CYBERCRIME AND LAW – MANAGING CHALLENGES AND PROSPECTS IN THE DIGITAL AGE
DOI:
https://doi.org/10.5937/ptp2502049MKeywords:
cybercrime, law, digital age, jurisdiction, international cooperationAbstract
Cybercrime has emerged as a global threat in the digital age, posing significant challenges to legal systems worldwide, particularly in terms of their effectiveness and applicability. This paper examines how these challenges are addressed within international and national legal frameworks, highlighting key obstacles and offering perspectives for improvement. It reviews existing legal mechanisms, such as the Budapest Convention, the General Data Protection Regulation (GDPR), and national legislation in Serbia, and evaluates their adaptability to contemporary technological threats and potential for reform. The research adopts an interdisciplinary methodology, combining theoretical analysis of international and domestic legal texts with empirical examination of statistical data and case records. Practical challenges of legal enforcement are assessed through a systematic review of relevant sources, including the number of reported cyberattacks, and insights drawn from Interpol and Europol reports. The findings highlight systemic challenges, such as jurisdictional limitations, ineffective laws, and insufficient technical capacities. Proposed solutions emphasize enhanced international cooperation, modernization of legal frameworks, investment in technology, and public education. The paper concludes that building legal resilience to cybercrime requires a coordinated international effort to address legal and technological vulnerabilities exploited by cybercriminals.
References
Behera, S. K. (2024). The Facebook data breach and its consequences for consumer privacy and cybersecurity. National Journal of Cyber Security Law, 7(1), pp. 1–6
Berris, P. G. (2020). Cybercrime and the law: Computer Fraud and Abuse Act (CFAA) and the 116th Congress. Congressional Research Service. Downloaded 2025, March 14 from https://www.congress.gov/crs_external_products/R/PDF/R46536/R46536.3.pdf
Beveridge, C. (2023). Irish Data Protection Commissioner imposes a €1.2 billion fine on Meta Ireland. BDO Global Portal. Downloaded 2025, February 28 from https://www.bdo.co.uk/en-gb/insights/advisory/risk-and-advisory-services/irish-data-protection-commissioner-imposesa-1-2-billion-fine-on-meta-ireland
Computer Fraud and Abuse Act, 18 U.S.C. § 1030 (1986).
Council of Europe. (2024). United Nations treaty on cybercrime agreed by the Ad Hoc Committee. Council of Europe Portal. Downloaded 2025, March 15 from https://www.coe.int/en/web/cybercrime/-/united-nations-treaty-on-cybercrime-agreed-by-the-ad-hoc-committee
Council of Europe. (2001). Convention on Cybercrime (European Treaty Series No. 185). Budapest, Hungary. Downloaded 2025, March 15 from https://rm.coe.int/1680081561
Domazet, S., Marković, D. M., & Skakavac, T. (2024). Privacy under threat – The intersection of IoT and mass surveilance. Pravo – teorija i praksa, 41(3), pp. 109–124. DOI:10.5937/ptp2403109D
Easterly, J., & Fanning, T. (2023). The attack on Colonial Pipeline: What we’ve learned & what we’ve done over the past two years. CISA America’s Cyber Defense Agency. Downloaded 2025, March 14 from https://www.cisa.gov/news-events/news/attack-colonial-pipeline-whatweve-learned-what-weve-done-over-past-two-years
eSentire. (2024). Cybersecurity Ventures report on cybercrime. eSentire. Downloaded 2025, March 5 from https://www.esentire.com/cybersecurity-fundamentals-defined/glossary/cybersecurity-venturesreport-on-cybercrime
European Parliament and Council. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council (General Data Protection Regulation) (Official Journal of the European Union, L 119/I of 4 May 2016). Downloaded 2025, February 28 from https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679
Griffiths, C. (2025). The latest 2025 ransomware statistics (updated January 2025). AAG. Downloaded 2025, March 5 from https://aag-it.com/the-latest-ransomware-statistics/
He, Y., Aliyu, A., Evans, M., & Luo, C. (2021). Health care cybersecrutiy challenge and solutions under the climate of COVID-19 scoping review. Journal of Medical Internet Research, 23(4), e21747. DOI: 10.2196/21747
Holm, P. (2025). Estonia’s bold approach to cyber security: A holistic model for Europe. e-Estonia. Downloaded 2025, March 22 from https://eestonia.com/estonias-cyber-security-model-for-europe/
Krivični zakonik [Criminal Code]. Službeni glasnik RS, br. 85/05, 88/05 – ispr., 107/05 – ispr., 72/09, 111/09, 121/12, 104/13, 108/14, 94/16, 35/19 i 94/24
Marković, D. M., & Zirojević, M. (2024). Izazovi u regulisanju i identifikaciji deepfake sadržaja [Challenges in regulating and identifying deepfake content]. In: Počuča, M. (ed.), XXI međunarodni naučni skup „Pravnički dani – Prof. dr Slavko Carić“ Odgovori pravne nauke na izazove savremenog društva [XXI International Scientific Conference “Legal days – Prof. Slavko Carić, PhD” The responses of legal sciences to the challenges of modern society] (pp. 679–692). Novi Sad: Univerzitet Privredna akademija u Novom Sadu, Pravni fakultet za privredu i pravosuđe u Novom Sadu, DOI: 10.5937/PDSC24679M
Matijašević, J., & Dragojlović, J. (2021). Metodika otkrivanja krivičnih dela računarskog kriminaliteta [Methodology of detection of computer crime offenses]. Kultura polisa, 18(2), pp. 51–63. DOI:10.51738/Kpolisa2021.18.2p.1.04
Mladenov, M. (2023). Human vs. Artificial intelligence – EU’s legal response. Pravo – teorija i praksa, 40(1), pp. 32–43. DOI:10.5937/ptp2300032M
Morgan, S. (2021). Cybersecurity jobs report: 3.5 million unfilled positions in 2025. Cybersecurity Ventures. Downloaded 2025, March 19 from https://cybersecurityventures.com/jobs-report-2021/
Muncaster, P. (2025). European police: Data volumes and deletion hindering investigations. Infosecurity Magazine. Downloaded 2025, February 28 from https://www.infosecurity-magazine.com/news/policedata-volumes-deletion/
Palatty, N. J. (2025). How many cyber attacks per day: The latest stats and impacts in 2025. Astra IT. Downloaded 2025, March 25 from https://www.getastra.com/blog/security-audit/how-many-cyber-attacks-per-day/
Samsoerizal, A. D., Hidayat, E. R., & Sukendro, A. (2022). Analytical study of Indonesian cybersecurity lesson learned from Estonian Cyberattacks in 2007. International Journal of Arts and Social Science, 5(2), pp. 31–36. https://www.ijassjournal.com/2022/V5I2/414659927.pdf
Szóka, B., & Boulton, S. (2025). UK encryption crackdown imperils privacy, security & free speech. Tech Policy Press. Downloaded 2025, March 15 from https://www.techpolicy.press/uk-encryption-crackdownimperils-privacy-security-free-speech/
Zakon o informacionoj bezbednosti [Law on Information Security]. Službeni glasnik RS, br. 6/16, 94/17, 77/19
Zirojević, M., & Ivanović, Z. (2021). Cyber law – Serbia. Belgrade: The Institute of Comparative Law
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Darko Marković, Darija Marković

This work is licensed under a Creative Commons Attribution 4.0 International License.






