Academic literature on the topic 'Computer crimes – European Union countries'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer crimes – European Union countries.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer crimes – European Union countries"
Sukawati, Maheswara Perbawa. "European Union Policy on Artificial Intelligence Related to Cyber Crime." Hang Tuah Law Journal 4, no. 1 (August 4, 2020): 40. http://dx.doi.org/10.30649/htlj.v4i1.169.
Full textRqiq, Yassine, Jesus Beyza, Jose M. Yusta, and Ricardo Bolado-Lavin. "Assessing the Impact of Investments in Cross-Border Pipelines on the Security of Gas Supply in the EU." Energies 13, no. 11 (June 6, 2020): 2913. http://dx.doi.org/10.3390/en13112913.
Full textHsieh, Jin-chi, Ching-cheng Lu, Ying Li, Yung-ho Chiu, and Ya-sue Xu. "Environmental Assessment of European Union Countries." Energies 12, no. 2 (January 18, 2019): 295. http://dx.doi.org/10.3390/en12020295.
Full textIshchenko, Ivan, Kostiantyn Buhaichuk, Olha Tokarchuk, Kateryna Rudoi, and Iryna Tsareva. "European experience of preventive activities performed by law enforcement agencies: administrative aspect and theoretical-legal aspect." Cuestiones Políticas 40, no. 75 (December 29, 2022): 263–73. http://dx.doi.org/10.46398/cuestpol.4075.17.
Full textCherniei, Volodymyr, Serhii Cherniavskyi, Alexander Dzhuzha, and Viktoria Babanina. "Combating credit fraud: experience of Ukraine and some other European Countries." Revista Amazonia Investiga 10, no. 42 (July 30, 2021): 93–102. http://dx.doi.org/10.34069/ai/2021.42.06.9.
Full textVavrek, Roman, and Jana Chovancová. "Energy Performance of the European Union Countries in Terms of Reaching the European Energy Union Objectives." Energies 13, no. 20 (October 13, 2020): 5317. http://dx.doi.org/10.3390/en13205317.
Full textSteponavičiūtė, Ramunė. "The scope of criminal liability for misappropriation of authorship in EU countries: comparative analysis." Vilnius University Open Series, no. 6 (December 28, 2020): 192–217. http://dx.doi.org/10.15388/os.law.2020.17.
Full textJosipović, Ivo. "Responsibility for war crimes before national courts in Croatia." International Review of the Red Cross 88, no. 861 (March 2006): 145–68. http://dx.doi.org/10.1017/s1816383106000099.
Full textPicchi, Marta. "Violence against Women and Domestic Violence: The European Commission’s Directive Proposal." Athens Journal of Law 8, no. 4 (September 30, 2022): 395–408. http://dx.doi.org/10.30958/ajl.8-4-3.
Full textІван Васильович Яковюк, Артем Павлович Волошин, and Антон Олексійович Шовкун. "Legal aspects of counteracting phishing: the European Union experience." Problems of Legality, no. 149 (June 9, 2020): 8–23. http://dx.doi.org/10.21564/2414-990x.149.200028.
Full textDissertations / Theses on the topic "Computer crimes – European Union countries"
Cochrane, Brandy Marie. "Drowning In It: State Crime and Refugee Deaths in the Borderlands." PDXScholar, 2012. https://pdxscholar.library.pdx.edu/open_access_etds/772.
Full textBLASI, CASAGRAN Cristina. "Towards a global data protection framework in the field of law enforcement : an EU perspective." Doctoral thesis, 2015. http://hdl.handle.net/1814/36995.
Full textExamining Board: Professor Marise Cremona, European University Institute (Supervisor); Professor Gregorio Garzón Clariana, Autonomous University of Barcelona; Dr. Maria O’Neill, University of Abertay Dundee; Professor Martin Scheinin, European University Institute.
This thesis seeks to examine the existing EU frameworks for data-sharing for law enforcement purposes, both within the EU and between the EU and third countries, the data protection challenges to which these give rise, and the possible responses to those challenges at both EU and global levels. The analysis follows a bottom-up approach, starting with an examination of the EU internal data-sharing instruments. After that, it studies the data transfers conducted under the scope of an international agreement; and finally, it concludes by discussing the current international initiatives for creating universal data protection standards. As for the EU data-sharing instruments, this thesis demonstrates that these systems present shortcomings with regard to their implementation and usage. Moreover, each instrument has its own provisions on data protection and, despite the adoption of a Framework Decision in 2008, this has not brought about a convergence of data protection rules in the JHA field. A similar multiplicity of instruments is also found when the EU transfers data to third countries for the purpose of preventing and combating crimes. This is evident from examining the existing data-sharing agreements between the EU and the US. Each agreement has a section on data protection and data security rules, which again differ from the general clauses of the 2008 Framework Decision. This study demonstrates the influence of US interests on such agreements, as well as on the ongoing negotiations for an umbrella EU-US Data Protection Agreement. One possible way to ensure a high level of EU data protection standards in the field of law enforcement in the face of US pressure is by enhancing the role of Europol. This EU Agency shares information with EU member states and third countries. This thesis demonstrates that Europol has a full-fledged data protection framework, which is stronger than most of the member states’ privacy laws. However, taking Europol rules as a reference for global standards would only partially achieve the desired result. The exchange of data for security purposes does not only involve law enforcement authorities, but also intelligence services. The recent NSA revelations have shown that the programmes used by these bodies to collect and process data can be far more intrusive and secretive than any current law enforcement system. In view of the above, this thesis explores the potential of CoE Convention 108 for the Protection of Individuals with regard to the Automatic Processing of Personal Data and ii the Cybercrime Convention as the basis for a global regime for data protection in law enforcement. This thesis concludes that an optimum global data protection framework would entail a combination of the 108 CoE Data Protection Convention and the Cybercrime Convention. The cumulative effect of these two legal instruments would bind both law enforcement and intelligence services in the processing of data. In sum, by promoting the Europol approach to data protection and existing Council of Europe rules, the EU could play a crucial role in the creation of global data protection standards.
PORCEDDA, Maria Grazia. "Data protection and the prevention of cybercrime : a dual role for security policy in the EU?" Doctoral thesis, 2012. http://hdl.handle.net/1814/26594.
Full textAward date: 13 February 2012
PDF of thesis uploaded from the Library digital archive of EUI PhD theses
Cybercrime and cyber-security are attracting increasing attention, both for the relevance of Critical Information Infrastructure to the national economy, and the interplay of the policies tackling them with ‘ICT sensitive’ liberties, such as privacy and data protection. As such, the subject falls in the ‘security vs. privacy’ debate. The objective of this study is twofold. On the one hand, it is descriptive: it aims to cast light on the (legal substantive) nature of, and relationship between, cybercrime and cyber security, which are currently ‘terms of hype’. On the other, it explores the possibility of reconciling data protection and privacy with the prevention of cybercrime and the pursuit of a cyber-security policy, and therefore wishes to explore causation. The latter is a subset of the wider question of whether it is possible to build ‘human rights by design’, i.e. a security policy that reconciles both security and human rights. I argue that narrow or online crimes and broad or off-line crimes are profoundly different in terms of underlying logics while facing the same procedural challenges, and that only narrow cybercrime pertains to cyber-security, understood as a policy. Yet, the current policy debate is focussing too much on broad cybercrimes, thus biasing the debate over the best means to tackle ICT-based crimes and challenging the liberties involved. I then claim that the implementation of data protection principles in a cyber-security policy can act as a proxy to reduce cyber threats, and in particular (narrow) cybercrime, provided that the following caveats are respected: i) we privilege a technical computer security notion; ii) we update the data protection legislation (in particular the understanding of personal data); and iii) we adopt a core-periphery approach to human rights. The study focuses on the EU. Due to time constraints, the interaction between privacy and data protection and other liberties involved, as well as purely procedural issues are outside of the scope of this research.
PORCEDDA, Maria Grazia. "Cybersecurity and privacy rights in EU law : moving beyond the trade-off model to appraise the role of technology." Doctoral thesis, 2017. http://hdl.handle.net/1814/45944.
Full textExamining Board: Professor Marise Cremona, EUI (Supervisor); Professor Deirdre Curtin, EUI; Professor Anne Flanagan, Queen Mary University of London; Professor Ronald Leenes, Tilburg University
This thesis concerns a specific instance of the trade-off between security and ‘privacy rights’, namely cybersecurity, as it applies to EU Law. The research question is whether, and how, the pursuit of cybersecurity can be reconciled with the protection of personal data and respect for private and family life, which I treat as two independent rights. Classic legal argumentation is used to support a normative critique against the trade-off; an in-depth scrutiny of ‘(cyber)security’ and ‘privacy’ further shows that the trade-off is methodologically flawed: it is an inappropriate intellectual device that offers a biased understanding of the subject matter. Once the terms of discussion are reappraised, the relationship between cybersecurity and privacy appears more nuanced, and is mediated by elements otherwise overlooked, chiefly technology. If this fatally wounds the over-simplistic trade-off model, and even opens up avenues for integration between privacy and cybersecurity in EU law, on the other hand it also raises new questions. Looked at from the perspective of applicable law, technology can both protect and infringe privacy rights, which leads to the paradox of the same technology being both permissible and impermissible, resulting in a seeming impasse. I identify the problem as lying in the combination of technology neutrality, the courts’ avoidance in pronouncing on matters of technology, and the open-ended understanding of privacy rights. To appraise whether cybersecurity and privacy rights can be reconciled, I develop a method that bridges the technological and legal understandings of information security and privacy, based on the notions/methods of protection goals, attributes and core/periphery or essence, and which has the advantage of highlighting the independence of the two privacy rights. A trial run of the method discloses aspects of the ‘how’ question that were buried under the trade-off debate, viz. the re-appropriation of the political and judicial process vis-àvis technology.
Chapter 4 draws upon an article in Neue Kriminalpolitik 4/2013
KIES, Raphaël. "Promises and limits of web-deliberation." Doctoral thesis, 2008. http://hdl.handle.net/1814/10477.
Full textExamining Board: Prof. Peter Wagner, University of Trento and EUI Supervisor Prof. Alexander Trechsel, EUI Prof. Jürg Steiner, University of Carolina Prof. Hanspeter Kriesi, University of Zürich
PDF of thesis uploaded from the Library digital archive of EUI PhD theses
In this work we will attempt to evaluate which of these scenarios is most likely to become prominent in the future by focusing essentially on three issues: 1) the usage of the online forum by observing how diffuse the phenomenon is and who the users of the online debates are; 2) The offer of the online political forum, by analyzing which are the political actors (civil society, media, institutional actors) who are more susceptible to host the online political debates; and 3) the quality of the online debates by assessing their deliberativeness. By elaborating a sophisticated method for measuring the deliberativeness of the online debates and by analyzing a great variety of online debates our objective is to provide an appreciation of the deliberative potential of the web-debates that avoids shortcuts and inappropriate generalizations, but that recognizes that this may be determined by a multiplicity of factors. From a theoretical perspective the results obtained through our investigations contribute to evaluate whether the deliberative model of democracy could be fostered by the virtualization of the political debates and, more generally, it should also contribute to the elaboration of a deliberative model of democracy that is grounded not only on theoretical principles and suppositions, as this tends to be the case, but also on empirical studies that test its adaptability to the 'real life politics'.
Books on the topic "Computer crimes – European Union countries"
Sloan, Barbara. Accessing European Union information. Washington, D.C: Delegation of the European Commission, Office of Press & Public Affairs, 1998.
Find full textRyan, Michael H. The EU regulatory framework for electronic communications handbook. 2nd ed. London: Bloomsbury Professional, 2010.
Find full textChristou, George. Cyber security in the European Union: Resilience and adaptability in governance policy. Houndmills, Basingstoke Hampshire: Palgrave Macmillan, 2015.
Find full textBroderick, Terry R. Regulation of information technology in the European Union. London: Kluwer Law International, 2000.
Find full textCristina, Capineri, and Rietveld Piet, eds. Networks in transport and communications: A policy approach. Aldershot: Ashgate, 1997.
Find full textCappel, Alexander. Grenzen auf dem Weg zu einem europäischen Untreuestrafrecht: Das Mannesmann-Verfahren und [Paragraph] 266 StGB als Beispiele eines expansiven Wirtschaftsstrafrech. Frankfurt am Main: P. Lang, 2009.
Find full textEurope, United States Congress Commission on Security and Cooperation in. Implementation of the Helsinki accords: Hearing before the Commission on Security and Cooperation in Europe, One Hundred Third Congress, first session, the countries of Central Asia, problems in the transition to independence and the implications for the United States, March 25, 1993. Washington: U.S. G.P.O., 1993.
Find full textEurope, United States Congress Commission on Security and Cooperation in. Implementation of the Helsinki accords: Hearing before the Commission on Security and Cooperation in Europe, One Hundred Third Congress, first session, the countries of Central Asia, problems in the transition to independence and the implications for the United States, March 25, 1993. Washington: U.S. G.P.O., 1993.
Find full textBaber, Graeme Scott. European Union and the Global Financial Crisis: A View from 2016. Nova Science Publishers, Incorporated, 2016.
Find full textBook chapters on the topic "Computer crimes – European Union countries"
Radoniewicz, Filip. "International Regulations of Cybersecurity." In Cybersecurity in Poland, 53–71. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_5.
Full text"Emissions Trading Scheme: Evidence from the European Union Countries." In Communications in Computer and Information Science, 204–15. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23766-4_17.
Full textMartinho, Vítor João Pereira Domingues. "Analysis of the Cybercrime with Spatial Econometrics in the European Union Countries." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 483–99. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6324-4.ch030.
Full textMadai, Sándor. "The Impact of Economic Policy on Economic Crime." In Criminal Legal Studies : European Challenges and Central European Responses in the Criminal Science of the 21st Century, 361–70. Central European Academic Publishing, 2022. http://dx.doi.org/10.54171/2022.evcs.cls_12.
Full textVioleta Achim, Monica, Sorin Nicolae Borlea, Viorela Ligia Văidean, Decebal Remus Florescu, Eugenia Ramona Mara, and Ionut Constantin Cuceu. "Economic and Financial Crimes and the Development of Society." In Standard of Living, Wellbeing, and Community Development [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.96269.
Full textRossel, Lucia, Brigitte Unger, Jason Batchelor, and Jan van Koningsveld. "The Implications of Making Tax Crimes a Predicate Crime for Money Laundering in the EU." In Combating Fiscal Fraud and Empowering Regulators, 236–71. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198854722.003.0013.
Full textZakharko, Andrii, and Oleksii Boiko. "THE STATUS OF IMPLEMENTATION OF THE CYBER CRIME CONVENTION IN EASTERN EUROPE." In Science, technology, and innovation: the experience of European countries and prospects for Ukraine. Publishing House “Baltija Publishing”, 2021. http://dx.doi.org/10.30525/978-9934-26-190-9-7.
Full textMiheș, Cristian Dumitru. "Romania: National Regulations in the Shadow of a Common Past." In Criminal Legal Studies : European Challenges and Central European Responses in the Criminal Science of the 21st Century, 125–55. Central European Academic Publishing, 2022. http://dx.doi.org/10.54171/2022.evcs.cls_5.
Full textRagusa, Angela T., and Emma Steinke. "Studying Locally, Interacting Globally." In Computer-Mediated Communication across Cultures, 344–68. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-60960-833-0.ch022.
Full textPágio, Leonardo Saraiva. "UMA NOVA ORDEM JURÍDICA FISCAL INTERNACIONAL ATRAVÉS DA COOPERAÇÃO ELETRÔNICA DE INFORMAÇÕES FINANCEIRAS-FISCAIS." In Fronteiras de acesso à Justiça: Processo e Meios Alternativos na Democracia no Século XXI, 35–53. JUS.XXI, 2022. http://dx.doi.org/10.51389/qdkv9608.
Full textConference papers on the topic "Computer crimes – European Union countries"
Antonoaie, Cristina, and Camelia Bucur. "CONSIDERATIONS CONCERNING ICT SPECIALISTS IN EUROPE." In eLSE 2021. ADL Romania, 2021. http://dx.doi.org/10.12753/2066-026x-21-002.
Full textKolumber, David. "Protistátní trestné činy v moderních kodifikacích." In Protistátní trestné činy včera a dnes. Brno: Masaryk University Press, 2021. http://dx.doi.org/10.5817/cz.muni.p210-9976-2021-4.
Full textNichoga, Vitalij, Petro Dub, and Eugeniusz Grudzinski. "Peculiarities of European Union Countries and Ukraine Approach to Estimation of Technogenic Electromagnetic Fields Influence on Bioecosystems." In 2006 International Conference - Modern Problems of Radio Engineering, Telecommunications, and Computer Science. IEEE, 2006. http://dx.doi.org/10.1109/tcset.2006.4404428.
Full textSloka, Biruta, Ieva Brence, and Henrijs Kalkis. "Application of information technologies for social inclusion: current trends and future prospective." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002652.
Full textMolnar, Jozef, Marek Pecka, and Jaroslav Kment. "SCORPIO-VVER: Two Decades of Experience and Enhancements in Reactor Core Monitoring and Surveillance in Central Europe." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-66867.
Full textVilinová, Katarína, Lucia Petrikovičová, and Laura Babjaková. "Práca s internetom ako indikátor počítačovej gramotnosti obyvateľstva Slovenska." In XXIII. mezinárodní kolokvium o regionálních vědách / 23rd International Colloquium on Regional Sciences. Brno: Masaryk University Press, 2020. http://dx.doi.org/10.5817/cz.muni.p210-9610-2020-37.
Full textWahba, Khaled, and Sherif Kamel. "A Virtual Research Model to Help Academics Face the Challenges of the 21st Century." In 2001 Informing Science Conference. Informing Science Institute, 2001. http://dx.doi.org/10.28945/2401.
Full textVlada, Marin, and Adrian Adascalitei. "COMPUTERS: AS DIGITAL FACILITIES FOR SCIENTIFIC RESEARCH AND AS TOOLS FOR ENHANCED LEARNING IN HIGHER EDUCATION." In eLSE 2014. Editura Universitatii Nationale de Aparare "Carol I", 2014. http://dx.doi.org/10.12753/2066-026x-14-138.
Full text