Some New Challenges of Cybercrime and the Reason for Its Outdated Regulations

  • Anri Nishnianidze Grigol Robakidze University, Georgia
Keywords: Cybercrime, Computer Crimes, Virtual Criminology, Cyberspace, Cyber Security

Abstract

Purpose – The purpose of the research is to show what cybercrime is and how the arsenal of cybercriminals has evolved and legal regulations that exist today no longer respond to the challenges that would make the fight against cybercrime effective. Design/methodology/approach – The author of the research searched for the latest legal and multidisciplinary literature on the issue of cybercrime. Using various scientific methods, the mentioned literature was analyzed and summarized to present the essence and problems of fighting against cybercrime. Findings – In the conditions of modern technological development, there are many benefits along with negative facts. Cyberspace is not a safe place for the majority of the population. During the search process, it appeared that, with the arrival of each new day, the arsenal of cybercriminals is getting richer, to which law enforcement agencies do not have an appropriate response. Consequently, the process of fighting cybercrime becomes difficult due to outdated legal regulations. Research limitations/implications – The research examined the latest opinions that are being debated in international legal circles. The problems that are on the agenda and which are important to solve have appeared. Accordingly, the paper offers the latest ways to correct the current situation, make recommendations and solve existing problems. Originality/value – Cyberspace is the most important space for many people, also for private and public structures. Solving the current issues on the agenda is important to make working in cyberspace safe for each person and organization.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

PlumX Statistics

References

1. Alexandrou, A. (2021). Cybercrime and information technology: Theory and Practice: The computer network infrastructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices. CRC Press.
2. Ariu, D., Didaci, L., Fumera, G., Giacinto, G., Roli, F., Frumento, E., & Freschi, F. (2016). A (cyber)ROAD to the future: A methodology for building cybersecurity research roadmaps. In Advanced Sciences and Technologies for Security Applications (pp. 53–77). Springer International Publishing.
3. Armin, J., Thompson, B., & Kijewski, P. (2016). Cybercrime economic costs: No measure no solution. In Advanced Sciences and Technologies for Security Applications (pp. 135–155). Springer International Publishing.
4. Augenbaum, S. (2019). The secret to cybersecurity secret to cybersecurity: A simple plan to protect your family and business from cybercrime. Forefront Books.
5. Bandler, J., & Merzon, A. (2020). Cybercrime investigations: A comprehensive resource for everyone. CRC Press.
6. Bernik, I. (2014). Cybercrime and Cyber Warfare (1st ed.). ISTE Ltd and John Wiley & Sons.
7. Bossler, A. M. (2020). Cybercrime legislation in the United States. In The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 257–280). Springer International Publishing.
8. Chang, L. Y. C. (2020). Legislative frameworks against cybercrime: The Budapest convention and Asia. In The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 327–343). Springer International Publishing.
9. Chawki, M., Darwish, A., Khan, M. A., & Tyagi, S. (2015a). Anonymity, privacy and security issues in the cyberworld. In Studies in Computational Intelligence (pp. 97–111). Springer International Publishing.
10. Chawki, M., Darwish, A., Khan, M. A., & Tyagi, S. (2015b). Cybercrime: Introduction, Motivation and Methods. In Studies in Computational Intelligence (pp. 3–23). Springer International Publishing.
11. Chawki, M., Darwish, A., Khan, M. A., & Tyagi, S. (2015c). Online obscenity and child sexual abuse. In Studies in Computational Intelligence (pp. 81–94). Springer International Publishing.
12. Chawki, M., Darwish, A., Khan, M. A., & Tyagi, S. (2015d). Sexual Harassment in Cyberworld. In Studies in Computational Intelligence (pp. 65–78). Springer International Publishing.
13. Chawki, M., Darwish, A., Khan, M. A., & Tyagi, S. (2015e). Strategies and statutes for prevention of cybercrime. In Studies in Computational Intelligence (pp. 113–127). Springer International Publishing.
14. Choi, K.-S., Lee, C. S., & Louderback, E. R. (2020). Historical evolutions of cybercrime: From computer crime to cybercrime. In The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 27–43). Springer International Publishing.
15. Choraś, M., Kozik, R., Churchill, A., & Yautsiukhin, A. (2016). Are we doing all the right things to counter cybercrime? In Advanced Sciences and Technologies for Security Applications (pp. 279–294). Springer International Publishing.
16. Cleland, J. (2017). Online racial hate speech. In Cybercrime and its Victims (1st Edition, pp. 131–147). Routledge.
17. Clough, J. (2015). Principles of Cybercrime (2nd ed.). Cambridge University Press.
18. Cybersecurity awareness: A Real-World Perspective on Cybercrime & Cyberattacks. (n.d.). Pothi.com. Retrieved August 20, 2022, from https://store.pothi.com/book/ebook-prakash-prasad-cybersecurity-awarness-real-world-perspective-cybercrime-cyberattacks /
19. de Arimatéia da Cruz, J. (2020). The legislative framework of the European Union (EU) convention on cybercrime. In The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 223–237). Springer International Publishing.
20. Dimaggio, J. (2022). The art of cyberwarfare: An investigator’s guide to espionage, ransomware, and organized cybercrime. No Starch Press.
21. Dodge, C., & Burruss, G. (2019). Policing cybercrime. In The Human Factor of Cybercrime (1st Edition, pp. 339–358). Routledge.
22. Ec-Council. (2016). Computer forensics: Investigating network intrusions and cybercrime (chfi), 2nd edition (2nd ed.). Cengage Learning.
23. Edwards, G. (2019). Cybercrime Investigators Handbook. Standards Information Network.
24. Ghosh, S., & Turrini, E. (Eds.). (2014). Cybercrimes: A Multidisciplinary Analysis (2011th ed.). Springer.
25. Guinchard, A. (2020). The criminalisation of tools under the computer misuse act 1990. The need to rethink cybercrime offences to effectively protect legitimate activities and deter cybercriminals. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3865146
26. Hill, J. B., & Marion, N. E. (2016). Introduction to cybercrime: Computer crimes, laws, and policing in the 21st century: Computer crimes, laws, and policing in the 21st century. Praeger.
27. Holt, K., & Liggett, R. (2020). Revenge Pornography. In The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 1–19). Springer International Publishing.
28. Holt, T. J. (2019). Police and Extralegal Structures to Combat Cybercrime. In The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 1–18). Springer International Publishing.
29. Holt, T. J., & Bossler, A. M. (2017). Cybercrime in Progress: Theory and prevention of technology-enabled offences. Routledge.
30. Hutchings, A., Pastrana, S., & Clayton, R. (2019). Displacing big data. In The Human Factor of Cybercrime (1st Edition, pp. 408–424). Routledge.
31. Jenkinson, A. (2022). Ransomware and Cybercrime. Taylor & Francis.
32. Jerman-Blažič, B., & Klobučar, T. (2016). Towards the development of a research agenda for cybercrime and cyberterrorism – identifying the technical challenges and missing solutions. In Advanced Sciences and Technologies for Security Applications (pp. 157–174). Springer International Publishing.
33. Kijewski, P., Jaroszewski, P., Urbanowicz, J. A., & Armin, J. (2016). The never-ending game of cyberattack attribution. In Advanced Sciences and Technologies for Security Applications (pp. 175–192). Springer International Publishing.
34. Koops, B.-J. (2016). Megatrends and grand challenges of cybercrime and cyberterrorism policy and research. In Advanced Sciences and Technologies for Security Applications (pp. 3–15). Springer International Publishing.
35. Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4), 1073–1137. https://doi.org/10.1037/a0035618
36. Kremling, J., & Sharp Parker, A. M. (2017). Cyberspace, Cybersecurity, and Cybercrime. SAGE Publications.
37. Lavorgna, A. (2020). Organized Crime and Cybercrime. In The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 117–134). Springer International Publishing.
38. Liggett, R., Lee, J. R., Roddy, A. L., & Wallin, M. A. (2019). The dark web as a platform for a crime: An exploration of illicit drug, firearm, CSAM, and cybercrime markets. In The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 1–27). Springer International Publishing.
39. Maillart, J.-B. (2021). The need to think beyond objective territoriality to better protect the rights of the suspect of a cybercrime. In Rethinking Cybercrime (pp. 105–120). Springer International Publishing.
40. Maimon, D. (2020). Deterrence in cyberspace: An interdisciplinary review of the empirical literature. In The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 1–19). Springer International Publishing.
41. Marion, N. E., & Twede, J. (2020). Cybercrime: An Encyclopedia of Digital Crime. ABC-CLIO.
42. Martellozzo, E. (2017). Online sexual grooming. In Cybercrime and its Victims (1st Edition, pp. 108–128). Routledge.
43. McCarthy, A. L., & Steinmetz, K. F. (2020). Critical Criminology and Cybercrime. In The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 601–621). Springer International Publishing.
44. McGuire, M. (2019). It ain’t what it is, it’s the way that they do it. Why we still don’t understand cybercrime. In The Human Factor of Cybercrime (1st Edition, pp. 3–28). Routledge.
45. Mehan, J. E. (2014). Cyberwar, cyberterror, cybercrime and cyberactivism: An in-depth guide to the role of standards in the cybersecurity environment (2nd ed.). IT Governance Publishing.
46. Nhan, J., & Noakes, N. (2020). Police legitimacy in the age of the internet. In The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 403–424). Springer International Publishing.
47. Olesen, N. (2016). European public-private partnerships on cybersecurity - an instrument to support the fight against cybercrime and cyberterrorism. In Advanced Sciences and Technologies for Security Applications (pp. 259–278). Springer International Publishing.
48. Owen, T., Noble, W., & Speed, F. C. (2017a). Something you wish you had never seen – videos of death & murder on Facebook, youtube and other media platforms. In New Perspectives on Cybercrime (pp. 241–252). Springer International Publishing.
49. Owen, T., Noble, W., & Speed, F. C. (2017b). The problem of ‘virtual criminology.’ In New Perspectives on Cybercrime (pp. 177–196). Springer International Publishing.
50. Payne, B. K. (2020). Defining Cybercrime. In The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 3–25). Springer International Publishing.
51. Poulsen, K. (2011). Kingpin. Crown Publishing Group.
52. Powell, A., Flynn, A., & Henry, N. (2019). Sexual violence in a digital society. In The Human Factor of Cybercrime (1st Edition, pp. 134–155). Routledge.
53. Richards, J. R. (2006). Transnational criminal organizations, cybercrime, and money laundering: A handbook for law enforcement officers, auditors, and financial investigators (2nd ed.). CRC Press.
54. Vincent, N. A. (2017). Victims of cybercrime: definitions and challenges. In Cybercrime and its victims (pp. 27–42). Routledge, Taylor and Francis Group.
55. Waschke, M. (2017). Personal cybersecurity: How to avoid and recover from cybercrime (1st ed.). APRESS.
Published
2023-03-21
How to Cite
Nishnianidze, A. (2023). Some New Challenges of Cybercrime and the Reason for Its Outdated Regulations. European Scientific Journal, ESJ, 19(39), 92. https://doi.org/10.19044/esj.2023.v19n39p92