Cybercrime Tendencies and Legislation in the Republic of Macedonia
The advancement of information and communication technologies opens new venues and ways for cybercriminals to commit crime. There are several different types of cybercrime offences that need to be treated in a separate and different manner. The major international source that provides guidelines for...
Gespeichert in:
| Veröffentlicht in: | European journal on criminal policy and research Jg. 22; H. 1; S. 127 - 151 |
|---|---|
| Hauptverfasser: | , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Dordrecht
Springer Netherlands
01.03.2016
Springer Nature B.V |
| Schlagworte: | |
| ISSN: | 0928-1371, 1572-9869 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | The advancement of information and communication technologies opens new venues and ways for cybercriminals to commit crime. There are several different types of cybercrime offences that need to be treated in a separate and different manner. The major international source that provides guidelines for treatment of cybercrime is the Convention on Cybercrime adopted by the Council of Europe and the European Commission Action Plan. The purpose of the paper is to present, discuss and analyze the Macedonian legislation treating cybercrime, with respect to the specific cases typically encountered in practice and the international guidelines concerning cybercrime. The major source of cybercrime legislation in Macedonia is the Criminal Code with provisions thereof in ten of its articles; it addresses cybercrimes such as personal data abuse, copyright and piracy issues, production and distribution of child pornography, computer viruses, intrusions into computer systems, computer fraud and computer forgery. We also present and analyze reports on cybercrime complaints and victims from Macedonia, issued by the Internet Crime Complaint Center and the Macedonian Ministry of Internal Affairs. The reports reveal the unusually high number of complaints for perpetrators and victims originating from Macedonia. Furthermore, we highlight several recent cybercrime cases reported in Macedonia. All things considered, the Macedonian penal legislation is modern and it follows the current European and world standards. It provides guidelines for successful resolution of cybercrime committed in the Republic of Macedonia. However, it could be improved by a more active inclusion of Macedonian authorities in the global response to cybercrime and by stronger enforcement of cybercrime prevention measures and strategies. |
|---|---|
| AbstractList | The advancement of information and communication technologies opens new venues and ways for cybercriminals to commit crime. There are several different types of cybercrime offences that need to be treated in a separate and different manner. The major international source that provides guidelines for treatment of cybercrime is the Convention on Cybercrime adopted by the Council of Europe and the European Commission Action Plan. The purpose of the paper is to present, discuss and analyze the Macedonian legislation treating cybercrime, with respect to the specific cases typically encountered in practice and the international guidelines concerning cybercrime. The major source of cybercrime legislation in Macedonia is the Criminal Code with provisions thereof in ten of its articles; it addresses cybercrimes such as personal data abuse, copyright and piracy issues, production and distribution of child pornography, computer viruses, intrusions into computer systems, computer fraud and computer forgery. We also present and analyze reports on cybercrime complaints and victims from Macedonia, issued by the Internet Crime Complaint Center and the Macedonian Ministry of Internal Affairs. The reports reveal the unusually high number of complaints for perpetrators and victims originating from Macedonia. Furthermore, we highlight several recent cybercrime cases reported in Macedonia. All things considered, the Macedonian penal legislation is modern and it follows the current European and world standards. It provides guidelines for successful resolution of cybercrime committed in the Republic of Macedonia. However, it could be improved by a more active inclusion of Macedonian authorities in the global response to cybercrime and by stronger enforcement of cybercrime prevention measures and strategies. Reprinted by permission of Springer The advancement of information and communication technologies opens new venues and ways for cybercriminals to commit crime. There are several different types of cybercrime offences that need to be treated in a separate and different manner. The major international source that provides guidelines for treatment of cybercrime is the Convention on Cybercrime adopted by the Council of Europe and the European Commission Action Plan. The purpose of the paper is to present, discuss and analyze the Macedonian legislation treating cybercrime, with respect to the specific cases typically encountered in practice and the international guidelines concerning cybercrime. The major source of cybercrime legislation in Macedonia is the Criminal Code with provisions thereof in ten of its articles; it addresses cybercrimes such as personal data abuse, copyright and piracy issues, production and distribution of child pornography, computer viruses, intrusions into computer systems, computer fraud and computer forgery. We also present and analyze reports on cybercrime complaints and victims from Macedonia, issued by the Internet Crime Complaint Center and the Macedonian Ministry of Internal Affairs. The reports reveal the unusually high number of complaints for perpetrators and victims originating from Macedonia. Furthermore, we highlight several recent cybercrime cases reported in Macedonia. All things considered, the Macedonian penal legislation is modern and it follows the current European and world standards. It provides guidelines for successful resolution of cybercrime committed in the Republic of Macedonia. However, it could be improved by a more active inclusion of Macedonian authorities in the global response to cybercrime and by stronger enforcement of cybercrime prevention measures and strategies. |
| Author | Rashkovski, Dragi Naumovski, Goce Naumovski, Vasko |
| Author_xml | – sequence: 1 givenname: Dragi surname: Rashkovski fullname: Rashkovski, Dragi email: Dragi.Rashkovski@gmail.com organization: Iustinianus Primus Law Faculty, Ss. Cyril and Methodius University – sequence: 2 givenname: Vasko surname: Naumovski fullname: Naumovski, Vasko organization: Iustinianus Primus Law Faculty, Ss. Cyril and Methodius University – sequence: 3 givenname: Goce surname: Naumovski fullname: Naumovski, Goce organization: Iustinianus Primus Law Faculty, Ss. Cyril and Methodius University |
| BookMark | eNp9kE1LxDAQQIMouH78AG8FL16qmbTNJEdd_IIVQfQc0nSikZquSffgv7frehBBmUMu74WZt8e24xCJsSPgp8A5nmXgEnjJoSm1QCxxi82gQVFqJfU2m3EtVAkVwi7by_mVc4BGihm7mH-0lFwKb1Q8UuwoukC5sLErFvQccm_HMMQixGJ8oeKBlqu2D64YfHFnHXVDDPaA7XjbZzr8fvfZ09Xl4_ymXNxf387PF6Wraj2WrXeVsK3QgNM47VFJ0bhOIQrlu5o8eCEFipqctBp9JyzItpZU205LVe2zk82_yzS8ryiP5i1kR31vIw2rbEChQl1jIyb0-Bf6OqxSnLYzgNhUHBXIicIN5dKQcyJvXBi_7h2TDb0BbtZtzaatmdqadVuDkwm_zOVU0KaPfx2xcfLExmdKP3b6U_oEFVSMHA |
| CitedBy_id | crossref_primary_10_1007_s12117_020_09392_w crossref_primary_10_1016_j_ijlcj_2023_100577 crossref_primary_10_1007_s10611_025_10202_z crossref_primary_10_4018_JGIM_295450 |
| Cites_doi | 10.1017/CBO9780511481604 10.1016/S0267-3649(03)00306-6 10.1201/9781420030884 10.4324/9780203201503 10.1017/S0003445202004488 |
| ContentType | Journal Article |
| Copyright | Springer Science+Business Media Dordrecht 2015 Springer Science+Business Media Dordrecht 2016 |
| Copyright_xml | – notice: Springer Science+Business Media Dordrecht 2015 – notice: Springer Science+Business Media Dordrecht 2016 |
| DBID | AAYXX CITATION 0-V 3V. 7TQ 7U4 7WY 7WZ 7XB 87Z 88J 8AM 8BF 8BJ 8FK 8FL 8G5 ABUWG AFKRA ALSLI AXJJW AZQEC BENPR BEZIV BGRYB BHHNA CCPQU DHY DON DPSOV DWI DWQXO FQK FREBS FRNLG F~G GNUQQ GUQSH HEHIP JBE K60 K6~ K7. KC- L.- M0C M0O M0Q M2L M2O M2R M2S MBDVC PHGZM PHGZT PKEHL POGQB PQBIZ PQBZA PQEST PQQKQ PQUKI PRINS PRQQA Q9U WZK |
| DOI | 10.1007/s10610-015-9277-7 |
| DatabaseName | CrossRef ProQuest Social Sciences Premium Collection【Remote access available】 ProQuest Central (Corporate) PAIS Index Sociological Abstracts (pre-2017) ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Social Science Database (Alumni Edition) Criminal Justice Database (Alumni Edition) European Business Database (Alumni Edition) International Bibliography of the Social Sciences (IBSS) ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) ProQuest Research Library ProQuest Central (Alumni) ProQuest Central UK/Ireland Social Science Premium Collection Asian & European Business Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Criminology Collection Sociological Abstracts ProQuest One Community College PAIS International PAIS International (Ovid) Politics Collection Sociological Abstracts ProQuest Central International Bibliography of the Social Sciences Asian & European Business Collection (Alumni) Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student ProQuest Research Library Sociology Collection International Bibliography of the Social Sciences ProQuest Business Collection (Alumni Edition) ProQuest Business Collection ProQuest Criminal Justice (Alumni) ProQuest Politics Collection ABI/INFORM Professional Advanced ABI/INFORM Global Criminal Justice Database European Business Database Political Science Database Research Library Social Science Database Sociology Database Research Library (Corporate) Proquest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest Sociology & Social Sciences Collection ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China ProQuest One Social Sciences ProQuest Central Basic Sociological Abstracts (Ovid) |
| DatabaseTitle | CrossRef ProQuest Business Collection (Alumni Edition) ProQuest European Business Research Library Prep ProQuest Central Student ProQuest Central Essentials Asian & European Business Collection Sociology & Social Sciences Collection ProQuest Central China ABI/INFORM Complete ProQuest Central (New) ProQuest Sociology Business Premium Collection Social Science Premium Collection ABI/INFORM Global ProQuest Political Science ProQuest One Academic Eastern Edition Sociology Collection ProQuest Business Collection Criminology Collection ProQuest Social Science Journals Criminal Justice Periodicals (Alumni Edition) ProQuest Social Sciences Premium Collection ProQuest One Academic UKI Edition PAIS International ProQuest Politics Collection ProQuest One Academic ProQuest One Academic (New) ABI/INFORM Global (Corporate) ProQuest One Business ProQuest Sociology & Social Sciences Collection ProQuest One Academic Middle East (New) ProQuest Social Science Journals (Alumni Edition) ProQuest Central (Alumni Edition) ProQuest One Community College Research Library (Alumni Edition) Politics Collection Asian & European Business Collection (Alumni) ProQuest Central ABI/INFORM Professional Advanced ProQuest Criminal Justice International Bibliography of the Social Sciences (IBSS) ProQuest European Business (Alumni Edition) ProQuest Central Korea ProQuest Research Library ProQuest Sociology Collection ABI/INFORM Complete (Alumni Edition) ProQuest One Social Sciences ABI/INFORM Global (Alumni Edition) ProQuest Central Basic Sociological Abstracts (pre-2017) ProQuest Criminal Justice (Alumni) Sociological Abstracts ProQuest One Business (Alumni) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
| DatabaseTitleList | International Bibliography of the Social Sciences (IBSS) ProQuest Business Collection (Alumni Edition) |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Social Welfare & Social Work Political Science |
| EISSN | 1572-9869 |
| EndPage | 151 |
| ExternalDocumentID | 3995229741 10_1007_s10610_015_9277_7 |
| GeographicLocations | Macedonia (Greece) |
| GeographicLocations_xml | – name: Macedonia (Greece) |
| GroupedDBID | -51 -5C -5G -BR -EM -Y2 -~C ..I .86 .VR 0-V 06D 0R~ 0VY 199 1N0 1SB 2.D 203 28- 29G 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 3V. 4.4 406 408 409 40D 40E 5GY 5QI 5VS 67Z 6NX 7WY 8FL 8G5 8UJ 95- 95. 95~ 96X AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANTL AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHQT ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACYUM ACZOJ ADAJC ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADUOI ADURQ ADYFF ADZJE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALSLI ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARALO ARMRJ ASOEW ASPBG AVWKF AXJJW AXYYD AYQZM AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGNMA BGRYB BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPSOV DPUIP DWQXO EBLON EBS EIOEI EJD ESBYG ESI EV9 FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GDP GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GUQSH GXS H13 HEHIP HF~ HG5 HG6 HISYW HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6~ KC- KDC KOV KOW LAK LLZTM M0C M0O M2L M2O M2R M2S M4Y MA- N2Q NDZJH NPVJJ NQJWS NU0 O-J O9- O93 O9G O9I OAM OVD P19 P9Q PF- PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QOK QOS R-Y R4E R89 R9I RHO RHV RNI ROL RPX RSV RZC RZD RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SDA SDH SDM SHS SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC U2A UG4 ULE UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK6 WK8 YLTOR Z45 Z81 ZMTXR ZWUKE ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT POGQB PRQQA 7TQ 7U4 7XB 8BF 8BJ 8FK BHHNA DHY DON DWI FQK JBE K7. L.- M0Q MBDVC PKEHL PQEST PQUKI PRINS Q9U WZK PUEGO |
| ID | FETCH-LOGICAL-c349t-bfc32ab2917171c9f78625cd87728fd4ef1f262724ec6a97fd2a16b46e4ad9683 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 6 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000376686300007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0928-1371 |
| IngestDate | Fri Sep 05 09:06:24 EDT 2025 Tue Dec 02 16:25:48 EST 2025 Sat Nov 29 07:54:59 EST 2025 Tue Nov 18 22:02:20 EST 2025 Fri Feb 21 02:37:08 EST 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 1 |
| Keywords | Criminal law Cybercrime Macedonian legislature |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c349t-bfc32ab2917171c9f78625cd87728fd4ef1f262724ec6a97fd2a16b46e4ad9683 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| PQID | 1775307816 |
| PQPubID | 25811 |
| PageCount | 25 |
| ParticipantIDs | proquest_miscellaneous_1878794752 proquest_journals_1775307816 crossref_citationtrail_10_1007_s10610_015_9277_7 crossref_primary_10_1007_s10610_015_9277_7 springer_journals_10_1007_s10610_015_9277_7 |
| PublicationCentury | 2000 |
| PublicationDate | 2016-03-01 |
| PublicationDateYYYYMMDD | 2016-03-01 |
| PublicationDate_xml | – month: 03 year: 2016 text: 2016-03-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Dordrecht |
| PublicationPlace_xml | – name: Dordrecht – name: Amsterdam |
| PublicationTitle | European journal on criminal policy and research |
| PublicationTitleAbbrev | Eur J Crim Policy Res |
| PublicationYear | 2016 |
| Publisher | Springer Netherlands Springer Nature B.V |
| Publisher_xml | – name: Springer Netherlands – name: Springer Nature B.V |
| References | Naumovski, G., Gruevska, A., Stefanoski, Lj., (2007). Kazneno-pravnite aspekti na intelektualnata sopstvenost vo Republika Makedonija, Zbornik vo cest na Panta Marina, Faculty of Law “Iustinianus primus” Skopje. Synovate. (2003). FTC Identity Theft Survey Report, Washington D.C. TaylorPAHackers: Crime in the digital sublime1999LondonRutledge10.4324/9780203201503 Chen, T., & Robert, J. (2004). Statistical methods in computer security. Letter of the Dutch Parliament to EU Commissioner Frattni, concerning the IPERD2 Directive, July 2006, available at europapoort.nl (10.01.2009). United Nations Office on Drugs and Crime (2012). The use of the Internet for terrorist purposes. Јaishankar K. (2007). Cyber Criminology: Evolving a novel discipline with a new journal. International Journal of Cyber Criminology, Vol. 1 Issue 1 January 2007. Retrieved on March 15, 2007, from http://www40.brinkster.com/ccjournal/editorial.htm. Wienbar, S. (2009). Perspective: The Spyware Inferno (http://news.cnet.com/2010-1032-5307831.html; 01.03.2009). United Nations Office on Drugs and Crime (2013). Comprehensive study on cybercrime, Draft, 02. Smith, R., Grabosky, P., Urbas, G. (2004). Cyber Criminals on Trial, Cambridge. HarmsLThe enforcement of intellectual property rights by means of criminal sanctions, an assessment2007GenevaWIPO Advisory Committee on EnforcementNovember 2007 Combating Counterfeiting and Piracy in the Single Market COM (98) 569, Final act. Colin, B. (1997). The Future of Cyberterrorism, Crime and Justice International, 13(2). Bainbride, D.I. (2004). Introduction to Computer Law, Pearson. BurdenКPalmerCInternet crime: cyber crime-A new breed of criminal?Computer Law and Security Report200319322222710.1016/S0267-3649(03)00306-6 Аdamski A. (1998). Crimes Related to the Computer Network. Threats and Opportunities: A Criminological Perspective. Helsinki, Finland: European Institute for Crime Prevention and Control, affiliated with the United Nations (HEUNI). Retrieved on December 15, 2006, from http://www.ulapland.fi/home/oiffi/enlist/resources/HeuniWeb.htm. Kambovski, V. (1997). Kazneno pravo, poseben del, Prosvetno delo, Skopje, Macedonia. OgilvieEThe internet and cyberstalking, paper presented at the Stalking Criminal Justice Response Conference2000SydneyAustralian Institute of Technology McQuade, S.C III. (2006). Understanding and Managing Cybercrime, Pearson. ShellyLThe Nexus of International Criminals and TerrorismInternational Annals of Criminology2002201/28592 Graborsky, P.N., Smith, R.G., (1998). Crime in the digital age: Controlling telecommunications and cyberspace illegalities. New Brunswick: Transaction. PWG. (2000). The President’s Working Group on Unlawful Conduct on the Internet, Appendix to the Electronic Frontier: The Challenge of Unlawful Conduct Involving the Use of the Internet, 03/2000. Cyberterror: Prospects and Implications (1999). Centre for the Study of Terrorism and Irregular Warfare, Naval Postgraduate School in Monterey. Denning, D. E. (2000). Cyberterrorism, Testimony Before the Special Oversight Panel on Terrorism Committee on Armed Services, U.S. House of Representatives, Georgetown University. Filol, E. (2005). Computer Viruses: From Theory to Application, Birkhauser. Fen Lim, Y. (2007). Cyberspace Law: Commentaries and Materials, 2nd edn, OUP Sydney. L Harms (9277_CR10) 2007 9277_CR5 9277_CR6 9277_CR7 9277_CR8 9277_CR9 9277_CR20 E Ogilvie (9277_CR16) 2000 9277_CR24 9277_CR23 9277_CR22 9277_CR26 9277_CR25 PA Taylor (9277_CR21) 1999 К Burden (9277_CR2) 2003; 19 L Shelly (9277_CR18) 2002; 20 9277_CR1 9277_CR13 9277_CR12 9277_CR3 9277_CR11 9277_CR4 9277_CR17 9277_CR15 9277_CR14 9277_CR19 |
| References_xml | – reference: United Nations Office on Drugs and Crime (2013). Comprehensive study on cybercrime, Draft, 02. – reference: HarmsLThe enforcement of intellectual property rights by means of criminal sanctions, an assessment2007GenevaWIPO Advisory Committee on EnforcementNovember 2007 – reference: Denning, D. E. (2000). Cyberterrorism, Testimony Before the Special Oversight Panel on Terrorism Committee on Armed Services, U.S. House of Representatives, Georgetown University. – reference: Smith, R., Grabosky, P., Urbas, G. (2004). Cyber Criminals on Trial, Cambridge. – reference: Аdamski A. (1998). Crimes Related to the Computer Network. Threats and Opportunities: A Criminological Perspective. Helsinki, Finland: European Institute for Crime Prevention and Control, affiliated with the United Nations (HEUNI). Retrieved on December 15, 2006, from http://www.ulapland.fi/home/oiffi/enlist/resources/HeuniWeb.htm. – reference: Filol, E. (2005). Computer Viruses: From Theory to Application, Birkhauser. – reference: Combating Counterfeiting and Piracy in the Single Market COM (98) 569, Final act. – reference: McQuade, S.C III. (2006). Understanding and Managing Cybercrime, Pearson. – reference: Јaishankar K. (2007). Cyber Criminology: Evolving a novel discipline with a new journal. International Journal of Cyber Criminology, Vol. 1 Issue 1 January 2007. Retrieved on March 15, 2007, from http://www40.brinkster.com/ccjournal/editorial.htm. – reference: ShellyLThe Nexus of International Criminals and TerrorismInternational Annals of Criminology2002201/28592 – reference: Chen, T., & Robert, J. (2004). Statistical methods in computer security. – reference: Letter of the Dutch Parliament to EU Commissioner Frattni, concerning the IPERD2 Directive, July 2006, available at europapoort.nl (10.01.2009). – reference: TaylorPAHackers: Crime in the digital sublime1999LondonRutledge10.4324/9780203201503 – reference: OgilvieEThe internet and cyberstalking, paper presented at the Stalking Criminal Justice Response Conference2000SydneyAustralian Institute of Technology – reference: Cyberterror: Prospects and Implications (1999). Centre for the Study of Terrorism and Irregular Warfare, Naval Postgraduate School in Monterey. – reference: Bainbride, D.I. (2004). Introduction to Computer Law, Pearson. – reference: Kambovski, V. (1997). Kazneno pravo, poseben del, Prosvetno delo, Skopje, Macedonia. – reference: PWG. (2000). The President’s Working Group on Unlawful Conduct on the Internet, Appendix to the Electronic Frontier: The Challenge of Unlawful Conduct Involving the Use of the Internet, 03/2000. – reference: Graborsky, P.N., Smith, R.G., (1998). Crime in the digital age: Controlling telecommunications and cyberspace illegalities. New Brunswick: Transaction. – reference: BurdenКPalmerCInternet crime: cyber crime-A new breed of criminal?Computer Law and Security Report200319322222710.1016/S0267-3649(03)00306-6 – reference: Wienbar, S. (2009). Perspective: The Spyware Inferno (http://news.cnet.com/2010-1032-5307831.html; 01.03.2009). – reference: Naumovski, G., Gruevska, A., Stefanoski, Lj., (2007). Kazneno-pravnite aspekti na intelektualnata sopstvenost vo Republika Makedonija, Zbornik vo cest na Panta Marina, Faculty of Law “Iustinianus primus” Skopje. – reference: Fen Lim, Y. (2007). Cyberspace Law: Commentaries and Materials, 2nd edn, OUP Sydney. – reference: Synovate. (2003). FTC Identity Theft Survey Report, Washington D.C. – reference: Colin, B. (1997). The Future of Cyberterrorism, Crime and Justice International, 13(2). – reference: United Nations Office on Drugs and Crime (2012). The use of the Internet for terrorist purposes. – ident: 9277_CR11 – ident: 9277_CR19 doi: 10.1017/CBO9780511481604 – volume-title: The enforcement of intellectual property rights by means of criminal sanctions, an assessment year: 2007 ident: 9277_CR10 – volume-title: The internet and cyberstalking, paper presented at the Stalking Criminal Justice Response Conference year: 2000 ident: 9277_CR16 – ident: 9277_CR9 – ident: 9277_CR26 – ident: 9277_CR5 – ident: 9277_CR24 – ident: 9277_CR7 – ident: 9277_CR1 – volume: 19 start-page: 222 issue: 3 year: 2003 ident: 9277_CR2 publication-title: Computer Law and Security Report doi: 10.1016/S0267-3649(03)00306-6 – ident: 9277_CR3 doi: 10.1201/9781420030884 – ident: 9277_CR12 – ident: 9277_CR14 – volume-title: Hackers: Crime in the digital sublime year: 1999 ident: 9277_CR21 doi: 10.4324/9780203201503 – ident: 9277_CR6 – volume: 20 start-page: 85 issue: 1/2 year: 2002 ident: 9277_CR18 publication-title: International Annals of Criminology doi: 10.1017/S0003445202004488 – ident: 9277_CR20 – ident: 9277_CR4 – ident: 9277_CR25 – ident: 9277_CR8 – ident: 9277_CR22 – ident: 9277_CR23 – ident: 9277_CR17 – ident: 9277_CR15 – ident: 9277_CR13 |
| SSID | ssj0011562 |
| Score | 2.046217 |
| Snippet | The advancement of information and communication technologies opens new venues and ways for cybercriminals to commit crime. There are several different types... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 127 |
| SubjectTerms | Annual reports Child pornography Children Communication Communications technology Complaints Computer crime Computer viruses Computers Crime Criminal law Criminology Criminology and Criminal Justice Cybercrime Distribution Electronic mail systems Enforcement Forgery Fraud Information sources Information technology Internet Law and Criminology Legislation Legislatures Macedonia (Greece) Malware Perpetrators Piracy Political Science Pornography Prevention Prevention programs Production Ransomware Statistical analysis Victims |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8QwEB5014MX3-LqKhHEg1Lcpt2kOYmK4kEXEUVvJc1DFqXVdlfw3zvpY1cFvUhvbdqETjKZyTfzDcAed44saj3PssCl5IjES5gyHpe-DiJteyKRZbEJPhhEj4_ipj5wK-qwykYnlopaZ8qdkR_5HA1rx0zDjl_fPFc1yqGrdQmNWWg7prKwBe3T88HN7QRHQO-kxBEERV8p4H6Da1bJc6wMyup7wuGY_PvONDU3fyCk5cZzsfjfIS_BQm1ykpNqjizDjElXoFvl5ZIH82Jlbsg-aW5k-fMqnJ59JCZXjvuf3JVVclEHFESmmlyZp2FRRdCRYUrQgCS3pmLLJpkl11IZjYpCrsH9xfnd2aVXl1vwVBCKkZdYFVCZUHTg8FLCcvR2HHcAGuCR1aGxvqWMchoaxaTgVlPpsyRkJpRasChYh1aapWYDSEQ1E4ZxFblEXxaiDdSXqqeDUJpe4rMO9JpfHauai9yVxHiJpyzKTjoxSid20ol5Bw4mr7xWRBx_Ne42EonrNVnEU3F0YHfyGFeTg0hkarIxtsGJixqK92kHDhu5f_nEbx1u_t3hFsyjocWq2LUutEb52GzDnHofDYt8p560n2T48A8 priority: 102 providerName: ProQuest |
| Title | Cybercrime Tendencies and Legislation in the Republic of Macedonia |
| URI | https://link.springer.com/article/10.1007/s10610-015-9277-7 https://www.proquest.com/docview/1775307816 https://www.proquest.com/docview/1878794752 |
| Volume | 22 |
| WOSCitedRecordID | wos000376686300007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: ABI/INFORM Collection customDbUrl: eissn: 1572-9869 dateEnd: 20171231 omitProxy: false ssIdentifier: ssj0011562 issn: 0928-1371 databaseCode: 7WY dateStart: 19970101 isFulltext: true titleUrlDefault: https://www.proquest.com/abicomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ABI/INFORM Global customDbUrl: eissn: 1572-9869 dateEnd: 20171231 omitProxy: false ssIdentifier: ssj0011562 issn: 0928-1371 databaseCode: M0C dateStart: 19970101 isFulltext: true titleUrlDefault: https://search.proquest.com/abiglobal providerName: ProQuest – providerCode: PRVPQU databaseName: Asian & European Business Collection customDbUrl: eissn: 1572-9869 dateEnd: 20171231 omitProxy: false ssIdentifier: ssj0011562 issn: 0928-1371 databaseCode: AXJJW dateStart: 19970101 isFulltext: true titleUrlDefault: https://search.proquest.com/asianeuropeanbusiness providerName: ProQuest – providerCode: PRVPQU databaseName: Criminal Justice Database customDbUrl: eissn: 1572-9869 dateEnd: 20171231 omitProxy: false ssIdentifier: ssj0011562 issn: 0928-1371 databaseCode: M0O dateStart: 19970101 isFulltext: true titleUrlDefault: https://search.proquest.com/criminaljusticeperiodicals providerName: ProQuest – providerCode: PRVPQU databaseName: Political Science Database customDbUrl: eissn: 1572-9869 dateEnd: 20171231 omitProxy: false ssIdentifier: ssj0011562 issn: 0928-1371 databaseCode: M2L dateStart: 19970101 isFulltext: true titleUrlDefault: https://www.proquest.com/politicalscience providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1572-9869 dateEnd: 20171231 omitProxy: false ssIdentifier: ssj0011562 issn: 0928-1371 databaseCode: BENPR dateStart: 19970101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Research Library customDbUrl: eissn: 1572-9869 dateEnd: 20171231 omitProxy: false ssIdentifier: ssj0011562 issn: 0928-1371 databaseCode: M2O dateStart: 19970101 isFulltext: true titleUrlDefault: https://search.proquest.com/pqrl providerName: ProQuest – providerCode: PRVPQU databaseName: Social Science Database customDbUrl: eissn: 1572-9869 dateEnd: 20171231 omitProxy: false ssIdentifier: ssj0011562 issn: 0928-1371 databaseCode: M2R dateStart: 19970101 isFulltext: true titleUrlDefault: https://search.proquest.com/socscijournals providerName: ProQuest – providerCode: PRVPQU databaseName: Sociology Database customDbUrl: eissn: 1572-9869 dateEnd: 20171231 omitProxy: false ssIdentifier: ssj0011562 issn: 0928-1371 databaseCode: M2S dateStart: 19970101 isFulltext: true titleUrlDefault: https://search.proquest.com/sociology providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLink Journals customDbUrl: eissn: 1572-9869 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0011562 issn: 0928-1371 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1da9sw8FjbPexl67qOpsuCCmMPLQZbdiTrMQkto7RpSbsmfTKyPkpYcIqdDvbvd5LttBvdYMMgG32ak-50x30BfOJOkEWqF1gWO5cckQc5UybgMtJxqm0ocumTTfDxOJ3NxGXjx1211u6tStJT6ifObswbUfUD4fSOfAO28LZLHTZOrm7WqgMUSLzqQFAUj2IetarM56b49TJ65DB_U4r6u-bkzX_95Ta8blhLMqjPwlt4YYod2G4M3LChQeMd6NY-uWRqFlaWhnwmbcWy_PYOhqMfuSmVi_tPrn2GXBxYEVlocmbu5lVtPUfmBUHmkUxMHSmbLC05l8poJBJyF76eHF-PvgRNqoVAxYlYBblVMZU5ReENHyUsR0nHxQ1A5ju1OjE2spRRThOjmBTcaiojlifMJFILlsbvYbNYFmYPSEo1E4ZxlTonX5Yg_9OXKtRxIk2YR6wDYQvzTDVxyF06jEX2GEHZwTBDGGYOhhnvwOF6yH0dhONvnbvtRmYNPlZZxFEsc3GNcPmDdTNiklOPyMIsH7APHlqkTrxPO3DUbu6TKf604P4_9f4Ar5DnYrUZWxc2V-WD-Qgv1ffVvCp7sMGntz3YGsxOT6f4Hh6PLydYex6OfHnhSnrmy_rbt9KrnkeCnzRC9Js |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VggQX3oiFBYwEHEARieO14wNCsFC16naF0CJ6Sx17XK1aJSXZgvqn-I2Mk80uINFbDyi3xHGUeObzN5kXwDMVDFlCvcjLNKTk6CIqpMVImcSlmfOxLkzbbEJNp9n-vv60AT_7XJgQVtljYgvUrrLhH_nrRBGxDpVp5NuTb1HoGhW8q30LjU4sdvHsB5lszZudD7S-zznf-jgbb0fLrgKRTYVeRIW3KTcFJzuFDqu9IlIfUuSJZ2beCfSJ55IrLtBKo5V33CSyEBKFcVpmKc17CS4LQeoQQgXj8cprQbZQ67XQnCyzVCW9F7VL1ZNtCNgo0sFrqv7cB9fk9i9_bLvNbd343z7QTbi-JNTsXacBt2ADy9sw7LKO2Vc89qZG9oL1J6r66A68H58VWNvQ2YDN2h7AhHANM6VjEzycN118IJuXjOgx-4xdLXBWebZnLDqCQXMXvlzIW92DzbIq8T6wjDupUSqbhTRmKYjhjYyNXSoMxkUiBxD3S5vbZaX10PDjOF_XiA7SkJM05EEacjWAl6tbTroyI-cNHvYSkC8Rp8nXyz-Ap6vLhBXBAWRKrE5pDKkl4a8a8QG86uXstyn-9cAH5z_wCVzdnu1N8snOdPchXCNKKbsovSFsLupTfARX7PfFvKkft-rC4OCixe8X1qdLmg |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3LbtQwFL0qBSE2vBEDAxgJWICiJk7GjhcIQcuIqu1QoSK6C459jUZUSUmmoP4aX8d1nMwAEt11gbLLw1GS4-Nzc18AT6Q3ZIn1IidSn5KjyqgUBiOpE5vm1sWq1F2zCTmb5YeHan8Nfg65MD6scuDEjqhtbfw_8o1EkrD2lWnEhuvDIva3pq-Ov0W-g5T3tA7tNAJEdvD0B5lv7cvtLfrWTzmfvj3YfBf1HQYik2ZqEZXOpFyXnGwW2oxykgS-T5cnzZk7m6FLHBdc8gyN0Eo6y3Uiykxgpq0SeUrjXoCLMgvm3F78funBILuo82AoTlZaKpPBoxrS9kQXDjaJlPegyj_XxJXQ_cs32y1502v_88u6Dld7oc1eh5lxA9awugnjkI3MPuGR0w2yZ2zYUTdfb8GbzdMSG-M7HrCDrjcwMV_LdGXZLn6ZtyFukM0rRrKZfcBQI5zVju1pg5boUd-Gj-fyVHdgvaorvAss51YoFNLkPr1ZZKT8JtrENs00xmUiRhAPn7kwfQV23wjkqFjVjvbIKAgZhUdGIUfwfHnJcSg_ctbJ4wENRc9EbbGCwggeLw8Th3jHkK6wPqFzaLoSL8sJH8GLAXO_DfGvG947-4aP4DKhrtjdnu3chyukNEUI3hvD-qI5wQdwyXxfzNvmYTdzGHw-b_T9Av7QVHk |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cybercrime+Tendencies+and+Legislation+in+the+Republic+of+Macedonia&rft.jtitle=European+journal+on+criminal+policy+and+research&rft.au=Rashkovski%2C+Dragi&rft.au=Naumovski%2C+Vasko&rft.au=Naumovski%2C+Goce&rft.date=2016-03-01&rft.pub=Springer+Netherlands&rft.issn=0928-1371&rft.eissn=1572-9869&rft.volume=22&rft.issue=1&rft.spage=127&rft.epage=151&rft_id=info:doi/10.1007%2Fs10610-015-9277-7&rft.externalDocID=10_1007_s10610_015_9277_7 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0928-1371&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0928-1371&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0928-1371&client=summon |