Cybercrime Tendencies and Legislation in the Republic of Macedonia

The advancement of information and communication technologies opens new venues and ways for cybercriminals to commit crime. There are several different types of cybercrime offences that need to be treated in a separate and different manner. The major international source that provides guidelines for...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:European journal on criminal policy and research Jg. 22; H. 1; S. 127 - 151
Hauptverfasser: Rashkovski, Dragi, Naumovski, Vasko, Naumovski, Goce
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Dordrecht Springer Netherlands 01.03.2016
Springer Nature B.V
Schlagworte:
ISSN:0928-1371, 1572-9869
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract The advancement of information and communication technologies opens new venues and ways for cybercriminals to commit crime. There are several different types of cybercrime offences that need to be treated in a separate and different manner. The major international source that provides guidelines for treatment of cybercrime is the Convention on Cybercrime adopted by the Council of Europe and the European Commission Action Plan. The purpose of the paper is to present, discuss and analyze the Macedonian legislation treating cybercrime, with respect to the specific cases typically encountered in practice and the international guidelines concerning cybercrime. The major source of cybercrime legislation in Macedonia is the Criminal Code with provisions thereof in ten of its articles; it addresses cybercrimes such as personal data abuse, copyright and piracy issues, production and distribution of child pornography, computer viruses, intrusions into computer systems, computer fraud and computer forgery. We also present and analyze reports on cybercrime complaints and victims from Macedonia, issued by the Internet Crime Complaint Center and the Macedonian Ministry of Internal Affairs. The reports reveal the unusually high number of complaints for perpetrators and victims originating from Macedonia. Furthermore, we highlight several recent cybercrime cases reported in Macedonia. All things considered, the Macedonian penal legislation is modern and it follows the current European and world standards. It provides guidelines for successful resolution of cybercrime committed in the Republic of Macedonia. However, it could be improved by a more active inclusion of Macedonian authorities in the global response to cybercrime and by stronger enforcement of cybercrime prevention measures and strategies.
AbstractList The advancement of information and communication technologies opens new venues and ways for cybercriminals to commit crime. There are several different types of cybercrime offences that need to be treated in a separate and different manner. The major international source that provides guidelines for treatment of cybercrime is the Convention on Cybercrime adopted by the Council of Europe and the European Commission Action Plan. The purpose of the paper is to present, discuss and analyze the Macedonian legislation treating cybercrime, with respect to the specific cases typically encountered in practice and the international guidelines concerning cybercrime. The major source of cybercrime legislation in Macedonia is the Criminal Code with provisions thereof in ten of its articles; it addresses cybercrimes such as personal data abuse, copyright and piracy issues, production and distribution of child pornography, computer viruses, intrusions into computer systems, computer fraud and computer forgery. We also present and analyze reports on cybercrime complaints and victims from Macedonia, issued by the Internet Crime Complaint Center and the Macedonian Ministry of Internal Affairs. The reports reveal the unusually high number of complaints for perpetrators and victims originating from Macedonia. Furthermore, we highlight several recent cybercrime cases reported in Macedonia. All things considered, the Macedonian penal legislation is modern and it follows the current European and world standards. It provides guidelines for successful resolution of cybercrime committed in the Republic of Macedonia. However, it could be improved by a more active inclusion of Macedonian authorities in the global response to cybercrime and by stronger enforcement of cybercrime prevention measures and strategies. Reprinted by permission of Springer
The advancement of information and communication technologies opens new venues and ways for cybercriminals to commit crime. There are several different types of cybercrime offences that need to be treated in a separate and different manner. The major international source that provides guidelines for treatment of cybercrime is the Convention on Cybercrime adopted by the Council of Europe and the European Commission Action Plan. The purpose of the paper is to present, discuss and analyze the Macedonian legislation treating cybercrime, with respect to the specific cases typically encountered in practice and the international guidelines concerning cybercrime. The major source of cybercrime legislation in Macedonia is the Criminal Code with provisions thereof in ten of its articles; it addresses cybercrimes such as personal data abuse, copyright and piracy issues, production and distribution of child pornography, computer viruses, intrusions into computer systems, computer fraud and computer forgery. We also present and analyze reports on cybercrime complaints and victims from Macedonia, issued by the Internet Crime Complaint Center and the Macedonian Ministry of Internal Affairs. The reports reveal the unusually high number of complaints for perpetrators and victims originating from Macedonia. Furthermore, we highlight several recent cybercrime cases reported in Macedonia. All things considered, the Macedonian penal legislation is modern and it follows the current European and world standards. It provides guidelines for successful resolution of cybercrime committed in the Republic of Macedonia. However, it could be improved by a more active inclusion of Macedonian authorities in the global response to cybercrime and by stronger enforcement of cybercrime prevention measures and strategies.
Author Rashkovski, Dragi
Naumovski, Goce
Naumovski, Vasko
Author_xml – sequence: 1
  givenname: Dragi
  surname: Rashkovski
  fullname: Rashkovski, Dragi
  email: Dragi.Rashkovski@gmail.com
  organization: Iustinianus Primus Law Faculty, Ss. Cyril and Methodius University
– sequence: 2
  givenname: Vasko
  surname: Naumovski
  fullname: Naumovski, Vasko
  organization: Iustinianus Primus Law Faculty, Ss. Cyril and Methodius University
– sequence: 3
  givenname: Goce
  surname: Naumovski
  fullname: Naumovski, Goce
  organization: Iustinianus Primus Law Faculty, Ss. Cyril and Methodius University
BookMark eNp9kE1LxDAQQIMouH78AG8FL16qmbTNJEdd_IIVQfQc0nSikZquSffgv7frehBBmUMu74WZt8e24xCJsSPgp8A5nmXgEnjJoSm1QCxxi82gQVFqJfU2m3EtVAkVwi7by_mVc4BGihm7mH-0lFwKb1Q8UuwoukC5sLErFvQccm_HMMQixGJ8oeKBlqu2D64YfHFnHXVDDPaA7XjbZzr8fvfZ09Xl4_ymXNxf387PF6Wraj2WrXeVsK3QgNM47VFJ0bhOIQrlu5o8eCEFipqctBp9JyzItpZU205LVe2zk82_yzS8ryiP5i1kR31vIw2rbEChQl1jIyb0-Bf6OqxSnLYzgNhUHBXIicIN5dKQcyJvXBi_7h2TDb0BbtZtzaatmdqadVuDkwm_zOVU0KaPfx2xcfLExmdKP3b6U_oEFVSMHA
CitedBy_id crossref_primary_10_1007_s12117_020_09392_w
crossref_primary_10_1016_j_ijlcj_2023_100577
crossref_primary_10_1007_s10611_025_10202_z
crossref_primary_10_4018_JGIM_295450
Cites_doi 10.1017/CBO9780511481604
10.1016/S0267-3649(03)00306-6
10.1201/9781420030884
10.4324/9780203201503
10.1017/S0003445202004488
ContentType Journal Article
Copyright Springer Science+Business Media Dordrecht 2015
Springer Science+Business Media Dordrecht 2016
Copyright_xml – notice: Springer Science+Business Media Dordrecht 2015
– notice: Springer Science+Business Media Dordrecht 2016
DBID AAYXX
CITATION
0-V
3V.
7TQ
7U4
7WY
7WZ
7XB
87Z
88J
8AM
8BF
8BJ
8FK
8FL
8G5
ABUWG
AFKRA
ALSLI
AXJJW
AZQEC
BENPR
BEZIV
BGRYB
BHHNA
CCPQU
DHY
DON
DPSOV
DWI
DWQXO
FQK
FREBS
FRNLG
F~G
GNUQQ
GUQSH
HEHIP
JBE
K60
K6~
K7.
KC-
L.-
M0C
M0O
M0Q
M2L
M2O
M2R
M2S
MBDVC
PHGZM
PHGZT
PKEHL
POGQB
PQBIZ
PQBZA
PQEST
PQQKQ
PQUKI
PRINS
PRQQA
Q9U
WZK
DOI 10.1007/s10610-015-9277-7
DatabaseName CrossRef
ProQuest Social Sciences Premium Collection【Remote access available】
ProQuest Central (Corporate)
PAIS Index
Sociological Abstracts (pre-2017)
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Social Science Database (Alumni Edition)
Criminal Justice Database (Alumni Edition)
European Business Database (Alumni Edition)
International Bibliography of the Social Sciences (IBSS)
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni)
ProQuest Research Library
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Social Science Premium Collection
Asian & European Business Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Criminology Collection
Sociological Abstracts
ProQuest One Community College
PAIS International
PAIS International (Ovid)
Politics Collection
Sociological Abstracts
ProQuest Central
International Bibliography of the Social Sciences
Asian & European Business Collection (Alumni)
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
ProQuest Research Library
Sociology Collection
International Bibliography of the Social Sciences
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
ProQuest Criminal Justice (Alumni)
ProQuest Politics Collection
ABI/INFORM Professional Advanced
ABI/INFORM Global
Criminal Justice Database
European Business Database
Political Science Database
Research Library
Social Science Database
Sociology Database
Research Library (Corporate)
Proquest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest Sociology & Social Sciences Collection
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest One Social Sciences
ProQuest Central Basic
Sociological Abstracts (Ovid)
DatabaseTitle CrossRef
ProQuest Business Collection (Alumni Edition)
ProQuest European Business
Research Library Prep
ProQuest Central Student
ProQuest Central Essentials
Asian & European Business Collection
Sociology & Social Sciences Collection
ProQuest Central China
ABI/INFORM Complete
ProQuest Central (New)
ProQuest Sociology
Business Premium Collection
Social Science Premium Collection
ABI/INFORM Global
ProQuest Political Science
ProQuest One Academic Eastern Edition
Sociology Collection
ProQuest Business Collection
Criminology Collection
ProQuest Social Science Journals
Criminal Justice Periodicals (Alumni Edition)
ProQuest Social Sciences Premium Collection
ProQuest One Academic UKI Edition
PAIS International
ProQuest Politics Collection
ProQuest One Academic
ProQuest One Academic (New)
ABI/INFORM Global (Corporate)
ProQuest One Business
ProQuest Sociology & Social Sciences Collection
ProQuest One Academic Middle East (New)
ProQuest Social Science Journals (Alumni Edition)
ProQuest Central (Alumni Edition)
ProQuest One Community College
Research Library (Alumni Edition)
Politics Collection
Asian & European Business Collection (Alumni)
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Criminal Justice
International Bibliography of the Social Sciences (IBSS)
ProQuest European Business (Alumni Edition)
ProQuest Central Korea
ProQuest Research Library
ProQuest Sociology Collection
ABI/INFORM Complete (Alumni Edition)
ProQuest One Social Sciences
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
Sociological Abstracts (pre-2017)
ProQuest Criminal Justice (Alumni)
Sociological Abstracts
ProQuest One Business (Alumni)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList International Bibliography of the Social Sciences (IBSS)
ProQuest Business Collection (Alumni Edition)

Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Social Welfare & Social Work
Political Science
EISSN 1572-9869
EndPage 151
ExternalDocumentID 3995229741
10_1007_s10610_015_9277_7
GeographicLocations Macedonia (Greece)
GeographicLocations_xml – name: Macedonia (Greece)
GroupedDBID -51
-5C
-5G
-BR
-EM
-Y2
-~C
..I
.86
.VR
0-V
06D
0R~
0VY
199
1N0
1SB
2.D
203
28-
29G
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
3V.
4.4
406
408
409
40D
40E
5GY
5QI
5VS
67Z
6NX
7WY
8FL
8G5
8UJ
95-
95.
95~
96X
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANTL
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHQT
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACYUM
ACZOJ
ADAJC
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADUOI
ADURQ
ADYFF
ADZJE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALSLI
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARALO
ARMRJ
ASOEW
ASPBG
AVWKF
AXJJW
AXYYD
AYQZM
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGNMA
BGRYB
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPSOV
DPUIP
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
ESI
EV9
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GDP
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GUQSH
GXS
H13
HEHIP
HF~
HG5
HG6
HISYW
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6~
KC-
KDC
KOV
KOW
LAK
LLZTM
M0C
M0O
M2L
M2O
M2R
M2S
M4Y
MA-
N2Q
NDZJH
NPVJJ
NQJWS
NU0
O-J
O9-
O93
O9G
O9I
OAM
OVD
P19
P9Q
PF-
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R-Y
R4E
R89
R9I
RHO
RHV
RNI
ROL
RPX
RSV
RZC
RZD
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SDA
SDH
SDM
SHS
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
U2A
UG4
ULE
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK6
WK8
YLTOR
Z45
Z81
ZMTXR
ZWUKE
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
POGQB
PRQQA
7TQ
7U4
7XB
8BF
8BJ
8FK
BHHNA
DHY
DON
DWI
FQK
JBE
K7.
L.-
M0Q
MBDVC
PKEHL
PQEST
PQUKI
PRINS
Q9U
WZK
PUEGO
ID FETCH-LOGICAL-c349t-bfc32ab2917171c9f78625cd87728fd4ef1f262724ec6a97fd2a16b46e4ad9683
IEDL.DBID RSV
ISICitedReferencesCount 6
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000376686300007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0928-1371
IngestDate Fri Sep 05 09:06:24 EDT 2025
Tue Dec 02 16:25:48 EST 2025
Sat Nov 29 07:54:59 EST 2025
Tue Nov 18 22:02:20 EST 2025
Fri Feb 21 02:37:08 EST 2025
IsPeerReviewed false
IsScholarly true
Issue 1
Keywords Criminal law
Cybercrime
Macedonian legislature
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c349t-bfc32ab2917171c9f78625cd87728fd4ef1f262724ec6a97fd2a16b46e4ad9683
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
PQID 1775307816
PQPubID 25811
PageCount 25
ParticipantIDs proquest_miscellaneous_1878794752
proquest_journals_1775307816
crossref_citationtrail_10_1007_s10610_015_9277_7
crossref_primary_10_1007_s10610_015_9277_7
springer_journals_10_1007_s10610_015_9277_7
PublicationCentury 2000
PublicationDate 2016-03-01
PublicationDateYYYYMMDD 2016-03-01
PublicationDate_xml – month: 03
  year: 2016
  text: 2016-03-01
  day: 01
PublicationDecade 2010
PublicationPlace Dordrecht
PublicationPlace_xml – name: Dordrecht
– name: Amsterdam
PublicationTitle European journal on criminal policy and research
PublicationTitleAbbrev Eur J Crim Policy Res
PublicationYear 2016
Publisher Springer Netherlands
Springer Nature B.V
Publisher_xml – name: Springer Netherlands
– name: Springer Nature B.V
References Naumovski, G., Gruevska, A., Stefanoski, Lj., (2007). Kazneno-pravnite aspekti na intelektualnata sopstvenost vo Republika Makedonija, Zbornik vo cest na Panta Marina, Faculty of Law “Iustinianus primus” Skopje.
Synovate. (2003). FTC Identity Theft Survey Report, Washington D.C.
TaylorPAHackers: Crime in the digital sublime1999LondonRutledge10.4324/9780203201503
Chen, T., & Robert, J. (2004). Statistical methods in computer security.
Letter of the Dutch Parliament to EU Commissioner Frattni, concerning the IPERD2 Directive, July 2006, available at europapoort.nl (10.01.2009).
United Nations Office on Drugs and Crime (2012). The use of the Internet for terrorist purposes.
Јaishankar K. (2007). Cyber Criminology: Evolving a novel discipline with a new journal. International Journal of Cyber Criminology, Vol. 1 Issue 1 January 2007. Retrieved on March 15, 2007, from http://www40.brinkster.com/ccjournal/editorial.htm.
Wienbar, S. (2009). Perspective: The Spyware Inferno (http://news.cnet.com/2010-1032-5307831.html; 01.03.2009).
United Nations Office on Drugs and Crime (2013). Comprehensive study on cybercrime, Draft, 02.
Smith, R., Grabosky, P., Urbas, G. (2004). Cyber Criminals on Trial, Cambridge.
HarmsLThe enforcement of intellectual property rights by means of criminal sanctions, an assessment2007GenevaWIPO Advisory Committee on EnforcementNovember 2007
Combating Counterfeiting and Piracy in the Single Market COM (98) 569, Final act.
Colin, B. (1997). The Future of Cyberterrorism, Crime and Justice International, 13(2).
Bainbride, D.I. (2004). Introduction to Computer Law, Pearson.
BurdenКPalmerCInternet crime: cyber crime-A new breed of criminal?Computer Law and Security Report200319322222710.1016/S0267-3649(03)00306-6
Аdamski A. (1998). Crimes Related to the Computer Network. Threats and Opportunities: A Criminological Perspective. Helsinki, Finland: European Institute for Crime Prevention and Control, affiliated with the United Nations (HEUNI). Retrieved on December 15, 2006, from http://www.ulapland.fi/home/oiffi/enlist/resources/HeuniWeb.htm.
Kambovski, V. (1997). Kazneno pravo, poseben del, Prosvetno delo, Skopje, Macedonia.
OgilvieEThe internet and cyberstalking, paper presented at the Stalking Criminal Justice Response Conference2000SydneyAustralian Institute of Technology
McQuade, S.C III. (2006). Understanding and Managing Cybercrime, Pearson.
ShellyLThe Nexus of International Criminals and TerrorismInternational Annals of Criminology2002201/28592
Graborsky, P.N., Smith, R.G., (1998). Crime in the digital age: Controlling telecommunications and cyberspace illegalities. New Brunswick: Transaction.
PWG. (2000). The President’s Working Group on Unlawful Conduct on the Internet, Appendix to the Electronic Frontier: The Challenge of Unlawful Conduct Involving the Use of the Internet, 03/2000.
Cyberterror: Prospects and Implications (1999). Centre for the Study of Terrorism and Irregular Warfare, Naval Postgraduate School in Monterey.
Denning, D. E. (2000). Cyberterrorism, Testimony Before the Special Oversight Panel on Terrorism Committee on Armed Services, U.S. House of Representatives, Georgetown University.
Filol, E. (2005). Computer Viruses: From Theory to Application, Birkhauser.
Fen Lim, Y. (2007). Cyberspace Law: Commentaries and Materials, 2nd edn, OUP Sydney.
L Harms (9277_CR10) 2007
9277_CR5
9277_CR6
9277_CR7
9277_CR8
9277_CR9
9277_CR20
E Ogilvie (9277_CR16) 2000
9277_CR24
9277_CR23
9277_CR22
9277_CR26
9277_CR25
PA Taylor (9277_CR21) 1999
К Burden (9277_CR2) 2003; 19
L Shelly (9277_CR18) 2002; 20
9277_CR1
9277_CR13
9277_CR12
9277_CR3
9277_CR11
9277_CR4
9277_CR17
9277_CR15
9277_CR14
9277_CR19
References_xml – reference: United Nations Office on Drugs and Crime (2013). Comprehensive study on cybercrime, Draft, 02.
– reference: HarmsLThe enforcement of intellectual property rights by means of criminal sanctions, an assessment2007GenevaWIPO Advisory Committee on EnforcementNovember 2007
– reference: Denning, D. E. (2000). Cyberterrorism, Testimony Before the Special Oversight Panel on Terrorism Committee on Armed Services, U.S. House of Representatives, Georgetown University.
– reference: Smith, R., Grabosky, P., Urbas, G. (2004). Cyber Criminals on Trial, Cambridge.
– reference: Аdamski A. (1998). Crimes Related to the Computer Network. Threats and Opportunities: A Criminological Perspective. Helsinki, Finland: European Institute for Crime Prevention and Control, affiliated with the United Nations (HEUNI). Retrieved on December 15, 2006, from http://www.ulapland.fi/home/oiffi/enlist/resources/HeuniWeb.htm.
– reference: Filol, E. (2005). Computer Viruses: From Theory to Application, Birkhauser.
– reference: Combating Counterfeiting and Piracy in the Single Market COM (98) 569, Final act.
– reference: McQuade, S.C III. (2006). Understanding and Managing Cybercrime, Pearson.
– reference: Јaishankar K. (2007). Cyber Criminology: Evolving a novel discipline with a new journal. International Journal of Cyber Criminology, Vol. 1 Issue 1 January 2007. Retrieved on March 15, 2007, from http://www40.brinkster.com/ccjournal/editorial.htm.
– reference: ShellyLThe Nexus of International Criminals and TerrorismInternational Annals of Criminology2002201/28592
– reference: Chen, T., & Robert, J. (2004). Statistical methods in computer security.
– reference: Letter of the Dutch Parliament to EU Commissioner Frattni, concerning the IPERD2 Directive, July 2006, available at europapoort.nl (10.01.2009).
– reference: TaylorPAHackers: Crime in the digital sublime1999LondonRutledge10.4324/9780203201503
– reference: OgilvieEThe internet and cyberstalking, paper presented at the Stalking Criminal Justice Response Conference2000SydneyAustralian Institute of Technology
– reference: Cyberterror: Prospects and Implications (1999). Centre for the Study of Terrorism and Irregular Warfare, Naval Postgraduate School in Monterey.
– reference: Bainbride, D.I. (2004). Introduction to Computer Law, Pearson.
– reference: Kambovski, V. (1997). Kazneno pravo, poseben del, Prosvetno delo, Skopje, Macedonia.
– reference: PWG. (2000). The President’s Working Group on Unlawful Conduct on the Internet, Appendix to the Electronic Frontier: The Challenge of Unlawful Conduct Involving the Use of the Internet, 03/2000.
– reference: Graborsky, P.N., Smith, R.G., (1998). Crime in the digital age: Controlling telecommunications and cyberspace illegalities. New Brunswick: Transaction.
– reference: BurdenКPalmerCInternet crime: cyber crime-A new breed of criminal?Computer Law and Security Report200319322222710.1016/S0267-3649(03)00306-6
– reference: Wienbar, S. (2009). Perspective: The Spyware Inferno (http://news.cnet.com/2010-1032-5307831.html; 01.03.2009).
– reference: Naumovski, G., Gruevska, A., Stefanoski, Lj., (2007). Kazneno-pravnite aspekti na intelektualnata sopstvenost vo Republika Makedonija, Zbornik vo cest na Panta Marina, Faculty of Law “Iustinianus primus” Skopje.
– reference: Fen Lim, Y. (2007). Cyberspace Law: Commentaries and Materials, 2nd edn, OUP Sydney.
– reference: Synovate. (2003). FTC Identity Theft Survey Report, Washington D.C.
– reference: Colin, B. (1997). The Future of Cyberterrorism, Crime and Justice International, 13(2).
– reference: United Nations Office on Drugs and Crime (2012). The use of the Internet for terrorist purposes.
– ident: 9277_CR11
– ident: 9277_CR19
  doi: 10.1017/CBO9780511481604
– volume-title: The enforcement of intellectual property rights by means of criminal sanctions, an assessment
  year: 2007
  ident: 9277_CR10
– volume-title: The internet and cyberstalking, paper presented at the Stalking Criminal Justice Response Conference
  year: 2000
  ident: 9277_CR16
– ident: 9277_CR9
– ident: 9277_CR26
– ident: 9277_CR5
– ident: 9277_CR24
– ident: 9277_CR7
– ident: 9277_CR1
– volume: 19
  start-page: 222
  issue: 3
  year: 2003
  ident: 9277_CR2
  publication-title: Computer Law and Security Report
  doi: 10.1016/S0267-3649(03)00306-6
– ident: 9277_CR3
  doi: 10.1201/9781420030884
– ident: 9277_CR12
– ident: 9277_CR14
– volume-title: Hackers: Crime in the digital sublime
  year: 1999
  ident: 9277_CR21
  doi: 10.4324/9780203201503
– ident: 9277_CR6
– volume: 20
  start-page: 85
  issue: 1/2
  year: 2002
  ident: 9277_CR18
  publication-title: International Annals of Criminology
  doi: 10.1017/S0003445202004488
– ident: 9277_CR20
– ident: 9277_CR4
– ident: 9277_CR25
– ident: 9277_CR8
– ident: 9277_CR22
– ident: 9277_CR23
– ident: 9277_CR17
– ident: 9277_CR15
– ident: 9277_CR13
SSID ssj0011562
Score 2.046217
Snippet The advancement of information and communication technologies opens new venues and ways for cybercriminals to commit crime. There are several different types...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 127
SubjectTerms Annual reports
Child pornography
Children
Communication
Communications technology
Complaints
Computer crime
Computer viruses
Computers
Crime
Criminal law
Criminology
Criminology and Criminal Justice
Cybercrime
Distribution
Electronic mail systems
Enforcement
Forgery
Fraud
Information sources
Information technology
Internet
Law and Criminology
Legislation
Legislatures
Macedonia (Greece)
Malware
Perpetrators
Piracy
Political Science
Pornography
Prevention
Prevention programs
Production
Ransomware
Statistical analysis
Victims
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8QwEB5014MX3-LqKhHEg1Lcpt2kOYmK4kEXEUVvJc1DFqXVdlfw3zvpY1cFvUhvbdqETjKZyTfzDcAed44saj3PssCl5IjES5gyHpe-DiJteyKRZbEJPhhEj4_ipj5wK-qwykYnlopaZ8qdkR_5HA1rx0zDjl_fPFc1yqGrdQmNWWg7prKwBe3T88HN7QRHQO-kxBEERV8p4H6Da1bJc6wMyup7wuGY_PvONDU3fyCk5cZzsfjfIS_BQm1ykpNqjizDjElXoFvl5ZIH82Jlbsg-aW5k-fMqnJ59JCZXjvuf3JVVclEHFESmmlyZp2FRRdCRYUrQgCS3pmLLJpkl11IZjYpCrsH9xfnd2aVXl1vwVBCKkZdYFVCZUHTg8FLCcvR2HHcAGuCR1aGxvqWMchoaxaTgVlPpsyRkJpRasChYh1aapWYDSEQ1E4ZxFblEXxaiDdSXqqeDUJpe4rMO9JpfHauai9yVxHiJpyzKTjoxSid20ol5Bw4mr7xWRBx_Ne42EonrNVnEU3F0YHfyGFeTg0hkarIxtsGJixqK92kHDhu5f_nEbx1u_t3hFsyjocWq2LUutEb52GzDnHofDYt8p560n2T48A8
  priority: 102
  providerName: ProQuest
Title Cybercrime Tendencies and Legislation in the Republic of Macedonia
URI https://link.springer.com/article/10.1007/s10610-015-9277-7
https://www.proquest.com/docview/1775307816
https://www.proquest.com/docview/1878794752
Volume 22
WOSCitedRecordID wos000376686300007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: ABI/INFORM Collection
  customDbUrl:
  eissn: 1572-9869
  dateEnd: 20171231
  omitProxy: false
  ssIdentifier: ssj0011562
  issn: 0928-1371
  databaseCode: 7WY
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/abicomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ABI/INFORM Global
  customDbUrl:
  eissn: 1572-9869
  dateEnd: 20171231
  omitProxy: false
  ssIdentifier: ssj0011562
  issn: 0928-1371
  databaseCode: M0C
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/abiglobal
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Asian & European Business Collection
  customDbUrl:
  eissn: 1572-9869
  dateEnd: 20171231
  omitProxy: false
  ssIdentifier: ssj0011562
  issn: 0928-1371
  databaseCode: AXJJW
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/asianeuropeanbusiness
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Criminal Justice Database
  customDbUrl:
  eissn: 1572-9869
  dateEnd: 20171231
  omitProxy: false
  ssIdentifier: ssj0011562
  issn: 0928-1371
  databaseCode: M0O
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/criminaljusticeperiodicals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Political Science Database
  customDbUrl:
  eissn: 1572-9869
  dateEnd: 20171231
  omitProxy: false
  ssIdentifier: ssj0011562
  issn: 0928-1371
  databaseCode: M2L
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/politicalscience
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1572-9869
  dateEnd: 20171231
  omitProxy: false
  ssIdentifier: ssj0011562
  issn: 0928-1371
  databaseCode: BENPR
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Research Library
  customDbUrl:
  eissn: 1572-9869
  dateEnd: 20171231
  omitProxy: false
  ssIdentifier: ssj0011562
  issn: 0928-1371
  databaseCode: M2O
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/pqrl
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Social Science Database
  customDbUrl:
  eissn: 1572-9869
  dateEnd: 20171231
  omitProxy: false
  ssIdentifier: ssj0011562
  issn: 0928-1371
  databaseCode: M2R
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/socscijournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Sociology Database
  customDbUrl:
  eissn: 1572-9869
  dateEnd: 20171231
  omitProxy: false
  ssIdentifier: ssj0011562
  issn: 0928-1371
  databaseCode: M2S
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/sociology
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLink Journals
  customDbUrl:
  eissn: 1572-9869
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0011562
  issn: 0928-1371
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1da9sw8FjbPexl67qOpsuCCmMPLQZbdiTrMQkto7RpSbsmfTKyPkpYcIqdDvbvd5LttBvdYMMgG32ak-50x30BfOJOkEWqF1gWO5cckQc5UybgMtJxqm0ocumTTfDxOJ3NxGXjx1211u6tStJT6ifObswbUfUD4fSOfAO28LZLHTZOrm7WqgMUSLzqQFAUj2IetarM56b49TJ65DB_U4r6u-bkzX_95Ta8blhLMqjPwlt4YYod2G4M3LChQeMd6NY-uWRqFlaWhnwmbcWy_PYOhqMfuSmVi_tPrn2GXBxYEVlocmbu5lVtPUfmBUHmkUxMHSmbLC05l8poJBJyF76eHF-PvgRNqoVAxYlYBblVMZU5ReENHyUsR0nHxQ1A5ju1OjE2spRRThOjmBTcaiojlifMJFILlsbvYbNYFmYPSEo1E4ZxlTonX5Yg_9OXKtRxIk2YR6wDYQvzTDVxyF06jEX2GEHZwTBDGGYOhhnvwOF6yH0dhONvnbvtRmYNPlZZxFEsc3GNcPmDdTNiklOPyMIsH7APHlqkTrxPO3DUbu6TKf604P4_9f4Ar5DnYrUZWxc2V-WD-Qgv1ffVvCp7sMGntz3YGsxOT6f4Hh6PLydYex6OfHnhSnrmy_rbt9KrnkeCnzRC9Js
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VggQX3oiFBYwEHEARieO14wNCsFC16naF0CJ6Sx17XK1aJSXZgvqn-I2Mk80uINFbDyi3xHGUeObzN5kXwDMVDFlCvcjLNKTk6CIqpMVImcSlmfOxLkzbbEJNp9n-vv60AT_7XJgQVtljYgvUrrLhH_nrRBGxDpVp5NuTb1HoGhW8q30LjU4sdvHsB5lszZudD7S-zznf-jgbb0fLrgKRTYVeRIW3KTcFJzuFDqu9IlIfUuSJZ2beCfSJ55IrLtBKo5V33CSyEBKFcVpmKc17CS4LQeoQQgXj8cprQbZQ67XQnCyzVCW9F7VL1ZNtCNgo0sFrqv7cB9fk9i9_bLvNbd343z7QTbi-JNTsXacBt2ADy9sw7LKO2Vc89qZG9oL1J6r66A68H58VWNvQ2YDN2h7AhHANM6VjEzycN118IJuXjOgx-4xdLXBWebZnLDqCQXMXvlzIW92DzbIq8T6wjDupUSqbhTRmKYjhjYyNXSoMxkUiBxD3S5vbZaX10PDjOF_XiA7SkJM05EEacjWAl6tbTroyI-cNHvYSkC8Rp8nXyz-Ap6vLhBXBAWRKrE5pDKkl4a8a8QG86uXstyn-9cAH5z_wCVzdnu1N8snOdPchXCNKKbsovSFsLupTfARX7PfFvKkft-rC4OCixe8X1qdLmg
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3LbtQwFL0qBSE2vBEDAxgJWICiJk7GjhcIQcuIqu1QoSK6C459jUZUSUmmoP4aX8d1nMwAEt11gbLLw1GS4-Nzc18AT6Q3ZIn1IidSn5KjyqgUBiOpE5vm1sWq1F2zCTmb5YeHan8Nfg65MD6scuDEjqhtbfw_8o1EkrD2lWnEhuvDIva3pq-Ov0W-g5T3tA7tNAJEdvD0B5lv7cvtLfrWTzmfvj3YfBf1HQYik2ZqEZXOpFyXnGwW2oxykgS-T5cnzZk7m6FLHBdc8gyN0Eo6y3Uiykxgpq0SeUrjXoCLMgvm3F78funBILuo82AoTlZaKpPBoxrS9kQXDjaJlPegyj_XxJXQ_cs32y1502v_88u6Dld7oc1eh5lxA9awugnjkI3MPuGR0w2yZ2zYUTdfb8GbzdMSG-M7HrCDrjcwMV_LdGXZLn6ZtyFukM0rRrKZfcBQI5zVju1pg5boUd-Gj-fyVHdgvaorvAss51YoFNLkPr1ZZKT8JtrENs00xmUiRhAPn7kwfQV23wjkqFjVjvbIKAgZhUdGIUfwfHnJcSg_ctbJ4wENRc9EbbGCwggeLw8Th3jHkK6wPqFzaLoSL8sJH8GLAXO_DfGvG947-4aP4DKhrtjdnu3chyukNEUI3hvD-qI5wQdwyXxfzNvmYTdzGHw-b_T9Av7QVHk
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cybercrime+Tendencies+and+Legislation+in+the+Republic+of+Macedonia&rft.jtitle=European+journal+on+criminal+policy+and+research&rft.au=Rashkovski%2C+Dragi&rft.au=Naumovski%2C+Vasko&rft.au=Naumovski%2C+Goce&rft.date=2016-03-01&rft.pub=Springer+Netherlands&rft.issn=0928-1371&rft.eissn=1572-9869&rft.volume=22&rft.issue=1&rft.spage=127&rft.epage=151&rft_id=info:doi/10.1007%2Fs10610-015-9277-7&rft.externalDocID=10_1007_s10610_015_9277_7
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0928-1371&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0928-1371&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0928-1371&client=summon