Legal Aspects of Cybersecurity Artur Appazov



Download 1,04 Mb.
Pdf ko'rish
bet23/34
Sana13.06.2022
Hajmi1,04 Mb.
#665529
1   ...   19   20   21   22   23   24   25   26   ...   34
Bog'liq
Legal Aspects of Cybersecurity

6.5
 
Incident Reporting and Information Sharing 
Because of the difficulties arising when trying to define and identify cybercrime, nationally 
and cross-nationally comparative statistics on cybercrime are much rarer than for other 
crime types.
142
The measures that might be wanting are those that would improve 
transparency through obliging individual and corporate victims, under certain 
circumstances, disclose data breaches.
143
139
Comprehensive Study on Cybercrime 56-58. 2013. 
140
Id. at, 60. 
141
Id. at, 61. 
142
Id. at, 6; C
LOUGH
, Principles of Cybercrime 13-14. 2010. 
143
Teplinsky, A
MERICAN 
U
NIVERSITY 
B
USINESS 
L
AW 
R
EVIEW
, 276-278 (2013). 


42 
Cybercrime acts most frequently come to the attention of law enforcement authorities 
through reports by individual or corporate victims. The UNDOC study provides that 80 per 
cent of individual victims of core cybercrime do not report the crime to the police.
144
Underreporting derives from a lack of awareness of victimization and of reporting 
mechanisms, victim shame and embarrassment, and perceived reputation risks for 
corporations. It is important to highlight initiatives for increasing reporting, including 
online and hotline reporting systems, public awareness campaigns, private sector liaison, 
and enhanced police outreach and information sharing. An incident-driven response to 
cybercrime accompanied by medium and long-term tactical investigations can successfully 
identify the crime markets and criminal scheme architects, which means a better 
understanding of the area in need of regulation.
145
Until the law enforcement has a cumulative picture of victims of cybercrime and their 
offenders, confusion will remain as to who they are (whether they are physical persons or 
corporation or governments), the manner of their victimization, and the amount of policing 
resources that should be allocated to the problem. The inability to construct the offender 
profile leads to inability to isolate offender motivation for the purposes of criminalization, 
for example.
146
Reliable information about cybercrime informs policy, practice, and the 
public. It helps to prevent information sources from over-representing their own interest 
and it reconciles the needs of the state and interests of other stake-holders, rather than 
dividing them. Reliable information helps shape public expectations more realistically.
147

Download 1,04 Mb.

Do'stlaringiz bilan baham:
1   ...   19   20   21   22   23   24   25   26   ...   34




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish