GGU Law Digital Commons

  • < Previous

Home > Student Scholarship > THESES > 89

Theses and Dissertations

The legal and regulatory aspect of international cybercrime and cybersecurity: limits and challenges.

Nnesochi Nweze-Iloekwe , Golden Gate University School of Law

Date of Award

Degree type.

Dissertation

Degree Name

Doctor of Law (SJD)

First Advisor

Professor Rr. Remigus Chibueze

Second Advisor

Professor Dr. Christian Nwachukwu Okeke

Third Advisor

Professor Dr. Andrew Conteh

The development of the internet and digital technologies represent a major opportunity for humanity in transforming businesses and providing new tools for everyday communication. Internet users are spending increasing amounts of time online and undertaking a greater range of online and social networking activities. However, just like a double edged sword, the internet also presents opportunities to cybercrimes in the Information society. The nature of some ‘traditional’ crime types has been transformed by the use of computers and other information communications technology (ICT) in terms of its scale and reach, with risks extending to many aspects of social life, such as financial transactions, sexual offences, harassment and threatening behavior, and commercial damage and disorder.

Cybercrime is a transnational menace in the sense that it cuts across borders. The most critical challenges of the information society have been the security of digital data and information systems and the prevention of the malicious misuse of information communications technologies by cyber criminals, terrorist groups, or state actors. Measures to address these security challenges of the information society birthed a concept known as “cyber security”. Cyber security seeks to promote and ensure the overall security of digital information and information systems with a view to securing the information society. Thus, the concept is broadly concerned with social, legal, regulatory and technological measures that will ensure the integrity, confidentiality, availability and the overall security of digital information and information systems in order to achieve a high degree of trust and security necessary for the development of a sustainable information cyber space.

This dissertation contends that, on the one hand, International laws are behind in providing proper regulatory coverage for cybercrime, while, on the other hand, existing regulations have largely been unsuccessful in containing cyber security threats primarily due to complications caused by the disharmonization of cyber security laws and regulation. This dissertation also attempts to discuss the legal and regulatory aspects of cyber security in International law. An analysis of international, regional and national regulatory responses to cyber security in both developed and developing countries was made. It calls attention to the limits and challenges of these regulatory responses in the promotion of cyber security and explores several regulatory measures to address the highlighted challenges with a view to promoting global cyber security. It suggests several regulatory measures to enhance global cyber security and also emphasizes the need for the collective responsibility of states for global cyber security.

Recommended Citation

Nweze-Iloekwe, Nnesochi, "The Legal and Regulatory Aspect of International Cybercrime and Cybersecurity: Limits and Challenges" (2022). Theses and Dissertations . 89. https://digitalcommons.law.ggu.edu/theses/89

Since March 17, 2022

Included in

Computer Law Commons , International Law Commons , Internet Law Commons

Advanced Search

  • Notify me via email or RSS
  • Collections
  • Disciplines

Author Corner

Home | About | FAQ | My Account | Accessibility Statement | Golden Gate University School of Law

Privacy Copyright

Open Access Te Herenga Waka-Victoria University of Wellington

Cybercrime: Traditional Problems and Modern Solutions

The following thesis shall provide an analysis of the unique challenges which have arisen from the growing phenomenon that is cybercrime. This thesis shall then provide insight into and discussion around how these challenges can be addressed. The technological landscape in which organised cybercriminals operate presents unique challenges to law makers, investigators, and prosecutors. A useful analogy to describe this environment is that of the ungoverned lawless Wild West. This is an environment in which traditional methods of law enforcement and regulation struggle to be implemented efficiently. This struggle calls for new methods of regulation to be explored.

Cybercrime creates a number of unique challenges. The key challenges can be summarised as follows. The first, is the loss of data and difficulty in recording and analysing data as evidence. This difficulty is aggravated by the challenge of uncovering whether a cybercrime has taken place. The second challenge is the loss of location, namely the difficulty in establishing where the perpetrator of a cybercrime is located. The third and one of the biggest challenges associated with cybercrime, that is transnationality. While states are limited by the entrenched principles of jurisdiction, cybercriminals are not. Cybercriminality occurs across borders, which brings into focus the challenge of international cooperation which is endemic to any attempt to address cybercrime. One of the final challenges to regulating this space is the dichotomy between private and public actors, and the role of private actors in regulating the technological space and preventing cybercrime from occurring.

The majority of law relating to cybercrime occurs at a national level. Most jurisdictions rely on an approach grounded in the criminalisation of cybercrime. This approach is limited by the inherent reactive and consequence focused nature of criminalisation and the limitations of traditional jurisdictional boundaries of states. Consequently, although criminal law can be used to address the underlying criminal act it is not effective at preventing cybercrime. The limitations of a criminal law based approach necessitates consideration of alternative methods which can proactively address cybercrime.

A proactive regulatory approach is better suited to addressing the challenge posed by cybercrime. The boundaries between law, regulation, and social control are best described and viewed as a continuum. Along this continuum there are various options, configurations, and solutions which can be implemented. This spectrum includes options such as, government regulation, co-regulation, smart regulation, and self-regulation. These alternative approaches emphasis greater private sector responsibility. What is clear is that a solely criminal law focused response is not effective in isolation. It must be complimented by alternative effective forms of regulation which involve greater private sector involvement. Through being able to utilise all the instruments available it is proposed that the best possible solution to addressing cybercrime be achieved.

Copyright Date

Date of award, rights license, degree discipline, degree grantor, degree level, degree name, anzsrc type of activity code, victoria university of wellington item type, victoria university of wellington school, usage metrics.

Theses

  • Criminal law

Cyber crime: a comparative law analysis

  • UnisaIR Home
  • Electronic Theses and Dissertations

Show full item record

Files in this item

Icon

Copyright Statement

This item appears in the following collection(s).

  • Theses and Dissertations (Jurisprudence) [84]
  • Unisa ETD [12519] Electronic versions of theses and dissertations submitted to Unisa since 2003

Search UnisaIR

All of unisair.

  • Communities & Collections
  • By Issue Date

This Collection

  • View Usage Statistics

Capacity, capability, and collaboration: a qualitative analysis of international cybercrime investigations from the perspective of Canadian investigators

  • Best Practice Reports
  • Published: 20 October 2023
  • Volume 4 , pages 415–429, ( 2023 )

Cite this article

law dissertation on cybercrime

  • Ryan Buhrig   ORCID: orcid.org/0000-0002-3045-5677 1  

169 Accesses

1 Altmetric

Explore all metrics

Globalization and the proliferation of technology facilitate increased opportunities to commit cybercrime. Given its transnational and technical nature, cybercrime presents a unique challenge for law enforcement. Effective investigations often require international cooperation, as the victim, suspect, and evidence can be physically located in different jurisdictions. Existing research is primarily theoretical and does not explore the experiences of law enforcement investigators navigating treaties and legal frameworks in practice. Through six semi-structured interviews with specialized police investigators, this study investigates the challenges of international cybercrime investigations. Participants described a lengthy and complicated formal mutual legal assistance requests process and instead relied on informal assistance and joint investigations. They also faced challenges obtaining data evidence from transnational corporations and expressed the need for improved training and international networking opportunities. These experiences offer recommendations to facilitate the capability, capacity, and collaboration necessary to combat cybercrime globally.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

Similar content being viewed by others

law dissertation on cybercrime

Police and Cybercrime: Evaluating Law Enforcement’s Cyber Capacity and Capability

law dissertation on cybercrime

Police and Extralegal Structures to Combat Cybercrime

law dissertation on cybercrime

Explore related subjects

  • Artificial Intelligence

Alain (2001) Transnational police cooperation in Europe and in north america: revisiting the traditional border between internal and external security matters, or how policing is being globalized. Eur J Crime Crim Law Crim Justice 9(2):113–129. https://doi.org/10.1163/15718170120519354

Article   Google Scholar  

Bowling B (2009) Transnational policing: the globalization thesis, a typology and a research agenda. Policing 3(2):149–160. https://doi.org/10.1093/police/pap001

Braun V, Clarke V (2006) Using thematic analysis in psychology. Qual Res Psychol 3(2):77–101. https://doi.org/10.1191/1478088706qp063oa

Brenner SW (2012) Cybercrime and the law: challenges, issues, and outcomes. UPNE

Google Scholar  

Brenner SW (2013) Crime online. In: Jewkes Y (ed) Cybercrime: re-thinking crime control strategies. Routledge, pp 12–28

Buhrig R (2023) The case for case-based learning in police recruit training. Police J. https://doi.org/10.1177/0032258X231181322

Bulanova-Hristova G, Kasper K, Odinot G, Verhoeven M, Pool R, de Poot C, Werner Y, Korsell L (2016) Cyber-OC—Scope and manifestation in selected EU member states (Text Volume 50). Bundeskriminalamt Criminalistic Institute. https://bra.se/bra-in-english/home/publications/archive/publications/2016-12-28-cyber-oc---scope-and-manifestation-in-selected-eu-member-states.html . Accessed 14 August 2023

Campina A, Rodrigues C (2022) Cybercrime and the council of europe Budapest convention: prevention, criminalization, and international cooperation. Book Full Pap Int Zeugma Conf Sci Res 1(1):112–123

Chan G, Aylward S (2016) FBI v. Apple and beyond: Encryption in the Canadian Law of Digital Search and Seizure. J Data Prot Priv 1(1):103–119

Council of Europe (2023) Second additional protocol—cybercrime. https://www.coe.int/en/web/cybercrime/second-additional-protocol . Accessed 14 August 2023

Cybercrime Convention Committee (2013) T‑CY assessment report: the mutual legal assistance provisions of the budapest convention on cybercrime

de da Arimatéia CJ (2020) The legislative framework of the European Union (EU) convention on cybercrime. In: Holt TJ, Bossler AM (eds) The Palgrave handbook of international cybercrime and cyberdeviance. Springer, Berlin Heidelberg, pp 223–237 https://doi.org/10.1007/978-3-319-78440-3_5

Chapter   Google Scholar  

de Hert P, Parlar C, Thumfart J (2018) Legal arguments used in courts regarding territoriality and cross-border production orders: from Yahoo Belgium to Microsoft Ireland. New J Eur Crim Law 9(3):326–352. https://doi.org/10.1177/2032284418801562

De Paoli S, Johnstone J, Coull N, Ferguson I, Sinclair G, Tomkins P, Brown M, Martin R (2021) A qualitative exploratory study of the knowledge, forensic, and legal challenges from the perspective of police cybercrime specialists. Policing 15(2):1429–1445. https://doi.org/10.1093/police/paaa027

Denzin NK, Lincoln YS (2011) The SAGE handbook of qualitative research. SAGE

Dodge A, Spencer D, Ricciardelli R, Ballucci D (2019) “This isn’t your father’s police force”: digital evidence in sexual assault investigations. Aust N Z J Criminol 52(4):499–515. https://doi.org/10.1177/0004865819851544

Edwards G (2019) Cybercrime investigators handbook. John Wiley & Sons

Book   Google Scholar  

Government of Canada, S. C. (2019) The Daily—Self-reported fraud in Canada. https://www150.statcan.gc.ca/n1/daily-quotidien/230724/dq230724a-eng.htm . Accessed 14 August 2023

Hadlington L, Lumsden K, Black A, Ferra F (2021) A qualitative exploration of police officers’ experiences, challenges, and perceptions of cybercrime. Policing 15(1):34–43. https://doi.org/10.1093/police/pay090

Harkin D, Whelan C, Chang L (2018) The challenges facing specialist police cyber-crime units: an empirical analysis. Police Pract Res 19(6):519–536. https://doi.org/10.1080/15614263.2018.1507889

Huey L, Cyr K, Ricciardelli R (2016) Austerity policing’s imperative: Understanding the drivers of policing activity in Canada. Int J Police Sci Manag 18(2):133–139. https://doi.org/10.1177/1461355716645358

Huey L, Ferguson L (2022) Cyberpolicing in Canada: a scoping review. Sociology Publications 54 ( https://ir.lib.uwo.ca/sociologypub/54 )

Hunton P (2011) The stages of cybercrime investigations: bridging the gap between technology examination and law enforcement investigation. Comput Law Secur Rev 27(1):61–67. https://doi.org/10.1016/j.clsr.2010.11.001

Koziarski J, Lee JR (2020) Connecting evidence-based policing and cybercrime. Policing 43(1):198–211. https://doi.org/10.1108/PIJPSM-07-2019-0107

Kraft ME (2018) Public policy: politics, analysis, and alternatives. CQ Press, SAGE

Kushwaha N, Roguski P, Watson BW (2020) Up in the air: ensuring government data sovereignty in the cloud. 2020 12th International Conference on Cyber Conflict (CyCon), 1300, pp 43–61 https://doi.org/10.23919/CyCon49761.2020.9131718

Levi M (2017) Assessing the trends, scale and nature of economic cybercrimes: overview and issues. Crime Law Soc Change 67(1):3–20. https://doi.org/10.1007/s10611-016-9645-3

Liggett R, Lee JR, Roddy AL, Wallin MA (2022) The dark web as a platform for crime: an exploration of illicit drug, firearm, CSAM, and cybercrime markets. In: Holt TJ, Bossler AM (eds) The Palgrave handbook of international cybercrime and cyberdeviance, 2nd edn. Palgrave Macmillan, Cham, pp 91–116 https://doi.org/10.1007/978-3-319-78440-3

Olga M, Stefan M, Cristian J, Armen O (2022) Transnational gathering of electronic evidences: challenges and perspectives in the European Union. J Natl Inst Justice 3(62):54–60. https://doi.org/10.52277/1857-2405.2022.3(62).08

Phillips K, Davidson JC, Farr RR, Burkhardt C, Caneppele S, Aiken MP (2022) Conceptualizing cybercrime: definitions, typologies and taxonomies. Forensic Sci 2(2):2. https://doi.org/10.3390/forensicsci2020028

Popham J, McCluskey M, Ouellet M, Gallupe O (2020) Exploring police-reported cybercrime in Canada:variation and correlates. Policing 43(1):35–48. https://doi.org/10.1108/PIJPSM-08-2019-0128

Pressman, J. L., & Wildavsky, A. (1984). Implementation: How Great Expectations in Washington Are Dashed in Oakland; Or, Why It’s Amazing that Federal Programs Work at All, This Being a Saga of the Economic Development Administration as Told by Two Sympathetic Observers Who Seek to Build Morals on a Foundation (3rd ed.).

Seigfried-Spellar TJH, Bossler AM, Kathryn C (2022) Cybercrime and digital forensics: an introduction, 3rd edn. Routledge https://doi.org/10.4324/9780429343223

Sun J‑R, Shih M‑L, Hwang M‑S (2015) A survey of digital evidences forensic and cybercrime investigation procedure. Int J Netw Secur 17:497–509

Tcherni M, Davies A, Lopes G, Lizotte A (2016) The dark figure of online property crime: is cyberspace hiding a crime wave? Justice Q 33(5):890–911. https://doi.org/10.1080/07418825.2014.994658

Tosoni L (2018) Rethinking privacy in the council of europe’s convention on cybercrime. Comput Law Secur Rev 34(6):1197–1214. https://doi.org/10.1016/j.clsr.2018.08.004

Viano EC (2017) Cybercrime: definition, typology, and criminalization. In: Viano EC (ed) Cybercrime, organized crime, and societal responses. Springer, pp 3–22 https://doi.org/10.1007/978-3-319-44501-4_1

Vincze EA (2016) Challenges in digital forensics. Police Pract Res 17(2):183–194. https://doi.org/10.1080/15614263.2015.1128163

Wall D (2007) Cybercrime: the transformation of crime in the information age. Polity Press, Cambridge.

Wicki-Birchler D (2020) The Budapest convention and the general data protection regulation: acting in concert to curb cybercrime? Int Cybersecur Law Rev 1(1):63–72. https://doi.org/10.1365/s43439-020-00012-5

Download references

The author did not receive funding for this work.

Author information

Authors and affiliations.

School of Criminology, Simon Fraser University, Burnaby, Canada

Ryan Buhrig

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Ryan Buhrig .

Ethics declarations

Conflict of interest.

R. Buhrig declares that he has no competing interests.

Additional information

Publisher’s note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Buhrig, R. Capacity, capability, and collaboration: a qualitative analysis of international cybercrime investigations from the perspective of Canadian investigators. Int. Cybersecur. Law Rev. 4 , 415–429 (2023). https://doi.org/10.1365/s43439-023-00101-1

Download citation

Received : 18 August 2023

Accepted : 14 September 2023

Published : 20 October 2023

Issue Date : December 2023

DOI : https://doi.org/10.1365/s43439-023-00101-1

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Police investigations
  • Budapest Convention
  • Mutual legal assistance
  • International criminal investigation
  • Find a journal
  • Publish with us
  • Track your research
  • My Shodhganga
  • Receive email updates
  • Edit Profile

Shodhganga : a reservoir of Indian theses @ INFLIBNET

  • Shodhganga@INFLIBNET
  • Maharaja Agrasen University
  • Maharaja Agrasen School of Law
Title: Prevention of Cyber Crimes in India A Comparative Study
Researcher: Sunidhi Kashyap
Guide(s): 
Keywords: Law
Social Sciences
Social Sciences General
University: Maharaja Agrasen University
Completed Date: 2021
Abstract: newline The Internet in India is increasing in the era of 21st century rapidly which gave rise to the new opportunities in various fields like entertainment, business, sports, education and many more. As the Internet users are growing fast, there are some advantages as well as disadvantages. Cyber-crimes are the latest entrants in the long list of various types of crimes which are continuously bothering the mankind. newlineThe need for Cyber law came into existence due to the crimes which are done by the people virtually which have no boundaries and may affect any country across the globe. Thus, there is a dire need of such law which is necessary for the prevention of computer related crime. newlineCyber-crimes are mainly concerned with all the criminal activities which are done using the various communication devices like computers, tablets, mobile phones, the internet, cyberspace, and the World Wide Web. But these crimes can be done on those individuals also who don t have any knowledge of computers or Internet. newlineThe Parliament of India has taken into consideration the recommendations of General Assembly in the form of Information Technology Act, 2000. The benefit of coming into existence this Act is that it further amended the Indian Penal Code, 1860, The Indian Evidence Act, 1872, the Bankers Books Evidence Act,1891 and the Reserve Bank of India Act,1934. The Information Technology Act makes the international trade easier and secondly it is an alternative to the paper-based methods of communication and storage of information. There was also a beginning at international level to combat the problem of International Cyber Crime Convention which came into force on November 23, 2001. As on August 30, 2016, 55 countries have become signatory to this convention. newlineIn Indian Constitution also right to privacy has been defined as the right of person to enjoy his own presence by himself and decides his boundaries of physical, mental, and emotional interaction with another person. From this we can easily observe that privacy
Pagination: 
URI: 
Appears in Departments:
File Description SizeFormat 
Attached File525.33 kBAdobe PDF
536.44 kBAdobe PDF
1.72 MBAdobe PDF
480.02 kBAdobe PDF
520.63 kBAdobe PDF
287.91 kBAdobe PDF
182.44 kBAdobe PDF
2.05 MBAdobe PDF
393.74 kBAdobe PDF
303.56 kBAdobe PDF
239.33 kBAdobe PDF

Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Shodhganga

law dissertation on cybercrime

FEATURES OF INTERNATIONAL LEGAL COOPERATION IN COMBATING CYBER CRIME

User Images

  • Independent Co-Researcher for the Military Technical Institute of National Guard, Uzbekistan.
  • Cite This Article as
  • Corresponding Author

Cybersecurity plays an important role in the world of information technology. Securing data is one of the biggest challenges that the governments are facing today. In this case, the first thing that has to be taken into consideration is not only the implementation of solid legal measures to fight cybercrime, but also introducing specific tools that can essentially prevent those cybercrimes on rapidly growing information space. However, the effectiveness of these measures seem questionable given the global nature of the problem, unless a solid foundation for international legal cooperation is established. Thus this article looks at the existing challenges faced by governments that are adopting international legislations and conventions against cybercrime and also discuss the potential prospects of a single global framework for international cooperation in this area.

  • International Cybersecurity
  • Information Processing
  • Information Space
  • Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems. Strasbourg, 28.1.2003. Available at: https://www.coe.int/en/web/ conventions/full-list/-/conventions/treaty/189
  • Berd, K. (2009). A war with many unknown quantities. Computerra, 2009, no.20, pp. 26-29 (In Russian).
  • Communication from the Commission to the Council, the European Parliament, the Economic and Social Committee and the Committee of the Regions ?Creating a Safer Information Society by Improving the Security of Information Infrastructures and Combating Computer-related Crime?. Brussels, 26.1.2001. Available at: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52 000DC0890&from=EN
  • Convention on Cybercrime. Budapest, 23.11.2001. Available at: http://conventions.coe.int/Treaty/RUS/Treaties/ Html/185.htm
  • Convention on International Information Security (concept). Available at: https://www.mid.ru/foreign_policy/official_documents/-/asset_publisher/CptICkB 6BZ29/content/id/191666?p_p_id=101_INSTANCE_CptICkB6BZ29&_101_INSTANCE_CptICkB6BZ29_languageId=en_GB
  • Eurojust casework 2015-2019 (Eurojust infographics). Available at: http://www.eurojust.europa.eu/doclibrary/corporate/Pages/Eurojust-Infographics.aspx
  • Georgiyeva R. Konventsiyazakiberprest?pnostta. Obshchestvo i pravo [Society and Law] Sofia, 2001, no. 11, p.16. (In Bulgarian).
  • Golubev V.A. ?Kiberterrorizm? ? mifilirealnost? [?Cyber-terrorism? ? myth or reality?]. Available at: http://www.crime-research.ru/library/terror3.htm
  • Gradov A. The activities of the North Atlantic Treaty Organization in the sphere of cyber-security. Zarubezhnoevoennoeobozrenie [Foreign Military Review], 2014, no. 7, pp. 13-16 (In Russian).
  • Gradov A. The activities of the North Atlantic Treaty Organization in the sphere of cyber-security. Zarubezhnoevoennoeobozrenie [Foreign Military Review], 2014, no. 7, pp. 13?16. (In Russian).
  • Huey L., Nhan J., Broll R. Uppity civilians and cyber-vigilantes: The role of the general public in policing cyber-crime. Criminology and Criminal Justice, 2013, vol. 13, no. 1, pp. 81-97. DOI:10.1177/1748895812448086
  • Ivanov, S. and Tomilo, O. (2013).Kiberterrorizm: ugrozanatsional?noy i mejdunarodnoybezopasnosti [Cyberterrorism: national and international security threats] Available at: https://www.arms-expo.ru/news/archive/kiberterrorizm-ugroza-nacional-noy-i-mezhdunarodnoy-bezopasnosti14-03-2013-18-35-00/
  • Karpova D.N. Cybercrimes: a global issue and its solution. Vlast [The Power], 2014, no.8, pp. 46-50 (In Russian).
  • Khimchenko I.A. Informatsionnoeobshchestvo: pravovyeproblemy v usloviyakhglobalizatsii. Kand. Diss. [Information society: legal basis in the conditions of globalization. Cand. Diss.]. Moscow, 2014, 174 p.
  • Khimchenko I.A. Informatsionnoeobshchestvo: pravovyeproblemy v usloviyakhglobalizatsii. Kand. Diss. [Information society: legal basis in the conditions of globalization. Cand. Diss.]. Moscow, 2014. 174 p.
  • Morgan, S. (2019). 2019 Cybersecurity Almanac: 100 Facts, Figures, Predictions And Statistics. Available at: https://cybersecurityventures.com/cybersecurity-almanac-2019/
  • Sachkov D.I., Smirnova I. G. Obespechenieinformatsionnoibezopasnosti v organakhvlasti [Ensuring Information Security in the Bodies of Power]. Irkutsk, Baikal State University of Economics and Law Publ., 2015, 122 p.
  • Schjolberg Stein. A cyberspace treaty ? A United Nations Convention or Protocol on Cybersecurity and Cybercrime. Twelfth United Nations Congress on Crime Prevention and Criminal Justice. Salvador, Brazil, 12?19 April 2010. Available at: http://cybercrimelaw.net/documents/UN_12th_Crime_Congress.pdf
  • Sindhu K.K., KombadeRupali, GadgeReena, Meshram B.B. Forensic Investigation Processes for Cyber Crime and Cyber Space. Proceedings of International Conference on Internet Computing and Information Communications, 2012, vol. 16, pp. 193-206.
  • Smirnov A.A. EU System of Fight against Cybercrime. Bibliotekakriminalista [Criminalist?s Library], 2012, no. 2 (3), pp. 262-274 (In Russian).
  • Smith R.G., Grabosky P., Grabosky G. Criminals on Trial. Cambridge University Press, 2004. 263 p.
  • Talimonchik V.P. Mezhdunarodno-pravovoeregulirovanieotnosheniy v sfereinformatsii. Avtoref. Dokt. Diss. [International legal regulation of relations in the sphere of information. Doct. Diss. Thesis]. Saint Petersburg, 2013. 52 p.
  • Vardanyan A.V., Nikitina E.V. Rassledovanieprestupleniy v sferevisokikhtekhnologiy i kompyuternoyinformatsii [Investigation of Hi-Tech and Computer Information Crimes]. Moscow, Yurlitinform Publ., 2007, 307 p.
  • Volevodz A.G. Uchrezhdeniya i organyEvropeiskogosoyuzaposudebnomu i politseiskomusotrudnichestvu [Agencies and Bodies of the EU on court and police cooperation]. Moscow, European Studies Institute at MGIMO-University Publ., 2010. 303 p.
  • Yakimova E.M., Narutto S.V. International cooperation in cybercrime counteraction. Criminology Journal of Baikal National University of Economics and Law, 2016, vol. 10, no.2, pp. 369-378. DOI: 10.17150/1996-7756.2016.10(2).369-378. (In Russian).
  • Zavyalov S. International experience in fighting the propaganda of terrorism in the Internet. Zarubezhnoevoennoeobozrenie [Foreign Military Review], 2014, no. 4, pp. 34-39 (In Russian).
  • Zgadzai O.E., Kazantsev S.Ya. Cybercrime: factors of danger and problems of struggle. Vestnik GU ?Nauchniytsentrbezopasnostizhiznedeyatelnostidetey? [Bulletin of ?Research Center for the Security of Children?], 2013, no. 4 (18), pp. 80-86 (In Russian).
  • Yu. Cybercrimes and counteracting them (a summary). Sotsialniye i gumanitarniyenauki. Otechestvennaya i zarubezhnayaliteratura. Seriya 2, Ekonomika [Social and Humanitarian Science. Russian and Foreign Literature. Series 2, Economics], 2003, no.1, pp. 144-148 (In Russian).

[ Timur N. Butunbaev (2020); FEATURES OF INTERNATIONAL LEGAL COOPERATION IN COMBATING CYBER CRIME Int. J. of Adv. Res. 8 (May). 100-107] (ISSN 2320-5407). www.journalijar.com

Article DOI: 10.21474/IJAR01/10911       DOI URL: http://dx.doi.org/10.21474/IJAR01/10911

Download Full Paper

Share this article.

Creative Commons License

Journal of Advanced Research in Law and Economics

  • Announcements
  • AUTHOR'S GUIDELINES

The Essence and Content of Cybercrime in Modern Times

  • Karlygash ALMAZKYZY Almaty Academy of the Ministry of Internal Affairs of the Republic of Kazakhstan, Almaty, Kazakhstan
  • Yernar N. ESTEUSIZOV Almaty Academy of the Ministry of Internal Affairs of the Republic of Kazakhstan, Almaty, Kazakhstan

This article discusses the main characteristics of cybercrime as a new criminal threat to modern society. The authors attempted to explain the appearance of a new type of crime in the period of development and implementation of high technologies in all spheres of life of the world community. Using the dialectical method of cognition, as well as formal logical methods, steps in order to develop the conceptual apparatus of the investigated phenomenon of cybercrime were taken. Such terms as ‘cyberspace’ and ‘cybersecurity’ acquired the authors' explanations. According to the authors, criminality in cyberspace has been one of the most difficult problems of the international community in recent years due to the development of information and communication technologies. The article analyzes the phenomenological aspects of criminality in global information networks, discusses the definition of ‘cybercrime’, and considers the current trends in its development. Revealing the essence of the investigated type of crime, the authors analyzed the content and marked the differences of cybercrime from Internet crime, computer crime, crime in the information sphere, etc. The authors analyzed the modern normative, scientific and expert approaches to the study of the structure and state of cybercrime in the Republic of Kazakhstan. The results of the study and the conclusions of this article can be used as a theoretical contribution to the enrichment and expansion of scientific vision of cybercrime at the formation of approaches and the system of existing views, forming the concept of criminological security, and can also serve to further development of scientific ideas in the sphere of criminal law and criminological provision of prevention of cybercrime.

law dissertation on cybercrime

  • EndNote - EndNote format (Macintosh & Windows)
  • ProCite - RIS format (Macintosh & Windows)
  • Reference Manager - RIS format (Windows only)

The Copyright Transfer Form to ASERS Publishing (The Publisher) This form refers to the manuscript, which an author(s) was accepted for publication and was signed by all the authors. The undersigned Author(s) of the above-mentioned Paper here transfer any and all copyright-rights in and to The Paper to The Publisher. The Author(s) warrants that The Paper is based on their original work and that the undersigned has the power and authority to make and execute this assignment. It is the author's responsibility to obtain written permission to quote material that has been previously published in any form. The Publisher recognizes the retained rights noted below and grants to the above authors and employers for whom the work performed royalty-free permission to reuse their materials below. Authors may reuse all or portions of the above Paper in other works, excepting the publication of the paper in the same form. Authors may reproduce or authorize others to reproduce the above Paper for the Author's personal use or for internal company use, provided that the source and The Publisher copyright notice are mentioned, that the copies are not used in any way that implies The Publisher endorsement of a product or service of an employer, and that the copies are not offered for sale as such. Authors are permitted to grant third party requests for reprinting, republishing or other types of reuse. The Authors may make limited distribution of all or portions of the above Paper prior to publication if they inform The Publisher of the nature and extent of such limited distribution prior there to. Authors retain all proprietary rights in any process, procedure, or article of manufacture described in The Paper. This agreement becomes null and void if and only if the above paper is not accepted and published by The Publisher, or is with drawn by the author(s) before acceptance by the Publisher.

  • Come and join our team! become an author
  • Soon, we launch the books app stay tune!
  • Online support 24/7 +4077 033 6758
  • Tell Friends and get $5 a small gift for you
  • Privacy Policy
  • Customer Service
  • Refunds Politics

Mail to: [email protected]

Phone: +40754 027 417

IMAGES

  1. (PDF) Investigating Cyber Law and Cyber Ethics: Issues, Impacts and

    law dissertation on cybercrime

  2. Dissertation Cyber Law

    law dissertation on cybercrime

  3. CYBER LAW

    law dissertation on cybercrime

  4. (PDF) A Comparative Study of Cybercrime Law Between the United States

    law dissertation on cybercrime

  5. Cyber Law: The Legalities of Cyber Crime

    law dissertation on cybercrime

  6. Cybercrime essay

    law dissertation on cybercrime

VIDEO

  1. NVivo and Successfully Defended Dissertations

  2. Dissertation writing style tips

  3. Worst dissertation mistake

  4. UD Law Online LL.M.

  5. Dissertation Day At Law School #dissertationhelp #lawstudents #lawschoolbound #lawyers #lawyerstv

  6. CLE- Cyber Law and Ethics-TE CSE-IT- Introduction to Cyber Crime

COMMENTS

  1. PDF Dissertation Exploring the Cybercrime Capacity and Capability of Local

    cybercrime capacity and capability of local law enforcement agencies is deficient, despite trends at the local law enforcement agency level to allocate more resources to the cybercrime problem. This deficiency is noted both by response patterns on the CCCQ© and through comments

  2. Law Enforcement Officersâ Perceptions in Combating Cybercrime at the

    This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an ... streamlined cybercrime training for law enforcement officers to increase officer efficiencies in cybercrimes.

  3. Theses and Dissertations

    Nweze-Iloekwe, Nnesochi, "The Legal and Regulatory Aspect of International Cybercrime and Cybersecurity: Limits and Challenges" (2022). Theses and Dissertations. 89. The development of the internet and digital technologies represent a major opportunity for humanity in transforming businesses and providing new tools for everyday communication.

  4. The Evolving Challenges, Issues of Cybercrime, Law Enforcement

    This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Masthead Logo Link

  5. PDF Cybercrime and Analysis of Laws: a Case Study Of

    research. It concerns critical assessment of the laws governing cybercrime practices. in Zanzibar. .2. Research Design. The study methodology is qualitative. The data obtained through interview of legal. staffs and stakeholder to enable a suitable role in the study and analysed legislation.

  6. Understanding cybercrime in 'real world' policing and law enforcement

    It is widely accepted that cybercrime is highly prevalent and increasing. A recent report suggests that Internet Service Providers (ISPs) record around 80 billion automated scans daily by online perpetrators with the aim of identifying targets for cybercrime (Lewis, 2018), and in the year ending September 2019, 1 million 'computer misuse' crimes were reportedly committed against households ...

  7. PDF Cybercrime: an Analysis of Current Legislation in South Africa

    cybercrime: an analysis of current legislation in south africa

  8. (PDF) Investigating Cybercrime

    SIKS dissertation series no. 2017-01. The research reported in this thesis has ... stantive law with regard to cybercrime in the Netherlands and United States. Digital investigative methods 21. 2. ...

  9. PDF CYBERSECURITY: HOW SAFE ARE WE AS A NATION?

    This thesis will lay out the importance of connectivity in our society - from the individual user to national security and the military. I will examine the vulnerabilities, cite case studies, and look at the consequences the cyberattacks have or could have on society. To best frame my research, I will include recent cyber events and examine the

  10. Cybercrime: Traditional Problems and Modern Solutions

    The following thesis shall provide an analysis of the unique challenges which have arisen from the growing phenomenon that is cybercrime. This thesis shall then provide insight into and discussion around how these challenges can be addressed. The technological landscape in which organised cybercriminals operate presents unique challenges to law makers, investigators, and prosecutors. A useful ...

  11. Cyber crime: a comparative law analysis

    The Electronic Communications and Transactions Act, 25 of 2002, eradicated various lacunae that previously existed in respect of cyber crimes. Cyber crimes such as inter alia hacking, rogue code, unauthorised modification of data and denial of service attacks have now been criminalised. Specific criminal provisions in relation to spamming ...

  12. Introduction: new directions in cybercrime research

    Introduction: new directions in cybercrime research

  13. THE IMPACT OF CYBERCRIME AND LEGAL FRAMEWORK OF VOLUNTEERS IN ...

    The thesis concludes volunteerism as a solution to develop defensive cyber capabilities and suggests the establishment of a voluntary organization in Georgia based on Estonian example. Keywords: Cyber security, Cybercrime, Cyber defense, Volunteerism, Regulatory framework, Policy analyzing.

  14. Police and Cybercrime: Evaluating Law Enforcement's Cyber ...

    In the post-COVID-19 era, international consensus is in agreement of the threat of cybercrime being a top-level concern [].The pandemic led society and institutions to a global accelerated digitalisation, and in doing so reshaped the landscape in which cybercrime and cybersecurity operate [].With domestic statistics suggesting an 89% increase in computer misuse offences and a 25% increase in ...

  15. (PDF) An overview of cybercrime law in South Africa

    31 Maat, Cybercrime: A comparative Analysis Law Analysis (LLM Thesis, U nisa, 2004) ft 145. 32 Njabulo Mthimunye, 'The intersection between C yber Crim es laws and Data Protection laws in South

  16. Understanding the threat of cybercrime: A comparative study of

    Some of the key challenges identified in the dissertation, arising from the analysis of South Africa's cyber laws and policy framework, point to legislation that is out of date and in desperate need of revision, a lack of definitional clarity for cybercrime related terminology, jurisdiction limitations to investigate international cybercrimes ...

  17. Capacity, capability, and collaboration: a qualitative analysis of

    Globalization and the proliferation of technology facilitate increased opportunities to commit cybercrime. Given its transnational and technical nature, cybercrime presents a unique challenge for law enforcement. Effective investigations often require international cooperation, as the victim, suspect, and evidence can be physically located in different jurisdictions. Existing research is ...

  18. Shodhganga : a reservoir of Indian theses @ INFLIBNET

    The Information Technology Act makes the international trade easier and secondly it is an alternative to the paper-based methods of communication and storage of information. There was also a beginning at international level to combat the problem of International Cyber Crime Convention which came into force on November 23, 2001.

  19. Legal Research Methods for Cybercrime

    Felicity Bell, Empirical Research in Law (2016) 25(2) Griffith Law Review 266-267 Lee Epstein and Andrew D. Martin, An introduction to Empirical Legal Research (OUP 2014) viii Lee Epstein and Andrew D. Martin, An introduction to Empirical Legal Research (OUP 2014) Frans L. Leeuw and Hans Schmeets, Empirical Legal Research: A Guidance Book for Lawyers, Legislators and Regulators (Edward Elgar ...

  20. Cybersquatting ‒ a new risk of misappropriation of trademarks

    It should be noted that those rules are adjusted to the narrow meaning of the legal status and consequences of cybercrime. ... development in civil law. Dissertation Doctor of Law]. Moscow, 2011 ...

  21. Problems of Fighting Crimes on the Internet

    This article considers the problems of fighting crimes on the Internet, and defines new criminal acts committed by means of global computer networks. The aim of the study is to develop a categorical conceptual instrument, to separate a new type of cybercrime. The methodological basis of the study was the dialectic, comparative legal, sociological, systemic-structural and statistical methods as ...

  22. Features Of International Legal Cooperation In Combating Cyber Crime

    Thus this article looks at the existing challenges faced by governments that are adopting international legislations and conventions against cybercrime and also discuss the potential prospects of a single global framework for international cooperation in this area.

  23. The Essence and Content of Cybercrime in Modern Times

    This article discusses the main characteristics of cybercrime as a new criminal threat to modern society. The authors attempted to explain the appearance of a new type of crime in the period of development and implementation of high technologies in all spheres of life of the world community. Using the dialectical method of cognition, as well as formal logical methods, steps in order to develop ...

  24. Jordan's cybercrime law is a tool for repressing journalists

    Prison sentences ranging from one week to one year. Al-Zoubi, the last person convicted under the cybercrime law, is also the most severely punished. The 49-year-old journalist, founder of the news website Sawalif, and longtime columnist for the state-owned daily Al Rai, has been imprisoned since 2 July.He was sentenced to one year in prison for criticizing the Jordanian authorities on social ...

  25. 2023 cybercrime law in Jordan

    On August 12, 2023, King Abdullah II ratified a new cybercrime law, Law No. 17 of 2023, [1] which threatens Jordanians' freedom of expression, their right to anonymity, and their right to access information. [2] The law does not meet international human rights standards nor principles which are included in the country's previously ratified digital rights conventions. [3]