IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 7 - Issue 8, August 2018 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Electronic Crimes And The International Community Legislation: Comparative Analytical Study

[Full Text]

 

AUTHOR(S)

Mazen Ismaeel Ghareb, Falah Mustafa Sedeeq

 

KEYWORDS

Cyber-space, Cyber-crimes, Cyber-laws, Cyber-attacks, internet, online documents.

 

ABSTRACT

Cybercrime or cybercrime on computer programs or programs is considered a serious crime at the present time. State legislatures have provided legal protection for the legitimate use of the computer and the information network and the punishment of perpetrators of acts that constitute an attack on the rights of their users Or to prevent misuse of computer crimes. However, Arab countries, especially Iraq, are still far from legislating an e-crime law, despite the proposal by the Iraqi government in early 2011 to undermine the use of information technology and social networking sites through a project called the Cyber Crime Act. Cyber-crimes the off-spring of the cyber-space technology could be just observed; controlled and counteracted through digital enactment. Nations around the world are confronting the threats of digital violations because of a few reasons extending from the poor innovation, inadequacy and nonappearance of enactment to money related requirements, resistance with universal law and authorizing organizations. This examination was attempted to asses and breaks down the current situation with digital violations and enactment in the point of view of creating nations and to distinguish and investigate the difficulties the legislatures of creating nations are looking in the anticipation of the digital wrongdoings .

 

REFERENCES

[1] Yar, M., 2013. Cybercrime and society. Sage.
[2] Sunde, I.M., 2017. Cybercrime Law. Digital Forensics, pp.51-116.
[3] Punitha, P., Vidyavathi, S. and Sekharaiah, K.C., 2017. Spatial Cognition Applications towards Swachch Digital India.
[4] Li, X. and Qin, Y., 2018. Research on Criminal Jurisdiction of Computer cybercrime. Procedia computer science, 131, pp.793-799.
[5] Schmitt, M. and Vihul, L., 2017. International Cyber Law Politicized: The UN GGE’s Failure to Advance Cyber Norms. Just Security Articles, 30.
[6] Miles, C.A., 2017. Provisional Measures Before International Courts and Tribunals (Vol. 128). Cambridge University Press.
[7] Ghareb, M.I., 2015. Toward Data Protection laws and code of conduct in Kurdistan region government. International Journal Of Engineering And Computer Science, 4(09).
[8] Mullen, J.D. and Reutzel, W., Dynamics Inc, 2017. Credit, security, debit cards and the like with buttons. U.S. Patent 9,727,813.
[9] Combs, C.C., 2017. Terrorism in the twenty-first century. Routledge.
[10] Kittichaisaree, K., 2017. Future prospects of public international law of cyberspace. In Public International Law of Cyberspace (pp. 335-356). Springer, Cham.
[11] Kharat, S., 2017. Cyber Crime–A Threat to Persons, Property, Government and Societies.
[12] Holt, T.J. and Bossler, A.M., 2008. Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), pp.1-25.
[13] Zargar, S.T., Joshi, J. and Tipper, D., 2013. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE communications surveys & tutorials, 15(4), pp.2046-2069.
[14] Peng, T., Leckie, C. and Ramamohanarao, K., 2004, May. Proactively detecting distributed denial of service attacks using source IP address monitoring. In International conference on research in networking (pp. 771-782). Springer, Berlin, Heidelberg.
[15] Peng, T., Leckie, C. and Ramamohanarao, K., 2004, May. Proactively detecting distributed denial of service attacks using source IP address monitoring. In International conference on research in networking (pp. 771-782). Springer, Berlin, Heidelberg.
[16] Wadhwa, A. and Garg, A., 2015. Studying and Analyzing Virtualization While Transition from Classical to Virtualized Data Center. International Journal of Computer Applications, 117(14).
[17] Reich, P.C. ed., 2011. Cybercrime & Security. West Publications.
[18] Aggarwal, P., Arora, P. and Ghai, R., 2014. Review on cyber crime and security. International Journal of Research in Engineering and Applied Sciences, 2(1), pp.48-51.
[19] Kabir, N., 2018. Cyber Crime a New Form of Violence Against Women: From the Case Study of Bangladesh.
[20] Ghareb, M., Improving Network Security using Aspect Oriented Programming.
[21] Ghareb, M.I., 2015. The Challenges of National e-ID for Kurdistan Region government for Multi-purposes. International Journal Of Engineering And Computer Science, 4(10).
[22] Casey, E., 2011. Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press.
[23] Lavorgna, A., 2015. Organised crime goes online: Realities and challenges. Journal of Money Laundering Control, 18(2), pp.153-168.
[24] Ghareb, M.I., 2018. Information Technology Roles in Crisis Management: A Case Study in Kurdistan Region Government. International Journal of Computer Engineering and Information Technology, 10(5), pp.71-78.
[25] Jaffar, A.A., Ghareb, M.I. and Sharif, K.H., 2016. The Challenges of Implementing E-Commerce in Kurdistan of Iraq. Journal of University of Human Development/Vol, 2(3).
[26] McSherry, B., 2004. Terrorism offences in the criminal code: Broadening the boundaries of Australian criminal laws. UNSWLJ, 27, p.354.
[27] Olafsdottir, H. and Bragadottir, R., 2006. Crime and criminal policy in Iceland: Criminology on the margins of Europe. European Journal of Criminology, 3(2), pp.221-253.
[28] Gomez, J., 2004. Dumbing down democracy: Trends in internet regulation, surveillance and control in Asia. Pacific Journalism Review, 10(2), p.130.
[29] Nicholson, L.J., Shebar, T.F. and Weinberg, M.R., 2000. Computer crimes. Am. Crim. L. Rev., 37, p.207.
[30] Martin, S.P., 1996. Controlling computer crime in Germany. Information and Communications Technology Law, 5(1), pp.5-28.
[31] Manap, N.A., Rahim, A.A. and Taji, H., 2015. Cyberspace Identity Theft: An Overview. Mediterranean Journal of Social Sciences, 6(4), p.290.
[32] Adams, J.A.M., 1996. Controlling cyberspace: applying the computer fraud and abuse act to the internet. Santa Clara Computer & High Tech. LJ, 12, p.403.
[33] Crystal, J., 2001. Criminal justice in the Middle East. Journal of Criminal Justice, 29(6), pp.469-482.
[34] Rezgui, Y. and Marks, A., 2008. Information security awareness in higher education: An exploratory study. Computers & Security, 27(7-8), pp.241-253.
[35] Al Amro, S., 2017. Cybercrime in Saudi Arabia: fact or fiction?. International Journal of Computer Science Issues (IJCSI), 14(2), p.36.
[36] Cole, K., Chetty, M., LaRosa, C., Rietta, F., Schmitt, D.K., Goodman, S.E. and Atlanta, G.A., 2008. Cybersecurity in africa: An assessment. Atlanta, Georgia, Sam Nunn School of International Affairs, Georgia Institute of Technology.
[37] Cole, K., Chetty, M., LaRosa, C., Rietta, F., Schmitt, D.K., Goodman, S.E. and Atlanta, G.A., 2008. Cybersecurity in africa: An assessment. Atlanta, Georgia, Sam Nunn School of International Affairs, Georgia Institute of Technology.
[38] Choo, K.K.R., 2011. The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), pp.719-731.
[39] Taylor, P., 2012. Hackers: Crime and the digital sublime. Routledge.
[40] Bantekas, I. and Nash, S., 2003. International criminal law. Routledge-Cavendish.
[41] Ghareb, M.I.,Ahmed, A.M 2016. Factors Affecting the Success of E-Government Implementation in developing Countries: A Case Study of Kurdistan Region of Iraq (KRI) Head of IT Department, 2 Coordinator Teaching Quality Assurance. International Journal of Scientific Development and Research (IJSDR). 8(1), pp. 387-397.
[42] O'Leary, B., McGarry, J. and Salih, K. eds., 2006. The future of Kurdistan in Iraq. University of Pennsylvania Press.
[43] Shareef, S., Pimenidis, E., Arreymbi, J. and Jahankhani, H., 2010. Vision of Electronic Government implementation in Kurdistan region of Iraq.
[44] Kelly, M.J., 2009. The Kurdish Regional Constitutional within the Framework of the Iraqi Federal Constitution: A Struggle for Sovereignty, Oil, Ethnic Identity, and the Prospects for a Reverse Supremacy Clause. Penn St. L. Rev., 114, p.707.