Global perspectives on cybercrime legislation

Naeem AllahRakha

Article ID: 6007
Vol 8, Issue 10, 2024

VIEWS - 241 (Abstract) 186 (PDF)

Abstract


Cybercrime poses a growing threat to individuals, businesses, and governments in the digital age. This research aims to conduct a comprehensive study of the legal frameworks developed by international organizations to combat cybercrime, providing a comparative analysis of their approaches and highlighting strengths, weaknesses, and areas for improvement. The study employs a qualitative research methodology, utilizing a doctrinal approach to examine primary and secondary legal sources for data analysis. The results reveal the ongoing efforts of the United Nations and other international bodies to establish a unified approach to combating cybercrime through conventions on Cybercrime. The research emphasizes the importance of harmonizing laws, fostering international cooperation, and adapting to evolving cyber threats while maintaining a balance between security and individual rights. Recommendations include strengthening legal frameworks, enhancing public-private partnerships, and investing in capacity building and technical assistance for developing countries. The study concludes by highlighting the critical importance of comprehensive and harmonized cybercrime legislation in the global fight against cybercrime and calls for continued efforts to address the challenges posed by this ever-evolving threat.


Keywords


cybercrime; legal frameworks; ITU; ENISA; NIS Directives

Full Text:

PDF


References


African Union. (2014). African Union Convention on Cyber Security and Personal Data Protection. Available online: https://au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection (accessed on 1 April 2024).

AlDaajeh, S., Saleous, H., Alrabaee, S., et al. (2022). The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & Security, 119, 102754. https://doi.org/10.1016/j.cose.2022.102754

AllahRakha, N. (2024a). Cybercrime and the Law: Addressing the Challenges of Digital Forensics in Criminal Investigations. Mexican Law Review, 23–54. https://doi.org/10.22201/iij.24485306e.2024.2.18892

AllahRakha, N. (2024b). Modernizing Criminal and Evidence Laws to Facilitate Tourism in Pakistan. https://doi.org/10.2139/ssrn.4707544

AllahRakha N. (2024c). Cybersecurity Regulations for Protection and Safeguarding Digital Assets (Data in Today’s World. Lex Scientia Law Review. 8(1). https://doi.org/10.15294/lslr.v8i1.2081

Appazov, A. (2014). Legal Aspects of Cybersecurity. University of Copenhagen, Faculty of Law. Available online: https://www.justitsministeriet.dk/sites/default/files/media/Arbejdsomraader/Forskning/Forskningspuljen/Legal_Aspects_of_Cybersecurity.pdf (accessed on 1 April 2024).

Applications for Artificial Intelligence and Digital Forensics in National Security. (2023). In: Montasari, R. (edtor), Advanced Sciences and Technologies for Security Applications. Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-40118-3

Arnell, P., & Faturoti, B. (2022). The prosecution of cybercrime – why transnational and extraterritorial jurisdiction should be resisted. International Review of Law, Computers & Technology, 37(1), 29–51. https://doi.org/10.1080/13600869.2022.2061888

Bada, M., & Nurse, J. R. C. (2023). Exploring cybercriminal activities, behaviors, and profiles. In S. Mukherjee, V. Dutt, & N. Srinivasan (Eds.), Applied cognitive science and technology (pp. 95-110). Springer, Singapore. https://doi.org/10.1007/978-981-99-3966-4_7

Baron, R. M. F. (2002). A Critique of the International Cybercrime Treaty. Commlaw Conspectus, 10, 263-278.

Batory, A., & Svensson, S. (2019). Regulating Collaboration: The Legal Framework of Collaborative Governance in Ten European Countries. International Journal of Public Administration, 43(9), 780–789. https://doi.org/10.1080/01900692.2019.1658771

Biagioli, M., & Buning, M. (2018). Technologies of the law/ law as a technology. History of Science, 57(1). https://doi.org/10.1177/0073275318816163

Bouke, M. A., Alshatebi, S. H., Abdullah, A., et al. (2023). African Union Convention on Cyber Security and Personal Data Protection: Challenges and Future Directions. Available online: https://arxiv.org/ftp/arxiv/papers/2307/2307.01966.pdf (accessed on 1 April 2024).

Brady, S., & Heinl, C. (2020). Cybercrime: Current Threats and Responses A review of the research literature. SAR Consultancy & EXEDEC.

Brenner, S. W. (2006). Cybercrime jurisdiction. Crime, Law and Social Change, 46(4–5), 189–206. https://doi.org/10.1007/s10611-007-9063-7

Budiono, A., Absori, A., Wardiono, K., et al. (2023). Cyber Indoctrination Victims in Indonesia and Uzbekistan: Victim Protection and Indoctrination in Practice. Journal of Human Rights, Culture and Legal System, 3(3), 441–475. https://doi.org/10.53955/jhcls.v3i3.127

Buhrig, R. (2023). Capacity, capability, and collaboration: a qualitative analysis of international cybercrime investigations from the perspective of Canadian investigators. International Cybersecurity Law Review, 4(4), 415–429. https://doi.org/10.1365/s43439-023-00101-1

Burgess, M. (2023). Security News This Week: Don’t Panic, but Slack’s GitHub Got Hacked. Available online: https://www.wired.com/story/slack-data-breach-security-news-roundup/ (accessed on 1 April 2024).

Calderaro, A., & Craig, A. J. S. (2020). Transnational governance of cybersecurity: policy challenges and global inequalities in cyber capacity building. Third World Quarterly, 41(6), 917–938. https://doi.org/10.1080/01436597.2020.1729729

Calderoni, F. (2023). UN Convention against Transnational Organized Crime: A Commentary. Available online: https://publicatt.unicatt.it/handle/10807/251055(accessed on 1 April 2024).

Carrapico, H., & Barrinha, A. (2017). The EU as a Coherent (Cyber)Security Actor? JCMS: Journal of Common Market Studies, 55(6), 1254–1272. Portico. https://doi.org/10.1111/jcms.12575

Cerezo, A. I., Lopez, J., & Patel, A. (2007). International Cooperation to Fight Transnational Cybercrime. Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007). https://doi.org/10.1109/wdfia.2007.4299369

Chandra, A., & Snowe, M. J. (2020). A taxonomy of cybercrime: Theory and design. International Journal of Accounting Information Systems, 38, 100467. https://doi.org/10.1016/j.accinf.2020.100467

Chen, C.-L., Lin, Y.-C., Chen, W.-H., et al. (2021). Role of Government to Enhance Digital Transformation in Small Service Business. Sustainability, 13(3), 1028. https://doi.org/10.3390/su13031028

Chen, S., Hao, M., Ding, F., et al. (2023). Exploring the global geography of cybercrime and its driving forces. Humanities and Social Sciences Communications, 10(1). https://doi.org/10.1057/s41599-023-01560-x

Choi, K., & Lee, C. S. (2018). The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity. The International Journal of Cybersecurity Intelligence and Cybercrime, 1(1), 1–4. https://doi.org/10.52306/01010218yxgw4012

Council of Europe. (2001). Convention on Cybercrime, Budapest, 23.XI.2001. Available online: https://rm.coe.int/1680081561 (accessed on 1 April 2024).

Csonka, P. (2007). The council of europe’s convention on cyber-crime and other European initiatives. Revue Internationale de Droit Pénal, Vol. 77(3), 473–501. https://doi.org/10.3917/ridp.773.0473

Curtis, J., & Oxburgh, G. E. (2022). Understanding cybercrime in ‘real world’ policing and law enforcement. The Police Journal: Theory, Practice and Principles, 96(4), 573–592. https://doi.org/10.1177/0032258X221107584

Cybersecurity Policy in the EU and South Korea from Consultation to Action. (2022). In G. Boulet, M. Reiterer, & R. P. Pardo (Eds.), New Security Challenges. Springer International Publishing. https://doi.org/10.1007/978-3-031-08384-6

Demystifying the Network and Cloud Forensics’ Legal, Ethical, and Practical Considerations. (2024). Pakistan Journal of Criminology, 16.2, 119–132. Internet Archive. https://doi.org/10.62271/pjc.16.2.119.132

Dupont, B., Fortin, F., & Leukfeldt, R. (2024). Broadening our understanding of cybercrime and its evolution. Journal of Crime and Justice, 1–5. https://doi.org/10.1080/0735648x.2024.2323872

Forlati, S. (2021). The Palermo Convention at Twenty: The Challenge of Implementation. Brill.

Gaudette, T., Scrivens, R., & Venkatesh, V. (2020). The Role of the Internet in Facilitating Violent Extremism: Insights from Former Right-Wing Extremists. Terrorism and Political Violence, 34(7), 1339–1356. https://doi.org/10.1080/09546553.2020.1784147

Goldman, Z. K., & McCoy, D. (2016). Economic Espionage: Deterring Financially Motivated Cybercrime. Journal of National Security Law & Policy, 8(4), 595-619.

Goodman, S. (2016). Information Security. Routledge. https://doi.org/10.4324/9781315288697

Gordon, J.-S. (2021). AI and law: ethical, legal, and socio-political implications. AI & SOCIETY. https://doi.org/10.1007/s00146-021-01194-0

Hameed, F., Agrafiotis, I., Weisser, C., et al. (2018). Analysing Trends and Success Factors of International Cybersecurity Capacity-Building Initiatives. Available online: https://ora.ox.ac.uk/objects/uuid:50e9c5aa-4f3d-40f0-a0a0-ff538b735291/files/mf1ff1854d7b0d2cf2a244539752a2274 (accessed on 1 April 2024).

Heikkilä, H., Maalouf, W., & Campello, G. (2020). The United Nations Office on Drugs and Crime’s Efforts to Strengthen a Culture of Prevention in Low- and Middle-Income Countries. Prevention Science, 22(1), 18–28. https://doi.org/10.1007/s11121-020-01088-5

Herrmann, H., & Lipsey, R. (Eds.). (2003). Foreign Direct Investment in the Real and Financial Sector of Industrial Countries. Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-24736-4

Holt, T. J., & Bossler, A. M. (Eds.). (2020). The Palgrave Handbook of International Cybercrime and Cyberdeviance. https://doi.org/10.1007/978-3-319-78440-3

Homburger, Z. (2019). The Necessity and Pitfall of Cybersecurity Capacity Building for Norm Development in Cyberspace. Global Society, 33(2), 224–242. https://doi.org/10.1080/13600826.2019.1569502

Huang, K., Madnick, S., Choucri, N., et al. (2021). A Systematic Framework to Understand Transnational Governance for Cybersecurity Risks from Digital Trade. Global Policy, 12(5), 625–638. Portico. https://doi.org/10.1111/1758-5899.13014

Information Fusion for Cyber-Security Analytics. (2017). In I. M. Alsmadi, G. Karabatis, & A. Aleroud (Eds.), Studies in Computational Intelligence. Springer International Publishing. https://doi.org/10.1007/978-3-319-44257-0

Iu, K. Y., & Wong, V. M.-Y. (2023). The Transnational Cybercrime Court - towards a new harmonization of cyberlaw in the Association of Southeast Asian Nations (ASEAN) (German). International Cybersecurity Law Review, 5(1), 121–141. https://doi.org/10.1365/s43439-023-00105-x

Jajodia, S., Samarati, P., & Yung, M. (Eds.). (2019). Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-27739-9

Jalloh, C. C., Clarke, K. M., & Nmehielle, V. O. (Eds.). (2019). The African Court of Justice and Human and Peoples’ Rights in Context. Cambridge University Press. https://doi.org/10.1017/9781108525343

Kerikmäe, T., & Pärn-Lee, E. (2020). Legal dilemmas of Estonian artificial intelligence strategy: in between of e-society and global race. AI & SOCIETY, 36(2), 561–572. https://doi.org/10.1007/s00146-020-01009-8

League, A. (2010). Arab Convention on Combating Information Technology Offences. Available online: https://www.asianlaws.org/gcld/cyberlawdb/GCC/Arab%20Convention%20on%20Combating%20Information%20Technology%20Offences.pdf (accessed on 1 April 2024).

Liu, J., Travers, M., & Chang, L. Y. C. (Eds.). (2017). Comparative Criminology in Asia. Springer International Publishing. https://doi.org/10.1007/978-3-319-54942-2

Luk, A. (2024). The relationship between law and technology: comparing legal responses to creators’ rights under copyright law through safe harbour for online intermediaries and generative AI technology. Law, Innovation and Technology, 16(1), 148–169. https://doi.org/10.1080/17579961.2024.2313800

Mackenzie, S. (2020). Drug Trafficking. Transnational Criminology, 21–36. https://doi.org/10.1332/policypress/9781529203783.003.0002

Marelli, M. (2023). The law and practice of international organizations’ interactions with personal data protection domestic regulation: At the crossroads between the international and domestic legal orders. Computer Law & Security Review, 50, 105849. https://doi.org/10.1016/j.clsr.2023.105849

Mariani, L., Trivellato, B., Martini, M., et al. (2022). Achieving Sustainable Development Goals Through Collaborative Innovation: Evidence from Four European Initiatives. Journal of Business Ethics, 180(4), 1075–1095. https://doi.org/10.1007/s10551-022-05193-z

McGuire, M., & Dowling, S. (2013). Cybercrime: A review of the evidence. Available online: https://assets.publishing.service.gov.uk/media/5a7c83c1ed915d48c241043f/horr75-chap1.pdf (accessed on 1 April 2024).

MSRC. (2023). Microsoft resolves four SSRF vulnerabilities in Azure cloud services. Available online: https://msrc.microsoft.com/blog/2023/01/microsoft-resolves-four-ssrf-vulnerabilities-in-azure-cloud-services/ (accessed on 1 April 2024).

Mukherjee, S., Dutt, V., & Srinivasan, N. (Eds.). (2023). Applied Cognitive Science and Technology. Springer Nature Singapore. https://doi.org/10.1007/978-981-99-3966-4

National Model United Nations. (2019). Commission on Crime Prevention and Criminal Justice: Background Guide 2019. Available online: https://www.nmun.org/assets/documents/conference-archives/new-york/2019/ny19-bgg-ccpcj.pdf (accessed on 1 April 2024).

Nfuka, E. N., Sanga, C., & Mshangi, M. (2017). The rapid growth of cybercrimes affecting information systems in the global: Is this a myth or reality in Tanzania? International Journal of Information Security Science, 3(2), 182-199.

Nguyen, Dr. C. L., & Golman, Dr. W. (2021). Diffusion of the Budapest Convention on cybercrime and the development of cybercrime legislation in Pacific Island countries: ‘Law on the books’ vs ‘law in action.’ Computer Law & Security Review, 40, 105521. https://doi.org/10.1016/j.clsr.2020.105521

Ntanda Nsereko, D. D., & Ventura, M. J. (2019). Perspectives on the International Criminal Jurisdiction of the African Court of Justice and Human Rights Pursuant to the Malabo Protocol (2014). The African Court of Justice and Human and Peoples’ Rights in Context, 257–284. https://doi.org/10.1017/9781108525343.010

Paoli, L., Visschers, J., & Verstraete, C. (2018). The impact of cybercrime on businesses: a novel conceptual framework and its application to Belgium. Crime, Law and Social Change, 70(4), 397–420. https://doi.org/10.1007/s10611-018-9774-y

Paparinskis, M., Paparinskis, M., & Paparinskis, M. (2013). The International Minimum Standard and fair and equitable treatment. Oxford University Press.

Petrich, K. (2022). Transnational Organized Crime and Terrorism. Oxford Research Encyclopedia of International Studies. https://doi.org/10.1093/acrefore/9780190846626.013.705

Potomac Institute for Policy Studies. (2016). Cyber Readiness Index 2.0. Italy. Available online: https://analytica.digital.report/wp-content/uploads/2017/05/CRI-Italy-EN.pdf (accessed on 1 April 2024).

Power, D. J., Heavin, C., & O’Connor, Y. (2021). Balancing privacy rights and surveillance analytics: a decision process guide. Journal of Business Analytics, 4(2), 155–170. https://doi.org/10.1080/2573234x.2021.1920856

Puttonen, R., & Romiti, F. (2020). The Linkages between Organized Crime and Terrorism. Studies in Conflict & Terrorism, 45(5–6), 331–334. https://doi.org/10.1080/1057610x.2019.1678871

Reichel, P., & Albanese, J. (2014). Handbook of Transnational Crime and Justice. SAGE Publications, Inc. https://doi.org/10.4135/9781452281995

Sarkar, G., & Shukla, S. K. (2023). Behavioral analysis of cybercrime: Paving the way for effective policing strategies. Journal of Economic Criminology, 2, 100034. https://doi.org/10.1016/j.jeconc.2023.100034

Savaş, S., & Karataş, S. (2022). Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance. International Cybersecurity Law Review, 3(1), 7–34. https://doi.org/10.1365/s43439-021-00045-4

Schjolberg, S. (2022). Proposal for a United Nations Convention on Cybercrime. Available online: https://www.unodc.org/documents/Cybercrime/AdHocCommittee/Second_session/Stein_Schjlberg_contribution.pdf (accessed on 1 April 2024).

Schjolberg, S., & Ghernaouti-Helie, S. (2011). A Global Treaty on Cybersecurity and Cybercrime ,2nd ed. Available online: https://www.cybercrimelaw.net/documents/A_Global_Treaty_on_Cybersecurity_and_Cybercrime,_Second_edition_2011.pdf (accessed on 1 April 2024).

Schloenhardt, A., Calderoni, F., Lelliott, J., & Weißer, B. (2023). UN Convention against Transnational Organized Crime: A Commentary (Oxford Commentaries on International Law, 2023). Oxford University Press.

Shahidullah, S. M. (2017). Crime, Criminal Justice, and the Evolving Science of Criminology in South Asia. Palgrave Macmillan UK. https://doi.org/10.1057/978-1-137-50750-1

Sheinis, D. (2012). The Links Between Human Trafficking, Organized Crime, and Terrorism. American Intelligence Journal, 30(1), 68-77.

Shinder, L., & Cross, M. (2008). Facing the Cybercrime Problem Head-On. Scene of the Cybercrime, 1–39. https://doi.org/10.1016/b978-1-59749-276-8.00001-7

Spiezia, F. (2022). International cooperation and protection of victims in cyberspace: welcoming Protocol II to the Budapest Convention on Cybercrime. ERA Forum, 23(1), 101–108. https://doi.org/10.1007/s12027-022-00707-8

Sridhar, V. (2021). Data-Centric Living. Routledge India. https://doi.org/10.4324/9781003093442

Tosoni, L. (2018). Rethinking Privacy in the Council of Europe’s Convention on Cybercrime. Computer Law & Security Review, 34(6), 1197–1214. https://doi.org/10.1016/j.clsr.2018.08.004

United Nations Conference on Trade and Development (UNCTAD). (2024). Cybercrime Legislation Worldwide. Available online: https://unctad.org/page/cybercrime-legislation-worldwide (accessed on 1 April 2024).

United Nations General Assembly. (2021). Countering the use of information and communications technologies for criminal purposes (Resolution No. 75/282). Available online: https://documents.un.org/doc/undoc/gen/n21/133/51/pdf/n2113351.pdf?token=stCuB8wD2ds56VwuYf&fe=true (accessed on 1 April 2024).

UNODC. (2018). UNODC tackling cybercrime in support of a safe and secure AP-IS. Available online: https://www.unescap.org/sites/default/files/UNODC%20tackling%20Cybercrime%20in%20supoprt%20of%20a%20safe%20and%20secure%20AP-IS.pdf (accessed on 1 April 2024).

van Steen, T., Norris, E., Atha, K., et al. (2020). What (if any) behaviour change techniques do government-led cybersecurity awareness campaigns use? Journal of Cybersecurity, 6(1). https://doi.org/10.1093/cybsec/tyaa019

Viale Pereira, G., Cunha, M. A., Lampoltshammer, T. J., et al. (2017). Increasing collaboration and participation in smart city governance: a cross-case analysis of smart city initiatives. Information Technology for Development, 23(3), 526–553. https://doi.org/10.1080/02681102.2017.1353946

Viano, E. C. (Ed.). (2017). Cybercrime, Organized Crime, and Societal Responses. Springer International Publishing. https://doi.org/10.1007/978-3-319-44501-4

Victim assistance and witness protection. (n.d.). United Nations: Office on Drugs and Crime. Available online: https://www.unodc.org/unodc/en/organized-crime/witness-protection.html (accessed on 1 April 2024).

Walker, S. (2019). The Global Initiative against Transnational Organized Crime. Available online: https://globalinitiative.net/wp-content/uploads/2019/03/TGIATOC-Report-Cybercrime-in-the-UN-01Mar1510-Web.pdf (accessed on 1 April 2024).

Weber, A. M. (2003). The Council of Europe’s Convention on Cybercrime. Berkeley Technology Law Journal, 18(1), 425-446.

Weekes, B., & Tikk-Ringas, E. (2013). Cyber Security Affairs: Global and Regional Processes, Agendas and Instruments. Geneva: ICT4Peace Publishing.

Wicki-Birchler, D. (2020). The Budapest Convention and the General Data Protection Regulation: acting in concert to curb cybercrime? International Cybersecurity Law Review, 1(1–2), 63–72. https://doi.org/10.1365/s43439-020-00012-5

Zachary, K. Goldman & McCoy, D. (2024). ECONOMIC ESPIONAGE: Deterring Financially Motivated Cybercrime. Available online: https://jnslp.com/wp-content/uploads/2017/10/Deterring-Financially-Motivated-Cybercrime_2.pdf (accessed on 1 April 2024).




DOI: https://doi.org/10.24294/jipd.v8i10.6007

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Naeem AllahRakha

License URL: https://creativecommons.org/licenses/by/4.0/

This site is licensed under a Creative Commons Attribution 4.0 International License.