Abstract
This article analyzes the international legal framework against cybercrime. The international legal framework provides a solution to the problem in three areas: reducing discrepancies between national laws, introducing new powers of authorities, and promoting international cooperation. The study argues that the core documents effectiveness in the field of cybercrime counteraction does not appear to be dependent on the legal applicability of the international measures. Such factors as national security, politics, economics, and public opinion, apparently, stimulate the spontaneous implementation of the international legal framework. The study focuses on the need to develop a system of basic approaches in the field of criminal law cybercrime qualification and consolidate their classification at the supranational level. A qualitatively new approach to cooperation between international relations subjects in combating cybercrime is proposed. The latter is based on all states actions coordination in improving the legal regulation of interaction and implementation of fundamental rules in national legislation, reorganizing the information exchange basics.
Similar content being viewed by others
Data availability
All data will be available on request.
Change history
28 December 2023
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1057/s41284-023-00414-0
References
Australia House Standing Committee on Communications, & Australia. 2010. The Report of the Inquiry into Cyber Crime, Standing Committee on Communications. The Parliament of the Commonwealth of Australia. https://www.aph.gov.au/parliamentary_business/committees/house_of_representatives_committees?url=coms/cybercrime/report.htm. Accessed 15 October 2020.
Berd, K. 2009. A War with many unknown quantities. Computerra 20: 26–29.
Brenner, Susan W. 2006. Cybercrime jurisdiction. Crime, Law and Social Change 46: 189–206. https://doi.org/10.1007/s10611-007-9063-7.
Chaikin, David. 2006. Network investigations of cyber-attacks: The limits of digital evidence. Crime, Law and Social Change 46: 239–256. https://doi.org/10.1007/s10611-007-9058-4.
Codex. 2008. The Agreement on Cooperation between the CIS Member States in the fight against computer information crimes. http://docs.cntd.ru/document/902140948. Accessed 15 October 2020.
Council of Europe. 2001. Convention on Cybercrime: Explanatory Report. http://conventions.coe.int/Treaty/en/Reports/Html/185.htm. Accessed 15 October 2020.
Council of Europe. 2018. Towards a protocol to the Budapest Convention. https://rm.coe.int/t-cy-pd-pubsummary-v6/1680795713. Accessed 15 October 2020.
Csonka, Peter. 2004. The Council of Europe Convention on cyber-crime: A response to the challenge of the new age? In Cybercrime: Conferenza internazionale. La Convenzione del Consiglio d'Europa sulla Criminalità Informatico, ed. I. Giovanni, and M. Gianfranco, 3–29. Milano: Giuffrè.
Donalds, Charlette, and Kweku-Muata Osei-Bryson. 2018. An Ontological approach to classifying cybercrimes in an ICT4D context. Lecture Notes in Computer Science. In Designing for a Digital and Globalized World. DESRIST 2018. Lecture Notes in Computer Science, vol 10844, 253–267. Cham: Springer. https://doi.org/10.1007/978-3-319-91800-6_17.
Europol. 2018. Internet organised crime threat assessment. https://www.europol.europa.eu/activities-services/main-reports/internet-organisedcrime-threat-assessment-iocta-2018. Accessed 15 October 2020.
Finklea, Kristin M. 2009. Organised crime in the United States: Trends and issues for Congress. Darby: DIANE Publishing.
Forst, Brian. 2009. Terrorism, crime and public policy. New York: Cambridge University Press.
General Assembly. 1990. United Nations Rules for the Protection of Juveniles Deprived of their Liberty. UN General Assembly Resolution 45/113 as of December 14. https://undocs.org/A/RES/45/113. Accessed 15 October 2020.
General Assembly. 2018. Letter dated 11 October 2017 from the Permanent Representative of the Russian Federation to the United Nations addressed to the Secretary-General. https://undocs.org/A/C.3/72/12. Accessed 15 October 2020.
General Assembly. 2019. Resolution adopted by the General Assembly on 17 December 2018. https://undocs.org/A/RES/73/187. Accessed 15 October 2020.
Gercke, Marco. 2009. Europe’s legal approaches to cybercrime. ERA Forum 10: 409–420. https://doi.org/10.1007/s12027-009-0132-5.
Gercke, Marco. 2012. Understanding cybercrimes: Phenomena, challenges and legal response. Geneva: International Telecommunication Union.
Hakman, Joyce. 2017. Building a stronger international legal framework on cybercrime. https://www.chathamhouse.org/expert/comment/building-stronger-international-legal-framework-cybercrime. Accessed 15 October 2020.
Holt, Thomas J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar. 2017. Cybercrime and digital forensics, 2nd ed. Abingdon: Routledge.
Huey, Laura, Johnny Nhan, and Ryan Broll. 2013. Uppity civilians and cyber-vigilantes: The role of the general public in policing cyber-crime. Criminology & Criminal Justice 13: 81–97. https://doi.org/10.1177/1748895812448086.
Hunton, Paul. 2009. The growing phenomenon of crime and the Internet: A cybercrime execution and analysis model. Computer Law & Security Review 25: 528–535. https://doi.org/10.1016/j.clsr.2009.09.005.
Hunton, Paul. 2011. A rigorous approach to formalising the technical investigation stages of cybercrime and criminality within a UK law enforcement environment. Digital Investigation 7: 105–113. https://doi.org/10.1016/j.diin.2011.01.002.
International Telecommunication Union. 2017. Global Cybersecurity Index 2017. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-R1-PDF-E.pdf. Accessed 15 October 2020.
Jarvis, Lee, Lella Nouri, and Andrew Whiting. 2014. Understanding, locating and constructing cyberterrorism. In Cyberterrorism: Understanding, assessment and purpose, ed. T.M. Chen, L. Jarvis, and S. Macdonald, 25–41. Heidelberg: Springer.
Karpova, Daria N. 2014. Cybercrimes: A Global issue and its solution. Power 8: 46–50.
Kavanagh, Camino. 2017. The United Nations, cyberspace and international peace and security: Responding to complexity in the 21st century. Geneva: United Nations Institute for Disarmament Research.
Kersting, Norbert. 2016. Participatory turn? Comparing citizens’ and politicians’ perspectives on online and offline local political participation. Lex Localis - Journal of Local Self-Government 14: 251–263.
Kierkegaard, Sylvia. 2007. Cybercrime convention: Narrowing the cultural and privacy gap? International Journal of Intercultural Information Management 1: 17–32. https://doi.org/10.1504/IJIIM.2007.014368.
Koksegenova, Oksana. 2011. Hackers threaten Kazakhstan. Computer Crime Research Center. http://www.crime-research.ru/analytics/cyber_kaz/. Accessed 15 October 2020.
Li, Xingan. 2007. International actions against cybercrime: Netwroking legal systems in the networked crime scene. Webology 4: 45.
Macdonald, Stuart, Lee Jarvis, and Simon M. Lavis. 2019. Cyberterrorism today? Findings from a follow-on survey of researchers. Studies in Conflict & Terrorism, in press. https://doi.org/10.1080/1057610X.2019.1696444
Maras, Marie H. 2014. Computer forensics: Cybercriminals, laws and evidence, 2nd ed. Massachusetts: Jones and Bartlett.
Maras, Marie H. 2016. Cybercriminology. Oxford: Oxford University Press.
McGuire, Mike, and Samantha Dowling. 2013. Cybercrime: A review of the evidence. Summary of key findings and implications. Home Office Research report No. 75. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/246749/horr75-summary.pdf. Accessed 15 October 2020.
Ministry of Internal Affairs of the Russian Federation. 2019. Website of the Office “K” of the Ministry of Internal Affairs of the Russian Federation. https://xn--b1aew.xn--p1ai/mvd/structure1/Upravlenija/Upravlenie_K_MVD_Rossii. Accessed 15 October 2020.
Rouse, Margaret, Matthew Haughn, and Stan Gibilisco. 2014. Confidentiality, integrity, and availability (CIA triad). TechTarget. https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA. Accessed 15 October 2020.
Rowe, Brent, Dallas Wood, Douglas Reeves, and Fern Braun. 2011. The role of internet service providers in cybersecurity. Durham: Institute for Homeland Security Solutions.
Seebruck, Ryan. 2015. A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model. Digital Investigation 14: 36–45. https://doi.org/10.1016/j.diin.2015.07.002.
Selby, Nick. 2017. Local police don’t go after most cybercriminals. We need better training. The Washington Post. https://www.washingtonpost.com/posteverything/wp/2017/04/21/local-police-dont-go-after-most-cybercriminals-we-need-better-training/. Accessed 15 October 2020.
Shore, Malcolm, Du. Yi, and Sherali Zeadally. 2011. A public-private partnership model for national cybersecurity. Policy & Internet 3: 1–23. https://doi.org/10.2202/1944-2866.1114.
Shukan, Aliya, Aitugan Abdizhami, Gulnar Ospanova, and Dana Abdakimova. 2019. Crime control in the sphere of information technologies in the Republic of Turkey. Digital Investigation 30: 94–100. https://doi.org/10.1016/j.diin.2019.07.005.
Sindhu, K.K., Rupali Kombade, Reena Gadge, and B.B. Meshram. 2014. Forensic Investigation processes for cybercrime and cyber space. In Proceedings of International Conference on Internet Computing and Information Communication, 193–206. New Delhi: Springer.
Smirnov, A.A. 2012. International legal aspects of fighting cybercrimes and cyber-terrorism. Issues of Strengthening Legality and Rule: Science, Practice, Trends 5: 323–329.
Smith, Russel G. 2007. Crime control in the digital age: An exploration of human rights implications. International Journal of Cyber Criminology 1: 167–179.
Somer, Tiia. 2019. Taxonomies of cybercrime: An overview and proposal to be used in mapping cyber criminal journeys. In ECCWS 2019 18th European Conference on Cyber Warfare and Security, 475. Academic Conferences and publishing limited.
Statista. 2020. Global internet penetration rate. https://www.statista.com/statistics/269329/penetration-rate-of-theinternet-by-region/. Accessed 15 October 2020.
Tabansky, Lior, and Isaac Ben Israel. 2015. Cybersecurity in Israel. New York: Springer.
Tafazzoli, Tala. 2018. Cyber Crime Legislation. https://www.itu.int/en/ITU-D/Regional-Presence/AsiaPacific/SiteAssets/Pages/Events/2018/CybersecurityASPCOE/cybersecurity/Tafazzoli-cybercrime%20legislations.pdf. Accessed 15 October 2020.
TASS. 2018. Russia to propose draft cybersecurity convention to UN General Assembly. http://tass.com/politics/1011749. Accessed 15 October 2020.
The Criminal Code of the Russian Federation as of 13 Jun 1996 N 63-FZ. 2019. http://www.consultant.ru/document/cons_doc_LAW_10699/. Accessed 15 October 2020.
UN. 2019. Cybercrime 1. INTRODUCTION TO CYBERCRIME. Resource for lecturer. https://www.unodc.org/documents/e4j/Cybercrime/Cybercrime_Module_1_Introduction_to_Cybercrime_RU.pdf. Accessed 15 October 2020.
Unites Nations Office on Drugs and Crime. 2016. Report of the Conference of the Parties to the United Nations Convention against Transnational Organized Crime on its eighth session, held in Vienna from 17 to 21 October 2016. https://undocs.org/en/CTOC/COP/2016/15. Accessed 15 October 2020.
UNODC. 2013. Comprehensive study of cybercrime. https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf. Accessed 15 October 2020.
Van Der Hof, Simone, and Bert-Jaap. Koops. 2011. Adolescents and cybercrime: Navigating between freedom and control. Policy & Internet 3: 1–28. https://doi.org/10.2202/1944-2866.1121.
Vardanyan, A.V., and E.V. Nikitina. 2007. Investigation of hi-tech and computer information crimes. Moscow: Yurlitinform Publ.
Wilson, Clay. 2008. Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress. https://fas.org/sgp/crs/terror/RL32114.pdf. Accessed 15 October 2020.
Xinhua. 2017. Full text of BRICS leaders Xiamen Declaration. Brics Summit Media Center. http://www.bricschn.org/English/2017-09/05/c_136583711_2.htm. Accessed 15 October 2020.
Zernik, Joseph. 2019. Cybersecurity and law in Israel - A case study. In 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), 205–212. IEEE. https://doi.org/10.1109/icgs3.2019.8688318
Acknowledgements
Aigul Nukusheva and Roza Zhamiyeva were financially supported as holders of the title and state Grant “The best teacher of the university—2020”.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1057/s41284-023-00414-0
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Nukusheva, A., Zhamiyeva, R., Shestak, V. et al. RETRACTED ARTICLE: Formation of a legislative framework in the field of combating cybercrime and strategic directions of its development. Secur J 35, 893–912 (2022). https://doi.org/10.1057/s41284-021-00304-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1057/s41284-021-00304-3