Vol 12 No 1 (2023): Proceedings of Data in Education, Culture, and Interdisciplinary Studies
Data Articles in Law Science

Protecting Cyber Crime Victims: Trends and Imperatives in Legal Safeguards
Perlindungan Korban Kejahatan Siber: Tren dan Imperatif dalam Perlindungan Hukum.

Lusiana Lestari
Universitas Muhammadiyah Sidoarjo, Indonesia
Emy Rosnawati
Universitas Muhammadiyah Sidoarjo, Indonesia
Anita Rohma Fidayanti
Universitas Muhammadiyah Sidoarjo, Indonesia
Picture in here are illustration from public domain image or provided by the author, as part of their works
Published October 12, 2023
  • Crime Victims,
  • Cyber Law,
  • Legal Safeguards,
  • Policy Reform,
  • Academic Inquiry
How to Cite
Lestari, L., Rosnawati, E., & Fidayanti, A. R. (2023). Protecting Cyber Crime Victims: Trends and Imperatives in Legal Safeguards. Proceedings of The ICECRS, 12(1). https://doi.org/10.21070/icecrs.v12i2.1701


This data article presents an analysis of 10,446 scholarly articles on Crime Victims within Cyber Law sourced from Lens.org. Using rigorous filtering, the dataset unveils key contributors and trends, notably a surge in publications in 2017 and the dominance of the Law field. The findings emphasize the pressing need for enhanced legal safeguards to protect Crime Victims in cyberspace, serving as a foundation for policy reform and further academic inquiry.

Highlights :

  • Surge in Publications: Sharp increase in articles in 2017 highlights growing attention to cyber law and crime victimization.
  • Dominance of Law Field: Emphasis on legal aspects underscores the need for legal frameworks in addressing cybercrime against victims.
  • Call for Action: Findings stress the urgency for improved safeguards and policy reforms to protect victims in cyberspace.

Keywords: Crime Victims, Cyber Law, Legal Safeguards, Policy Reform, Academic Inquiry


Download data is not yet available.


  1. D. Van der Merwe, “A Comparative Overview of the (Sometimes Uneasy) Relationship between Digital Information and Certain Legal Fields in South Africa and Uganda,” Potchefstroom Electron. Law J., vol. 17, no. 1, pp. 296–326, Apr. 2017
  2. Z. Hamin and W. R. W. Rosli, “Cloaked By Cyber Space: A Legal Response To The Risks Of Cyber Stalking In Malaysia,” Oct. 2018
  3. D. Halder and K. Jaishankar, “Cyber Gender Harassment and Secondary Victimization: A Comparative Analysis of the United States, the UK, and India,” Vict. Offenders, vol. 6, no. 4, pp. 386–398, Oct. 2011
  4. M. Roscini, “Cyber Operations as Nuclear Counterproliferation Measures,” J. Confl. Secur. Law, vol. 19, no. 1, pp. 133–157, Apr. 2014
  5. N. K. Katyal, “Digital Architecture as Crime Control,” Yale Law J., vol. 112, no. 8, p. 2261, Jun. 2003
  6. F. Cassim, “Formulating specialised Legislation to address the Growing Spectre of Cybercrime: A Comparative Study,” Potchefstroom Electron. Law J., vol. 12, no. 4, pp. 35–79, Jun. 2017
  7. M. Roscini, “Gravity in the Statute of the International Criminal Court and Cyber Conduct That Constitutes, Instigates or Facilitates International Crimes,” Crim. Law Forum, vol. 30, no. 3, pp. 247–272, Sep. 2019
  8. J. Bosman, J. E. Frantsvåg, B. Kramer, P.-C. Langlais, and V. Proudman, “OA Diamond Journals Study. Part 1: Findings,” Zenodo, Mar. 2021
  9. D. Halder, “Restorative justice today: practical applications,” Contemp. Justice Rev., vol. 17, no. 3, pp. 402–403, Jul. 2014
  10. “The Lens - Free & Open Patent and Scholarly Search,” The Lens. [Online]. Available: https://www.lens.org/lens. [Accessed: Dec. 28, 2022].