Cybercrime in International Law

Keywords: Crime, cyber‎, Budapest, Agreement, Effort

Abstract

The research dealt with the electronic crime known by the term (cyber) because of its connection with space, which is the widest field for its perpetration and implementation of its pillars, and it is often between countries or within the state, and because of its importance, multiple definitions have been known and its nature has been defined as a deliberate crime committed to achieve goals harmful to the interests of a person or a certain party. It has characteristics that distinguish it from other acts in terms of its perpetration by a computer, its systems or the information it contains, or it targets the Internet and the sites in which it is, and usually more than one person or entity contributes to it. Or disrupting it, sabotaging it, forging it, and so on.

Downloads

Download data is not yet available.

Author Biography

Ibrahim A. Abed, Department of Law, Cihan University-Erbil, Kurdistan Region, Iraq

Ibrahim A. Abed is a Assistant Prof. at the Department of Law ,College of Law & Int`l Diplomatic Relation , Cihan Uni. -Erbil . He got the B.Sc.degree in Law , the M.Sc. degree in Int`l Law & the Ph.D. degree in Int`l Law . His research interests are in Int`l Law ,Int`l Criminal Law, Human Rights . Dr.Ibrahim is a member of Iraqis Lawyers Society 

References

Benvenisti,‎‏ ‏Eyal. (2014). Upholding Democracy Amid the ‎Challenges ‎of New Technology, What Role for The Law ‎of Global Governance? E.J.I.L..25 (1), 240-241. ‎

Carlin, J. (2016). Detect, Disrupt, Deter: A Whole-of-‎‎Government Approach to National Security Cyber ‎Threats, ‎Harv.N.S.J., 7, 539-397. ‎

Daskal, J. (2015). The UN- Territoriality of Data, Yale J.I.L., ‎‎125, 326.‎‏

Wojeik, M. (2000). Human Rights & Corporate ‎‎Responsibility, Tulsa J.C.& I.L.,8 (1), 2‎‏-3.‏

Dine, A.V. (2020). When is Cyber Defense a Crime? ‎‎Evaluating Active Cyber Defense Measures Under The ‎Budapest ‎Convention, Chicago J.I.L., 20, (2), 537-‎‎546.‎

Schmitt, M. (2017). Peacetime Cyber Responses and ‎Wartime ‎Cyber, Operations Under International Law: An ‎Analytical ‎Vade Mecum, Harv.N.S.J., 8, 240‎‏-241.‏

Eyan, B. (2011). International Law & Stability in Cyberspace, ‎‎Barkeley J.I.L., 9, 535-536. ‎

Shackelford, S. J. (2009), From Nuclear to Network: ‎Analogizing Attacks in International Law. Berkeley J.I.L., ‎‎27(1), 195‎‏-196.‏

Giles, A. P. (2018), Transnational Cyber Offenses: ‎‎Overcoming Jurisdictional Challenges, Yale J.I.L., ‎43, ‎‎195-196.‎

Kilovaty, I. (2018). Dox fare: Politically Motivated ‎Leaks and ‎the Future of the Norm on Non-Intervention in the Era of ‎‎Weaponized Information, Harv.N.S.J., 9, 152-154‎‏.‏

Layne, S. R. (2015), Corporate Responsibility for Human ‎‎Rights Violations, Gonzaga J.I.L., 18, (1), 40-41. ‎

Lupu, Y. (2017). Explaining Human Rights Abuses: ‎‎Comparing Contemporary Features & Historical ‎Factors,Vig.J.I.L., ‎ 56(2), 482-483.‎

Mourlam, A.C (2016). Unarmed Attacks: Cyber Combatants ‎‎& The Right to Defend, Calf.I.L.J., 26 (1), 19-21.‎

Scott, J. (2014). Extraterritoriality & Territorial Extension in ‎EU ‎Law , A.J.Comp.L., 62, 88-89.‎

‎Corfu Case (1949), https://www.icj-‎cij.org/en/case/1, ‎Retrieved in 4/1/2021.‎

‎‏Libya Case ,1986. ‎‎https://en.wikipedia.org/wiki/West_Berlin_discotheque_bombing , Retrieved in 5/1/2021.‎

‎‏Tadic Case 1991, https://www.icj-‎cij.org/en/case/91 , ‎Retrieved in 2/2/2021‎‏.‏

‎USA & Nicaragua Case,1986, https://www.icj-‎‎cij.org/en/case/70 , Retrieved in 3/2/2021‎‏.‏

‎UNODC/CCPCJ/EG.4/2019/2 , P.2‎‏1‏‎ ‎‏‎- Report ‎of Experts ‎Group.‎

https://www.coe.int/en/web/conventions/full-list/-‎‎‎/conventions/treaty/185 , Retrieved in 2/1/2021.‎

https://en.wikipedia.org/wiki/Convention_on_Cybercrime, ‎Retrieved in ‎‎1/12021.

https://www.accessnow.org/african-union-adopts-framework-‎on-cyber-security-and-data-protection, Retrieved in ‎‎3/2/2021‎.

الحوامدة، لورنس سعيد (2017). الجرائم المعلوماتية اركانها ووسائل مكافحتها، مجلة ‏الميزان ‏للدراسات الاسلامية والقانونية، جامعة طيبة، السعودية . ص8 -‏ص10‏

عبدالباقي، مصطفى عبد (2018)، التحقيق‎ ‎في‎ ‎الجريمة‎ ‎الإلكترونية‎ ‎وإثباتها‎ ‎في‎ ‎‎فلسطين‎: ‎د‎ ‎راسة‎ ‎مقارنة‎ ‎‏(‏‎2018‎‏)،‎ ‎مجلة دراسات،‎ ‎علوم‎ ‎الشريعة‎ ‎والقانون،‎ ‎‎المجلّد‎ 45 ‎، عدد‎ ‎‎4‎،‎ ‎ملحق‎ 2‎، الجامعة الاردنية. ص288.

العدواني، فهد دخين (2016). الانترنت والجريمة الالكترونية وطرق التغلب عليها، ‏المجلة ‏الدولية للتعليم بالانترنت. ص 7- 9، ص59‏.‏

إتفاقية بودابست (2001). ‏‎https://www.coe.int/en/web/cybercrime/the- budapest-‎‎convention

اتفاقية الاتحاد الافريقي بشأن امن الفضاء الالكتروني وحماية البيانات ‏ذات الطابع ‏الشخصي ( إتفاقية مالابو) (2014). ‏‎.‎‏-‏https://moeltaher.net/2‎‏ ‏ ‏

‏الاتفاقية العربية لمكافحة جرائم تقنية المعلومات لعام 2010‏. https://www.courts.gov.ps/userfiles/file/‎

Published
2022-08-15
How to Cite
Abed, I. (2022). Cybercrime in International Law. Cihan University-Erbil Journal of Humanities and Social Sciences, 6(2), 145-151. https://doi.org/10.24086/cuejhss.v6n2y2022.pp145-151
Section
Articles