A Review of International Legal Framework to Combat Cybercrime
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
M. Gercke, "Europe’s legal approaches to cybercrime," in ERA forum, 2009, pp. 409-420.
M. Gercke, "Understanding cybercrime: a guide for developing countries," International Telecommunication Union (Draft), vol. 89, p. 93, 2011.
D. L. Speer, "Redefining borders: The challenges of cybercrime," Crime, law and social change, vol. 34, pp. 259-273, 2000.
S. Mittal, "Perspectives in Cyber Security, the future of cyber malware," The Indian Journal of Criminology, vol. 41, p. 18, 2013.
S. Mittal, "The Issues in Cyber- Defense and Cyber Forensics of the SCADA Systems," Indian Police Journal, vol. 62, pp. 29- 41, 2015.
S. Mittal, "A Strategic Road-map for Prevention of Drug Trafficking through Internet," Indian Journal of Criminology and Criminalistics, vol. 33, pp. 86- 95, 2012.
O.-e. I. E. G. o. Cybercrime, "Comprehensive Study on Cyber Crime," UNODC2013.
"COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS Creating a Safer Information Society by Improving the Security of Information Infrastructures and Combating Computer-related Crime," ed, 2001.
"Communication from the Commission to the Council, the European Parliament, the Economic and Social Committee and the Committee of the Regions: Creating a safer information society by improving the security of information infrastructures and combating computer-related crime [COM(2000) 890 final - not published in the Official Journal]."
"Council Framework Decision 2005/222/JHA of 24 February 2005 on attacks against information systems," vol. OJ L 69, 16.3.2005, p. 67–71, ed.
Council of Europe, Convention on Cybercrime, 23 November 2001, available at: http://www.refworld.org/docid/47fdfb202.html [accessed 26 February 2017].
ibid.
ibid.. Articles 23-35
ibid. Preamble
"Communication from the Commission to the Council, the European Parliament, the Economic and Social Committee and the Committee of the Regions: Creating a safer information society by improving the security of information infrastructures and combating computer-related crime [COM(2000) 890 final - not published in the Official Journal]."
O.-e. I. E. G. o. Cybercrime, "Comprehensive Study on Cyber Crime," UNODC2013.
"United Nations, UN General Assembly Resolution 55/63: Combating the Criminal Misuse of Information Technologies (Jan. 22, 2001)," ed.
Council of Europe, Convention on Cybercrime, 23 November 2001, available at: http://www.refworld.org/docid/47fdfb202.html [accessed 26 February 2017].. Articles 2 - 6.
ibid.. Articles 7, 8.
ibid.. Article 9.
ibid.. Article 10.
ibid.. Articles 11, 13.
ibid.. Articles 14, 15.
ibid.. Articles 16, 17.
ibid.. Article 19
ibid.. Articles 20, 21.
ibid.. Article 22.
ibid.. Articles 23- 35.
ibid.. Preamble
N. E. Marion, "The Council of Europe's Cyber Crime Treaty: An exercise in Symbolic Legislation," International Journal of Cyber Criminology, vol. 4, p. 699, 2010.
I. Walden, "Harmonising computer crime laws in Europe," European Journal of Crime, Criminal Law and Criminal Justice, vol. 12, pp. 321-336, 2004.
S.-J. Wang, "Measures of retaining digital evidence to prosecute computer-based cyber-crimes," Computer Standards & Interfaces, vol. 29, pp. 216-223, 2007.
"United States v. Gorshkov," in WL 1024026, U.S. Dist. LEXIS 26306 (W.D. Wash. 2001). ed, 2001.
R. Power and R. Foreword By-Farrow, Tangled Web: Tales of digital crime from the shadows of cyberspace: Macmillan Press Ltd., 2000.
B.-J. Koops, "Police investigations in Internet open sources: Procedural-law issues," Computer Law & Security Review, vol. 29, pp. 654-665, 12// 2013.
S. Mittal, "Perspectives in Cyber Security, the future of cyber malware," The Indian Journal of Criminology, vol. 41, p. 18, 2013.
N. Kshetri, "The simple economics of cybercrimes," IEEE Security & Privacy, vol. 4, pp. 33-39, 2006.
Article 8
Article 6(1)
Law Commission, "Reforming Bribery," 2008.
"Communications Decency Act 1996," ed, 1996.
O.-e. I. E. G. o. Cybercrime, "Comprehensive Study on Cyber Crime," UNODC2013.