3 options
Global cybercrime and cybersecurity laws and regulations : issues and challenges in the 21st Century / Shahid M. Shahidullah, Carla D. Coates, Dorothy Kersha-Aerga, editors.
EBSCOhost Academic eBook Collection (North America) Available online
EBSCOhost Academic eBook Collection (North America)EBSCOhost eBook Community College Collection Available online
EBSCOhost eBook Community College Collection- Format:
- Book
- Series:
- Cybercrime and cybersecurity research.
- Cybercrime and Cybersecurity Research
- Language:
- English
- Subjects (All):
- Computer crimes.
- Computer crimes--Law and legislation.
- Computer crimes--Prevention.
- Physical Description:
- 1 online resource (362 pages)
- Place of Publication:
- New York : Nova Science Publishers, Inc., [2022]
- Summary:
- The global Internet and cyberspace age witness a new generation of cybercriminals, hackers, cybergangs, cyber terrorists, and cyber sexual harassers. This phenomenon, broadly defined as cybercrimes, is the focus of this book. The International Telecommunication Union's Global Cyber Security Index found that about 90 percent of the world's countries have enacted laws and regulations to control and combat cybercrime. This book has examined some of those cyber laws and regulations in 12 countries, including the United States, United Kingdom, Canada, China, Russia, Japan, Singapore, Nigeria, South Africa, India, Pakistan, and Bangladesh. Different chapters of this book have found some common themes. First, in most of the countries of the world, there is an advancing process of legally criminalizing cybercrimes, including such behaviors as unauthorized access, use, and interception; damage and deletion of computer data; damage and destruction of computer networks; and dissemination and transportation of illegally obtained computer data. Second, there is high sensitivity in all countries studied about the security of the information infrastructure and their critical economic, political, and social infrastructures such as power plants, chemical industries, aviation systems, and electoral systems. Third, all forms of cybercrime committed by using the computer and the Internet are also defined as fraud and forgery, identity theft, cyber espionage, sexual harassment, cyber sexual extortion, online child pornography, and revenge pornography. One of the more critical themes that emerged is that no country defines cybersecurity as just a technical matter--a matter only of coding and decoding and encryption and decryption. Cybersecurity is also broadly perceived as a legal, political, organizational, and educational issue. It is perceived as a matter to be dealt with by a government in cooperation with international partners, potentially barring China and Russia. One of the other themes that emerged as a genuine concern is the rapid escalation of cyber sexual violence against women and minors. In most countries examined in this book, the policymakers and law enforcement believe that social media is partly responsible for increasing cyber sexual violence.
- Contents:
- Intro
- Contents
- Foreword
- Preface
- Acknowledgments
- Authors' Biographies
- Chapter 1
- The Birth of Cyber Space, Global Cybercrime, and the Imperatives for Global Cyber Laws and Regulations
- Abstract
- Introduction
- The Nature of Expanding Global Cyber Space
- Nature and the Extent of Global Cybercrime
- The Imperatives of Global Cyber Laws and Regulations
- Conclusion
- Chapter 2
- The Four Decades of Evolution of Cybercrime and Federal Cybersecurity Laws and Policy Developments in the United States, 1980-2020
- The Nature and Prevalence of Cybercrime in the U.S.
- U.S. Cyber Security Laws and Regulations Major Legislation : 1970-1990
- U.S. Cybersecurity Organizations and Capacity Building: The CFFA and ECPA Acts of 1986
- U.S. Cyber Security Laws and Regulations : Major Législation : 1990-2000
- U.S. Cyber Security Laws and Regulations Major Legislation : 2000-2010
- U.S. Cybersecurity Organizations and Capacity Building Measures: 2000-2010
- U.S. Cyber Security Laws and Regulations Major Legislation: 2010-2020
- U.S. Cybersecurity Organizations and Capacity Building Measures : 2010-2020
- Chapter 3
- Localization and Globalization of Digital Data: The Evolving Laws and Regulations in the U.S., Canada, and the European Union
- Internet and Global Data : Creation, Speed, and Volume
- The Governance of Global Data : The Competing Models
- Data Localization and Data Globalization Laws : The U.S. Case
- Data Localization and Globalization : The Canadian Laws and Rules
- Data Localization and Globalization : The EU and the GDPR
- Chapter 4
- The Governance of the Internet in Authoritarian Regimes: Isolation, Control, and Censorship in Russia and China
- The Evolution of the Internet.
- Global Internet Use and Penetration Rates
- The Internet as an Open Architecture
- Networked Authoritarianism
- Chapter 5
- Evolution of Cyber Laws and Regulations in Nigeria: Local and Global Responses to Cybercrime and Cybersecurity in the African Region
- The Trend of Growth of the Internet and Cyber Space in Nigeria
- Nature and the Incidence of Cybercrime in Nigeria
- Evolution of Cyber Laws and Regulations in Nigeria, 2000-2014
- Cybercrimes (Prohibition, Prevention, etc.) Act, 2015
- Cybersecurity in Nigeria : The Institutional and Organizational Framework for Capacity Building
- Chapter 6
- Cybercrime and the Evolving Cyber Laws and Regulations in the Asia-Pacific Region: China, Japan, and Singapore
- The Evolving Digital World of the Asia-Pacific Region
- Nature and Prevalence of Cybercrime in the Asia-Pacific Region
- Cybercrime, Cybersecurity, and the Evolving Laws and Regulations in China
- Cybercrime, Cybersecurity, and the Evolving Laws and Regulations in Japan
- Cybercrime, Cybersecurity, and the Evolving Laws and Regulations in Singapore
- Chapter 7
- Evolution of Cybercrime and Cybersecurity Laws and Regulations in the African Region: A Comparative Study of South Africa and Nigeria
- Nature and Prevalence of Cybercrimes in the African Region
- The Evolving Cyber Crime Laws and Regulations in the African Region
- Cyber Laws and Regulations in South Africa: The Nature and Prevalence of Cybercrimes
- Nature of Cyber Laws and Regulations in South Africa
- Cyber Laws and Regulations in Nigeria : The Nature and Prevalence of Cybercrimes
- Nature of Cyber Laws and Regulations in Nigeria
- Chapter 8.
- Cyber Violence against Women and Girls: A Comparative Study of the Evolution of Global Cyber Laws and Regulations in the U.S., European Union, and India
- Cyber Violence Against Women and Girls : The Global Scenario
- Cyber Violence Against Women and Girls : The Imperatives for Laws and Regulations
- Cyber Sexual Violence in the U.S: Evolving Laws and Regulations
- Prevalence of Cyber Violence against Women and Girls
- Cyber Violence Against Women and Girls in the U.S.: Evolving Laws and Regulations
- Cyber Sexual Violence in the EU: Evolving Laws and Regulations
- Prevalence of Cyber Violence against Women and Girls in the EU
- Cyber Violence Against Women and Girls in the EU: Evolving Laws and Regulations
- Cyber Sexual Violence in India : Evolving Laws and Regulations
- Cyber Violence Against Women and Girls in India: Evolving Laws and Regulations
- Chapter 9
- Cybercrime and the Evolving Cyber Laws and Regulations in South Asia: India, Pakistan, and Bangladesh
- Digital Divide in South Asia : The Asian and the World Contexts
- The Nature and Intensity of Cybercrime in South Asia
- Cybercrime and the Evolution of Cyber Laws and Regulations in India
- Cybercrime and the Evolution of Cyber Laws and Regulations in Pakistan
- Cybercrime and the Evolution of Cyber Laws and Regulations in Bangladesh
- Conclusion : Cybercrime Laws and Regulations in India, Pakistan, and Bangladesh : A Comparative Look
- Chapter 10
- Governing the Global Internet: The Perspective of Sovereign Internet, and the Reincarnation of Cold War Politics
- Global Cyber Space and the Global Internet Regime
- The Governance of the Internet : ICAAN and The Multi-Stakeholder Approach.
- The Governance of the Internet from above : The Global Model
- Sovereign Internet : Is It an Alternative Model for Global Internet Governance ?
- The Emerging Cyber Threats from China and Russia on American Cyberspace
- Global Internet Governance, Sovereign Internet, and the Reincarnation of Cold War Politics
- References
- Chapter 8
- Index
- Blank Page
- Blank Page.
- Notes:
- Includes index.
- Includes bibliographical references and index.
- Description based on print version record.
- Other Format:
- Print version: Shahidullah, Shahid M. Global Cybercrime and Cybersecurity Laws and Regulations: Issues and Challenges in the 21st Century
- ISBN:
- 9781685078546
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.