THE CHALLENGES OF CYBERCRIME
Keywords:
cybercrime, hackers, white collar crime, virtual environment, legal instruments, regulatorsAbstract
This paper aims to illuminate the problem of cybercrime, to point to its uniqueness and a specific context in which it appears, as well as to suggest possible ways of legal regulations in this field. The phenomenal diversity of this term complicates the understanding of cybercrime as a unique phenomenon, while inability to differentiate it from white-collar crime and traditional crime brings additional conceptual problems. The legal instruments for fighting cybercrime vary widely depending on the countries, and the fact is that international initiatives for preventing and fighting cybercrime is developing slowly in comparison to the development of technology and increasingly sophisticated forms of manifestation of this type of crime. In addition to the required legislative measures in this field, this paper will also describe the other ways of regulating behavior in cyberspace – social norms, market and architecture (technology) of virtual space.
Downloads
References
Adoption of Convention on Cybercrime (2001). The American Journal of International Law. 95(4): 889-891.
Akers, L. Ronald (1985). Deviant Behavior: A Social Learning Approach. Belmont.
Bequai, August (1990). Computer-related crime. Strasburg, Germany: Council of Europe.
Bilinović, Ana (2014). Primena koncepta socio-kulturne integracije u analizi devijantnosti i procesa etiketiranja.Zbornik Instituta za kriminološka i sociološka istraživanja, God. 33, br. 1, str. 177-191.
Braithwhite, John (1985). White collar crime. Annual Review of Sociology. 11: 1-25.
Bulatović, Aleksandra (2010). Pitanje o javnom ovlašćenju-koren kriminala belog okovratnika. Socijalna misao. 4:75-86.
Coleman, J. William (1987). Toward an integrated theory of white-collar crime. American Journal of Sociology. 93(2):406–439.
Croall, Hazel (1992). White collar crime. Philadelphia and Buckingham, PA: Open University Press.
Duff, Liz, and Gardiner, Simon (1996). Computer crime in the global village: Strategies for control and regulation--in defence of the hacker. International Journal of the Sociology of Law, Vol. 24, no. 2, pp. 211–228.
Durham, W. Cole and Russel C. Skousen (1990). The law of computer-related crime in the United States. The American Journal of Comparative Law. Supplement. U.S. Law in an Era of Democratization. 38:557-580.
Harrington, J. Susan (1996). The effects of codes of ethics and personal denial of responsibilityon computer abuse judgments and intentions. MIS Quartetly. 20(3): 257-278
Katyal, K. Neal (2001). Criminal law in cyberspace. University of Pensilvania Law Review. 149(4):1003-1114.
Kovačević-Lepojević, Marina i Borko Lepojević (2009). Žrtve sajber proganjanja u Srbiji. Temida.3: 89-108.
Lessig, Lawrence (2000). Code and other laws of cyberspace. New York: Basic Books.
Lockwood, John, James Moscola, David Reddick, Mathew Kulig and Tim Brooks (2003). Application of hardware accelarated extensible network modes for Internet worm and virus protection. Kyoto, Japan: IWAN
Matijašević, Jelena i Svetlana Ignjatijević (2010). Kompjuterski kriminal u pravnoj teoriji, pojam, karakteristike, posledice. Infoteh-Jahorina . 9: 852-856.
McEwen, J. Thomas (1989). Dedicated computer crime units. Washington, DC: National Institute of Justice.
McQuade, C. Samuel (2009). Encyclopedia of cybercrime. Westport, Conneticut: Greenwood Press.
Minor, W. William (1981). Techniques of neutralization: A re-conceptualization and empirical examination. Journal of Research in Crime and Delinquency . 18 (2): 295–318.
Morris, G. Robert (2011). Computer Hacking and the Techniques of Neutralization: An Empirical Assessment. In: T. J. Holt and B. H. Shell (Eds.), Corporate hacking and tehnology-driven crime: Social dynamics and implications. New York, NY: Information Science Reference, pp. 1-17.
Petrović, M. Dalibor (2012). Novi oblici društvenog umrežavanja: Uloga interneta u uspostavljanju interpersonalnih odnosa u Srbiji. Beograd: Filozofski fakultet – doktorska disertacija.
Pisarić, Milana (2011). Stanje i tendencije u suprotstavljanju kompjuterskom kriminalu na evropskom nivou. Zbornik radova Pravnog fakulteta u Novom Sadu. 1: 487-505.
Pontell, N. Henry and Stephen M. Rossof (2009). White-collar delinquency. Crime, Law and Social Change. 51(1): 147-162.
Ruyver, Brice, Gert Vermeulen, Tom Beken (2002). Strategies of the EU and the US in combating transnational organized crime. Antwerp, Belgium: Maklu-Publishers.
Schell, Bernadette and Clemens Martin (2006). Webster's New World Dictionary. Indianapolis,IN: Whiley Publishing Inc.
Scott, B. Marvin and Stanford M. Lyman (1986). Accounts. American Sociological Review. 33: 46-62.
Shah, R. Monica (2005). The Case of Staturory Suppression Remedy to Regulate Illegal Private Party Searchers in Cyberspace. Columbia Law Review. 105(1): 250-278.
Stamenković, Branko, Adis Balota, Valentina Pavličić, Bojana Paunović i Jakša Backović (2014). Visokotehnološki kriminal: Praktični vodič kroz savremeno krivično pravo i primjere iz prakse. Podgorica : OEBS Misija u Crnoj Gori.
Stefanović, Ivana (2009). Krivična dela vezana za iskorišćavanje dece u pornografske svrhe zloupotrebom računarskih mreža (međunarodni i domaći pravni okvir). Temida. 3: 27-42.
Straub, W. Detmar and William D. Nance (1990). Discovering and disciplining computer abuse in organizations: A feild study. MIS Quarterly, 14(1): 45-60.
Sutherland, H. Edwin (1940). White-collar criminality. American Sociological Review, 5(1): 1-12.
Sykes, M. Gresham, and Matza, David (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22: 664–670.
Turgeman-Goldschmidt, Orly (2011). Between Hackers and White-Collar Offenders. In: T. J. Holt and B. H. Shell (Eds.), Corporate hacking and tehnology-driven crime: Social dynamics and implications. New York, NY: Information Science Reference: 18- 38.
Turkle, Sherry (1984). The second self: Computers and the human spirit. New York, NY: Simon and Schuster.
Vuletić, Dejan (2009). Trgovina ljudskim organima u sajber prostoru. Temida , 3: 63- 74.
Weber, M. Amelie (2003). The Concil of Europe's Convention on Cybercrime. Berkeley Technology Law Journal. 18(1): 425-446.
Weisburd, David, and Schlegel, Kip (1992). Returning to the mainstream. In: K. Schlegel & D. Weisburd (Eds.), White-collar crime reconsidered. Boston, MA: Northeastern University Press.
Zakon o organizaciji i nadležnosti državnih organa za borbu protiv visokotehnološkog kriminala, „Službeni glasnik Republike Srbije” br. 61/2005 i 104/2009.












