Cybercrime and Legislation Margin Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

To begin with, it should be emphasized that the development of the legislative sphere for regulation of the IT-sphere and cybernetics is far beyond the realities of technical advances. In other words, the legal framework lays behind technological advances, acts that we would not hesitate to call “wrong” or “immoral” are not always considered illegal. Originally, it is associated with the notion, that cyber technologies are developing faster than the legislative sphere can get adapted to these changes.

Cyber Crimes

Originally, there are several types of cybercrimes:

  • Against persons
  • Against Business and Non-business organizations
  • Crime targeting the government

The fact is that all the three types are described in the legislation, nevertheless, it should be emphasized that the only common feature of all the crimes is to steal the hidden information and use it with the aim of personal advantage. Another fact that should be pointed out, is associated with that there is no proper definition of Cyber Crimes in the legislation, and, consequently, the defense against cybercrime is poor.

Originally, the problem is aggravated by the concept that cyber laws are developing too slowly in comparison with the tools and techniques of performing cybercrimes. Nevertheless, the solid basis has been already founded, and the problems, which are closely associated with cybercrimes, are persisted. Thus, following Balkin (2007), the sphere of cybercrimes is one of the most burning issues in criminology. The following notion should be emphasized:

Loss of evidence is a very common & expected problem as all the data are routinely destroyed. Further, the collection of data outside the territorial extent also paralyzes the system of crime investigation. Cyber savvy judges are the need of the day. Judiciary plays a vital role in shaping the enactment according to the order of the day. One such case, which needs appreciation, is the P.I.L. (Public Interest Litigation), which the Kerala High Court has accepted through an email. (Taylor, 2006, p. 284)

It is often emphasized, that the sphere of cyber criminology requires the improvement of investigative responsibility. The fact is that confusion often appears within the agencies, engaged in investigating these crimes, which causes delays and confusion in further legislative development. Taking into consideration the fact that the investigation of cybercrimes requires specialized skills, nevertheless, they are different from the skills, required for the investigation of computer-related crimes. It is evident, that the investigator will have to search the necessary information in the database or involve internet resources. The cybercrimes experts must be trained for handling sophisticated crimes, using specialized computer equipment and technical knowledge. Consequently, a department with a particular responsibility range should be created.

Conclusion

Finally, it should be emphasized that computer-related crimes and cybercrimes have developed into two separate branches of crime. In the light of this fact, there is a strong necessity to mention that the original responsibility, which should be imposed on special departments, is currently the new trend of cybercrimes legislation. From this perspective, it should be stated that the original range of cyber legislation should be expanded either for the more effective investigation procedures.

Bibliography

Balkin. J. M., Katz, E. (2007) “Cybercrime: Digital Cops in a Networked Environment”. NYU Press.

Reyes, A., O’Shea, K. (2007) “Cybercrime investigations: bridging the gaps between security professionals, law enforcement, and prosecutors”. Syngress publishing.

Taylor, R, W. (2006) “Digital Crime and Digital Terrorism” Prentice Hall.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 3). Cybercrime and Legislation Margin. https://ivypanda.com/essays/cybercrime-and-legislation-margin/

Work Cited

"Cybercrime and Legislation Margin." IvyPanda, 3 Mar. 2022, ivypanda.com/essays/cybercrime-and-legislation-margin/.

References

IvyPanda. (2022) 'Cybercrime and Legislation Margin'. 3 March.

References

IvyPanda. 2022. "Cybercrime and Legislation Margin." March 3, 2022. https://ivypanda.com/essays/cybercrime-and-legislation-margin/.

1. IvyPanda. "Cybercrime and Legislation Margin." March 3, 2022. https://ivypanda.com/essays/cybercrime-and-legislation-margin/.


Bibliography


IvyPanda. "Cybercrime and Legislation Margin." March 3, 2022. https://ivypanda.com/essays/cybercrime-and-legislation-margin/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1