THE CHALLENGES OF CYBERCRIME

Authors

  • Milena Kojić Филозофски факултет Нови Сад

Keywords:

cybercrime, hackers, white collar crime, virtual environment, legal instruments, regulators

Abstract

This paper aims to illuminate the problem of cybercrime, to point to its uniqueness and a specific context in which it appears, as well as to suggest possible ways of legal regulations in this field. The phenomenal diversity of this term complicates the understanding of cybercrime as a unique phenomenon, while inability to differentiate it from white-collar crime and traditional crime brings additional conceptual problems. The legal instruments for fighting cybercrime vary widely depending on the countries, and the fact is that international initiatives for preventing and fighting cybercrime is developing slowly in comparison to the development of technology and increasingly sophisticated forms of manifestation of this type of crime. In addition to the required legislative measures in this field, this paper will also describe the other ways of regulating behavior in cyberspace – social norms, market and architecture (technology) of virtual space.

Downloads

Download data is not yet available.

References

Adoption of Convention on Cybercrime (2001). The American Journal of International Law. 95(4): 889-891.

Akers, L. Ronald (1985). Deviant Behavior: A Social Learning Approach. Belmont.

Bequai, August (1990). Computer-related crime. Strasburg, Germany: Council of Europe.

Bilinović, Ana (2014). Primena koncepta socio-kulturne integracije u analizi devijantnosti i procesa etiketiranja.Zbornik Instituta za kriminološka i sociološka istraživanja, God. 33, br. 1, str. 177-191.

Braithwhite, John (1985). White collar crime. Annual Review of Sociology. 11: 1-25.

Bulatović, Aleksandra (2010). Pitanje o javnom ovlašćenju-koren kriminala belog okovratnika. Socijalna misao. 4:75-86.

Coleman, J. William (1987). Toward an integrated theory of white-collar crime. American Journal of Sociology. 93(2):406–439.

Croall, Hazel (1992). White collar crime. Philadelphia and Buckingham, PA: Open University Press.

Duff, Liz, and Gardiner, Simon (1996). Computer crime in the global village: Strategies for control and regulation--in defence of the hacker. International Journal of the Sociology of Law, Vol. 24, no. 2, pp. 211–228.

Durham, W. Cole and Russel C. Skousen (1990). The law of computer-related crime in the United States. The American Journal of Comparative Law. Supplement. U.S. Law in an Era of Democratization. 38:557-580.

Harrington, J. Susan (1996). The effects of codes of ethics and personal denial of responsibilityon computer abuse judgments and intentions. MIS Quartetly. 20(3): 257-278

Katyal, K. Neal (2001). Criminal law in cyberspace. University of Pensilvania Law Review. 149(4):1003-1114.

Kovačević-Lepojević, Marina i Borko Lepojević (2009). Žrtve sajber proganjanja u Srbiji. Temida.3: 89-108.

Lessig, Lawrence (2000). Code and other laws of cyberspace. New York: Basic Books.

Lockwood, John, James Moscola, David Reddick, Mathew Kulig and Tim Brooks (2003). Application of hardware accelarated extensible network modes for Internet worm and virus protection. Kyoto, Japan: IWAN

Matijašević, Jelena i Svetlana Ignjatijević (2010). Kompjuterski kriminal u pravnoj teoriji, pojam, karakteristike, posledice. Infoteh-Jahorina . 9: 852-856.

McEwen, J. Thomas (1989). Dedicated computer crime units. Washington, DC: National Institute of Justice.

McQuade, C. Samuel (2009). Encyclopedia of cybercrime. Westport, Conneticut: Greenwood Press.

Minor, W. William (1981). Techniques of neutralization: A re-conceptualization and empirical examination. Journal of Research in Crime and Delinquency . 18 (2): 295–318.

Morris, G. Robert (2011). Computer Hacking and the Techniques of Neutralization: An Empirical Assessment. In: T. J. Holt and B. H. Shell (Eds.), Corporate hacking and tehnology-driven crime: Social dynamics and implications. New York, NY: Information Science Reference, pp. 1-17.

Petrović, M. Dalibor (2012). Novi oblici društvenog umrežavanja: Uloga interneta u uspostavljanju interpersonalnih odnosa u Srbiji. Beograd: Filozofski fakultet – doktorska disertacija.

Pisarić, Milana (2011). Stanje i tendencije u suprotstavljanju kompjuterskom kriminalu na evropskom nivou. Zbornik radova Pravnog fakulteta u Novom Sadu. 1: 487-505.

Pontell, N. Henry and Stephen M. Rossof (2009). White-collar delinquency. Crime, Law and Social Change. 51(1): 147-162.

Ruyver, Brice, Gert Vermeulen, Tom Beken (2002). Strategies of the EU and the US in combating transnational organized crime. Antwerp, Belgium: Maklu-Publishers.

Schell, Bernadette and Clemens Martin (2006). Webster's New World Dictionary. Indianapolis,IN: Whiley Publishing Inc.

Scott, B. Marvin and Stanford M. Lyman (1986). Accounts. American Sociological Review. 33: 46-62.

Shah, R. Monica (2005). The Case of Staturory Suppression Remedy to Regulate Illegal Private Party Searchers in Cyberspace. Columbia Law Review. 105(1): 250-278.

Stamenković, Branko, Adis Balota, Valentina Pavličić, Bojana Paunović i Jakša Backović (2014). Visokotehnološki kriminal: Praktični vodič kroz savremeno krivično pravo i primjere iz prakse. Podgorica : OEBS Misija u Crnoj Gori.

Stefanović, Ivana (2009). Krivična dela vezana za iskorišćavanje dece u pornografske svrhe zloupotrebom računarskih mreža (međunarodni i domaći pravni okvir). Temida. 3: 27-42.

Straub, W. Detmar and William D. Nance (1990). Discovering and disciplining computer abuse in organizations: A feild study. MIS Quarterly, 14(1): 45-60.

Sutherland, H. Edwin (1940). White-collar criminality. American Sociological Review, 5(1): 1-12.

Sykes, M. Gresham, and Matza, David (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22: 664–670.

Turgeman-Goldschmidt, Orly (2011). Between Hackers and White-Collar Offenders. In: T. J. Holt and B. H. Shell (Eds.), Corporate hacking and tehnology-driven crime: Social dynamics and implications. New York, NY: Information Science Reference: 18- 38.

Turkle, Sherry (1984). The second self: Computers and the human spirit. New York, NY: Simon and Schuster.

Vuletić, Dejan (2009). Trgovina ljudskim organima u sajber prostoru. Temida , 3: 63- 74.

Weber, M. Amelie (2003). The Concil of Europe's Convention on Cybercrime. Berkeley Technology Law Journal. 18(1): 425-446.

Weisburd, David, and Schlegel, Kip (1992). Returning to the mainstream. In: K. Schlegel & D. Weisburd (Eds.), White-collar crime reconsidered. Boston, MA: Northeastern University Press.

Zakon o organizaciji i nadležnosti državnih organa za borbu protiv visokotehnološkog kriminala, „Službeni glasnik Republike Srbije” br. 61/2005 i 104/2009.

Downloads

Published

2015-06-30

How to Cite

Kojić, M. . (2015). THE CHALLENGES OF CYBERCRIME . KULTURA POLISA, 12(27), 461–475. Retrieved from https://kpolisa.com/index.php/kp/article/view/1055

Issue

Section

Monographic study

Metrics