THE CRIMINALIZATION OF THE INTERNET AND CYBERCRIME IN GENERAL: A COMPREHENSIVE STUDY
Автор: Ayepeku .O. Felix, Omosola .J. Olabode, James .K. Ayeni
Организация: Thomas Adewumi University Oko-Irese, Kwara State Polytechnic
Категория:
Ключевые слова: Criminalization, internet, cybercrime, comprehensive, study
Аннотация. The internet's rapid growth has revolutionized connectivity and convenience, but it has also led to a rise in cybercrime. This study explores the complexities, implications, and challenges of cybercrime, analyzing its evolution, forms, and socio-economic impact. It examines the legal framework surrounding cybercrime, including international agreements, national legislation, and emerging jurisprudence. The study also highlights the need for international cooperation and cyber forensics advancements. It also examines the ongoing cybercrime arms race between cybersecurity professionals and cybercriminals, emphasizing the importance of proactive defense strategies, threat intelligence, and incident response protocols. The study underscores the urgency of addressing the criminalization of the internet and cybercrime, emphasizing the role of public awareness, collaboration, and innovative technological solutions in mitigating threats and ensuring a secure digital future.
Библиография:
A Study of Cyber Crime Awareness for Prevention and its Impact. (2017). International Journal of Recent Trends in Engineering and Research, 3(10), 240–246. https://doi.org/10.23883/ijrter.2017.3480.jtu50
Alharbi, S., Attiah, A., & Alghazzawi, D. (2022). Integrating Blockchain with Artificial Intelligence to Secure IoT Networks: Future Trends. Sustainability, 14(23), 16002. https://doi.org/10.3390/su142316002
Arnell, P., & Faturoti, B. (2022). The prosecution of cybercrime – why transnational and extraterritorial jurisdiction should be resisted. International Review of Law, Computers & Technology, 37(1), 29–51. https://doi.org/10.1080/13600869.2022.2061888
Council of Europe. (2001). Convention on Cybercrime (Budapest Convention). Retrieved from https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185
Cybercrime and the Law: Peter G. Berris, Computer Fraud and Abuse Act (CFAA) and the 116th Congress September 21, 2020
European Union. (2016). General Data Protection Regulation (GDPR). Retrieved from https://eur-lex.europa.eu/eli/reg/2016/679/oj
Facebook, Inc. v. Power Ventures, Inc., 844 F.3d 1058 (9th Cir. 2016).
Google Inc. v. Equustek Solutions Inc., 137 S. Ct. 1744 (2017)
Forrester. (2018). The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2018.
Gulyás, O., & Kiss, G. (2023). Impact of cyber-attacks on the financial institutions. Procedia Computer Science, 219, 84–90. https://doi.org/10.1016/j.procs.2023.01.267
Haataja, S. (2022). Cyber operations against critical infrastructure under norms of responsible state behaviour and international law. International Journal of Law and Information Technology, 30(4), 423–443. https://doi.org/10.1093/ijlit/eaad006
IC3 (Internet Crime Complaint Center). (2021). 2020 Internet Crime Report. Retrieved from https://pdf.ic3.gov/2020_IC3Report.pdf
INTERPOL. (n.d.). Digital Crime Centre. Retrieved from https://www.interpol.int/en/Crimes/Digital-crime/Digital-crime-centre
Lusher, D. (2018). Organised cybercrime: Key findings from the UK and beyond. University of Surrey.
Manavi, M. T. (2018). Defense mechanisms against Distributed Denial of Service attacks : A survey. Computers & Electrical Engineering, 72, 26–38. https://doi.org/10.1016/j.compeleceng.2018.09.001
Mohsin, K. (2021). The Internet and its Opportunities for Cybercrime – Interpersonal Cybercrime. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3815973
Naidoo, R., & Jacobs, C. (2023). Cyber Warfare and Cyber Terrorism Threats Targeting Critical Infrastructure: A HCPS-based Threat Modelling Intelligence Framework. European Conference on Cyber Warfare and Security, 22(1), 311–318. https://doi.org/10.34190/eccws.22.1.1443
Naidoo, R., & Jacobs, C. (2023). Cyber Warfare and Cyber Terrorism Threats Targeting Critical Infrastructure: A HCPS-based Threat Modelling Intelligence Framework. European Conference on Cyber Warfare and Security, 22(1), 311–318. https://doi.org/10.34190/eccws.22.1.1443
National Institute of Standards and Technology (NIST). (2018). Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology. Special Publication 800-61 Revision 2.
National People's Congress. (2016). Cybersecurity Law of the People's Republic of China. Retrieved from http://www.npc.gov.cn/npc/c30834/201612/20de7ff8f7c9496b8fedf73d0f227643.shtml
Nershi, K., & Grossman, S. (2023). Assessing the Political Motivations Behind Ransomware Attacks. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.4507111
Palmieri, M., Shortland, N., & McGarry, P. (2021). Personality and online deviance: The role of reinforcement sensitivity theory in cybercrime. Computers in Human Behavior, 120, 106745. https://doi.org/10.1016/j.chb.2021.106745
Rybicki, P. (2023). Standardization In Combating Cybercrime Area. Cybersecurity & Cybercrime, 1(2), 109–130. https://doi.org/10.5604/01.3001.0053.8024
Scarfone, K., & Souppaya, M. (2006). Guide to Computer Security Log Management. National Institute of Standards and Technology (NIST)
Sekhar Bhusal, C. (2021). Systematic Review on Social Engineering: Hacking by Manipulating Humans. Journal of Information Security, 12(01), 104–114. https://doi.org/10.4236/jis.2021.121005
U.S. Department of Justice. (n.d.). Computer Crime & Intellectual Property Section (CCIPS) - Computer Crime & Intellectual Property Section (CCIPS). Retrieved from https://www.justice.gov/criminal-ccips
United Nations. (2004). Resolution 58/199: Creation of a global culture of cybersecurity. Retrieved from https://undocs.org/A/RES/58/199
United States v. Ulbricht, 858 F.3d 71 (2d Cir. 2015). UNODC. (2013). Model law against the illicit manufacturing of and trafficking in firearms, their parts and components and ammunition and explosives. Retrieved from https://www.unodc.org/documents/firearms-protocol/Model_Law_ENG_WEB.pdf
UNODC. (2019). Comprehensive Study on Cybercrime. Retrieved from https://www.unodc.org/unodc/en/cybercrime/study.html
Меню