You are on page 1of 96

CHAPTER-1

INTRODUCTION

I am Rajesh Narayan Metal. At –Shelampada, Post- Gomghar,


Tal-Mokhada, Dist- Palghar. A student of second year master of
commerce (M.COM.II) in Dr.Shantilal DanjiDevsey Arts , Commerce
and Science College Wada. Affilated to university of Mumbai from the
Academic year 2017-18. University has newly introduce project work
(Reaserch work) for M.Com II year students .
Hence ; I decided to conduct a reaserch on “A STUDY OF
CYBER CRIME IN BANKING SECTOR ”.Service quality is the
execellent strategy and plays a key role in service sector in general and
banking sector in general and banking sector in particular to satisfy the
customers needs and retain them. Providing service quality is highly
significant function of service industry in today’s competitive
environment.
A) Information For Palghar District
Palghar District is a district in the state of Maharashtra in Konkan
Division. On 1 August 2014, the Maharashtra State government
announced the formation of the 36th district of Maharashtra, when a new
Palghar District was carved out of the old Thane district. Palghar District
starts from Dahanu at the north and ends at Naigaon. It comprises the
talukas of Palghar, Vada, Vikramgad, Jawhar, Mokhada, Dahanu,
Talasari and Vasai-Virar. At the 2011 Census, the talukas now
comprising the district had a population of 2,990,116.
Until 1 August 2014, the talukas now comprising Palghar District
formed a part of Thane District. After a struggle and demand for almost
25 years, for bifurcation, the creation of the new district was approved by
1
the Cabinet of Maharashtra on 13 June 2014 and the new district of
Palghar came into existence on 1 August. Abhijit S. Bangar was the first
Collector of the district.
comprises the wide amphitheater like Ulhas basin on the south and hilly
Vaitarna valley on the north together with plateaus and the slopes of
Sahyadri. From the steep slopes of the Sahyadri in the east, the land falls
through a succession of plateaus in the north and centre of the district to
the Ulhas valley in the south. The distance from the parts of different
palaces to headquarters Palghar by road is as follows: Khodala 138 km,
Mokhada 112 km, Jawhar 75 km, Vikramgad 60 km.
The main river flowing through the district is the Vaitarna. The river has
many tributaries; the most important of them are Barvi and Bhatsa, Pinjal,
Surya, Daherja and Tansa. Vaitarna, the largest of Konkan Rivers rises in
the Tryambak hills in Nashik district, opposite to the source of Godavari.
The river flows across Shahapur, Vada and Palghartalukas and enter the
Arabian Sea through a wide estuary off Arnala. Vaitarna River is 154 km
long and has a drainage area that practically covers the entire northern
part of the district.
Ulhasriver which flows to Arabian sea is Vasai creek, district's southern
border.
Arnala Island is located in Vasai taluka, at the entrance to the Vaitarna
estuary
Palghar has an urban population of 1,435,210, that is 48% of total
population is living in Urbanized Area. The district is bounded by Thane
and Nashik Districts on the east and northeast, and by Valsad District of
Gujarat state and Union Territory of Dadra and Nagar Haveli on the
north. The Arabian Sea forms the western boundary, while Vasai-Virar is
part of Mumbai Metropolitan Region.

2
Palghar has an urban population of 1,435,210, that is 48% of total
population is living in Urbanized Area. The district is bounded by Thane
and Nashik Districts on the east and northeast, and by Valsad District of
Gujarat state and Union Territory of Dadra and Nagar Haveli on the
north. The Arabian Sea forms the western boundary, while Vasai-Virar is
part of Mumbai Metropolitan Region.
After the division of the largest Thane district in the country, which is a
marine-mountainous and urban area, the new district of Palghar has
become the 36th district since August 1, 2014. In the presence of the then
Chief Minister Prithviraj Chavan and then Revenue Minister Balasahe b
Thorat, the work of new district started from 1 August 2014. Palghar is
the 36th district of the state. The district of Palghar, which is north part of
Konkan, has spread between Sahyadri mountain ranges situated east of
east and coastal Arabian sea coast. The total population of Palghar district
is 29, 9, 116. There are 8 talukas in Palghar district, including Jawhar,
Mokhada, Talasari, Vasai, Vikramgad, Palghar, Dahanu and Wada
talukas.
Total geographical area of Palghar district is 46 9 6 99 hectares, of
which there are 1008 villages and 3818 ponds. There are 477 Gram
Panchayats. The literacy rate of Pallagh district is 66.65%. Males
constitute 72.23% of the population and females 59.28%

3
1) Municipal Corporations in Palghar District
 Vasai-Virar
 Municipal Councils in Palghar District
 Palghar
 Jawhar
 Dahanu
 Proposed Municipal Councils in Palghar District
 Boisar
 Tarapur
 Talasari
 Vikramgad
 Vada
2) Loksabha and Assembly Consistuencies
4
There are six VidhanSabha constituencies in Thane district,
grouped into one LokSabha constituency; Dahanu (ST), Vikramgad (ST),
Palghar (ST), Boisar (ST), Nalasopara and Vasai constituencies are part
of PalgharLokSabha constituency.
3) Transportation
The Western Railway network passes through Vasai, Palghar and
Dahanutalukas of the district. The Western Express Highway (NH48) has
pass through manor and chilhar for enter in Palghar district.
4) Economic
Palghar has India's first atomic power plant located at Tarapur.
The industrial town of Boisar is also home to one of Maharashtra's
largest industrial areas at Tarapur MIDC. Maharashtra's largest fishing
port is Satpati; Dahanu, Arnala, Vasai and Datiware are also major
fishing ports. Dahanu and Palghar are the best known for their chickoo
production in the whole of India. A special Chickoo festival is also
hosted in Palghar

5
Table. 1.1
According to the 2001 census in Palghar taluka, the number of
towns and villages in the district
Sr.No. Taluka Number Of Number
Village Of Cities
1 Vasai 5 05
2 Palghar 222 02
3 Dahanu 183 02
4 Talasari 46 00
5 Jawhar 109 01
6 Mokhada 59 0
7 Wada 170 0
8 Vikramgad 94 0
1008 10
Table. 1.2
Literacy percentage
Sr.No. Taluka Male % Female Total %
%
1 Mokhada 53.70 39.402 46.54
2 Talasari 57.33 37.577 47.33
3 Jawhar 54.48 41.434 47.88
4 Dahanu 59.21 33.324 51.15
5 Vikramgad 61.00 46.268 5365
6 Wada 70.07 55.3779 63.15
7 Palghar 76.34 64.049 70.41
8 Vasai 80.02 73.497 76.94
72.23 59.281 66.65

6
Table. 1.3
District Scheduled Area:
Sr.No Taluka Total OF Total Of Schedule
Village Scheduled d Area
Area Of
Tahsil
1 Palghar 5 164 Partial
2 Vasai 222 57 Partial
3 Dahanu 183 183 Whole
Area
4 Talasari 46 46 Whole
Area
5 Wada 109 170 Whole
Area
6 Vikramga 59 94 Whole
d Area
7 Jawhar 170 109 Whole
Area
8 Mokhada 94 59 Whole
Area
Total 72.23 876

Palghar is a fast developing town situate don north side of Mumbai


and Vasai. It is “B” class Municipal Council. The western railway is
dividing the town almost in equal two parts. The area of Palghar
Municipal Council is approximately 22.11sq.km.

7
Palghar is situated at long itude 72045’Eastand latitude 19041
’North.
Palghar is approx. imately 25 kms away from National Highway
No.8(Mumbai-Ahamadabad Highway) .The seacoast approximately
20km. away from the Palghar Municipal limit. Palghar is surrounded on
North side by village Kolgaon, Nandoreand Morekuran; Westside by
village Kharekuranand Dhansar; South side by Mahim and Varkhunti and
East side by village Chahade ,Shelavali and Ambadi .Tarapur-Boisar
industrial are aissituate donnorth side about 12 km away from Palghar.
Two important roads are passing through Palghar. One is State
Highway No.34 coming from National Highway No. 8 upto Palghar,
which further goes to village Mahim-Kelwa, another is State Highway
No.4 which goes to Boisar.
Earlier Palghar was industrial dominated town, but steadily land use is
changed from industrial to residential. Inner part of town is under
residential use. South side in Lokmanyanagar and North side in
Gothanpur some industrial development is there. Eastern & Western side
hinter lands of palghar are predominately under agricultural use.
5) Historical Background
1. Palghar Vasai and Jawhar talukas of Palghar district are the legacy
of golden history.
2.Vasai Talukas were formerly dominated by the Portuguese. In the
Peshwa period, Chimaji Appa started spreading Marathi Empire of Lord
Potodija three hundred years ago.
3. Palghar was an important center in the struggle for freedom of India
during the 1942 Chale Go. In Palghartaluka, on 14th August, 1942, for
the fight against the British Empire, the uprising was done. In this
uprising, five martyr martyrs of Palghar were killed.

8
4. Kashinath Hari Pagadhre of Shatpati, Govind Ganesh Thakur of Nand
gaon, Ramchandra Bhimashankar Tiwari of Palghar, Ramchandra
Mahadev Churi of Murbe, Sukur Govind More of Shirga, martyr while
fighting for the British in the freedom struggle.
5. Hutatma Chowk is built in Palghar city as a memory of these martyrs.
6. When the sweet Satyagraha of 1930 began, many activists from Vadrai
to Satpati in Palghar taluka had joined this Satyagraha HISTORY
In British era, Palghar was a small village and Mahim was its
Tahsil.However, in 1867 British government laid railway line between
Mumbai to Baroda (Gujrat) to make it convenient to send the cotton of
Baroda to England for their cotton mills.The Palghar railway station has
come in existence in 1893. However, the development of Palghar in true
sense started after the rich people and land lords of Mahim migrated to
Palghar because ofe pidemic like malaria and plague.
In1896-1897 the tribal community (local resident) put the Tahsil Office
on fire by getting grid of draught and attitude of government. Therefore,
the Tahsil Office was shifted to Palghar from Mahim, even today the
Tahsil Office is functioning from same building. The building was
constructed in the ye 1923. The first school established in Palghar in the
year1920. Today it is famous as Aryan High School.
The flourishing business of dry grass has begun in those days which are
still going on. We can see many grass godowns in the city.
In 14th August, 1942 during morcha of Tahsil Kacheri 5 youngsters of
Palghar were killed in British police firing. There is live today in form of
Hutatma Chowk and five Lamps (Batti) are always lighting to remind
their courage. The Chowk is popularly known as Panch Chowk.
6) Civiladministration:

9
Palghar Municipal Council (BClass) is establish he don 17th
September 1998 under the Maharashtra Municipal Councils, Nagar
Panchayats and Industrial Town ships Act 1965. The population is 52,677
as per 2001 census. The area of Palghar Municipal Councilis 22.11sq.km.
. The Municipal Council has 25 councilors. There are seven subject
committees namely
 Standing Committee
 Woman and Child Welfare Committee
 Planning and Development Committee
 Education Committee
 Water Supply and Sewerage Committee
 Public Health and Sanitation Committee
7) Area And Location
The Palghar Town is located on north side of Mumbai and Virar. It
is on north-West side of Thane. The area of Palghar Municipal Councilis
22.11sq.km.
The boundary of the Municipal Councilis as per notification issued by
government dated 17th September, 1998. It is also compared with ward
boundaries of the Municipal Councils. The boundary of the Coastal
Regulation Zone Map is considered as per maps prepared by MRSAC
Nagpur.
8) Topography And Lands Cape
Topographically Palghar town has generally plane and table land.
Except some part of village where Vevoor has range mountains and forest
are found.
9) Climatology
Seasons

10
The location of the town being in the hot and temperate region and
in the areas covered by the south western prevailing winds, there are two
distinct seasons, one extending from mid June to September, and the other
for the rest of the year. In this season there are rare rains due to local
cyclones or depress.
10) Rainfall
The average annual rainfall is about 700 mm. The highest rainfall
occurs in the month of July. The rainfall is not evenly distributed in a
period of a year.
11) Temperature
The average minimum and maximum temperature at Palghar ranges

from 10.50C and 380C respectively. The maximum average monthly

temperature of 280 C is recorded in the month of May. The minimum

average (monthly temperature) 220 C is recorded in the month of


February. Palghar is not directly coastal town and hence the temperature
variation during the year is minor.
12) Humidity
The humidity of Palghar town occasionally falls below 50%.
During the monsoon season the sky is heavily clouded. In the months of
May and October the clouds are moderate.
13) Growth Of Population
The growth of Palghar-Town is moderate as could be seen from
previous census enumeration. The growth of town population is mostly
the natural growth as there is less economic activity for out-siders to seek
employment in the town.
The growth of population, decadal variation & annual growth rate of
population during last four decade’s is as below:

11
Table.1.4
Growth Population

Decadal of Annual
%
Sr.no Year Population
Variation Variation growth
of Rate
1 2 3 4 5 6%

1 1961 14372 --- --- ---

2 1971 17744 3372 --- 14372

3 1981 23401 5657 40.39 17744

4 1991 30590 7189 21.31 23401

5 2001 52677 22087 67.45 30590

Demographic characteristics–growth of population


Except last decades first three from the year 1961, the town population is
growing rather at a uniform rate. The Palghar town is now showing.
14) Structure Of Population– Sex Ratio & Age Composition
The 2001 census population is 52677 souls, out of which 28645 are males
& 24032 are females giving a sex ratio of 839 females per 1000 males.
Out of total population, 37985 persons are literates. i.e. literacy
percentage of town is 83%.
15) Distribution Of Population In The Town:-
Palghar Municipal area is divided into 18 electoral wards on the basis of
number of voters. The ward wise distribution of population, is given in

12
Table.1.5
Demographic Characteristics: Distribution Of Population Year
2001
WardNo. Populationasper2001Census
Male Female Total
1 942 812 1754
2 1589 1326 2915
3 2661 2117 4778
4 1544 1090 2634
5 1561 1334 2895
6 1232 1008 2240
7 1197 1074 2271
8 1520 1136 2656

9 1784 1580 3364


10 1696 1435 3131
11 818 754 1572
12 1793 1490 3283

13 1664 1488 3152

14 1404 1105 2509


15 1741 1503 3244

16 2292 1983 4275


17 2045 1778 3823
18 1162 1019 2181
Total 28645 24032 52677
It is seen that total population is evenly distributed in all wards. The
average populations of ward 2927.

13
16) Occupational Structure
The total population of Palghar Town as per 2001 census is 52677 out of
which 20233 are listed as workers & these account to be 61.5% of total
population. The following table shows the occupational pattern of the
workers in Palghar town as obtained from the census abstract &
information from Palghar Municipal Council.
Table. 1.6
Occupational Pattern (2001 Census)
Sr. No. of % with
Occupational Sector
No worker the total
Primary sector Workers engaged s workers
in Agriculture including Engage
I 1681 8.50%
Agricultural labors Cultivators, d
live-stock forestry & allied.
Secondary sector Workers
II engaged in Industries, 878 4.50%

Manufacturing
Tertiary sector Workers engaged
III in Trade & Commerce & 17674 87.00%
Communication Services.

Total workers 20333

Non workers 32444

The above table indicates that the maximum no. of workers are
engaged in the tertiary sector, which is about 87.00% of the total workers.
17) The Employment Pattern:
The local employment is distributed in the following major sectors
 Industries – Small scale, households.
14
 Administrative sector which includes State & Central Govt. offices
& other offices including Educational & Health Institutes.
 Shops, Commercial, establishments, Theatres, Eating-houses,
Residential Hotels, etc
 According to the census record, about 878 workers (556 male &
322 female) are engaged in household industries which is 1.32% of
the total workers population. There are different types of industries
functioning in the town like Sawmills, Poha mills, Rice mills,
Bakery etc. There is no heavy industrial activity in the town.
18)Existing Land Use:
General
A study of existing land use and their distribution over the area
included in the development plan helps the planner in understanding the
town and its activities. The existing pattern of the land- use is the result
of past growth and the present activities of the town. Thus the survey of
land–uses provides the knowledge about how much land is put to various
uses and what are the factors in fixing the extent of land - uses for
particular activities and how much more is needed for providing a future
growth and to what scale. Such survey of all area within the municipal
limit was carried out with a view to as certain the present use of land and
to prepare an existing land use map as required under the provision of
Maharashtra Regional and Town planning Act 1966 u/s. 25. The Existing
Land Use Survey of Palghar Municipal area was carried out during the
year 2008 and handed over to Municipal Council on 15th September,
2008.
The map showing Palghar Municipal Council with all surrounding
villages is shown on adjoining page.
19)Destribution Of Land Uses:
15
According to the existing land use survey and land use analysis
distribution of land uses is given in table :1.7
Table. 1.7
Existing Land Use Analysis:
Sr. Land-Use Area in %with % with Town
No. Ha. Developed area
1. Residential 245.18 Area
45.07 11.09
2. Commercial 11.85 2.18 0.54
3. Industrial 144.67 26.59 6.54
4. Recreational 2.18 0.40 0.10
5. Public-Semipublic 58.11 10.68 2.63
6. Public Utility 10.43 1.92 0.47
Traffic & 71.56 13.15 3.24
7.
Transportation
Developed Area(A) 543.98 100.00 24.61

8. Land Under 34.00 2.04 1.54


Railway
9. Agriculture land 743.79 44.62 33.64
10. Hilly Area 71.70 4.30 3.24
11. Forest Area 217.75 13.06 9.85
12. Vacant Land 416.20 24.97 18.82
13. Water Bodies 19.28 1.16 0.87
14. Horticulture land 117.91 7.07 5.33
15. Khajan Land 46.39 2.78 2.10

Non-Developed Area(B) 1667.02 100.00 75.39

Total Town Area(A)+(B) 2211.00 100.00 100.00

(Note: Developed area is 47.27%, undeveloped area is 52.73%


comparing with total town area.

16
a) Residential Use:
Generally the major part of the developed area is used for the
residential purposes in a small urban center. Same is the case of Palghar
town also. The present population is accommodated in the residential area.
The net residential area is 245.18 Ha it is 45.07% of the developed area
and 11.09% of the total town are.
b) Commercialuse:
Palghar is commercial centre for its surrounding villages like
Mahim, Kelwa, Saphala, Dhansar, Morekuran etc. On every Friday
weekly market runs along the Mahim-Palghar Road and is heavily
crowded. People from surrounding villages sales and purchase goods and
daily life things. This is directly encourages sell of local products.
Generally the development under this occupies the frontages of the busy
streets. Shops, commercial establishments, eating houses, residential
hotels and all such uses are grouped in this category. However, there is
major diversion road coming from Manor and reaches at Mahim called
Valan Rasta. Existing Palghar-Mahim road called Old State Highway goes
through center of the city i.e. starts from Palghar station and ends at govt.
agricultural research centre. This road has heavy commercial potential.
The commercial activity is mostly concentrated on the western portion
adjoining to the station. There is existing APMC centre having area about
22 acres ituated on Manor Road appx.1.5km.away from the Palghar
station.
According to the existing land use survey an area of 11.85 Ha is
occupied by the commercial use. It is 2.18% of the developed area and
0.54% of the total area. According to the survey carried out there area
round 15-20 eating houses and residential hotels, appx.500 shops and 3
cinema theatres.

17
c) Industrial Use:
Existing area under industrial use is about 144.67 Ha which is
26.59% of the developed area and 6.54% of the total area. It proves that
the area under industrial use is nealigible as compared to the area of the
town.
The existing industrial area is contains smalls cale industries as well as
big industries.
Industrial area is distributed around the Palghar is as below.
 Vevoor (on boundary of village Nandore).
 BIDCO industrial area at Lokmanya Nagar. (on boundary
of village Mahim.)
 DIWAN industrial area at village Alayali.(on boundary of
village Mahim)
 Palghar Industrial Estate (on boundary of village More
kuran)
 The industries are manufacturing machine tools, parts of
car, socks, notebooks, printing of notebooks.
d) Land Under Recreational Use:
The land under this covers the area developed as play-grounds,
gardens and organized open spaces in the town. Some open spaces of
sanction layouts are developed as garden which are shown on the
development plan. Presently play ground of Aryan High School is utilized
by citizens for recreation.
e) Land Under Public – Sem Ipublic Use:
Palghar is on of the Tahsil place of Thane District. Sovarious state
Govt. Offices like Tahsil dar Office, Police Station, Post Office,
Z.P.Taluka Health Centre, Forest Office,B&C Deptt, M.S.E.B., Town
Planning Office, Sales Tax Office, Income Tax Office, Excise Office,
18
etc., are functioning in the Palghar. Some of the offices are functioning in
rental premises.
Land under public use covers the area developed by educational,
medical, administrative buildings, temples, mosques, etc. The total area
covered under this category is 58.11 Ha which accounts for 10.68% of the
developed area and 2.63% of the total area.
20) Aims And Objectives:
Palghar is one of the important station and town after Virar. It is
combination of residential and industrial users. However, now a day it
appears that residential user is increasing in largers cale and industrial user
is decreasing. Therefore, this city can be developed as purely or fully
residential city. So that citizens can go to industrial areas innear by town
like Boisar and come back to their homes at Palghar. It will be therefore
necessary to provide all best residential facilities in the city .Even on the
surroundings of municipal area mega projects are coming up and on the
other hand to wards Mahim-Kelwa which is growing up as tourist place
where as industrial area at Boisar.
Therefore, the objectives of the plan are set as follows.
 To achieve planned Urban Development
 To accommodate the requirement of business
commercial potential & industry.
 To protect and anenhance existing settlement
(Gaothan)
 To promote recreational development activities.
 The developed plan is aimed for orderly development
of this area and improvement of traffic circulation
pattern.
 Adequate public amenities and facilities as per then

19
orms of planning standards are to be provided.
 Adequate parking places in respect of proposed
decentralization of commercial activities at
appropriate locations are to be provided.
 Considering the low implementation of Development
plan and in order to involve public participation
implementation of Development Plan, concepts like
Transfer of Development Rights owners,
accommodating the reservations in case of land
reserved for Public purpose in the Development Plan
are to be introduced in existing Building byelaws and
D.C. rules
21) Economic Base & Growth Potential Industrial Activities In
The Town
There is industrial development in the town. Area admeasuring
144.67 Ha is under industrial zone. However, as stated earlier industrial
use is reducing day by day. Land owners are converting industrial lands
(layouts) into residential use. Most of occupation is in the form of
services. As per 2001 census 20333 of total working force is engaged in
tertiary sector. However, major industrial setup is at Boisar (12km) away
from Palghar. Many workers are engaged in the industrial area of Boisar
as well as Palghar. One of the old industrial areas in Palghar is situated at
BIDCO which is partly within Palghar Municipal Limit area and partly
out of Municipal Limit. Industrial area near Vishnu nagar is also fully
developed and generating employment. There is one smalls cale Co-
Operative Industrial Estate named ‘Palghar Co-Operative industrial
Estate’ is situated on Palghar-Boisar Road admeasuring about 22 acres.
Besides above there is a big pocket of industry in Gholvira.

20
ExistingLandUse(TotalArea)

2.
27

1.13 Residential
10.0 Commercial
0
IndustrialRe
2.
80 creationalPu

1.09 blic-
Semipublic
0.74
PublicUtility
1.34
Traffic&Transport
ationLandUnder
45.9
7 RailwayWaterBo
11.2 dies
7

Khaja
nLand

0.6 Gree
1
nZone

5.8 Fores
1
t Area

CRZBUFFERZONE
5.6
7

9.8 1.4
9 1

22)Other Major Components Of Economical Activities:

21
Co-Operative banks are there i.e. State Bank, IDBI Bank, HDFC
Bank, ICICI Bank, UCO bank, Bank of India, etc. Be sides these Credit
Banks are also there.
Palghar has trade link to Mumbai as well as Gujrat state also because it is
situated on Western Railway. Gujrat state boundary just 125 km away
from the Palghar. There are also good road links i.e. two state highways
passing thorough the town .i.e. State Highway No.24 & State Highway
No.4. The town has good economic base due its commercial and
industrial character which is surrounded by the rich agricultural hinter
land. Commercial activities within the area are seen mostly in the form of
shops. However, widespread commercial activities are seen in the inner

22
core of the town. There is one APMC established in the city comprising
area about 22 acres. It is not developed upto the mark but is has good
potential. Due to concentration of wide spread commercial & industrial
activities in & around the town & having good connectivity. It is also
seen that Palghar as future district place. It provides employment
opportunities as well as good residential place. Thus the town has good
growth potential.
C) Wada Taluka Information :
Wada Taluka Population, Caste, Religion Data-Thane district,
Maharashtra.
Wada Taluka of Thane district has total population of 178,370 as per the
Census 2011. Out of which 91,990 are males while 86,380 are females. In
2011 there were total 39,303 families residing in VadaTaluka. The
Average Sex Ratio of VadaTaluka is 939. As per Census 2011 out of total
population, 13.4% people lives in urban areas while 86.6% lives in the
rural areas. The average literacy rate in urban areas is 86.3% while that in
the rural areas is 70.9%. Also the Sex Ratio of Urban areas in
VadaTaluka is 917 while that of rural areas is 942.
The population of Children of age 0-6 years in VadaTaluka is 24120
which is 14% of the total population. There are 12324 male children and
11796 female children between the age 0-6 years. Thus as per the Census
2011 the Child Sex Ratio of VadaTaluka is 957 which is greater than
Average Sex Ratio ( 939 ) of VadaTaluka.
The total literacy rate of VadaTaluka is 73.02%. The male literacy
rate is 70.07% and the female literacy rate is 55.78% in VadaTaluka.

23
Table. 1.8
Population, Literacy, And Sex Ratio In Wada Taluka
Population Literacy Sex Ratio

178370 73.02% 939

To facilitate the administration, VadaTaluka is further divided into


2 towns and 168 villages.
As per the Population Census 2011 data, following are some quick facts
about VadaTaluka.
Table 1.9
Quivk Facts Wada Taluka
Children
Female
(Age.06-18) Male
Total 24,120 12,324 11,796
Literacy 73.02% 70.07% 55.78%
Scheduled
4,482 2,288 2,194
Caste
Scheduled
101,709 51,160 50,549
Tribe
Illiterate 65,731 27,533 38,198

1. Caste-wise Population - WadaTaluka


Schedule Caste (SC) constitutes 2.5% while Schedule Tribe (ST)
were 57% of total population in Wada Taluka of .

24
Table. 1.10
Cost Wise Population

Total Male Female

Schedule Caste 4,482 2,288 2,194

Schedule Tribe 101,709 51,160 50,549

Table. 1.11
Religion-Wise Population – Wada taluka
Religion Total % Male Female
Hindu 169,650 95.11% 87,411 82,239
Muslim 5,824 -3.27% 3,130 2,694
Christian 159 -0.09% 83 76
Sikh 88 -0.05% 46 42
Buddhist 2,191 -1.23% 1,111 1,080

Jain 179 -0.10% 88 91

Other
12 -0.01% 7 5
Religion
No
267 -0.15% 114 153
Religion

1) Sex Ratio – Wada Taluka:


The Sex Ratio of Wada Taluka is 939 . Thus for every 1000 men
there were 939 females in Wada Taluka. Also as per Census 2011, the

25
Child Sex Ration was 957 which is greater than Average Sex Ratio ( 939
) of Wada Taluka.
2) Child Population – Wada Taluka:
According to Census 2011, there were 24,120 children between
age 0 to 6 years in Wada Taluka. Out of which 24,120 were male while
24,120 were female.
3) Urban/Rural Population – Wada Taluka:
As per Census 2011, there are total 5,586 families under Wada
Taluka living in urban areas while 5,586 families are living within Rural
areas. Thus around 13.4% of total population of Wada Taluka lives in
Urban areas while 86.6% lives under Rural areas. Population of children
(0 - 6 years) in urban region is 3,032 while that in rural region is 21,088.

Table. 1.12
Urban Rural Population
Total Urban Rural
Population 178,370 23,954 154,416
Children (0 - 6
24,120 3,032 21,088
years)
Schedule Caste 4,482 1,310 3,172
Schedule Tribe 101,709 5,186 96,523
Literacy 73.02% 86.33% 70.93%
Sex Ratio 939 917 942

4) Working Population – Wada Taluka


In Wada Taluka out of total population, 84,824 were engaged in
work activities. 69.3% of workers describe their work as Main Work
(Employment or Earning more than 6 Months) while 30.7% were
26
involved in Marginal activity providing livelihood for less than 6 months.
Of 84,824 workers engaged in Main Work, 14,108 were cultivators
(owner or co-owner) while 21,925 were Agricultural labourer.
Table .1.13
Working Population
Workers Total Male Female
Main Workers 58,772 39,699 19,073
Cultivators 14,108 9,076 5,032
Agriculture Labourer 21,925 12,509 9,416
Household Industries 1,226 768 458
Other Workers 21,513 17,346 4,167
Marginal Workers 26,052 13,202 12,850
Non Working 93,546 39,089 54,457

It is very important to do the service right the first time. In case


a service problem does crop up, by resolving the problem to the
customer‟ s satisfaction, the company can significantly improve
customer retention. However, companies fare best when they prevent
service problems altogether and fare worst when service problems
occur and the company either ignores them or does not resolve them
to the customer‟ s satisfaction. Performing the service accurately is
perhaps the most important factor in service quality excellence. The
cost of performing the service inaccurately includes not only the cost
of redoing the service but also the cost associated with negative
word-of-mouth generated by displeased customers. In case of
services, the factory is the field. Again, services are intangible and
hence the criteria for flawless services are more subjective than the
criteria for defect-free tangible goods. Hence for most services,
27
customers‟ perceptions of whether the service has been performed
correctly, and not provider- established criteria, are the major
determinants of Customers may reveal new aspects of service quality
in banking that are important to them, and these would have to be
incorporated in the scale so as to further explore the concept of
service quality in the banking arena.

D) Chapter scheme
 Introduction
 Research Methodology
 Review of Literature
 Data collection and analysis
 Conclusion and suggestion
 Bibliography

28
CHAPTER - 2
RESEARCH METHODOLOGY

1. Meaning of Research:
Research in common parlance refers to a search for
knowledge. One can also define research as a scientific and
systematic search for pertinent information on a specific topic. In
fact, research is an art of scientific investigation. The Advanced
Learner's Dictionary of Current English lays down the meaning of
research as "a careful investigation or inquiry specially through
search for new facts in any branch of knowledge" .1 Redman and
Mory define research as a "systematized effort to gain new
knowledge Some people consider research as a movement, a
movement from the known to the unknown. It is actually a
voyage of discovery. We all possess the vital instinct of
inquisitiveness for, when the unknown confronts us, we wonder
and our inquisitiveness makes us probe and attain full and fuller
understanding of the unknown. This i nquisitiveness is the mother
of all knowledge and the method, which man employs for
obtaining the knowledge of whatever the unknown, can be termed
as research.
Research is an academic activity and as such the term should
be used in a technical: sense According to Clifford Woody research
comprisals defining and redefining problems, formulatmg hypothesis
or suggested solutions; collecting, organizing and evaluating data;
making deductions, and reaching conclusions and at last carefully
testing the conclusions to determine whether they fit the formulating
hypothesis. D. Slazenger and M . Stephanotis i n the Encyclopedia
of Social Sciences define research as "the manipulation o f things
29
Research is an academic activity and as such the term should
be used in a technical sense. Research in common parlance refers to a
search for knowledge. One can also consider research as a scientific
and systematic search for pertinent information on a specific topic. In
fact, research is an art of scientific investigation. Some researchers
consider research as a movement, a movement from the known to
the unknown. It is actually a voyage of discovery. We all possess the
vital instinct of inquisitiveness for, when the unknown confronts us,
we wonder and our inquisitiveness makes us probe and attain full
and fuller understanding of the unknown. This inquisitiveness is the
mother of all knowledge and the method, which man employs for
obtaining the knowledge of whatever the unknown, can be termed as
research.
Research is a process of finding facts and arranging
them in such a manner that information is obtained
regarding any fact, figure or phenomenon. Research
process has been conducted from the time since human
being was first created and it is a never-ending
process.
Research is not confined to science and technology
only. There are vast areas of research in other disciplines
such as languages, literature, history and sociology.
Whatever might be the subject, research has to be an
active, diligent and systematic process of enquiry in
order to discover, interpret or revise facts, events,
behaviors and theories. Applying the outcome of
research for the refinement of knowledge in other
subjects, or in enhancing the quality of human life also

30
becomes a kind of research and development.
Research is done with the help of study, experiment,
observation, analys is , comparison and reasoning.
Research is in fact ubiquitous. For example, we know that
cigarette smoki'1g is injurious to health; heroine is
addictive; cow dung is a useful source of biogas; malaria is
due to the virus protozoan plasmodium; AIDS (Acquired
Immune Deficiency Syndrome) is due to the virus HIV
(Human Immune Deficiency Virus). How did we know all
these?
We became aware of all this information only through
research. More precisely, it seeks predictions of events,
explanations, relationships and theories for them.

2. Definitions of Research
 Slazenger And M. Stephenson In the Encyclopedia Of
Social Sciences:
define research as "the manipulation of things, concepts or
symbols for the purpose of generalizing to extend, correct or
verify knowledge , whether that knowledge aids in
construction of theory or in the practice of an art."
 The Advanced Learner’s Dictionary of Current English
Lays down the meaning of research as "a careful investigation
or inquiry especially through search for new facts in any branch
of knowledge."
 Redman and Mory:
define research as a “systematized effort to gain new
knowledge."

31
 According to Clifford Woody:
"research comprises defining and redefining problems,
formulating hypothesis or suggested solutions; collecting,
organizing and evaluating data; making deductions and reaching
conclusions; and at last carefully testing the conclusions to
determine whether they fit the formulating hypothesis".
 According to Drew:
Research is a systematic way of asking questions". Research is,
thus, an original contribution to the existing stock of knowledge
making for its advancement. It is the pursuit of truth with the help of
study, observation, comparison and experiment. In short, the search for
knowledge through objective and systemic method of finding solution
to a problem is research. The systematic approach concerning
generalization and the formulation of a theory is also research. As such
the term 'research' refers to the systematic method consisting of
enunciating the problem, formulating a hypothesis, collecting the
facts or data, analyzing the facts and reaching certain conclusions
either in the form of solutions(s) towards the concerned problem or in
certain generalizations for some
3. Features or Characteristics of Research
 Reliability
This is a major characteristic of research. Reliability is a
sub1ective term which cann ot be measured precisely but today
there are instruments which can estimate the reliability of any
research. Reliability is the repeatability of any research, research
instrument, tool or procedure. If any research yields similar results
each use it 1s undertaken with similar population and with similar
32
procedures, it is called to be a reliable research. Suppose a research is
conducted on the effects of separation between parents on class
performance of the children.

 Validity
Research must have validity. Validity is the strength with which
we can call a research conclusions, assumptions or propositions true or
false. Validity determines the applicability of research. Validity of
the research instrument can be defined as the suitability of the
research instrument to the research problem or how accurately the
instrument measures the problem.

 Accuracy
The third characteristic of research is accuracy. Accuracy is the
degree to which each research process, instrument and tool is
related to each other. Accuracy also measures whether research
tools have been selected in best possible manner and research
procedures suits the research problem or not. For example, if a
research has to be conducted on the trans-gender people, several data
collection tools can be used depending on the research problems but
if you find that population less cooperative the best way is to
observe them rather than submitting questionnaire because in a
questionnaire either they will give biased responses or they will not
return the questionnaire at all.

 Credibility
When researcher gives accurate references in research the
credibility of research increases but fake references also decrease the
credib1hty of research.
Credibility comes with the use of best source of information and

33
best procedures in research. If you are using second-hand
information in your research due to any reason your research
might complete in less time but its credibility will be at stake
because secondary data has been created according to other
researcher's needs or human beings and is therefore not very valid
to use in research.

 Generalizability
Generalizability is the extent to which research findings can be
applied to larger population. When a researcher conducts a study
he/she chooses a target population and from this population he takes
a small sample to conduct the research. This sample is representative
of the whole population so the findings should also be.

 Empirical
When research has been conducted following ngorous
scientific methods and procedures it is called as empirical in nature.
Each step in the research has to be tested for accuracy and should be
based on real life experiences. Quantitative research is easier to
prove scientifically than qualitative research. In qualitative research
biases and prejudice are easy to occur.

4. Types or Classification of Research


 Basic or Pure Research
Basic or Pure research is research done simply to find
out something by examining anything. For instance. in some
pure scientific research scientists discover what properties
various materials possess. It is not for the sake of applying
those properties to anything in particular. but simply to find out
what properties there are. Pure mathematics is for the sake of

34
seeing what happens. not to solve a problem. The fun of pure
research is that you are not looking for anything in particular.
Instead, anything and everything you find may be joned with
anything else just to see where that combination would lead, if
anywhere.

 Applied Research
Applied research aims at finding a solution for an immediate
problem facing a society or an industriousness organization
Research aimed at certain conclusions (say, a solution) facing a
concrete social or business problem is an example of applied
research. Research to identify social economic or political trends
that may affect a particular institutor or the copy research
(research to find out whether Certain Communications will be read
and understood) or the marketing research or evaluation research
are examples of applied research. Thus. the central aim of applied
research is to discover a solution for some pressing practical
problem.

 Descriptive Research

Descriptive research includes surveys and fact-finding enquiries


of different kmds. The major purpose of descriptive research is
description of the state of affairs as it exists at present. In social science
and business research we quite often use the term Ex post facto
research for descriptive research studies. The main characteristic of
this method is that the researcher has no control over the variables;
he can only report what has happened or what is happening. Most ex
post facto research projects are used for descriptive studies in which
the researcher seeks to measure such items as, for example, frequency
of shopping, preferences of people, or similar data. Ex post facto
35
studies also include attempts by researchers to discover causes even
when they cannot control the variables. The methods of research
utilized in descriptive research are survey methods of all kinds,
including comparative and correlational methods.

 Analytical Research
In analytical research the researcher has to use facts or
information already available, and analyze these to make a critical
evaluation of the material. Analytical research is a specific type of
research that involves critical thinking skills and the evaluation of
facts and information relative to the research being conducted. A
variety of people including students, doctors and psychologists use
analytical research during studies to find the most relevant information.
From analytical research, a person finds out critical details to add
new ideas to the material being produced. Research of any type is a
method to discover information. Within analytical research articles,
data and other important facts that pertain to a project is compiled;
after the information 1s collected and evaluated, the sources are used
to prove a hypothesis or support an idea. Using critical thinking skills
(a method of thinking that involves identifying a claim or assumption
and deciding if it is true or false) a person is able to effectively pull out
small details to form greater assumptions about the material. Some
researchers conduct analytical research to find supporting evidence to
current research being done in order to make the work more reliable.
Other researchers conduct analytical research to form new ideas about
the topic being studied. Analytical research is conducted in a variety of
ways including literary research, public opinion, scientific trials and
Meta-analysis

 Empirical Research
36
Empirical research relies on experience or observation alone,
often without due regard for system and theory. It is data-based
research, coming up with conclusions which are capable of being
verified by observation or experiment. We can also call it as
experimental type of research. In such a research it is necessary to get
at facts first-hand, at their source, and actively to go about doing certain
things to stimulate the production of desired information. In such a
research, the researcher must first provide himself with a working
hypothesis or guess as to the probable results. He then works to get
enough facts (data) to prove or disprove his hypothesis He then sets
up experimental designs which he thinks will manipulate the persons
or the materials concerned so as to bring forth the desired information.
Such research is thus characterized by the experimenter's control over
the variables under study and his deliberate manipulation of one of
them to study its effects. Empirical research is appropriate when proof
is sought that certain variables affect other variables in some way.
Evidence gathered through experiments or empincal studies is today
considered to be the most powerful support possible for a given
hypothesis.

 Quantitative vs Qualitative
Quantitative research is based on the measurement of quantity
or amount. It is applicable to phenomena that can be expressed in
terms of quantity. Qualitative research, on the other hand, is concerned
with qualitative phenomenon. i.e., phenomena relating to or involving
quality or kind. For instance, when we are interested in investigating
the reasons for human behavior.
5. Importance / Role significance Of Research in Business

37
Research is actually an act of studying something carefully and
extensively in order to attain deep knowledge in the same. For being
successful, research should be systematic. arranged, summarized and
recorded properly. Research is not only a process that is limited to the
field of science.

 To collect Necessary Information


Research provides you with all necessary information in
field of your work, study or operation before you begin working on
it. For example, most companies do research before beginning a
project in order to get a basic idea about the things they will need
to do for the project.

 To Make Changes
Sometimes, there are in-built problems in a process or a
project that is hard to discover. Research helps us find the root
cause and associated elements of a process. The end result of such a
research invokes a demand for change and sometimes is successful in
producing changes as well.

 Improving Standard of Living


Only through research can new inventions and discoveries
come into life. It was C.V. Raman's research that prompted
invention of radio communication. Imagine how you would have
communicated had Graham Bell not come out with the first ever
practical telephone! Forget telephones, what would have happened
if as we are to mobile phones, we need to understand that all
the luxuries and the amenities that are now available to us are the
result of research done by someone. And with the world facing
more and crisis each day, we need researchers to find new solutions
38
to tackle them.

 For a Safer Life


Research has made ground breaking discoveries and
development in the field of health, nutrition, food technology and
medicine. These things have improved the life expectancy and
health conditions of human race in all parts of the world and
helped eradicate diseases like polio, smallpox completely.
Diseases that were untreatable are now history, as new and new·
inventions and research in the field of medicine have Jed to the
advent of drugs that not only treat the once-incurable diseases, but
also prevent them from recurring.

 To Know the Truth


It has been proved time and again that many of established
facts and known truths are just cover ups or blatant lies or rumors.
Research is needed to investigate and expose these and bring out the
truth.

 Explore our History


Research about our planets history and human history has
enabled us to learn and understand more about our forefathers and
helped us learn from their mistakes and absorb good things from
their life. Research about the planet's history and existence has told
us a lot about how things will shape up in years to come and how
we need to respect our planet.

 Understanding Arts
This helps us in understanding the work of artists in literature,
paintings, sculptures and everything that can be attributed with
artistic touch. If no research is conducted into any of these, we will
39
never be able to understand any of these as per the artist's
imagination Also, a lot of great artistic work 1s hidden in the
shadows of history, which needs to be drawn out Business research
helps business managers find new markets and make the most of
their resources. They are important for start-ups and investors.
Established businesses often use it to find new areas for growth
Launching a business requires having a good idea, but it is also
important to know 1f there is a large enough customer base to
support the idea. Market research is helpful. Examination of both
old and new survey data allows potential founders to explore
whether or not a particular idea is sustainable Established businesses
often focus on growth, and business research helps managers find
new areas to enter. While established businesses often risk a bit
more than new businesses. the cost of a failed product launch is
potentially significant.
6. Types or Classification of Research
 Basic or Pure Research
Basic or Pure research is research done simply to find out
something by examining anything. For instance. in some pure
scientific research scientists discover what properties various
materials possess. It is not for the sake of applying those
properties to anything in particular. but simply to find out what
properties there are. Pure mathematics is for the sake of seeing
what happens. not to solve a problem.
The fun of pure research is that you are not looking for
anything in particular. Instead, anything and everything you find
may be jomed with anything else just to see where that
combination would lead, if anywhere.
40
 Applied Research
Applied research aims at finding a solution for an
immediate problem facing a society or an industriousness
organization. Research aimed at certain
conclusions (say, a solution) facing a concrete social or business
problem is an example of applied research. Research to identify
social economic or political trends that may affect a particular
institutor or the copy research (research to find out whether certain
communications will be read and understood) or the marketing
research or evaluation research are examples of applied research.
Thus. the central aim of applied research is to discover a solution
for some pressing practical problem.

 Descriptive Research
Descriptive research includes surveys and fact-finding
enquiries of different kmds. The major purpose of descriptive
research is description of the state of affairs as it exists at present. In
social science and business research we quite often use the term Ex
post facto research for descriptive research studies. The main
characteristic of this method is that the researcher has no control
over the variables; he can only report what has happened or what
is happening. Most ex post facto research projects are used for
descriptive studies in which the researcher seeks to measure such
items as, for example, frequency of shopping, preferences of
people, or similar data. Ex post facto studies also include attempts
by researchers to discover causes even when they cannot control
the variables. The methods of research utilized in descriptive
research are survey methods of all kinds, including comparative
and correlational methods.
41
 Analytical Research
In analytical research the researcher has to use facts or
information already available, and analyze these to make a critical
evaluation of the material. Analytical research is a specific type of
research that involves critical thinking skills and the evaluation of
facts and information relative to the research being conducted. A
variety of people including students, doctors and psychologists use
analytical research during studies to find the most relevant information.
From analytical research, a person finds out critical details to add
new ideas to the material being produced. Research of any type is a
method to discover information. Within analytical research articles,
data and other important facts that pertain to a project is compiled;
after the information 1s collected and evaluated, the sources are used
to prove a hypothesis or support an idea. Using critical thinking skills
(a method of thinking that involves identifying a claim or assumption
and deciding if it is true or false) a person is able to effectively pull out
small details to form greater assumptions about the material.
Some researchers conduct analytical research to find supporting
evidence to current research being done in order to make the work
more reliable. Other researchers conduct analytical research to form
new ideas about the topic being studied. Analytical research is
conducted in a variety of ways including literary research, public
opinion, scientific trials and Meta-analysis
 Empirical Research
Empirical research relies on experience or observation alone,
often without due regard for system and theory. It is data-based
research, coming up with conclusions which are capable of being
verified by observation or experiment. We can also call it as
42
experimental type of research.
In such a research it is necessary to get at facts first-hand, at their
source, and actively to go about doing certain things to stimulate the
production of desired information. In such a research, the researcher
must first provide himself with a working hypothesis or guess as to the
probable results. He then works to get enough facts (data) to prove or
disprove his hypothesis He then sets up experimental designs which
he thinks will manipulate the persons or the materials concerned so as
to bring forth the desired information.
Such research is thus characterized by the experimenter's control
over the variables under study and his deliberate manipulation of one
of them to study its effects. Empirical research is appropriate when
proof is sought that certain variables affect other variables in some
way.
 Quantitative vs. Qualitative
Quantitative research is based on the measurement of quantity
or amount. It is applicable to phenomena that can be expressed in
terms of quantity. Qualitative research, on the other hand, is concerned
with qualitative phenomenon. i.e., phenomena relating to or involving
quality or kind. For instance, when we are interested in investigating
the reasons for human behavior.
7. Stages in Research Process
 Formulating t h e Research Problem
There are two types o f research p r o b l e m , those w h i c h
r e l a t e to states of nature and those which relate to relationships
between variables. At the very outset the researcher must single
out the problem he wants to study, i.o., he must decide the
general area of i n terest or aspect of a subject-matter that be

43
would l ike to inquire into. Initially the problem may be stated
in a broad general and then the ambi- guities, if any, relat ing to
the problem be resolved. Then, the feasi- bility of a particular
solution has to be considered before a working formulation of
foe problem can be set up. The formulation o f a general topic
into a specific research problem, thus, constitutes the first step in a
scientific enquiry.
 Extensive literature Survey
Once the problem is formulated, a brief summary of it should
be written down. It is compulsory for a research worker writing a
thesis for a Ph.D degree to write a synopsis of the topic and submit it
to the necessary Committee or the Research Board for obtaining the
latter's approval. At this juncture the researcher should undertake
extens1w literature survey connected with the problem. For t hi
purpose, the abstract ng and indexing journals and published or un
published h1bliograph1es are the first place to go to. Academic
journals. confe1cnce proceedings, government report$. books. etc.
must be tapped depending on the nature of the problem. In this
process, it should be remembered that one source will lead to another.
The earlier studies, if any, which are similar to the study in hand
should be carefully studied. A good library will bearcat help to the
researcher at this stage.
 Development in working hypotheses
After extensive literature survey, researcher should state 10 clear
terms the working hypothesis or hypotheses. in order to draw out and test
its logical or empirical consequences. As such the manner in which
research hypotheses are developed ia particularly important since they
provide the focal point for research. They also affect the manner in which

44
tests must be conducted in the analysis of data and indirectly the quality of
data which is required for the analysis. In most types of research, the
development of working hypothesis plays an important role. Hypothesis
should be very specific and limited to the piece of research in hand
because it has to be tested. The role of the hypothesis is to guide the
researcher by delimiting the area of research and to keep him on the
ript track. It sharpens bis thinking and focuses attention on the more
important facets of the problem. It also indicates the type of data
required and the type of methods of data analysis to be used.
 Preparing the Research Design:
The research problem having been formulated in clear cut terms,
the researcher will be required There are several research designs,
such as, experimental and non-experimental hypothesis test mg.
Experimental designs can be either informal designs !such as
before-and-after without control, after-only with control, before-
and- after' control) or formal designs (such as completely
randomized design, randomized block design, La tin square
design.
consideration the nature of the inquiry and other related
factors.
 Collecting the Data
In dealing with any real-life problem it is often found that
data at band are inadequate, and hence, it becomes necessary to
collect data that are appropriate. There are several ways of
collecting the appropriate data which differ considerably in
context of money costs. time and other resources at the disposal
of the researcher.

45
 Objective of the Study:

To know about perceptual mapping of internet banking users.

To study the reason behind the cyber crime in banks.

To analyse the customer awareness

To know the factors effecting e-banking based on cyber crime.

 Scope of the Study:

The study is to analyse about the persons affected due to cyber


crime while using their net banking and it will be help full for the
banks to rectify the errors in future

period of time. The data was collected in Erode area.

 Research Methodology :

Research Design:

The researcher was concerned mainly with descriptive


research design. The

study was conducted in order to find out the perception of customers in


Erode.

Sampling Plan:

One of the main elements in the research design is


sampling plan which is further divided into sampling unit, sampling
size, sampling type.

46
CHAPTER-3

REVIEW OF LITERATURE

Banking in India originated in the first decade of 18th century. The


first banks were The General Bank of India, which started in 1786, and
Bank of Hindustan, both of which are now defunct. The oldest bank in
existence in India is the State Bank of India, which originated in the "The
Bank of Bengal" in Calcutta in June 1806. This was one of the three
presidency banks, the other two being the Bank of Bombay and the Bank
of Madras. The presidency banks were established under charters from
the British East India Company. They merged in 1925 to form the
Imperial Bank of India, which, upon India's independence, became the
State Bank of India.

For many years the Presidency banks acted as quasi-central banks, as did
their successors. The Reserve Bank of India formally took on the
responsibility of regulating the Indian banking sector from 1935. After
India's independence in1947, the Reserve Bank was nationalized and
given broader powers

1. Limbore Nilesh . V and Mane Baban . S

A STUDY OF BANKING SECTOR IN INDIA AND OVERVIEW OF


PERFORMANCE OF INDIANBANKS WITH REFERENCE TO NET
INTEREST MARGIN AND MARKET CAPITALIZATION OF BANKS

Abstract:

Finance and banking is the life blood of trade, commerce and industry.
Now-a- days, banking sector acts as the backbone of modern business
Development of any country mainly depends upon the banking system. A
47
bank is a financial institution which deals with deposits and advances and
other related services. It receives money from those who want to save in
the form of deposits and it lends money to those who need it. The
banking is one of the most essential and important parts of the human life
In current faster lifestyle peoples may not do proper transitions without
developing the proper bank network. The banking System in India is
dominated by nationalized banks network. The banking System in
India is dominated by nationalized banks. The performance of the
banking sector is more closely linked to the economy than perhaps that of
any other sector. The growth of the Indian economy is estimated to have
slowed down significantly.

KEY WORDS :

Banking System, Banking, Indian Economy, Economic Slowdown.

INTRODUCTION

Banks receive deposits from public and also borrow money from other
sources for raising Working Capital Funds. They have to pay cost by way
of interest on the funds raised. To recover this cost and to meet the
administrative and other expenses as also to earn profit, banks have to
utilize the working capital funds by either granting advances or making
investments. Thus working capital funds, which are Banks liabilities, get
converted into assets. As we have already seen although a bank's earnings
accrue only from advances and investments it has to hold “ Cash in
Hand” or “Balances with other banks in Current Accounts” and also
invest some amounts in premises, furniture, fixtures and other assets
which are essential tools for its trade. These assets do not generate any

48
income for the bank on the other hand depreciation has to be provided
taking into account their 'ware and tare'

IMPORTANCE OR NEED OF THE STUDY

Before the establishment of banks, the financial activities were handled


by money lenders and individuals. At that time the interest rates were
very high. Again there were no security of public savings and no
uniformity regarding loans. So as to overcome such problems the
organized banking sector was established, which was fully regulated by
the government. The organized banking sector works within the financial
system to provide loans, accept deposits and provide other services to
their customers. The following functions of the bank explain the need of
the bank and its importance:

CONCLUSIONS

Today the banking sector in India is fairly mature in terms of


supply, Today the banking sector in India is fairly mature in
terms of supply, range and reach. As far as private sector and
foreign banks are concerned the reach in, rural India still
remains a challenge A growing economy like India requires a
right blend of risk capital and long term resources for corporate
to choose an appropriate mix of debt and equity, particularly for
infrastructure projects which is the need of the day. A well
functioning domestic capital market is also necessary for the
banking sector to raise capital and support growth and also have
suitable capital adequacy ratio to mitigate risk. Bank
investments are also showing an increasing trend. After
49
researching banking sector researcher found that different
problems are increasing to banking sector because of the money
market has always down.

LIMITATIONS OF THE STUDY

study or research work in the organization. Therefore, get the research


done in the organization itself was very difficult. Limited knowledge
about the bank in the initial stages. Branch manager was reluctant for
giving financial data of the bank The analysis and interpretation are based
on secondary data contained in the published annual reports of the Indian
banks for the study period Due the Difficulty in data collection.Generally
the organization does not allow outsiders to conduct any limited time
available at the disposable, the study has been confined for a period of 5
years(2009-2013).

2. Dr. M. Imran Siddique, Sana Rehman :

Impact of Electronic crime in Indian Banking


Sector

Abstract -

The purpose of this paper is to develop a conceptual framework


concerning mainly on the role of Electronic crime in the Indian
Banking sector. One of the most important aspect in the Indian
Banking sector is to make banking transactions free from Electronic
crime. The Indian Banking system is itself opens to various crimes
when it is connected to a network. The purpose of this study is to
represent a conceptual framework of the basic crimes occurred in
banks- namely ATM frauds, Money Laundering and Credit Card Fraud

50
The study is a conceptual paper that indicates one of the important
electronic crimes in banks. Security

fears exist in the minds of customers, some particular

concerned are the threats of pharming, phishing, enticed leak of


personal information like Identity thefts,

pharming etc.

The study found that Electronic crime can be reduced from the
banking transactions by applying the updated technology and
appointing reliable officers and devices. This paper is an attempt to
examine the Effects

of Electronic crime in the Indian banking


sector.

Statement of the Problem

The concept of Electronic Crime is a vital aspect. Since new


information is available in an unbiased manner it is often not possible to
detect crime on the basis of that information. In the paper, researchers
make an attempt to study the Electronic crimes and major crimes of
Indian banking sector. In the present globalize scenario, Information
Technology is the factor responsible of further growth and development
in the Indian banking sector. In this speedy world, customers often feel
insecure and reluctant about there banking transactions especially in e-
banking or online banking. Technology has emerged as the lifeblood in
today Indian Banking sector whether private and public sector banks.
Presently, banking sector primarily focus on customer satisfaction the

51
fulfillment of their need and satisfaction in most effective manner.
With the introduction of

„Electronics‟ in the banking system several problem are emerged as

Hacking and Stealing of data


Failure of ATMs
Money laundering
Credit card theft.
Electronic Crime – An Overview

Computers, Internet and other electronic medium are the


commanding information tools to make possible immediate exchange
and distribution of data,

images and materials. Information Technology brings growth and


development and its fraudulent practices are bitterly termed as cyber-
crime or computer crime, e-crime, hi-tech crime or Electronic crime.
These all activities are directly associated with illegal activities in which
a computer or Internet network is working as a medium, source, tool,
target or place of a crime (Gregory.M ,2009).

Computer and Internet are the powerful in a row tools including


financial networks, communication systems, power stations, modern
automobiles and appliances. These computers networks records
withdrawals, deposits, purchases, telephone calls, usage of electricity,
medical treatments, driving patterns and lot more. Quite a few
innovative technologies are also extensively available which are
responsible for causing electronic crime. They are denial of service
attacks, viruses, unauthorized entry, information tampering, cyber
stalking, spamming, paper-jacking, dumping or phone-napping and

52
computer damage (Jain.A, 2005). The internet services and web
technologies in India is growing at a fast level. This increased growth
gave rise to new opportunities. These technologies have its own pros and
cons. The pros are the benefits and advantages but the cons are named
as „CYBER CRIME‟ or Electronic Crime‟. These crimes take place due
to certain loop-holes – which result in e-mail espionage, credit card
fraud, spams, software piracy etc (scribd.com).

Conclusion

Computers, Internet and other electronic medium are the commanding


information tools to make possible immediate exchange and distribution
of data,

images and materials. Information Technology brings growth and


development and its fraudulent practices are bitterly termed as cyber-
crime or computer crime, e-crime, hi-tech crime or Electronic crime.
These all activities are directly associated with illegal activities in which
a computer or Internet network is working as a medium, source, tool,
target or place of a crime (Gregory.M ,2009).

Computer and Internet are the powerful in a row tools including


financial networks, communication systems, power stations, modern
automobiles and appliances. These computers networks records
withdrawals, deposits, purchases, telephone calls, usage of electricity,
medical treatments, driving patterns and lot more. Quite a few
innovative technologies are also extensively available which are
responsible for causing electronic crime. They are denial of service
attacks, viruses, unauthorized entry, information tampering, cyber
stalking, spamming, paper-jacking, dumping or phone-napping and
computer damage (Jain.A, 2005). The internet services and web
53
technologies in India is growing at a fast level. This increased growth
gave rise to new opportunities. These technologies have its own pros and
cons. The pros are the benefits and advantages but the cons are named
as „CYBER CRIME‟ or Electronic Crime‟. These crimes take place due
to certain loop-holes – which result in e-mail espionage, credit card
fraud, spams, software piracy etc (scribd.com).

3. R. P. Manjula And Dr. R. Shunmughan:

Abstrct:

As the cases of cybercrime grow; there is a growing need to


prevent them. Cyberspace belongs to everyone. There should be
electronic surveillance which means

investigators tracking down hackers often want to monitor a cracker as


he breaks into a victim's computer system. The two basic laws
governing real-time electronic surveillance in other criminal
investigations also apply in this context, search warrants which means

that search warrants may be obtained to gain access to the premises


where the cracker is believed to have evidence of the crime. Such
evidence would include the computer used to commit the crime, as well
as the software used to gain unauthorized access and other evidence of
the crime. The main objective of the study is to analyse about the cyber
space and the customers perception about cyber crime. For this
purpose a sample of 120 was

collected from the respondents and percentage analysis and chi-square


were used as tools to analyse the data. The conclusion is that more
awareness programs can be conducted for the customers so that the
cyber crime can be reduced in future period of time.
54
Key Words: Cyber Crime, Electronic
Surveillance & Customers

Introduction:

Every individual has to approach the branch in person, to


withdraw cash or deposit a cheque or request a statement of
accounts. In true Internet banking, any inquiry or transaction is
processed online without any reference to the branch

(anywhere banking) at any time. Providing internet banking is


increasingly becoming a "need to have" than a "nice to have" service.
The net banking, thus, now is more of a norm rather than an exception
in many developed countries due to the fact that it is the cheapest way
of providing banking services.

Statement of Problem:

Cyber crime is a digital wrong doing. Any illegal activities


committed using a computer or by using the net is known as cyber
crime. Digital criminal acts are a variety

of wrong doings, which utilize machines and network systems for


criminal exercises. Cybercrime is a growing threat in the virtual world
because individuals and organizations are relying more on internet at an
increasing rate. The use of internet and other technologies have
enhanced the risk of attack from cyber criminals across the

globe. With the number of incidents of theft, phishing, computer


viruses, hacking, on the rise, there is a need to explore the cybercrime
scenario. The main problem of the study is to analyse about the
customers affected due to cyber crime in banking industry.
55
Objective of the Study:

To know about perceptual mapping of internet banking users.

To study the reason behind the cyber crime in banks.

To analyse the customer awareness

To know the factors effecting e-banking based on cyber crime.

Scope of the Study:

The study is to analyse about the persons affected due to cyber


crime while using their net banking and it will be help full for the
banks to rectify the errors in future

period of time. The data was collected in Erode area.

Research Methodology :

Research Design:

The researcher was concerned mainly with descriptive


research design. The

study was conducted in order to find out the perception of customers in


Erode.

Sampling Plan:

One of the main elements in the research design is


sampling plan which is further divided into sampling unit, sampling
size, sampling type.

Sampling Unit:

56
Sampling unit can be defined as the basic unit containing
the Customer perception towards cyber crime in public and private
banks in Erode.

Sampling Size:

In this research, the sample size amount to one hundred and


twenty, which are surveyed from customers who using the banks.

Sampling Type:

Convenience sampling was adapted in this research. It is a non-


probability sampling and it refers to selecting a sample based on
convenience and also, the statistical tools are applied viz.

Chi-square test

Percentage analysis

Interpretation:

The above table shows about the age of the respondents


were out of 120 respondents 39.2% are from the age group of 18-25,
30.8% are from the age group of

26-35, and 30% are from the age group of above 35. It shows
that most of the respondents are from the age group of 18-25 in our
survey.

The above table shows about the educational qualification of


the respondents were out of 120 respondents 2.5% are below 10th,
3.3% have completed their 10th,

57
51.7% have completed their higher secondary, 34.25 have completed
their UG, 5.8%

have completed their PG and 2.5% have completed other courses. It


shows that most of the respondents have completed their higher
secondary in our survey.

The above table shows about the place of living of the


respondents were out of

120 respondents 8.3% are from semi rural area, 33.3% are from rural
area, 50% are from urban area and 8.3% are form semi urban
area. It shows that most of the

respondents are from urban area in our survey.

The above table shows about occupational income of the


respondents were out of 120 respondents 4.2% are earning below
5000/ month, 23.3% are earning from

5000-10000/month, 31.7% are from 10000-20000/month, and


40.8% are earning above 20000 month. It shows that most of the
respondents are earning above 20000 month.

There is a significance relationship between age and level of


acceptance towards financial security and confidentiality provided by
the bank as the level of significance is

less than 0.05 at 0.000.

The above table shows about the weighted average of level of acceptance
of the respondents were the weight is high with credit card account
information of the bank is excellent with a weight of 31.40 and this
factor can be taken for decision making process of the study
58
Findings:

Maximum of the respondents are male in our survey. Most of


the respondents are from the age group of 18-25 in our survey.
Maximum of the respondents have

completed their higher secondary in our survey. Most of the


respondents are from urban area in our survey. Most of the respondents
agree for level of acceptance towards reliance on the bank for not
misusing their information. Maximum of the respondents neutral for
level of acceptance towards provision of financial security
and

confidentiality. Most of the respondents agree for level of acceptance


towards high reliability of existing systems. Maximum of the
respondents agree for level of acceptance towards true information
provided by bank and its associates. Most of the respondents are
neutral towards unique delivery of services provided by the bank.

Maximum of the respondents agree for level of acceptance


towards responsiveness towards/ problem handling & Support on
new system enhancement. Most of the

respondents are neural towards excellence of bank towards account


Balance. Maximum

of the respondents agree for level of acceptance towards


credit card account information of the bank. Most of the respondents
agree for level of acceptance towards

excellence on viewing digitals checks online. Maximum of the


respondents agree for

59
level of acceptance towards bank keeping its promises to deliver a
service on a specified date. Most of the respondents agree for level of
acceptance towards delivery of service at first attempt by the bank.
Maximum of the respondents agree for level of acceptance

towards finding solution for customer problems. Most of the


respondents agree for level of acceptance towards handling transaction
processing and customer details without errors.

Suggestions:

Treat all unsolicited emails (especially if you don’t know


the sender) with caution and never click on links in these emails to
visit unknown web sites - these could contain links to code that could
affect your computer. Don’t open attachments in emails that you’re not
expecting – they could contain a virus or code that would allow
someone to control your computer and don’t share files or programs
with other users and also don’t use free software unless you know it’s
reputable and safe.

Install anti-virus software, keep it up to date and run regular


security scans. Install the latest security updates for your computer
software, also known as patches. Install and learn how to use a
personal firewall.

Be careful not to share personal information such as address


information, bank details, telephone numbers, date of birth etc on social
networking sites and other websites that don’t use encryption to secure
the information you publish and don’t usethe same password on
different websites. Although this makes it more difficult tomanage

60
your online accounts it’s worth the effort. You can use password
management software and encryption to make this easier.

Conclusion:

The conclusion is that more awareness programs can be conducted for


the customers so that the cyber crime can be reduced in future period of
time.

Limitations of the Study:

The data was collected only with the customers of banks only in Erode.

The study could not be generalized due to the fact that researcher
adapted personal interview method. The study was limited to 3 months
as deep analysis about the project will not bemade. There may be bias in
collecting secondary data from various sources

4. Seema Goel : CYBER – CRIME : A GROWING THREAT


TO INDIAN BAKING SECTOR

ABSTRACT :

The banking industry has enjoyed the ride of emerging technology to


undergo significant changes. Banks are among the biggest
beneficiaries of the IT revolution and have largely adopted
Information Technology solutions for rendering the banking services
to their customers. The proliferation in online transactions mounting
on technologies like NEFT (National Electronic Fund Transfer),
RTGS (Real-time Gross Settlement Systems), ECS (Electronic
Clearing Service) and mobile transactions is a glimpse of the deep
rooted technology in banking and financial matters. With the swift

61
expansion of computer and internet technologies, new forms of
worldwide crimes known as “Cyber Crimes” has evolved in the
scene. Over a period of time, the nature and pattern of Cyber Crime
incidents have become more sophisticated and complex. Banks
and Financial Institutions remain the unabated targets of cyber
criminals in the last decade. Notably financial gain is still one of the
major motivations behind most cybercriminal activities and there is
little chance of this changing in the near future (Symantec, 2015).

This paper focusses on the technical aspects of various types of


cybercrimes concerning the banking and financial sector and their
related impacts. Additionally, it identifies the threat vectors
supporting these cybercrimes and develop measures to aid in the
combating the resulting cyber-attacks so that such attacks can be
better prevented in the future for enhanced security.

INTRODUCTION

The world is fast moving online with 46.1% of total world


population now connected to the web according to
internetlivestats.com (as on July 1, 2016). A remarkable instance of
this phenomena has been experienced in India with a notable
increase in the past three years i.e. 18% of the Indian population
online in 2014, 27% in

2015 and 34.8% in


2016 (as on July 1,
2016).

Today activities performed over the internet are not just limited to
technology freaks for technical uses, rather every second individual

62
is enjoying the easy internet availability and accessibility for day-to-
day purposes like banking, ecommerce, education, entertainment
and many more. Markedly, the wave of smartphones has

definitely acted as a catalyst to


this tremendous internet growth.

PROBLEM STATEMENT :

Today, web technology has emerged as an integral andindispensable


part ofthe Indian Banking sector. The enlargement of non-cash
based transactions around the globe has resulted in the steady
development of robust online payment systems.

While paper-based transactions cleared through cheques amounted


to Rs 85 lakh crore in FY15, paperless transactions, including retail
electronic transactions such as ECS (electronic clearing system)
debits and credits, electronic fund transfer, card transactions, mobile
transactions and prepaid instruments were to the tune of Rs 92 lakh
crore in the same

India has seen an upsurge in the volume of debit/credit cardsdue to


increased online acceptance through alternative channels, including
internet, ATM and mobile banking. In the days to come, this volume
will gain traction as the youth generationwill enter the economic
gyration.

The last few years have seen a significant increase in cybercrime


across all sectors and geographies. Given the proliferation of these
technological crime, organisations face a significant challenge to be
resistant against cyberattacks.As per Motive-wise Cases Reported
under Cyber Crimes during 2015 statistics by National Crime
63
Records Bureau, Greed / Financial Gain is the prime motivation for
committing Cyber Crimes.

This research attempts to analyse the concerns of cyber threats to the


banking sector by highlighting the underlying modus operandi. It
focusses on the preparedness of the financial organisations to deal
with incidents related to Cyber Crime.

CONCLUSION :

Indian customers are gradually preferringonline services because of


convenience, cost-saving and swiftness of online transactions. In
addition, financial institutions are tossing exciting offers to
customers with the vision of upturning the volume of cashless
transactions due to comparatively lower operational costs.

However, it can be concluded the cyber security measures placed by


financial institutions to curtail the curse of cybercrime are being out-
paced by dynamic technological landscape and improved expertise of
the intruders.

Amidst the continuous upliftment of the technology implemented


at the backend of the financial institution, some essential aspects
were overlooked that now demand huge attention.

Cybercrime comprises its own set of unique attractive features


that have gradually started outweighing the traditional crimes.
The extent of anonymity, global victim reach and swift results
are amongst the few that cybercriminals find most attractive.

Non-existent/Inadequate awareness campaigns further simplifies


the work of the cyber criminals. Unaware consumers are easily

64
deceived due to lack of insight into the latest attack
methodologies and identified preventive measures.

Additionally, traditional law enforcement policies, standards and


methods have been proved insufficient to cater to the evolving
cybercrimes and the IT Act of India has been marked down time and
again. On 13 April 2015, it was announced that the Ministry of
Home Affairs would form a committee of officials from the
Intelligence Bureau, Central Bureau of Investigation, National
Investigation Agency, Delhi Police and ministry itself to produce a

new legal framework.[6]

With the increasingly notable impact of the peril of cybercrime, it


has been continuously realised that local law enforcement agencies
do not have the required skills and resources to investigate incidents
related to

cybercrimes.Engagement of specialized cyber security professionals is a


step further to derive quicker and better

cybercrime investigation results.As estimated by NASSCOM‟s


Cybersecurity Task Force, India needs 1 million

trained cyber security professionals by 2025.

SAFEGUARDING THE INTERNET BANKING SECTOR

Financial organizations in today‟s date require well laid cyber


security teams with distinguished digital leaders. According to
PWC‟s year‟s global economic crime survey, 2016, too many
organisations are leaving first response to their IT teams without

65
adequate intervention or support from senior management and other
key players.

Specialized security teams with an upbeat mix of competent


professionals should be employed to take a proactive stance
when it comes to cybersecurity and privacy

Organizations in the BFSI sector need to undergo rigorous and


continuous cybercrime risk assessments to precisely assess,
identify and improve their present security posture by viewing the
organization ‟s policies from an attacker‟s perspective and
thusfacilitate enhanced security, operations, organizational
management.

Additionally, as long-term planning, cyber awareness need to


introduced at a fundamental level in educational institutions with
specialized security courses at graduate level to provide hands-on
training on the latest attack methodologies and mitigation
techniques using concepts like virtual cyber labs.

A comprehensive threat intelligence technology is essential to foster


organized and analysed threat information about potential or current
attacks from the organization‟s perspective. Alongside, threat
intelligence helps organizations in understanding the common threat
actors including latest vulnerabilities, exploits and advanced
persistent threats (APTs) campaigns.

On a national level, there is an urgent necessityof building


capabilityof inspecting critical infrastructure in critical industry
sectors before these are deployed in production to avoid any
malicious intruders by leveraging the trusted hardware/software.

66
Finally cooperation amongst Indian government sector and
industrial groups is bound to strengthen the legal framework for
cybersecurity with each blending in a different array of cyber risks
and preventive mechanisms.

REFERENCES

[1] Liu, J., Hebenton, B., &Jou, S. (n.d.). Handbook of Asian


Criminology.

[2] Kharouni, L. (2012). Automating Online Banking Fraud Automatic


Transfer System: The Latest Cybercrime

Toolkit Feature (Rep.).

[3] Threats to the Financial Services sector (Rep.). (2014).


PricewaterhouseCoopers.

[4] Net Losses: Estimating the Global Cost of Cybercrime (Rep.).


(2014). Intel Security.

[5] Murashbekov, О B. (2015). Methods for Cybercrime Fighting


Improvement in Developed Countries. Journal of Internet Banking
and Commerce.

67
CHAPTER – 4

DATA COLLECTION AND DATA ANALYSIS

Data Collection And Analysis Definition:

Data collection is the systematic approach to gathering and


measuring information from a variety of sources to get a complete and
accurate picture of an area of interest. Data collection enables a person or
organization to answer relevant questions, evaluate outcomes and make
predictions about future probabilities and trends.

 Data Collection

Cybercrime is criminal activity done using computers and the


Internet. This includes anything from downloading illegal music files
to stealing millions of dollars from online bank accounts. Cybercrime
also includes non-monetary offenses, such as creating and
distributing viruses on other computers or posting confidential business
information on the Internet. Cybercrime may also be referred to as
computer crime.

Perhaps the most prominent form of cybercrime is identity theft,


in which criminals use the Internet to steal personal information from
other users. Two of the most common ways this is done is through
phishing . Both of these methods lure users to fake websites (that
appear to be legitimate), where they are asked to enter personal
information. This includes login information, such as usernames and
passwords, phone numbers, addresses, credit card numbers, bank
account numbers, and other information criminals can use to "steal"
another person's identity. For this reason, it is smart to always check

68
the URL or Web address of a site to make sure it is legitimate before
entering your personal information.
Because cybercrime covers such a broad scope of criminal
activity, the examples above are only a few of the thousands of crimes
that are considered cybercrimes. While computers and the Internet
have made our lives easier in many ways, it is unfortunate that people
also use these technologies to take advantage of others. Therefore, it is
smart to protect yourself by using antivirus and spyware blocking
software and being careful where you enter your personal information.

For the purposes of this study, we are using the term ’cyber crime’ to
mean the illegal activities undertaken by criminals for financial gain.
access or attack information and services used by citizens, business and
the Government. Cyber criminals can range from foreign intelligence
services and large organized crime groups, to disreputable companies
and individuals or small groups of opportunists.
 Data Analysis

The banking sector is the most dominant sector of the financial system
in India. Significant progress has been made with respect to the
banking sector in the post liberalization period. The financial health of
the commercial banks has improved manifolds with respect to capital
adequacy, profitability, and asset quality and risk management.
Further, deregulation has opened new opportunities for banks to
increase revenue by diversifying into investment banking, insurance,
credit cards, depository services, mortgage, securitization, etc.
Liberalization has created a more competitive environment in the
banking sector

69
The Banking sector in India has always been one of the most
preferred avenues of employment. In the current decade, this has
emerged as a resurgent sector in the Indian economy. As per the
McKinsey report ‘India Banking 2010’, the banking sector index has
grown at a compounded annual rate of over 51 per cent since the year
2001, as compared to a 27 per cent growth in the market index during
the same period. It is projected that the sector has the potential to
account for over 7.7 per cent of GDP with over Rs.7,500 billion in
market cap, and to provide over 1.5 million jobs.
Today, banks have diversified their activities and are getting into
new products and services that include opportunities in credit cards,
consumer finance, wealth management, life and general insurance,
investment banking, mutual funds, pension fund regulation, stock
broking services, custodian services, private equity, etc. Further, most
of the leading Indian banks are going global, setting up offices in
foreign countries, by themselves or through their subsidiaries

Definition - What does Cybercrime mean?


Cybercrime is defined as a crime in which a computer is the
object of the crime (hacking, phishing, spamming) or is used as a tool
to commit an offence (child pornography, hate crimes). Cybercriminals
may use computer technology to access personal information, business
trade secrets, or use the Internet for exploitive or malicious purposes.
Criminals can also use computers for communication and document or
data storage. Criminals who perform these illegal activities are often
referred to as hackers.

Common types of cybercrime include online bank information


theft, identity theft, online predatory crimes and unauthorized computer
access. More serious crimes like cyberterrorism are also of significant
70
concern.
Cybercrime encompasses a wide range of activities, but these can
generally be broken into two categories:

1. Crimes that target computer networks or devices. These types of crimes


include viruses and denial-of-service attacks.
2. Crimes that use computer networks to advance other criminal
activities. These types of crimes include cyberstalking, phishing and
fraud or identity theft.

The FBI identifies cybercrime fugitives who have allegedly


committed bank fraud and trafficked counterfeit devices that access
personal electronic information. The FBI also provides information on
how to report cybercrimes, as well as useful intelligence information
about the latest cybercriminals.

Cybercrime is a term for any illegal activity that uses a computer as its
primary means of commission. The U.S. Department of Justice
expands the definition of cybercrime to include any illegal activity that
uses a computer for the storage of evidence.

The growing list of cybercrimes includes crimes that have been


made possible by computers, such as network intrusions and the
dissemination of computer viruses, as well as computer-based
variations of existing crimes, such as identity theft, stalking, terrorism.

You hear a lot about cybercrime, but what exactly is it? The simple
answer is, "It's complicated!"
Like traditional crime, cybercrime can take many shapes and can
occur nearly anytime or anyplace. Criminals committing cybercrime
use a number of methods, depending on their skill-set and their goal.
71
This should not be surprising: cybercrime is, after all, simply 'crime'
with some sort of 'computer' or 'cyber' aspect.

1. Cybercrime has surpassed illegal drug trafficking as a criminal


moneymaker
2. Every 3 seconds an identity is stolen.
3. Without security, your unprotected PC can become infected within four
minutes of connecting to the internet.

As you can see from these definitions, cybercrime can cover a


very wide range of attacks. Understanding this wide variation in types
of cybercrime is important as different types of cybercrime require
different approaches to improving your computer safety.

Cybercrime is a term for any illegal activity that uses a computer


as its primary means of commission. The U.S. Department of Justice
expands the definition of cybercrime to include any illegal activity that
uses a computer for the storage of evidence.

The growing list of cybercrimes includes crimes that have been


made possible by computers, such as network intrusions and the
dissemination of computer viruses, as well as computer-based
variations of existing crimes, such as identity theft, stalking.

As Internet usage is growing daily the world is coming closer. The


World Wide Web sounds like a vast phenomenon but surprisingly one
of its qualities is bringing the world closer making it a smaller place to
live in for its users. However, it has also managed to create another
problem for people who spend long hours browsing the Cyber World –
which is cyber crimes. While law enforcement agencies are trying to

72
tackle this problem, it is growing steadily and many people have
become victims of hacking, theft, identity theft and malicious software.
One of the best ways to avoid being a victim of cyber crimes and
protecting your sensitive information is by making use of impenetrable
security that uses a unified system of software and hardware to
authenticate any information that is sent or accessed over the Internet.
However, before you can understand more about this system, let us
find out more about cyber crimes

Cybercrime, also called computer crime, the use of a computers an


instrument to further illegal ends, such as committingfraud, trafficking
in child pornography and intellectual property, stealing identities, or
violating privacy. Cybercrime, especially through the Internet, has
grown in importance as the computer has become central to commerce,
entertainment, and government.

Because of the early and widespread adoption of computers and


the Internet in the United States, most of the earliest victims and
villains of cybercrime were Americans. By the 21st century, though,
hardly a hamlet remained anywhere in the world that had not been
touched by cybercrime of one sort or another.

Defining cybercrime

New technologies create new criminal opportunities but few new


types of crime. What distinguishes cybercrime from traditional
criminal activity? Obviously, one difference is the use of the digital
computer, but technology alone is insufficient for any distinction that
might exist between different realms of criminal activity. Criminals do
not need a computer to commit fraud, traffic in child pornography and
73
intellectual property, steal an identity, or violate someone’s privacy.
All those activities existed before the “cyber” prefix became
ubiquitous. Cybercrime, especially involving the Internet, represents an
extension of existing criminal behavior alongside some novel illegal
activities.

Most cybercrime is an attack on information about individuals,


corporations, or governments. Although the attacks do not take place
on a physical body, they do take place on the personal or corporate
virtual body, which is the set of informational attributes that define
people and institutions on the Internet. In other words, in the digital age
our virtual identities are essential elements of everyday life: we are a
bundle of numbers and identifiers in multiple
computer databases owned by governments and corporations.
Cybercrime highlights the centrality of networked computers in our
lives, as well as the fragility of such seemingly solid facts as individual
identity.

An important aspect of cybercrime is its nonlocal character: actions can


occur in jurisdictions separated by vast distances. This poses severe
problems for law enforcement since previously local or even national
crimes now require international cooperation. For example, if a person
accesses child pornography located on a computer in a country that
does not ban child pornography, is that individual committing a crime
in a nation where such materials are illegal? Where exactly does
cybercrime take place? Cyberspace is simply a richer version of the
space where a telephone conversation takes place, somewhere between
the two people having the conversation. As a planet-spanning network,
the Internet offers criminals multiple hiding places in the real world as
well as in the network itself. However, just as individuals walking on
74
the ground leave marks that a skilled tracker can follow, cybercriminals
leave clues as to their identity and location, despite their best efforts to
cover their tracks. In order to follow such clues across national
boundaries, though, international cybercrime treaties must be ratified.

The Department of Justice categorizes computer crime in three


ways:

1. The computer as a target - attacking the computers of others


(spreading viruses is an example).
2. The computer as a weapon - using a computer to commit
"traditional crime" that we see in the physical world (such as fraud
or illegal gambling).
3. The computer as an accessory - using a computer as a "fancy filing
cabinet" to store illegal or stolen information.
 REASONS FOR CYBER CRIME
According to the credit-checking firm Experian, online identity
theft increased 300 percent between 2010 and 2012 -- just one of the
areas of online crime that has grown in recent years. Cyber crime --
including everything from identify theft and hacking to virus
distribution and computer fraud -- is a complex area of criminology
and one that is receiving more attention as computers are prevalent in
our lives and handle more of our personal information. Like other
areas of crime, its causes are sometimes difficult to establish, but
certain trends in cyber crime are emerging.
1. Capacity to store data in comparatively small space-
The computer has unique characteristic of storing data in a very
small space. This affords to remove or derive information either
through physical or virtual medium makes it much more easier.
75
2. Easy to access-

The problem encountered in guarding a computer system from


unauthorised access is that there is every possibility of breach not due
to human error but due to the complex technology. By secretly
implanted logic bomb, key loggers that can steal access codes,
advanced voice recorders; retina imagers etc. that can fool biometric
systems and bypass firewalls can be utilized to get past many a security
system.

3 . Complex-

The computers work on operating systems and these operating systems


in turn are composed of millions of codes. Human mind is fallible and
it is not possible that there might not be a lapse at any stage. The cyber
criminals take advantage of these lacunas and penetrate into the
computer system.

4. Negligence-

Negligence is very closely connected with human conduct. It is


therefore very probable that while protecting the computer system there
might be any negligence, which in turn provides a cyber criminal to
gain access and control over the computer system.

5. Loss of evidence-

Loss of evidence is a very common & obvious problem as all the data
are routinely destroyed. Further collection of data outside the territorial
extent also paralyses this system of crime investigation

76
 MODE AND MANNER OF COMMITING CYBER CRIM

 Unauthorized access to computer systems or networks / Hacking-

This kind of offence is normally referred as hacking in the generic


sense. However the framers of the information technology act 2000
have no where used this term so to avoid any confusion we would not
interchangeably use the word hacking for ‘unauthorized access’ as the
latter has wide connotation.
 Theft of information contained in electronic form-
This includes information stored in computer hard disks, removable
storage media etc. Theft may be either by appropriating the data
physically or by tampering them through the virtual medium.
 Email bombing-

This kind of activity refers to sending large numbers of mail to the


victim, which may be an individual or a company or even mail servers
there by ultimately resulting into crashing.

Email bombing refers to sending a large number of emails to the victim


resulting in the victim’s email account (in case of an individual) or
mail servers (in case of a company or an email service provider)
crashing.

Email bombing is a type of denial-of-service attack. A denial ofservice


attack is one in which a flood of information requests is sent to a
server, bringing the system to its knees and making the server difficult
to access.

 TYPES OF CYBER CRIME

77
 Theft Of Telecommunications Services
The "phone phreakers" of three decades ago set a precedent for what
has become a major criminal industry. By gaining access to an
organizations telephone switchboard individuals or criminal
organizations can obtain access to dial-in/dial-out circuits and then
make their own calls or sell call time to third parties (Gold 1999).
Offenders may gain access to the switchboard by impersonating a
technician, by fraudulently obtaining an employee's access code, or by
using software available on the internet. Some sophisticated offenders
loop between PBX systems to evade detection. Additional forms of
service theft include capturing "calling card" details and on-selling
calls charged to the calling card account, and counterfeiting or illicit
reprogramming of stored value telephone cards.

 Communications In Furtherance Of Criminal Conspiracies

Just as legitimate organizations in the private and public sectors rely


upon information systems for communications and record keeping, so
too are the activities of criminal organizations enhanced by technology.

There is evidence of telecommunications equipment being used to


facilitate organized drug trafficking, gambling, prostitution, money
laundering, child pornography and trade in weapons (in those
jurisdictions where such activities are illegal). The use of encryption
technology may place criminal communications beyond the reach of
law enforcement.

By contrast, some of the less publicly visible traffic in child


pornography activity appears to entail a greater degree of organisation.

78
Although knowledge is confined to that conduct which has been the
target of successful police investigation, there appear to have been a
number of networks which extend cross-nationally, use sophisticated
technologies of concealment, and entail a significant degree of
coordination.

Illustrative of such activity was the Wonderland Club, an international


network with members in at least 14 nations ranging from Europe, to
North America, to Australia. Access to the group was password
protected, and content was encrypted. Police investigation of the
activity, codenamed "Operation Cathedral" resulted in approximately
100 arrests around the world, and the seizure of over 100,000 images in
September, 1998.

 TELECOMMUNICATIONS PIRACY

Digital technology permits perfect reproduction and easy dissemination


of print, graphics, sound, and multimedia combinations. The
temptation to reproduce copyrighted material for personal use, for sale
at a lower price, or indeed, for free distribution, has proven irresistable
to many.

This has caused considerable concern to owners of copyrighted


material. Each year, it has been estimated that losses of between US$15
and US$17 billion are sustained by industry by reason of copyright
infringement (United States, Information Infrastructure Task Force
1995, 131).

The Software Publishers Association has estimated that $7.4 billion


worth of software was lost to piracy in 1993 with $2 billion of that
being stolen from the Internet (Meyer and Underwood 1994).
79
Ryan (1998) puts the cost of foreign piracy to American industry at
more than $10 billion in 1996, including $1.8 billion in the film
industry, $1.2 billion in music, $3.8 billion in business application
software, and $690 million in book publishing.

According to the Straits Times (8/11/99) A copy of the most recent


James Bond Film The World is Not Enough, was available free on the
internet before its official release.

When creators of a work, in whatever medium, are unable to profit


from their creations, there can be a chilling effect on creative effort
generally, in addition to financial loss.

DISSEMINATION OF OFFENSIVE MATERIALS

Content considered by some to be objectionable exists in abundance in


cyberspace. This includes, among much else, sexually explicit
materials, racist propaganda, and instructions for the fabrication of
incendiary and explosive devices. Telecommunications systems can
also be used for harassing, threatening or intrusive communications,
from the traditional obscene telephone call to its contemporary
manifestation in "cyber-stalking", in which persistent messages are sent
to an unwilling recipient.

One man allegedly stole nude photographs of his former girlfriend and
her new boyfriend and posted them on the Internet, along with her
name, address and telephone number. The unfortunate couple, residents
of Kenosha, Wisconsin, received phone calls and e-mails from
strangers as far away as Denmark who said they had seen the photos on
the Internet. Investigations also revealed that the suspect was

80
maintaining records about the woman's movements and compiling
information about her family (Spice and Sink 1999).

In another case a rejected suitor posted invitations on the Internet under


the name of a 28-year-old woman, the would-be object of his
affections, that said that she had fantasies of rape and gang rape. He
then communicated via email with men who replied to the solicitations
and gave out personal information about the woman, including her
address, phone number, details of her physical appearance and how to
bypass her home security system. Strange men turned up at her home
on six different occasions and she received many obscene phone calls.
While the woman was not physically assaulted, she would not answer
the phone, was afraid to leave her home, and lost her job (Miller 1999;
Miller and Maharaj 1999).

One former university student in California used email to harass 5


female students in 1998. He bought information on the Internet about
the women using a professor's credit card and then sent 100 messages
including death threats, graphic sexual descriptions and references to
their daily activities. He apparently made the threats in response to
perceived teasing about his appearance (Associated Press 1999a).

Computer networks may also be used in furtherance of extortion. The


Sunday Times (London) reported in 1996 that over 40 financial
institutions in Britain and the United States had been attacked
electronically over the previous three years. In England, financial
institutions were reported to have paid significant amounts to
sophisticated computer criminals who threatened to wipe out computer
systems. (The Sunday Times, June 2, 1996). The article cited four
incidents between 1993 and 1995 in which a total of 42.5 million
81
Pounds Sterling were paid by senior executives of the organisations
concerned, who were convinced of the extortionists' capacity to crash
their computer systems (Denning 1999 233-4).

 ELECTRONIC MONEY LAUNDERING AND TAX


EVASION

For some time now, electronic funds transfers have assisted in


concealing and in moving the proceeds of crime. Emerging
technologies will greatly assist in concealing the origin of ill-gotten
gains. Legitimately derived income may also be more easily concealed
from taxation authorities. Large financial institutions will no longer be
the only ones with the ability to achieve electronic funds transfers
transiting numerous jurisdictions at the speed of light. The
development of informal banking institutions and parallel banking
systems may permit central bank supervision to be bypassed, but can
also facilitate the evasion of cash transaction reporting requirements in
those nations which have them. Traditional underground banks, which
have flourished in Asian countries for centuries, will enjoy even greater
capacity through the use of telecommunications.

With the emergence and proliferation of various technologies of


electronic commerce, one can easily envisage how traditional
countermeasures against money laundering and tax evasion may soon
be of limited value. I may soon be able to sell you a quantity of heroin,
in return for an untraceable transfer of stored value to my "smart-card",
which I then download anonymously to my account in a financial
institution situated in an overseas jurisdiction which protects the
privacy of banking clients. I can discreetly draw upon these funds as

82
and when I may require, downloading them back to my stored value
card (Wahlert 1996).

 ELECTRONIC VANDALISM, TERRORISM AND


EXTORTION

As never before, western industrial society is dependent upon complex


data processing and telecommunications systems. Damage to, or
interference with, any of these systems can lead to catastrophic
consequences. Whether motivated by curiosity or vindictiveness
electronic intruders cause inconvenience at best, and have the potential
for inflicting massive harm (Hundley and Anderson 1995).

While this potential has yet to be realized , a number of individuals and


protest groups have hacked the official web pages of various
governmental and commercial organizations. This may also operate in
reverse: early in 1999 an organized hacking incident was apparently
directed at a server which hosted the Internet domain for East Timor,
which at the time was seeking its independence from Indonesia (Creed
1999).

Defence planners around the world are investing substantially in


information warfare-- means of disrupting the information technology
infrastructure of defencesystems. Attempts were made to disrupt the
computer systems of the Sri Lankan Government (Associated Press
1998), and of the North Atlantic Treaty Organization during the 1999
bombing of Belgrade (BBC 1999). One case, which illustrates the
transnational reach of extortionists, involved a number of German
hackers who compromised the system of an Internet service provider in
South Florida, disabling eight of the ISPs ten servers. The offenders

83
obtained personal information and credit card details of 10,000
subscribers, and, communicating via electronic mail through one of the
compromised accounts, demanded that US$30,000 be delivered to a
mail drop in Germany. Co-operation between US and German
authorities resulted in the arrest of the extortionists (Bauer 1998).

More recently, an extortionist in Eastern Europe obtained the credit


card details of customers of a North American based on-line music
retailer, and published some on the Internet when the retailer refused to
comply with his demands.

 SALES AND INVESTMENT FRAUD

As electronic commerce becomes more prevalent, the application of


digital technology to fraudulent endeavourswill be that much greater.
The use of the telephone for fraudulent sales pitches, deceptive
charitable solicitations, or bogus investment overtures is increasingly
common. Cyberspace now abounds with a wide variety of investment
opportunities, from traditional securities such as stocks and bonds, to
more exotic opportunities such as coconut farming, the sale and
leaseback of automatic teller machines, and worldwide telephone
lotteries (Cella and Stark 1997 837-844). Indeed, the digital age has
been accompanied by unprecedented opportunities for misinformation.
Fraudsters now enjoy direct access to millions of prospective victims
around the world, instantaneously and at minimal cost.

Classic pyramid schemes and "Exciting, Low-Risk Investment


Opportunities" are not uncommon. The technology of the World Wide
Web is ideally suited to investment solicitations. In the words of two
SEC staff "At very little cost, and from the privacy of a basement

84
office or living room, the fraudster can produce a home page that looks
better and more sophisticated than that of a Fortune 500 company"
(Cella and Stark 1997, 822).

 ILLEGAL INTERCEPTION OF TELECOMMUNICATIONS

Developments in telecommunications provide new opportunities for


electronic eavesdropping. From activities as time-honouredas
surveillance of an unfaithful spouse, to the newest forms of political
and industrial espionage, telecommunications interception has
increasing applications. Here again, technological developments create
new vulnerabilities. The electromagnetic signals emitted by a computer
may themselves be intercepted. Cables may act as broadcast antennas.
Existing law does not prevent the remote monitoring of computer
radiation.

It has been reported that the notorious American hacker Kevin


Polusion was able to gain access to law enforcement and national
security wiretap data prior to his arrest in 1991 (Littman 1997). In
1995, hackers employed by a criminal organization attacked the
communications system of the Amsterdam Police. The hackers
succeeded in gaining police operational intelligence, and in disrupting
police communications.

 ELECTRONIC FUNDS TRANSFER FRAUD

Electronic funds transfer systems have begun to proliferate, and so has


the risk that such transactions may be intercepted and diverted. Valid
credit card numbers can be intercepted electronically, as well as
physically; the digital information stored on a card can be
counterfeited.
85
Of course, we don't need Willie Sutton to remind us that banks are
where they keep the money. In 1994, a Russian hacker Vladimir Levin,
operating from St Petersburg, accessed the computers of Citibank's
central wire transfer department, and transferred funds from large
corporate accounts to other accounts which had been opened by his
accomplices in The United States, the Netherlands, Finland, Germany,
and Israel. Officials from one of the corporate victims, located in
Argentina, notified the bank, and the suspect accounts, located in San
Francisco, were frozen. The accomplice was arrested. Another
accomplice was caught attempting to withdraw funds from an account
in Rotterdam. Although Russian law precluded Levin's extradition, he
was arrested during a visit to the United States and subsequently
imprisoned. (Denning 1999, 55).

The above forms of computer-related crime are not necessarily


mutually exclusive, and need not occur in isolation. Just as an armed
robber might steal an automobile to facilitate a quick getaway, so too
can one steal telecommunications services and use them for purposes
of vandalism, fraud, or in furtherance of a criminal conspiracy.1
Computer-related crime may be compound in nature, combining two or
more of the generic forms outlined above.

 Hacking
"Hacking" is a crime, which entails cracking systems and gaining
unauthorized access to the data stored in them.
Hacking in simple terms means an illegal intrusion into a computer
system and/or network. There is an equivalent term to hacking i.e.
cracking, but from Indian Laws perspective there is no difference
between the term hacking and cracking. Every act committed towards

86
breaking into a computer and/or network is hacking. Hackers write or
use ready-made computer programs to attack the target computer. They
possess the desire to destruct and they get the kick out of such
destruction. Some hackers hack for personal monetary gains, such as to
stealing the credit card information, transferring money from various
bank accounts to their own account followed by withdrawal of money.
They extort money from some corporate giant threatening him to
publish the stolen information which is critical in nature.

 Motive Behind The Crime

ADVENTURE

DESIRE TO
ACCESS
FORBIDDEN
INFORMATION

DESTRUCTIVE
MINDSET

WANTS TO
SELL
SECURITY
SERVICE

87
GREED

POWER

PUBLICITY

REVENGE

 Cyber Stalking

Cyber stalking refers to the use of the Internet, e-mail, or other


electronic communications devices to stalk another person. Stalking
generally involves harassing or threatening behavior that an individual
engages in repeatedly, such as following a person, appearing at a
person's home or place of business, making harassing phone calls,
leaving written messages orobjects, or vandalizing a person's property.
Under the Indian law, cyber-stalking is covered by section 66A of
the Information Technology Act. This section is titled "Punishment for
sending offensive messages through communication service, etc."

88
 CATEGORIES OF CYBER CRIME

INDIVIDUAL

CATEGORIS
OF
CYBER
CRIME

PROPERTY GOVERNMENT

Cyber crimes are broadly categorized into three categories, namely


crime against

1. Individual
2. Property
3. 3.Government

 PREVENTION OF CYBER CRIME

89
Prevention is always better than cure. It is always better to take
certain precaution while operating the net. A should make them his
part of cyber life. Saileshkumar Zarkar, technical advisor and network
security consultant to the Mumbai Police Cyber crime Cell, advocates
the 5P mantra for online security: Precaution, Prevention, Protection,
Preservation and Perseverance. A netizen should keep in mind the
following things-

1. To prevent cyber stalking avoid disclosing any information


pertaining to oneself. This is as good as disclosing your identity to
strangers in public place.

2. Always avoid sending any photograph online particularly to


strangers and chat friends as there have been incidents of misuse of the
photographs.

3. Always use latest and update anti- virus software to guard against
virus attacks

4. Always keep back up volumes so that one may not suffer data loss in
case of virus contamination

5. Never send your credit card number to any site that is not secured, to
guard against frauds.

6. Always keep a watch on the sites that your children are accessing to
prevent any kind of harassment or depravation in children.

7. It is better to use a security programme that gives control over the


cookies and send information back to the site as leaving the cookies
unguarded might prove fatal.

90
8. Web site owners should watch traffic and check any irregularity on
the site. Putting host-based intrusion detection devices on servers may
do this.

9.Use of firewalls may be beneficial.

91
CHAPTER-5

CONCLUSION AND SUGGESTION

 Conclusion :

This project reflects the present environment related to


technology,where it is changing very fast. by the time regulators come
up with preventive measures to protect customers from innovative
frauds, either the environment itself changes or new technology
emerges. this helps criminals to find new areas to commit the fraud.

the atm fraud and credit card is not the problems of banks alone. it is a
big threat and it requires a coordinated and cooperative action. this
project cyber crime in banking sector help to know about how to avoid
cyber crime or what are take necessary prevention for avoiding cyber
crime .

1. the present conceptual framework has provide a brief overview of


ongoing efforts to prevent and control high technology and computer
related crime highlighting general trends and development within
and outside the indian banking sector.
2. this study has described deeply a number of common electronic
crimes, identified in the specific areas of indian banking sector.
3. to defend the electronic crime, intrusion detection techniques should
be established.
4. . several techniques like tripwires, configuration checking tools and
other detection systems.
5. the rapid growth to global electronic crime and the complexity of its
investigation requires a global presence. presently, the measures
adopted to counter these crimes are not only predominantly.

92
6. it is absolutely imperative to increase cooperation between the
worlds the tools, which will help them effectively counter global
electronic crime.
 Suggestions :
2. For this, the following suggestions can be made Make sure with a
protection program that gives power over cookies that forward
information back to Web sites.
3. Make sure web servers in a row public site are physically separate

and individually confined from in-house corporate network.

3. Bring i n t o play latest a n t i -virus s o f t w a r e , operating systems,

Web browsers and email programs Place firewall and develop your

Content off line

4. Forward credit card information just to safe and sound web sites If
We site serves up active content from a database, consider putting
that database behind a second interface on your firewall, with tighter
access rules than the interface to your server

6. Systematically confirm out the site to business regularly

7. Don not forgets to verify out the site you are doing business
carefully don’t ambit credit card information to unfamiliar sites.

93
BIBLIOGRAPHY

 Reference Book
 P. P. Arya and Yesh Pal “Research Methodology”, in
Management Theory and Practice Published by DEEP
PUBLICATION PVT.LTD. New Delhi, 2011.
 Dr. G. K. Kalkoti “Research Methodology for Business”,
Publishers
 PVT. LTD. Mumbai, 2017
 Dr. G. K. Kalkoti “Research Methodology in Commerce”,
SHETH
 Publishers PVT. LTD. Mumbai, 2016
 Dr. Anurag Sharmsa & Dr. Vinod Kumar Joshi “Research
 Methodology”, Ritu Publication, JAIPUR 2015
 Websites :

www.cybercellMumbai.com

www.crime.hku.hk

www.businessdtheft.org

www.britannical.com

 News Paper :
1. Times Of India
2. Loksatta
3. Lokmat
4. Mumbai Chaufer

94
QUESTIONNAIRE

1. Have you ever been the recipient of an


e-mail you recognized as scam?
2. Have you ever received a threatening
Or harassing e-mail? If yes, what did you do about it?
3. Have you ever been asked to meet in?
Person with someone you only knew over
The Internet?
4. Have you ever been the victim of?
Identity theft?
5. Do you know anyone who has been the
Victim of identity theft?
6. Have you ever had a computer virus that
Caused significant damage to your computer or
Significant personal inconvenience?
7. Have you ever had personal information
Such as your social insurance number or bank account numbers stolen
Through:
- Someone hacking into your personal computer files OR
- Entering the information in a location you didn't realize
Was fraudulent or insecure?
8. Have you ever received e-mail soliciting child pornography?

9. Have you ever experienced any form of cybercrime?


Not covered here? If yes, please specify.
10. Do you feel you know enough about how cybercrime is
Committed to do a reasonable job protecting yourself?

95
96

You might also like