Skip to main content

Criminal Proceedings in Cyberspace: The Challenge of Digital Era

  • Chapter
  • First Online:
Cybercrime, Organized Crime, and Societal Responses

Abstract

The author explains non-applicability of traditional criminal law and procedure in cyberspace. She advocates the introduction of biometric identification security systems, online reporting centres, universal cyber police and “two track” criminal proceedings for cybercrimes. In that regard, the following issues are discussed: Why the existing criminal law and procedure are not an adequate tool for cyberspace regulation? How can the use of biometrics contribute to the cyber security? Is the Internet anonymity a reality or only an “urban” myth? Why are the majority of cybercrimes not reported and how to improve this statistics? How to overcome jurisdictional difficulties arising from collection of digital evidence? How to eliminate cybercrime offenders from cyberspace, at the same time protecting all fair trial guarantees?

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Brenner, S., & Schwerha, J. (2002). Transnational evidence gathering and local prosecution of international cybercrime. Journal of Computer & Informaton Law, 20, 347–395.

    Google Scholar 

  • Brenner, S. (2004). Toward a criminal law for cyberspace: Product liability and other issues. Boston University Journal of Science & Technology Law, 10(2), 1–113.

    Google Scholar 

  • Brenner, S., & Koops, B. J. (2004). Approaches to cybercrime jurisdiction. Journal of High Technology Law, 4, 1–46.

    Google Scholar 

  • Bryant, R., et al. (2008). Investigating digital crime. New York: Wiley.

    Google Scholar 

  • Cassese, A. (2005). International law. Oxford: Oxford University Press.

    Google Scholar 

  • Choi, B. H. (2013). The anonymous Internet. Maryland Law Review, 72, 501–570.

    Google Scholar 

  • Clark, F. & Diliberto, K. (1996). Investigating computer crime. Boca Raton, Fla.: CRC Press.

    Google Scholar 

  • Cryer, R., Friman, H., Robinson, D., & Wilmshurst, E. (2008). An introduction to international criminal law and procedure. New York: Cambridge University Press.

    Google Scholar 

  • Donohue, L. (2012). Technological leap, statutory gap and constitutional abyss: Remote biometric identification comes of age. Minnesota Law Review, 97, 407–559.

    Google Scholar 

  • EUROPOL. (2007). High tech crimes within the EU: Old crimes new tools, new crimes old tools. Retrieved June 10, 2015, from https://www.enisa.europa.eu/activities/cert/events/files/ENISA_Europol_threat_assessment_2007_Dileone.pdf.

  • Feldman, R. (2003). Considerations on the emerging implementation of biometric technology. Hastings Communications and Entertainment Law Journal, 25, 653–682.

    Google Scholar 

  • Goldstone, D., & Shave, B. (1998). International dimension of crimes in cyberspace. Fordham International Law Journal, 22, 1925–1971.

    Google Scholar 

  • Goodman, M. D., & Brenner, S. (2002). The emerging consensus on criminal conduct in cyberspace. International Journal of Law and Information Technology, 10. Retrieved February 2, 2016, from http://www.lawtechjournal.com/articles/2002/03_020625_goodmanbrenner.php.

  • Greenberg, M. (2003). A return to Lilliput: The LICRA v. Yahoo! Case and the regulation of online content in the world market. Berkeley Technology Law Journal, 18, 1191–1258.

    Google Scholar 

  • Haggerty, K., & Ericson, R. (2000). The surveillant assemblage. British Journal of Sociology, 51(4), 605–622.

    Article  Google Scholar 

  • Hu, M. (2013). Biometric ID cybersurveillance. Indiana Law Journal, 88, 1475–1558.

    Google Scholar 

  • Jain, A., Ross, A., & Nandakumar, K. (2011). Introduction to biometrics. New York: Springer.

    Book  Google Scholar 

  • Jaishankar, K. (2008). Space transition theory of cybercrimes. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 283–301). Upper Saddle River, NJ: Prentice Hall.

    Google Scholar 

  • Katyal, N. K. (2001). Criminal law in cyberspace. University of Pennsylvania Law Review, 149, 1003–1114.

    Article  Google Scholar 

  • Kerr, O. (2005). Digital evidence and the new criminal procedure. Columbia Law Review, 105, 279–318.

    Google Scholar 

  • Lessing, L. (2006). Code and other laws of cyberspace. New York: Basic Books.

    Google Scholar 

  • Li, X. (2008). The criminal phenomenon on the Internet: Hallmarks of criminals and victims revisited through typical cases prosecuted. University of Ottawa Law & Technology Journal, 5, 125.

    Google Scholar 

  • Marion, N. E. (2010). The council of Europe’s cyber crime treaty: An exercise in symbolic legislation. International Journal of Cyber Criminology, 4, 699–712.

    Google Scholar 

  • McKenna, K., & Bargh, J. (2000). Plan 9 from cyberspace: The implications of the Internet for personality and social psychology. Personality and Social Psychology Review, 4, 57–75.

    Article  Google Scholar 

  • Parker, D. (1998). Fighting computer crime: For protecting information. New York: Wiley.

    Google Scholar 

  • Schmalleger, F., & Pittaro, M. (2009). Crimes of the Internet. Upper Saddle River, NJ: Prentice Hall.

    Google Scholar 

  • Seitz, N. (2004). Transborder search: A new perspective in law enforcement? Yale Journal of Law and Technology, 7(1), 23. Retrieved February 2, 2016, from http://digitalcommons.law.yale.edu/yjolt/vol7/iss1/2.

    Google Scholar 

  • Shinder, D., & Cross, M. (2002). Scene of the cybercrime. New York: Syngress.

    Google Scholar 

  • Smith, R. G. (2007). Crime control in the digital age: An exploration of human rights implications. International Journal of Cyber Criminology, 1(2), 167–179.

    Google Scholar 

  • Swire, P. P. (2005). Developments in the law: The law of cyberspace. Harvard Law Review, 112, 1574–1704.

    Google Scholar 

  • UNODC. (2013). Comprehensive study on cybercrime. Retrieved from https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf.

  • United States Department of Justice. (2002). Searching and seizing computers and obtaining electronic evidence in criminal investigations. Retrieved May 12, 2015, from http://www.usdoj.gov/criminal/cybercrime/s&smanual2002.pdf.

  • Vacca, J. (2007). Biometric technologies and verification systems. Amsterdam: Butterworth-Heinemann.

    Google Scholar 

  • Viano, E. (2012). Balancing liberty and security fighting cybercrime: Challenges for the networked society. In Manacorda S. (Ed.), Cybercriminality: Finding a balance between freedom and security (pp. 33–63). Milano: ISPAC. Retrieved February 2, 2016, from http://ispac.cnpds.org/publications-27-cybercriminality-finding-a-balance-between-freedom-and-security-27.html.

  • Wall, D. S. (2005). The Internet as a conduit for criminals. In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 77–98). Thousand Oaks, CA: Sage.

    Chapter  Google Scholar 

  • Wall, D. S. (2007/10). Policing cybercrimes: Situating the public police in networks of security within cyberspace (revised May 2010). Police, Practice & Research: An International Journal, 8(2), 183–205.

    Google Scholar 

  • Yar, M. (2006). Cybercrime and society. London: Sage Publishing Ltd.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vanja Bajovic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Bajovic, V. (2017). Criminal Proceedings in Cyberspace: The Challenge of Digital Era. In: Viano, E. (eds) Cybercrime, Organized Crime, and Societal Responses. Springer, Cham. https://doi.org/10.1007/978-3-319-44501-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44501-4_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44499-4

  • Online ISBN: 978-3-319-44501-4

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics