Show simple item record

dc.contributor.authorFerreira, Márcio Ricardo
dc.contributor.authorKawakami, Cynthia
dc.date.accessioned2019-02-05T12:03:26Z
dc.date.available2019-02-05T12:03:26Z
dc.date.issued2018-09-13
dc.identifier.citationADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, 7 (2018)
dc.identifier.issn2255-2863
dc.identifier.urihttp://hdl.handle.net/10366/139223
dc.description.abstractThe mankind faces a new overview to legally handle with the hyper-connected society, in which personal data and privacy are closely related. This globalization affected directly the criminality, both in its extension and in its structure and occurrence, entailing the occurrence of new criminal conduct, such as the ransomware. The problem is that, the few existent legislations do not successfully encompass the kidnap of personal data for ransom. In this regard, this paper proposes an analysis on the vulnerability of personal data in the New Information Technologies and the Communication, the scope is to analyze the conduct and propose new solutions, aiming to bring more legal certainty to this issue. This new criminological reality deserves reflection, therefore, the present paper will adopt the comparative-deductive method to examine what the existent doctrine and jurisprudence state, in order to assess the necessity (or not) of the creation of a specific criminal legislation for privacy and personal data security of the Internet’s user. The main result found is the necessity of the creation of an autonomous field of Criminal Cyber Law to handle with the offensive conducts against information and the legislative evolution demanded to offer specific solutions to RANSOMWARE, which is a new conduct, extremely different from the extortion and kidnapping that society is used to, typical in this new reality where the Information Society lives.
dc.description.abstractThe mankind faces a new overview to legally handle with the hyper-connected society, in which personal data and privacy are closely related. This globalization affected directly the criminality, both in its extension and in its structure and occurrence, entailing the occurrence of new criminal conduct, such as the ransomware. The problem is that, the few existent legislations do not successfully encompass the kidnap of personal data for ransom. In this regard, this paper proposes an analysis on the vulnerability of personal data in the New Information Technologies and the Communication, the scope is to analyze the conduct and propose new solutions, aiming to bring more legal certainty to this issue. This new criminological reality deserves reflection, therefore, the present paper will adopt the comparative-deductive method to examine what the existent doctrine and jurisprudence state, in order to assess the necessity (or not) of the creation of a specific criminal legislation for privacy and personal data security of the Internet's user. The main result found is the necessity of the creation of an autonomous field of Criminal Cyber Law to handle with the offensive conducts against information and the legislative evolution demanded to offer specific solutions to RANSOMWARE, which is a new conduct, extremely different from the extortion and kidnapping that society is used to, typical in this new reality where the Information Society lives.
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherEdiciones Universidad de Salamanca (España)
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 Unported
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/3.0/
dc.subjectComputación
dc.subjectInformótica
dc.subjectComputing
dc.subjectInformation Technology
dc.titleRansomware - Kidnapping personal data for ransom and the information as hostage
dc.typeinfo:eu-repo/semantics/article
dc.rights.accessRightsinfo:eu-repo/semantics/openAccess


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 Unported
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 Unported