A Project Work Proposal

Submitted By:
Bikash Karki
Nepal Law Campus
T.U. Reg. No: 7-1-7-1141-2006
 Exam Roll No: 70033 (LLB 1st Year)
Campus Roll No: 3442/072

Submitted To:
Research Department of
Nepal Law Campus
Tribhuvan University

In Partial Fulfillments of the Requirements for the Degree of
Bachelor of Law (LLB 3rd Year)

Exhibition Road, Kathmandu, Nepal
January, 2018

1.1 General Background
Computers and the Internet has now become backbone for virtually all facets of modern life, from personal communications and finance to the processing and management of electrical grids and power plants are being dependent with computer and internet. In today's 21st Century, our lives have been dominated by computers and communication networks. The advent of computers has had far-reaching effects and, although some people may not have had the opportunity to navigate the “digital highway” directly, they probably have been touched in other ways. Although the growth of technology in present era has resulted in flaunt of commercial growth, thriving economies and spread of democracy, on the other hand it has also resulted in increment of cost. One such cost that we now face is a new twist on traditional crime–cybercrime. Criminological research has expanded its focus over the last two decades to address the various forms of technology-enabled crime and the applicability of traditional theories to account for offending. The rapid growth of the information and communication technology (ICT) networks in cyberspace has created new opportunities for criminals in perpetrating crime, and to exploit online vulnerabilities and attack countries’ critical information infrastructure. As a result of intensification of information technology, the modus operandi in commission of crime has resulted in abet of technology in committing crime. The crime of fraud or defamation or forgery that used to be committed traditionally by use of paper or verbal way have now turned to be committed in social networking or e-commerce. These crimes have been occurring since the creation of the internet and technology. If there is information to be shared, there is information to be sabotaged. The challenge is countered by every online individual, company or organization across the globe.
Nepal, a landlocked country positioned in South Asia cannot be exceptional territory for commission of cybercrime. The incidence of cybercrime in Nepal is directly proportional to the level of progress made in Nepal in information technology. The internet users in Nepal have been rampantly increased. As per the data provided by International Monetary Fund, there were 50,000 internet users in Nepal in 2000 which has increased to 2,690,162 in 2012 as on 2017 it increased to 6,400,000 According to the World Bank; internet penetration had reached 13.3 percent in Nepal as of December 2013. Increase in internet user has certainly increased the instances of cybercrime in Nepal. As discussed in later chapter of this thesis, newspaper reports, police reports, the database of the police, judicial decisions and data from scholars' articles support the fact that Nepal has been evidenced as a hub for increasing cybercrime in recent days. The media almost daily reports cases regarding cybercrime in Nepal, which however is not same when researcher examines the report of courts and police, which means that the instances of cybercrime are either unreported or the perpetrator is not invoked with offence. The thesis aims to address the issue of instances of cybercrime being unreported or not being invoked. Thus this thesis broadly intends to highlight the present modus operandi of instances of cybercrime and evaluate whether or not the existing substantive laws of Nepal have been able to address the growing new pattern of commission of crime.

1.2 Statement of the Problems
·        Does Nepal have any system to track down convicts of online misuse of information system?
·        Does the law helped to control cyber crime?

1.3 Objectives of the Study

·        To explore best legal provision in regards with cyber law.
·        To explore the issues & challenges in relation to cyber law and its administration of Nepal.
·        To know the previous data related to cyber crime in Nepal.

1.4Limitations of the Study
This study will have some limitations. Basically the study is done far partial fulfillment of Bachelor of Law. Time constraints, financial problem and lack of research experience will be the primary limitations and the research is mostly doctrinal based on intensive literature review and desk review. Empirical work is done taking very limited purposive samples.

1.5 Importance/signification of study
This study aims to come up with the research based findings on the legal problems and challenges faced by the private sector in electronic transaction system. The study will benefit the researchers, the government and private stakeholder in electronic transaction sector, the academicians, professors and student to understand where changes are required in the near future. The study, through its findings, will also help to induce changes in the laws where it is required.
1.6 Organization of the Study
The study is organized into fifth chapters. The titles of each of these chapters are summarized and the contents of each of these chapters of this study are briefly mentioned below:-
Chapter-I: Introduction
The first chapter of the study is introduction, which highlighted the basic information of the research area, various problems, objectives, importance, limitations and organization of the study with the subject matter consisting of historical information of Cyber Crime and Cyber law in Nepal.
Chapter-II: Review of Literature
The second chapter of the study assures readers that they are familiar with important research that has been carried out in similar areas by earlier scholars in related areas. It also establishes that the study link in a chain of research that is developing and emerging knowledge about concerned field.
Chapter-III: Research Methodology
The third chapter describes the research methodology adopted in carrying out the present research. It deals with research design, sources of data, data processing procedures, population and sample and period of the study.
Chapter-IV: Data Presentation and Analysis
The fourth chapter is concerned with presentation, analysis and interpretation of data. The segment where the data required for the study are presented analyzed and interpreted by using the tools and technique in specified form to meet the stated objectives of the study.
Chapter-V: Summary, Conclusion and Recommendation
The fifth and the final chapter are concerned with the suggestive framework that consists with the overall findings, conclusions and recommendations of the study.
Besides above chapters, this study paper consist a separate appendix and bibliography for those materials and books which are used in the process of preparing this thesis report. It also gives important suggestions to the concerned organization for better improvement.

Previous Post Next Post