Others Page

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

i

Declaration

I am, the researcher, is aware of the rules and regulations of University of


Rajshahi relating to the preparation, submission, retention and use of a
research monograph. I also declare that this research monograph entitled
“Nature and Effect of cyber crime: A case study” at Rajshahi University is
solely the outcome of my own efforts and research for the partial fulfillment
of LL.B. (Hons) Part-I, Examination 2021. No part of this research
monograph in any form has been submitted before. I also hereby declare that
I myself have made the research without any plagiarism from any other else.

Roll No: 2112016207


Session: 2020-2021
Year: 1st
LL.B (Hons), Part-1, 2021
Department of Law
University of Rajshahi
ii

Acknowledgment

All praises are for Almighty Allah who has given me the opportunity and
ability to conduct this research. I would like covey any deepest gratitude and
thanks my supervisor, Mr. Sadiqul Islam, Assistant Professor, Department of
law, University of Rajshahi for supervising me in preparation of this
research monograph. And I would like to thank all the teacher, Department
of law for their kind and encouragement. I also grateful to my parents for
their support and inspiration.

After all, I covey hurtful thank all the respondents who help in preparing the
monograph by participating in this research process.
iii

Abstract

Cyber crime is known to all over the word as a crime committed through
internet. It is nowadays, becoming a serious matter of concern all over the
world. This research intents to describe explore the nature and types of cyber
crime by which the students of Rajshahi University are affected and try to
know the existing law to present cyber crime. For this purpose,
methodological triangulation (face to face interview and case study) has
been applied to collect pertinent data from 50 students of Rajshahi
University From (Hon’s 1st year-master). It is revealed from the study that
the respondent are victimized sometime by hacking pornography, computer
virus, spamming and it is continuously growing attention of the majority
students of Rajshahi University.
iv

TABLE OF CONTENTS

Declaration...............................................................................................i

Acknowledgment.....................................................................................ii

Abstract...................................................................................................iii

CHAPTER ONE: INTRODUCTION ...............................................1-5

1.1 Introduction........................................................................................1

1.2 Statement of the problem ..................................................................1

1.3 Objective of the research ...................................................................2

1.4 Research question .............................................................................2

1.5 Review of Literature .........................................................................3

1.6 Justification........................................................................................3

1.7 Scope of the research ........................................................................4

1.8 Limitation of the research .................................................................4

1.9 Methodology of the research.............................................................4

1.10 Chapter Outline................................................................................5

1.11 Conclusion.......................................................................................5
v

CHAPTER TWO: THE NATURE AND EFFECT OF CYBER CRIME


IN RAJSHAHI UNIVERSITY...........................................................6-14

2.1 Introduction........................................................................................6

2.2 Types of Cyber crime ........................................................................6

2.2.1 Hacking...........................................................................................6

2.2.2 Cyber stalking................................................................................. 7

2.2.3 Fraud ..............................................................................................7

2.2.4 Child Pornography .........................................................................8

2.2.5 Phishing ..........................................................................................8

2.3 Nature of cyber crime in Rajshahi University ..................................9

2.3.1 Findings and Discussion................................................................10

2.4 The effect of cyber crime upon the victim .......................................13

2.5 Conclusion .......................................................................................14

CHAPTER THREE: CYBER CRIME CASE STUDY IN RAJSHAHI


UNIVERSITY.....................................................................................15-20

3.1 Case Study-1:....................................................................................15

3.2 Case Study-2:....................................................................................17

3.3 Case Study-3: ...................................................................................18

3.4 Case Study-4:....................................................................................19

3.5 Case Study-5:....................................................................................20


vi

CHAPTER FOUR: THE EXISTING LAWS OF BANGLADESH OF


PREVENT CYBER CRIME.............................................................21-23

4.1 Introduction ......................................................................................21

4.2 Digital Security 2018 .......................................................................21

4.3 Pornography Act 2012 .....................................................................22

4.4 Bangladesh Telecommunication Act 2001 ......................................22

4.5 Penal Code 1860 ..............................................................................22

4.6 Conclusion .......................................................................................23

CHAPTER FIVE: CONCLUSION: SOME SHORTCOMINGS AND


RECOMMENDATIONS...................................................................24-24

5.1 Introduction.......................................................................................24

5.2 Some shortcomings on the basis of this research..............................24

5.3 Recommendations ............................................................................25

5.4 Conclusion .......................................................................................25

Bibliography ...........................................................................................26

You might also like