Challenges of Modern Era: Ð¡yberterrorism and Cybercrime
Keywords:Ñyberterrorism, Ñybercrime, Internet, network, WWW, LAN, WAN, law, legislation, law-enforcement
In the present article questions of Ñyberterrorism and cybercrime counteraction in the XXI century are discussed. Reasons for the new types of crimes from the theoretical and practical point of view and explains why new types of crime, including terrorism are so important for study and law-enforcement are discussed. During discussion author presents opinions of scientists and specialists in the sphere of information technologies, law and security. Different meanings of the terms "Ð¡yberterrorism" and "Cybercrime" are discussed and analyzed. Differences and similarities of the terms "Ð¡yberterrorism" and "Cybercrime" are presented. Characteristics of "Ð¡yberterrorism" and "Cybercrime" in terms of actions are presented. In the conclusion author present opinion that without appropriate legal regulation of activities in the Internet it would be impossible to protect rights of persons and organization. Author explains that due to the fact that Internet is global (more than 150 countries are connected to) it would be appropriate to regulate Internet activity on the international level.
Grudtsina, L.J., Galushkin, A.A., Questions of Modern Civil Society Development in Russian Federation, World Applied Sciences Journal, Vol., 25, No. 5, p. 790, 2013.
Galushkin, A.A., To the Question of Crimes and Offenses in the National Segment of the Global Information and Telecommunication Network Internet, Pravozashitnik, No. 1, p. 71, 2014.
Kim, A., Computer Crime: Psychology and Law, Journal of Criminal Justice, No. 1, pp. 72, 2014.
Allabin, B.V., Information Technologies and New Forms of Terrorisms, Person. State. Law, No. 2, pp. 17, 2014.
Random House Dictionary, Random House, Inc., 2014.
Law Office of William Spade, URL: http://www.spadelaw.com/cyber-crimes/, 2014.
Shaine, A.J., Cybercrime Characteristics, Journal of The International Institute of Informatization and Public Administration named in the honor of P.A. Stolypin, Vol., 1, No. 1, p. 22, 2014.
McFeely R.A., Cyber Security: Preparing for and Responding to the Enduring Threat, Federal Bureau of Investigation, URL: http://www.fbi.gov/news/testimony/cyber-security-preparing-for-and-responding-to-the-enduring-threat, 2013.
Yakovlev V.F., Public Report By the Adviser on Legal Questions of the President of the Russian Federation, Pravovaya Initsiativa, No. 2. p. 5, 2013.
Shackelford, S.J., Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace, Cambr
How to Cite
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.