Responsive image
Article Theoretical and Legal Approaches to the Classıfıcatıon of Informatıon-Legal Vıolatıons
Authors Alizadeh Huseyn Oktay
Name of magazine Legal journal «Law of Ukraine» (Ukrainian version)
Issue 9 / 2021
Pages 144 - 154
Annotation

The current legislation is characterized by the lack of a unified approach to the assessment of violations in the field of information technology, the unity of the conceptual apparatus used and the application of inappropriate and unsystematic changes that do not yield the expected results. In addition, the imperfection of the legislation governing the application and use of the achievements of scientific and technological progress, the division of the regulatory framework in approaches to the legal regulation of various aspects of technological progress remain a common legal problem.

Due to the fact that the global network covers all countries, the states dealing with information violations must develop a common legal language in order to carry out effective cooperation. It is important to standardize international norms on the basis of this legal language, so that the states of the world must implement their legal regulations in accordance with these international rules. In most cases, international norms are accepted as a “standard” and implemented in national law. However, the necessity of modern times confirms the obsolescence and change of many international norms. The article proposes to make various edits on such international documents related to information violations. In our opinion, since national law is often based on international law, such edits and changes can also contribute to domestic law.

As noted in the article, in many cases, violations in the field of information do not constitute an error or a crime, but only temporary “user concerns”. However, the practical examples we present once again confirm that a simple crack can eventually lead to loss of life. Therefore, law enforcement agencies should not be indifferent to complaints about the use of such computers and the Internet, and take preventive measures to prevent them.

 

Keywords information-legal violation; classification; cybercrime; cyberspace; Budapest Convention
References

Bibliography

Authored books

1. Levent K, Açıklamalı-İçtihatlı Tüm Yönleriyle Bilişim Suçları ve Türk Ceza Kanunundaki Uygulaması (Seçkin Yayınları 2005) (in Turkish).

 

 Journal articles

2. Bossetta M, ‘The weaponization of social media: spear phishing and cyberattacks on democracy’ [2018] 71 (1.5, Special Issue) Journal of International Affairs 97–106 (in English).

3. Huhtinen A-M, Rantapelkonen J, ‘Disinformation in Hybrid Warfare: The Rhizomatic Speed of Social Media in the Spamosphere’ [2016] 15 (4) Journal of Information Warfare (in English).

 

Theses

4. Nacar F B, ‘Avrupa Birliği Ülkeleri ve Türkiye’de Bilişim Suçlarının Ceza Hukukundaki Uygulamaları’ (Yüksek Lisans Tezi 2010) (in Turkish).

 

Websites

5. ‘2021 Data Breach Investigations Report (DBIR)’ <https://enterprise.verizon.com/ resources/reports/2021/2021-data-breach-investigations-report.pdf> (accessed: 16.09.2021) (in English).

6. ‘Troll factories’ (deepportal.hq.nato.int) <https://www.nato.int/nato_static_fl2014/ assets/pdf/2020/5/pdf/2005-deepportal2-troll-factories.pdf> (accessed: 16.09.2021) (in English).

7. Duranske Benjamin, ‘Reader Roundtable: “Virtual Rape” Claim Brings Belgian Police to Second Life’ (Virtual Law, 24.04.2007) <http://virtuallyblind.com/2007/04/24/openroundtableallegations-of-virtual-rape-bring-belgian-police-to-second-life> (accessed: 16.09.2021) (in English).

8. Goodchild Joan, ‘The Robin Sage experiment: Fake profile fools security pros’ (NETWORKWORLD, 08.07.2010) <https://www.networkworld.com/article/2213486/ the-robin-sage-experiment--fake-profile-fools-security-pros.html> (accessed: 16.09.2021) (in English).

9. Menn Joseph, ‘Exclusive: Russia used Facebook to try to spy on Macron campaign – sources’ (News.Yahoo, 27.07.2017) <https://uk.news.yahoo.com/exclusive-russia-usedfacebooktry-spy-macron-campaign-050414445--finance.html> (accessed: 16.09.2021) (in English).

 

Electronic version Download