Skip to main content

Advertisement

Log in

Cybercrime and cybersecurity in India: causes, consequences and implications for the future

  • Published:
Crime, Law and Social Change Aims and scope Submit manuscript

Abstract

Cybercrime is rising rapidly in India. Developing economies such as India face unique cybercrime risks. This paper examines cybercrime and cybersecurity in India. The literature on which this paper draws is diverse, encompassing the work of economists, criminologists, institutionalists and international relations theorists. We develop a framework that delineates the relationships of formal and informal institutions, various causes of prosperity and poverty and international relations related aspects with cybercrime and cybersecurity and apply it to analyze the cybercrime and cybersecurity situations in India. The findings suggest that developmental, institutional and international relations issues are significant to cybercrime and cybersecurity in developing countries.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

Notes

  1. It is important to recognize that, as is the case of any underground economy [17], estimating the size of a country’s cybercrime industry and its ingredients such as reporting rate is a challenging task. Cybercrime-related studies and surveys are replete with methodological shortcomings, conceptual confusions, logical challenges and statistical problems [18].

References

  1. KPMG (2014).Cybercrime survey report 2014. Retrieve from www.kpmg.com/in.

  2. indolink.com (2012). India battles against cyber crime. Retrieved from http://www.indolink.com/displayArticleS.php?id=102112083833.

  3. Rid, T. (2012). Think again: cyberwar. Foreign Policy, 192, 1–11.

    Google Scholar 

  4. bbc.co.uk (2012). ‘Spam capital’ India arrests six in phishing probe. Retrieved from http://www.bbc.co.uk/news/technology-16392960.

  5. King, R. (2011). Cloud, mobile hacking more popular: Cisco. Retrieved from http://www.zdnet.com/cloud-mobile-hacking-more-popular-cisco-1339328060/.

  6. Aaron, G., & Rasmussen, R. (2012). Global phishing survey: Trends and domain name use in 2H2011, APWG, Retrieved from http://www.antiphishing.org/reports/APWG_GlobalPhishingSurvey_2H2011.pdf.

  7. Kshetri, N. (2010). The economics of click fraud. IEEE Security and Privacy, 8(3), 45–53.

    Article  Google Scholar 

  8. Internet Crime Complaint Center (2011). 2010 internet crime report. Retrieved from http://www.ic3.gov/media/annualreport/2010_ic3report.pdf.

  9. Kshetri, N. (2009). Positive externality, increasing returns and the rise in cybercrimes. Communications of the ACM, 52(12), 141–144.

    Article  Google Scholar 

  10. cio.de (2014). India’s biometric ID project is back on track. Retrieve from http://www.cio.de/index.cfm?pid=156&pk=2970283&p=1.

  11. Thomas, T.K. (2012). Govt will help fund buys of foreign firms with high-end cyber security tech. Retrieved from http://www.thehindubusinessline.com/industry-and-economy/info-tech/article3273658.ece?homepage=true&ref=wl_home.

  12. Chockalingam, K. (2003). Criminal victimization in four major cities in southern India. Forum on Crime and Society, 3(1/2), 117–126.

    Google Scholar 

  13. Holtfreter, K., VanSlyke, S., & Blomberg, T. G. (2005). Sociolegal change in consumer fraud: from victim-offender interactions to global networks. Crime Law and Social Change, 44, 251–275.

    Article  Google Scholar 

  14. Kumar, J. (2006). Determining jurisdiction in cyberspace. The Social Science Research Network (SSRN). http://papers.ssrn.com/sol3/papers.cfm?abstract_id=919261.

  15. Sharma, V. D. (2002). International crimes and universal jurisdiction. Indian Journal of International Law, 42(2), l39–l55.

    Google Scholar 

  16. Benson, M. L., Tamara D. M & John E. E. (2009). White-collar crime from an opportunity perspective. In S. S. Simpson & D. Weisburd (Eds.) The criminology of white-collar crime (pp 175–193). Heidelburg: Springer International Publishing.

  17. Naylor, R. T. (2005). The rise and fall of the underground economy. Brown Journal of World Affairs, 11(2), 131–143.

    MathSciNet  Google Scholar 

  18. Kshetri, N. (2013). Reliability, validity, comparability and practical utility of cybercrime-related data, metrics, and information. Information, 4(1), 117–123.

    Article  Google Scholar 

  19. Hindustan Times (2006). Securing the web.

  20. Aggarwal, V. (2009). Cyber crime’s rampant. Express Computer. Retrieved 27 October, 2009,from http://www.expresscomputeronline.com/20090803/market01.shtml.

  21. Narayan, V. (2010). Cyber criminals hit Esc key for 10 yrs.. Retrieved from http://timesofindia.indiatimes.com/city/mumbai/Cyber-criminals-hit-Esc-key-for-10-yrs/articleshow/6587847.cms.

  22. Hagan, J., & Parker, P. (1985). White-collar crime and punishment: class structure and legal sanctioning of securities violations. American Sociological Review, 50, 302–316.

    Article  Google Scholar 

  23. Pontell, H. N., Calavita, K., & Tillman, R. (1994). Corporate crime and criminal justice system capacity. Justice Quarterly, 11, 383–410.

    Article  Google Scholar 

  24. Shapiro, S. (1990). Collaring the crime, not the criminal: reconsidering the concept of white-collar crime. American Sociological Review, 55, 346–365.

    Article  Google Scholar 

  25. Tillman, R., Calavita, K., & Pontell, H. (1996). Criminalizing white-collar misconduct: determinants of prosecution in savings and loan fraud cases. Crime Law and Social Change, 26(1), 53–76.

    Article  Google Scholar 

  26. Kshetri, N. (2010). The global cybercrime industry: Economic, institutional and strategic perspectives. New York, Berlin and Heidelberg: Springer.

    Book  Google Scholar 

  27. Kshetri, N. (2010). Diffusion and effects of cybercrime in developing economies. Third World Quarterly, 31(7), 1057–1079.

    Article  Google Scholar 

  28. UNDP (2006). Country evaluation: Assessment of development results Honduras, New York: United Nations Development Programme Evaluation Office. Retrieved from http://web.undp.org/evaluation/documents/ADR/ADR_Reports/ADR_Honduras.pdf.

  29. Tanaka, V. (2010). The ‘informal sector’ and the political economy of development. Public Choice, 145(1/20), 295–317. 23.

    Article  Google Scholar 

  30. Kshetri, N. (2015). India’s cybersecurity landscape: the roles of the private sector and public-private partnership. IEEE Security and Privacy, 13(3), 16–23.

    Article  Google Scholar 

  31. Bures, O. (2013). Public-private partnerships in the fight against terrorism? Crime Law and Social Change, 60(4), 429–455.

    Article  Google Scholar 

  32. Salifu, A. (2008). Can corruption and economic crime be controlled in developing economies - and if so, is the cost worth it? Journal of Money Laundering Control, 11(3), 273–283.

    Article  Google Scholar 

  33. Granovetter, M. (1985). Economic action and social structure: The problem of embeddedness. American Journal of Sociology, 91(3), 481–510.

  34. Parto, S. (2005). Economic activity and institutions: Taking Stock, Journal of Economic Issues, 39(1), 21–52.

  35. Baumol, W. J. (1990). Entrepreneurship: Productive, unproductive, and destructive. Journal of Political Economy 98(5), 893–921.

  36. North, D. C. (1990). Institutions, institutional change and economic performance. Cambridge: Harvard University Press.

    Book  Google Scholar 

  37. Lewis, A. (1954). Economic development with unlimited supplies of labour. Manchester School of Economic and Social Studies, XXII (May 1954), 139–91.

  38. Chenery, H. B. (1975). The structuralist approach to development policy. The American Economic Review, 65(2), Papers and Proceedings of the Eighty-seventh Annual Meeting of the American Economic Association, 310–316.

  39. Acemoglu, D. (2005). Political economy of development and underdevelopment, Gaston Eyskens Lectures, Leuven, Department of Economics, Massachusetts Institute of Technology, Retrieved from http://economics.mit.edu/files/1064.

  40. Acemoglu, D., Johnson,S., & Robinson.A.J. (2005). Institutions as a fundamental cause of long-run Growth, Handbook of Economic Growth, IA. Edited by Philippe Aghion and Steven N. Durlauf Elsevier B.V., Retrieved from http://baselinescenario.files.wordpress.com/2010/01/institutions-as-a-fundamental-cause.pdf.

  41. de Laiglesia, J. R. (2006). Institutional bottlenecks for agricultural development a stock-taking exercise based on evidence from Sub-Saharan Africa. OECD Development Centre Working Paper No. 248, Research programme on: Policy Analyses on the Institutional Requirements for Advancing Peace and Development in Sub-Saharan Africa, Retrieved from http://www.oecd.org/dev/36309029.pdf.

  42. Greif, A. (1994). Cultural beliefs and the organization of society: a historical and theoretical reflection on collectivist and individualist societies. Journal of Political Economy, 102, 912–950.

    Article  Google Scholar 

  43. Jones, E. L. (1981). The European miracle: Environments, economies, and geopolitics in the history of Europe and Asia. New York: Cambridge University Press.

    Google Scholar 

  44. Andreas, P. (2011). Illicit globalization: myths, misconceptions, and historical lessons. Political Science Quarterly, 126(3), 403–425.

    Article  Google Scholar 

  45. Kshetri, N. (2005). Pattern of global cyber war and crime: a conceptual framework. Journal of International Management, 11(4), 541–562.

    Article  Google Scholar 

  46. Roland, G. (2004). Understanding institutional change: fast-moving and slow-moving institutions. Studies in Comparative International Development, 28(4), 109–131.

    Article  Google Scholar 

  47. Cohen, W., & Levinthal, D. (1990). Absorptive capacity: a new perspective on learning and innovation. Administrative Science Quarterly, 35, 128–152.

    Article  Google Scholar 

  48. Dahlman, L., & Nelson, R. (1995). Social absorption capability, national innovation systems and economic development. In B. H. Koo & D. H. Perkins (Eds.), Social capability and long-term growth (pp. 82–122). Basingstoke: Macmillan Press.

    Chapter  Google Scholar 

  49. Niosi, J. (2008). Technology, development and innovation systems: an introduction. Journal of Development Studies, 44(5), 613–621.

    Article  Google Scholar 

  50. Kim, S. H., Wang, Q., & Ullrich, J. B. (2012). A comparative study of cyberattacks. Communications of the ACM, 55(3), 66–73.

    Article  Google Scholar 

  51. Hawser, A. (2011). Hidden threat. Global Finance, 25(2), 44.

  52. Kirk, J. (2012). Microsoft finds new PCs in China preinstalled with malware. Retrieve from http://www.pcworld.com/article/262308/microsoft_finds_new_computers_in_china_preinstalled_with_malware.html.

  53. Benson, M., Cullen, F., & Maakestad, W. (1990). Local prosecutors and corporate crime. Crime and Delinquency, 36, 356–372.

    Article  Google Scholar 

  54. Andreas, P., & Price, R. (2001). From war fighting to crime fighting: transforming the American National Security State. International Studies Review, 3(3), 31–52.

    Article  Google Scholar 

  55. Collins, A. (2003). Security and Southeast Asia: domestic, regional, and global issues. Lynne Rienner Pub

  56. Wenping, H. (2007). The balancing act of China’s Africa policy. China Security, 3 (3), summer, 32–40.

  57. Kshetri, N. (2013). Cybercrime and cybersecurity in the global south. Houndmills, Basingstoke: Palgrave Macmillan.

    Book  Google Scholar 

  58. Kshetri, N. (2013). Cybercrimes in the former Soviet Union and Central and Eastern Europe: current status and key drivers. Crime Law and Social Change, 60(1), 39–65.

    Article  Google Scholar 

  59. Kshetri, N., & Dholakia, N. (2009). Professional and trade associations in a nascent and formative sector of a developing economy: a case study of the NASSCOM effect on the Indian offshoring industry. Journal of International Management, 15(2), 225–239.

    Article  Google Scholar 

  60. Oxley, J. E., & Yeung, B. (2001). E-commerce readiness: institutional environment and international competitiveness. Journal of International Business Studies, 32(4), 705–723.

    Article  Google Scholar 

  61. Sobel, A. C. (1999). State institutions, private incentives, global capital. Ann Arbor: University of Michigan Press.

    Book  Google Scholar 

  62. Lancaster, J. (2003). In India’s creaky court system, some wait decades for justice; 82- year-old man still fighting charges dating to 1963. The Washington Post 27.

  63. Edelman, L. B., & Suchman, M. C. (1997). The legal environments of organizations. Annual Review of Sociology, 23, 479–515.

    Article  Google Scholar 

  64. Greenwood, R., & Hinings, C. R. (1996). Understanding radical organizational change: bringing together the old and the new institutionalism. Academy of Management Review, 21(4), 1022–1054.

    Google Scholar 

  65. catindia.gov.in (2014). History, Retrieve September 22, 2014, Retrieve from http://catindia.gov.in/History.aspx. Cyber Appellate Tribunal, Government of India.

  66. Singh, S.R. (2014). India’s only cyber appellate tribunal defunct since 2011. Retrieve from http://www.hindustantimes.com/india-news/india-s-only-cyber-appellate-tribunal-defunct-since-2011/article1-1235073.aspx.

  67. Duggal, P. (2004). What’s wrong with our cyber laws? Retrieved from http://www.expresscomputeronline.com/20040705/newsanalysis01.shtml.

  68. Anand, J. (2011). Cybercrime up by 700% in Capital. Retrieved from http://www.hindustantimes.com/India-news/NewDelhi/Cyber-crime-up-by-700-in-Capital/Article1-766172.aspx.

  69. Nolen, S. (2012). India’s IT revolution doesn’t touch a government that runs on paper. The Globe and Mail (Canada), A1.

  70. indiatimes.com (2011b). Most Gurgaon IT, BPO companies victims of cybercrime: survey. Retrieved from http://timesofindia.indiatimes.com/city/gurgaon/Most-Gurgaon-IT-BPO-companies-victims-of-cybercrime-Survey/articleshow/10626059.cms.

  71. Rahman, F. (2012). Views: Tinker, tailor, soldier, cyber crook. Retrieved from http://www.livemint.com/2012/04/06111007/Views--Tinker-tailor-soldie.html?h=A1.

  72. timesofindia.com (2009). Nigerians held for internet fraud, May 28. Retrieved March 1, 2011 from http://articles.timesofindia.indiatimes.com/2009-05-28/kolkata/28212706_1_kolkata-police-prize-moneyracket/2.

  73. indiatimes.com (2011a). Two including Nigerian held for job fraud. Retrieved from http://articles.timesofindia.indiatimes.com/2011-02-16/gurgaon/28551786_1_nigerian-gang-job-racket-bank-account.

  74. Saha, T., & Srivastava, A. (2014). Indian women at risk in the cyber space: a conceptual model of reasons of victimization. International Journal of Cyber Criminology, 8(1), 57–67.

    Google Scholar 

  75. timesofindia.indiatimes.com (2013). Government releases national cyber security policy 2013. Retrieve from http://timesofindia.indiatimes.com/tech/it-services/Government-releases-National-Cyber-Security-Policy-2013/articleshow/20874965.cms.

  76. Doval, P. (2013). Govt orders security audit of IT infrastructure. Retrieve from http://timesofindia.indiatimes.com/tech/tech-news/Govt-orders-security-audit-of-IT-infrastructure/articleshow/38398644.cms.

  77. De Mooij, M. K. (1998). Global marketing and advertising: Understanding cultural paradoxes. CA: Sage.

    Google Scholar 

  78. The Economist. (2005). Business: busy signals; Indian call centres. The Economist, 376(8443), 66.

    Google Scholar 

  79. Mishra, B.R. (2010). Wipro unlikely to take fraud accused to court, business-standard.com. Retrieved March 1, 2011, from http://www.business-standard.com/india/news/wipro-unlikely-to-take-fraud-accused-to-court/386181/.

  80. Phukan, S. (2002). IT ethics in the Internet age: New dimensions. InSITE. Retrieved October 27,2005, from http://proceedings.informingscience.org/IS2002Proceedings/papers/phuka037iteth.pdf.

  81. Sawant, N. (2009).Virtually speaking, crime in the city on an upward spiral, Times of India. Retrieved from http://timesofindia.indiatimes.com/news/city/mumbai/Virtually-speaking-crime-in-the-city-on-an-upward-spiral/articleshow/5087668.cms, accessed 27 October 2009.

  82. PRLog (2011). India Plans to set-up state-of-the-art information technology institute to combat cybercrime: India requires 2.5 lakh cyber specialists to deal with the menace of cybercrime. Retrieved from http://www.prlog.org/11302019-india-plans-to-set-up-state-of-the-art-information-technology-institute-to-combat-cybercrime.html.

  83. Saraswathy, M. (2012). Wanted: ethical hackers. Retrieved from http://www.wsiltv.com/news/three-states/Protect-Yourself-from-Cyber-Crime-139126239.html.

  84. ciol.com (2012). Most Indians unaware of security solns: study. Retrieved from http://www.ciol.com/Infrastructure-Security/News-Reports/Most-Indians-unaware-of-security-solns-study/161905/0/.

  85. foxnews.com (2012). Indian lawmakers filmed ‘watching porn on phone during assembly’ resign. Retrieved from http://www.foxnews.com/world/2012/02/08/indian-lawmakers-filmed-watching-porn-on-phone-during-assembly-resign/.

  86. The World Bank Group (2014). Researchers in R&D (per million people). Retrieve from http://data.worldbank.org/indicator/SP.POP.SCIE.RD.P6?page=2.

  87. rediff.com (2008). Researchers? Only 156 per million in India. Retrieved from http://www.rediff.com/money/2008/mar/12rnd.htm.

  88. Economictimes (2005). R&D in India: The curtain rises, the play has begun, August 24. Retrived August 11, 2011 from: http://economictimes.indiatimes.com/rd-in-india-the-curtain-rises-the-play-hasbegun/articleshow/1207024.cms.

  89. Shaftel, D., & Narayan, K. (2012). Call centre fraud opens new frontier in cybercrime. Retrieved September 1, 2016, from http://www.livemint.com/2012/02/26225530/Call-centre-fraud-opens-new-fr.html.

  90. Gardner, T. (2012). Indian call centres selling your credit card details and medical records for just 2p. Retrieved from http://www.dailymail.co.uk/news/article-2116649/Indian-centres-selling-YOUR-credit-card-details-medical-records-just-2p.html.

  91. Economist.com (2007). Imitate or die. http://www.economist.com/node/10053234/ .

  92. Robinson, G. E. (1998). Elite cohesion, regime succession and political instability. Syria Middle East Policy, 5(4), 159–179.

    Article  Google Scholar 

  93. Kshetri, N. (2011). Cloud computing in the global south: drivers, effects and policy measures. Third World Quarterly, 32(6), 995–1012.

    Article  Google Scholar 

  94. Borland, J . (2010). A Four-Day Dive Into Stuxnet’s Heart, December 27. Retrieved 1 September 2016 from https://www.wired.com/2010/12/a-four-day-dive-into-stuxnets-heart/.

  95. Halsey, M. (2011). How is IE6 contributing to China’s growing Cyber-Crimewave? Retrieved from http://www.windows7news.com/2011/12/30/ie6-contributing-chinas-growing-cybercrimewave/.

  96. Greenberg, A. (2007). The top countries for cybercrime. Forbes.com. Retrieved April 9, 2008, from http://www.forbes.com/2007/07/13/cybercrime-world-regions-tech-cx_ag_0716cybercrime.html.

  97. Arnott, S. (2008). Cyber crime stays one step ahead. Retrieved October 27,2009, from http://www.independent.co.uk/news/business/analysis-and-features/cyber-crime-stays-one-step-ahead-799395.html.

  98. Paget, F. (2010). McAfee helps FTC, FBI in case against ‘scareware’ outfit. Retrieved January 26, 2011, from http://blogs.mcafee.com/mcafee-labs/mcafee-helps-ftc-fbi-in-case-against-scareware-outfit.

  99. Fest, G. (2005). Offshoring: feds take fresh look at India BPOs; major theft has raised more than a few eyebrows. Bank Technology News, 18(9), 1.

    Google Scholar 

  100. Engardio, P., Puliyenthuruthel, J., & Kripalani, M. (2004). Fortress India? Business Week, 3896, 42–43.

    Google Scholar 

  101. King, A. A., & Lenox, M. J. (2000). Industry self-regulation without sanctions: the chemical industry’s responsible care program. Academy of Management Journal, 43(4), 698–716.

    Article  Google Scholar 

  102. Vinogradova, E. (2006). Working around the state: contract enforcement in the Russian context. Socio-Economic Review, 4(3), 447–482.

    Article  MathSciNet  Google Scholar 

  103. Walzer, M. (1993). Between nation and world: welcome to some new ideologies. The Economist, 328(7828), 49–52. September 11.

    Google Scholar 

  104. Greenwood, R., Suddaby, R., & Hinings, C. R. (2002). Theorizing change: the role of professional associations in the transformation of institutionalized fields. Academy of Management Journal, 45(1), 58–80.

    Article  Google Scholar 

  105. Marshall, R. S., Cordano, M., & Silverman, M. (2005). Exploring individual and institutional drivers of proactive environmentalism in the US wine industry. Business Strategy and the Environment, 14(2), 92–109.

    Article  Google Scholar 

  106. Ahlstrom, D., & Bruton, G. D. (2001). Learning from successful local private firms in China: establishing legitimacy. Academy of Management Executive, 15(4), 72–83.

    Article  Google Scholar 

  107. Scott, W.R. (1992). Organizations: Rational, natural and open systems. Prentice Hall.

  108. Trombly, M. (2006). India tightens security. Insurance Networking & Data Management, 10(1), 9.

    Google Scholar 

  109. Dickson, M., BeShers, R., & Gupta, V. (2004). The impact of societal culture and industry on organizational culture: Theoretical explanations. In R. J. House, P. J. Hanges, M. Javidan, P. W. Dorfman, & V. Gupta (Eds.), Culture, leadership, and organizations: the GLOBE study of 62 societies. Thousand Oaks: Sage Publications.

    Google Scholar 

  110. Lawrence, T. B., Winn, M. I., & Jennings, P. D. (2001). The temporal dynamics of institutionalization. Academy of Management Review, 26(4), 624–644.

    Google Scholar 

  111. Audretsch, D., & Stephan, P. (1996). Company scientist locational links: the case of biotechnology. American Economic Review, 30, 641–652.

    Google Scholar 

  112. Feldman, M. (1999). The new economics of innovation, spillovers and agglomeration: a review of empirical studies. Economics of Innovation and New Technology, 8, 5–25.

    Article  Google Scholar 

  113. Niosi, J., & Banic, M. (2005). The evolution and performance of biotechnology regional systems of innovation. Cambridge Journal of Economics, 29, 343–357.

    Article  Google Scholar 

  114. Rao, H.S. (2006). Outsourcing thriving in Britain despite India bashing. Retrieve from http://www.rediff.com/money/2006/oct/07bpo.htm.

  115. AFX News (2006). India could process 30 pct of US bank transactions by 2010 - report. Retrieve from http://www.finanznachrichten.de/nachrichten-2006-09/7050839-india-could-process-30-pct-of-us-bank-transactions-by-2010-report-020.htm.

  116. Hazelwood, S. E., Hazelwood, A. C., & Cook, E. D. (2005). Possibilities and pitfalls of outsourcing. Healthcare Financial Management, 59(10), 44–48.

    PubMed  Google Scholar 

  117. Das, G. (2011). Panel to advise govt, IT cos on cloud security on the cards. Retrieved from http://www.financialexpress.com/news/Panel-to-advise-govt--IT-cos-on-cloud-security-on-the-cards/809960/.

  118. Schwartz, K. D. (2005). The background-check challenge. InformationWeek, 59–61.

  119. Indo-Asian News Service (2006). Nasscom to set up self-regulatory organization. September 26.

  120. Cone, E. (2005). Is offshore BPO running aground? CIO Insight, 53, 22.

    Google Scholar 

  121. COMMWEB (2007). India will train police to catch cybercriminals.

  122. DSCI (2014). Cyber Labs. Retrieve from http://www.dsci.in/cyber-labs.

  123. Tribuneindia.com (2005). Outsourcing crime call centre expose can wreak havoc, June 25. Retrieved from http://www.tribuneindia.com/2005/20050625/edit.htm.

  124. Jaishankar, K. (2008). Identity related crime in the cyberspace: examining phishing and its impact. International Journal of Cyber Criminology, 2(1), 10–15.

    Google Scholar 

  125. Segal, A. (2012). Chinese computer games. Foreign Affairs, 91(2), 14–20. 7.

    Google Scholar 

  126. dhs.gov (2011). United States and India Sign Cybersecurity Agreement. Retrieved from http://www.dhs.gov/ynews/releases/20110719-us-india-cybersecurity-agreement.shtm.

  127. Bhaumik, A. (2012). India, allies to combat cybercrime. Retrieved from http://www.deccanherald.com/content/249937/india-allies-combat-cybercrime.html.

  128. Riley, M. (2011). Stolen Credit Cards Go for $3.50 at Amazon-Like Online Bazaar. Retrieved on 1 September 2016 from http://www.bloomberg.com/news/articles/2011-12-20/stolen-creditcards-go-for-3-50-each-at-online-bazaar-that-mimics-amazon.

  129. Trend Micro Incorporated (2011). Trend micro third quarter threat report: Google and oracle surpass microsoft in most vulnerabilities. Retrieved from http://www.sacbee.com/2011/11/14/4053420/trend-micro-third-quarter-threat.html.

  130. Vidyasagar, N. (2004). India’s secret army of online ad ‘clickers’. Retrieved October 27,2008, from http://timesofindia.indiatimes.com/articleshow/msid-654822,curpg-1.cms.

  131. Kehaulani, S. (2006). ‘Click Fraud’ threatens foundation of web ads; Google faces another lawsuit by businesses claiming overcharges. The Washington Post, A.1.

  132. Frankel, R. (2006). Associations in China and India: An overview, European Society of Association Executives. Retrieved from http://www.esae.org/articles/2006_07_004.pdf.

  133. Tandon, N. (2007). Secondary victimization of children by the media: an analysis of perceptions of victims and journalists. International Journal of Criminal Justice Sciences, 2(2), 119–135.

    MathSciNet  Google Scholar 

  134. Halder, D., & Jaishankar, K. (2011). Cyber gender harassment and secondary victimization: a comparative analysis of US, UK and India. Victims and Offenders, 6(4), 386–398.

    Article  Google Scholar 

  135. Halder, D., & Jaishankar, K. (2015). Irrational coping theory and positive criminology: A frame work to protect victims of cyber crime. In N. Ronel & D. Segev (Eds.), Positive criminology (pp. 276–291).

  136. Wiesenfeld, B. M., Wurthmann, K. A., & Hambrick, D. C. (2008). The stigmatization and devaluation of elites associated with corporate failures: a process model. Academy of Management Review, 33(1), 231–251.

    Article  Google Scholar 

  137. Hettigei, N.T. (2005). The Auditor’s role in IT development projects. Retrieve from http://www.isaca.org/Journal/Past-Issues/2005/Volume-4/Pages/The-Auditors-Role-in-IT-Development-Projects1.aspx.

  138. Bradbury, D. (2013). India’s Cybersecurity challenge. Retrieve from http://www.infosecurity-magazine.com/view/34549/indias-cybersecurity-challenge/.

Download references

Acknowledgments

The author thanks four anonymous CRIS reviewers for their insightful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nir Kshetri.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kshetri, N. Cybercrime and cybersecurity in India: causes, consequences and implications for the future. Crime Law Soc Change 66, 313–338 (2016). https://doi.org/10.1007/s10611-016-9629-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10611-016-9629-3

Keywords

Navigation