Recent Developments of Cyber-Offences in Slovenia

Getoar Lubeniqi, sc. Andreja Primec, Dr.Sc. Bojan Tičar
{"title":"Recent Developments of Cyber-Offences in Slovenia","authors":"Getoar Lubeniqi, sc. Andreja Primec, Dr.Sc. Bojan Tičar","doi":"10.21113/IIR.V11I1.607","DOIUrl":null,"url":null,"abstract":"Digitalisation of the economy has exceeded its original boundaries and expanded to all areas of social life. In addition to all the benefits of digitalisation, it also creates risks of malicious use of the electronic information potential. Cyber security should play its part to prevent electronic information network and system intrusions, misuse of information, and to ensure smooth and secure information flow. \nResearch design of this paper is the set of three research methods used in collecting legal information about cyber security regulation and analysing findings. First approach is descriptive analysis of legal regulation. Second method is desktop analysis of recently adopted legal acts. Third research method is observational study. Synthesis is presented in the conclusions. \nLegal regulation of cyber security refers to protecting the data and information systems against unauthorised access, use, disclosure, disruption, alteration, or destruction. Cyber security is concerned with the confidentiality, integrity, and availability of data regardless of the form the data may take electronic, print or any other. \nThe Law of Minor Offences will apply to minor offences in the field of cyber security about “general” issues: liability of the perpetrator, imposition of sanctions, minor offence proceedings, etc., whereas the provisions of special legislation, more specifically, the provisions of the Cyber Security Law and the Electronic Communications Law, will apply to the identification of an act as a minor offence. \nHowever, in accordance with the lex specialis derogat legi generali principle, the general provisions of the Law of Minor Offences will apply only if such issues are not regulated otherwise by the Cyber Security Law and the Electronic Communications Law.","PeriodicalId":31358,"journal":{"name":"ILIRIA International Review","volume":"11 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ILIRIA International Review","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21113/IIR.V11I1.607","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Digitalisation of the economy has exceeded its original boundaries and expanded to all areas of social life. In addition to all the benefits of digitalisation, it also creates risks of malicious use of the electronic information potential. Cyber security should play its part to prevent electronic information network and system intrusions, misuse of information, and to ensure smooth and secure information flow. Research design of this paper is the set of three research methods used in collecting legal information about cyber security regulation and analysing findings. First approach is descriptive analysis of legal regulation. Second method is desktop analysis of recently adopted legal acts. Third research method is observational study. Synthesis is presented in the conclusions. Legal regulation of cyber security refers to protecting the data and information systems against unauthorised access, use, disclosure, disruption, alteration, or destruction. Cyber security is concerned with the confidentiality, integrity, and availability of data regardless of the form the data may take electronic, print or any other. The Law of Minor Offences will apply to minor offences in the field of cyber security about “general” issues: liability of the perpetrator, imposition of sanctions, minor offence proceedings, etc., whereas the provisions of special legislation, more specifically, the provisions of the Cyber Security Law and the Electronic Communications Law, will apply to the identification of an act as a minor offence. However, in accordance with the lex specialis derogat legi generali principle, the general provisions of the Law of Minor Offences will apply only if such issues are not regulated otherwise by the Cyber Security Law and the Electronic Communications Law.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
斯洛文尼亚网络犯罪的最新发展
经济数字化已经超越了最初的界限,扩展到社会生活的各个领域。除了数字化的所有好处之外,它还带来了恶意使用电子信息潜力的风险。网络安全应发挥作用,防止电子信息网络和系统被入侵、信息被误用,确保信息畅通、安全流动。本文的研究设计是三种研究方法的集合,用于收集有关网络安全监管的法律信息并分析研究结果。第一种方法是对法律规制进行描述性分析。第二种方法是对最近通过的法律行为进行桌面分析。第三种研究方法是观察性研究。在结论中给出了综合。网络安全的法律规制是指保护数据和信息系统免受未经授权的访问、使用、披露、破坏、修改或破坏。网络安全关注的是数据的保密性、完整性和可用性,无论数据以电子、打印或任何其他形式存在。《轻罪法》将适用于网络安全领域的轻罪,涉及“一般”问题:犯罪者的责任、制裁措施、轻罪诉讼程序等,而特别立法的规定,更具体地说,是《网络安全法》和《电子通信法》的规定,将适用于认定一项行为为轻罪。然而,根据特别克减一般法律原则,只有在《网络安全法》和《电子通信法》没有对此类问题作出其他规定的情况下,《轻罪法》的一般规定才适用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
审稿时长
6 weeks
期刊最新文献
Special register of child sexual abusers and pedophiles as a necessary preventive measure The role of Kosovo in littoralisation processes around the Adriatic and the Aegean Testing of Social Disorganization Theory Recent Developments of Cyber-Offences in Slovenia Labor market flexibility in transition countries: a case study of North Macedonia
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1