Abstract
The author explains non-applicability of traditional criminal law and procedure in cyberspace. She advocates the introduction of biometric identification security systems, online reporting centres, universal cyber police and “two track” criminal proceedings for cybercrimes. In that regard, the following issues are discussed: Why the existing criminal law and procedure are not an adequate tool for cyberspace regulation? How can the use of biometrics contribute to the cyber security? Is the Internet anonymity a reality or only an “urban” myth? Why are the majority of cybercrimes not reported and how to improve this statistics? How to overcome jurisdictional difficulties arising from collection of digital evidence? How to eliminate cybercrime offenders from cyberspace, at the same time protecting all fair trial guarantees?
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Brenner, S., & Schwerha, J. (2002). Transnational evidence gathering and local prosecution of international cybercrime. Journal of Computer & Informaton Law, 20, 347–395.
Brenner, S. (2004). Toward a criminal law for cyberspace: Product liability and other issues. Boston University Journal of Science & Technology Law, 10(2), 1–113.
Brenner, S., & Koops, B. J. (2004). Approaches to cybercrime jurisdiction. Journal of High Technology Law, 4, 1–46.
Bryant, R., et al. (2008). Investigating digital crime. New York: Wiley.
Cassese, A. (2005). International law. Oxford: Oxford University Press.
Choi, B. H. (2013). The anonymous Internet. Maryland Law Review, 72, 501–570.
Clark, F. & Diliberto, K. (1996). Investigating computer crime. Boca Raton, Fla.: CRC Press.
Cryer, R., Friman, H., Robinson, D., & Wilmshurst, E. (2008). An introduction to international criminal law and procedure. New York: Cambridge University Press.
Donohue, L. (2012). Technological leap, statutory gap and constitutional abyss: Remote biometric identification comes of age. Minnesota Law Review, 97, 407–559.
EUROPOL. (2007). High tech crimes within the EU: Old crimes new tools, new crimes old tools. Retrieved June 10, 2015, from https://www.enisa.europa.eu/activities/cert/events/files/ENISA_Europol_threat_assessment_2007_Dileone.pdf.
Feldman, R. (2003). Considerations on the emerging implementation of biometric technology. Hastings Communications and Entertainment Law Journal, 25, 653–682.
Goldstone, D., & Shave, B. (1998). International dimension of crimes in cyberspace. Fordham International Law Journal, 22, 1925–1971.
Goodman, M. D., & Brenner, S. (2002). The emerging consensus on criminal conduct in cyberspace. International Journal of Law and Information Technology, 10. Retrieved February 2, 2016, from http://www.lawtechjournal.com/articles/2002/03_020625_goodmanbrenner.php.
Greenberg, M. (2003). A return to Lilliput: The LICRA v. Yahoo! Case and the regulation of online content in the world market. Berkeley Technology Law Journal, 18, 1191–1258.
Haggerty, K., & Ericson, R. (2000). The surveillant assemblage. British Journal of Sociology, 51(4), 605–622.
Hu, M. (2013). Biometric ID cybersurveillance. Indiana Law Journal, 88, 1475–1558.
Jain, A., Ross, A., & Nandakumar, K. (2011). Introduction to biometrics. New York: Springer.
Jaishankar, K. (2008). Space transition theory of cybercrimes. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the Internet (pp. 283–301). Upper Saddle River, NJ: Prentice Hall.
Katyal, N. K. (2001). Criminal law in cyberspace. University of Pennsylvania Law Review, 149, 1003–1114.
Kerr, O. (2005). Digital evidence and the new criminal procedure. Columbia Law Review, 105, 279–318.
Lessing, L. (2006). Code and other laws of cyberspace. New York: Basic Books.
Li, X. (2008). The criminal phenomenon on the Internet: Hallmarks of criminals and victims revisited through typical cases prosecuted. University of Ottawa Law & Technology Journal, 5, 125.
Marion, N. E. (2010). The council of Europe’s cyber crime treaty: An exercise in symbolic legislation. International Journal of Cyber Criminology, 4, 699–712.
McKenna, K., & Bargh, J. (2000). Plan 9 from cyberspace: The implications of the Internet for personality and social psychology. Personality and Social Psychology Review, 4, 57–75.
Parker, D. (1998). Fighting computer crime: For protecting information. New York: Wiley.
Schmalleger, F., & Pittaro, M. (2009). Crimes of the Internet. Upper Saddle River, NJ: Prentice Hall.
Seitz, N. (2004). Transborder search: A new perspective in law enforcement? Yale Journal of Law and Technology, 7(1), 23. Retrieved February 2, 2016, from http://digitalcommons.law.yale.edu/yjolt/vol7/iss1/2.
Shinder, D., & Cross, M. (2002). Scene of the cybercrime. New York: Syngress.
Smith, R. G. (2007). Crime control in the digital age: An exploration of human rights implications. International Journal of Cyber Criminology, 1(2), 167–179.
Swire, P. P. (2005). Developments in the law: The law of cyberspace. Harvard Law Review, 112, 1574–1704.
UNODC. (2013). Comprehensive study on cybercrime. Retrieved from https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf.
United States Department of Justice. (2002). Searching and seizing computers and obtaining electronic evidence in criminal investigations. Retrieved May 12, 2015, from http://www.usdoj.gov/criminal/cybercrime/s&smanual2002.pdf.
Vacca, J. (2007). Biometric technologies and verification systems. Amsterdam: Butterworth-Heinemann.
Viano, E. (2012). Balancing liberty and security fighting cybercrime: Challenges for the networked society. In Manacorda S. (Ed.), Cybercriminality: Finding a balance between freedom and security (pp. 33–63). Milano: ISPAC. Retrieved February 2, 2016, from http://ispac.cnpds.org/publications-27-cybercriminality-finding-a-balance-between-freedom-and-security-27.html.
Wall, D. S. (2005). The Internet as a conduit for criminals. In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 77–98). Thousand Oaks, CA: Sage.
Wall, D. S. (2007/10). Policing cybercrimes: Situating the public police in networks of security within cyberspace (revised May 2010). Police, Practice & Research: An International Journal, 8(2), 183–205.
Yar, M. (2006). Cybercrime and society. London: Sage Publishing Ltd.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Bajovic, V. (2017). Criminal Proceedings in Cyberspace: The Challenge of Digital Era. In: Viano, E. (eds) Cybercrime, Organized Crime, and Societal Responses. Springer, Cham. https://doi.org/10.1007/978-3-319-44501-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-44501-4_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44499-4
Online ISBN: 978-3-319-44501-4
eBook Packages: Law and CriminologyLaw and Criminology (R0)