To see the other types of publications on this topic, follow the link: Convention on Cybercrime.

Journal articles on the topic 'Convention on Cybercrime'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Convention on Cybercrime.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Popko, V. V., and E. V. Popko. "International legal regulation of transnational cybercrime in cyberspace." Uzhhorod National University Herald. Series: Law 66 (November 29, 2021): 276–83. http://dx.doi.org/10.24144/2307-3322.2021.66.46.

Full text
Abstract:
The article considers the international legal regulation of combating cybercrime, which is considered as a transnational phenomenon. In the group of transnational crimes, along with drug trafficking, terrorist acts, money laundering, illegal import of migrants, human trafficking, firearms trafficking, counterfeiting, etc., cybercrimes play an important role in terms of public harm, unprecedented and rapid growth. The mechanisms and directions of the fight against cybercrime developed by international criminal law are studied, among which the international legal regulation is of fundamental imp
APA, Harvard, Vancouver, ISO, and other styles
2

Madsen, Wayne. "Cybercrime Convention Steams Ahead." Network Security 2001, no. 5 (2001): 6. http://dx.doi.org/10.1016/s1353-4858(01)00512-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bunga, Dewi. "Legal Response to Cybercrime in Global and National Dimensions." PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 06, no. 01 (2019): 69–89. http://dx.doi.org/10.22304/pjih.v6n1.a4.

Full text
Abstract:
Cybercrime is a serious crime in the era of globalization. This crime employs sophisticated technology and anonymity. It is fast, crosses states’ borders, and has a wide impact. Cybercrime causes both material and immaterial losses. It even threatens world peace and security. The legal issue in this research is to discuss the international response to cybercrime, the substance of the Convention on Cybercrime, Budapest, 23.XI.2001, and Indonesia's position in the Convention on Cybercrime. The international response to cybercrime is done by holding international meetings at the United Nations Co
APA, Harvard, Vancouver, ISO, and other styles
4

Bunga, Dewi. "Legal Response to Cybercrime in Global and National Dimensions." PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 06, no. 01 (2019): 69–89. http://dx.doi.org/10.22304/pjih.v6n1.a4.

Full text
Abstract:
Cybercrime is a serious crime in the era of globalization. This crime employs sophisticated technology and anonymity. It is fast, crosses states’ borders, and has a wide impact. Cybercrime causes both material and immaterial losses. It even threatens world peace and security. The legal issue in this research is to discuss the international response to cybercrime, the substance of the Convention on Cybercrime, Budapest, 23.XI.2001, and Indonesia's position in the Convention on Cybercrime. The international response to cybercrime is done by holding international meetings at the United Nations Co
APA, Harvard, Vancouver, ISO, and other styles
5

Doneva, Natasa. "Cybercrime regulations: need for a new international approach?" Optime 13, no. 2 (2022): 167–80. http://dx.doi.org/10.55312/op.v13i2.377.

Full text
Abstract:
Cybercrimes, cyber terrorism and cyber war are the pandemic of the 21st century. This problem existed before, but lately they have spread with a rapid speed, and have modified from their basic appearance, which makes them difficult to follow. The purpose of this paper is to show the need for a cyber convention of a new kind, and to explain the need for better international legal framework. The paper is “dealing “first with the European Convention of Cybercrime and its use. Also having in mind that the cyber field is not only consisted from cybercrimes/ offences but also with cyber terrorism an
APA, Harvard, Vancouver, ISO, and other styles
6

Abdelbaqi, Mustafa. "Enacting Cybercrime Legislation in an Endeavour to Counter Cybercrime in Palestine." Global Journal of Comparative Law 5, no. 2 (2016): 226–61. http://dx.doi.org/10.1163/2211906x-00502003.

Full text
Abstract:
The rapid development of information and communication technology has increased the opportunities for criminals to commit cybercrime. As many countries, Palestine faces problems countering cybercrime from both the legislative and technical perspectives. Palestinian courts deal with the matter using one of two approaches. In some instances, public prosecutors choose not to prosecute the act due to the fact that there is no provision of law applicable to the conduct. In others, they adapt the related conventional provisions of the Criminal Code to the conduct. To counter cybercrime, the Palestin
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Robert, and Mark Perry. "Fake News and the Convention on Cybercrime." ATHENS JOURNAL OF LAW 7, no. 3 (2021): 335–58. http://dx.doi.org/10.30958/ajl.7-3-4.

Full text
Abstract:
The COVID-19 pandemic and the recent term of the United States President, Donald Trump, brought the term “fake news” to the attention of the broader community. Some jurisdictions have developed anti-fake news legislation, whilst others have used existing cybercrime legislation. A significant deficiency is the lack of a clear definition of fake news. Just because a person calls something “fake news” does not mean that it is indeed false. Especially during pandemics, the primary aim should be to have misinformation and disinformation removed quickly from the web rather than prosecute offenders.
APA, Harvard, Vancouver, ISO, and other styles
8

Murphy, Sean D. "Hate-Speech Protocol to Cybercrime Convention." American Journal of International Law 96, no. 4 (2002): 973–75. http://dx.doi.org/10.2307/3070700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wicki-Birchler, David. "The Budapest Convention and the General Data Protection Regulation: acting in concert to curb cybercrime?" International Cybersecurity Law Review 1, no. 1-2 (2020): 63–72. http://dx.doi.org/10.1365/s43439-020-00012-5.

Full text
Abstract:
Abstract The Budapest Convention and the General Data Protection Regulation (GDPR)—two Legal Frameworks designed to curb cybercrime. While the Convention on Cybercrime of the Council of Europe, the Budapest Convention, is the only binding international instrument on this issue, the GDPR is globally setting standards in data protection Law. How are the two policies working to curb cybercrime? Cybercrime concerns every person, every company, every authority and every public institution. The fact that the origin as well as the target of the criminal act can be located virtually everywhere around
APA, Harvard, Vancouver, ISO, and other styles
10

YERJANOV, Timur Keldeshevich, Zulfiya Mazhitovna BAIMAGAMBETOVA, Aliya Mazhitovna SERALIEVA, Zhanat ZHAILAU, and Zhuldyz Talgatovna SAIRAMBAEVA. "Legal Issues Related to Combating Cybercrime: Experience of the Republic of Kazakhstan." Journal of Advanced Research in Law and Economics 8, no. 7 (2018): 2286. http://dx.doi.org/10.14505//jarle.v8.7(29).30.

Full text
Abstract:
This paper deals with the legal issues related to combating cybercrime in the global information and communication networks through comparative analysis of relevant legislation of the Republic of Kazakhstan and Western European countries. The purpose of this research is to identify the specific features of present cybercrime, to develop a conceptual framework, to specify new forms of cybercrime and to find the main directions in combating cybercrime. The research methodology was based on dialectical, comparative legal, sociological, system-structural and statistical methods, as well as on soci
APA, Harvard, Vancouver, ISO, and other styles
11

Herzog, Felix. "Straftaten im Internet, Computerkriminalitat und die Cybercrime Convention." Política criminal 4, no. 8 (2009): 475–84. http://dx.doi.org/10.4067/s0718-33992009000200006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kierkegaard, Sylvia. "Cybercrime convention: narrowing the cultural and privacy gap?" International Journal of Intercultural Information Management 1, no. 1 (2007): 17. http://dx.doi.org/10.1504/ijiim.2007.014368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ra, Kwang Hyun, and Hea Sung Yoon. "A Review of Empirical Studies Regarding Cybercrime Convention." Criminal Investigation Studies 5, no. 1 (2019): 49–73. http://dx.doi.org/10.46225/cis.2019.06.5.1.49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Grigaitytė, Ugnė, and Miglė Mackevičiūtė. "Nusikaltimai virtualioje erdvėje – šiuolaikiniai Iššūkiai ir prevencijos galimybės." Vilnius University Open Series, no. 4 (November 16, 2020): 274–94. http://dx.doi.org/10.15388/os.tmp.2020.13.

Full text
Abstract:
The article presents an analysis of the virtual crimes, its problematic aspects, inter alia, prevention opportunities. Discussing types of virtual crimes, content aspects in the context of nowadays challenges, illegal acts’ measures. Regulatory reviews at national, European Union and international level, considered by the competent intitutions, as well as case law. Convention on cybercrime, adopted in 2001, extensively covering and legally regulating crimes, commited through virtual space, a comparison with Lithuanian legislation, including criminal code. The work emphasizes latency of cybercr
APA, Harvard, Vancouver, ISO, and other styles
15

Yoon, Haesung, and Kwanghyun Ra. "Recedence issues for accession to the Convention on Cybercrime." Gachon Law Review 12, no. 3 (2019): 201–26. http://dx.doi.org/10.15335/glr.2019.12.3.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Cassim, Fawzia. "Formulating specialised Legislation to address the Growing Spectre of Cybercrime: A Comparative Study." Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad 12, no. 4 (2017): 35. http://dx.doi.org/10.17159/1727-3781/2009/v12i4a2740.

Full text
Abstract:
The article looks at cyber legislation formulated to address cybercrime in the United States of America, the United Kingdom, Australia, India, the Gulf States and South Africa. The study reveals that the inability of national laws to address the challenges posed by cybercrime has led to the introduction of specialised cyber legislation. It is advocated that countries should amend their procedural laws to include intangible evidence of cybercrime, as opposed to tangible evidence of traditional crimes. It is possible that new forms of cybercrime will often emerge with evolving technology; theref
APA, Harvard, Vancouver, ISO, and other styles
17

Rabinská, Ivana. "Preservation and Rendition of Computer Data in Slovak Criminal Procedure Code." International and Comparative Law Review 19, no. 2 (2019): 285–99. http://dx.doi.org/10.2478/iclr-2019-0025.

Full text
Abstract:
Summary The goal of this article is to analyse the Slovak legislation of preservation and rendition of computer data in accordance with section 90 of the Criminal Procedure Code, which was implemented in the Slovak legal order under the Convention on Cybercrime, Budapest, 23. 11. 2001. In particular, article 16 of the Convention on Cybercrime obliges the member states to adopt necessary legislative and other measures as may be necessary to enable its competent authorities to order or similarly obtain the expeditious preservation of specified computer data, including traffic data, that has been
APA, Harvard, Vancouver, ISO, and other styles
18

Yoon, Hae Sung, and Kwang Hyun Ra. "Ratification Issues on European Cybercrime Convention focusing on Preservation Order." Korean Association of Police Science Review 21, no. 3 (2019): 115–38. http://dx.doi.org/10.24055/kaps.21.3.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Tarasov, Anatoly M. "The structure and content of the convention on combating cybercrime." Bezopasnost informacionnyh tehnology 25, no. 4 (2018): 53–63. http://dx.doi.org/10.26583/bit.2018.4.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Wales, Elspeth. "Draft Council of Europe Cybercrime Convention Upsets Civil Rights Bodies." Computer Fraud & Security 2000, no. 12 (2000): 7. http://dx.doi.org/10.1016/s1361-3723(00)12021-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Rogachev, Ilya. "THE EUROPEAN CONVENTION ON CYBERCRIME IS INADEQUATE TO THE TASK." Security Index: A Russian Journal on International Security 17, no. 4 (2011): 5–8. http://dx.doi.org/10.1080/19934270.2011.609722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

M. Yasin, ASLAN. "GLOBAL NATURE OF COMPUTER CRIMES AND THE CONVENTION ON CYBERCRIME." Ankara Üniversitesi Hukuk Fakültesi Dergisi 3, no. 2 (2006): 1. http://dx.doi.org/10.1501/hukfak_0000000259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Kyung-Lyul Lee and HA GUNWOO. "A Study on the Implementation of Budapest Convention on Cybercrime." Korean Journal of Comparative Criminal Law 19, no. 4 (2018): 501–34. http://dx.doi.org/10.23894/kjccl.2018.19.4.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Tosoni, Luca. "Rethinking Privacy in the Council of Europe's Convention on Cybercrime." Computer Law & Security Review 34, no. 6 (2018): 1197–214. http://dx.doi.org/10.1016/j.clsr.2018.08.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Wirasisya, Muhammad Granit Ady, and Tulus Warsito. "Penolakan European Convention On Cybercrime Oleh Rusia Dalam Mempertahankan Kepentingan Nasional." Jurnal Surya Kencana Satu : Dinamika Masalah Hukum dan Keadilan 12, no. 1 (2021): 96. http://dx.doi.org/10.32493/jdmhkdmhk.v12i1.10210.

Full text
Abstract:
Cepatnya perkembangan teknologi dan komunikasi memunculkan sebuah dunia baru, yaitu dunia cyber atau cyberspace. Hal ini memiliki dampak kepada pembuatan kebijakan negara. Cepatnya perkembangan teknologi dan informasi tidak dapat diikuti oleh negara-negara menyebabkan diperlukannya kerjasama antar negara untuk memperkokoh dan mengharmonisasikan kebijakan didalam dunia cyber. Kejahatan yang terjadi didalam dunia cyber termasuk kedalam kejahatan internasional karena tempat pelaku melakukan kejahatan tidak sama dengan target yang dituju. Penelitian ini dilakukan untuk melihat bagaimana kebijakan
APA, Harvard, Vancouver, ISO, and other styles
26

이기수 and Min, Shou-Xuan. "Review revision of law for strengthening cooperation between Korea and China on cybercrime - Based on European Convention on Cybercrime -." Korean Journal of Comparative Criminal Law 19, no. 4 (2018): 535–57. http://dx.doi.org/10.23894/kjccl.2018.19.4.023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

최혁두. "The review of implementing legislation for the adoption of Convention on Cybercrime." 치안정책연구 32, no. 3 (2018): 379–404. http://dx.doi.org/10.35147/knpsi.2018.32.3.379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Edgar-Nevill, Denis. "The EU ECENTRE Project." International Journal of Cyber Warfare and Terrorism 3, no. 4 (2013): 10–21. http://dx.doi.org/10.4018/ijcwt.2013100102.

Full text
Abstract:
Since the EU Cybercrime Convention in 2000 (EU 2001), there has been a clear recognition of the accelerating threats to society posed by those who would exploit computers for crime and the logical progression to cyber-terrorism and cyberwarfare. Since that time the capacity to deal with cybercrime (crimes involving the use of computers) has improved but the problem has grown alarmingly. The European Commission recognises the increasing threat of cybercrime and has committed significant research and development funding in seeking to protect the community from cybercrime and cyberwar. This paper
APA, Harvard, Vancouver, ISO, and other styles
29

Clough, Jonathan. "The Council of Europe Convention on Cybercrime: Defining `Crime’ in a Digital World." Criminal Law Forum 23, no. 4 (2012): 363–91. http://dx.doi.org/10.1007/s10609-012-9183-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Permana, Wahyu Priyanka Nata. "Reviewing Information and Electronic Transaction Act from a Convention on Cybercrime of 2001." Jurnal Hukum Novelty 12, no. 2 (2021): 267. http://dx.doi.org/10.26555/novelty.v12i2.a17679.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Thanh Luong, Hai. "CYBERCRIME IN LEGISLATIVE PERSPECTIVES: A COMPARATIVE ANALYSIS BETWEEN THE BUDAPEST CONVENTION AND VIETNAM REGULATIONS." International Journal of Advanced Research in Computer Science 10, no. 3 (2019): 1–12. http://dx.doi.org/10.26483/ijarcs.v10i3.6414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Park, Jae Sung. "Development of New International Treaties to Combat Cybercrime - Second Additional Protocol to the Budapest Convention and the UN Resolution for a New Cybercrime Treaty -." Justice 185 (August 31, 2021): 246–84. http://dx.doi.org/10.29305/tj.2021.08.185.246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Markova, Elena. "Regulation of liability for offences committed with the use of electronic funds of payment in the legislation of the countries of Romano-Germanic of legal system." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2020, no. 3 (2020): 98–105. http://dx.doi.org/10.35750/2071-8284-2020-3-98-105.

Full text
Abstract:
The article is devoted to the study of the regulation of criminal liability for crimes committed using electronic means of payment related to cybercrime in the legislation of certain foreign countries of the Romano-Germanic legal family. The article notes that the Romano-German legal system is significantly distinguished from other families not only by the fact that it possesses, due to historical traditions, many characteristics of the law of ancient Roman jurisprudence, but also by the legal peculiarities of criminal legislation on cybercrime. The relevance of cybercrime, its differentiation
APA, Harvard, Vancouver, ISO, and other styles
34

Nguyen, Dr Chat Le, and Dr Wilfred Golman. "Diffusion of the Budapest Convention on cybercrime and the development of cybercrime legislation in Pacific Island countries: ‘Law on the books’ vs ‘law in action’." Computer Law & Security Review 40 (April 2021): 105521. http://dx.doi.org/10.1016/j.clsr.2020.105521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Skrypnyk, A. V. "SOME PROBLEMS OF THE CONVENTION ON CYBERCRIME IMPLEMENTATION INTO THE CRIMINAL PROCEDURE LAW OF UKRAINE." Juridical scientific and electronic journal, no. 6 (2020): 101. http://dx.doi.org/10.32782/2524-0374/2020-6/24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Nowicka, Julia, and Marta Zaroślak. "ACTIVITIES FOR PROTECTION OF YOUNG CYBERSPACE USERS." Rocznik Bezpieczeństwa Morskiego XV - Wydanie specjalne (July 5, 2021): 1–16. http://dx.doi.org/10.5604/01.3001.0015.6695.

Full text
Abstract:
The study indicates actions taken to ensure the safety of minor network users. Prophylactic activity and methods of reacting in the case of identification of perpetrators of prohibited acts are described. It was assumed that in the area of cybersecurity, avoiding threats concerns the educational space, hence information, education and social campaigns play an important role in contemporary social functioning. The study presents the formal and legal framework for the protection of cyberspace users, the functioning of which is determined, among others, by the Convention on the Rights of the Chil
APA, Harvard, Vancouver, ISO, and other styles
37

Kadir, Nadiah Khaeriah, Judhariksawan Judhariksawan, and Maskun Maskun. "Terrorism and Cyberspace: A Phenomenon of Cyber-Terrorism as Transnational Crimes." FIAT JUSTISIA:Jurnal Ilmu Hukum 13, no. 4 (2019): 333. http://dx.doi.org/10.25041/fiatjustisia.v13no4.1735.

Full text
Abstract:
The advancement of information technology is changing the pattern of radical group propaganda from conventional methods to the ways they use today, namely using the media and cyberspace, or what is also called as cyber-terrorism. The purpose of this study is to discuss the emergence of the currently experienced cyber-terrorism phenomenon. It is normative research through a literature study method by approaching statutes. The results of this study indicate that cyber-terrorism is a part of cybercrime that is qualified as transnational crime which refers to Article 3 of the United Nations Conven
APA, Harvard, Vancouver, ISO, and other styles
38

Ķinis, Uldis, and Ņikita Sinkevičs. "Automatizētās datu apstrādes sistēmā esošo datu kontrole (Kriminālprocesa likuma 219. pants): nacionālie un starptautiskie piemērošanas aspekti." SOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law 1, no. 19 (2021): 90–109. http://dx.doi.org/10.25143/socr.19.2020.1.090-109.

Full text
Abstract:
Raksta tapšanas ideja ir saistīta ar Valsts policijas iesniegto priekšlikumu Tieslietu ministrijas Kriminālprocesa ekspertu pastāvīgajai darba grupai par grozījumiem Kriminālprocesa likuma 219. panta otrajā daļā. Kriminālprocesa likuma 219. pants “Automatizētās datu apstrādes sistēmā esošo datu kontrole” būtībā ir analogs Kibernoziegumu konvencijas 19. pantam, kas uzliek dalībvalstīm pienākumu pieņemt tādus tiesību aktus, kas atvieglotu to teritorijā esošo sistēmu pārmeklēšanu. Priekšlikuma būtība: atteikties pantā no nacionālās teritoriālās piemērošanas klauzulas, jo tā ierobežojot policijas
APA, Harvard, Vancouver, ISO, and other styles
39

Alkiviadou, Natalie. "Regulating hatred: Of devils and demons?" International Journal of Discrimination and the Law 18, no. 4 (2018): 218–36. http://dx.doi.org/10.1177/1358229118796029.

Full text
Abstract:
Hate speech and hate crime are an anathema to any society. On a United Nations level, the central tools to tackle such hatred are Article 20(2) of the International Covenant on Civil and Political Rights and Article 4 of the International Convention on the Elimination of All Forms of Racial Discrimination. On a Council of Europe level, the Additional Protocol to the Cybercrime Convention tackles racist and xenophobic material, threats and insults as well as revisionist rhetoric transmitted and disseminated through computer systems. On a European Union level, there is the Framework Decision on
APA, Harvard, Vancouver, ISO, and other styles
40

Sorbán, Kinga. "The Evolution of Content-Related Offences and Their Investigation During the First 20 Years of the Cybercrime Convention." Hungarian Yearbook of International Law and European Law 9, no. 1 (2021): 305–27. http://dx.doi.org/10.5553/hyiel/266627012021009001017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kolouch, Jan. "Evolution of Phishing and Business Email Compromise Campaigns in the Czech Republic." Academic and Applied Research in Military and Public Management Science 17, no. 3 (2018): 83–100. http://dx.doi.org/10.32565/aarms.2018.3.6.

Full text
Abstract:
Cyberspace is an environment in which cyber-attacks can be committed. Fraudulent attacks are one of the oldest cyber-attacks of all. The aim of this article is to familiarize the reader with the evolution of phishing and Business Email Compromise (BEC) attacks that occurred to a large extent in the cyberspace of the Czech Republic from 2014 to 2018. The article describes scam, phishing and BEC definitions, as well as individual ways of implementing specific attacks. Special attention is also paid to the possible criminal liability of the attacker for the described cyber-attacks, both according
APA, Harvard, Vancouver, ISO, and other styles
42

Orji, Uchenna Jerome. "The African Union Convention on Cybersecurity: A Regional Response Towards Cyber Stability?" Masaryk University Journal of Law and Technology 12, no. 2 (2018): 91–130. http://dx.doi.org/10.5817/mujlt2018-2-1.

Full text
Abstract:
Following the liberalization of telecommunication markets in African States, and the increasing availability of wireless technologies and broadband capacity, the levels of Internet penetration and ICT access in Africa has continued to grow in a phenomenal manner since the beginning of the new millennium. Internet use statistics indicate that Africa’s Internet user population grew from about four and a half million people in 2000 to about 400 million people in December, 2017. However, widespread ICT access and Internet penetration in Africa has also raised concerns over the need to promote cybe
APA, Harvard, Vancouver, ISO, and other styles
43

Pool, R. L. D., and B. H. M. Custers. "The Police Hack Back: Legitimacy, Necessity and Privacy Implications of The Next Step in Fighting Cybercrime." European Journal of Crime, Criminal Law and Criminal Justice 25, no. 2 (2017): 123–44. http://dx.doi.org/10.1163/15718174-25022109.

Full text
Abstract:
In an attempt to strengthen the position of the police to fight cybercrime, the Dutch government proposed new legislation giving police agencies new investigative powers on the Internet. This proposed legislation is controversial as it allows police agencies to hack into computers and install spyware. This paper examines the background and contents of the proposed legislation and tries to answer the question to what extent these new investigative powers may result in infringements of the right to privacy and other fundamental rights of citizens, and whether these infringements are justified. T
APA, Harvard, Vancouver, ISO, and other styles
44

Aliyev, Nazim, and Andrey Borbat. "Transnational Organized Crime in the Era of Globalization." Russian Journal of Criminology 14, no. 3 (2020): 431–40. http://dx.doi.org/10.17150/2500-4255.2020.14(3).431-440.

Full text
Abstract:
The authors analyze versatile manifestations of globalization, the internationalization of the global community development in the modern technogenic conditions, and conclude that these processes lead not only to positive, but, unfortunately, also to negative consequences. Specifically, they focus on the qualitative and quantitative changes in the heterogeneous structure of the so-called transnational organized crime. It is claimed that the most dangerous of them are cybercrimes, drug-related crimes, and human trafficking, which became the object of theoretical and empirical research. The stud
APA, Harvard, Vancouver, ISO, and other styles
45

de Hert, Paul, Cihan Parlar, and Juraj Sajfert. "The Cybercrime Convention Committee's 2017 Guidance Note on Production Orders: Unilateralist transborder access to electronic evidence promoted via soft law." Computer Law & Security Review 34, no. 2 (2018): 327–36. http://dx.doi.org/10.1016/j.clsr.2018.01.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Jina Cha. "Efficient Measures to Cope with Cybercrimes and the Constitutional Protection of Communication Secret: - In the perspective of Amendment of Protection of Communications Secrets Act According to the Convention on Cybercrime -." Public Law Journal 14, no. 1 (2013): 39–70. http://dx.doi.org/10.31779/plj.14.1.201302.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

MOISE, Adrian Cristian. "CONSIDERATIONS OF CRIMINAL LAW AND FORENSIC SCIENCE REGARDING THE ILLEGAL ACCESS TO A COMPUTER SYSTEM." Agora International Journal of Juridical Sciences 11, no. 2 (2018): 49–57. http://dx.doi.org/10.15837/aijjs.v11i2.3160.

Full text
Abstract:
Starting from the provisions of Article 2 of the Council of Europe Convention on Cybercrime and from the provisions of Article 3 of Directive 2013/40/EU on attacks against information systems, the present study analyses how these provisions have been transposed into the text of Article 360 of the Romanian Criminal Code. Illegal access to a computer system is a criminal offence that aims to affect the patrimony of individuals or legal entities.The illegal access to computer systems is accomplished with the help of the social engineering techniques, the best known technique of this kind is the u
APA, Harvard, Vancouver, ISO, and other styles
48

Nizami, Syeda Marrium. "Causes, Prevention and Law Concerned With Cyber Child Pornography." International Journal for Electronic Crime Investigation 2, no. 4 (2018): 9. http://dx.doi.org/10.54692/ijeci.2018.020422.

Full text
Abstract:
One of innocent creature of this universe is children and sexually harassing innocent children under the age of eighteen via internet is called child pornography. It is an alarming cybercrime today. People involved in these acts use animated cartoons, films, videos, images and magazines to satisfy sexual desires. This article describes the types of child pornography, associated risk factors and preventive legal measures adopted in Pakistan and worldwide. Access to internet and uncontrolled usage has led to increased child molestation cases. Paedophile cases in Pakistan led to the formulation o
APA, Harvard, Vancouver, ISO, and other styles
49

Nizami, Syeda Marrium. "Causes, Prevention and Law Concerned With Cyber Child Pornography." International Journal for Electronic Crime Investigation 2, no. 4 (2018): 9. http://dx.doi.org/10.54692/ijeci.2019.030122.

Full text
Abstract:
One of innocent creature of this universe is children and sexually harassing innocent children under the age of eighteen via internet is called child pornography. It is an alarming cybercrime today. People involved in these acts use animated cartoons, films, videos, images and magazines to satisfy sexual desires. This article describes the types of child pornography, associated risk factors and preventive legal measures adopted in Pakistan and worldwide. Access to internet and uncontrolled usage has led to increased child molestation cases. Paedophile cases in Pakistan led to the formulation o
APA, Harvard, Vancouver, ISO, and other styles
50

Basdeo, Vinesh M., Moses Montesh, and Bernard Khotso Lekubu. "SEARCH FOR AND SEIZURE OF EVIDENCE IN CYBER ENVIRONMENTS: A LAW-ENFORCEMENT DILEMMA IN SOUTH AFRICAN CRIMINAL PROCEDURE." Journal of Law, Society and Development 1, no. 1 (2014): 48–67. http://dx.doi.org/10.25159/2520-9515/874.

Full text
Abstract:
Investigating, deterring and imposing legal sanctions on cyber-criminals warrants an international legal framework for the investigation and prosecution of cybercrime. The real-world limits of local, state and national sovereignty and jurisdiction cannot be ignored by law-enforcement officials. It can be a strenuous task to obtain information from foreign countries, especially on an expedited basis – more specifically when the other country is in a different time zone, has a different legal system, does not have trained experts and uses different languages. In South Africa existing laws appear
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!