top of page

Cyber Victimization of Women in Assam: Types, Issues and Challenges

Paper Details 

Paper Code: RP-VBCL-37-2025

Category: Research Paper

Date of Publication: April 20, 2025

Citation: Prof. Stuti Deka & Miss Smitarini Chamuah, “Cyber Victimization of Women in Assam: Types, Issues and Challenges", 2, AIJVBCL, 539, 539-553 (2025).

Author Details: Prof. Stuti Deka, Professor, Arunachal University of Studies, Namsai, Arunachal Pradesh

Miss Smitarini Chamuah, Research Scholar, Arunachal University of Studies, Namsai, Arunachal Pradesh




ABSTRACT

With the advancement of technology in this digital age, criminals have found new ways to exploit vulnerabilities and target individuals, especially women. Cyber crimes have emerged as a significant threat to traditional crimes in terms of prevalence and impact. The rise of cyber crimes against women highlights the urgent need to address these issues and protect the rights and safety of women in the digital realm. In this paper, discussion has been made on situational analysis of cyber crimes against women in Assam and  various types of Cyber crimes upon women and how adversely it affects them. This study has been conducted on women's cybercrime victimization and how current laws, rights, and regulations protect women. The current legislative and regulatory frameworks must be reviewed in order to satisfy women's specific reporting, prosecution, and prevention needs. It also briefly examine the various laws that exist to protect the dignity of women and observe the lack of infrastructure and an effective administration that has created a void in countering Cyber crimes, effectively, particularly in the Assam.

Keywords: Cyber crimes, Types of Cyber crimes, Victimization, Technology, Artificial Intelligence. 


INTRODUCTION

Information and Internet technology is the axis of global and technical evolution. The world of internet provides each and every individual all the necessary information quickly by communication and share-out tool which makes it the most important beginning source of information. With the development of technology,cyber crimes, the victimization of women, and the objectification of women are on the rise, which poses a serious threat to one's safety and mental health. Cyber space has wide-eyed doors to cyber criminal and for the most part generally women are on their target. With the advanced of technology the way of conducting crime is becoming more sophisticated and complex.[2]

In an era defined by rapid technological advancement and digital interconnectedness, the world has witnessed the emergence of a disquieting and pervasive menace. Education plays a vital role in empowering women to protect themselves from these crimes. By raising awareness about the potential risks and vulnerabilities associated with the cyber world, individuals can take proactive measures to safeguard their privacy and security.1 Understanding the root causes behind these online crimes is essential to develop effective prevention and intervention strategies. Loopholes will be explored to provide a comprehensive analysis of the problem. This paper uncovers the harsh realities faced by women in the digital realm, shedding light on the alarming statistics that underscore the urgency of addressing this pressing concern.

Cyber Crime is a criminal offense in the legal system of India. Women are thought to be more vulnerable than men, making them more likely to be victims of cybercrime. Since the past 10 to 15 years, cybercrime against women has escalated significantly. Ultimately, this phenomena has an impact on society as a whole. Despite being a global issue, cybercrime also has a negative impact on Indian society. The number of crimes against women is increasing daily, despite the fact that in Indian culture we revered women as divine figures. Crimes against women are increasingly a global issue rather than merely a regional one. Crimes against women are a major issue both in Assam and India, reflecting the unequal distribution of dominating power between men and women, where men continue to play the superior position and women are treated as inferior.[3] It is quite difficult to understand that violence against women still exists in all spheres of society including social, political, and economic, in the age of digital India (Mishra, 2018). Internet allows free exchange of ideas and information over a large geographic region which results in an alarmingly high prevalence of reckless behavior. One of the key concerns in criminal and penal law is the vulnerability and protection of women. Through its users the World Wide Web disseminates content. The transcendental jurisdiction of internet causes the major threat to the society in the form of cybercrime (Gaikwad,2022).

CLASSIFICATION OF CYBER CRIMES AGAINST WOMEN

Amongst the various cyber-crimes committed against individuals and societyat large, crimes that are specifically targeting women are as follows: –

1.      Cyber-stalking: It is one of the most prevalent crimes in the current era. It entails tracking an individual's movements via the Internet. It is more common among women who are stalked by men, as well as children who are stalked by human predators or podophiles. Cyber Stalking is one of the most widespread net crimes in the modern world. The word ‘stalking’ means ‘pursuing stealthily’. Cyber stalking can be used interchangeably with online harassment and online abuse.[4] It is the use of the Internet or other electronic means to stalk or harass a person.[5] The utilization of technology allows stalkers to harass their target from oceans away.

2.      Cyberbullying: Cyber bullying has become an unfortunate consequence of increased online participation and interactions.  Cyber bullying behaviour exhibit both short and long term effects having both significant and severe emotional and social repercussions. These repercussions include but are not limited to the following: social anxiety, depression, anger, substance abuse, eating disorders, self-harm, suicidal ideation and in some cases suicide. The act of using online platforms, such as social media, email, or messaging apps, to harass, intimidate, or threaten someone.

3.      Morphing: Modifying the original picture and manipulating it by an unauthorized user with a fake identity and then uploading or reloading them after editing is known as morphing. Millions of women's pictures are downloaded and photo shopped by fake users and again re-posted on different websites by creating fake profiles .It was observed that female’s pictures are downloaded from websites by fake users and again re- posted/uploaded on different websites by creating fake profiles after editing them. This amounts to violation of IT Act, 2000. The violator can also be booked under IPC also for criminal trespass under Section 441, Section 290 for committing public nuisance, Section 292A for printing or publishing grossly indecent or scurrilous matter or matter intended to blackmail and under Section 501 for defamation.

4.      Email Spoofing: A spoofed e-mail may be said to be one, which misrepresents its origin.[6]It shows its origin to be different from its actual source. E-mail spoofing is a term used to describe fraudulent email activity in which the sender’s address and other parts of the email header are altered to appear as though the email originated from a known or authorized source. It is a term used to describe fraudulent email activity in which the sender’saddressandother partsoftheemailheader arealteredto appearasthoughthe email originated from a known or authorized source.

5.      Cyber Defamation: Cyber tort including libel and defamation is another common crime against women in the net. Although this can happen to both genders, but women are more vulnerable. This occurs when defamation takes place with the help of computers and/or the Internet when someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person's friends. This occurs when someone publishes defamatory matter about someoneonawebsiteorsendse-mailscontainingdefamatoryinformationtoallofthat person’s friends.Although this can happen to both genders, women are seen as more vulnerable in this area.[7]

6.      Trollingand GenderBullying:Thetwo most under-researched issues inthearenaof cybercrime against women in India are gender bullying and trolling. On the internet, womenaswellasyoungteenagersaretargetedbybullies.Thetrollpostsareessentially provocative posts intended to produce a large volume of frivolous responses.

7.      ArtificialIntelligence:

ArtificialIntelligence the most popular termused nowadays.Artificialintelligence has alreadybeenriskingmanyofourjobopportunitiesandcreativity.Artificialintelligence (AI)referstothesimulationofhumanintelligenceinmachinesthatareprogrammedto think and learn like humans. It involves the development of computer systems or algorithms that can perform tasks that typically require human intelligence, such as visualperception,speechrecognition,decision-making,andproblem-solving.Inrecent timesAI has rapidlytakena turntowards the cyber threats and enhanced it.7 TodayAI has updated many routes of cyber threats such as-

a)      Cybersecurity Attacks: AI-powered hacking tools are used for launching cyber-attacks, such as phishing campaigns, malware distribution, or autonomous botnets.

b)      Deepfake Fraud: AI-generated fake videos or audio recordings used for spreadingmisinformation,blackmailing,orimpersonatingothersforfraudulent purposes.

c)      Autonomous Weapons: AI-controlled weapons systems used in warfare or terrorist attacks, potentially leading to unintended casualties or escalating conflicts.

d)     FraudDetectionEvasion:CriminalsuseAIalgorithmstomanipulatepatterns in financial transactions or generate fake identities to evade fraud detection systems.

e)      SocialEngineeringAttacks:AI-powered chatbotsorvoice assistants are used todeceiveindividualsandmanipulatethemintorevealingsensitiveinformation or engaging in fraudulent activities.8

OBJECTIVES

·         To study women's vulnerability to cybercrime, how often they are victimized.

·         To assess the effectiveness of existing laws, rights, and regulations in combating cybercrime against women and highlightthelacunaintheexistingsysteminensuring justicetowomen.

·         To raise awareness of gendered cybercrime victimization and the necessity for gender sensitive policies and initiatives among the public and legislators.


RESEARCH PROBLEM

Despite increased awareness of cybercrime, investigation has been conducted on female cybercrime victimization and how current laws, rights, and regulations protect women. Cybercrime victimization disproportionately impacts women, hence gendered power dynamics and differences influence how women view cybercrime. To address women's distinctive reporting, prosecution, and prevention needs, the present legislative and regulatory frameworks must be evaluated. By addressing this research issue, the study may improve legal and legislative responses to women's cybercrime victimization while also advancing gender equality and justice in the digital age.

HYPOTHESIS

·         Despite the existence of legal and regulatory frameworks, there are significant gaps and weaknesses in the protection and assistance provided to victims of cybercrime who are female.

·         Due to the gendered nature of cybercrime victimization, women face unique challenges in reporting, prosecuting, and preventing cybercrime, and the existing legal and regulatory frameworks are insufficient to address these obstacles.

METHODOLOGY

For this study, a mixed-methods approach has been done to examine into the prevalence of cybercrimes against women in Assam. The research utilized both primary and secondary sources to provide a comprehensive analysis. The primary survey consisted ofstructured and semi-structured questionscovering variousaspectsofcybercrimes against women through social media platforms, email, and relevant online forums.Atotal of 167respondentsfromthedifferentregionsofAssamparticipatedinthesurvey.Thesecondary resources collected through articles from reputable national and regional newspapers, online news portals, and government reports. This secondary data gave insights into the number of reported cases, emerging trends, and the extent of media coverage related to cybercrimes against women.

Thefollowingarelawsthat explicitlyhandleCyber crimesagainst women

BHARATIYA  NYAYA SANHITA (BNS)[8]

 

SL. No.

Offences

Sections

Statutes

1.

Publication and transmission of obscene material

Section 294

Addresses the publication and transmission of obscene material, including electronically. The punishment includes imprisonment and fines, with harsher penalties for repeat offenses.

2.

Voyeurism

Section 77

Specifically deals with capturing or publishing pictures of private parts or acts of a woman without consent, constituting "voyeurism."

3.

Theft, robbery and extortion

Section 303

This section specifically addresses theft related to mobile phones, data, or computer hardware/software. It offers a legal framework to prosecute individuals engaged in cyber theft activities. However, the applicability of special laws like the IT Act takes precedence in cases where they are attracted.

4.

Stalking

Section 78

Addresses the offence of stalking in both physical and cyber forms. Imposes imprisonment and fines for monitoring or bothering a woman through physical or electronic means.

5.

Stolen property

Section 317

Applies when an individual receives stolen mobile phones, computers, or data. There is a punishment for even possession of such property, even by third parties.

6.

Defamation

Section 356

Penalizes defamation, including sending defamatory content through email. Imposes imprisonment and fines.

5.

Forgery

Section 336

Deals with offenses like email spoofing and online forgery. Imposes imprisonment, fines, or both. This section also applies when forgery aims to harm a person's reputation.

THE INFIRMATION TECHNOLOGY ACT,2000(ITAct)

IT Act 2000 is an act of the Indian Parliament to deal with cybercrime and e-commerce. This is a law that applies to India as well as persons outside India if the crime involves the usage of a computer with the internet. It provides a legal framework for e-governance which gives recognition to electronic records and digital signatures. This act also describes the penalties for cybercriminals. As per new amendment, section 66 is substituted by Act 10 of 2009 and thus, subsections 66(1) and 66(2) has been removed from the amendment and has been now merged in section 66 itself.[9]

The Information Technology Amendment Act 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act 2000. The Information Technology Amendment Act was passed by the Indian Parliament in October 2008 and came into force a year later. The act is administered by the Indian Computer Emergency Response Team (CERT-In) and corresponds to the Indian Penal Code. The Information Technology Amendment Act has been widely hailed as a progressive step forward in protecting India's cyber infrastructure and citizens. It is one of the most comprehensive pieces of legislation addressing IT-related issues and sets a strong precedent for other countries working to update their own laws. In addition, the Information Technology Amendment Act established the office of the Cyber Appellate Tribunal to hear appeals from any person aggrieved by an order made under the act. In recent years, the IT Act has also been updated to include provisions for the regulation of intermediaries, penalties for cybercrime and restrictions on certain types of speech. These changes included expanding the definition of cybercrime and adding new penalties for offenses such as identity theft, publishing private images without consent, cheating by impersonation, and sending offensive messages or those containing sexually explicit acts through electronic means.[10]

The ITAct of 2000 was revised twice, first in 2006 and then in 2008, in response to the riseinCyber crimes.10ThereareseveralpartsoftheInformationTechnology(Amendment) Act of 2008 that regulate Cyber crimes.

a.       Section 66C- Identity Theft: This law makes it illegal to steal someone's online identity. If someone fraudulently uses another person's electronic signature, password, or unique identification features, theycan be punished withup to three years in prison and a fine of up to one lakh rupees.

b.      Section66E- PrivacyViolation:This sectionprotects a person's privacyonline. If someonecaptures,publishes,orsharesimagesofaprivatepartofsomeonewithout theirconsentandinawaythatinvadestheirprivacy,theycanfaceuptothreeyears in prison and a fine.

c.       Section 67- Obscene Content: This section prohibits the publication, sharing, or transmission of obscene content online. It's similar to the obscenity law in the Indian Penal Code.

d.      Section 67A - Sexually Explicit Material: This law deals with sexually explicit contentonline.Sharingsuchmaterialcanleadtoimprisonmentforuptofiveyears and a fine for the first conviction.

e.       Section 67B - Child Sexual Content: This section focuses on the publication or sharing of sexually explicit content involving children. It's a serious offense, and those found guilty can face significant penalties.


BHARATIYA SAKSHYA ADHINIYAM, 2023

The Bharatiya Sakshya Adhiniyam, 2023,(BSA) is to consolidate and to provide for general rules and principles of evidence for fair trial . BSA 2023- section 2 definitions illustration 2(vi) states that an electronic record; (e) "evidence" and sections in BSA 2023 are related to technological crimes such as ,- Section 39. Opinions of experts. Section 40. Facts bearing upon opinions of experts explore the digital evidence to produce in the court of law. Section 45 Opinions of third persons when relevant. Certain cyber crimes may not be explicitly covered under the Information Technology Act, depending on jurisdiction and circumstances. While some aspects may fall under the Indian Penal Code/Bharatiya Nyaya Sanhita, cyber bullying, online scams, cyber stalking, revenge porn, and cyber extortion lack specific provisions in the Information Technology Act 2000/2008. Therefore, it is essential for law enforcement agencies and policymakers to adapt to emerging cyber threats and continually update legislation to address new forms of cybercrime effectively.[11]

Digital Personal Data Protection Act, 2023

Personal data is information that relates to an identified or identifiable individual.  Businesses as well as government entities process personal data for delivery of goods and services. The Act shall apply to the processing of Personal Data in India, including both online and digitized offline data, and shall further extend to the processing of such data outside India relating to the offering of goods or services in India. Processing personal data allows understanding preferences of individuals, which may be useful for customization, targeted advertising, and developing recommendations.  Processing personal data may also aid law enforcement. Unchecked processing may have adverse implications for the privacy of individuals, which has been recognized as a fundamental right. It may subject individuals to harm such as financial loss, loss of reputation, and profiling. As technologies like Artificial Intelligence advance and permeate various aspects of daily lives, the potential for extensive data collection, analysis, and manipulation grows exponentially.[12] 


NATIONAL CYBER CRIME REPORTING PORTAL

The Indian government launched the National Cyber Crime Reporting Portal as a way to give people a way to report Cyber crimes online. It enables people to report a variety of Cyber crimes, including phishing schemes, identity theft, financial fraud, and online abuse. The goal of this service is to make it simple for law enforcement to report Cyber crimes and to take the necessary action.


CYBER CELLS AND CYBER CRIME INVESTIGATION  UNINTS

Specialized law enforcement units dedicated to the investigation and prosecution of Cyber crimes are known as cyber cells or cyber crime investigation units. These units are usually formed at different levels, including municipal, state, or federal, inside police departments or other law enforcement organizations. Numerous Cyber crimes, including as hacking, virus assaults, online fraud, identity theft, cyberbullying, and other forms of cyber exploitation, are looked into by cyber cells and cybercrime investigation units. All things considered, Cyber Cells and Cyber Crime Investigation Units are essential to tackling the increasing problems brought about by Cyber crimes and guaranteeing the security and safety of people, companies, and vital infrastructure in the digital age.[13]

ANALYSIS OF THE PILOT STUDY ON CYBER VICTIMIZATION

This survey consisted ofstructured and semi-structured questions in the form of questioner  covering various aspects of cybercrimes against women. We disseminated the survey through social media platforms, email, and relevant online forums.Atotalof 167 respondents fromAssam participated in the survey. Our survey questionnaire was designed to investigate the prevalence of cybercrimes experienced by people and the response of the Administration towards the crime. Among the participants,62.9% were women, and responses were gathered from across India. This pilot study provides insights into cyber victimization and awareness levels among both women and men.

     Resultsand Findings of the results of the pilot study

In our online survey, we gathered responses from167 respondents in four distinct age groups. The distribution of respondents across these age groups are as follows:

·         15to25years:83.2%ofrespondents

·         26to35years:12.6%ofrespondents

·         36to45years:3%ofrespondents

·         46andabove:1.2%ofrespondents

Gender-wiseparticipationinoursurveywasasfollows:

·         Femalerespondents:62.9%

·         Malerespondents: 37.1%

i.            Women Respondents’ Knowledge of Their Victimization

The study covered (15 to 50 years) male and female respondents and 74% of respondents felt that women are more vulnerable in the cyber space than men. This study covered 62.9%  of female respondents. Among this 62.9%  of respondents, only 11.% are aware that they had bad encounters in the cyberspace. Furthermore, 85%of female respondents reported receivingabusive emails containing pornographic images, erotic messages, or inappropriate contentfrom various sources ranging from known individuals, acquaintances from social networking sites, to complete strangers. However, 15% of these respondents dismissed such messages as ‘trash’ and did not perceive them as a concern. Consequently, when asked whether they had received abusive messages that bothered them, these respondents answered "No".

ii.            Awareness of Cyber Cultures

Among the 167 respondents (including 37.1% Men and 62.9% Women), 67.7% are aware of the basic age limit for joining any cyber community / groups / social networking sites. It is interesting to note that this group of respondents, knowing well about the minimum age limit of users for joining social networking sites etc, allows their children besides spouses, to use their internet ids, which we understand, is a risky act. Additionally, the findings indicate that 67.7% of respondents acknowledged experiencing cybercrime, while 32.3% reported not being victims. This suggests that while a majority recognize cyber risks, their personal security practices may not always align with their awareness.

Figure.1:

This pie chart illustrates the prevalence of cybercrime victimization among the 167 respondents:

·    32.3% (blue) reported being victims of cybercrime, experiencing issues like hacking, scams, cyberstalking, or morphing.

·    67.7% (red) stated they had not been victims of any cyber-related offenses.

This finding suggests that cybercrime is a significant issue, with nearly one-third of respondents having experienced it directly. However, the actual number of victims may be higher, as some individuals may not recognize or report their victimization.

iii.            Awareness of Legal Rights / Laws

Our research highlights that awareness of cyber crimes and legal knowledge plays a crucial role in encouraging victims to report crime. Among the 167 respondents, 84.4% were aware that hacking, creation of pornography / distributing the same, distribution obscene materials etc are criminal offences but they did not report these crimes to the authorities; 15.6% understood that cyber bullying, cyber stalking, sending annoying, defaming messages etc can be penalized took the step to report it. These finding suggest that lack of trust in the reporting process or feelings of insecurity may discourage victims from seeking legal recourse.

Figure 2:


This pie chart visually represents the reporting behaviour of cybercrime victims. The key insights from this chart include:

·      84.4% of respondents did not report their cybercrime experiences to the police or cyber cell.

·      Only 15.6% of victims reported their cases to the authorities.

This reinforces the finding that despite high awareness of cybercrime laws (84.4%), a significant proportion of victims choose not to report incidents. This reluctance may stem from lack of trust in law enforcement, fear of social stigma, or perceived inefficacy of the legal system.

iv.            Reporting behaviour of Cyber Victims

Our research study showed that among the 167 respondents 83.2% of respondents indicated the need for specific cybercrime laws in India, while 16.8% of respondents held the opposite view.

Figure 3:


This pie chart highlights the response of authorities to reported cybercrime incidents:

·         16.8% (blue) of respondents stated that the authorities took appropriate action regarding their complaints.

·         83.2% (red) reported that no effective action was taken by the authorities.

This finding suggests a lack of trust in the reporting process, which may discourage victims from seeking help. It raises concerns about law enforcement’s efficiency in handling cybercrime cases.

FINDINGS

Thesefindingsshowthatmanypeoplehaveexperiencedcybercrimes,butmostofthem don'treport it to the authorities. Those whodo report it often feel that the authorities don't do enough and this is quite concerning. People also think there's a lack of technology and trained staff to deal with cybercrimes. Many believe that India needs specific laws to deal with cybercrimes.

·         Establishing the infrastructure and measures to prevent and combat cybercrimes is essential. The government's efforts inthis area have been successfulincertaincities,buttheyhaven'tbeenaseffectiveinpreventingcybercrimes across all over India.

·         To make the internet safer for everyone, it's crucial for the government to expand its cybersecurity measures and infrastructure across the country as well we in regional level.11

·         Despiteoflackofinfrastructurehasalsoseensomeprogress,somecitiesofAssamhave seen improvements incybersecurity, but manyother regions ofthe northeasternstates have lagged behind, leading to an increase in cybercrimes.12 The Assam Police has taken steps to combat cybercrime by establishing four cyber police stations. Two of them are located in Guwahati, headed by a Deputy Superintendent of Police, and will coverspecific jurisdictions.Additionally,therearecyberpoliceOutpostsinDibrugarh and Silchar as well.

CONCLUSION

The fact that the prime approach for tackling any form of crime would be the enactment of a strong legislation for curbing the menace. However, the fact that we live in the era of globalizationand internet cannot beignored.Assuch,onlythelegalcontrolapproachmaynot reap us successful outcomes. For the smooth running of any organization or nation, reaching or establishing a platform or a common ground where sensible discussions can be conducted for greater goodofthesocietyatlarge ispertinent. Thus, insteadofusingtheblockingrule on the moderntechnologies, it would be ideal if the government devised ways inwhich boththe freedom and privacy could be enjoyed without creating any grounds of chaos and conflict. Keeping intact the value of fundamental rights is equally appreciated in the modern times as well. Another aspect to be highlighted here is the concept of responsibility sharing. For the purposeofhandling and addressing theuniqueand newkind ofcyber threats, acombined and unified action and effort is the need of the hour. Further, it is equally important to take note that the nature of cyber crime is unique and different than the other conventional crimes and with the ever growing use of internet, the cyber crime is here to stay and it will be nearly impossible to completely to do away with the problem of cyber crimes.

 


* Professor, Arunachal University of Studies, Namsai, Arunachal Pradesh

**Research Scholar, Arunachal University  of Studies, Namsai, Arunachal Pradesh

[2]D.Halder, &K. Jaishankar, Cyber-crime and the Victimization of Women: Laws, Rights, and Regulations. (Hershey, PA, USA: IGI Global. ISBN: 978-1-60960- 830-9.2011)

[3]S.R. Balabantaray, U. Pani, A sociological study of cybercrimes against women in India: Deciphering the causes and evaluating the impact on the victims (International Journal of Asia Pacific Studies 19 (1)2023)23–49

[4] B Muthukumaran, Cyber Crime Scenario in India,(CRIMINAL INVESTIGATION DEPARTMENT REVIEW- JANUARY 2008) 18-23

[5]K.V. Ravi Kumar, Cyber stalking and Online harassment in India: A socio-Legal Analysis, (International Journal of Law, Education, Social and Sports Studies (IJLESS) Volume: 5, Issue 1, 2018)

[7]Harpreet Singh Dalla & Ms. Geeta, Cyber Crime – A Threat to Persons, Property, Government and Societies, (International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue-5, May 2013)

[8] The Bharatiya Nyaya Sanhita, 2023

[9]The Information Technology Act, 2000. 

[10]The Information Technology(Amendment )Act, 2008

[11]Bharatiya Sakshya Adhiniyam, 2023

[12]Digital Personal Data Protection Act, 2023

[13]Shanta Barman, Cybercrime Against Women : How Cybercrime Targets Women's Privacy and Security, (East Indian Journal of Social SciencesVol-VII)



Related Posts

See All

Comments


QUICK NAVIGATION

PUBLISHER CONTACT DETAILS

Prof. Raghunath K.S, 
Principal, 
Vaikunta Baliga College of Law, 
Kunjibettu, Udupi, 
Karnataka: 576102
Email: vbcllawreview@gmail.com
Mobile : 6363768001

© VBCL2025

Website created by Aequitas Victoria Foundation

bottom of page