Advertisement

Legislative Frameworks Against Cybercrime: The Budapest Convention and Asia

  • Lennon Y. C. ChangEmail author
Living reference work entry
  • 9 Downloads

Abstract

Asia is one of the fastest-growing regions in the global e-commerce market place and has also been seen as the future of cybercrime. Cybercrimes are emerging in Asia, and the developing countries of the Association of Southeast Asian Nations (ASEAN) are becoming a hub for cybercriminals. To prevent Asia from becoming a cybercrime hub and safe-haven for cybercriminals, it is important that countries be equipped with comprehensive cybercrime laws aligned with international standards. This chapter reviews the development of the Internet in Asia (both Northeast and Southeast Asia) and examines existing legal measures adopted by these countries and compares them with the Council of Europe’s Convention on Cybercrime (Budapest Convention). The chapter finds that cybercrime laws in Northeast Asian countries are all aligned favorably with the Budapest Convention. While most ASEAN countries are favorably or moderately aligned with the Budapest Convention, more work needs to be done to support countries like Myanmar, Indonesia, and Cambodia to build cybercrime laws more closely aligned with the Budapest Convention. It suggests that actions need to be taken to reduce the digital divide and raise cybersecurity awareness among ASEAN member countries. It is also suggested that the Budapest Convention should be updated to match the development of new technologies and crime such as hate speech and fake news.

Keywords

Cybercrime law Asia ASEAN Legislative framework Digital divide Budapest Convention 

References

  1. ASEAN. (1967). The ASEAN Declaration (Bangkok Declaration). Retrieved November 20, 2018, from http://asean.org/the-asean-declaration-bangkok-declaration-bangkok-8-august-1967/
  2. ASEAN. (2003). The Singapore Declaration: An action agenda. Singapore: ASEAN.Google Scholar
  3. ASEAN. (2004). 2004 Joint communique of the fourth ASEAN ministerial meeting on transnational crime. Retrieved March 19, 2019, from https://asean.org/joint-communique-of-the-fourth-asean-ministerial-meeting-on-transnational-crime-ammtc-bangkok/
  4. ASEAN. (2008). EU-ASEAN workshop on cybercrime legislation in the ASEAN member states. Retrieved February 12, 2019, from https://www.asean.org/uploads/archive/apris2/file_pdf/Press%20Releases/EU-ASEAN%20Workshop%20on%20Cybercrime%20Legislation%20in%20the%20ASEAN%20Member%20States.pdf
  5. ASEAN. (2017). ASEAN Declaration to Prevent and Combat Cybercrime. Malina: ASEAN.Google Scholar
  6. ASEAN. (2018). ASEAN key figures 2018. Retrieved February 2, 2019, from https://asean.org/?static_post=asean-key-figures-2018
  7. Asian Development Bank. (2018). Embracing the e-commerce revolution in Asia and the Pacific. Retrieved May 14, 2019, from https://www.adb.org/sites/default/files/publication/430401/embracing-e-commerce-revolution.pdf
  8. Broadhurst, R., & Chang, L. Y. C. (2013). Cybercrime in Asia: Trends and challenges. In B. Hebenton, S. Y. Shou, & J. Liu (Eds.), Asian Handbook of criminology (pp. 49–64).Google Scholar
  9. Chang, L. Y. C. (2012). Cybercrime in the Greater China Region: Regulatory responses and crime prevention across the Taiwan Strait. Cheltenham: Edward Elgar.CrossRefGoogle Scholar
  10. Chang, L. Y. C. (2017). Cybercrime and cyber security in ASEAN. In J. Liu, M. Travers, & L. Chang (Eds.), Comparative criminology in Asia (pp. 135–148). New York: Springer.CrossRefGoogle Scholar
  11. Chang, J. Y. T. (2019, August 21). Twitter and Facebook suspend ‘China-linked’ accounts for misinformation. South China Morning Post. Retrieved September 1, 2019, from https://www.scmp.com/video/world/3023645/twitter-and-facebook-suspend-china-linked-accounts-misinformation
  12. Chang, L. Y. C., & Poon, R. (2017). Internet vigilantism: Attitudes and experiences of university students in Hong Kong. International Journal of Offender Therapy and Comparative Criminology, 61(6), 1912–1932.CrossRefGoogle Scholar
  13. Chang, L. Y. C., Zhong, Y. L., & Grabosky, P. (2018). Citizen co-production of cyber security: Self-help, vigilantes, and cybercrime. Regulation & Governance, 12(1), 101–114.CrossRefGoogle Scholar
  14. Chen, Q. (2017, August 2). Time for ASEAN to get serious about cybercrime. The Diplomat. Retrieved March 4, 2019, from https://thediplomat.com/tag/cyber-crime-in-asean/
  15. Cheng, K. (2018). Hong Kong’s top court to define dishonest access to computer charge. Hong Kong Free Press, 6 September 2019. Retrieved August 24, 2019, from https://www.hongkongfp.com/2018/09/06/hong-kongs-top-court-define-dishonest-access-computer-charge/
  16. Council of Europe. (2001). Convention on cybercrime. Retrieved November 17, 2019, from https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185
  17. Ericsson. (2015). Ericsson mobility report: On the pulse of the networked society. Retrieved February 9, 2019, from http://www.ericsson.com/res/docs/2015/mobility-report/ericsson-mobility-report-nov-2015.pdf
  18. Google-Temasek. (2018). E-Conomy SEA 2018: Southeast Asia’s Internet economy hits an inflection point. Retrieved February 14, 2019, from https://www.thinkwithgoogle.com/intl/en-apac/tools-resources/research-studies/e-conomy-sea-2018-southeast-asias-internet-economy-hits-inflection-point/
  19. Hadjy, P. (2019, March 13). As Internet adoption grows in Southeast Asia, SMEs must defend against sophisticated cyberattacks. South China Post. Retrieved May 14, 2019, from https://www.scmp.com/tech/innovation/article/3001365/internet-adoption-grows-southeast-asia-smes-must-defend-against
  20. ITU. (2017). Global Cybersecurity Index (GCI) 2017. Geneva: International Telecommunication Union.Google Scholar
  21. ITU. (2018). ICTEYE: Key ICT data and statistics. Retrieved February 4, 2019, from https://www.itu.int/net4/itu-d/icteye/CountryProfile.aspx
  22. Lee, S. F. (2018, April 5). Taiwanese government websites are under constant attack by the Chinese cyber army. Liberty Times. Retrieved September 10, 2019, from https://news.ltn.com.tw/news/focus/paper/1190027
  23. Lewis, J. (2018). Economic impact of cybercrime: No-slowing down. Santa Clara: McAfee.Google Scholar
  24. Lin, R., & Wu, F. (2019, April 27). Taiwan’s online ‘opinion war’ arrived. CommonWealth. Retrieved August 20, 2019, from https://english.cw.com.tw/article/article.action?id=2375
  25. Lum, A., & Lau, H. (2019, April 4). Hong Kong’s top court rules against one-size-fits-all charge for smartphone crimes. South China Morning Post. Retrieved August 24, 2019, from https://www.scmp.com/news/hong-kong/law-and-crime/article/3004587/hong-kongs-top-court-rules-against-one-size-fits-all
  26. McLaughlin, T. (2018, June 7). How Facebook’s rise fueled chaos and confusion in Myanmar. Wired. Retrieved August 20, 2019, from https://www.wired.com/story/how-facebooks-rise-fueled-chaos-and-confusion-in-myanmar/
  27. Mechkova, V., Pemstein, D., Seim, B., & Wilson, S. (2019). Digital Society Project dataset v1. Retrieved August 27, 2019, from http://digitalsocietyproject.org/data/
  28. Microsoft. (2016). PLATINUM: Targeted attacks in South and Southeast Asia. Microsoft: Seattle.Google Scholar
  29. Miniwatts Marketing Group. (2019). Internet World Stats. Retrieved August 25, 2019, from http://www.internetworldstats.com/stats.htm
  30. Motlagh, J. (2014, September 30). When a SIM card goes from $2,000 to $1.50. Bloomberg. Retrieved February 9, 2019, from http://www.bloomberg.com/news/articles/2014-09-29/myanmar-opens-its-mobile-phone-market-cuing-carrier-frenzy
  31. OECD. (2001). Understanding digital divide. Paris: OECD.Google Scholar
  32. Sattaburuth, A. (2019). Cybersecurity Bill passed. Bangkok Post. https://www.bangkokpost.com/news/security/1636694/cybersecurity-bill-passed. Accessed 8 Mar 2019.
  33. Stecklow, S. (2018, August 15). Why Facebook is losing the war on hate speech in Myanmar. Reuters. Retrieved August 20, 2019, from https://www.reuters.com/investigates/special-report/myanmar-facebook-hate/
  34. Stilgherrian. (2019, April 30). Vietnam ‘on the edge’ of becoming a mid-tier cybercrime hub. ZDnet. Retrieved April 14, 2019, from https://www.zdnet.com/article/vietnam-on-the-edge-of-becoming-a-mid-tier-cybercrime-hub/
  35. Subhan, A. (2018, May 20). Southeast Asia’s cybersecurity an emerging concern. The ASEAN Post. Retrieved May 14, 2019, from https://theaseanpost.com/article/southeast-asias-cybersecurity-emerging-concern
  36. Trautwein, C. (2015, March 25). Myanmar named fourth-fastest-growing mobile market in the world by Ericsson. Myanmar Times. Retrieved February 9, 2019, from http://www.mmtimes.com/index.php/business/technology/17727-myanmar-named-fourth-fastest-growing-mobile-market-in-the-world-by-ericsson.html
  37. Twitter Safety. (2019, August 19). Information operations directed at Hong Kong. Twitter. Retrieved August 24, 2019, from https://blog.twitter.com/en_us/topics/company/2019/information_operations_directed_at_Hong_Kong.html

Copyright information

© The Author(s), under exclusive licence to Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.School of Social SciencesMonash UniversityClaytonAustralia

Personalised recommendations