Cybercrime and Internet Regulations: An Annotated Bibliography

Verified

Added on  2023/04/20

|10
|2447
|328
Annotated Bibliography
AI Summary
This annotated bibliography provides an overview of various regulations implemented to combat cybercrime, focusing on laws and rights that protect internet users. It examines the effectiveness of acts such as the Spam Act 2003 and the Cyber Crime Act 2001 of Australia, assessing their strengths, weaknesses, and potential loopholes. The bibliography includes research on telecommunications interception and access laws, criminology of cybercrime, public perceptions on organized crime, and the involvement of young people in cybercrime. It also addresses the role of Chinese hacktivism, forensic dependencies in cybercrime prosecution, employee attitudes towards cybersecurity, and the issue of self-produced child pornography. The articles selected offer diverse perspectives on cybercrime and its regulation, highlighting the importance of understanding and adapting to the evolving landscape of cyber threats. Desklib provides access to similar solved assignments and past papers for students.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: RESEARCH METHODS
RESEARCH METHODS
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
RESEARCH METHODS 1
Introduction:
Cybercrime or computer oriented crime involves a network and a computer. The
annotated bibliography is about identifying the various regulations that have been
implemented in the internet, and to combat various forms of cyber-crimes. The purpose of
this paper lies in the interests of understanding the common threats to cyber security, and the
laws and rights that protect an internet user. Efforts to further understand the loopholes in the
internet will be attempted at.
Ha, H., Coghill, K. and Maharaj, E.A., 2012. Current Measures to Protect
E-Consumers’ Privacy in Australia. In Cyber Crime: Concepts,
Methodologies, Tools and Applications (pp. 1728-1755). IGI Global.
In their research, Ha, Coghill and Maharaja focus on the Spam Act, 2003 by the
Australian Government. Research was conducted to evaluate the effectiveness of the act and
assess how strong the act is to prevent cyber crimes like spamming. To serve that, it analyses
each aspect of the act to find out its strengths and weaknesses and possible loopholes. The
results reveal that this act protects internet users from spams and misleading electronic
messages, which often contain harmful viruses meant for hacking. The unauthorised and
unsolicited messages are restricted in this act effectively, which prevent users from facing
cyber security threats like getting spammed with viruses.
The reason why this article was chosen as a reference is because of the fact that
spamming has been a threat to cyber security since the very beginning of the 21st century.
Hence, to know that a governmental law exists in Australia that protects users from such
threats, is a vital part in combating the cyber crime of spamming.
Document Page
2RESEARCH METHODS
Keogh, K., Gordon, C. and Marinovic, P., 2018. Cyber security: Global
developments in cyber security law: is Australia keeping pace?. LSJ: Law
Society of NSW Journal, (42), p.82.
In their research, Keogh, Gordon and Marinovic focus on a more comprehensive law
that attempts to prevent cyber crime altogether. Like the previous annotation, this paper aims
at assessing the effectiveness of the Cyber Crime Act, 2001 of Australia, and aims at
identifying the spheres in which the law regulates the internet and how effective it has been in
the event past. It identifies cyber stalking, possession of child pornography, harassment, data
theft and computer trespassing amongst many other cyber crimes from each the law protects
internet surfers from falling prey to cyber hackers and other cyber criminals.
The reason for choosing this research paper is, it provides a wide overview of
cybercrimes and cyber security. It aims at providing an insight to most of the severe cyber
crimes that are in existence, and addresses each of them with how the law restricts them from
taking place. It is a regulation of internet in Australia that combats numerous cyber crimes
which would have otherwise posed a threat to human rights.
Selvadurai, N., Kisswani, N. and Khalaileh, Y., 2016. The proportionality
principle in telecommunications interception and access law in an
environment of heightened security and technological
convergence. Information & Communications Technology Law, 25(3),
pp.229-246.
In their research, Selvadurai, Kisswani and Khalaileh focus on one of Australia's other
acts to combat cyber attacks. The research paper particularly focuses on the
Telecommunications (Interceptions and Access) Act, 1979. Unlike the previous research
Document Page
3RESEARCH METHODS
papers that focused on the strengths of the acts, the research paper attempts at explaining the
further amendments in the act that are required. The paper analyses the spheres in which the
act is helpful in combating cyber attacks, while pointing out aspects that remain uncovered.
This was done with a purpose of figuring out ways in which the internet could be more
regulated in order to combat cyber crimes. The findings suggest that the policies of this act
itself leads to intrusive ways of investigation, impacting the privacy of the Australian
citizens.
The reason for choosing this research paper is to add a new dynamic to the discussion,
where an article points out flaws in the current regulatory system, and how it should be
modified to effectively restrict cyber and telecommunication crimes.
Tatarinova, L.F., Shakirov, K.N. and Tatarinov, D.V., 2016. Criminological
Analysis of Determinants of Cybercrime Technologies. International
Electronic Journal of Mathematics Education, 11(5), pp.1127-1134.
The authors of the study have emphasized the criminology context and the ways to
curb. The topic of study is to address the issues and key factor that determines cybercrimes
such as financial crimes and personal crimes including harassment and personality theft. The
study emphasized on the imminent growth of the crimes in the huge cyberspace. As the
cyberspace has emerged to be across border global center for information it has enabled the
growth in cybercrime. The authors have mentioned about the reinforcement of the laws and
expanding the policies of law in order to curb the cybercrime.
The study does have its own limitations as it only takes two of common types of
cybercrimes which is personality theft and another is financial theft. The study that have been
conducted states about the importance of several aspects that can curb the cybercrime with
significant importance for the regulations to curb the cybercrime.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4RESEARCH METHODS
Kostakos, P., 2018. Public Perceptions on Organised Crime, Mafia, and
Terrorism: A Big Data Analysis based on Twitter and Google
Trends. International Journal of Cyber Criminology.
The purpose of this study is to collect data that focused on the mafia, terrorism and
organised crime. Specially, the time series user’s data search online habits collected from
Google Trends, and the cross-sectional data of network were gathered from Twitter. A
significant structure was contained in the gathered data. A numerically structured conclusion
can be created from preceding analysis.
There are some limitations in the study as there were narrow boundaries in the
research field. Also, some self reported data was there too. Secondary data was collected
from several sources.
Brewer, R., Cale, J., Goldsmith, A. and Holt, T., 2018. Young People, the
Internet, and Emerging Pathways into Criminality: A Study of Australian
Adolescents. International Journal of Cyber Criminology.
The article considers the youth of Australia for the study and emphasizes the use of
digital technologies by young people that has exposed them to cybercrime and their non-
voluntary involvement with crimes. The authors have stated the important areas of
governance in the use of digital technology to reduce the involuntary as well as voluntary,
drift towards cybercrime. The authors have mentioned the importance of understanding the
technologies in order to implement better regulations to curb cybercrime.
The study does have limitations on the basis of selecting the number of samples for
the study sill it provides immense insights on drifting of youth into the cybercrime. The
Document Page
5RESEARCH METHODS
significance of the study is about regulating the use of digital technologies along with
governing the behaviour of youth in the digital world.
Webber, C. and Yip, M., 2018. The Rise of Chinese cyberwarriors:
Towards a theoretical model of online hacktivism. International Journal of
Cyber Criminology, 12(1), pp.223-247.
The main purpose of this paper is to analyse the theoretical framework behind the
Chinese hacktivism. Arguably, most of the cyber attacks that happens in Australia, come
from China. The study has argued that forms of hacktivism that originate in China are shaped
and bounded by historical and social influences. In China hacktivism was developed as soon
as education program related to cybercrime introduced and available for all since then it has
emerged to be a national threat.
The reason for choosing the report is that the Chinese hackers are a threat to the
Australian cyber security but the study does have its own limitations, because no empirical or
statistical data is directly collected by the authors. The researchers gathered information from
only one department of an organization in Australia (Bulletin Board Systems, BBS) and as
such the findings cannot represent the entire organization’s sentiments or views.
Brown, C.S., 2015. Investigating and prosecuting cybercrime: Forensic
dependencies and barriers to justice. International Journal of Cyber
Criminology, 9(1), p.55.
The study has emphasized the legal encouragement to stop cybercrimes along with
regulating the cyber laws and cyber policies to control cyber-crimes. The authors have
mentioned the importance of the strategic development of the policies and implementation of
the policies to control the continuous evolving cybercrime potential. The study has
Document Page
6RESEARCH METHODS
recommended state-controlled mechanisms to control and scrutinize the incidents of
cybercrimes. The study has emphasized on the uniformity of the cyber laws to ease the
regulation of cybercrime. The authors have encouraged developing the security technologies
to ensure the durability of the cyber defenses.
The authors have provided a deep insight about the importance legal regulation plays
to ensure the prosecution of the cyber criminals and the existing loopholes in the system. The
relevancy of study about the legal regulation and uniformity of the laws has been a significant
step to ensure effective regulation.
Hadlington, L.J., 2018. Employees Attitudes towards Cyber Security and
Risky Online Behaviours: An Empirical Assessment in the United
Kingdom.
The study has emphasized the attitude of employees towards cyber security and risky
online behaviours. In this study a total number of 515 employees were given a questionnaire
to provide the answers that were consisted in two scales. One of the scales measured the
attitude of employees towards cyber security as well as the general awareness of cyber crime.
The other one examined the risks involved in their online behaviour. According to the
company size, age group and employee behaviour, significant differences were identified.
The study does have limitations in that the two scales required a more varied and
wider group of employees. The NFIB (National Fraud Intelligence Bureau) and Action Fraud
were not specially mentioned in this survey. The results highlighted a discernible lack of
information as how the police take reports related to cyber crime and how that is dealt with.
Also, the study uses secondary data.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7RESEARCH METHODS
Westlake, B.G., 2018. Delineating Victims from Perpetrators: Prosecuting
Self-Produced Child Pornography in Youth Criminal Justice
Systems. International Journal of Cyber Criminology.
The research article focuses on the growth in child pornography that is self produced
and known as Self-Produced Child Pornography (SPCP). Although judicial and social
attention has been provided to the instances of web based SPCP form and teenage sexting.
The purpose of this study is, an introduction to the non sexting SPCP by using Justin Berry’s
case study as well as to propose education, counselling and board punishment from the youth
criminal justice systems (YCJS).
The reason for choosing this research paper is to add a new dynamic to the discussion,
but this study does have its own limitations in that the article mainly uses secondary data, as
it studies the previous works of other authors related to the subject. No statistical or empirical
data is collected directly by the authors, which may make the results non relative to current
times.
Document Page
8RESEARCH METHODS
Bibliography:
Brewer, R., Cale, J., Goldsmith, A. and Holt, T., 2018. Young People, the Internet, and
Emerging Pathways into Criminality: A Study of Australian Adolescents. International
Journal of Cyber Criminology.
Brown, C.S., 2015. Investigating and prosecuting cybercrime: Forensic dependencies and
barriers to justice. International Journal of Cyber Criminology, 9(1), p.55.
Ha, H., Coghill, K. and Maharaj, E.A., 2012. Current Measures to Protect E-Consumers’
Privacy in Australia. In Cyber Crime: Concepts, Methodologies, Tools and Applications (pp.
1728-1755). IGI Global.
Hadlington, L.J., 2018. Employees Attitudes towards Cyber Security and Risky Online
Behaviours: An Empirical Assessment in the United Kingdom.
Keogh, K., Gordon, C. and Marinovic, P., 2018. Cyber security: Global developments in
cyber security law: is Australia keeping pace?. LSJ: Law Society of NSW Journal, (42), p.82.
Kostakos, P., 2018. Public Perceptions on Organised Crime, Mafia, and Terrorism: A Big
Data Analysis based on Twitter and Google Trends. International Journal of Cyber
Criminology.
Selvadurai, N., Kisswani, N. and Khalaileh, Y., 2016. The proportionality principle in
telecommunications interception and access law in an environment of heightened security
and technological convergence. Information & Communications Technology Law, 25(3),
pp.229-246.
Document Page
9RESEARCH METHODS
Tatarinova, L.F., Shakirov, K.N. and Tatarinov, D.V., 2016. Criminological Analysis of
Determinants of Cybercrime Technologies. International Electronic Journal of Mathematics
Education, 11(5), pp.1127-1134.
Webber, C. and Yip, M., 2018. The Rise of Chinese cyberwarriors: Towards a theoretical
model of online hacktivism. International Journal of Cyber Criminology, 12(1), pp.223-247.
Westlake, B.G., 2018. Delineating Victims from Perpetrators: Prosecuting Self-Produced
Child Pornography in Youth Criminal Justice Systems. International Journal of Cyber
Criminology.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]