Although it has onlyappeared in the recent decade, due to the outstanding development of scienceand technology, especially the Internet, crimes using high technology havearisen, existed
lOMoARcPSD|38544120 MINISTRY OF JUSTICE HANOI LAW UNIVERSITY GROUP ASSIGNMENT SUBJECT: LEGAL ENGLISH TOPIC: CYBERCRIME: A THREAT TO A MORAL SOCIETY FULL NAME Nguyen Thao Nguyen 453015 Bui Le Thao Linh 453016 GROUP Nguyen Viet Linh 453020 CLASS 06 TAPL2-TMQT-NO3 TABLE OF CONTENTS Downloaded by Uy vu Nguyen (tailieuso.11@gmail.com) lOMoARcPSD|38544120 A INTRODUCTION .1 B CONTENTS .1 I CONCEPTUALIZING CYBERCRIME 1 II HOW TO IDENTIFY CYBERCRIME 1 1 Statistics on the Cybercrime Landscape 1 2 Classification of Cybercrime .2 3 Examples of Cybercrime 4 III THE GLOBAL CYBERCRIME PICTURE 4 1 How Does the Threat of Cybercrime Differ Around the World? 4 2 The Perception Of Consequences In Cybercrime 6 IV LEGAL DOCUMENTS ON THE PREVENTION AND COMBAT OF CYBERCRIME .7 1 Cybercrime under transnational criminal law 7 2 Cybercrime under Vietnamese criminal law 8 V CHALLENGES AND SOLUTIONS AGAINST CYBERCRIME 9 1 Loopholes in legal documents on cybercrime 9 2 The need to improve the law on cybercrime 10 C CONCLUSION 11 REFERENCES AND ACKNOWLEDGEMENTS 12 Downloaded by Uy vu Nguyen (tailieuso.11@gmail.com) lOMoARcPSD|38544120 Page |1 A INTRODUCTION Currently, the scientific and technological revolution is developing rapidly on a global scale, including in the fields of information technology and telecommunications networks The outstanding development of digital technology has been and is the foundation for the development of economic and social fields, from manufacturing, industry and information services to culture, entertainment, and transportation, medical Along with the development and popularity of information technology is the appearance of increasingly complex crimes in the cyber domain Although it has only appeared in the recent decade, due to the outstanding development of science and technology, especially the Internet, crimes using high technology have arisen, existed and developed rapidly in many countries around the world The situation of high-tech crime continues to be complicated and unpredictable, occurring in many fields of different countries Perhaps never before had criminals used the Internet to commit crimes as much as now when the world is entering the 4.0 industrial era B CONTENTS I CONCEPTUALIZING CYBERCRIME There is no universally accepted definition of cybercrime However, the following definition includes elements common to existing cybercrime definitions: Cybercrime is an act that violates the law, which is perpetrated using information and communication technology to either target networks, systems, data, websites or technology or facilitate a crime1 Cybercrime differs from traditional crime in that it "knows no physical or geographic boundaries" and can be conducted with less effort, greater ease and at greater speed than traditional crime II HOW TO IDENTIFY CYBERCRIME 1 Statistics on the Cybercrime Landscape No country, no company, no individual can be immune to cybercrime or the damage it can cause Especially during the Covid-19 pandemic, which has forced companies to come up with work-from-home policies This makes cybercrime more dangerous than ever before Here are some statistics on cybercrime 1 UNODC (2019), Cybercrime in brief Downloaded by Uy vu Nguyen (tailieuso.11@gmail.com) lOMoARcPSD|38544120 Page |2 Firstly, we have numbers that will give you an idea of how widespread cybercrimes are in an increasingly digital and connected world According to the statistics of Ga I Lup in 2020, Among the 13 crimes measured, the top two most worrisome for Americans are cybercrimes 72% feared computer hackers accessing their personal, credit card, or financial information, and 66% worry about identity theft Each year since 2001, the monetary damage caused by cybercrime has been increasing exponentially It already reached around $4.2 billion in 20202 That number does not include damages from unreported cases These attacks on different countries included assaults on defense agencies, government and federal systems, and prominent tech companies.3 Secondly, the data breach numbers make us more concerned about the dangers of cybercrime today In January 2019 alone, 1.76 billion records were leaked from various data breaches around the world.4 In the first three quarters of 2020, there were 2,953 reported breaches across the globe It was a 51% decrease compared to the same period in 2019 However, a staggering 36 billion records were exposed by the end of September 2020, making it the worst year on record in terms of data breaches.5 The global cost of cybercrime reached over $2 trillion in 2020.6 2 Classification of Cybercrime The varying definitions of cybercrime and focus of researchers due to differing academic background and goals have led to numerous proposed taxonomies These taxonomies are based on factors such as, target, technological dependence, classes of offenders, method/tool used, degree of penetration, and motives The overlap of classifications is seen particularly in the extant literature, which categorizes cybercrime based on the computer's relationship to the crime i.e technology based taxonomies The most well-known of which is “Crime and the Internet” of David.S.Wall (2001)7, which divides cybercrimes into the following categories: cyber-trespass (e.g hacking), 2 Joseph Johnson ( 2021), “Total damage caused by reported cyber crime 2001-2020”, Statista 3 SecurityBrief, 2020 4 IT Governance, 2019 5 RiskBased Security, 2020 6 Juniper Research, 2019 7 David.S.Wall 2001 Crime and the Internet New York: Routledge Downloaded by Uy vu Nguyen (tailieuso.11@gmail.com) lOMoARcPSD|38544120 Page |3 cyber deception and theft (e.g identity theft), cyber-porn and obscenity (e.g.exploitation) and cyber-violence (e.g cyberstalking) This typology by Wall (2001) can be simplified as crimes in the device, crimes using the device and crimes against the device Crimes in the device relate to where the devices content is prohibited or illegal and can lead to violence or hate crimes Crimes using the device apply to crimes where technology is used to engage and or deceive the intended victim i.e crimes against the individual The final category of crimes against the device relate to situations where the device, system or network are compromised by directly attacking the factors of Confidentiality, Integrity and Availability, which is collectively called the CIA triad “Cybercrime and society”of Yar Majid (2006)8 later added a new type of activity to the four above, which is “crime against the state” “Crimes against the state” are those activities that threaten the integrity of a nation's infrastructure such as: (cyber) terrorism, (cyber) espionage and disclosure of official secrets Another taxonomy categorizes cybercrime in terms of the specific role of the computer in the crime: crimes where the computer is the target; crimes where a computer is the medium; and crimes where the presence of computers is incidental Building on Wall's (2001) four-category typology, a new taxonomy – “The Internet as a Conduit for Criminals” of David.S.Wall (2005) later emerged which expresses cybercrimes in terms of differing relation to a terrestrial crime or the importance of cyberspace in their execution This taxonomy drew on the precedents of criminal justice and suggests that computers are a tool that facilitates terrestrial crimes, making cybercrime a new category of traditional crime rather than a new area This new taxonomy classifies cybercrimes into three categories9: 1) Computer-assisted crimes - traditional crimes adapted to be committed through cyberspace; 2) Computer content crimes - partially new crimes, which are known crimes that are modified to better correspond and react to the new media and 3) Computer integrity crimes - new crimes that have been made possible by the existence and scope of cyberspace 8 Yar, Majid., Cybercrime and society 2006 London: Sage 9 Wall, D.S (2005) , The Internet as a Conduit for Criminals Downloaded by Uy vu Nguyen (tailieuso.11@gmail.com) lOMoARcPSD|38544120 Page |4 The above is a series of classification strategies related to cybercrime, however, the majority in their simplest form group the crimes based on the role/dependency/importance of technology in the execution of the crime This is important as it demonstrates a recurring theme of technology's defining role in cybercrime and the possible proportional nature of technology to the nature of specific cybercrimes.10 3 Examples of Cybercrime Firstly about crimes where a computer or network is the target of the crime In this case that includes DDoS attack and malware One of the most commonly seen examples of cybercrime is a distributed Dos attack These attacks are mainly performed to shut down systems or networks Malware is used to infect systems or networks and harm users by damaging their software, data or entire systems Malware is often used to encrypt or shut down the targeted devices until a ransom is paid.11 Secondly about crimes in which the computer is used as a tool to facilitate traditional criminal activities Cybercrimes usually send fraudulent emails or messages to victims and redirect them to fake sites The site can be an exact copy of any popular site and looks trustworthy Because of this, users enter their personal information such as usernames, passwords, bank details, or other important data, without knowing that these details are directly reaching cybercriminals A credential attack is the most common example of cybercrime, where a cybercriminal aims to steal information about a user's financial accounts In most cases, this type of attack is carried out using brute-force by installing the Keylogger software, which secretly logs everything that the user enters via the keyboard Another common example of cybercrime is website hacking where cybercriminals try to gain access to the website and change or remove content without authorization III THE GLOBAL CYBERCRIME PICTURE 1 How Does the Threat of Cybercrime Differ Around the World? 10 Smith, Troy; Stamatakis, Nikolaos (2020), “Defining Cybercrime in Terms of Routine Activity and Spatial Distribution: Issues and Concerns”, International Journal of Cyber Criminology; Thirunelveli Vol 14, Iss 2 11 What is Cybercrime: Definition & Examples (2020), Tutorials Mate Downloaded by Uy vu Nguyen (tailieuso.11@gmail.com) lOMoARcPSD|38544120 Page |5 Nowadays, the digital revolution has truly changed the way we live our lives and become an integral part of everyday life However, this digital frontier opens up a world of risk With everyone on the planet just a click of a button away, it has never been easier for fraudsters and criminals to find unsuspecting victims To find out if the dangers of cybercrime are equally spread across the globe, a survey in 2021 from the cybersecurity firm SEON was born with the aim of combined data from a variety of cybersecurity indices and indicators to come up with a global ranking of countries that are least and most at risk of cybercrime12 SEON first collected data from the National Cyber Security Index (NCSI), which ranks every country based on the strength of their cybersecurity measures The company then took data from a similar ranking, the Global Cybersecurity Index 2020, which also ranked countries based on their respective cybersecurity practices Data from both of these sources were used since they used different criteria to rank each country In addition to these various indices, SEON looked at the strength of cybercrime legislation in each country About the lowest-risk countries for cyberthreats, at the top of the ranking for most cyber secure countries, Denmark secured an overall cybersafety score of 8.91, doing particularly well on the Cybersecurity Exposure Index, where it scored just 0.117 Germany came second overall, with a Cyber- Safety Score of 8.76 This tells us that Germany is generally a very safe place for people to use the internet The United States placed third in the rankings with a Cyber-Safety Score of 8.73, just missing out on second place This high score was helped by the USA getting the highest score in the Global Cybersecurity Index while also performing well in terms of low cybersecurity exposure and strong legislation Other countries that made it to the top 10 of most secure countries were, in order of ranking, Norway, the UK, Canada, Sweden, Australia, Japan and Netherlands At the other end of the scale are the countries with the highest risk for cyberattacks These countries have very weak cybercrime laws or even none at all, and therefore pose the greatest risk to transactions involving personal information, the report said Myanmar has the worst ranking for internet safety, at just 2.22 on the SEON Global Cybersecurity Index Myanmar 12 Gergo Varga (2021), Global Cybercrime Report: Which Countries Are Most At Risk, SEON Downloaded by Uy vu Nguyen (tailieuso.11@gmail.com) lOMoARcPSD|38544120 Page |6 scores poorly across the board, especially in terms of legislation, as hardly any has been enacted to put barriers in the way of cybercriminal Cambodia follows Myanmar with a cybersafety score of 2.67, the second-worst overall score in the SEON rankings Cambodia performs marginally better than Myanmar in every metric other than the Global Cybersecurity Index Honduras takes third place with a score of 3.13 The Central American country scored lowest on the Global Cybersecurity Index of any in the study while performing poorly in all other areas However, Honduras does perform twice as well as Myanmar and Cambodia in terms of anti-cybercrime legislation.The other countries in the list of those most at risk of cyberthreats are (from most at risk to least): Bolivia, Mongolia, Algera, Zimbabwe, Nicaragua, Bosnia-Herzegovina, and El Salvador 2 The Perception Of Consequences In Cybercrime The impacts of a single, successful cyber attack can have far-reaching implications including financial losses, theft of intellectual property, and loss of consumer confidence and trust The Internet, in particular, is a great tool for scammers and other miscreants, since it allows them to ply their trade while hiding behind a shield of digital anonymity Cybercrime affects society in a number of different ways, both online and offline Identity theft: Becoming the victim of cyber crime can have long-lasting effects on life One common technique scammers employ is phishing, sending false emails purporting to come from a bank or other financial institution requesting personal information If one hands over this information, it can allow the criminal to access one's bank and credit accounts, as well as open new accounts and destroy credit ratings Security costs: Cyber criminals also focus their attacks on businesses, both large and small Hackers may attempt to take over company servers to steal information or use the machines for their own purposes, requiring companies to hire staff and update software to keep intruders out According to EWeek, a survey of large companies found an average expenditure of $8.9 million per year on cyber security, with 100 percent of firms surveyed Downloaded by Uy vu Nguyen (tailieuso.11@gmail.com) lOMoARcPSD|38544120 Page |7 reporting at least one malware incident in the preceding 12 months and 71 per cent reporting the hijacking of company computers by outsiders13 Monetary losses: The overall monetary losses from cyber crime can be immense According to a 2012 report by Symantec, more than 1.5 million people fall victim to some sort of cyber crime every day.With an average loss of $197 per victim, this adds up to more than $110 billion dollars lost to cyber crime worldwide every year As consumers get wise to traditional avenues of attack, cyber criminals have developed new techniques involving mobile devices and social networks to keep their illicit gains flowing Piracy: The cyber crime of piracy has had major effects on entertainment, music and software industries Claims of damages are hard to estimate and even harder to verify, with estimates ranging widely from hundreds of millions to hundreds of billions of dollars per year In response, copyright holders have lobbied for stricter laws against intellectual property theft, resulting in laws like the Digital Millennium Copyright Act These laws allow copyright holders to target file sharers and sue them for large sums of money to counteract the financial damage of their activities online Social impacts: Cyber criminals take full advantage of anonymity, secrecy, and interconnectedness provided by the Internet, therefore, attacking the very foundations of our modern information society Cybercrime can involve botnets, computer viruses, cyber bullying, cyber stalking, cyber terrorism, cyber pornography, denial of service attacks, hacktivism, identity theft, malware, and spam Computer-related crimes date back to the origins of computing though the greater connectivity between computers through the Internet has brought the concept of cybercrime into the public consciousness of our information society "Billions of dollars in losses have already been discovered Billions more have gone undetected Trillions will be stolen, most without detection, by the emerging master criminal of the twenty-first century-the cyberspace offender" (Stephens, 1995, p 24) Emotional impact of cyber crime: A new study by Norton reveals the staggering prevalence of cyber crime About 65 percent of Internet users globally, and 73 percent of US Web surfers have fallen victim to cyber crimes, including computer viruses, online credit card fraud and identity 13 Mohammad Anisur Rahaman ( 2016), “Cyber crime affects society in different ways”, The Financial Express Downloaded by Uy vu Nguyen (tailieuso.11@gmail.com) lOMoARcPSD|38544120 Page |8 theft The first study to examine the emotional impact of cyber crime shows that victims' strongest reactions are feeling angry (58 percent), annoyed (51 percent) and cheated (40 percent), and in many cases, they blame themselves for being attacked Only 3 percent don't think it will happen to them, and nearly 80 percent do not expect cyber criminals to be brought to justice resulting in an ironic reluctance to take action and a sense of helplessness IV LEGAL DOCUMENTS ON THE PREVENTION AND COMBAT OF CYBERCRIME 1 Cybercrime under transnational criminal law The complex nature of cybercrime, as one that takes place in the borderless realm of cyberspace, is compounded by the increasing involvement of organized crime groups Perpetrators of cybercrime and their victims, are often located in different regions and its effects ripple through societies around the world This highlights need to mount an urgent, dynamic and international response The United Nations passed General Assembly resolution 65/230 and Commission on Crime Prevention and Criminal Justice resolutions 22/7 and 22/8, created the Global Programme on Cybercrime to assist Member States in their struggle against cyber-related crimes through capacity building and technical assistance14 On October 27, 2015, with 74 votes in favor and 21 against, the US Senate passed the Cybersecurity Information Sharing Bill (CISA) to create a solid defense system in cyberspace, despite objections from the US Senate In fact, in the US, acts that are considered illegal are very clearly stated in the US Code of Conduct, such as identity theft, hacking into computer systems, intellectual property infringement With huge data "stores", on May 9, 2015, the European Union (EU) began to enforce the first Cybersecurity Law These provisions apply not only to organizations operating within the EU, but also to organizations that process the data of any EU resident Regardless of physical location, if an EU citizen's data is being processed, existing organizations are subject to this regulation Fines have also become heavier and can total up to 20 million euros or 4% of annual revenue15 14 UNODC (2019), Global Programme on Cybercrime 15Mỹ Nga (2018), “Luật An ninh mạng - “Tấm khiên” pháp lý của nhiều quốc gia trên thế giới”, Báo Nghệ An Downloaded by Uy vu Nguyen (tailieuso.11@gmail.com) lOMoARcPSD|38544120 Page |9 Since November 2014, Japan has promulgated the Basic Law on Cybersecurity Accordingly, the government developed a security strategy, as well as the Cybersecurity Strategic Command established under the Japanese Cabinet, with the aim of comprehensively and effectively promoting cybersecurity policies Australia is a country with a relatively complete legal framework for cybersecurity, including: Law on cybercrime; Law on spam e-mail; Law on Telecommunications and Law on Privacy The Cybercrime Law provides comprehensive provisions on Internet and computer-related crimes such as unauthorized access, computer intrusion, data corruption and obstruction of access to computers, data theft, computer fraud, cyberstalking, harassment and possession of child pornography 2 Cybercrime under Vietnamese criminal law In Vietnam, according to Clause 1, Article 3 of Decree No 25/2014/ND- CP of the Government dated April 7, 2014 stipulates: “Criminals using high technology are acts dangerous to society as regulated in the Penal Code with the use of high technology” Resolution No 08/NQ-TW dated December 17, 1998 of the Politburo on the National Security Strategy warned and pointed out challenges to national security, including the issue of crime use of high technology The Resolution of the 11th National Congress of the Party also pointed out that: "Non-traditional security threats and high-tech crimes continue to increase "These contents are also continuously evaluated and recorded at the Document of the 12th National Party Congress Accordingly, ensuring network safety and security is a key goal of national defense and security The document emphasized "strengthening national defense and security to firmly protect the Socialist Fatherland be ready to respond to traditional and non-traditional security threats, ensure security and safety of information, network security"16 According to the Penal Code No 100/2015/QH13, crimes related to computers and computer networks are specified in Articles 224, 225 and 226 V CHALLENGES AND SOLUTIONS AGAINST CYBERCRIME 16 Lê Thị Hồng Xuân, Nguyễn Thị Thùy Linh ( 2021), “Tội phạm mạng trong kỷ nguyên cách mạng công nghiệp 4.0”, Viện Hàn lâm Khoa Học Xã Hội Việt Nam Downloaded by Uy vu Nguyen (tailieuso.11@gmail.com) lOMoARcPSD|38544120 P a g e | 10 1 Loopholes in legal documents on cybercrime The first is the limitation of the harmonization of criminal law on cybercrime which has not received much attention Current criminal law harmonization exists on two levels According to the popularity level, it is to criminalize certain acts to create a legal basis for criminal prosecution and to provide criminal legal assistance when necessary With the first level, which criminalizes acts to create a legal basis for criminal prosecution, now nine out of ten ASEAN countries have enacted their own laws on preventing cybercrime Laos has only enacted the Law on prevention and combating cybercrime in September 2014 (law on prevention and combating cybercrime) Cambodia has not yet issued its own law on cybercrime prevention In the case of Vietnam, a number of terms with the same connotation have been used in Vietnamese legal documents current such as: high-tech crime; crimes using high technology; cybercrime; cyber security crimes; cyber attack; cyber terrorism; cyber espionage In the 2018 Law on Cybersecurity, Article 2 explains the type of "cybercrime" and puts it in relation to a series of other violations committed in cyberspace, but not any guiding documents explaining, distinguishing and clarifying these types of violations In the 2015 Penal Code no use the term “high-tech crime” or “cybercrime” which is specified in the manner of listing Such a method of regulation according to the method of enumeration format is completely capable of omitting the types of high-tech crimes, which have extremely complex variations and are not particularly compatible with the approach of the criminal justice system, legal documents of ASEAN as well as other relevant legal documents Vietnam's approach to high-tech crime may not be different from the norm in international commitments of the ASEAN region, but the inconsistency in the use of terminology as well as the criminal scope The "coverage" has not yet been ensured, which will partly affect the legal harmonization process, hinder the implementation of Vietnam's commitments as an active and responsible member state within the Downloaded by Uy vu Nguyen (tailieuso.11@gmail.com) lOMoARcPSD|38544120 P a g e | 11 cooperation frameworks of ASEAN in general and cooperation in the field of crime prevention and control in particular.17 2 The need to improve the law on cybercrime It is necessary to strengthen propaganda, dissemination and education of the law in general, the Law on Cybersecurity in particular, and the law on human rights to raise awareness and sense of responsibility for the whole society, especially of agencies, businesses and individuals on protecting state secrets in cyberspace, on respecting and protecting everyone's rights in cyberspace In particular, it is necessary to raise awareness about the consequences of violating the right of people to self-determination, and human rights in cyberspace will have to take legal responsibility seriously Paying attention to education for children and women to raise awareness of being able to protect themselves to avoid becoming victims of high-tech crimes and serious violations of human rights At the same time, there should be a mechanism to rescue victims, especially children Due to the sophisticated and complicated developments of crimes, it is extremely important to regularly update the cybercrime database system through upgrading the technical system, contributing to enhancing information exchange through existing communication channels such as INTERPOL's criminal database system As for Vietnam, it is necessary to continue to improve the law on cyber security to meet the requirements of preventing, fighting and handling acts of using cyberspace to violate human rights In particular, focus on completing regulations on expanding the content of principles of network security protection Specifically, according to the provisions of Article 4 of the 2018 Law on Cybersecurity, defining principles mainly focus on factors such as "compliance with the Constitution and the law", "under the leadership of the Communist Party of Vietnam", "ensure national security" mainly focus on preserving national security in cyberspace but the principle of ensuring human rights in cyberspace has not been paid due attention to create a solid 17 ĐỖ QUÍ HOÀNG (2021), “Khung pháp về cơ chế hợp tác phòng chống tội phạm mạng trong khu vực Asean”, 25 năm Việt Nam gia nhập ASEAN - Thực tiễn thực hiện nghĩa vụ thành viên và triển vọng Downloaded by Uy vu Nguyen (tailieuso.11@gmail.com) lOMoARcPSD|38544120 P a g e | 12 legal basis for the prevention of human rights violations in cyberspace Therefore, it is necessary to define principles of network security protection in the direction of ensuring human rights, on the basis of not infringing upon national security, social order and safety as well as the legitimate rights and interests of other subjects C CONCLUSION In short, in the face of the information explosion, crimes using high technology are also growing, both in number and in its dangerous nature In order to meet the requirements of detecting, investigating and handling crimes using high technology, first of all, it must be identified with a full range of specific methods, tricks, and behaviors, as a theoretical basis for handling crimes, applied to the practice of investigating and discovering crimes using high technology.So,this group assignment provides a basic introduction to cybercrime, the concepts involved and the challenges faced in investigating and preventing cybercrime However, this is only an overview of the cybercrime threats countries face today and how security and prevention measures affect and impact cybercrime trends future REFERENCES AND ACKNOWLEDGEMENTS 1 UNODC (2019), Cybercrime in brief 2 SecurityBrief, 2020 3 IT Governance, 2019 4 RiskBased Security, 2020 5 Juniper Research, 2019 Downloaded by Uy vu Nguyen (tailieuso.11@gmail.com) lOMoARcPSD|38544120 P a g e | 13 6 Joseph Johnson ( 2021), “Total damage caused by reported cyber crime 2001-2020”, Statista 7 What is Cybercrime: Definition & Examples (2020), Tutorials Mate, 8 ĐỖ QUÍ HOÀNG (2021), “Khung pháp về cơ chế hợp tác phòng chống tội phạm mạng trong khu vực Asean”, 25 năm Việt Nam gia nhập ASEAN - Thực tiễn thực hiện nghĩa vụ thành viên và triển vọng 9 Smith, Troy; Stamatakis, Nikolaos (2020), “Defining Cybercrime in Terms of Routine Activity and Spatial Distribution: Issues and Concerns”, International Journal of Cyber Criminology; Thirunelveli Vol 14, Iss 2 10.Lê Thị Hồng Xuân, Nguyễn Thị Thùy Linh ( 2021), “Tội phạm mạng trong kỷ nguyên cách mạng công nghiệp 4.0”, Viện Hàn lâm Khoa Học Xã Hội Việt Nam 11.UNODC (2019), Global Programme on Cybercrime 12.Mỹ Nga (2018), “Luật An ninh mạng - “Tấm khiên” pháp lý của nhiều quốc gia trên thế giới”, Báo Nghệ An 13.Mohammad Anisur Rahaman ( 2016), “Cyber crime affects society in different ways”, The Financial Express 14 Gergo Varga (2021), Global Cybercrime Report: Which Countries Are Most At Risk, SEON 15 David.S.Wall 2001 Crime and the Internet New York: Routledge 16.Yar, Majid., Cybercrime and society 2006 London: Sage 17.Wall, D.S (2005) , The Internet as a Conduit for Criminals BIÊN BẢN XÁC ĐỊNH MỨC ĐỘ THAM GIA VÀ KẾT QUẢ THAM GIA LÀM BÀI TẬP NHÓM Downloaded by Uy vu Nguyen (tailieuso.11@gmail.com) lOMoARcPSD|38544120 P a g e | 14 Ngày: 10/02/2022 Địa điểm: Đại học Luật Hà Nội Nhóm số: 06 Lớp: 4530A Khoa: Luật TMQT Khóa: K45 Tổng số sinh viên của nhóm: 03 + Có mặt: 03 + Vắng mặt: 0 Có lý do:………Không có lý do:…………… Nội dung: BT nhóm Tên bài tập: CYBERCRIME: A THREAT TO A MORAL SOCIETY Môn học: Tiếng anh pháp lí Xác định mức độ tham gia và kết quả tham gia của từng thành viên trong việc thực hiện bài tập nhóm Kết quả như sau: STT Mã số Họ và tên Đánh giá Đánh giá của giáo viên SV của SV SV kí A B C tên Điểm Điểm GV kí (số) (chữ) tên 1 453015 Nguyễn Thảo Nguyên x Nguyên 2 453016 Bùi Lê Thảo Linh x Linh 3 453020 Nguyễn Việt Linh x Linh Hà Nội, ngày 10 tháng 02 năm 2022 TRƯỞNG NHÓM Linh Bùi Lê Thảo Linh Kết quả điểm bài viết + Giáo viên chấm thứ nhất:…………… + Giáo viên chấm thứ hai:……………… Kết quả điểm thuyết trình: Giáo viên cho thuyết trình:…………… Điểm kết luận cuối cùng: Giáo viên đánh giá cuối cùng:………… Downloaded by Uy vu Nguyen (tailieuso.11@gmail.com)