PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES
The adoption, in 2001, in Budapest, of the Council of Europe Convention on Cybercrime brought an important step forward in the prevention and combatting cyber-related crimes, through the creation of a special indictment (art. 6) against the production, sale, procurement for use, import, distributi...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Nicolae Titulescu University Publishing House
2024-05-01
|
Series: | Challenges of the Knowledge Society |
Subjects: | |
Online Access: | http://cks.univnt.ro/download/cks_2024_articles%252F1_CKS_2024_CRIMINAL_LAW%252FCKS_2024_CRIMINAL_LAW_004.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841561339446689792 |
---|---|
author | Maxim DOBRINOIU |
author_facet | Maxim DOBRINOIU |
author_sort | Maxim DOBRINOIU |
collection | DOAJ |
description | The adoption, in 2001, in Budapest, of the Council of Europe Convention on Cybercrime brought an important step forward in the prevention and combatting cyber-related crimes, through the creation of a special indictment (art. 6) against the production, sale, procurement for use, import, distribution, import or making available of devices, computer programs, passwords or any other such data with the scope to further illegal access to a computer system, interception without right of a computer data transmission, an illegal data interference or an illegal system interference, offences comprised in the art. 2 to 5 of the Convention. Although the offence in art. 6 represents the „mean-crime” in relation with the further commission of the above mentioned crimes against the confidentiality, integrity and availability of computer data and systems („purpose-crimes”), the nowadays Cybercrime phenomenon shows that the misuse of the devices and computer programs actually exceeds the legal boundaries of art. 2 to 5, and (technically) impacts much of the other forms of cyber-related or cyber-enabled offences, especially in the FinTech area, electronic payment, blockchain, cryptocurrency etc. Taking into consideration the proliferation of illegal activities against personal information, confidential data or access credentials, especially the commercialization, especially in Dark Web, of codes, passwords, hacking tools, malware and other present or future cutting-edge system interference technologies, thus posing a great danger to the whole cyber-ecosystem, an improvement of art. 6, and of all the correspondent (related) articles in the special laws or the criminal codes adopted by the signatory countries, would contribute to the creation of an extensive and much comprehensive legal tool in the prevention and efficiently combating cybercrimes. |
format | Article |
id | doaj-art-69611adf75c645208236f4eacde16753 |
institution | Kabale University |
issn | 2068-7796 |
language | English |
publishDate | 2024-05-01 |
publisher | Nicolae Titulescu University Publishing House |
record_format | Article |
series | Challenges of the Knowledge Society |
spelling | doaj-art-69611adf75c645208236f4eacde167532025-01-03T01:47:07ZengNicolae Titulescu University Publishing HouseChallenges of the Knowledge Society2068-77962024-05-011712131PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMESMaxim DOBRINOIU0Associate Professor, Faculty of Law, „Nicolae Titulescu” University of BucharestThe adoption, in 2001, in Budapest, of the Council of Europe Convention on Cybercrime brought an important step forward in the prevention and combatting cyber-related crimes, through the creation of a special indictment (art. 6) against the production, sale, procurement for use, import, distribution, import or making available of devices, computer programs, passwords or any other such data with the scope to further illegal access to a computer system, interception without right of a computer data transmission, an illegal data interference or an illegal system interference, offences comprised in the art. 2 to 5 of the Convention. Although the offence in art. 6 represents the „mean-crime” in relation with the further commission of the above mentioned crimes against the confidentiality, integrity and availability of computer data and systems („purpose-crimes”), the nowadays Cybercrime phenomenon shows that the misuse of the devices and computer programs actually exceeds the legal boundaries of art. 2 to 5, and (technically) impacts much of the other forms of cyber-related or cyber-enabled offences, especially in the FinTech area, electronic payment, blockchain, cryptocurrency etc. Taking into consideration the proliferation of illegal activities against personal information, confidential data or access credentials, especially the commercialization, especially in Dark Web, of codes, passwords, hacking tools, malware and other present or future cutting-edge system interference technologies, thus posing a great danger to the whole cyber-ecosystem, an improvement of art. 6, and of all the correspondent (related) articles in the special laws or the criminal codes adopted by the signatory countries, would contribute to the creation of an extensive and much comprehensive legal tool in the prevention and efficiently combating cybercrimes.http://cks.univnt.ro/download/cks_2024_articles%252F1_CKS_2024_CRIMINAL_LAW%252FCKS_2024_CRIMINAL_LAW_004.pdfcriminal liabilitymisuse of devicescyber-dependent crimescyber-enabled crimescoe convention on cybercrimeillegal operations with devices and software |
spellingShingle | Maxim DOBRINOIU PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES Challenges of the Knowledge Society criminal liability misuse of devices cyber-dependent crimes cyber-enabled crimes coe convention on cybercrime illegal operations with devices and software |
title | PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES |
title_full | PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES |
title_fullStr | PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES |
title_full_unstemmed | PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES |
title_short | PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES |
title_sort | proposals for a broader approach of misuse of devices and programs provision in combating cyber dependent and cyber enabled crimes |
topic | criminal liability misuse of devices cyber-dependent crimes cyber-enabled crimes coe convention on cybercrime illegal operations with devices and software |
url | http://cks.univnt.ro/download/cks_2024_articles%252F1_CKS_2024_CRIMINAL_LAW%252FCKS_2024_CRIMINAL_LAW_004.pdf |
work_keys_str_mv | AT maximdobrinoiu proposalsforabroaderapproachofmisuseofdevicesandprogramsprovisionincombatingcyberdependentandcyberenabledcrimes |