Skip to main content

2017 | OriginalPaper | Buchkapitel

5. Criminal Proceedings in Cyberspace: The Challenge of Digital Era

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The author explains non-applicability of traditional criminal law and procedure in cyberspace. She advocates the introduction of biometric identification security systems, online reporting centres, universal cyber police and “two track” criminal proceedings for cybercrimes. In that regard, the following issues are discussed: Why the existing criminal law and procedure are not an adequate tool for cyberspace regulation? How can the use of biometrics contribute to the cyber security? Is the Internet anonymity a reality or only an “urban” myth? Why are the majority of cybercrimes not reported and how to improve this statistics? How to overcome jurisdictional difficulties arising from collection of digital evidence? How to eliminate cybercrime offenders from cyberspace, at the same time protecting all fair trial guarantees?

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Brenner, S., & Schwerha, J. (2002). Transnational evidence gathering and local prosecution of international cybercrime. Journal of Computer & Informaton Law, 20, 347–395. Brenner, S., & Schwerha, J. (2002). Transnational evidence gathering and local prosecution of international cybercrime. Journal of Computer & Informaton Law, 20, 347–395.
Zurück zum Zitat Brenner, S. (2004). Toward a criminal law for cyberspace: Product liability and other issues. Boston University Journal of Science & Technology Law, 10(2), 1–113. Brenner, S. (2004). Toward a criminal law for cyberspace: Product liability and other issues. Boston University Journal of Science & Technology Law, 10(2), 1–113.
Zurück zum Zitat Brenner, S., & Koops, B. J. (2004). Approaches to cybercrime jurisdiction. Journal of High Technology Law, 4, 1–46. Brenner, S., & Koops, B. J. (2004). Approaches to cybercrime jurisdiction. Journal of High Technology Law, 4, 1–46.
Zurück zum Zitat Bryant, R., et al. (2008). Investigating digital crime. New York: Wiley. Bryant, R., et al. (2008). Investigating digital crime. New York: Wiley.
Zurück zum Zitat Cassese, A. (2005). International law. Oxford: Oxford University Press. Cassese, A. (2005). International law. Oxford: Oxford University Press.
Zurück zum Zitat Choi, B. H. (2013). The anonymous Internet. Maryland Law Review, 72, 501–570. Choi, B. H. (2013). The anonymous Internet. Maryland Law Review, 72, 501–570.
Zurück zum Zitat Clark, F. & Diliberto, K. (1996). Investigating computer crime. Boca Raton, Fla.: CRC Press. Clark, F. & Diliberto, K. (1996). Investigating computer crime. Boca Raton, Fla.: CRC Press.
Zurück zum Zitat Cryer, R., Friman, H., Robinson, D., & Wilmshurst, E. (2008). An introduction to international criminal law and procedure. New York: Cambridge University Press. Cryer, R., Friman, H., Robinson, D., & Wilmshurst, E. (2008). An introduction to international criminal law and procedure. New York: Cambridge University Press.
Zurück zum Zitat Donohue, L. (2012). Technological leap, statutory gap and constitutional abyss: Remote biometric identification comes of age. Minnesota Law Review, 97, 407–559. Donohue, L. (2012). Technological leap, statutory gap and constitutional abyss: Remote biometric identification comes of age. Minnesota Law Review, 97, 407–559.
Zurück zum Zitat Feldman, R. (2003). Considerations on the emerging implementation of biometric technology. Hastings Communications and Entertainment Law Journal, 25, 653–682. Feldman, R. (2003). Considerations on the emerging implementation of biometric technology. Hastings Communications and Entertainment Law Journal, 25, 653–682.
Zurück zum Zitat Goldstone, D., & Shave, B. (1998). International dimension of crimes in cyberspace. Fordham International Law Journal, 22, 1925–1971. Goldstone, D., & Shave, B. (1998). International dimension of crimes in cyberspace. Fordham International Law Journal, 22, 1925–1971.
Zurück zum Zitat Greenberg, M. (2003). A return to Lilliput: The LICRA v. Yahoo! Case and the regulation of online content in the world market. Berkeley Technology Law Journal, 18, 1191–1258. Greenberg, M. (2003). A return to Lilliput: The LICRA v. Yahoo! Case and the regulation of online content in the world market. Berkeley Technology Law Journal, 18, 1191–1258.
Zurück zum Zitat Haggerty, K., & Ericson, R. (2000). The surveillant assemblage. British Journal of Sociology, 51(4), 605–622.CrossRef Haggerty, K., & Ericson, R. (2000). The surveillant assemblage. British Journal of Sociology, 51(4), 605–622.CrossRef
Zurück zum Zitat Hu, M. (2013). Biometric ID cybersurveillance. Indiana Law Journal, 88, 1475–1558. Hu, M. (2013). Biometric ID cybersurveillance. Indiana Law Journal, 88, 1475–1558.
Zurück zum Zitat Jain, A., Ross, A., & Nandakumar, K. (2011). Introduction to biometrics. New York: Springer.CrossRef Jain, A., Ross, A., & Nandakumar, K. (2011). Introduction to biometrics. New York: Springer.CrossRef
Zurück zum Zitat Jaishankar, K. (2008). Space transition theory of cybercrimes. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 283–301). Upper Saddle River, NJ: Prentice Hall. Jaishankar, K. (2008). Space transition theory of cybercrimes. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 283–301). Upper Saddle River, NJ: Prentice Hall.
Zurück zum Zitat Katyal, N. K. (2001). Criminal law in cyberspace. University of Pennsylvania Law Review, 149, 1003–1114.CrossRef Katyal, N. K. (2001). Criminal law in cyberspace. University of Pennsylvania Law Review, 149, 1003–1114.CrossRef
Zurück zum Zitat Kerr, O. (2005). Digital evidence and the new criminal procedure. Columbia Law Review, 105, 279–318. Kerr, O. (2005). Digital evidence and the new criminal procedure. Columbia Law Review, 105, 279–318.
Zurück zum Zitat Lessing, L. (2006). Code and other laws of cyberspace. New York: Basic Books. Lessing, L. (2006). Code and other laws of cyberspace. New York: Basic Books.
Zurück zum Zitat Li, X. (2008). The criminal phenomenon on the Internet: Hallmarks of criminals and victims revisited through typical cases prosecuted. University of Ottawa Law & Technology Journal, 5, 125. Li, X. (2008). The criminal phenomenon on the Internet: Hallmarks of criminals and victims revisited through typical cases prosecuted. University of Ottawa Law & Technology Journal, 5, 125.
Zurück zum Zitat Marion, N. E. (2010). The council of Europe’s cyber crime treaty: An exercise in symbolic legislation. International Journal of Cyber Criminology, 4, 699–712. Marion, N. E. (2010). The council of Europe’s cyber crime treaty: An exercise in symbolic legislation. International Journal of Cyber Criminology, 4, 699–712.
Zurück zum Zitat McKenna, K., & Bargh, J. (2000). Plan 9 from cyberspace: The implications of the Internet for personality and social psychology. Personality and Social Psychology Review, 4, 57–75.CrossRef McKenna, K., & Bargh, J. (2000). Plan 9 from cyberspace: The implications of the Internet for personality and social psychology. Personality and Social Psychology Review, 4, 57–75.CrossRef
Zurück zum Zitat Parker, D. (1998). Fighting computer crime: For protecting information. New York: Wiley. Parker, D. (1998). Fighting computer crime: For protecting information. New York: Wiley.
Zurück zum Zitat Schmalleger, F., & Pittaro, M. (2009). Crimes of the Internet. Upper Saddle River, NJ: Prentice Hall. Schmalleger, F., & Pittaro, M. (2009). Crimes of the Internet. Upper Saddle River, NJ: Prentice Hall.
Zurück zum Zitat Shinder, D., & Cross, M. (2002). Scene of the cybercrime. New York: Syngress. Shinder, D., & Cross, M. (2002). Scene of the cybercrime. New York: Syngress.
Zurück zum Zitat Smith, R. G. (2007). Crime control in the digital age: An exploration of human rights implications. International Journal of Cyber Criminology, 1(2), 167–179. Smith, R. G. (2007). Crime control in the digital age: An exploration of human rights implications. International Journal of Cyber Criminology, 1(2), 167–179.
Zurück zum Zitat Swire, P. P. (2005). Developments in the law: The law of cyberspace. Harvard Law Review, 112, 1574–1704. Swire, P. P. (2005). Developments in the law: The law of cyberspace. Harvard Law Review, 112, 1574–1704.
Zurück zum Zitat Vacca, J. (2007). Biometric technologies and verification systems. Amsterdam: Butterworth-Heinemann. Vacca, J. (2007). Biometric technologies and verification systems. Amsterdam: Butterworth-Heinemann.
Zurück zum Zitat Wall, D. S. (2005). The Internet as a conduit for criminals. In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 77–98). Thousand Oaks, CA: Sage.CrossRef Wall, D. S. (2005). The Internet as a conduit for criminals. In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 77–98). Thousand Oaks, CA: Sage.CrossRef
Zurück zum Zitat Wall, D. S. (2007/10). Policing cybercrimes: Situating the public police in networks of security within cyberspace (revised May 2010). Police, Practice & Research: An International Journal, 8(2), 183–205. Wall, D. S. (2007/10). Policing cybercrimes: Situating the public police in networks of security within cyberspace (revised May 2010). Police, Practice & Research: An International Journal, 8(2), 183–205.
Zurück zum Zitat Yar, M. (2006). Cybercrime and society. London: Sage Publishing Ltd. Yar, M. (2006). Cybercrime and society. London: Sage Publishing Ltd.
Metadaten
Titel
Criminal Proceedings in Cyberspace: The Challenge of Digital Era
verfasst von
Vanja Bajovic
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-44501-4_5