My Account Log in

3 options

Global cybercrime and cybersecurity laws and regulations : issues and challenges in the 21st Century / Shahid M. Shahidullah, Carla D. Coates, Dorothy Kersha-Aerga, editors.

EBSCOhost Academic eBook Collection (North America) Available online

EBSCOhost Academic eBook Collection (North America)

EBSCOhost eBook Community College Collection Available online

EBSCOhost eBook Community College Collection

Ebook Central Academic Complete Available online

Ebook Central Academic Complete
Format:
Book
Contributor:
Shahidullah, Shahid M., 1950- editor.
Coates, Carla D., editor.
Kersha-Aerga, Dorothy, editor.
Series:
Cybercrime and cybersecurity research.
Cybercrime and Cybersecurity Research
Language:
English
Subjects (All):
Computer crimes.
Computer crimes--Law and legislation.
Computer crimes--Prevention.
Physical Description:
1 online resource (362 pages)
Place of Publication:
New York : Nova Science Publishers, Inc., [2022]
Summary:
The global Internet and cyberspace age witness a new generation of cybercriminals, hackers, cybergangs, cyber terrorists, and cyber sexual harassers. This phenomenon, broadly defined as cybercrimes, is the focus of this book. The International Telecommunication Union's Global Cyber Security Index found that about 90 percent of the world's countries have enacted laws and regulations to control and combat cybercrime. This book has examined some of those cyber laws and regulations in 12 countries, including the United States, United Kingdom, Canada, China, Russia, Japan, Singapore, Nigeria, South Africa, India, Pakistan, and Bangladesh. Different chapters of this book have found some common themes. First, in most of the countries of the world, there is an advancing process of legally criminalizing cybercrimes, including such behaviors as unauthorized access, use, and interception; damage and deletion of computer data; damage and destruction of computer networks; and dissemination and transportation of illegally obtained computer data. Second, there is high sensitivity in all countries studied about the security of the information infrastructure and their critical economic, political, and social infrastructures such as power plants, chemical industries, aviation systems, and electoral systems. Third, all forms of cybercrime committed by using the computer and the Internet are also defined as fraud and forgery, identity theft, cyber espionage, sexual harassment, cyber sexual extortion, online child pornography, and revenge pornography. One of the more critical themes that emerged is that no country defines cybersecurity as just a technical matter--a matter only of coding and decoding and encryption and decryption. Cybersecurity is also broadly perceived as a legal, political, organizational, and educational issue. It is perceived as a matter to be dealt with by a government in cooperation with international partners, potentially barring China and Russia. One of the other themes that emerged as a genuine concern is the rapid escalation of cyber sexual violence against women and minors. In most countries examined in this book, the policymakers and law enforcement believe that social media is partly responsible for increasing cyber sexual violence.
Contents:
Intro
Contents
Foreword
Preface
Acknowledgments
Authors' Biographies
Chapter 1
The Birth of Cyber Space, Global Cybercrime, and the Imperatives for Global Cyber Laws and Regulations
Abstract
Introduction
The Nature of Expanding Global Cyber Space
Nature and the Extent of Global Cybercrime
The Imperatives of Global Cyber Laws and Regulations
Conclusion
Chapter 2
The Four Decades of Evolution of Cybercrime and Federal Cybersecurity Laws and Policy Developments in the United States, 1980-2020
The Nature and Prevalence of Cybercrime in the U.S.
U.S. Cyber Security Laws and Regulations Major Legislation : 1970-1990
U.S. Cybersecurity Organizations and Capacity Building: The CFFA and ECPA Acts of 1986
U.S. Cyber Security Laws and Regulations : Major Législation : 1990-2000
U.S. Cyber Security Laws and Regulations Major Legislation : 2000-2010
U.S. Cybersecurity Organizations and Capacity Building Measures: 2000-2010
U.S. Cyber Security Laws and Regulations Major Legislation: 2010-2020
U.S. Cybersecurity Organizations and Capacity Building Measures : 2010-2020
Chapter 3
Localization and Globalization of Digital Data: The Evolving Laws and Regulations in the U.S., Canada, and the European Union
Internet and Global Data : Creation, Speed, and Volume
The Governance of Global Data : The Competing Models
Data Localization and Data Globalization Laws : The U.S. Case
Data Localization and Globalization : The Canadian Laws and Rules
Data Localization and Globalization : The EU and the GDPR
Chapter 4
The Governance of the Internet in Authoritarian Regimes: Isolation, Control, and Censorship in Russia and China
The Evolution of the Internet.
Global Internet Use and Penetration Rates
The Internet as an Open Architecture
Networked Authoritarianism
Chapter 5
Evolution of Cyber Laws and Regulations in Nigeria: Local and Global Responses to Cybercrime and Cybersecurity in the African Region
The Trend of Growth of the Internet and Cyber Space in Nigeria
Nature and the Incidence of Cybercrime in Nigeria
Evolution of Cyber Laws and Regulations in Nigeria, 2000-2014
Cybercrimes (Prohibition, Prevention, etc.) Act, 2015
Cybersecurity in Nigeria : The Institutional and Organizational Framework for Capacity Building
Chapter 6
Cybercrime and the Evolving Cyber Laws and Regulations in the Asia-Pacific Region: China, Japan, and Singapore
The Evolving Digital World of the Asia-Pacific Region
Nature and Prevalence of Cybercrime in the Asia-Pacific Region
Cybercrime, Cybersecurity, and the Evolving Laws and Regulations in China
Cybercrime, Cybersecurity, and the Evolving Laws and Regulations in Japan
Cybercrime, Cybersecurity, and the Evolving Laws and Regulations in Singapore
Chapter 7
Evolution of Cybercrime and Cybersecurity Laws and Regulations in the African Region: A Comparative Study of South Africa and Nigeria
Nature and Prevalence of Cybercrimes in the African Region
The Evolving Cyber Crime Laws and Regulations in the African Region
Cyber Laws and Regulations in South Africa: The Nature and Prevalence of Cybercrimes
Nature of Cyber Laws and Regulations in South Africa
Cyber Laws and Regulations in Nigeria : The Nature and Prevalence of Cybercrimes
Nature of Cyber Laws and Regulations in Nigeria
Chapter 8.
Cyber Violence against Women and Girls: A Comparative Study of the Evolution of Global Cyber Laws and Regulations in the U.S., European Union, and India
Cyber Violence Against Women and Girls : The Global Scenario
Cyber Violence Against Women and Girls : The Imperatives for Laws and Regulations
Cyber Sexual Violence in the U.S: Evolving Laws and Regulations
Prevalence of Cyber Violence against Women and Girls
Cyber Violence Against Women and Girls in the U.S.: Evolving Laws and Regulations
Cyber Sexual Violence in the EU: Evolving Laws and Regulations
Prevalence of Cyber Violence against Women and Girls in the EU
Cyber Violence Against Women and Girls in the EU: Evolving Laws and Regulations
Cyber Sexual Violence in India : Evolving Laws and Regulations
Cyber Violence Against Women and Girls in India: Evolving Laws and Regulations
Chapter 9
Cybercrime and the Evolving Cyber Laws and Regulations in South Asia: India, Pakistan, and Bangladesh
Digital Divide in South Asia : The Asian and the World Contexts
The Nature and Intensity of Cybercrime in South Asia
Cybercrime and the Evolution of Cyber Laws and Regulations in India
Cybercrime and the Evolution of Cyber Laws and Regulations in Pakistan
Cybercrime and the Evolution of Cyber Laws and Regulations in Bangladesh
Conclusion : Cybercrime Laws and Regulations in India, Pakistan, and Bangladesh : A Comparative Look
Chapter 10
Governing the Global Internet: The Perspective of Sovereign Internet, and the Reincarnation of Cold War Politics
Global Cyber Space and the Global Internet Regime
The Governance of the Internet : ICAAN and The Multi-Stakeholder Approach.
The Governance of the Internet from above : The Global Model
Sovereign Internet : Is It an Alternative Model for Global Internet Governance ?
The Emerging Cyber Threats from China and Russia on American Cyberspace
Global Internet Governance, Sovereign Internet, and the Reincarnation of Cold War Politics
References
Chapter 8
Index
Blank Page
Blank Page.
Notes:
Includes index.
Includes bibliographical references and index.
Description based on print version record.
Other Format:
Print version: Shahidullah, Shahid M. Global Cybercrime and Cybersecurity Laws and Regulations: Issues and Challenges in the 21st Century
ISBN:
9781685078546

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

We want your feedback!

Thanks for using the Penn Libraries new search tool. We encourage you to submit feedback as we continue to improve the site.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account