![]() |
Center for Open Access in Science (COAS) OPEN JOURNAL FOR INFORMATION TECHNOLOGY (OJIT) ISSN (Online) 2620-0627 * ojit@centerprode.com |
Cyberdeviance in the Western Balkans and ICT-Media-Based Protection Ilda Kashami * ORCID: 0000-0001-8084-5094 Arjan Çuri Open Journal for Information Technology, 2023, 6(1), 59-66 * https://doi.org/10.32591/coas.ojit.0601.05059k LICENCE: Creative Commons Attribution 4.0 International License. ARTICLE (Full Text - PDF) |
ABSTRACT: KEY WORDS: cyberdeviance, Western Balkans, suitable structures, prevention, ICT. CORRESPONDING AUTHOR: |
REFERENCES: Agastra, A., Ibrahimi, S., & Ibrahim, E. (2020). Profilet psikologjike, domosdoshmëri për hetimin [Psychological profiles, necessary for the investigation]. Revista e Akademisë së Sigurisë, Tirana, Albania, Nr. 21. Gercke, M. (2006). The slow wake of a global approach against cybercrime. Computer Law Review International. https://doi.org/10.9785/ovs-cri-2006-140 Gercke, M. (2009). Understanding cybercrime: A guide for developing countries, ITU, Geneva. Found online: www.itu.int/ITU-D/cyb/cybersecurity/legislation.htm. Quille, M. (2009). Keynote address. Current threats and future challenges posed by cybercrime. Octopus Conference, CoE. Kozlovski, N. (2005). A paradigm shift in online policing — Designing accountable policing. Yale Law School Dissertation. Wall, D. S. (2007). Policing cybercrimes: Situating the public police in networks of Security within cyberspace. Police Practice and Research, 8(2), 1. … (2005). Development Gateway’s Special Report, Information Society — Next Steps? Rash, H. et al. (2009). Crime online. Cybercrime and illegal innovation. NESTA. Research Report. July. Berg, T. (2007). The changing face of cybercrime — New Internet threats create challenges to law enforcement. Michigan Bar Journal, 2007, 18-22. Ealy, K (2003). A new evolution in hack attacks: A general overview of types, methods, tools, and prevention. SANS Institute. Long, J., Skoudis, E., & van Eijkelenborg, A. (2005). Google hacking for penetration testers. Syngress. Lovet, G. (2009). Fighting cybercrime: Technical, juridical, and ethical challenges. Virus Bulletin Conference, September 2009. Sieber, U. (2000). Legal regulation, law enforcement and self-regulation. In J. Watermann & M. Machill (Eds.), Protecting our children on the internet. Gütersloh, Bertelsmann Foundation Publishers. Sieber, U. (2010). Internet crimes — Annex 1 to the Questionnaire for the 18th International Congress of the IACL. Sofaer, A. D., & Goodman, S. E. (2001). Cyber crime and security — The transnational dimension. In A. D. Sofaer & S. E. Goodman (Eds.), Transnational dimension of cyber-crime and terrorism. Hoover Institution Press. Putnam, T. L., & Elliott, D. D. (2001). International responses to cyber crime. In A. D. Sofaer & S. E. Goodman (Eds.), Transnational dimension of cyber-crime and terrorism (pp. 31-67). Hoover Institution Press. Roth, B. (2005). State sovereignty, international legality, and moral disagreement. Detroit: Wayne State University. CSI and FBI (2004). Computer crime and security survey. San Francisco. Vogel, J. (2007). Towards a global convention against cybercrime. World Conference on Penal Law, Guadalajara, Mexico. Interpol (2022). Crimes against children. Factsheet, p. 11. Communication from the Commission to the European Parliament the Council and the Committee of the Regions (2007). Towards a general policy on the fight against cybercrime. |
© Center for Open Access in Science