Similarity and Competition Between Cybercrimes Related to Computer Data in the Council of Europe's Convention on Cybercrime Cover Image

Similarity and Competition Between Cybercrimes Related to Computer Data in the Council of Europe's Convention on Cybercrime
Similarity and Competition Between Cybercrimes Related to Computer Data in the Council of Europe's Convention on Cybercrime

Author(s): Pedro Dias Venâncio
Subject(s): Criminology, ICT Information and Communications Technologies
Published by: Masarykova univerzita nakladatelství
Keywords: Cybercrime Convention; Computer-data related crimes; data interference; system interference, computer-related forgery; computer-related fraud;

Summary/Abstract: The Council of Europe's Convention on Cybercrime provides four types of cybercrime for very similar acts on computer data: data interference, system interference, computer-related forgery and computer-related fraud. All these crimes criminalize acts that are in their objective factors materially identical, essentially: input, delete, damage or alteration of computer data. What really distinguish these cybercrimes are the protected legal interests, and therefore the damage potentially affected by them. Thus, integration of an identical behavior on one of these types of cybercrimes requires the evaluation of the technical effect produced. Since the difference in some cases may prove to be only in the intensity/extent of damage, the distinction is not always easy. On the other hand, this similarity makes it possible for one behavior to integrate the requirements of more than one cybercrime, which brings us to the question of potential competition or cumulating between them. Our communication will focus on the differentiation and possible cumulating of these cybercrimes under this Convention.

  • Issue Year: 7/2013
  • Issue No: 1
  • Page Range: 97-105
  • Page Count: 9
  • Language: English