Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 11 | Issue 12 |

Volume 11 | Issue 12 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6)OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: Genocide - A Legal Prespective

  Author Name(s): T. ROSHINI

  Published Paper ID: - IJCRT2312066

  Register Paper ID - 246886

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2312066 and DOI :

  Author Country : Indian Author, India, 605401 , Villupuram, 605401 , | Research Area: Others area

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312066
Published Paper PDF: download.php?file=IJCRT2312066
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312066.pdf

  Your Paper Publication Details:

  Title: GENOCIDE - A LEGAL PRESPECTIVE

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 12  | Year: December 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Others area

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 12

 Pages: a567-a570

 Year: December 2023

 Downloads: 65

  E-ISSN Number: 2320-2882

 Abstract

Life..! The Right to Life is one of the Supreme rights. Moreover, it is the belief that a human being or animal has the right to live and in particular should not be killed by another entity or nation or ethnic group. No one could be held in servitude for any reason along with everyone having an obligation not to end up another life. One of the supreme crime under international as well as national regime is Genocide. It may true that the "fact of genocide is as old as humanity" but as an legal concept of genocide is a rather recent arrival. We have to to be noted that 'killing' is not necessary to hold on with genocide, somewhat a deliberate and systematic destruction of a people who belong to peculiar race or cultural or religious group. . We analysis the historical background and an legal regime of genocide. "Right is right, even if everyone is against it, and wrong is wrong, even if everyone is for it."


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Genocide, Right to Life, Killing, Destruction, Humanity, Supreme Rights.

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: GEOSPATIAL TECHNOLOGY EDIFICATION: CAPACITY BUILDING FOR VIABLE EVOLUTION

  Author Name(s): DR. ABHISHEK SHARMA

  Published Paper ID: - IJCRT2312065

  Register Paper ID - 246563

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2312065 and DOI :

  Author Country : Indian Author, India, 243001 , BAREILLY, 243001 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312065
Published Paper PDF: download.php?file=IJCRT2312065
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312065.pdf

  Your Paper Publication Details:

  Title: GEOSPATIAL TECHNOLOGY EDIFICATION: CAPACITY BUILDING FOR VIABLE EVOLUTION

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 12  | Year: December 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 12

 Pages: a559-a566

 Year: December 2023

 Downloads: 75

  E-ISSN Number: 2320-2882

 Abstract

Practical improvement requires sensible utilization of assets which can cook for present need and furthermore makes arrangement for what's in store. Geospatial innovation works at a territorial level as well as miniature level by giving a system to information representation and investigation which is pivotal to the dynamic cycle. Such a stage gives instruments that assist leaders with breaking down complex circumstances and complete the undertaking with productivity. Research shows that Geospatial believing is basic to make due and work in the present digitized world. Research has additionally shown that schooling in Geospatial innovation will be urgent to make labor force skillful across all areas of the economy and it will be especially essential for accomplishing feasible improvement objectives. Geospatial training in India is lingering behind the remainder of the world because of the imperatives of the College structure in running Interdisciplinary subject. Geology schooling to a great extent confines to four-year certification with practically zero innovative establishing. This paper is an endeavor to basically break down Geospatial schooling situation in India with unique reference to the encounters of the showing Geospatial educational plan at Advantageous interaction Foundation of Geoinformatics. This paper additionally endeavors to assess the endeavors of incorporating research on supportable advancement with the main subjects.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Feasible turn of events, Geospatial Innovation, Advanced education, educational plan Improvement, Topography Training.

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: TAX EVASION AND TAX AVOIDANCE - IMPACT OF INDIAN ECONOMY

  Author Name(s): Ishwarya.S

  Published Paper ID: - IJCRT2312064

  Register Paper ID - 247268

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2312064 and DOI :

  Author Country : Indian Author, India, 641-605 , Tiruppur , 641-605 , | Research Area: Others area

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312064
Published Paper PDF: download.php?file=IJCRT2312064
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312064.pdf

  Your Paper Publication Details:

  Title: TAX EVASION AND TAX AVOIDANCE - IMPACT OF INDIAN ECONOMY

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 12  | Year: December 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Others area

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 12

 Pages: a540-a558

 Year: December 2023

 Downloads: 338

  E-ISSN Number: 2320-2882

 Abstract

Tax evasion and tax avoidance are two practices that have significant effects on the Indian economy. Tax evasion includes engaging in illegal activities to avoid paying taxes in full. Both tax avoidance and tax evasion cause a loss of government revenue, which may restrict governmental spending on infrastructure, social welfare, and development programmers. Tax avoidance refers to the legal exploitation of tax law loopholes to minimize tax liability. Income disparity is also worsened by tax avoidance and evasion, which also damages public trust in the tax system. In the past, the tax evasion and tax avoidance of a large informal sector, poor tax administration, and complicated tax laws have allowed tax evaders to thrive, resulting in significant revenue losses that have made it difficult for the government to fund public services. The Indian government has implemented a number of measures that target tax avoidance and evasion in the current situation. These include improving tax legislation, enhancing tax administration, and utilizing technology to increase compliance and transparency. Tax evasion is being battled and a tax system that is more equitable is being promoted through initiatives such as demonetization, the implementation of the Goods and Services Tax (GST), and the creation of the Direct Tax Code. This paper explores multi dimensions of tax avoidance and tax evasion in the view of current government laws, policies and preventive measures, how it has affected the Indian economy and the judicial interpretation of tax evasion and avoidance.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Tax payer, Tax evasion, Tax avoidance, Impact of economy, penalties.

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: The Strategic Importance Of Network Security In 21st Century Warfare

  Author Name(s): Fnu Ziauddin

  Published Paper ID: - IJCRT2312063

  Register Paper ID - 247038

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2312063 and DOI :

  Author Country : Foreign Author, United States of America, 75035 , Frisco, 75035 , | Research Area: Others area

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312063
Published Paper PDF: download.php?file=IJCRT2312063
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312063.pdf

  Your Paper Publication Details:

  Title: THE STRATEGIC IMPORTANCE OF NETWORK SECURITY IN 21ST CENTURY WARFARE

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 12  | Year: December 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Others area

 Author type: Foreign Author

 Pubished in Volume: 11

 Issue: 12

 Pages: a529-a539

 Year: December 2023

 Downloads: 68

  E-ISSN Number: 2320-2882

 Abstract

This article explores the crucial role that network security plays in contemporary warfare, with an emphasis on how the US might use its strong network security infrastructure to gain an advantage. With the growing integration of digital and physical battlefields, protecting communication links, conducting intelligence operations, and preserving operational continuity are critical in today's world. From its beginnings in protecting early communication networks to its present condition as a crucial component of military strategy and national defense, the paper charts the development of network security in combat. The study illustrates how network security has influenced recent wars via several case studies, including the Stuxnet assault and cyber-operations in conflicts in North Korea, Georgia, Russia, and Ukraine. After that, it looks at how secure the US military's network is right now, evaluating its advantages and disadvantages against new online dangers. The study also examines emerging cybersecurity technologies and evaluates how they may affect combat in the future. These technologies include artificial intelligence (AI), machine learning, and quantum-resistant encryption. There is a discussion of difficulties including new threats, holes in existing systems, and moral and legal issues with cyberwarfare. The article suggests methods to improve network security, with a focus on international collaboration, training, and best practices. The study concludes by projecting the future of cyber warfare and emphasizing the critical role that network security plays in guaranteeing the safety and effectiveness of military operations. It also argues that the United States should continue to have a strategic advantage in this dynamic field.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cyber Warfare, Network Security Infrastructure, Military Cyber Defense, Cybersecurity Technology Advancements, Strategic Cyber Dominance.

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: Effectiveness Of Offline Versus Online Classes On Learning Of B.Sc. Nursing Part III Students

  Author Name(s): Sunita Thakur, Dr Reena Thakur

  Published Paper ID: - IJCRT2312062

  Register Paper ID - 247253

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2312062 and DOI : http://doi.one/10.1729/Journal.37176

  Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312062
Published Paper PDF: download.php?file=IJCRT2312062
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312062.pdf

  Your Paper Publication Details:

  Title: EFFECTIVENESS OF OFFLINE VERSUS ONLINE CLASSES ON LEARNING OF B.SC. NURSING PART III STUDENTS

 DOI (Digital Object Identifier) : http://doi.one/10.1729/Journal.37176

 Pubished in Volume: 11  | Issue: 12  | Year: December 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 12

 Pages: a522-a528

 Year: December 2023

 Downloads: 116

  E-ISSN Number: 2320-2882

 Abstract

Background: Online classes emerged as a game-changer during COVID-19 pandemic. In this difficult period, online classes grabbing the attention of the whole world. This study assess the effectiveness of offline versus online classes on learning of B.Sc. Nursing Part III students. The present study also compares whether online classes is as effective as offline classes. Objective: The objective was to assess the effectiveness of offline versus online classes on learning of B.Sc. Nursing Part III students. Methodology: A quasi experimental post-test only design was used in this study. The study was conducted at 6 private nursing colleges of Kota Rajasthan. Total 300 nursing students were chosen by purposive sampling technique for the study, 150 students for offline classes and 150 for online classes. Regular 5 days offline and online classes were taken with lectures and power point presentations. Offline classes were taken in class room of colleges and online classes were taken by zoom platform. On the 6th day post-test was taken by using structured knowledge questionnaire and data were gathered by both modes of classes. Results: Offline classes scores in this study showed that 8.7% of students reporting moderate effectiveness and 91.3% reporting very effective level of learning as compare to the online classes with 77.3% of students reporting moderate effectiveness and 22.7% reporting very effective level of learning. The t-test showed that there is a significant difference between the Online and Offline classes (df = 298, t = -17.212, p < .001). The results findings showed that offline classes were significantly effective than online classes. Conclusion: The study's findings indicated that offline classes is more effective than online classes on learning of B.Sc. Nursing Part III students.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Effectiveness, offline classes, online classes, learning

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: Electricity theft detection in smart grids based on deep neural network

  Author Name(s): Dr K VIJAYA BHASKAR, M.Jamuna, P.Venkata Suresh Babu, T.Chandana

  Published Paper ID: - IJCRT2312061

  Register Paper ID - 245763

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2312061 and DOI :

  Author Country : Indian Author, India, 600001 , Chennai, 600001 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312061
Published Paper PDF: download.php?file=IJCRT2312061
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312061.pdf

  Your Paper Publication Details:

  Title: ELECTRICITY THEFT DETECTION IN SMART GRIDS BASED ON DEEP NEURAL NETWORK

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 12  | Year: December 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 12

 Pages: a507-a521

 Year: December 2023

 Downloads: 188

  E-ISSN Number: 2320-2882

 Abstract

Electricity theft is a significant challenge in the operation of smart grids, leading to revenue loss for utility companies and increased costs for consumers. Detecting electricity theft is crucial to maintaining the integrity of smart grid systems. In this study, we propose a novel approach for electricity theft detection in smart grids based on deep neural networks (DNNs). Our method leverages the power consumption data collected from smart meters, utilizing the temporal and spatial patterns in electricity usage. We design a DNN architecture capable of learning and identifying abnormal consumption patterns indicative of theft. The model is trained on historical data, enabling it to distinguish between legitimate variations in electricity usage and unauthorized consumption. The effectiveness of our approach is evaluated using real-world smart grid data, demonstrating its ability to accurately detect instances of electricity theft. By harnessing the power of deep learning, our method offers a proactive and efficient solution to identify and mitigate electricity theft in smart grids, ultimately contributing to the stability and sustainability of modern energy distribution systems.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

deep learning, energy distribution systems, smart grids

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: CONTROL OF ROOT-KNOT NEMATODE Meloidogyne incognita USING LEAF POWDER OF MEDICINAL PLANT ON OKRA

  Author Name(s): Naresh Kumar Nayak, Mridula Khandelwal

  Published Paper ID: - IJCRT2312060

  Register Paper ID - 247210

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2312060 and DOI :

  Author Country : Indian Author, India, 324001 , Kota, 324001 , | Research Area: Life Sciences All

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312060
Published Paper PDF: download.php?file=IJCRT2312060
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312060.pdf

  Your Paper Publication Details:

  Title: CONTROL OF ROOT-KNOT NEMATODE MELOIDOGYNE INCOGNITA USING LEAF POWDER OF MEDICINAL PLANT ON OKRA

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 12  | Year: December 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Life Sciences All

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 12

 Pages: a502-a506

 Year: December 2023

 Downloads: 81

  E-ISSN Number: 2320-2882

 Abstract

Abstract: Experiment was set up by using pots having one Kg. steam sterilizedsoil. Twenty one day old okra (Abelmoschus esculentus) plant were transplanted in each pots. Leaf powder of five medicinal plant Viz. Asperagus asparagoides, Catharenthus roseus, Solanum nigrum, Occimum sanctum, Aegle marmelos were used to control root knot nematode, M. incognita in okra. There was markedincreased in root-shoot length, root-shoot weight of fresh and dry plant. Number of leaves, number of fruit and size increased. Leaf powder (LP) + Nematode (N)treatment as compare to Nematode (N) alone treatment. Leaf powder (LP) +Nematode (N) treatment was also characterized by reduction in root knot index incomparison to nematode alone. Leaf powder (LP) of Asperagus (Asp)+Nematode (N) combination was found to be more effective to reduce root knot index. It was alsoobserved that applied doze of 20 gm. Leaf powder was more effective than 10 gram doze. Keywords:- M. Incognita, Nematode, Okra, Leaf Powder


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Keywords:- M. Incognita, Nematode, Okra, Leaf Powder

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: A Review article on Needle free injection technology

  Author Name(s): Bhagyashree Chavan, Nitin Kolhe, Sameeksha Mhatre, Shah Kashif

  Published Paper ID: - IJCRT2312059

  Register Paper ID - 247232

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2312059 and DOI :

  Author Country : Indian Author, India, 400037 , Mumbai, 400037 , | Research Area: Pharmacy All

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312059
Published Paper PDF: download.php?file=IJCRT2312059
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312059.pdf

  Your Paper Publication Details:

  Title: A REVIEW ARTICLE ON NEEDLE FREE INJECTION TECHNOLOGY

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 12  | Year: December 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Pharmacy All

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 12

 Pages: a492-a501

 Year: December 2023

 Downloads: 66

  E-ISSN Number: 2320-2882

 Abstract

NFIT i.e., Needle-free injection technology is a comprehensive concept that covers an array of drug delivery systems designed to transport medications through the skin without the need for hypodermic needles. These systems utilize different forces, including Lorentz forces, shock waves, gas pressure or electrophoresis, to eliminate the necessity of using needles for drug administration. This method offers benefits not limited to the pharmaceutical sector, the emerging nations also finds it extremely helpful in mass vaccination campaigns by diminishing the likelihood of needle-related injuries and averting additional associated repercussions, such as those brought on by the repeated use of a single needle. Based on how they operate, the kind of load they carry, how drugs are delivered, and where they are delivered, NFIT devices can be categorized. The key considerations for ensuring a reliable, secure, and efficient drug delivery using NFIT are the drug's viscosity, sterility and shelf life of the medication. Another notable advantage of this technology is its capability to deliver highly viscous medication formulations that are challenging to administer using traditional needle and syringe systems, particularly when employing advanced needle-free injection systems. Needle-free injection technology devices are Produced using various techniques; however, the most used method is the injection molding technique. This technology is being offered in a variety of forms, including Vitajet 3, Tev-Tropin, Bioject ZetaJetTM and others. Numerous devices are already on the market as a result of greater investment in its development and FDA approval.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Bioject ZetaJetTM, Needle free injection technology, Molding technique, Tev-Tropin etc.

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: Intrusion Detection System Using Machine Learning

  Author Name(s): Deshpande G. R., Patil Shravani Mahesh, Sondare Priya Prakash, Shinde Akanksha Ganesh

  Published Paper ID: - IJCRT2312058

  Register Paper ID - 247088

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2312058 and DOI :

  Author Country : Indian Author, India, 431606 , Nanded, 431606 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312058
Published Paper PDF: download.php?file=IJCRT2312058
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312058.pdf

  Your Paper Publication Details:

  Title: INTRUSION DETECTION SYSTEM USING MACHINE LEARNING

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 12  | Year: December 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 12

 Pages: a487-a491

 Year: December 2023

 Downloads: 70

  E-ISSN Number: 2320-2882

 Abstract

A machine learning-based intrusion detection system is a security tool that utilizes advanced algorithms to automatically detect and respond to suspicious activities within a computer network. It employs machine learning techniques to analyze network traffic patterns, identify anomalies, and distinguish between normal and abnormal behavior, thereby enhancing the network's security and threat detection capabilities. A machine learning-based intrusion detection system is a security tool that utilizes advanced algorithms to automatically detect and respond to suspicious activities within a computer network. It employs machine learning techniques to analyze network traffic patterns, identify anomalies, and distinguish between normal and abnormal behavior, thereby enhancing the network's security and threat detection.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: “Mitigating Cyber Threats: Legal Remedies For Victims Of Phishing Attacks As A Social Engineering In India And Worldwide”-A Comparative Study

  Author Name(s): LEENA.S.B, PREETHI.S.M

  Published Paper ID: - IJCRT2312057

  Register Paper ID - 247168

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2312057 and DOI :

  Author Country : Indian Author, India, 620005 , Trichy , 620005 , | Research Area: Others area

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312057
Published Paper PDF: download.php?file=IJCRT2312057
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312057.pdf

  Your Paper Publication Details:

  Title: “MITIGATING CYBER THREATS: LEGAL REMEDIES FOR VICTIMS OF PHISHING ATTACKS AS A SOCIAL ENGINEERING IN INDIA AND WORLDWIDE”-A COMPARATIVE STUDY

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 12  | Year: December 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Others area

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 12

 Pages: a469-a486

 Year: December 2023

 Downloads: 92

  E-ISSN Number: 2320-2882

 Abstract

The proliferation of phishing attacks and email scams has emerged as a critical concern in the digital landscape, posing significant threats to individuals and businesses alike. In an era dominated by digital communication, phishing attacks and email scams have become pervasive threats, causing substantial financial and emotional distress to individuals and businesses in India. People's inability to recognise social engineering assaults is the reason why the number of them is growing daily. Thus, there is a pressing need for resources to aid in the understanding of social engineering methods and crimes. This research paper delves into the landscape of phishing attacks and email scams, specifically examining the legal avenues available to victims in the context of India and various countries' jurisdictions. Through a comprehensive and comparitive analysis of relevant legislation, case law, and regulatory frameworks, this paper aims to elucidate the legal remedies accessible to victims in India. It explores the roles of various stakeholders including law enforcement agencies, regulatory bodies, and financial institutions in mitigating the impact of such cybercrimes. Furthermore, this study provides practical insights and recommendations to enhance the efficacy of legal recourse for victims, fostering a safer digital environment in India. The findings of this research are instrumental in augmenting the existing legal framework and strengthening the mechanisms to combat cyber threats effectively.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Keywords: Phishing attacks, legal remedies, awareness, comparative study.

  License

Creative Commons Attribution 4.0 and The Open Definition



Call For Paper July 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer