Spelling suggestions: "subject:"cybercrime."" "subject:"cybercrimes.""
41 |
Kriminologické aspekty kybernetické kriminality / Criminological aspects of cybercrimeKopáč, Jan January 2021 (has links)
Today, the phenomenon of cybercrime can no longer be considered something obscured or unknown to the general public. Yet the majority of general population is aware of only a fraction of the offenses committed in cyberspace. As a result, a substantial proportion of Internet users act in violation of valid legislation in cyberspace, whether they do so knowingly or not. Cybercrime cannot be considered less dangerous than other forms of crime. On the contrary, due to its availability, globality and possible distance of the offender from the crime itself, this kind of criminal behaviour is on the rise year by year and its effects are becoming more severe, mainly due to the dependence of today's society on information and communication technologies. The aim of this thesis is to provide an introduction to the cybernetic world crime and offer a general view of the various aspects of this criminal activity. The introduction of my thesis deals with detailed description of the basic terminology present throughout the whole thesis and contains a brief description of the history and origins of the computer and Internet. An essential part of my thesis is the presentation of the legislative framework in the field of cybercrime regulation. This section mentions the laws that apply in the cyberspace environment...
|
42 |
Trestněprávní aspekty kyberšikany / Criminal aspects of cyberbullyingVištalová, Anastasja January 2021 (has links)
Thesis title, keywords and resume Thesis title: Criminal aspects of cyberbullying Key words: cybercrime, cyberbullying, criminal law This master thesis deals with the definition of key criminal aspects of criminal offenses referred to as cyberbullying. The master thesis is divided into five separate chapters. The first chapter deals with the general definition of cyberbullying as a new phenomenon and its comparison with the traditional form of bullying, defines other key terms and defines the victim and perpetrators of this behavior, including these types and typology. The second chapter introduces cyberstalking, which is compared to stalking, following the example of the first chapter, again defines and defines the basic concepts that are characteristic of this issue, as well as the perpetrator and victim, considering their patterns of behavior, typology, and motives, which lead the aggressor to commit an infringement. The third chapter focuses on the illicit handling of personal data, which can serve as an effective tool to carry out cyberbullying, while all of them mention the institute of "freezing of data", which in turn serves as a means of prosecution and detection by law enforcement authorities to perpetrators of cyberbullying. The fourth chapter deals with the fastest growing and at the same time...
|
43 |
Being Pursued Online: Extent and Nature of Cyberstalking Victimization from a Lifestyle/Routine Activities PerspectiveReyns, Bradford W. 06 August 2010 (has links)
No description available.
|
44 |
The legal protection of e-consumers against e-commerce fraud in MalaysiaRazali, N.A.H., Wan Rosli, Wan R., Othman, M.B. 25 September 2023 (has links)
Yes / In the past decade, E-commerce has developed and plays a vital role in our daily lives. However, fraud in E-commerce has increasingly become more prevalent and causes huge monetary loss, especially to E-consumers which usually results in them being unable to get what they have paid for. Fraudsters use various modus operandi to trick E-consumers such as displaying cheap goods via online platforms to induce them to pay for the goods. Despite considerable concerns about E-commerce fraud in Malaysia, the legislative sanction is still inadequate due to the deficiency of the existing legal framework. This paper examines the nature of E-commerce fraud, understand the modus operandi, and look into the legal protection afforded to E-consumers in Malaysia. It employs doctrinal content analysis and secondary data from the Malaysian Penal Code and the Communication and Multimedia Act 1998, academic journals, books, news articles and online databases. The authors contend that the lack of legal protection for E-consumers is due to the insufficiency of the law and the lack of awareness of the gravity of the such crime. Effective governance of fraud in E-commerce is imperative to facilitate prosecution and investigation and holistic protection for the victims of cyber fraud.
|
45 |
The legal response to cyberstalking in MalaysiaWan Rosli, Wan R., Hamin, Z. 25 September 2023 (has links)
No / In the past two decades, the Internet has been an integral part of our daily lives. The dependency on the Internet and having unlimited access to modern communication systems has brought numerous benefits for users worldwide. However, as a double-edged sword, such systems has also generated a high degree of risk of victimisation from a myriad of cybercrimes, including cyberstalking. Evidence has indicated that cyberstalking has led to more heinous crimes such as cyber fraud and cyber defamation through data mining and social engineering. Moreover, severe repercussion occurs when the crime transcends into the real world which results in rape and even murder. Given the severe impacts of cyberstalking and the nature of such crime in other Western countries, the perception of the law's adequacy remains vague in the current Malaysian legal landscape. Hence, this paper aims at examining the perception of the criminalisation of cyberstalking in Malaysia, the various motives of cyberstalkers in the commission of such crime and the protection afforded to victims of cyberstalking. The paper will also discuss the legal response to cyberstalking in the United Kingdom and European Union focusing on how these countries govern such crime within their jurisdiction. This paper adopts a qualitative methodology, of which the primary data is generated from semi-structured interviews with the relevant stakeholders and victims. The secondary data are the Communications and Multimedia Act 1998, the Penal Code, books, academic journals, online databases, and other library-based sources. The sampling method in this research is purposive sampling and the qualitative data analysis was conducted through thematic and content analysis, in which the observations and the interview transcripts from the semi-structured interviews were examined. The primary data were triangulated with the semi-structured interview data obtained from an officer from the Ministry of Communication and Multimedia and another officer from the Ministry of Women, Family and Community Development. The findings revealed contradictory views on the effective response of the criminal justice system towards cyberstalking, which explains the under-reporting of such crime. Reports has also highlighted that more than 70 per cent of stalking victims are reluctant to lodge a police report due to the belief that enforcement officers would be unhelpful. The findings highlighted that the under-reporting by victim and under-recording by police combined with frequent unresponsiveness of prosecutors and judges leads to significant barriers for effective criminal justice responses to stalking offences. Also, the motivations of cyberstalkers were evident, such as jealousy and obsession. Furthermore, the stalkers may share traits such as envy, a pathological obsession, including professional or sexual fixation, unemployment or failure with their job or life, and a cruel intention to intimidate or cause others to feel inferior Significantly, the findings illustrate that the current Malaysian legal framework on cyberstalking is deficient in protecting cyberstalking victims, which calls for an urgent need for a review in the Malaysian laws.
|
46 |
Kybernetická krimnalita / Cyber crimeBartůněk, Jan January 2015 (has links)
Development of information technology is one of the most dynamic parts of today's global society. Along with the coming of new technologies it generates new types of crime, eventually existing types of criminal activities in this area are moving from the real world to cyberspace. This rapid development of cyber crime enforces corresponding changes in the legislation related to cyberspace. In the Czech Republic the most fundamental changes in cyber crime law have been made along with the new Criminal Code. The new code has modified some areas, that were not mentioned by previous criminal code, refined or amended previous terminology related to cyberspace and added institutes required by international commitments, especially by the Convention on Cybercrime. The purpose of this diploma thesis on "Cyber crime" is to outline the issues of cyber-crime, point out some troubling topics, which are currently present in cyberspace, and outline possible future development of criminal law in cyberspace. In the beginning of the thesis there is a short summary of cyberspace and cyber crime history, that is followed by definitions of selected basic concepts of cyberspace and cyber crime. In the following chapters, there is a summary of current Czech legislation of selected areas and there some examples of such...
|
47 |
The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer SystemHowell, Christian Jordan-Michael 13 June 2016 (has links)
System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to one of three warning messages: an altruistic message used for moral persuasion (warning 1), a legal sanction threat (warning 2), and an ambiguous threat (warning 3). More specifically, the current study examines the temporal order of various keystroke commands to determine if some keystroke commands are used as a tactical skill to avoid detection. The results of a series of bivariate cross-tabulations show that encountering a standard legal threat or ambiguous threat increase the early use of reconnaissance commands; however, these findings were not pronounced enough to gain statistical significance. Since the current study is the first known test of particularistic restrictive deterrence in cyberspace it informs those working in cyber security, whilst expanding the scope of the theory.
|
48 |
Právní aspekty boje proti počítačové trestné činnosti / Legal Aspects of Fighting CybercrimeDostál, Otto January 2020 (has links)
The thesis deals with the topic of computer crime. Foremost, it demonstrates on an example of the operation of a medical image information processing system some selected aspects of this issue. It shows that it is always necessary to monitor the current state of the technical knowledge at the time, but also the need of addressing the issue within the corresponding legal limits. The thesis presents criminal law reality as a complex system. The links between different parts of the system are examined, and possible shortcomings are considered. The legal instruments and legal limits of the procedures that can be used against cybercrime are evaluated. The thesis focuses especially on the issue of obtaining evidence under the Czech Criminal Procedure Code. It presents a proposal on how to understand individual procedural legal institutes and for what purposes and how to use them. Consequently it suggests legal procedures for specific selected practical situations.
|
49 |
Prevence kriminality / Crime preventionHavlíčková, Jana January 2018 (has links)
Crime prevention Prevention specifics of cybercrime on social networks Abstract (EN): Criminality is the most serious social problem, and therefore it is necessary to prevent the crime and not merely punish it. Crime prevention aims at creating a better standard of human life in all its aspects with eliminating undesirable phenomena in society. Criminality adapts to the evolution of the society. The most dynamically developing form of crime is cybercrime. The subject of this thesis is to compile an up-to-date picture of crime prevention predominantly focusing on cybercrime. The thesis is conceptually divided into two parts, the first deals with crime and its prevention in general, while the other focuses on the specifics of cybercrime. The first part of the thesis briefly defines the relevant terms such as criminality, criminalization and decriminalization, criminogenic factors, relapse, criminology, penology, victimology, crime control, repression and prevention. It also systematizes crime prevention and focuses on the classification via the content or the target (social, situational and victimological), and via the addressees as well (primary, secondary and tertiary). It further notes the current focus of crime prevention, referring in particular to the Doha Declaration and other outcomes of the 13th...
|
50 |
La protection pénale de la sécurité de l’information en Irak : Etude juridique au niveau national et international / The Criminal protection of information security in Iraq : Legal study at national and international level.Ghaibi, Dhia Moslem Abd Alameer 20 September 2018 (has links)
La sécurité des technologies de l'information, de la communication (TIC) et la question de la cybercriminalité ont été préoccupantes pendant un certain temps. Ce n'est que dans le passé récent, que les gouvernements ont commencé à comprendre l'importance de la sécurité des TIC. La criminalité informatique, comme toute forme de criminalité, est difficile à chiffrer, la cybercriminalité pourrait constituer la forme de comportement criminel la moins déclarée puisque la victime ignore souvent qu’une infraction a même eu lieu. De plus l'insuffisance des solutions de cybersécurité ainsi que l'absence d'une compréhension commune font des difficultés juridiques à l'échelle nationale et internationale. Il est incertain que les normes du droit-commun, notamment celles du droit pénal, soient suffisantes, d’une part pour couvrir les besoins d’une politique pénale efficace et, d’autre part, la nécessité d’affronter la diversité des crimes et l’évolution continuelle de leurs moyens. L'Irak, comme certains pays, a subi des infractions des systèmes d'information. Mais comment l’Irak peut-il faire face aux questions de la cybercriminalité ? Les lois traditionnelles sont-elles suffisantes pour encadrer la cybersécurité? L’Irak a-t-il besoin de règles juridiques nouvelles ? À cet égard, l’apport du droit international s’avère important pour la lutte contre la cybercriminalité. Les conventions internationales en matière de cyber sécurité ainsi que la législation des pays pionniers dans ce domaine peuvent inspirer le législateur irakien. L’intérêt de ce sujet de recherche vise, à la lumière du droit international, à proposer une protection juridique efficace et de développer le cadre juridique irakien de la cybersécurité. / The security of information and communication technologies (ICT) and the issue of cybercrime has been a concern for some time. It is only in the recent past that governments have begun to understand the importance of ICT security. Computer crime, like any form of crime, is hard to quantify, and cybercrime may be the least reported form of criminal behavior since the victim often does not know that an offense has even occurred. In addition, the lack of cybersecurity solutions and the lack of common understanding make legal difficulties both nationally and internationally. It is doubtful that common law standards, including those of the criminal law, are sufficient, on the one hand to cover the needs of an effective criminal policy and, on the other hand, the need to deal with the diversity of crimes and the continual evolution of their means. Iraq, like some countries, has suffered information system breaches. But how can Iraq cope with the issues of cybercrime? Are traditional laws sufficient to frame cybersecurity? Does Iraq need new legal rules? In this respect, the contribution of international law is important for the fight against cybercrime. International cyber security conventions and pioneer legislation in this area can inspire the Iraqi legislator. The purpose of this research topic is, in the light of international law, to provide effective legal protection and to develop Iraq's legal framework for cybersecurity.
|
Page generated in 0.0409 seconds