Others Page
Others Page
Others Page
Declaration
Acknowledgment
All praises are for Almighty Allah who has given me the opportunity and
ability to conduct this research. I would like covey any deepest gratitude and
thanks my supervisor, Mr. Sadiqul Islam, Assistant Professor, Department of
law, University of Rajshahi for supervising me in preparation of this
research monograph. And I would like to thank all the teacher, Department
of law for their kind and encouragement. I also grateful to my parents for
their support and inspiration.
After all, I covey hurtful thank all the respondents who help in preparing the
monograph by participating in this research process.
iii
Abstract
Cyber crime is known to all over the word as a crime committed through
internet. It is nowadays, becoming a serious matter of concern all over the
world. This research intents to describe explore the nature and types of cyber
crime by which the students of Rajshahi University are affected and try to
know the existing law to present cyber crime. For this purpose,
methodological triangulation (face to face interview and case study) has
been applied to collect pertinent data from 50 students of Rajshahi
University From (Hon’s 1st year-master). It is revealed from the study that
the respondent are victimized sometime by hacking pornography, computer
virus, spamming and it is continuously growing attention of the majority
students of Rajshahi University.
iv
TABLE OF CONTENTS
Declaration...............................................................................................i
Acknowledgment.....................................................................................ii
Abstract...................................................................................................iii
1.1 Introduction........................................................................................1
1.6 Justification........................................................................................3
1.11 Conclusion.......................................................................................5
v
2.1 Introduction........................................................................................6
2.2.1 Hacking...........................................................................................6
5.1 Introduction.......................................................................................24
Bibliography ...........................................................................................26