1. bookVolume 15 (2020): Issue 2 (December 2020)
Journal Details
License
Format
Journal
eISSN
1857-8462
First Published
01 Jul 2005
Publication timeframe
2 times per year
Languages
English
access type Open Access

Cybercrime: A Challenge to Law Enforcement

Published Online: 06 Apr 2021
Volume & Issue: Volume 15 (2020) - Issue 2 (December 2020)
Page range: 42 - 55
Journal Details
License
Format
Journal
eISSN
1857-8462
First Published
01 Jul 2005
Publication timeframe
2 times per year
Languages
English
Abstract

When comparing 100 years ago and today, we always mention the social, economic and political changes that have influenced the emergence and development of the opportunities that we have today, with special emphasis on technological changes. Technology has evolved so fast that it seems that in the blink of an eye something new has just hit the market. Whether we like it or not, technology has become part of us, part of our lives, where we upon spend a great deal of the day with at least one of our technological devices with which we perform many tasks.

Nowadays there are limitless possibilities of gathering information, business, shop, and almost anything through the internet.

Although it is a very easy to make payments online, it can be quite risky, because not every website offers the security and convenience for purchasing the product we want and we may have doubts whether the money we have paid has gone to the right place and for the specific service, which we have paid for. The Internet has many positive as well as negative aspects, since it also carries great danger because it is much easier to hind behind a false identity and commit illegal acts.

Cybercrime presents a new challenge to legal systems, considering that the more individuals use computer, and the Internet, the more the interest of hackers and perpetrators to commit these types of crimes increases.

Keywords

Adopted by the State Duma on May 24, 1. A. (n.d.). The Criminal Code Of The Russian Federation No. 63-Fz Of June 13, 1996. Retrieved January 17, 2021Search in Google Scholar

Anonymous. (2003). Maximum Security - Fourth Edition. Indianapolis, USA: Sams Publishing.Search in Google Scholar

Aycock, J. (2006). Computer Viruses and Malware. Calgary, Canada: Springer, University of Calgary.Search in Google Scholar

Brenner, S. W. (2010). Cybercrime: Criminal Threats from Cyberspace. Santa Barbara, California: Praeger.Search in Google Scholar

Clough, J. (2015). Principles of Cybercrime - Second Edition. Cambridge, UK: Cambridge University Press, University Printing House.10.1017/CBO9781139540803Search in Google Scholar

Criminal Code of the Republic of North Macedonia. (2002). Retrieved January 15, 2021, from Official Gazette of the Republic of Macedonia "No. 80/99, No. 4/2002, No. 43/2003, No. 19/2004, No. 81/2005, No. 60/06, No. 73/06, No. 7/08, No. 139 / 08, number 114/09, number 51/11, number 135/11, 185/.Search in Google Scholar

Europe, C. o. (2003, January 28). Additional Protocol to the Convention on Cybercrime. Retrieved January 18, 2021, from Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems: www.coe.int/en/web/conventions/full-list/-/conventions/treaty/189Search in Google Scholar

Europe, C. o. (2007). Council of Europe Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse. Lanzarote: Council of Europe, Council of Europe Treaty Series-No. 201.Search in Google Scholar

Finkelstein, W. A., & Sims, J. R. (2005). The Intellectual Property Handbook: A Practical Guide for Franchise, Business and IP Counsel. Chicago, USA: American Bar Association, ABA Publishing.Search in Google Scholar

Gehringer, E. F. (n.d.). Ethics in Computing. Retrieved January 15th, 2021, from Cybersquatting:https://ethics.csc.ncsu.edu/commerce/cybersquatting/study.phpSearch in Google Scholar

German Criminal Code Strafgesetzbuch – StGB. (n.d.). Retrieved from Criminal Code in the version published on 13 November 1998 (Federal Law Gazette I, p. 3322) as last amended by Article 2 of the Act of 19 June 2019 (Federal Law Gazette I, p. 844): https://www.gesetze-im-internet.de/englisch_stgb/englisch_stgb.htmlSearch in Google Scholar

Gillespie, A. A. (2015). Cybercrime: Key Issues and Debate. Lancaster, UK: Routledge; 1st edition.10.4324/9781315884202Search in Google Scholar

Hayes, D. B., Jeandesboz, D. J., Ragazzi, D. F., Simon, D. S., & Mitsilegas, P. V. (2015). The law enforcement challenges of cybercrime: are we really playing catch-up? Brussels: Directorate-General for internal policies, Policy Department Citizen's rights andconstitutional affairs, European Parliament EU.Search in Google Scholar

Knittel, J., & Soto, M. (2003). Everything You Need to Know About the Dangers of Computer Hacking. New York NY, USA: The Rosen Publishing Group, Inc.Search in Google Scholar

Kremling, J., & Parker, A. M. (2017). Cyberspace, Cybersecurity, and Cybercrime. Thousand Oaks, California 91320: SAGE Publications, Inc.Search in Google Scholar

Miralis, N. G., & Miralis, D. (2020, August 30). The 5 key challenges for law enforcement in fighting cybercrime. Retrieved January 17, 2021, from Lexology: https://www.lexology.com/library/detail.aspx?g=12513d17-cff3-4d8f-b7dccd91826f05d4Search in Google Scholar

Reyes, A., Brittson, R., O'Shea, K., Steele, J., & Jean, C. B. (2007). Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors. Rockland, MA, USA: Syngress Publishing, Inc.Search in Google Scholar

Ross, J. I., & French, J. L. (2010). Criminal investigations Cybercrime. New York Ny 10001: Chelsea House Publisher.Search in Google Scholar

Sausalito, C. (2020, December 21). Cybercrime To Cost The World $10.5 Trillion Annually By 2025. Retrieved December 27, 2020, from Cybercrime Magazine: https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/Search in Google Scholar

Schell, B. H., & Martin, C. (2004). Cybercrime: A Reference Handbook. Santa Barbara, California: ABC-CLIO, Inc.Search in Google Scholar

Secretariat, M. o.-G. (n.d.). Criminal codes - Criminal Code of the Kingdom of Spain ( 1995 as of 2013). Retrieved January 16th, 2020, from Legislationline: https://www.legislationline.org/documents/section/criminal-codes/country/2/Spain/show.Search in Google Scholar

Shinder, D. L., & Cross, M. (2008). Scene of the Cybercrime - Second Edition. Burlington, MA 01803: Syngress Publishing, Inc.Search in Google Scholar

Shipley, T. G., & Bowker, A. (2014). Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace. Waltham, USa : Syngress.Search in Google Scholar

Siegel, L. J. (2016). Criminology: Theories, Patterns and Typologies 13th Edition. Boston, USA: CENGAGE Learning, University of Massachusetts, Lowell.Search in Google Scholar

Singapore, G. o. (1993). COMPUTER MISUSE ACT Chapter 50A Original Enactment: Act 19 Of 1993 Revised Edition 31st July 2007. Retrieved January 16th, 2020, from COMPUTER MISUSE ACT: https://sso.agc.gov.sg/ACT/CMA1993#pr8-Search in Google Scholar

Staf, T. N. (2019). Cyberbullying: A Deadly Trend. New York NY, USA: Rosen Publishing.Search in Google Scholar

Steinmetz, K. F., & Yar, M. (2019). Cybercrime and Society - Third Edition. London, UK: Sage Publications, Inc.Search in Google Scholar

UNCTAD. (2020, April 02). UNCTAD. Retrieved January 17, 2021, from Cybercrime Legislation Worldwide: https://unctad.org/page/cybercrime-legislation-worldwideSearch in Google Scholar

Vagias, M., & Dugard, J. (2014). The Territorial Jurisdiction of the International Criminal Court. Cambridge, UK: Cambridge University Press, University of Cambridge.10.1017/CBO9781139525374Search in Google Scholar

Wall, D. S. (2007). Cybercrime: The Transformation of Crime in the Information Age. Cambridge, UK: Polity Press.Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo