The authors present a more comprehensive analysis of two countries—the United States and Nigeria. The choice is based on the fact that the United States has a great experience of fighting cyber crimes and, as research has shown, is the only country where online identity theft is criminalized. While the situation in Nigeria is taken for an in-depth consideration because of its Criminal Code Act having a separate chapter in which personation is criminalized. Also, in this article, summarized information about other analyzed countries is presented, the differences of the existing criminal legislation are described and the variety of sanctions for online identity theft phases is discussed. However, the research has shown that the penalties imposed for online identity thefts (or its separate phases) are mostly fines or imprisonment. In this article, it is emphasized that online identity theft is not criminalized (except the United States), and this impedes the detection, investigation and prosecution of such conduct at both domestic and international levels. Therefore, the authors are going to bring online identity criminalization up for discussion on the basis of the research presented in this article.
The authors present a more comprehensive analysis of two countries—the United States and Nigeria. The choice is based on the fact that the United States has a great experience of fighting cyber crimes and, as research has shown, is the only country where online identity theft is criminalized. While the situation in Nigeria is taken for an in-depth consideration because of its Criminal Code Act having a separate chapter in which personation is criminalized. Also, in this article, summarized information about other analyzed countries is presented, the differences of the existing criminal legislation are described and the variety of sanctions for online identity theft phases is discussed. However, the research has shown that the penalties imposed for online identity thefts (or its separate phases) are mostly fines or imprisonment. In this article, it is emphasized that online identity theft is not criminalized (except the United States), and this impedes the detection, investigation and prosecution of such conduct at both domestic and international levels. Therefore, the authors are going to bring online identity criminalization up for discussion on the basis of the research presented in this article.
The authors of the present article analyze the criminal legislation of eight foreign countries (the United States, the United Kingdom, Nigeria, France, Finland, Estonia, Russia, China) as well as Lithuania in order to discuss and compare the criminalization aspects of online identity theft. Online identity theft is a rather new phenomenon and dangerous not only to separate individuals but to the whole society. It is concerned with the violation of consumer protection rules, security and privacy and anti-spam rules, etc. Online identity theft is a global problem, and this leads to the discussions whether it should be criminalized or not. The analysis is focused on the Three-Phase Model of online identity theft: obtaining identity-related information (phase 1), interaction with identity-related information (phase 2) and the use of the identity-related information in relation to a criminal offence (phase 3). The authors analyze whether in the countries under investigation online identity theft is treated as a criminal act or separate phases of it are considered as constituent elements of common crimes such as unlawful access to data, fraud, forgery, etc. only.The authors present a more comprehensive analysis of two countries—the United States and Nigeria. The choice is based on the fact that the United States has a great experience of fighting cyber crimes and, as research has shown, is the only country where online identity theft is criminalized. While the situation in Nigeria is taken for an in-depth consideration because of its Criminal Code Act having a separate chapter in which personation is criminalized. Also, in this article, summarized information about other analyzed countries is presented, the differences of the existing criminal legislation are described and the variety of sanctions for online identity theft phases is discussed. However, the research has shown that the penalties imposed for online identity thefts (or its separate phases) are mostly fines or imprisonment. In this article, it is emphasized that online identity theft is not criminalized (except the United States), and this impedes the detection, investigation and prosecution of such conduct at both domestic and international levels. Therefore, the authors are going to bring online identity criminalization up for discussion on the basis of the research presented in this article. ; Straipsnyje nagrinėjama tapatybės vagystės elektroninėje erdvėje kriminalizavimo būklė pasirinktose užsienio valstybėse, nustatant atitinkamų baudžiamųjų normų dispozicijas, įskaitant sankcijas. Analizuojamos pasirinktų aštuonių užsienio valstybių (Jungtinių Amerikos Valstijų, Jungtinės Karalystės, Nigerijos, Prancūzijos, Suomijos, Estijos, Rusijos, Kinijos) ir Lietuvos baudžiamųjų įstatymų teisės normos, nagrinėjant tapatybės vagystės kriminalizavimo būklę lyginamuoju aspektu. Tapatybės vagystės elektroninėje erdvėje kriminalizavimo būklė pasirinktose užsienio valstybėse analizuojama remiantis trijų stadijų tapatybės vagystės elektroninėje erdvėje kriminalizavimo modeliu. Analizuojama, kaip pasirinktose valstybėse kriminalizuotos atitinkamos modelio stadijos, apibendrinamos už pavojingas veikas nustatytų sankcijų rūšys ir dydžiai.
Given the global nature of cyber threats, assurance of a cyber security policy is very important not only at the local organisation level, but also at national and international level. Currently, cyber security as such is not suitably regulated internationally; therefore, the role of national cyber security strategies has become particularly significant. Lithuania is among the leaders in the EU and globally in the development of the optical fibre network. FTTP coverage has already reached 95%, the highest in the EU. Regardless of that, the cyber security programme effective in Lithuania does not provide conditions to ensure an appropriate level of cyber security and may not be regarded as a high-level contemporary strategic document in the area of cyber security. This article presents a study the main outcome of which are guidelines for a contemporary model of the Lithuanian national cyber security strategy. Based on comparative and historical studies as well as expert interviews conducted by authors and on the best practice of other countries, the article presents the elements of a model of the Lithuanian national cyber security strategy as well as guidelines on the content of these elements of the model. The article also reveals which elements of the model of the national cyber security strategy should most of all reflect the national situation and which elements may be unified and possibly also adapted in the cyber security strategies of other countries.
Given the global nature of cyber threats, assurance of a cyber security policy is very important not only at the local organisation level, but also at national and international level. Currently, cyber security as such is not suitably regulated internationally; therefore, the role of national cyber security strategies has become particularly significant. Lithuania is among the leaders in the EU and globally in the development of the optical fibre network. FTTP coverage has already reached 95%, the highest in the EU. Regardless of that, the cyber security programme effective in Lithuania does not provide conditions to ensure an appropriate level of cyber security and may not be regarded as a high-level contemporary strategic document in the area of cyber security. This article presents a study the main outcome of which are guidelines for a contemporary model of the Lithuanian national cyber security strategy. Based on comparative and historical studies as well as expert interviews conducted by authors and on the best practice of other countries, the article presents the elements of a model of the Lithuanian national cyber security strategy as well as guidelines on the content of these elements of the model. The article also reveals which elements of the model of the national cyber security strategy should most of all reflect the national situation and which elements may be unified and possibly also adapted in the cyber security strategies of other countries.