Social Sciences
Social Sciences General
University: | Maharaja Agrasen University |
Completed Date: | 2021 |
Abstract: | newline The Internet in India is increasing in the era of 21st century rapidly which gave rise to the new opportunities in various fields like entertainment, business, sports, education and many more. As the Internet users are growing fast, there are some advantages as well as disadvantages. Cyber-crimes are the latest entrants in the long list of various types of crimes which are continuously bothering the mankind.
newlineThe need for Cyber law came into existence due to the crimes which are done by the people virtually which have no boundaries and may affect any country across the globe. Thus, there is a dire need of such law which is necessary for the prevention of computer related crime.
newlineCyber-crimes are mainly concerned with all the criminal activities which are done using the various communication devices like computers, tablets, mobile phones, the internet, cyberspace, and the World Wide Web. But these crimes can be done on those individuals also who don t have any knowledge of computers or Internet.
newlineThe Parliament of India has taken into consideration the recommendations of General Assembly in the form of Information Technology Act, 2000. The benefit of coming into existence this Act is that it further amended the Indian Penal Code, 1860, The Indian Evidence Act, 1872, the Bankers Books Evidence Act,1891 and the Reserve Bank of India Act,1934. The Information Technology Act makes the international trade easier and secondly it is an alternative to the paper-based methods of communication and storage of information. There was also a beginning at international level to combat the problem of International Cyber Crime Convention which came into force on November 23, 2001. As on August 30, 2016, 55 countries have become signatory to this convention.
newlineIn Indian Constitution also right to privacy has been defined as the right of person to enjoy his own presence by himself and decides his boundaries of physical, mental, and emotional interaction with another person. From this we can easily observe that privacy |
Pagination: | |
URI: | |
Appears in Departments: |
|
File | Description | Size | Format | |
| Attached File | 525.33 kB | Adobe PDF | |
| | 536.44 kB | Adobe PDF | |
| | 1.72 MB | Adobe PDF | |
| | 480.02 kB | Adobe PDF | |
| | 520.63 kB | Adobe PDF | |
| | 287.91 kB | Adobe PDF | |
| | 182.44 kB | Adobe PDF | |
| | 2.05 MB | Adobe PDF | |
| | 393.74 kB | Adobe PDF | |
| | 303.56 kB | Adobe PDF | |
| | 239.33 kB | Adobe PDF | |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
FEATURES OF INTERNATIONAL LEGAL COOPERATION IN COMBATING CYBER CRIME
- Independent Co-Researcher for the Military Technical Institute of National Guard, Uzbekistan.
- Cite This Article as
- Corresponding Author
Cybersecurity plays an important role in the world of information technology. Securing data is one of the biggest challenges that the governments are facing today. In this case, the first thing that has to be taken into consideration is not only the implementation of solid legal measures to fight cybercrime, but also introducing specific tools that can essentially prevent those cybercrimes on rapidly growing information space. However, the effectiveness of these measures seem questionable given the global nature of the problem, unless a solid foundation for international legal cooperation is established. Thus this article looks at the existing challenges faced by governments that are adopting international legislations and conventions against cybercrime and also discuss the potential prospects of a single global framework for international cooperation in this area.
- International Cybersecurity
- Information Processing
- Information Space
- Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems. Strasbourg, 28.1.2003. Available at: https://www.coe.int/en/web/ conventions/full-list/-/conventions/treaty/189
- Berd, K. (2009). A war with many unknown quantities. Computerra, 2009, no.20, pp. 26-29 (In Russian).
- Communication from the Commission to the Council, the European Parliament, the Economic and Social Committee and the Committee of the Regions ?Creating a Safer Information Society by Improving the Security of Information Infrastructures and Combating Computer-related Crime?. Brussels, 26.1.2001. Available at: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52 000DC0890&from=EN
- Convention on Cybercrime. Budapest, 23.11.2001. Available at: http://conventions.coe.int/Treaty/RUS/Treaties/ Html/185.htm
- Convention on International Information Security (concept). Available at: https://www.mid.ru/foreign_policy/official_documents/-/asset_publisher/CptICkB 6BZ29/content/id/191666?p_p_id=101_INSTANCE_CptICkB6BZ29&_101_INSTANCE_CptICkB6BZ29_languageId=en_GB
- Eurojust casework 2015-2019 (Eurojust infographics). Available at: http://www.eurojust.europa.eu/doclibrary/corporate/Pages/Eurojust-Infographics.aspx
- Georgiyeva R. Konventsiyazakiberprest?pnostta. Obshchestvo i pravo [Society and Law] Sofia, 2001, no. 11, p.16. (In Bulgarian).
- Golubev V.A. ?Kiberterrorizm? ? mifilirealnost? [?Cyber-terrorism? ? myth or reality?]. Available at: http://www.crime-research.ru/library/terror3.htm
- Gradov A. The activities of the North Atlantic Treaty Organization in the sphere of cyber-security. Zarubezhnoevoennoeobozrenie [Foreign Military Review], 2014, no. 7, pp. 13-16 (In Russian).
- Gradov A. The activities of the North Atlantic Treaty Organization in the sphere of cyber-security. Zarubezhnoevoennoeobozrenie [Foreign Military Review], 2014, no. 7, pp. 13?16. (In Russian).
- Huey L., Nhan J., Broll R. Uppity civilians and cyber-vigilantes: The role of the general public in policing cyber-crime. Criminology and Criminal Justice, 2013, vol. 13, no. 1, pp. 81-97. DOI:10.1177/1748895812448086
- Ivanov, S. and Tomilo, O. (2013).Kiberterrorizm: ugrozanatsional?noy i mejdunarodnoybezopasnosti [Cyberterrorism: national and international security threats] Available at: https://www.arms-expo.ru/news/archive/kiberterrorizm-ugroza-nacional-noy-i-mezhdunarodnoy-bezopasnosti14-03-2013-18-35-00/
- Karpova D.N. Cybercrimes: a global issue and its solution. Vlast [The Power], 2014, no.8, pp. 46-50 (In Russian).
- Khimchenko I.A. Informatsionnoeobshchestvo: pravovyeproblemy v usloviyakhglobalizatsii. Kand. Diss. [Information society: legal basis in the conditions of globalization. Cand. Diss.]. Moscow, 2014, 174 p.
- Khimchenko I.A. Informatsionnoeobshchestvo: pravovyeproblemy v usloviyakhglobalizatsii. Kand. Diss. [Information society: legal basis in the conditions of globalization. Cand. Diss.]. Moscow, 2014. 174 p.
- Morgan, S. (2019). 2019 Cybersecurity Almanac: 100 Facts, Figures, Predictions And Statistics. Available at: https://cybersecurityventures.com/cybersecurity-almanac-2019/
- Sachkov D.I., Smirnova I. G. Obespechenieinformatsionnoibezopasnosti v organakhvlasti [Ensuring Information Security in the Bodies of Power]. Irkutsk, Baikal State University of Economics and Law Publ., 2015, 122 p.
- Schjolberg Stein. A cyberspace treaty ? A United Nations Convention or Protocol on Cybersecurity and Cybercrime. Twelfth United Nations Congress on Crime Prevention and Criminal Justice. Salvador, Brazil, 12?19 April 2010. Available at: http://cybercrimelaw.net/documents/UN_12th_Crime_Congress.pdf
- Sindhu K.K., KombadeRupali, GadgeReena, Meshram B.B. Forensic Investigation Processes for Cyber Crime and Cyber Space. Proceedings of International Conference on Internet Computing and Information Communications, 2012, vol. 16, pp. 193-206.
- Smirnov A.A. EU System of Fight against Cybercrime. Bibliotekakriminalista [Criminalist?s Library], 2012, no. 2 (3), pp. 262-274 (In Russian).
- Smith R.G., Grabosky P., Grabosky G. Criminals on Trial. Cambridge University Press, 2004. 263 p.
- Talimonchik V.P. Mezhdunarodno-pravovoeregulirovanieotnosheniy v sfereinformatsii. Avtoref. Dokt. Diss. [International legal regulation of relations in the sphere of information. Doct. Diss. Thesis]. Saint Petersburg, 2013. 52 p.
- Vardanyan A.V., Nikitina E.V. Rassledovanieprestupleniy v sferevisokikhtekhnologiy i kompyuternoyinformatsii [Investigation of Hi-Tech and Computer Information Crimes]. Moscow, Yurlitinform Publ., 2007, 307 p.
- Volevodz A.G. Uchrezhdeniya i organyEvropeiskogosoyuzaposudebnomu i politseiskomusotrudnichestvu [Agencies and Bodies of the EU on court and police cooperation]. Moscow, European Studies Institute at MGIMO-University Publ., 2010. 303 p.
- Yakimova E.M., Narutto S.V. International cooperation in cybercrime counteraction. Criminology Journal of Baikal National University of Economics and Law, 2016, vol. 10, no.2, pp. 369-378. DOI: 10.17150/1996-7756.2016.10(2).369-378. (In Russian).
- Zavyalov S. International experience in fighting the propaganda of terrorism in the Internet. Zarubezhnoevoennoeobozrenie [Foreign Military Review], 2014, no. 4, pp. 34-39 (In Russian).
- Zgadzai O.E., Kazantsev S.Ya. Cybercrime: factors of danger and problems of struggle. Vestnik GU ?Nauchniytsentrbezopasnostizhiznedeyatelnostidetey? [Bulletin of ?Research Center for the Security of Children?], 2013, no. 4 (18), pp. 80-86 (In Russian).
- Yu. Cybercrimes and counteracting them (a summary). Sotsialniye i gumanitarniyenauki. Otechestvennaya i zarubezhnayaliteratura. Seriya 2, Ekonomika [Social and Humanitarian Science. Russian and Foreign Literature. Series 2, Economics], 2003, no.1, pp. 144-148 (In Russian).
[ Timur N. Butunbaev (2020); FEATURES OF INTERNATIONAL LEGAL COOPERATION IN COMBATING CYBER CRIME Int. J. of Adv. Res. 8 (May). 100-107] (ISSN 2320-5407). www.journalijar.com
Article DOI: 10.21474/IJAR01/10911 DOI URL: http://dx.doi.org/10.21474/IJAR01/10911
Download Full Paper
Share this article.
Journal of Advanced Research in Law and Economics
- Announcements
- AUTHOR'S GUIDELINES
The Essence and Content of Cybercrime in Modern Times
- Karlygash ALMAZKYZY Almaty Academy of the Ministry of Internal Affairs of the Republic of Kazakhstan, Almaty, Kazakhstan
- Yernar N. ESTEUSIZOV Almaty Academy of the Ministry of Internal Affairs of the Republic of Kazakhstan, Almaty, Kazakhstan
This article discusses the main characteristics of cybercrime as a new criminal threat to modern society. The authors attempted to explain the appearance of a new type of crime in the period of development and implementation of high technologies in all spheres of life of the world community. Using the dialectical method of cognition, as well as formal logical methods, steps in order to develop the conceptual apparatus of the investigated phenomenon of cybercrime were taken. Such terms as ‘cyberspace’ and ‘cybersecurity’ acquired the authors' explanations. According to the authors, criminality in cyberspace has been one of the most difficult problems of the international community in recent years due to the development of information and communication technologies. The article analyzes the phenomenological aspects of criminality in global information networks, discusses the definition of ‘cybercrime’, and considers the current trends in its development. Revealing the essence of the investigated type of crime, the authors analyzed the content and marked the differences of cybercrime from Internet crime, computer crime, crime in the information sphere, etc. The authors analyzed the modern normative, scientific and expert approaches to the study of the structure and state of cybercrime in the Republic of Kazakhstan. The results of the study and the conclusions of this article can be used as a theoretical contribution to the enrichment and expansion of scientific vision of cybercrime at the formation of approaches and the system of existing views, forming the concept of criminological security, and can also serve to further development of scientific ideas in the sphere of criminal law and criminological provision of prevention of cybercrime.
- EndNote - EndNote format (Macintosh & Windows)
- ProCite - RIS format (Macintosh & Windows)
- Reference Manager - RIS format (Windows only)
The Copyright Transfer Form to ASERS Publishing (The Publisher) This form refers to the manuscript, which an author(s) was accepted for publication and was signed by all the authors. The undersigned Author(s) of the above-mentioned Paper here transfer any and all copyright-rights in and to The Paper to The Publisher. The Author(s) warrants that The Paper is based on their original work and that the undersigned has the power and authority to make and execute this assignment. It is the author's responsibility to obtain written permission to quote material that has been previously published in any form. The Publisher recognizes the retained rights noted below and grants to the above authors and employers for whom the work performed royalty-free permission to reuse their materials below. Authors may reuse all or portions of the above Paper in other works, excepting the publication of the paper in the same form. Authors may reproduce or authorize others to reproduce the above Paper for the Author's personal use or for internal company use, provided that the source and The Publisher copyright notice are mentioned, that the copies are not used in any way that implies The Publisher endorsement of a product or service of an employer, and that the copies are not offered for sale as such. Authors are permitted to grant third party requests for reprinting, republishing or other types of reuse. The Authors may make limited distribution of all or portions of the above Paper prior to publication if they inform The Publisher of the nature and extent of such limited distribution prior there to. Authors retain all proprietary rights in any process, procedure, or article of manufacture described in The Paper. This agreement becomes null and void if and only if the above paper is not accepted and published by The Publisher, or is with drawn by the author(s) before acceptance by the Publisher.
- Come and join our team! become an author
- Soon, we launch the books app stay tune!
- Online support 24/7 +4077 033 6758
- Tell Friends and get $5 a small gift for you
- Privacy Policy
- Customer Service
- Refunds Politics
Mail to: [email protected]
Phone: +40754 027 417
IMAGES
VIDEO
COMMENTS
cybercrime capacity and capability of local law enforcement agencies is deficient, despite trends at the local law enforcement agency level to allocate more resources to the cybercrime problem. This deficiency is noted both by response patterns on the CCCQ© and through comments
This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an ... streamlined cybercrime training for law enforcement officers to increase officer efficiencies in cybercrimes.
Nweze-Iloekwe, Nnesochi, "The Legal and Regulatory Aspect of International Cybercrime and Cybersecurity: Limits and Challenges" (2022). Theses and Dissertations. 89. The development of the internet and digital technologies represent a major opportunity for humanity in transforming businesses and providing new tools for everyday communication.
This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Masthead Logo Link
research. It concerns critical assessment of the laws governing cybercrime practices. in Zanzibar. .2. Research Design. The study methodology is qualitative. The data obtained through interview of legal. staffs and stakeholder to enable a suitable role in the study and analysed legislation.
It is widely accepted that cybercrime is highly prevalent and increasing. A recent report suggests that Internet Service Providers (ISPs) record around 80 billion automated scans daily by online perpetrators with the aim of identifying targets for cybercrime (Lewis, 2018), and in the year ending September 2019, 1 million 'computer misuse' crimes were reportedly committed against households ...
cybercrime: an analysis of current legislation in south africa
SIKS dissertation series no. 2017-01. The research reported in this thesis has ... stantive law with regard to cybercrime in the Netherlands and United States. Digital investigative methods 21. 2. ...
This thesis will lay out the importance of connectivity in our society - from the individual user to national security and the military. I will examine the vulnerabilities, cite case studies, and look at the consequences the cyberattacks have or could have on society. To best frame my research, I will include recent cyber events and examine the
The following thesis shall provide an analysis of the unique challenges which have arisen from the growing phenomenon that is cybercrime. This thesis shall then provide insight into and discussion around how these challenges can be addressed. The technological landscape in which organised cybercriminals operate presents unique challenges to law makers, investigators, and prosecutors. A useful ...
The Electronic Communications and Transactions Act, 25 of 2002, eradicated various lacunae that previously existed in respect of cyber crimes. Cyber crimes such as inter alia hacking, rogue code, unauthorised modification of data and denial of service attacks have now been criminalised. Specific criminal provisions in relation to spamming ...
Introduction: new directions in cybercrime research
The thesis concludes volunteerism as a solution to develop defensive cyber capabilities and suggests the establishment of a voluntary organization in Georgia based on Estonian example. Keywords: Cyber security, Cybercrime, Cyber defense, Volunteerism, Regulatory framework, Policy analyzing.
In the post-COVID-19 era, international consensus is in agreement of the threat of cybercrime being a top-level concern [].The pandemic led society and institutions to a global accelerated digitalisation, and in doing so reshaped the landscape in which cybercrime and cybersecurity operate [].With domestic statistics suggesting an 89% increase in computer misuse offences and a 25% increase in ...
31 Maat, Cybercrime: A comparative Analysis Law Analysis (LLM Thesis, U nisa, 2004) ft 145. 32 Njabulo Mthimunye, 'The intersection between C yber Crim es laws and Data Protection laws in South
Some of the key challenges identified in the dissertation, arising from the analysis of South Africa's cyber laws and policy framework, point to legislation that is out of date and in desperate need of revision, a lack of definitional clarity for cybercrime related terminology, jurisdiction limitations to investigate international cybercrimes ...
Globalization and the proliferation of technology facilitate increased opportunities to commit cybercrime. Given its transnational and technical nature, cybercrime presents a unique challenge for law enforcement. Effective investigations often require international cooperation, as the victim, suspect, and evidence can be physically located in different jurisdictions. Existing research is ...
The Information Technology Act makes the international trade easier and secondly it is an alternative to the paper-based methods of communication and storage of information. There was also a beginning at international level to combat the problem of International Cyber Crime Convention which came into force on November 23, 2001.
Felicity Bell, Empirical Research in Law (2016) 25(2) Griffith Law Review 266-267 Lee Epstein and Andrew D. Martin, An introduction to Empirical Legal Research (OUP 2014) viii Lee Epstein and Andrew D. Martin, An introduction to Empirical Legal Research (OUP 2014) Frans L. Leeuw and Hans Schmeets, Empirical Legal Research: A Guidance Book for Lawyers, Legislators and Regulators (Edward Elgar ...
It should be noted that those rules are adjusted to the narrow meaning of the legal status and consequences of cybercrime. ... development in civil law. Dissertation Doctor of Law]. Moscow, 2011 ...
This article considers the problems of fighting crimes on the Internet, and defines new criminal acts committed by means of global computer networks. The aim of the study is to develop a categorical conceptual instrument, to separate a new type of cybercrime. The methodological basis of the study was the dialectic, comparative legal, sociological, systemic-structural and statistical methods as ...
Thus this article looks at the existing challenges faced by governments that are adopting international legislations and conventions against cybercrime and also discuss the potential prospects of a single global framework for international cooperation in this area.
This article discusses the main characteristics of cybercrime as a new criminal threat to modern society. The authors attempted to explain the appearance of a new type of crime in the period of development and implementation of high technologies in all spheres of life of the world community. Using the dialectical method of cognition, as well as formal logical methods, steps in order to develop ...
Prison sentences ranging from one week to one year. Al-Zoubi, the last person convicted under the cybercrime law, is also the most severely punished. The 49-year-old journalist, founder of the news website Sawalif, and longtime columnist for the state-owned daily Al Rai, has been imprisoned since 2 July.He was sentenced to one year in prison for criticizing the Jordanian authorities on social ...
On August 12, 2023, King Abdullah II ratified a new cybercrime law, Law No. 17 of 2023, [1] which threatens Jordanians' freedom of expression, their right to anonymity, and their right to access information. [2] The law does not meet international human rights standards nor principles which are included in the country's previously ratified digital rights conventions. [3]