INFORMATION CRIMES AND INVESTIGATION CHALLENGE COMBATING INFORMATION CRIMES; A MULTIDIMENSIONAL APPROACH TO ADDRESSING INVESTIGATION CHALLENGES IN THE ERA OF DIGITAL ADVANCEMENT

Authors

  • Prusha Qalandar Hussein Law Department, University College of Goizha, Sulaymaniyah,Kurdistan Region -iraq

DOI:

https://doi.org/10.21271/zjlp.22.sp.23

Abstract

 In our increasingly digitized world, information crimes have emerged as a significant threat, encompassing a wide range of unlawful activities such as hacking, identity theft, and cyber espionage. This study explores the landscape of information crimes and the challenges faced by investigators in addressing and mitigating these offenses. The first aspect of this study examines the diverse realm of information crimes, providing an overview of the types of offenses that fall under this category. From financial fraud to data breaches, the spectrum of information crimes is vast, posing risks to individuals, businesses, and even nations. Understanding the nature and evolution of these crimes is crucial for developing effective investigation strategies and procedures. The second focus of this study is on the challenges faced by investigators when tackling information crimes. The dynamic and borderless nature of the digital realm presents unique obstacles, including issues related to jurisdiction, attribution, and the rapidly evolving tactics employed by cybercriminals.

 Additionally, the study sheds light on the technological complexities that investigators face, such as encryption and anonymization tools that perpetrators exploit to conceal their activities. To address these challenges, the study suggests the implementation of multidimensional and collaborative approaches. International cooperation among law enforcement agencies, private sector entities, and cybersecurity experts is emphasized. The study also seeks continuous training and skill development for investigators to stay abreast of technological advancements. In conclusion, this paper tries to underscore the urgency of enhancing global efforts to combat information crimes. By comprehensively understanding the landscape of these offenses and addressing the specific challenges faced by investigators, we can better equip ourselves to safeguard the integrity of information in our interconnected world. 

References

● Brown, C. (2015). Investigating and prosecuting cybercrime: Forensic dependencies and barriers to justice. International Journal of Cyber Criminology, 9(1), 55-119.

● Brown, S. (2015). Digital Forensics: Digital Evidence in Criminal Investigations. CRC Press.

● Cerone, A. & Shaikh, S. A. (2008). Formal analysis of security in interactive systems. In M. Gupta & R. Sharman (Eds.), Handbook of Research on Social and Organizational Liabilities in Information Security. IGI-Global, pp. 415-432 (Chapter 25).

● Council of Europe. (2001). Convention on Cybercrime (Budapest Convention). Retrieved from Council of Europe.

● Everard, P. (2008). NATO and cyber terrorism, Response to Cyber Terrorism. In Edited by Center of Excellence Defence Against Terrorism, Ankara, Turkey, pp. 118-126.

● Giordano, J., & Maciag, T. (2002). High-Technology Crime Investigator's Handbook: Establishing and Managing a High-Technology Crime Prevention Program. Butterworth-Heinemann.

● Gordon, S., & Ford, R. (2006). Information Security: Protecting the Global Enterprise. Prentice Hall.

● Jahankhani, H., & Al-Nemrat, A. (2011). Information Security Management: Concepts and Practice. CRC Press.

● Legislation.gov.uk. (2008). Terrorism Act 2000. Retrieved from legislation.gov.uk.

● Lopez, J., Moon, S., & Park, Y. (2016). "Cloud Forensic Science: A Survey and Research Directions." International Journal of Digital Crime and Forensics (IJDCF), 8(1), pp.57-74.

● Mandhai, S. (2017). "UK Man Charged Over Not Providing Password." Al Jazeera. Retrieved from Al Jazeera.

● Nelson, B., Phillips, A., & Steuart, C. (2010). Guide to Computer Forensics and Investigations, fourth ed. Cengage Learning, Boston.

● Rowlingston, H. (2007). "Cyber Crime: The Challenge in Asia." In M. Nadesan (Ed.), Cyber Crime and Society (pp. 137-146). Sage Publications.

● Rowlingston, R. (2007). Towards a strategy for E-crime prevention. In ICGeS Global e Security, Proceedings of the 3rd Annual International Conference, London, England, 18-20 April 2007. ISBN 978-0-9550008-4-3.

● Saikayasit, R., Stedmon, A. W., Lawson, G., & Fussey, P. (2012). User requirements for security and counter-terrorism initiatives. In P. Vink (Ed.), Advances in Social and Organizational Factors. CRC Press, Boca Raton, FL, pp. 256-265.

● Staniforth, A. (2013). Blackstone's Counter-Terrorism Handbook, third ed. Oxford University Press, Oxford.

● Symantec. (2013). Intelligence Report: October 2013. Retrieved from http://www.symantec.com/connect/blogs/symantec-intelligence-report-october-2013 (accessed January 2024).

● Wall, D. (2005). "The Internet as a Conduit for Criminals." In T. Holt & B. Schell (Eds.), Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications (pp. 17-38). IGI Global.

● Williams, J. (2012). ACPO Good Practice Guide for Digital Evidence. Retrieved from http://www.acpo.police.uk/documents/crime/2011/20110-cba-digital-evidence-v5.pdf (accessed 1-12-2024).

● Yar, M. (2006). Cybercrime and Society. Sage Publication Ltd, London.

Downloads

Published

2024-11-30

How to Cite

Hussein, prusha Q. (2024). INFORMATION CRIMES AND INVESTIGATION CHALLENGE COMBATING INFORMATION CRIMES; A MULTIDIMENSIONAL APPROACH TO ADDRESSING INVESTIGATION CHALLENGES IN THE ERA OF DIGITAL ADVANCEMENT. Zanco Journal of Law and Politics گۆڤاری زانكۆ بۆ یاساو رامیاری, 22(Special), 501–522. https://doi.org/10.21271/zjlp.22.sp.23

Issue

Section

Articles