Protecting Cyber Crime Victims: Trends and Imperatives in Legal Safeguards


Perlindungan Korban Kejahatan Siber: Tren dan Imperatif dalam Perlindungan Hukum.


  • (1) * Lusiana Lestari            Universitas Muhammadiyah Sidoarjo  
            Indonesia

  • (2)  Emy Rosnawati            Universitas Muhammadiyah Sidoarjo  
            Indonesia

  • (3)  Anita Rohma Fidayanti            Universitas Muhammadiyah Sidoarjo  
            Indonesia

    (*) Corresponding Author

Abstract

This data article presents an analysis of 10,446 scholarly articles on Crime Victims within Cyber Law sourced from Lens.org. Using rigorous filtering, the dataset unveils key contributors and trends, notably a surge in publications in 2017 and the dominance of the Law field. The findings emphasize the pressing need for enhanced legal safeguards to protect Crime Victims in cyberspace, serving as a foundation for policy reform and further academic inquiry.

Highlights :

  • Surge in Publications: Sharp increase in articles in 2017 highlights growing attention to cyber law and crime victimization.
  • Dominance of Law Field: Emphasis on legal aspects underscores the need for legal frameworks in addressing cybercrime against victims.
  • Call for Action: Findings stress the urgency for improved safeguards and policy reforms to protect victims in cyberspace.

Keywords: Crime Victims, Cyber Law, Legal Safeguards, Policy Reform, Academic Inquiry

Downloads

Download data is not yet available.

References

D. Van der Merwe, “A Comparative Overview of the (Sometimes Uneasy) Relationship between Digital Information and Certain Legal Fields in South Africa and Uganda,” Potchefstroom Electron. Law J., vol. 17, no. 1, pp. 296–326, Apr. 2017

Z. Hamin and W. R. W. Rosli, “Cloaked By Cyber Space: A Legal Response To The Risks Of Cyber Stalking In Malaysia,” Oct. 2018

D. Halder and K. Jaishankar, “Cyber Gender Harassment and Secondary Victimization: A Comparative Analysis of the United States, the UK, and India,” Vict. Offenders, vol. 6, no. 4, pp. 386–398, Oct. 2011

M. Roscini, “Cyber Operations as Nuclear Counterproliferation Measures,” J. Confl. Secur. Law, vol. 19, no. 1, pp. 133–157, Apr. 2014

N. K. Katyal, “Digital Architecture as Crime Control,” Yale Law J., vol. 112, no. 8, p. 2261, Jun. 2003

F. Cassim, “Formulating specialised Legislation to address the Growing Spectre of Cybercrime: A Comparative Study,” Potchefstroom Electron. Law J., vol. 12, no. 4, pp. 35–79, Jun. 2017

M. Roscini, “Gravity in the Statute of the International Criminal Court and Cyber Conduct That Constitutes, Instigates or Facilitates International Crimes,” Crim. Law Forum, vol. 30, no. 3, pp. 247–272, Sep. 2019

J. Bosman, J. E. Frantsvåg, B. Kramer, P.-C. Langlais, and V. Proudman, “OA Diamond Journals Study. Part 1: Findings,” Zenodo, Mar. 2021

D. Halder, “Restorative justice today: practical applications,” Contemp. Justice Rev., vol. 17, no. 3, pp. 402–403, Jul. 2014

“The Lens - Free & Open Patent and Scholarly Search,” The Lens. [Online]. Available: https://www.lens.org/lens. [Accessed: Dec. 28, 2022].

Picture in here are illustration from public domain image (License) or provided by the author, as part of their works
Published
2023-10-12
 
How to Cite
Lestari, L., Rosnawati, E., & Fidayanti, A. R. (2023). Protecting Cyber Crime Victims: Trends and Imperatives in Legal Safeguards. Proceedings of The ICECRS, 12(1). https://doi.org/10.21070/icecrs.v12i2.1701