Symbolic Policy of the Council of Europe’s Cybercrime Treaty

Document Type : Original Independent Original Article

Authors

1 Katanchi Elnaz: Student of Ph.D, Major of International law, Maragheh Branch, Islamic Azad University, Maragheh, Iran

2 Assistant Professor of Criminal Law and Criminology, Maragheh Branch, Islamic Azad University, Maragheh, Iran.

Abstract

The development and evolution of cyberspace has led to various forms of cybercrime. Thus, in recent decades, countries have taken steps to combat cybercrime with the codification of international treaties. One of these international treaties is the EU Cybercrime Treaty (Budapest Convention), which was ratified as the first cybercrime treaty in 2001. This article describes how the Convention contains the elements of symbolic policy: reassuring the public that action is being taken to thwart the arms of cybercrime, educating the public about cybercrime, acting as a model for state, and acting as a deterrent for those who are considering acts of cybercrime. The analysis raise questions about the effectiveness of this Treaty and other policies toward preventing international cybercrime and law enforcement’s ability to fight this problem. For example, to what extent is the law applicable to the fight against cybercrime and why, after many years of ratification, the treaty still lacks the necessary binding force, and most countries have doubts about its ratification. This descriptive-analytical study seeks to explain the symbolic policies of the treaty and answer those questions.

Keywords

Main Subjects


- جلالی فراهانی، ا. (1395)، کنوانسیون جرایم سایبر و پروتکل الحاقی آن، تهران، انتشارات خرسندی، چاپ دوم.
- جلالی فراهانی، ا. (1387)، جنبه‌های حقوقی اقدامات کیفری بین‌المللی مجریان قانون در قبال جرایم سایبری، فصلنامه مطالعات پیشگیری از جرم، سال 3، شماره 8، صص 81-35.
- جلالی فراهانی، ا. (1394)، درآمدی بر آئین دادرسی کیفری جرایم سایبری، تهران: انتشارات خرسندی، چاپ دوم.
- سورنسون، گئورک و رابرت جکسون (1394)، درآمدی بر  روابط بین‌الملل، مترجمین: احمد تقی زاده، مهدی ذاکریان و حسن سعید کلاهی، تهران: انتشارات میزان.
- رحیمی، رئوف (1397)، «مسئولیت دولت و بخش خصوصی در قبال حقوق بشر»، فصلنامه مطالعات بین‌المللی، سال 15، شماره 59، صص 65-88.
- گرکی، م. (1389)، جرایم سایبری: راهنمایی برای کشورهای در حال توسعه، ترجمه مرتضی اکبری، تهران: نیروی انتظامی جمهوری اسلامی ایران، پلیس امنیت فضای تولید و تبادل اطلاعات.
- میریام، اف. میکولون (1386)، «کنوانسیون جرم‌های سایبری: اجرای هماهنگ حقوق کیفری بین‌المللی؛ چشم انداز فرآیند دادرسی عادلانه چیست؟»، ترجمه ا. جوانبخت، مجله حقوقی دادگستری، شماره 59، صص 216- 181.
- نمامیان، پ. (1392)، «مواجهه با تروریسم سایبری در حقوق بین‌الملل کیفری»، فصلنامه پژوهش‌های ارتباطی، سال 20، شماره 1، صص42 -9.
English Reference
- Berman, P. S. (2002), “The Globalization of Jurisdiction”, University of Pennsylvania Law Review, 151(2), pp.  317-329.
- Boni, B. (2001), Creating a Global Consensus Against Cyber Crime, New York: Network Security.
- Brenner, S. and J. J. Schwerh (2004), “Introduction—Cyber Crime: A Note on International Issues”, Information Systems Frontiers, 6(2), pp. 105-114.
- Chung, W., H. Chen & S. Chou (2006), “Fighting Cyber Crime: A Review and The Taiwan Experience”, Decision Support Systems, 1(4), pp. 667-679.
- Coleman, C. (2003), “Security Cyberspace—New Laws and Developing Strategies”, Computer Law and Security Report, 19(2), pp. 129-141.
- Convention on Cyber Crime Update (2002), Computer Fraud and Security, pp. 4-5.
- Council of Europe. (2011), “Convention on Cyber Crime”, Retrieved on 12th May 2011 from http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm
- Gercke, M. (2009), “Europe’s Legal Approaches to Cyber Crime”, ERA Forum 10, pp. 145-153.
- Grabosky, P. (2007), Electronic CrimeUpper Saddle River, New Jersey: Pearson/Prentice Hall.
- Hilley, S. (2005), “Pressure Mounts on US Senate to Pass Cyber Crime Treaty”, Digital Investigation, 1(2), pp.167-178.
- Katyal, N. K. (2001), “Criminal Law in Cyberspace”, University of Pennsylvania Law Review, 149(4), pp. 106-119.
- Kellermann, T. (2010), “Building a Foundation for Global Cybercrime Law Enforcement”, Computer Fraud and Security, 4(10), pp. 5-12.
- Kigerl, A.C. (2009), “CAN SPAM Act: An Empirical Analysis”, International Journal of Cyber Criminology, 3(2), pp. 571-579.
- Lawrie, L. (2002), “A Twin-Pronged Approach in the Fight Against Cyber Crime”, The Scotsman, May 8, pp. 5-18.
- Monshipouri, M., Prompichai, T. (2018), “Digital Activism in Perspective: Palestinian Resistance via Social Media”, International Studies Journal (ISJ), 14(4), pp. 42-63.
- Nuth, M. S. (2008), “Taking Advantage of New Technologies”, For and Against Crime Computer Law and Security Report, 24, pp. 431-442.
- Ross, J. I. (2010), Criminal Investigations: Cyber Crime, New York: Chelsea House.
- Schell, B. H., & C. Martin (2004), Cyber crime: A Reference Handbook, Santa Barbara, California: ABC-CLIO.
- Sharma, A. (2005), “World Seeks a Wider Web Role”, Congressional Quarterly Weekly, Report Nov 14, pp. 3039-3047.
- Simon, G. E. (1998), “Cyberporn and Censorship: Constitutional Barriers to Preventing Access to Internet Pornography by Minors”, The Journal of Criminal Law and Criminology, 88(3), pp. 1033-1043.
- Silver, O. (2001), “European Cyber Crime Proposal Released”, Computer Fraud and Security, (5), pp. 3-17.
- Sinrod, E. J. & W.P. Reilly (2000), “Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws”, Santa Clara Computer and High Technology Law Journal, 16(2), pp. 3-51.
- Speer, D. L. (2000), “Redefining Borders: The Challenges of Cyber Crime”, Law and Social Change, 34, pp. 261-273.
- Stolz, B. A. (1983), “Congress and Capital Punishment: An Exercise in Symbolic Politics”, Law and Policy Quarterly, 5(2), pp. 153-165.
- Swire, P. P. (2005), “Elephants and Mice Revisited: Law and Choice of Law on the Internet”, University of Pennsylvania Law Review, 153(6), pp. 1979-1992.
- U.S. Ratifies International Cyber Crime Treaty (2006), Computer Fraud and Security, November 5, pp. 1-27.
- Walden, I. (2004), “Harmonising Computer Crime Laws in Europe”, European Journal of Crime; Criminal Law and Criminal Justice, 12(4), pp. 325-335.
- Wales, E. (2000), “Draft Council of Europe Cyber Crime Convention Upsets Civil Rights Bodies”, Computer Fraud and Security Issue, 12, pp. 5-17.
- Wible, B. (2003), “A Site Where Hackers Are Welcome: Using Hack-In Contests to Shape Preferences and Deter Computer Crime” The Yale Law Journal, 112(6), pp. 1573-1581.
- Wired Society (2002), The Nation, May 4.
- Yam, J. T. (2001), “Cyber crime Treaty Under Way”, Business Word, May 3, pp. 5-13.