Cyber Crimes in Kosovo in 2020

  • Frosina Tufa Student in LLM in Department of Criminal Law. Faculty of Law / UBT - Higher Education Institution, Pristina. Republic of Kosovo
Keywords: Cybercrime; Victims; Cyber Attacks; Cyber Investigations; Preventive Measures; Forensics

Abstract

The paper aims to compile the national and international definition of cybercrimes, their investigation and classification of the types of these computer crimes according to different world-renowned authors. The paper aims to describe the measures taken by countries such as Kosovo, Albania, Russia, the EU and the US in order to prevent and combat the cybercrime. It should be taken into account that cybercrime refers to illegal activities involving computers and computer networks, given the fact that nowadays special importance is given to technology, especially the internet and social networks. The internet has not only facilitated people’s work, but in most cases it has also endangered their lives by causing very serious consequences. This is caused by the daily use of social networks and the dissemination of important information to us, which can lead to its misuse. In cybercrimes, usually, the first targets are people who have no knowledge of these diverse crimes. Therefore, the paper aims to make an understanding of the types of cybercrimes and study the phenomenon of cybercrime and its evolution in Kosovo and other countries with the use of analytical, historical, comparative and statistical methods. As a technique of data collection for the study, content analysis is used, which is usually applied when dealing with the data in textual form.

References

2020 Internet Crime Victims Reports. Crime Statistics, Federal Bureau of Investigation, Washington. Available at: https://www.ic3.gov/Media/PDF/AnnualReport/2020_IC3Report.pdf
Gashi, S. (2020). Kosova ndaj sulmeve Kibernetike.Kosova Live. Available at: https://kosovalive.org/2020/10/29/kosova-eshte-ndezur-ne-alarm-ndaj-sulmeve-kibernetike/Last accessed: 05.22.2022.
Haka, E. (2020). Krimi Kibernetik dhe Legjislacioni Ndërkombëtarë. Academia. Available at: https://www.academia.edu/19768726/krimi_kibernetik_dhe_legjislacioni_nderkombetar. Last accessed: 05.26.2022
Howard, P. (2021, Janar 08). Infosec Institute: Available at: https://resources.infosecinstitute.com/topic/computer-forensics-tools/ Last accessed: 05.27. 2022.
Jasarević, O., Maloku, A. (2021). Kriminologija (etiologija i fenomenologija kriminaliteta). Universitet u Travniku. Travnik. Bosna i Hercegovina.
Jasarević, O., Maloku, A. (2021). Krivično procesno pravo I dhe II (opšti i posebni dio). Universitet u Travniku. Travnik. Bosna i Hercegovina.
Jahankhani, H. (2014). Cyber crime Classification and Characteristics. Në A. H.-F. Ameer Al-Nemrat, & A. S. Francesca Bosco (Re.), Cyber Crime and Cyber Terrorism Investigator’s Handbook (f. 152). Elsevier Science. Available at: https://www.researchgate.net/publication/280488873_Cyber_crime_Classification_and_Characteristics .Last accessed:06.06/.2022
Jacobs, L. (2019, Mars 12). 10 Types of Cyber Crimes. . . And Another 10 You’ve Never Heard of. Law and Crime. Available at: https://bestdsl.net/10-types-of-cyber-crimes-and-another-10-youve-never-heard-of/Last accessed: 09.06.2022
Jay, A. (2022). Important Cybercrime Statistics: 2021/2022 Data Analysis & Projections. Finances Online - Reviews for Business. Available at: https://financesonline.com/cybercrime-statistics/ Last accessed: 05.27.2022.
Jenny, S. (2015). Krimet Kibernetike dhe Klasifikimi i tyre. Bota Ndryshe: Available at: https://botandryshe.wordpress.com/ Last accessed: 05.18.2022.
Johansen, A. G. (2020). The ways to help protect yourself against cybercrime. Norton. Available at:https://us.norton.com/internetsecurity-how-to-how-to-recognize-and-protect-yourself-from-cybercrime.html. Last accessed: 05.23.2022
Karović, S., Maloku, A., & Shala, S. (2020). Juvenile Criminal Law in Bosnia and Herzegovina With Reference to the Criminal Legal Position and Responsibility of Juveniles. Kriminalističke Teme, (1-2), 107-122. Available at: https://krimteme.fkn.unsa.ba/index.php/kt/article/view/205
Kaur, N. (2018, Gusht). INTRODUCTION OF CYBER CRIME AND ITS TYPE. (C. E. Dr.A.Arul L.S, Re.) International Research Journal of Computer Science (IRJCS), 05(08), 435. Available at: https://www.academia.edu/37288317/INTRODUCTION_OF_CYBER_CRIME_AND_ITS_TYPE Last accessed: 06.06.2022
Kodi Penal i Republikës së Kosovës. Gazeta Zyrtare e Republikës së Kosovës / nr. 2 / 14 Janar 2019, Prishtinë. Available at: https://gzk.rks-gov.net/ActDetail.aspx?ActID=18413.
Kodi Penal i Republikës së Shqipërisë. Available at: https://www.pp.gov.al/Legjislacioni/Legjislacioni_Penal/
Konushevci, A. (2014). Radio Evropa e Lirë. Available at: https://www.evropaelire.org/a/26749258.html /Last accessed: 05.20.2022.
Ligji për parandalimin dhe luftimin e Krimeve Kibernetike në Kosovë. Gazeta Zyrtare e Republikës së Kosovës / Prishtinë: Viti V / nr. 74 / 20 Korrik 2010. Available at: https://gzk.rks-gov.net/ActDetail.aspx?ActID=2682 Last accessed: 05.18.2022.
Maddison, J. (2022). Statistikat e sigurisë kompjuterike. Fortinet Security. Available at: https://www.fortinet.com/resources/cyberglossary/cybersecurity-statistics Last accessed: 05.25.2022.
Mali, M. C. (2009). Classification Of Cyber Crimes. Lawyers Club India: Available at: https://www.lawyersclubindia.com/articles/Classification-Of-CyberCrimes--1484.asp#:~:text=Cyber%20crimes%20can%20be%20classified%20in%20to%204,Against%20Organization%204%20%284%29%20Cyber%20crime%20Against%20Society Last accessed: 05.27.2022.
Maloku, A. (2015). Bashkëpunimi ndërkombëtar policor në luftimin e krimit të organizuar. Regional Journal of Social Sciences Reforma. No.2. 2015 pp. 119-127.
Maloku, A. (2015). Fear of Violence and Criminality in the Region of Gjilan, Kosovo. Mediterranean Journal of Social Sciences, 6 (2 S5), 29–36. Doi:10.5901/mjss.2015.v6n2s5p29
Maloku, A. (2015). Rregullimi ndërkombëtar ligjor për të parandaluar abuzimin e drogave dhe substancave psikotrope. Balkan Journal of Interdisciplinary Research. Vol.1. No. 1. 2015. pp. 461-472.
Maloku, A. (2016). Karakteristikat e organizatave kriminale transnacionale. Buletini Shkencor Nr. 5 “DARDANIA. p. 10-24.: Qendra Kërkimore Zhvillimore – PEJA. Peje.
Maloku, A. (2019). Fjalor i terminologjik i viktimologjisë. Kolegji Iliria, Prishtinë,
Maloku, A. (2020). Theory of Differential Association. Academic Journal of Interdisciplinary Studies, 9 (1), 170. https://doi.org/10.36941/ajis-2020-0015
Maloku, A., Maloku, E. (2020). Protection of Human Trafficking Victims and Functionalization of Institutional Mechanisms in Kosovo. Acta Universitatis Danubius. Juridica, 16 (1), 21–44.
Maloku, A., Maloku, E. (2021). Fajlor i terminologjisë juridiko-penale për gazetarë. Kolegji Iliria, Prishtinë,
Maloku, E., Jasarevic, O., & Maloku, A. (2021). Assistance of the psychologist expert in the justice bodies to protect minors in Kosovo. EUREKA: Social and Humanities, (2), 52-60. https://doi.org/10.21303/2504-5571.2021.001649
Marie, B. H. (2019). Phone Phreaking. Encyclopaedia Britannica: Available at: https://www.britannica.com/topic/phreaking. Last accessed: 05.26.2022.
Neuber M., A. (2021). Gjurmimi i Kohës., Neuber Software: Available at: https://www.neuber.com/timeanalyzer/time-tracking.html Last access: 05.21.2022.
Poonia, A. S. (2014, Nënto-Dhjetor). Cyber Crime: Challenges and its Classification. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 3(6), 119. Available at: https://www.ijettcs.org/Volume3Issue6/IJETTCS-2014-12-08-96.pdf/ Last accessed: 10.06.2022
Rexhepi, K. (2013. Krimet Kibernetike - Kosovë., nga Akademia: Available at: https://www.academia.edu/21816119/Krimet_Kibernetike. Last access: 05.20.2022
Rai, D. (2019, Nëntor 13). Cyber Crime and Cyber Security : An overview. Pleaders - Intelligent Legal Solutions: Available at: https://blog.ipleaders.in/cyber-crime-and-cyber-security-an-overview/ Last accessed:06.06.2022
Stock, J. (2020, 08 04). Interpol: Krimet kibernetike kanë arritur nivel alarmant gjatë pandemisë.GazetaExpress. Available at: https://www.gazetaexpress.com/interpol-krimet-kibernetike-kane-arritur-nivel-alarmant-gjate-pandemise/
Shaik, D. N. (2018). Classification and Provisions of Cyber Crimes. Toppr Law: Available at: https://www.toppr.com/guides/business-laws-cs/cyber-laws/classification-of-cyber-crimes/ Last accessed: 05.27.2022.
Sharma, V. (2017). Classification of Cyber Crime and its differentiation from Conventional Crime. Available at: https://www.linkedin.com/pulse/classification-cyber-crime-its-differentiation-from-vivek-sharma Last accessed:27.05.2022.
Stewen, B. (2022). Cybersecurity Guide. Available at: https://cybersecurityguide.org/careers/cybercrimeinvestigator/#:~:text=A%20cybercrime%20investigator%20investigates%20a%20number%20of%20crimes,computers%20that%20can%20be%20used%20in%20prosecuting%20crimes. Last accessed: 05.27.2022.
Sumo, K. (2010). Top 20 Countries Found to Have the Most Cybercrime. Enigma Soft: Available at: https://www.enigmasoftware.com/top-20-countries-the-most-cybercrime/ Last accessed: 05.26.2022.
Tidy, J. K. (2021). The three Russian cyber-attacks the West most fears. BBC News: Available at: https://www.bbc.com/news/technology-60841924 /Last accessed: 05.25. 2022.
Vatis, M. A. (2009). The Council of Europe Convention on Cybercrime. (S. &. LLP, Re.) Available at:http://static.cs.brown.edu/courses/csci1800/sources/lec16/Vatis.pdf#:~:text=The%20Convention%20on%20Cybercrime%20is%20an%20international%20treaty,the%20Council%20of%20Europe%20%28COE%29%20in%20Strasbourg%2C%20France.3 /Last accessed: 05.18.2022.
William, L. (2022). What is hacking? Types of hackers/ Introduction of Cybercrime. (Krishna, Producenti) GURU Education : Available at: https://www.guru99.com/what-is-hacking-an-introduction.html Last accessed: 05.23.2022
Yassir, S. N. (2012, February). Cybercrime: A threat to Network Security. Available at: https://www.researchgate.net/publication/342210727_Cybercrime_A_threat_to_Network_Security Last accessed: 10.06.2022
Published
2022-07-18
How to Cite
Tufa, F. (2022). Cyber Crimes in Kosovo in 2020. International Journal of Social Science Research and Review, 5(7), 363-374. https://doi.org/10.47814/ijssrr.v5i7.517