Transformation of Crimes (Cybercrimes) in Digital Age


Abstract views: 1433 / PDF downloads: 851

Authors

  • Naeem AllahRakha Tashkent State University of Law

DOI:

https://doi.org/10.59022/ijlp.156

Keywords:

Cybercrime, Hacking, Cybersecurity, Cyber Law, Cyber Threats

Abstract

The cybercrime thrives, understanding its evolution is critical for security and policy interventions. This research profiles cyber threat trends since the 1950s alongside legal developments. Background examines early hacking cultures, antivirus innovations, and seminal cases that set precedents. The objectives encompass analyzing major technical and legal inflection points over recent decades regarding cybercrimes. The study's aim is validating escalating cyber risks that demand urgent attention. Doctrinal methodology leverages scholarly journals, case law, and industry data. Key findings reveal sophisticated social engineering tactics, gaps in legal deterrence frameworks, and infrastructure vulnerabilities that underscore needs for global cooperation. Recommendations center on proactive reforms to cybersecurity statutes, public awareness, and cross-border collaboration to mitigate emerging threats. Tracing cybercrime's timeline provides vital context to catalyze preemptive actions against potential attacks in an increasingly interconnected online ecosystem.

References

Tariq, U., Ahmed, I., Bashir, A. K., & Shaukat, K. (2023). A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Sensors, 23(8), 4117. https://doi.org/10.3390/s23084117

Rustambekov, I. (2021, June 22). Uzbekistan: The New – and First – International Commercial Arbitration Law. ICC Dispute Resolution Bulletin, Issue 2. Retrieved from https://ssrn.com/abstract=3872373

Kakharov, S. R. (2004). Criminal liability of natural persons for terrorism in international law. Retrieved from http://diss.natlib.uz/ru-RU/ResearchWork/OnlineView/30024

Uzbekistan Republic. (2022, April 15). On Cybersecurity (Law No. O‘RQ-764). Retrieved from https://lex.uz/uz/docs/5960604

Chen, S., Hao, M., Ding, F., et al. (2023). Exploring the global geography of cybercrime and its driving forces. Humanities & Social Sciences Communications, 10(1), 71. https://doi.org/10.1057/s41599-023-01560-x

Nunzi, A. (2012). Cybercrime: A new challenge for the European Union. Revue Internationale de Droit Pénal, 83(1-2), 289-296. https://www.cairn.info/revue-internationale-de-droit-penal-2012-1-page-289.htm

Zeppa-Priedīte, V., & Brīvule, A. (2023, August 4). Insight into Internet Organised Crime Threat Assessment (IOCTA) news. SORAINEN. https://www.sorainen.com/publications/insight-into-internet-organised-crime-threat-assessment-iocta-news/

NATO Cooperative Cyber Defence Centre of Excellence. (2019). 11th International Conference on Cyber Conflict (CyCon). Tallinn, Estonia. https://ieeexplore.ieee.org/document/8756674

Papakonstantinou, V. (2022). Cybersecurity as praxis and as a state: The EU law path towards acknowledgement of a new right to cybersecurity? Computer Law & Security Review, 44, 105653. https://doi.org/10.1016/j.clsr.2022.105653

McCormick, W. C. (2017). The Computer Fraud & Abuse Act: Failing to Evolve with the Digital Age. SMU Science and Technology Law Review, 16(3), 481. https://scholar.smu.edu/scitech/vol16/iss3/5

De Hert, P., González Fuster, G., & Koops, B.-J. (2006). Fighting cybercrime in the two Europes: The added value of the EU framework decision and the Council of Europe Convention. Revue internationale de droit pénal, 77(3-4), 503-524. https://www.cairn.info/revue-internationale-de-droit-penal-2006-3-page-503.htm

Williams, P. (n.d.). Crime, Illicit Markets, and Money Laundering (pp. 107-108). Carnegie Endowment. Retrieved from https://carnegieendowment.org/pdf/files/mgi-ch3.pdf

Calderoni, F. (2010). The European legal framework on cybercrime: Striving for an effective implementation. Crime Law Soc Change, 54(4), 339–357. https://doi.org/10.1007/s10611-010-9261-6

Miquelon-Weismann, M. F. (2005). The Convention on Cybercrime: A Harmonized Implementation of International Penal Law: What Prospects for Procedural Due Process? Journal of Marshall Journal of Computer and Information Law, 23(4), 329.

Monteith, S., Bauer, M., Alda, M., Geddes, J., Whybrow, P. C., & Glenn, T. (2021). Increasing Cybercrime since the Pandemic: Concerns for Psychiatry. Current Psychiatry Reports, 23(4), 18. https://doi.org/10.1007/s11920-021-01228-w

Giddey, T. (2022). The institutionalization of the fight against white-collar crime in Switzerland, 1970-1990. Business History, 64(7), 1185-1210. https://doi.org/10.1080/00076791.2020.1856077

Ige, O. (2023). Trends of cybercrime from 2001 to 2021: Cybersecurity action plan for Papua New Guinea. Discovering Global Society, 1(9). https://doi.org/10.1007/s44282-023-00007-7

Swist, T., Collin, P., & Steinbeck, K. (2023). A digital innovation typology: Navigating the complexity of emerging technologies to negotiate health systems research with young people. Digital Health, 3.9(4), 2055207623121228. https://doi.org/10.1177/2055207623121228

Tariq, U., Ahmed, I., Bashir, A. K., & Shaukat, K. (2023). A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Sensors, 23(8), 4117. https://doi.org/10.3390/s23084117

Cremer, F., Sheehan, B., Fortmann, M., et al. (2022). Cyber risk and cybersecurity: a systematic review of data availability. Geneva Papers on Risk and Insurance: Issues and Practice, 47(4), 698–736. https://doi.org/10.1057/s41288-022-00266-6

Chen, S., Hao, M., Ding, F., Jiang, D., Dong, J., Zhang, S., Guo, Q., & Gao, C. (2023). Exploring the global geography of cybercrime and its driving forces. Humanit Soc Sci Commun., 10(1), 71. https://doi.org/10.1057/s41599-023-01560-x

Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973-993. https://doi.org/10.1016/j.jcss.2014.02.005

AAG IT. (n.d.). The Latest Cyber Crime Statistics. AAG IT. https://aag-it.com/the-latest-cyber-crime-statistics/#:~:text=Poland%20has%20the%20strongest%20cyber,Poland%20(90.83)

Alawida, M., Omolara, A. E., Abiodun, O. I., & Al-Rajab, M. (2022). A deeper look into cybersecurity issues in the wake of Covid-19: A survey. Journal of King Saud University - Computer and Information Sciences, 34(10), 8176-8206. https://doi.org/10.1016/j.jksuci.2022.08.003

Leukfeldt, E. R., & Holt, T. J. (2022). Cybercrime on the menu? Examining cafeteria-style offending among financially motivated cybercriminals. Computers in Human Behavior, 126, 106979. https://doi.org/10.1016/j.chb.2021.106979

Choi, K. S., Lee, C. S., & Louderback, E. R. (2019). Historical evolutions of cybercrime: From computer crime to cybercrime. In The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 1-21). Palgrave Macmillan. https://doi.org/10.1007/978-3-319-90307-1_2-1

Collier, B., Thomas, D. R., Clayton, R., Hutchings, A., & Chua, Y. T. (2021). Influence, infrastructure, and recentering cybercrime policing: evaluating emerging approaches to online law enforcement through a market for cybercrime services. Policing and Society: An International Journal of Research and Policy, 32(1), 103-124. https://doi.org/10.1080/10439463.2021.1883608

Sarkar, G., & Shukla, S. K. (2023). Behavioral analysis of cybercrime: Paving the way for effective policing strategies. Journal of Economic Criminology, 2, 100034. https://doi.org/10.1016/j.jeconc.2023.100034

Kello, L. (2021). Cyber legalism: why it fails and what to do about it. Journal of Cybersecurity, 7(1), tyab014. https://doi.org/10.1093/cybsec/tyab014

Shillair, R., Esteve-González, P., Dutton, W. H., Creese, S., & Von Solms, B. (2023). Building Cybersecurity Capacity through Education, Awareness, and Training. In Cybersecurity for Decision Makers (1st ed., pp. 18). CRC Press. https://doi.org/10.1201/9781003319887-22

Peters, A., & Jordan, A. (2020). Countering the Cyber Enforcement Gap: Strengthening Global Capacity on Cybercrime. Journal of National Security Law & Policy, 10(487), 488-489. Retrieved from https://jnslp.com/wp-content/uploads/2020/05/Countering-the-Cyber-Enforcement-Gap.pdf

McCrudden, C. (2008). Human Dignity and Judicial Interpretation of Human Rights. European Journal of International Law, 19(4), 655–724. https://doi.org/10.1093/ejil/chn043

Rhim, J., Lee, J-H., Chen, M., & Lim, A. (2021). A Deeper Look at Autonomous Vehicle Ethics: An Integrative Ethical Decision-Making Framework to Explain Moral Pluralism. Frontiers in Robotics and AI, 8, Article 632394. https://doi.org/10.3389/frobt.2021.632394

Morley, J., Murphy, L., Mishra, A., Joshi, I., & Karpathakis, K. (2022). Governing Data and Artificial Intelligence for Health Care: Developing an International Understanding. Journal of Medical Internet Research, 6(1), e31623. https://doi.org/10.2196/31623

Newman, C. (1984). The post-modern aura: The act of fiction in an age of inflation. Salmagundi, 63/64, 3–199. [Link to the article: http://www.jstor.org/stable/40547646]

Cockerill, M. P. (2014). Beyond education for economic productivity alone: The Capabilities Approach. International Journal of Educational Research, 66, 13-21. https://doi.org/10.1016/j.ijer.2014.01.003

Anderson, S. L. (2005). Asimov’s “Three Laws of Robotics” and Machine Metaethics. Symposia at the Fall Symposium on Machine Ethics, 1 University Place, Stamford, CT 06901. https://cdn.aaai.org/Symposia/Fall/2005/FS-05-06/FS05-06-002.pdf

Hanna, R., & Kazim, E. (2021). Philosophical foundations for digital ethics and AI Ethics: A dignitarian approach. AI Ethics, 1, 405–423. https://doi.org/10.1007/s43681-021-00040-9

Dhirani, L. L., Mukhtiar, N., Chowdhry, B. S., & Newe, T. (2023). Ethical Dilemmas and Privacy Issues in Emerging Technologies: A Review. Sensors, 23(3), 1151. https://doi.org/10.3390/s23031151

de Regt, H. W. (2017). A Contextual Theory of Scientific Understanding. In Understanding Scientific Understanding. New York. Oxford Academic. https://doi.org/10.1093/oso/9780190652913.003.0004

AllahRakha, N. (2024). Cybercrime and the Law: Addressing the Challenges of Digital Forensics in Criminal Investigations. Mexican Law Review, 16(2), 23–54. https://doi.org/10.22201/iij.24485306e.2024.2.18892

Zuboff, S. (2019). Surveillance Capitalism and the Challenge of Collective Action. Surveillance & Society, 28(1). https://doi.org/10.1177/1095796018819461

Floridi, L., & Cowls, J. (2019). A Unified Framework of Five Principles for AI in Society. Harvard Data Science Review, 1(1). https://doi.org/10.1162/99608f92.8cd550d1

McLeod, C. (2020). The value of conscience. In Conscience in Reproductive Health Care: Prioritizing Patient Interests (pp. 11-27). Oxford. https://doi.org/10.1093/oso/9780198732723.003.0002

Rakha, A. Naeem,“Analysis of the Primary Components Contributing to the Growth of the Digital Economy” SSRN Electronic Journal, 2022.

Sheikh, H., Prins, C., & Schrijvers, E. (2023). Mission AI: The New System Technology (Research for Policy series). Springer Cham. https://doi.org/10.1007/978-3-031-21448-6

Roberts, H., Cowls, J., Morley, J., et al. (2021). The Chinese approach to artificial intelligence: An analysis of policy, ethics, and regulation. AI & Society, 36(1), 59–77. https://doi.org/10.1007/s00146-020-00992-2

Remolina Leon, N., & Seah, J. (2019). How to address the AI Governance discussion? What can we learn from Singapore’s AI strategy? (pp. 1-18). Retrieved from https://ink.library.smu.edu.sg/caidg/1

Published

2024-02-25

How to Cite

AllahRakha, N. (2024). Transformation of Crimes (Cybercrimes) in Digital Age. International Journal of Law and Policy, 2(2). https://doi.org/10.59022/ijlp.156

Issue

Section

Articles