Автор: Ayepeku .O. Felix, Omosola .J. Olabode, James .K. Ayeni
Организация: Thomas Adewumi University Oko-Irese, Kwara State Polytechnic


Ключевые слова: Criminalization, internet, cybercrime, comprehensive, study
Аннотация. The internet's rapid growth has revolutionized connectivity and convenience, but it has also led to a rise in cybercrime. This study explores the complexities, implications, and challenges of cybercrime, analyzing its evolution, forms, and socio-economic impact. It examines the legal framework surrounding cybercrime, including international agreements, national legislation, and emerging jurisprudence. The study also highlights the need for international cooperation and cyber forensics advancements. It also examines the ongoing cybercrime arms race between cybersecurity professionals and cybercriminals, emphasizing the importance of proactive defense strategies, threat intelligence, and incident response protocols. The study underscores the urgency of addressing the criminalization of the internet and cybercrime, emphasizing the role of public awareness, collaboration, and innovative technological solutions in mitigating threats and ensuring a secure digital future.


A Study of Cyber Crime Awareness for Prevention and its Impact. (2017). International Journal of Recent Trends in Engineering and Research, 3(10), 240–246.
Alharbi, S., Attiah, A., & Alghazzawi, D. (2022). Integrating Blockchain with Artificial Intelligence to Secure IoT Networks: Future Trends. Sustainability, 14(23), 16002.
Arnell, P., & Faturoti, B. (2022). The prosecution of cybercrime – why transnational and extraterritorial jurisdiction should be resisted. International Review of Law, Computers & Technology, 37(1), 29–51.
Council of Europe. (2001). Convention on Cybercrime (Budapest Convention). Retrieved from
Cybercrime and the Law: Peter G. Berris, Computer Fraud and Abuse Act (CFAA) and the 116th Congress September 21, 2020
European Union. (2016). General Data Protection Regulation (GDPR). Retrieved from
Facebook, Inc. v. Power Ventures, Inc., 844 F.3d 1058 (9th Cir. 2016).
Google Inc. v. Equustek Solutions Inc., 137 S. Ct. 1744 (2017)
Forrester. (2018). The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2018.
Gulyás, O., & Kiss, G. (2023). Impact of cyber-attacks on the financial institutions. Procedia Computer Science, 219, 84–90.
Haataja, S. (2022). Cyber operations against critical infrastructure under norms of responsible state behaviour and international law. International Journal of Law and Information Technology, 30(4), 423–443.
IC3 (Internet Crime Complaint Center). (2021). 2020 Internet Crime Report. Retrieved from
INTERPOL. (n.d.). Digital Crime Centre. Retrieved from
Lusher, D. (2018). Organised cybercrime: Key findings from the UK and beyond. University of Surrey.
Manavi, M. T. (2018). Defense mechanisms against Distributed Denial of Service attacks : A survey. Computers & Electrical Engineering, 72, 26–38.
Mohsin, K. (2021). The Internet and its Opportunities for Cybercrime – Interpersonal Cybercrime. SSRN Electronic Journal.
Naidoo, R., & Jacobs, C. (2023). Cyber Warfare and Cyber Terrorism Threats Targeting Critical Infrastructure: A HCPS-based Threat Modelling Intelligence Framework. European Conference on Cyber Warfare and Security, 22(1), 311–318.
Naidoo, R., & Jacobs, C. (2023). Cyber Warfare and Cyber Terrorism Threats Targeting Critical Infrastructure: A HCPS-based Threat Modelling Intelligence Framework. European Conference on Cyber Warfare and Security, 22(1), 311–318.
National Institute of Standards and Technology (NIST). (2018). Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology. Special Publication 800-61 Revision 2.
National People's Congress. (2016). Cybersecurity Law of the People's Republic of China. Retrieved from
Nershi, K., & Grossman, S. (2023). Assessing the Political Motivations Behind Ransomware Attacks. SSRN Electronic Journal.
Palmieri, M., Shortland, N., & McGarry, P. (2021). Personality and online deviance: The role of reinforcement sensitivity theory in cybercrime. Computers in Human Behavior, 120, 106745.
Rybicki, P. (2023). Standardization In Combating Cybercrime Area. Cybersecurity & Cybercrime, 1(2), 109–130.
Scarfone, K., & Souppaya, M. (2006). Guide to Computer Security Log Management. National Institute of Standards and Technology (NIST)
Sekhar Bhusal, C. (2021). Systematic Review on Social Engineering: Hacking by Manipulating Humans. Journal of Information Security, 12(01), 104–114.
U.S. Department of Justice. (n.d.). Computer Crime & Intellectual Property Section (CCIPS) - Computer Crime & Intellectual Property Section (CCIPS). Retrieved from
United Nations. (2004). Resolution 58/199: Creation of a global culture of cybersecurity. Retrieved from
United States v. Ulbricht, 858 F.3d 71 (2d Cir. 2015). UNODC. (2013). Model law against the illicit manufacturing of and trafficking in firearms, their parts and components and ammunition and explosives. Retrieved from
UNODC. (2019). Comprehensive Study on Cybercrime. Retrieved from