Protecting Cyber Crime Victims: Trends and Imperatives in Legal Safeguards

Perlindungan Korban Kejahatan Siber: Tren dan Imperatif dalam Perlindungan Hukum.

  • Lusiana Lestari Universitas Muhammadiyah Sidoarjo
  • Emy Rosnawati Universitas Muhammadiyah Sidoarjo
  • Anita Rohma Fidayanti Universitas Muhammadiyah Sidoarjo
Keywords: Crime Victims, Cyber Law, Legal Safeguards, Policy Reform, Academic Inquiry

Abstract

This data article presents an analysis of 10,446 scholarly articles on Crime Victims within Cyber Law sourced from Lens.org. Using rigorous filtering, the dataset unveils key contributors and trends, notably a surge in publications in 2017 and the dominance of the Law field. The findings emphasize the pressing need for enhanced legal safeguards to protect Crime Victims in cyberspace, serving as a foundation for policy reform and further academic inquiry.

Highlights :

  • Surge in Publications: Sharp increase in articles in 2017 highlights growing attention to cyber law and crime victimization.
  • Dominance of Law Field: Emphasis on legal aspects underscores the need for legal frameworks in addressing cybercrime against victims.
  • Call for Action: Findings stress the urgency for improved safeguards and policy reforms to protect victims in cyberspace.

Keywords: Crime Victims, Cyber Law, Legal Safeguards, Policy Reform, Academic Inquiry

Downloads

Download data is not yet available.

References

D. Van der Merwe, “A Comparative Overview of the (Sometimes Uneasy) Relationship between Digital Information and Certain Legal Fields in South Africa and Uganda,” Potchefstroom Electron. Law J., vol. 17, no. 1, pp. 296–326, Apr. 2017

Z. Hamin and W. R. W. Rosli, “Cloaked By Cyber Space: A Legal Response To The Risks Of Cyber Stalking In Malaysia,” Oct. 2018

D. Halder and K. Jaishankar, “Cyber Gender Harassment and Secondary Victimization: A Comparative Analysis of the United States, the UK, and India,” Vict. Offenders, vol. 6, no. 4, pp. 386–398, Oct. 2011

M. Roscini, “Cyber Operations as Nuclear Counterproliferation Measures,” J. Confl. Secur. Law, vol. 19, no. 1, pp. 133–157, Apr. 2014

N. K. Katyal, “Digital Architecture as Crime Control,” Yale Law J., vol. 112, no. 8, p. 2261, Jun. 2003

F. Cassim, “Formulating specialised Legislation to address the Growing Spectre of Cybercrime: A Comparative Study,” Potchefstroom Electron. Law J., vol. 12, no. 4, pp. 35–79, Jun. 2017

M. Roscini, “Gravity in the Statute of the International Criminal Court and Cyber Conduct That Constitutes, Instigates or Facilitates International Crimes,” Crim. Law Forum, vol. 30, no. 3, pp. 247–272, Sep. 2019

J. Bosman, J. E. Frantsvåg, B. Kramer, P.-C. Langlais, and V. Proudman, “OA Diamond Journals Study. Part 1: Findings,” Zenodo, Mar. 2021

D. Halder, “Restorative justice today: practical applications,” Contemp. Justice Rev., vol. 17, no. 3, pp. 402–403, Jul. 2014

“The Lens - Free & Open Patent and Scholarly Search,” The Lens. [Online]. Available: https://www.lens.org/lens. [Accessed: Dec. 28, 2022].

Published
2023-10-12
How to Cite
Lestari, L., Rosnawati, E., & Fidayanti, A. R. (2023). Protecting Cyber Crime Victims: Trends and Imperatives in Legal Safeguards. Proceedings of The ICECRS, 12(1). https://doi.org/10.21070/icecrs.v12i2.1701