Problems of Fighting Crimes on the Internet
Abstract
This article considers the problems of fighting crimes on the Internet, and defines new criminal acts committed by means of global computer networks. The aim of the study is to develop a categorical conceptual instrument, to separate a new type of cybercrime. The methodological basis of the study was the dialectic, comparative legal, sociological, systemic-structural and statistical methods as well as case study method – the method of active problem-situation analysis, by means of which the identification, selection and problem-solving in order to combat cybercrime was performed. The conducted study allows to offer the authors' definition of cyberterrorism and to identify the distinctive features of cyberterrorism, to allocate it in an independent kind of a crime and offer to include it in the Convention on Cybercrime as a separate article.
References
[2] Brewster, B., Kemp, B., Galehbakhtiari, S., and Akhgar, B. 2015. Cybercrime: Attack Motivations and Implications for Big Data and National Security. In B. Akhgar, G.B. Saathoff, H.R. Arabnia, R. Hill, A. Staniforth, & P.S. Bayerl (Eds.), Application of Big Data for National Security. Oxford: Butterworth-Heinemann, pp. 108-127.
[3] Berger, A., D’Alconzo, A., Gansterer, W.N., and Pescapé, A. 2016. Mining Agile DNS Traffic Using Graph Analysis for Cybercrime Detection. Computer Networks, 100: 28-44.
[4] Cassese, A. 2001. International Law. Oxford: Oxford University Press, pp. 150-151.
[5] DeTardo-Bora, K.A., and Bora, D.J. 2016. Cybercrimes: An Overview of Contemporary Challenges and Impending Threats. In J. Sammons (Ed.), Digital Forensics. Amsterdam: Elsevier, pp. 119-132.
[6] Frunza, M.-C. 2016. Cybercrime. In M.-C. Frunza, Introduction to the Theories and Varieties of Modern Crime in Financial Markets. Amsterdam: Elsevier, pp. 207-220.
[7] Furnell, S., Emm, D., and Papadaki, M. 2015. The Challenge of Measuring Cyber-Dependent Crimes. Computer Fraud & Security, 2015(10): 5-12.
[8] Goodman, M. 2010. International Dimensions of Cybercrime. In S. Ghosh, & E. Turrini (Eds.), Cybercrimes: A Multidisciplinary Analysis. Berlin, Heidelberg: Springer, pp. 77-79.
[9] Goodman, S.E., Kirk, J.C., and Kirk, M.H. 2007. Cyberspace as a Medium for Terrorists. Technological Forecasting and Social Change, 74(2): 193-210.
[10] Gorge, M. 2007. Cyberterrorism: Hype or Reality? Computer Fraud & Security, 2007(2): 9-12.
[11] Ibrahim, S. 2016. Social and Contextual Taxonomy of Cybercrime: Socioeconomic Theory of Nigerian Cybercriminals. International Journal of Law, Crime and Justice, 47: 44-57.
[12] Jahankhani, H., Al-Nemrat, A., and Hosseinian-Far, A. 2014. Cybercrime Classification and Characteristics. In B. Akhgar, A. Staniforth, & F. Bosco (Eds.), Cyber Crime and Cyber Terrorism Investigator's Handbook. Amsterdam: Elsevier, pp. 149-164.
[13] Katos, V., and Bednar, P.M. 2008. A Cyber-Crime Investigation Framework. Computer Standards & Interfaces, 30(4): 223-228.
[14] Konradt, C., Schilling, A., and Werners, B. 2016. Phishing: An Economic Analysis of Cybercrime Perpetrators. Computers & Security, 58: 39-46.
[15] Kenney, M. 2015. Cyber-Terrorism in a Post-Stuxnet World. Orbis, 59(1): 111-128.
[16] Kirillova, Y.A., Vasilyeva, M.V., and Krohina, Y.A. 2014. Legal Protection of Copyright Items Inheritance in the Internet by Means of a Creative Commons License. Review of European Studies, 6(4): 232-238.
[17] Levin, J., and McDevitt, J. 2015. Hate Crimes. In N.J. Smelser, & P.B. Baltes (Eds.), International Encyclopedia of the Social & Behavioral Sciences (2nd ed.). Amsterdam: Elsevier, pp. 540-545.
[18] Sammons, J., and Cross, M. 2017. Cybercrime. In J. Sammons, & M. Cross, The Basics of Cyber Safety. Amsterdam: Elsevier, pp. 87-116.
[19] Shipley, T.G., and Bowker, A. 2014. Covert Operations on the Internet. In T.G. Shipley, & A. Bowker, Investigating Internet Crimes. Amsterdam: Elsevier, pp. 233-252.
[20] Solak, D., and Topaloglu, M. 2015. The Perception Analysis of Cyber Crimes in View of Computer Science Students. Procedia – Social and Behavioral Sciences, 182: 590-595.
[21] Staniforth, A. 2014. Police Investigation Processes: Practical Tools and techniques for Tackling Cyber Crimes. In B. Akhgar, A. Staniforth, & F. Bosco (Eds.), Cyber Crime and Cyber Terrorism Investigator's Handbook. Amsterdam: Elsevier, pp. 31-42.
[22] Willems, E. 2011. Cyber-Terrorism in the Process Industry. Computer Fraud & Security, 2011(3): 16-19.
[23] Shipley, T.G., and Bowker, A. 2014. Internet Criminals. In T.G. Shipley, & A. Bowker, Investigating Internet Crimes. Amsterdam: Elsevier, pp. 21-39.
[24] Tehrani, P.M., Manap, N.A., and Taji, H. 2013. Cyber Terrorism Challenges: The Need for a Global Response to a Multi-Jurisdictional Crime. Computer Law & Security Review, 29(3): 207-215.
[25] Tropina, T. 2010. Cybercrime and Organized Crime. Freedom from Fear Magazine, 7: 3.
The Copyright Transfer Form to ASERS Publishing (The Publisher)
This form refers to the manuscript, which an author(s) was accepted for publication and was signed by all the authors.
The undersigned Author(s) of the above-mentioned Paper here transfer any and all copyright-rights in and to The Paper to The Publisher. The Author(s) warrants that The Paper is based on their original work and that the undersigned has the power and authority to make and execute this assignment. It is the author's responsibility to obtain written permission to quote material that has been previously published in any form. The Publisher recognizes the retained rights noted below and grants to the above authors and employers for whom the work performed royalty-free permission to reuse their materials below. Authors may reuse all or portions of the above Paper in other works, excepting the publication of the paper in the same form. Authors may reproduce or authorize others to reproduce the above Paper for the Author's personal use or for internal company use, provided that the source and The Publisher copyright notice are mentioned, that the copies are not used in any way that implies The Publisher endorsement of a product or service of an employer, and that the copies are not offered for sale as such. Authors are permitted to grant third party requests for reprinting, republishing or other types of reuse. The Authors may make limited distribution of all or portions of the above Paper prior to publication if they inform The Publisher of the nature and extent of such limited distribution prior there to. Authors retain all proprietary rights in any process, procedure, or article of manufacture described in The Paper. This agreement becomes null and void if and only if the above paper is not accepted and published by The Publisher, or is with drawn by the author(s) before acceptance by the Publisher.