This study aimed to investigate the victimized persons who suffer in online loan application. In the victimization, statements were created containing specific questions based on the online loan apps related and what are consequences faced the victim from the culprit. A total of 78 samples taken, 36 samples are not willing to give their data, 7 samples are unfinished by the respondent, and 35 perfect samples taken in Chennai city. It will show that the respondents are hugely affected by high interest and psychologically. Most of the victims are applying loan from online app, because of less documentation work and easily get amount. But the culprits are use dignity as a weapon and threatening those persons by porno morphing, defamation words, stealing personal information of the person etc. The result is very few peoples only given a police complaint, but the justice is in still zero count. Rest of peoples are didn’t give a police complaint because they’ll think about their dignity and shamefulness of himself.
CONTENTS OF THE TABLE
1 INRODUCTION
1.1 Introduction
1.2 Internet
1.3 Cyber crime
1.4 Cyber criminals & Hackers
1.5 Instant Loan Apps
1.6 Loan App fraudsters
1.7 Loan App Victims
1.8 Laws against Cyber frauds
2 REVIEW OF LITERATURE
3 RESEARCH METHODOLOGY
3.1 Statement of the Study
3.2 Objectives
3.3 Nature of Research Design
3.4 Universe of the Study
3.5 Sample
3.6 Sample Size
3.7 Sampling Techniques
3.8 Data Collection
3.9 Duration of the Study
4 RESULTS AND DISCUSSIONS
5 MAJOR FINDINS, SUGGESTIONS AND CONCLUTIONS
5.1 Major Findings
5.2 Suggestions
5.3 Conclusions
REFERENCES
APPENDIX
LIST OF TABLES
1.5.1 List of Online Loan Apps
4.1 Age of the Respondents
4.2 Gender of the Respondents
4.3 Education Qualification
4.4 Personal Status
4.5 Marital Status
4.6 Father's Occupation
4.7 Mother's Occupation
4.8 Family Monthly Income
4.9 Type of Family
4.10 Respondents Confirmation of Apply and Get Money from the Online Loan Apps
4.11 Respondents are Avail Loan from
4.12 Online Loan Apps Suggested to the Respondents by
4.13 Willingness of the Respondents to Get Money from Online Loan App
4.14 Respondents are Pushed Force by Someone in Online Loan App
4.15 Respondents are Force to the Online App by
4.16 The Respondents Reason for Choosing Online Loan App is
4.17 Plan that Respondent thinks Before they Getting Loan from the Online Loan App
4.18 Expecting Price Amount of the Respondents
4.19 Respondent Got the Expected Amount from Online Loan App
4.20 The Respondents are Felt of their Victimization after Got Loan from Loan App
4.21 Various Types of Victimization that Faced the Respondents
4.22 Time Period of the Respondents to Realize they Got Fooled by the Fraudsters
4.23 Respondent Reaction after Got Fooled by the Loan App Fraudsters
4.24 Amount that Paid by the Respondent More than Applied Loan Sanction Amount
4.25 Respondents are Threatened by the Fraudsters
4.26 Kinds of Threatening Respondents Faced by the Fraudsters
4.27 Respondents Conscious Towards Police Complaint
4.28 Reason for Respondent Not Given a Police Complaint
4.29 Respondents Got Justice or Not for their Complaint
4.30 Respondent's Results for their Justice
4.31 Did Police takes Forward of the Respondent's Cases
4.32 Behaviour of the Police Towards Respondents
4.33 Online Loan Apps Suggested by the Respondents
LIST OF GRAPHS
1 Age of the Respondents
2 Gender of the Respondents
3 Education Qualification
4 Personal Status
5 Marital Status
6 Father's Occupation
7 Mother's Occupation
8 Family Monthly Income
9 Type of Family
10 Respondents Confirmation of Apply and Get Money from the Online Loan Apps
11 Respondents are Avail Loan from
12 Online Loan Apps Suggested to the Respondents by
13 Willingness of the Respondents to Get Money from Online Loan App
14 Respondents are Pushed Force by Someone in Online Loan App
15 Respondents are Force to the Online App by
16 The Respondents Reason for Choosing Online Loan App is
17 Plan that Respondent thinks Before they Getting Loan from the Online Loan App
18 Expecting Price Amount of the Respondents
19 Respondent Got the Expected Amount from Online Loan App
20 The Respondents are Felt of their Victimization after Got Loan from Loan App
21 Various Types of Victimization that Faced the Respondents
22 Time Period of the Respondents to Realize they Got Fooled by the Fraudsters
23 Respondent Reaction after Got Fooled by the Loan App Fraudsters
24 Amount that Paid by the Respondent More than Applied Loan Sanction Amount
25 Respondents are Threatened by the Fraudsters
26 Kinds of Threatening Respondents Faced by the Fraudsters
27 Respondents Conscious Towards Police Complaint
28 Reason for Respondent Not Given a Police Complaint
29 Respondents Got Justice or Not for their Complaint
30 Respondent's Results for their Justice
31 Did Police takes Forward of the Respondent's Cases
32 Behaviour of the Police Towards Respondents
33 Online Loan Apps Suggested by the Respondents
ACKNOWLEDGEMENT
My profound thanks to theAlmighty Godfor giving this opportunity and for many other things throughout this research work. I am indebted to my respectedPARENTSfor their constant encouragement and financial support in carrying the task successfully.
I record my deep sense of gratitude toDR.M.MOHANA KRISHNAN, B.Com, BL., B.Ed., M.Com, PGDBA, M.B.A (HR), M.B.A., (IB), M.F.M., M.Com, (A & F), M.L., M.PHIL, (Commerce), M,PHIL,(Mgt.), M.L., IPRS, M.B.E., M.A(Criminology), Ph.D, PRINCIPAL, J.H.A. AGARSEN COLLEGEfor having given me this ample opportunity to do this project work.
I am grateful toDr. V. GOPI, M.Com., M.Phil., NET(Com), MBA, NET(Mgt.),PGDCA, Ph.D.,VICE PRINCIPAL, J.H.A. AGARSEN COLLEGEfor his constant encouragement for doing this project work.
I am indebted to thankDr. K. PARAMASIVAN, HEAD OF THE DEPARTMENT, DEPARTMENT OF CRIMINOLOGY AND POLICE ADMINISTRATION, J.H.AAGARSEN COLLEGEfor her motivation and support throughout the project work.
I am thankful to myGuideDR. ASLAM MOIDEEN C. A., ASSISTANT PROFESSOR, DEPARTMENT OF CRIMINOLOGY AND POLICE ADMINISTRATION, J.H.A. AGARSEN COLLEGE,for his valuable suggestion and encouragement in completing this project work.,
BHARATH R
CHAPTER I INTRODUCTION
1.1 Introduction:
In the modern era, everything is more developed than before including technology. Everything comes under digitalization like work, buying goods, glossaries, foods and money transactions also we are depends in the internet. At first, everyone is afraid of those things. Because it's a very new process and it takes sometimes for learn to use the internet for all. But now, no one thinks about it before the upcoming days are overruled by those technologies. Later days, all are trying to adopt digital transformation. Some peoples know this digital platform. Most people's are doesn't know what is happening and they have no idea about the digital space. These peoples are the target of the attacker.
In the 21st century, the word of cybercrime is reached all over world. Before this period, crimes and the modus operandi should be in the physical form like robbery, decoity, murder, rape, pick pocketing and etc. So the law enforcement is working in the field to find out the suspect of the crime. There is only the participation of intelligence mind and physical fitness. But cybercrime is not like that; with the help of technology a person can steal or destroy one person details without presence near the target area. We can't find the criminal as well.
Before, there is the possibility of natural risks and vulnerabilities. But now malicious software and viruses inject intentionally by illegal hackers and cybercriminals into the target. In the malicious software block the access of the user. They threatened for money or do something the criminals need from the target. So the internet surface is feeling highly risk one. It also leads to making a fear of using the internet in the cyberspace.
In the study of the University of Maryland found that every 36 seconds, a hacker attacks someone in internet. Hackers are attack peoples roughly in every half minute. This explains that average amount of cybercrimes are committed on 2,224 victims in per day. Very few only get the justice for their victimization. Because the hackers network is very huge, they can't be find in the network space.
1.1 Internet:
The Internet was introduced by TIM Berner Lee. “The World Wide Web” has now caused the world into a global village. Nowadays digital communication and interactions have to be used by two third of the total population all over the world. It will change the method of work on the internet surface.
- Driving license
- Revenue department certificates
- Filling of income tax returns
- Land records
- Banking transactions
- Credit cards
- Railway reservations
- Passport issuance
- Immigration control
- Online complaint portal
And many more government things come in electronically. So, citizens are hugely dependent on the internet and electronic devices.
The internet facilitates deviance of criminal behavior and commits a crime through anonymously. Anonymity and bogus identities during the commission of crimes is easier in virtual spaces than in real physical space. Apps, avatars, disposable devices and deepweb facilitates a concealment of criminal transactions, socialization into subcultures, and networking those involved in illicit or nonconventional behavior.
In a study, that was recently conducted about the dependence of the youth on the internet. The result is around 75% of youth could not survive without using the internet. And their age group between 16 to 24 years. Despite its useful advancement of technology. In the internet gives a equal platform for all the users around the world including cyber criminals. So the internet platform is not only the needed users. Cyber criminals also roaming in the internet for suspicious activity and undesirable act.
Editor's note: the figure was removed due to
copyright issues.
Source: Google images
Fig 1.1
1.3 Cyber Crime:
Cyber crimes or digital crimes or computer crimes are committed in cyberspace. It means any illicit activity that happens in the virtual computer world and specifically is an electronic medium that is used to form a global computer network to facilitate online communication.
The root word of cyberspace is “cybernetics”. Its origin from the Ancient Greekκυβερνητικήmeaning steersman. The word was introduced by Norbert Wiener for electronic communication and control science.
1.3.1 Cybercrime is classified into many types are:
- Web attacks
- SQL injections
- Cross-site scripting
- DDoS attacks
- Dos attacks
- Porno morphing
- Password attacks
- Eavesdropping
- Brute-force and dictionary network attacks
- Insider threats
- Man-in-the-middle attacks
- AI-powered attacks
- Drive-by attacks
- Phishing attacks
- Cyberbullying
- Cyber defamation
- Cyber frauds
- Identification theft
- Spear phishing attacks
- Whale phishing attacks
- Cyber terrorism
- Spam and scam
- Malware
- Ransomware
- Trojan horses
- Teardrop horses
- Ping of death attack
- Pup's
- Data espionage
And a lot of crimes are happening in cyberspace. Above mentioned crimes are mostly done by hackers or cyber criminals. They are commits this crime by the coding methods, hacking software tools and the physical injected hardware tools.
Editor's note: the figure was removed due to
copyright issues.
illustration not visible in this excerpt
Fig 1.2
Source: Google images
1.3.2 Cyber crime statistics:
- By 2025, cybercrime will cost the world $10.5 trillion yearly.
- The overall cost of cyber attacks in the year 2022 was 6 trillion dollars
- According to the survey says there is 95% of data breaches are the results of human error.
- In globally 30,000 websites are hacked daily by the illegal hackers.
- Nearly 64% of companies are worldwide have experienced at least one form of cyber attack.
- There were 22 billion breached records are recorded in the year of 2021.
- In 2021, ransomware cases are grew by more than 92.7%.
- 94% of malwares are send it threw suspicious mail in the E-mail.
- Averages of around 24,000 malicious mobile Applications are blocked daily on the internet.
- Over 300,000 thousand new pieces of malware are created daily by the hackers. Ranging from viruses, adware, Trojans, keyloggers, etc.,
- Most of the popular malicious email attachment extensions are like .iso, .exe, .dmg and .rar.
- Online dating friend finder's website lost 412 million user accounts being hacked by the cyber attackers.
- 14.5 billion Email spam campaigns are accounted for over 45% of the email traffic.
- Higher than 50% of the organizations with IoT devices have no security measures in place.
- Average 23,000 DdoS attacks are happening somewhere on the internet every 24 hours
- Above 64% of companies are worldwide have experienced at least one form of cyber attack in the past year.
- In 2022, 43% of cyber attacks are target small businesses
Apart from the statistics, this cybercrime is going on in many new ways that cannot be said yet. On one side, the costs to prevent it are also going on. Why is it that even if we try to prevent it by putting money in thousands of accounts, we cannot stop cybercrimes? Because there is a lot of loop holes that available in the cyber space. So the cyber criminals are easily escaped and with the help of new technologies they'll hide their location and the information's of him very confidentially.
1.4 Cyber Criminals & Hackers:
Cybercriminals are individual or teams of peoples who use technology to commit illegal activities on digital devices or networks with the intension of stealing sensitive company's information or personal data
They are very well to access the underground hidden unlawful market of deep web to trade suspicious illegal goods and services, such as hacking tools to steal confidential data. Cybercriminal underground markets are known to specialize in certain products or services.
Cybercriminals are also defined as threat actors. They are classified in various ways, in the first one which is intentional mind. Threat actors are individually who conducted targeted attacks, which actively pursue and compromises a target entity's infrastructure. Cybercriminals are not only focus on a single entity, but also conduct operations on broad masses of victims defined only by similar platform of types, online behavior, or programs used. Second they differ in the other way that they conduct their operations. Threat actors are follows a six-step process, which includes researching targets and moving laterally inside a network.
1.4.1 Cybercriminals are working in an organized group by splitting their works in various kind of roles are:
- Programmers: The role of programmers is to write malicious code or programs that will used by the cybercriminal organization
- Distributors: Theirs main work is distributed and sells stolen data and goods from associated cybercriminals for money.
- IT experts: They are maintaining a cybercriminal organization's IT infrastructure, such as servers, encryption & data breaches and databases.
- Hackers: Hackers are exploiting victims systems, Applications and done a network vulnerabilities.
- Fraudsters: They creates and deploy schemes like spam and phishing
- System hosts and providers: This role to host sites and servers that possess for illegal contents,.
- Money mules: Manage bank account wire transfers.
- Cashiers: To provide account names to cybercriminals and control drop accounts.
- Tellers: The work of teller is to transfer and launder illegal money through digital and foreign exchanging methods.
- Leaders: Every organized group that have a big boss to rule. Leader is assemble and direct cybercriminal teams, and usually lack of technical knowledge.
Cyber criminals are network criminals. Most of the cybercrimes are individuals or a small amount groups. The large organized groups can also voluntarily take advantage of the internet. They are all the professional criminals and find new ways to commits a old crimes. Cyber crimes are treating like a business and forming global communities. Nowadays there are some certain cyber criminals who offer cybercrime as a service in the black market of the internet. Probably the dark net is fully handled by those cybercriminal hands.
Editor's note: the figure was removed due to
copyright issues.
Source: Google images
Fig 1.3
Criminal communities are sharing their strategies and tools and sometimes can combine forces to launch co-ordinate attacks. It's very tough task to capture cyber criminals. Because of the internet makes very easier for peoples to do things anonymously from any location on the globe. Most of the computers are used in cyber attacks have actually been hacked and are being controlled by someone far away. Cyber laws also differ from one country to another, so it makes easy to launches a criminal attackin other countries.
1.4.2 Cyber criminals are uses several types of attacks to commits a crime.
- Bots: Bots or botnets are a network of software that spreads automatically through internet.
- Fast flux: Moving data quickly among the computers in a botnet to make its difficult to trace the source of malware or phishing websites.
- Zombie computers: Computer that has been hacked by malicious software and control the victim computers like zombies and make it a part of the botnet through command and control servers.
- Denial of service attacks: Flooding a network or server with traffic or sending flow of spam messages in order to make it unavailable to its users.
- Skimmers: This is a device that used to steal credit or debit card information when the card swiped through them. This can happens in stores, restaurants or ATM machines when the card is out of the owner's view, and frequently the credit card information is then sold online through a criminal community.
- Identity thieves: The targets are organization working peoples personal information, like schools or IT profession companies. But most of the cybercriminals are will target home computers rather than trying to break into a big institution's network because it's very easier compare to the organization.
- Social engineering: It is one of the tactics used by the cybercriminals that uses lies and manipulate to trick people into revealing their personal information. Phishing is also a form of social engineering attack. Social engineering attacks are frequently involving very convincing fake stories to lure victims into their trap.
Like other hacking techniques and social engineering are purely illegal in each and every countries in the world. To protect from social engineering, it is advisable to don't trust any suspicious emails or messages that is received for requesting any sort of personally identifiable information. Most of the banks or a company never asks your sensible personal information to you through email.
Hacking does not consider count as a cybercrime; as such, not all the hackers are cybercriminals. Cybercriminals hack and infiltrate computer systems with malicious intent, while hackers only seek to find new and innovative ways to use a system, be it good or bad.
A hacker is a individual person who finds and exploits the weakness in the computer systems or network gain access. Hackers very well know the skilled programs of computer security.
1.4.3 Hackers are classified into following many types:
1. White Hat Hacker:White hat hackers are the persons one who professionals with experience in cyber security. They are authorized and proper certified hacker to hack the systems. The white at hackers are stands for the government or official organizations by getting into the system. They are done hacking, because to identify the weak points and fix them to avoid the cyber attacks from the suspicious external sources. White hat hackers are works in under the rules and regulations as the government sets. They are otherwise known as ethical hackers. The main motives of these hackers are helping businesses and organizations for detecting gaps in network security. A white hat hacker is any individual or a group of people who will help to protect the company from raising cybercrimes.
2. Black hat hackers:Black hat hackers also a very well knowledgeable computer experts but they are stands in the vulnerabilities with negative intention mind. They are attacks individual or companies systems to get access to systems where they do not have authorized entry from the owner of the system. On gaining entry they can able to steal the data or destroy the system. The negative intentions of the hacker make the hacker to deviance into the criminal. The main motive of black hat hacker is to hack into individual or organization networks and steal bank data, funds or personal sensitive information. Normally, they mislead the stolen resources for their profit themselves and sell the details on the black market or harass their target company.
3. Grey hat hackers:The intention behind the hacking is considered wile categorizing the hacker. The grey hat hackers are stands between the ethical white hat hacker and the illegal black hat hacker. They are not owned authorized government certificate. These type of hackers are do both good and bad intention work based on their mood swing. The hacking might be for their gain. If the intention is for personal gain, the hacker will be considered as gray hat hacker. They don't have any motive. Rather, they enjoy the experimenting with systems to find the new ways, break the cyber defenses and generally find a fun hacking experience.
4. Script kiddies:Script kiddies are not very well in coding and technical field area. They have the curious about to know the in-depth of hacking. They try to hack another working system with the help of other hacker's code. They are using shortcuts for complete the hacking. Script kiddies are works very active and they stands fully fledged of the works. They are immature, but often just as dangerous and exploiters of the internet security. Script kiddies are mostly done denial of service (DoS) attack, social engineering attacks and website defacement.
5. Green hat hackers:Green hat hackers are the babies of the hacker world. They are very new fellows and mainly they use script, like script kiddies, but they a separate aspirants of becoming full blown hackers. They are often found asking questions of fellow hackers and listening like child curiosity. The green hat hackers are focus on learning and developing their skills.
6. Red hat hackers:Red hat hackers are very similar to the white hat hackers, they both are ethical and vigilante hackers. But they different techniques to protect from black hat hackers and as well as the attacker' s system can also be hacked. Red hat hackers are otherwise known asEagle-Eyed Hackers. The major red hat hacking group like anonymous lies in this category. Many people don't consider red hat hacker is even a category that is totally wrong. This is a misconception that happened due to a lack of awareness and knowledge.
7. Blue hat hackers: Blue hat hackers are security professionals that work outside of the organization. If a script kiddie ever took revenge, they would become a blue hat hacker. Companies often invite them to test the new software and find security vulnerabilities before releasing it. That's why some blue hat is known as blue hat Microsoft hackers. Most of the blue hat hackers are fairly new to the hacking world.
8. State / Nation sponsored hackers:State sponsored hackers whose goal is to steal critical and sensitive data to provide their country a competative advantage on a global scale. These hackers are who have been employed by their state or nation's government to snoop in a penetrate through full security to gain confidential information from other Governments to stay at the top online.
9. Hacktivist:Hacktivism is a act of hacking a website or a computer network in an effort to convey a social political message. The person who commits the hacktivism, they are called as hacktivist. The term hacktivist traces back to 1994, originating from the hacker group “Cult of the Dead Cow”. Hacktivists are not motivated by the malicious intent. Hacktivists are also stealing money or data as well in an effort to spread their agenda. These hacktivist motives are more reliable like Robin Hood. The hacktivist types of hackers are stayed anonymous on the internet surface.
1.5 Instant loan Apps:
Instant online loan Apps is a new development of the modern world. Before this, if we look at everything, the method of getting a loan was direct and it was a direct method of giving and receiving money from someone else, it was just going to the bank and asking for a loan and getting money. But after the arrival of this network, we can download the instant loan Apps on our phone and get money easily without any proof. In few minutes of process we can take money from those online loan Apps. We can use the Appss to withdraw money wherever we are.
The origin of online loan s can be traced back to the emergence of the internet and e-commerce in the 1990s. Initially, online lending was restricted to traditional banks and financial institutions that offered loan services through their websites. However, with the advent of mobile technology and the popularity of Smartphone' s, Apps-based lending platforms have gained immense traction in recent years. These platforms offer a simple and convenient way for borrowers to apply for and receive loans online, without the need for physical visits to traditional lending institutions. The proliferation of online loan Apps has made access to credit easier and more convenient for consumers, especially those without access to traditional banking services.
In the year of 2018 instant online loan Apps are launched in the Google play store. Almost 3,193 loan Apps from 2018 to April 2021. It's still continuing the counts of loan Apps. Here, mentioned some online loan Apps, max loan amount and starting interest rate are;
Table 1.5.1:
illustration not visible in this excerpt
Source: mymoneymantra
In the above table 1.5.1 mentioned instant online loan Apps are just sample, there is lot of personal loan Apps like this in the Google play store.
1.5.2 Personal Loan Eligibility Criteria for Online Loan Apps:
The eligibility parameters may vary from lender to lender. Following are some common eligibility criteria to be met:
- Must be salaried or self-employed, depending on the target audience of the loan provider.
- The borrower can also be a student if the loan is to be applied through a student loan Apps.
- Must be aged above 21 years and below 60 years.
- Must be Indian resident
- The minimum net monthly income required to avail of the loan is Rs. 15,000.
The person who comes under above mentioned criteria, they are only allowed to apply official online loan Apps.
illustration not visible in this excerpt
Fig 1.4Source: Screenshots
1.6 Loan Apps fraudsters:
Above 3,193 instant online loan Applications are presence in the Google play store. Not all the loan Apps are genuine, very few loan Apps only genuine and other loan Apps are unauthorized loan Apps and they don't have any proper licensed by the RBI. One fraud groups have more than 5 loan Apps in Google play store with different names. If we randomly click few more loan Apps in play store, there is compulsorily 2 Apps are owned by one fraud group.
Google play store have no limitation for Apps, it will check only the malware or malicious content present or not in the Apps, otherwise it will allow all the Apps in their platform. That's why the fraudsters are not fixing any bug or malwares in their Application. But they are did another trick, that is accessing permission. When we entered in the loan Apps, that'll asking for permission for allow accessing your phone contacts, personal
information, photos and videos. The all the things are mentioned in the Apps dashboard as well.
illustration not visible in this excerpt
Source: Screenshots
Once we give all the access and entered in the Apps, then a little process to get money. It may be a aadhar card or pan card. After give the information we can get money from the loan Apps. After a few days they will collect all your details and asking money from the user contact lists and threatening the user with their personal sensitive information for high amount of money more than the user get from the loan Apps. User also give back the money to them because of dignity and they are also victimized by the fraudsters.
1.7 Loan Apps victims:
Not all the loan Apps users are victimized, the person who uses the unofficial and suspicious organization Apps, they are all victimized by the cyber fraudsters. Most of the peoples are using instant online loan Apps for the money needed situation. So they are choosing online loan Apps because it was less documentation and easily can we get money in very little process.
They are didn't read the terms and conditions of the loan Apps and click all the allow options, it is the major mistake that was done by the users. With the allow permission the cyber criminals are entered in the user's personal info and access those media's.
Before the due date, they are asking for money to the users. When the user skip the call or asks for a time, then the lender teams are call the users contacts for the money or sending the users morphing picture to the users contact list. It will make more stress and depressed to the users.
Finally the user gives the money to the lender, but after they are demanding for high cost. When the user provoke there demand, again the cyber fraudsters are threatened the users by the unlawful things. For their dignity they will give the amount to the lender. These cyber frauds are uses the personal information and as the weapon and with the help they are threatening the innocent peoples and get high amount from him. It is one the major emerging cyber crime cases in India. Many people's are did suicide by these type crimes against by him.
1.8 Laws against cyber frauds:
According to IPC section 420
This section talks about cheating and dishonestly inducing delivery of property. Seven-year imprisonment in addition to a fine is imposed under this section on cybercriminals doing crimes like creating fake websites and cyber frauds. In this section of the IPC, crimes related to password theft for fraud or the creations of fraudulent websites are involved.
Section 66- Hacking with computer system
If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack.
Section 66D- Cheating using computer resource
If a person cheats someone using a computer resource or communication.
CHAPTER II REVIEW OF LITERATURE
United Nations Human Rights, (1985)declared basic principles of justice for victims of crime and abuse of the power. They given a statement, the term “victim” also includes, where appropriate, the immediate family or dependants of the direct victim and persons who have suffered harm in intervening to assist victims in distress or to prevent victimization.
Sanuja Shree PN, (2020)was conducted a study on “Online banking frauds a Study with reference to perception of bank customers”. They given the statement, the use of digital transactions and electronic money transfers has been promoted in every nook and cranny of the country. It has helped every citizen to move the Indian economy towards a more cashless economy in view of demonetization, Digital India and other initiatives of the Government of India. On the other hand, online banking leads to the vulnerability of careless users and less awareness of the security principles of each online transaction. After demonetization, e-wallets and other electronic funds transfer systems have become more useful and many players are offering e-wallet services to customers like Google Pay, Paytm, Freecharge, Payal, Bank mobile wallet applications, Phonepay etc. Payumani and Mobikwik are some of them.
Sherpa, Palchenla, (2021)was conducted a study on “Legal and regulatory issues of cyber fraud in transnational banking with special reference to European Union”. They given the statement, they convince the customer to follow through instructions to download some Apps from Google Play Store and lastly they will ask for OTP for authorization for registration or verification. So in this manner they complete their transaction process and empty the consumer's account. A very small number of victims report unauthorized electronic transactions to the bank and file a police complaint. Victims are not comfortable to disclose the fact that they are vulnerable to cyber fraud due to lack of trust, confidence, and image and business in society.
Xu, Meiling and Tian, Boping and Fu, Yongqiang, (2022)was conducted a study on “Default prediction of online credit loans based on mobile application usage behaviors”. They given the statement, given the widespread use of Smartphone and the popularity of mobile Apps, it is necessary to investigate whether consumers' mobile application usage behaviors (app behaviors) can effectively predict online credit default. This paper proposes a combined algorithm of CNN and LightGBM, and establishes credit scoring models with app behaviors to estimate the default risk of online credit loans based on logistic regression, LightGBM, CNN and combined algorithm, respectively.
Srinadh Swamy Majeti, Barnabas Janet, Narendra P Dhavale, (2022)was conducted a study on “An experimental security assessment for weaknesses Indian mobile loan Apps after India busted a multi crore loan app scam”. They given the statement, As the globe increasingly focuses on mobility and digitalization, India's digital banking sector is poised for development. At the same time, cyber security seems to have taken a back seat. Recently, the Indian government busted a multi-crore money lending loan app scam involving non-regulated (unauthorized) Chinese Apps offering instant loans in the digital lending platform. Many people were trapped by these Chinese-led loan Apps and dozens of people committed suicide. These Apps steal customers' data on mobile, resulting in harassment through blackmailing the customers who fail to pay installments.
Abdul Bashir, Azwardi , Sukanto , Bambang Bemby Soebyakto , Dirta Pratama Atiyana , Ichsan Hamidi , Hamira , Rosada Sintya Dwi, (2022)was conducted a study on “ Raising and knowledge of rural communities against lottery fraud and illegal online loan through telephone and short message services”. They given the statement, Permitted online loan companies are 131 companies and unlicensed online loan companies are 3,193 companies from 2018 to April 2021. The need to survive drives people to make illegal online loans and is used by unscrupulous people. The person contacted the online loan borrower very rudely, threatened, and cursed, harassed, spread personal data of borrower and borrower's family. Additionally, payday loans have very high interest rates compared to conventional loans. The number of installments, high interest and service charges (3-5%) continue and accumulate as illegal online loan borrowers' end up defaulting on very large loans.
Xu, Meiling and Fu, Yongqiang and Tian, Boping, (2023)was conducted a study on “An ensemble fraud detection approach for online loans based on application usage patterns”. They given the statement, the problem of fraud has increased drastically with the rapid growth of online lending. As loan applications, approvals and disbursements are conducted online, fraudulent borrowers are more likely to hide or falsify information in order to obtain a loan, while lenders have difficulty detecting fraud without direct contact and often result in a lack of linkage to customers' credit performance.
Hongliang Chen and Yunsha Pu, David Atkin, (2023)was conducted a study on “Migration stress, risky internet uses, and scam victimization: An empirical study among Chinese migrant workers”. They given the statement, drawing from conventional activity theory and uses and gratification theory, it examines the impact of migration stress on risky Internet uses and fraud-related outcomes among migrant workers. Survey data from 543 migrant workers revealed that displacement stress predicted risky online recreational activities, online loans, risky online shopping, privacy exposure, and limited safety techniques.
Chapter III RESEARCH METHODOLOGY
3.1 Statement of the Problem:
In Chennai, online loan app frauds are becoming more prevalent. Because of their inexperience and they don't think about the consequences after getting loan from the online loan Apps. These frauds frequently tempt the innocent person who needs money in their critical situations. So the frauds are using this opportunity, to steal the user's personal information and threatening them, defamation those peoples and morphing their pictures as nudity. The user's fear makes stronger and richer the fraudsters. This can have an adverse effect on a common citizen's normal life as well as their emotional wellbeing and its leads to decide a suicide attempt.
3.2 Objectives:
- To analyze mental stress and impact of online loan app frauds.
- To examine the socio - economic conditions of the respondents.
- To examine the approach of the police towards the victim of loan app frauds.
3.3 Nature of Research Design:
The present research study was a quantitative method (Per cent analysis)
3.4 Universe of the Study:
The universe of this research is Chennai city.
3.5 Sample:
The sample of this study is the person who victimized online loan Apps in Chennai city.
3.6 Sample Size:
The total of 78 sample is visited, 36 samples are not willing to give their data, 7 samples are unfinished by the respondent, and 35 perfect samples are taken in Chennai city. It is very useful to measure the problem perfectly.
3.7 Sampling Techniques:
The sampling technique used in this study is purposive of non probability sampling technique.
3.8 Data Collection:
a)Tool:
Personal distribution questionnaire (PDQ) is developed by the researcher based on the research objective
b) Pilot study:
The pilot study is take n from 5 respondents to check the reliability and validity if the study.
c) Data analysis:
The data is collected for the research was coded and summarized in Microsoft Excel program. It is used to identify the N and design a chart.
3.9 Duration of the Study:
1.The total study duration is 2 months.
2.40 days for my data collection.
3.Then 20 days for my research process
[...]
-
-
-
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X. -
-
¡Carge sus propios textos! Gane dinero y un iPhone X.