The Problems of Indentification of the Main Object of Cyber Offences Cover Image

Nusikalstamomis veikomis elektroninėje erdvėje pažeidžiamos pagrindinės baudžiamojo įstatymo saugomos vertybės nustatymo problema
The Problems of Indentification of the Main Object of Cyber Offences

Author(s): Renata Marcinauskaitė
Subject(s): Social Sciences
Published by: Mykolas Romeris University
Keywords: cyber crime; offences against security of electronic data and information systems; the object of the offence; cybernetic security; technical computer security; CIA triad; confidentiality; integrity; availability

Summary/Abstract: The article deals with the problems of identifying the main object (the principal value), that is protected by criminal law and suffers a damage caused by cyber crime acts. An analysis of the said problems enabled the authors to substantiate the identification of the main object (the principal value) protected by ultima ratio measures and its importance for a legal technician on codification of criminal acts in an integral system, its inseparability from identification of criminal acts included in the cyber crimes as a whole. So, it should be supposed that the definition of these various dangerous forms of behavior in cyber space prohibited by the criminal law not only predetermines the peculiarities of the conception of cyber crime acts but also affects the determination of the possible limits of analysis of the main objects (the principal values) protected by the criminal law that are damaged by such dangerous acts. It is stated in the article that it is impossible to identify the single main object (the principal value) protected by criminal law measures that is mostly encroached by the said criminal acts and that would enable to unite them into an independent uniform type based on the object protected by criminal law. However, in the opinion of the author, one of the links between such criminal acts may be considered an additional object (additional value) protected by criminal law, i.e. Cybernetic security that identifies cyber safety in a broad sense and that suffers a damage caused by the above–mentioned criminal acts or a threat of appearance of such damage. Through the analysis of exclusively specific criminal acts in electronic nets, it was found that two principal concepts are formulated in the doctrine of cyber crime acts, namely, Cybernetic security and Technical computer security. Cybernetic security is considered a concept of safety in a broad sense, so this term can be used for identification of the said additional object (additional value) that is protected by criminal law and that is affected by any criminal act included in the cyber crime as a whole. Technical computer security may be identified as an object (value) protected by criminal law that enables uniting criminalized acts into an independent type of criminal acts in the Chapter XXX of the Criminal Code and can be considered as a synonym of the security of electronic data and information systems. In the article, an analysis of the contents of Technical computer security is carried out using the confidentiality, integrity and availability triad that in scientific references is shortly referred to as CIA triad.

  • Issue Year: 3/2011
  • Issue No: 3
  • Page Range: 897-914
  • Page Count: 18
  • Language: Lithuanian