Cybercrime in International Law
Abstract
The research dealt with the electronic crime known by the term (cyber) because of its connection with space, which is the widest field for its perpetration and implementation of its pillars, and it is often between countries or within the state, and because of its importance, multiple definitions have been known and its nature has been defined as a deliberate crime committed to achieve goals harmful to the interests of a person or a certain party. It has characteristics that distinguish it from other acts in terms of its perpetration by a computer, its systems or the information it contains, or it targets the Internet and the sites in which it is, and usually more than one person or entity contributes to it. Or disrupting it, sabotaging it, forging it, and so on.
Downloads
References
Benvenisti, Eyal. (2014). Upholding Democracy Amid the Challenges of New Technology, What Role for The Law of Global Governance? E.J.I.L..25 (1), 240-241.
Carlin, J. (2016). Detect, Disrupt, Deter: A Whole-of-Government Approach to National Security Cyber Threats, Harv.N.S.J., 7, 539-397.
Daskal, J. (2015). The UN- Territoriality of Data, Yale J.I.L., 125, 326.
Wojeik, M. (2000). Human Rights & Corporate Responsibility, Tulsa J.C.& I.L.,8 (1), 2-3.
Dine, A.V. (2020). When is Cyber Defense a Crime? Evaluating Active Cyber Defense Measures Under The Budapest Convention, Chicago J.I.L., 20, (2), 537-546.
Schmitt, M. (2017). Peacetime Cyber Responses and Wartime Cyber, Operations Under International Law: An Analytical Vade Mecum, Harv.N.S.J., 8, 240-241.
Eyan, B. (2011). International Law & Stability in Cyberspace, Barkeley J.I.L., 9, 535-536.
Shackelford, S. J. (2009), From Nuclear to Network: Analogizing Attacks in International Law. Berkeley J.I.L., 27(1), 195-196.
Giles, A. P. (2018), Transnational Cyber Offenses: Overcoming Jurisdictional Challenges, Yale J.I.L., 43, 195-196.
Kilovaty, I. (2018). Dox fare: Politically Motivated Leaks and the Future of the Norm on Non-Intervention in the Era of Weaponized Information, Harv.N.S.J., 9, 152-154.
Layne, S. R. (2015), Corporate Responsibility for Human Rights Violations, Gonzaga J.I.L., 18, (1), 40-41.
Lupu, Y. (2017). Explaining Human Rights Abuses: Comparing Contemporary Features & Historical Factors,Vig.J.I.L., 56(2), 482-483.
Mourlam, A.C (2016). Unarmed Attacks: Cyber Combatants & The Right to Defend, Calf.I.L.J., 26 (1), 19-21.
Scott, J. (2014). Extraterritoriality & Territorial Extension in EU Law , A.J.Comp.L., 62, 88-89.
Corfu Case (1949), https://www.icj-cij.org/en/case/1, Retrieved in 4/1/2021.
Libya Case ,1986. https://en.wikipedia.org/wiki/West_Berlin_discotheque_bombing , Retrieved in 5/1/2021.
Tadic Case 1991, https://www.icj-cij.org/en/case/91 , Retrieved in 2/2/2021.
USA & Nicaragua Case,1986, https://www.icj-cij.org/en/case/70 , Retrieved in 3/2/2021.
UNODC/CCPCJ/EG.4/2019/2 , P.21 - Report of Experts Group.
https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185 , Retrieved in 2/1/2021.
https://en.wikipedia.org/wiki/Convention_on_Cybercrime, Retrieved in 1/12021.
https://www.accessnow.org/african-union-adopts-framework-on-cyber-security-and-data-protection, Retrieved in 3/2/2021.
الحوامدة، لورنس سعيد (2017). الجرائم المعلوماتية اركانها ووسائل مكافحتها، مجلة الميزان للدراسات الاسلامية والقانونية، جامعة طيبة، السعودية . ص8 -ص10
عبدالباقي، مصطفى عبد (2018)، التحقيق في الجريمة الإلكترونية وإثباتها في فلسطين: د راسة مقارنة (2018)، مجلة دراسات، علوم الشريعة والقانون، المجلّد 45 ، عدد 4، ملحق 2، الجامعة الاردنية. ص288.
العدواني، فهد دخين (2016). الانترنت والجريمة الالكترونية وطرق التغلب عليها، المجلة الدولية للتعليم بالانترنت. ص 7- 9، ص59.
إتفاقية بودابست (2001). https://www.coe.int/en/web/cybercrime/the- budapest-convention
اتفاقية الاتحاد الافريقي بشأن امن الفضاء الالكتروني وحماية البيانات ذات الطابع الشخصي ( إتفاقية مالابو) (2014). .-https://moeltaher.net/2
الاتفاقية العربية لمكافحة جرائم تقنية المعلومات لعام 2010. https://www.courts.gov.ps/userfiles/file/
Copyright (c) 2022 Ibrahim A. Abed
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-ND 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).