ICT approach to defuse the cybercriminal sedition dimension of Telangana movement
-
https://doi.org/10.14419/ijet.v7i3.29.19192 -
ICT Information and Communication Technologies, CGOT Criminal Government of Telangana, JNTUHJAC Jawaharlal Nehru Technological University Joint Action Committee. -
Abstract
Cybercrime refers to Internet usage involving any illegal activity. Cybercrimes are becoming galore throughout the length and breadth of the world owing to the increased Internet usage and the human capital involved in the usage. In India also, the same phenomenon is found as the nation has vast population. Undesirably, cybercrimes are percolating into some university academic environments. In our earlier work, we presented many facets of multiple cybercrimes in the JNTUH academic environment. The cybercrimes perpetrated, in the context of the Telangana Movement, w.r.t. the violations of State Emblem of India (Prevention of Improper Usage) Act 2005, u/s 66C-ITA2000-2008 were registered with FIRs. The cybercrime of sedition is not registered yet. Our research work explored in this regard. Under the cybercriminal Government of Telangana (CGoT) has been purportedly prevalent the JNTUHJAC, during 2011–2014 approx., as indicated in the website, http://jntuhjac.com, traceable through the cyber forensic web crawler tool wayback machine. Note worthily, the crime got registered against identity theft under Sec. 66-C under IT Act 2000-2008 whereas the complaint was against Sedition crime. The culprit website of JNTUHJAC organization under CGoT was operational in the JNTUH University before the enactment of Andhra Pradesh Reorganization Act 2014 and through that approx. 2000 registrations were obtained for the organizations. We present, in the case study, the many facets of the moot cybercrime issues related to the JNTUH University academic environment and how they are handled by means of the RTI Act 2005 for an empirical approach for impact on the law enforcement agencies to get alert and register the crime under sedition law violation in order to ensure that recurrence of such situations is prevented.
Â
Â
-
References
[1] http://www.hyderabadpolice.gov.in/Cybercrimes.html.
[3] https://sites.google.com/site/chandraksekharaiah/indiaagainst-corruption-jntu.
[4] http://www.rmlnlu.ac.in/webj/sedition.pdf.
[5] https://sites.google.com/site/sekharaiahk/peoplesgovernenceforum.
[6] https://sites.google.com/site/chandraksekharaiah/miscell aneous333.
[7] https://sites.google.com/site/sekharaiahk/folder222/cybcrfir0006by2018pagesandexaminationreportobtainedfrom drkcsonjan2018.
[8] S Ravikumar Y.K.Sudnara Krishna K Madan Mohan K Chandra Sekharaiah, “IMPACT OF THE RTI ACT WITH IN A PUBLIC AUTHORITY ORGANIZATION TOWARDS EMPLOYEE-EMPLOYER ENGAGEMENT - A CASE STUDY†Presented in MRITCISTCSE-2018 in Computer Science & Engineering 19th & 20th January,2018.
[9] K.Madan Mohan, K.Chandra Sekharaiah, P.Premchand, "A Case Study of ICT Solutions against ICT Abuse: An RTI Act 2005 Success Story", Presented in @Institution of Engineers(I), Khairatabad, Hyderabad & published in International Journal of Engineering Technology Science and Research(IJETSR) ISSN 2394 – 3386, Vol. 4, Issue 11, Nov. 2017.
[10] Ramesh Babu J., A.Radha Krishna, K.Madan Mohan, K.Chandra Sekharaiah, "Adaptive Management of Cybercriminal, Maladaptive Organizations, in the Offing, that Imperil the Nation", in Procds. 27th Annual Conference of National Academy of Psychology (NAoP)@IIT, Kharagpur, Theme:Psychology of Millennials, 22-24Dec2017.
[11] M. Gouri Shankar, P. Usha Gayatri, S. Niraja, K. Chandra Sekharaiah, “Dealing with Indian Jurisprudence by Analyzing the Web Mining Results of a Case of Cybercrimesâ€, in Springer Procds. of International Conference on Communication and Networks (ComNet 2016), Ahmedabad, India, 20-21 Feb. 2016, pp 655-665.
-
Downloads
-
How to Cite
Madan Mohan, K., P. Premchand, D., K. Chandra Sekharaiah, D., & Santhoshi, N. (2018). ICT approach to defuse the cybercriminal sedition dimension of Telangana movement. International Journal of Engineering & Technology, 7(3.29), 360-363. https://doi.org/10.14419/ijet.v7i3.29.19192Received date: 2018-09-07
Accepted date: 2018-09-07