Inc. [2001] VSC 305
14 | P a g e
that is grossly offensive. However, this is struck by Supreme Court as it violates Article 19 (1) (a)
of the Indian Constitution22.
Cyber Pornography or Cyber Obscenity:
Cyber pornography or cyber obscenity, which includes pornographic websites, pornographic
magazines, provides an online medium for stimulating sexual behaviour. Earlier, the test of
obscenity is the Hecklin’s test- ‘the tendency to deprave and corrupt those whose minds are open
to such immoral influences’ is considered to be obscene23. In Ranjeet Udeshi v. State of
Maharastra, the Supreme Court interpreted the word ‘obscene’ as that which is ‘offensive to
modesty or decency, lewd, filthy and repulsive’24. Hence obscenity without a social purpose or
profit cannot claim protection under ambit of the free speech. Further, in Ajay Goswami v. Union
of India, the Supreme Court propounded that the test for judging a work should be that of “an
ordinary man of common sense and prudence and not an out of ordinary or hypersensitive man”25.
ICANN (Internet Cooperation for Assigned Names and Numbers) have given formal recognition
to cyber pornography with the recognition of ‘.xxx’ domain26. However, child pornography is
deeply condemned across the world. Inspired by Article 9 of Convention of Cyber Crime, IT Act
under 67B penalises child pornography. Cyber obscenity is criminal offence. It imposes a liability
on offender on the basis of Sections 66E and 67. Section 66E protects bodily privacy by imposing
punishment on the person who captures pictures of private parts of a person without consent.
Publication and transmission of sexually explicit content in online medium is prohibited under
Section 67A.
22
Sreya Singhal v. Union of India AIR 2015 SC1523.
23
Regina v.Hicklin (1868) 3 QB 360
24
Ranjeet Udeshi v. State of Maharastra AIR 1965 SC 881
25
Ajay Goswami v. Union of India (2007) 1 SCC 169.
26
“Here it comes: Porn sites to get .xxx”, Times of India, 26-06-10,
http://timesofindia.indiatimes.com/world/europe/Here-it-comes-Porn-sites-to-get-xxx-
name/articleshow/6092763.cms , Retrieved 20 February 2019
15 | P a g e
Cyber Stalking:
This includes the acts to harass or contact another in pursuance of stalking another person by
keeping anonymous identity using the electronic medium27. The Criminal Law (Amendment) Act,
2013 adds a new section 354D to penalise stalking.
Fraudulent Transactions and Misrepresentations:
Impersonation is one of the most widely seen fraudulent transactions in social media. Social
Networking websites are replete with fake profiles which are created with the sole purpose of
taking out information and other personal details like bank account number, credit card number.
1. Virus Attack: Virus attack is generally executed by sending messages on social
networking websites or asking the person to open the link the computer. Virus
contamination destroys, alters, damages data residing in computer or cloud. Section 43 (c)
of the IT Act imposes liability upon the offender to pay compensation to the person who is
affected by introduction of any computer contaminant or virus into any computer, computer
system or computer network.
2. Hacking: Hacking is usually a premeditated process, where the hacker studies security
features of the target and develop programs pursuant to it, to gain unauthorized access. In
simple terms, hacking means trespass in virtual world28. Section 43 of the IT Act imposes
punishment for unauthorized access to a computer resource committed “dishonestly or
fraudulently”. Here, the aggrieved party must prove mens rea.
27
Supra note 3
28
The Information Technology Act, 2000, No. 21, Acts of Parliament, 2000 (India).
16 | P a g e
5. FIELD WORK
INTERVIEW SCHEDULE 1:
Section A:
DATE: 10/02/2019 TIME:
NAME
AGE
GENDER
Section B:
1. Are you fond of using social media sites such as Facebook, Instagram etc.?
2. Do u feel secure uploading your photos and other personal information on such sites?
3. Are you aware of the risks of posting such data on the internet?
4. Is it worth using such sites despite the risks that it has & why?
17 | P a g e
INTERVIEW SCHEDULE 2:
Section A:
DATE: 10/02/2019 TIME:
NAME
AGE
GENDER
Section B:
1. Are you fond of using social media sites such as Facebook, Instagram etc.?
2. Do u feel secure uploading your photos and other personal information on such sites?
3. Are you aware of the risks of posting such data on the internet?
4. Is it worth using such sites despite the risks that it has & why?
18 | P a g e
INTERVIEW SCHEDULE 3:
Section A:
DATE: 10/02/2019 TIME:
NAME
AGE
GENDER
Section B:
1. Are you fond of using social media sites such as Facebook, Instagram etc.?
2. Do u feel secure uploading your photos and other personal information on such sites?
3. Are you aware of the risks of posting such data on the internet?
4. Is it worth using such sites despite the risks that it has & why?
19 | P a g e
INTERVIEW SCHEDULE 4:
Section A:
DATE: 10/02/2019 TIME:
NAME
AGE
GENDER
Section B:
1. Are you fond of using social media sites such as Facebook, Instagram etc.?
2. Do u feel secure uploading your photos and other personal information on such sites?
3. Are you aware of the risks of posting such data on the internet?
4. Is it worth using such sites despite the risks that it has & why?
20 | P a g e
INTERVIEW SCHEDULE 5:
Section A:
DATE: 10/02/2019 TIME:
NAME
AGE
GENDER
Section B:
1. Are you fond of using social media sites such as Facebook, Instagram etc.?
2. Do u feel secure uploading your photos and other personal information on such sites?
3. Are you aware of the risks of posting such data on the internet?
4. Is it worth using such sites despite the risks that it has & why?
21 | P a g e
6. CONCLUSION/SUGGESTIONS
Cybercrimes have been menacing the social media since its inception. This is manifested in form
of fraudulent transactions, hacking, virus attack, cyber defamation and cyber stalking. Even though
India has effective laws to deals with these crimes, the conviction rate is negligible. Cyber
Forensics is a growing area. It must be promoted to determine methods to detect Cyber Evidence.
Further, necessary amendments must be made in Indian law to be read harmoniously with IT Act
in order to control Cybercrimes.
Cybercrimes will always be an ongoing challenge despite the advancements being made by
numerous countries. Most countries have their own laws to combat cybercrimes, but some doesn’t
have any new laws but solely relies on the standard terrestrial law to prosecute these crimes. Beside
old-fashioned laws to contest cybercrime, there are still delicate punishments set in place to
penalize criminals, thus doing no most important deterrence of cybercrimes’ which distress the
economy and people’s social lives on a large scale by those criminals. Consequently, there is a
desperate need for countries on a global scale to come together and decide on what constitutes a
cybercrime, and develop ways in which to persecute criminals across different countries.
The use of superhighway in the 21st century through social media is both a boon and bane which
all depends on the way in which it’s been used. The relationship between seller and buyer has
changed drastically where sellers are no longer sheep searching for hay but they have become
hound preying directly upon their customers. As they gain the trust easily and providing customers
their desired quality product but as said. But this being said, there is a dark side to every
organization or group, community etc. therefore, it is necessary to enforce certain laws to regulate
positive affairs of the social media market and to save interests of the users since peace and happy
living in the motive of the law givers and the punishment to evil thinkers is the outcome of
enforcing such laws. To make the cyberspace more secure, following strategies must be followed:
Producing a secure cyber eco-system.
Creation of mechanism for Information Technology Security.
Protection of Information Infrastructure.
Improvement of enforcement of laws considering Cyber Crimes
22 | P a g e
BIBLIOGRAPHY
1. Every Sixth Cybercrime In India Is Committed Through Social Media:NIA
http://www.hindustantimes.com/india-news/every-sixth-cybercrime-in-india-committed-
through-social-media-nia/story-KscgnwjcTZ0pzVeVaOiN6M.html, Retrieved 12
February 2019
2. India ranks second in cyber-attacks through social media Yuthika Bhargava April 22,
2015http://www.thehindu.com/news/national/india-ranks-second-in-cyber-attacks-
through-social-media/article7130961.ece , Retrieved 12 February 2019
3. Pandey Anubhav, “Cyber crime and social media websites”,
https://blog.ipleaders.in/cyber-crime-social-media/ ,Retrieved 12 February 2019
4. Gupta Dhruv, “CYBER CRIME AND SOCIAL MEDIA MARKETING” ,
http://docs.manupatra.in/newsline/articles/Upload/A8DF0F79-717C-4E9F-90A4-
0859922812B6.pdf ,Retrieved 17 February 2019
5. https://data.gov.in (Government of India initiative under digital India
movement) , Retrieved 17 February 2019
6. Code of Criminal Procedure, 1973
7. Indian Penal Code, 1860.
8. The journal for indian researchers ,“INFLUENCE OF CYBER CRIME IN SOCIAL
MEDIA” ,november 6, 2017, https://tjirlegalblog.wordpress.com/2017/11/06/influence-
of-cyber-crime-in-social-media/ , Retrieved 18 February 2019
9. A Study on Cyber Crime and Security Scenario in INDIA Yougal Joshi1 , Anand Singh
International Journal of Engineering and Management Research, Volume-3, Issue-3, June
2013
10. Suchetana Ray and Anirban Ghoshal, Every sixth cybercrime in India committed
through social media, (Aug 25th, 2016 ), http://www.hindustantimes.com/india-
news/every-sixth-cybercrime-in-india-committed-through-social-media-nia/story-
KscgnwjcTZ0pzVeVaOiN6M.html, Retrieved 18 February 2019
11. Yuthika Bhargava, India ranks second in cyber-attacks through social media,( April
22nd , 2015 ), http://www.thehindu.com/news/national/india-ranks-second-in-cyber-
attacks-through-social-media/article7130961.ece. , Retrieved 18 February 2019
12. Legal Implications of Cyber Crimes on Social Networking Websites , Nikita Barman,
International Journal of Scientific and Research Publications, Volume 5, Issue 12,
December 2015 http://www.ijsrp.org/research-paper-1215/ijsrp-p4850.pdf , Retrieved 18
February 2019
13. Nikita Barman, Legal Implications of Cyber Crimes on Social Networking Websites,
Volume 5. IJSRP 315, 316 (2015).
14. The Information Technology Act, 2000
23 | P a g e