Document Type : ISI
Author
Associate Professor of Criminal Law and Criminology, Faculty of Administrative Sciences and Economics, Arak University, Arak, Iran.
Abstract
Keywords
References
Aaron, A. (2019). A legal Analysis of Cybercrime and Cyber Torts: Lessons for Nigeria. [LL. B Thesis, University of Lagos].
Ayswariya, G. K & Aswathy, R. (2017). “A Comparative Study on the Difference Between Conventional Crime and Cybercrime”. International Journal of Pure and Applied Mathematics, 119(17), PP. 69-75. https://acadpubl.eu/hub/2018-119-17/2/120.pdf (Accessed 14 December 2024).
Andini, O. P. (2021). “Cyber Terrorism Criminal Acts in the Perspective of Transnational Organized Crime”. Unnes Law Journal, 7(2), PP. 333-346. https://journal.unnes.ac.id/sju/ulj/article/view/38804
Alex, G. (2014). “Coming Soon: Another Country to Ratify the Budapest Convention”. CFR blog. https://www.cfr.org/blog/coming-soon-another-country-ratify-budapest-convention (Accessed 21 December 2024).
Alkharman, Jamal Awwad & Isyaku Hassan (2023). “Cyberterrorism and Self-Defense in the Framework of International Law”. Journal of Law and Sustainable Development, 11(8), PP. 1-21. DOI: https://doi.org/10.55908/sdgs.v11i8.1430
De Silva De Alwis, R. (2025). Gendering the new international convention on cybercrimes and new norms on artificial intelligence and emerging technologies. Washington Journal of Law, Technology & Arts, 20(2), PP. 1-41. http://dx.doi.org/10.2139/ssrn.4945578
Eoghan Casey (2011). Digital Evidence and Computer Crime (3rd Ed.). Elsevier Inc publisher, PP. 1-304.
Crootof, R. (2018). “International Cyber Torts: Expanding State Accountability in Cyberspace”. Cornell Law Review, 103(1), PP. 565-644. https://scholarship.law.cornell.edu/cgi/viewcontent.cgi?article=4753&context=clr(Accessed 5 January 2025).
Fidler, D. P. (2016). “Cyberspace, Terrorism and International Law”. Journal of Conflict and Security Law, 21(3), PP. 1-26. https://doi.org/10.1093/jcsl/krw013
Gabey. G. (2013). “INTERPOL Global Complex for Innovation: Interpol lays out response blueprint for global cybercrime war”. Digital News Asia.https://www.digitalnewsasia.com/security/interpol-lays-outresponse-blueprint-for-global-cybercrime-war (Accessed 14 January 2025).
Khokhlov, N., & Korotayev, A. (2022). “Internet, Political Regime and Terrorism: A Quantitative Analysis”. CrossCultural Research, 56(4), PP. 385–418. DOI: 10.1177/10693971221085343
Krannenbarg, M.W. (2018). “Cyber-Offending and Traditional Offending over the Life-Course: An Empirical Comparison”. Journal of Developmental and Life-Course Criminology, 4(3), PP. 343-364. DOI: 10.1007/s40865-018-0087-8.
Khaeriah kadir, Nadiah & Judhariksawan, Maskun. (2019). “Terrorism and Cyber space; A Phenomenon of Cyber-Terrorism as Transnational Crimes”. Fiat Justicia Journal,13(4), PP. 147-162.
DOI: 10.25041/fiatjustisia.v13no4.1735
Mifitzgerald. (2004). “Nine Famous Hacks”. Extreme Tech. https://www.extremetech.com/extreme/55530nine-famous-hacks (Accessed 18 November 2024).
https://www.sciencedirect.com/science/article/abs/pii/B9780750679299500506(Accessed 16 November 2024).
Juliana De Groot. (2020). “A History of RAnsomeware Attacks: The Biggest and Worst Ransomware Attacks of All Times”. Digital Guardian’s Blog. https://digitalguardian.com/blog/historyransomware-attacks-biggest-and-worst-ransomware-attacks-all-time (Accessed 8 November 2024).
Shaweorcid, Robb, Ian R. McAndrew. (2023). “Cybersecurity and Domestic Terrorism: Purpose and Future”. Journal of Software Engineering and Applications, 16(10), PP. 548-560. DOI: 10.4236/jsea.2023.1610028
Hadji-Janev, M., & Aleksoski, S. (2021). “Use of Force in Self-Defense Against Cyber-Attacks and the Shockwaves in the Legal Community: One more Reason for Holistic Legal Approach to Cyberspace”. Mediterranean Journal of Social Sciences, 4(14), PP. 115-126. https://connections-qj.org/article/use-force-self-defense-against-cyber-attacks-and-shockwaves-legal-community-one-more-reason (Accessed 27 February 2025).
Rachmawati Madjid, Yasniar. (2021). “Cyberterrorism Challenges: The Need for Global Mutual Legal Assistance for Universal Criminal Jurisdiction”. Yustisia Jurnal Hukum,10(3), PP. 388-414. DOI: https://doi.org/10.20961/yustisia.v10i3.54953
Reveron, Derek S. & John E. Savage. (2023). International Law and Norms in Cyberspace, in: Security in the Cyber Age an Introduction to Policy and Technology. Cambridge University Press.
Stein, S. & Solange, G. (2009). A Global Protocol on Cybersecurity and Cybercrime. (Oslo: E-dit).
Henkin, L. (1978). How Nations Behave. Columbia University Press, 2nd edn.
Orji, U.J. (2012). Cybersecurity Law and Regulation. 1 Wolf Legal Publishers.
Ramos, A. (2014). “United Nations’ Definition of Cybercrime”. Innovative Dynamic Networks. https://idnwi.com/united-nations-definition-cybercrime/ (Accessed 8 (Accessed 12 October 2024).
Raven. (2002). “The History of Hacking and Phreaking”. HelpnetSecurity. www.helpnetsecruity.com/2002/04/04/the-history-of-hacking-and-phreaking/ (Accessed 8 November 2024).