ArticlePDF Available

Cyberbullying Legislation In Poland And Selected EU Countries

Authors:
  • The Jacob of Paradies University, Gorzow Wielkopolski, Poland

Abstract

Cyberspace used by all the institutions and structures of the EU and EC (developing networks of common use and specialized networks), with a wide access for individual customers. All of this is governed by relatively few regulations. However, given that Community law (acquis communautaire) is a hierarchically organized system of rules, it should initially be assumed that regulations on cyberspace would become a part of this system, i.e. subsystem. The common interest requires that the network users know those regulations and that measures for the elimination of cybercrime have been taken. The purpose of this article is to analyze the laws in terms of their legitimacy with the intent of the legislature and the public needs for cyber bullying in Poland and the EU law.
Procedia - Social and Behavioral Sciences 109 ( 2014 ) 29 – 34
1877-0428 © 2014 The Authors. Published by Elsevier Ltd.
Selection and peer review under responsibility of Organizing Committee of BEM 2013.
doi: 10.1016/j.sbspro.2013.12.416
ScienceDirect
2nd World Conference On Business, Economics And Management -WCBEM 2013
Cyberbullying Legislation In Poland
And Selected EU Countries
Sylwia Ćmiela*
aAlcide De Gasperi University of Euroregional Economy in Józefów, 2 Sienkiewicza St. Józefów 05-420, Poland
Abstract
Cyberspace used by all the institutions and structures of the EU and EC (developing networks of common use and
specialized networks), with a wide access for individual customers. All of this is governed by relatively few
regulations. However, given that Community law (acquis communautaire) is a hierarchically organized system of
rules, it should initially be assumed that regulations on cyberspace would become a part of this system, i.e.
subsystem. The common interest requires that the network users know those regulations and that measures for the
elimination of cybercrime have been taken. The purpose of this article is to analyze the laws in terms of their
legitimacy with the intent of the legislature and the public needs for cyber bullying in Poland and the EU law.
1. Introduction
The virtual space area, in recent years, has become “the subject of interests” for lawyers as well. Regardless the way
we will evaluate the influence that media on society, undoubtedly adjusting law to the needs of shaping IT society is
“the task for the moment”. It is one of the most important legislative challenges in Poland and the EU (Barta,
Markiewicz: 11-12). Contemporary system of regulations and implemented changes in it, lead therefore to
restrictive fighting also those acts of violence that are committed via electronic media and on the level of
cyberspace. In this dissertation, general issues of the cyberspace phenomenon, present analysis of the Polish Penal
law and the EU’s law concerning stalking and other forms of cyber bullying are presented.
2. Introduction into cyberbullying issues
Cyber bullying becomes more and more serious problem in most developed countries, where using new
electronic technologies has become inseparable element of functioning society in the age of globalization. The latest
digital devices creating the world of new technologies and cyberspace, influence globally the changes within
*Corresponding Author Tel. +48 22 789 19 03
e-mail adress: sylwia@wsge.edu.pl
Keywords: cyberspace, cyberbullying, stalking, cyberstalking;
Available online at www.sciencedirect.com
© 2014 The Authors. Published by Elsevier Ltd.
Selection and peer review under responsibility of Organizing Committee of BEM 2013.
30 Sylwia Ćmiel / Procedia - Social and Behavioral Sciences 109 ( 2014 ) 29 – 34
different from threats known so far and, simultaneously, create the need to provide safety for the youngest
generation. Children and the youth have relatively the least consciousness of the threats coming from cyberspace.
Their parents, however, being the first and the most important educative environment, are not aware of potential
negative consequences of using the latest technologies within new multimedia opportunities and functioning
information in the cyberspace. In the present times, the prefix “cyber” is connected with new electronic technologies
and it is used in the meaning of IT, interactive (it describes everything that relates computers). Cyberspace means
communication space created via the Internet connection system. Cyberspace, similarly to the telecommunication
facilitates its users contacts, also in the real time. The space of open communication via connected computers and
information connections working in the whole world. The definition includes all electronic communication systems
(also the classical telephone networks), which transfer information coming from digital or meant to be digital
sources. Cyberspace slowly becomes the basic canal of information exchange (www.i-
slownik.pl/323,cyberprzestrzen)
Cyberspace is relatively young type of violence, which could appear because of technological
development in the last 20 years. The two most important inventions of that period are the Internet and mobile
phone. The Polish name of cyberbullying derives from the set of two words cyber – which means computer or
electronic and bully which means brutality. That form of terror developed at the end of the 20th and the beginning of
the 21st century.
The phenomenon was earliest described in the developed countries such as the USA or Canada. The
American researchers of that subject (Ybarra, Mitchell and Lenhart 2010) indicate that the first information
concerning aggression in the Net appeared in the USA in 2003 and soon attracted significant public opinion remark.
In September 2006 in the USA there was a remarkable interdisciplinary expert conference focused on media and
aggression committed by young people via media. The panel was accompanied by presentations of contemporary
research concerning not only the electronic aggression itself but also individual and social factors, which cause that
some young people become its victims or perpetrators. Researchers mainly focused on how much the conditions,
symptoms and consequences differ from those connected with media considered traditional ones, e.g. television
(Huesmann 2007: 6-13). Other researchers of the cyberspace issues, namely Corinne David - Ferdon and Marti
Feldman Hertz pay attention on the variety of notions used according to committing acts of aggression via the
Internet and mobile phones. It often happens that although there are different notions, there is lack of unanimous
criteria to use them, and even the attempt to clear defining there designates. The above-mentioned authors highlight
a huge variety of electronic aggression acts that are in the area of interests of the researchers dealing with the issues.
The analyzed types of electronic aggression concern both events of “minor importance” as well as acts of significant
potential of victimization (Ferdon, Hertz 2007: 41, 1-5).
Robin Kowalski, Susan Limber and Patricia Agatston in 2006 (Kowalski, Lamber, Agatston 2010: 1-3)
attempted, as the first ones, to present integral knowledge concerning cyberbullying. They claim cyberbullying, also
called the Internet or electronic violence is defined as acts of aggression committed via e-mails, Internet
communicators, text or graphic messages transferred on mobile phones, in chat rooms or on websites. Although it
has some common features with traditional school violence, cyberbullying is rather separate phenomenon, which has
appeared in the area of interests of media and academic spheres not long age. The researchers highlight that one of
the difficulties met by those dealing with the issue is lack unanimous definition of cyberbullying (Kowalski,
Lamber, Agatston 2010: 76). A part of the definition limits the use of the notion of cyberbullying only according to
the violence among peers, other does not put any age limits, and undoubtedly however the terms are used most often
in the context of violence among the youngest. In Poland, the issue of cyberbullying has existed for short time and,
according to Jacek Pyżalski we are on the level of building theoretical basis of the knowledge of electronic
aggression, meaning cyberbullying, which we base on relatively small empiric material collected in the research
conducted so far. He claims there are not many publications, which present, in a synthetic way, the knowledge
gained so far by researchers (Dooley, Pyżalski, Cross 2009: 182-188).
The lack of clear definitions causes that researchers speaking about the same phenomena use different
descriptions as well as the same notions according to different phenomena. It makes not only the communication
confusing but also deep discussion on preventive and intervention solutions concerning electronic aggression.
Moreover, it is difficult to make the terminology unanimous since electronic aggression issues are of
interdisciplinary character where its particular symptoms are described differently according to which discipline
31
Sylwia Ćmiel / Procedia - Social and Behavioral Sciences 109 ( 2014 ) 29 – 34
their representatives refer to the problem. At the same time, electronic aggression symptoms and their other
conditions change together with the changes of technological changes and those within the services provided in
social media. It means constant necessity to update electronic aggression conceptualization as well as modification
of research devices in which it is operationalized (Pyżalski2012: 121-133).
Robert S. Tokunaga wants to create the definitions integrating the most important elements repeated in the
conceptualizations of various authors. He proposes to such definition of cyberbullying […] each behavior realized
via electronic or digital media, committed by units or groups which communicate regularly enemy or aggressive
information in order to harm or make discomfort at others (Tokunaga 2010: 278).
3. The Polish Penal law on cyberstalking and other forms of cyberbullying
Nowadays, tele-information systems supported stalking and enlarged the scale of the phenomenon,
since modern tele-information shortened the distance between a victim and a stalker as well as forms, ways and
availability of stalking. Therefore, taking into account the significance of those systems, more and more often the
issue of the type of stalking in the shape of cyberstalking is discussed (Kosińska 2008: 34). It means that direct
relations between units in social environment are substituted by relations via electronic communication in
cyberspace environment (the Internet and mobile webs) which is observed, among others, in long lasting sending
texts, MMS messages, e-mails, putting information in forums and Internet chats or making phone calls by stalkers.
Since 25 February 2011 the Polish Seym has passed the novelty to the Penal code, art. 190a, it describes the crime of
stalking. The above article came into force on 6 June 2011 (the Penal code Journal of Laws on 2001 No 72 pos.
381). In Poland, the notion of stalking functions as a kind of emotional violence. Some authors claim that
cyberstalking was described in Poland only in the article 190a §2 of the Penal code, persistent harassment, stalking
(§1 Whoever makes a threat to another person to commit an offence detrimental to that person or detrimental to his
next of kin, and if the threat causes in the threated person a justified fear that will be carried out shall be subject to a
fine, the penalty of restriction of liberty or the penalty of deprivation of liberty for up to 2 years. The same penalty is
for those who simulate another person, uses his/her image or other personal data in order to make a material or
personal harm. §3 If the consequence of the act described in §1 or 2 is an attempt to commit suicide, the perpetrator
shall be subject to the penalty of deprivation of liberty for up to 10 years. §4 The prosecution of the crime described
in §1 or 2 is on the detriment person’s motion). Adopting such an attitude is not fully correct. Cyberstalking may
adopt the form described in that article (e.g. when somebody uses a person’s image and personal data and places an
announcement on behalf of the person on the date portal) but the features from the art. 190a §2.2 of the Penal code
also may be filled via tele-information systems (Śledziewski 2013: 275).
According to the added art. 190a to the Polish Penal code in 2011, whoever causes justified feeling of
threat or significantly infringes the person’s privacy through persistent harassment shall be subject to the penalty of
deprivation of liberty for up to 3 years. New regulations also concern the use of image or personal data of the
detriment in order to cause material harm (art. 190a of the Penal code). Such behaviours do not need to occur
repeatedly. They may be single acts. The amendment also introduces stalking crime qualified type. If the
consequence of the act described in § 1 or 2 of the amended art. 190a of the Penal code is the attempt to commit
suicide; the perpetrator is subject to the penalty of deprivation of liberty up to 10 years. Moreover, the amendment
changes the note regulating requirements of passing penal judgment by courts (art. 39 of the Penal code), e.g. the
ban of maintaining contacts and approaching to particular persons. The article in so far shape predicted only such a
possibility according to crimes against sexual freedom, those committed against minors and in case of sentencing for
crime with use of crime. After the amendment, such a verdict may be announces by court for “other crime against
freedom”, namely stalking, persistent harassment. The Polish law creators’ practice shows, however, that virtual
space demands sometimes-serious changes in the view on basic rules and norms of proceedings. The character of
actions make via electronic media proves certain ambivalence in treating categories of freedom of speech. Paweł
Waglowski writes about the problem “Legal system must devote one good in order to protect the other value. Such a
collision will occur in case of at least two groups of values worth protection from the legal system point of view.
First of all, the right to legal protection of private or family life, dignity and a good name as well as to decide on
own private life must be indicated (art. 47 of the Polish Constitution mentions about those values). The right to
freedom of expressing own opinions and acquiring and spreading information may be put in oppositions to them
32 Sylwia Ćmiel / Procedia - Social and Behavioral Sciences 109 ( 2014 ) 29 – 34
(art. 54 par.1 of the Polish Constitution)” (Waglowski 2005: 291). It is one of the most difficult aspects of the Net
reality from the legal order point of view, demanding sensitiveness, consideration and remaining compromise
between the two values. Therefore, it is worth remembering that the priority is good of a unit and the whole society,
and in that particular case, also good and safety of youth and the youngest members of a society. The principal issue
in a general view on the problem is the necessity to implement equal legal status of the crime committed in reality
and the Net. Contemporary regulation system and amendments in it lead to restricted fight also those acts of
violence that are committed via electronic media and on the level of cyberspace.
It is worth discussing the Polish legal protection of minors in the aspect of art. 200a of the Penal code (§1
Whoever establishes contact with a minor under the age of 15 in order to commit crime described in art. 197§3 p. 2
or art. 200 as well as produces and maintains pornography content via tele-information system or telecommunication
system, in order to meet the person through misleading the person, using the mistake of incapability to proper
comprehension of a situation or through unlawful threat, shall be subject to the penalty of deprivation of liberty for
up to 3 years. §2 Whoever submits a proposal to a minor of sexual intercourse, undergoing or performing other
sexual act or participating in production or recording pornography content and aims at its realization via tele-
information system or telecommunication net shall be subject to the penalty of restriction of liberty or deprivation of
liberty for up to 2 years (Journal of Laws 1997 No 88 pos. 533 with later amendments).
Nowadays, in Poland, the law does not provide fully effective protection of minors against virtual violence.
Using the existing legal regulations it is possible to protect (although not completely) children and youth against acts
of virtual violence on the basis of the Penal code and Civil code. Diversification of those proceedings is significant
with regard of diversity of virtual violence acts via new technologies causes that they are not within the Penal code
range. From that reason, it is impossible to accuse the perpetrator of committing penal crime and directing the case
to the further prosecution and court proceedings. In such situations, it is possible to claim damages on the civil way,
according to the civil code. It is important to present explanation that if the virtual violence exists towards young
people under 18, their parent or legal guardians conduct legal actions. It is impossible to take a case of a child,
minor, detriment by virtual violence without the cooperation with parents. However, if the perpetrator of virtual
violence is a minor under 17, the case of the action of the minor with the character of virtual crime is in the
competence of a Family court or Court of minors relevant to the place of stay of the virtual violence perpetrator. If
the case of virtual violence is reported in the police and prosecutor’s office and proceedings shall be initiated, the
virtual violence victim, who is minor, must be heard simultaneously in the character of a witness (Kotomska 2012:
85).
4. The EU’s law concerning cyberbullying
In relations with dynamic development of the Internet threats (Gruchoła 2012: 37) it is necessary to undertake
actions, both on the level of the country and the European Union, that fight all forms of cyberbullying threatening
more and more society and citizens. Legal regulations are one of the instruments to fight cyberbullying. On the level
of the European Union, there are key regulations concerning the issue: the Strategy of the European Comission on
combating cyberbullying (Conclusion of the Council 2009/C62/05 on 27 November 2008) and it submits directives
concerning legal protection of minors in cyberspace: Directive 2011/92/UE on combating improper treatment in
sexual aims and sexual abuse of children and children’s pornography; Directive 2002/58/WE on privacy and
electronic communication and the Announcement of the European Commission: In the direction of the general
strategy for combating cyberbullying. The Frame decision 2005/222/WSiSW orders punishment for: purposed,
unlawful access to the whole or part of information system (art. 2), purposed, unlawful, serious infringement or
disconnection of the information system
Functioning via implementation, transferring damaging, deleting, changing, concealing or making the computer data
unavailable (art. 3) as well as purposed, unlawful deleting, damaging, worsening, changing, concealing or making
the computer data unavailable in the information system (art.4), at least in the cases which are not of less
importance. The decision demands punishment also to those who manage, assist or persuade to commit crime and it
assumes punishment for an attempt to commit crime (which is a common case in cyberbullying) (Kosiński,
Kmiotek: 5).
33
Sylwia Ćmiel / Procedia - Social and Behavioral Sciences 109 ( 2014 ) 29 – 34
The Directive 2002/58/WE on privacy and electronic communication oblige the Internet service suppliers
to provide security of the service. In the Communication of the European Commission, Council and the Committee
of Regions on 2007 title “Towards an EU strategy of combating cyberbullying” the following cybercrimes were
mentioned (KOM2007 267: 7):
Traditional crime connected with computers, including molesting children;
Content crime including children’s pornography, delivering criminal instructions, offers to commit crime,
molesting, lobbing through the Net, spreading false information (e.g. black PR, pump-and-dump schemes).
Other legal acts, referring to a particular criminal problem, include regulations concerning unlawful use of the
Internet (Directive 2011/92/UE) on combating indecent treating in sexual aims and sexual abuse of children and
children’s pornography (Directive 2011/92/UE: 1-4). It proves particular trying of the Commission within children’s
protection, especially those connected with combating all types of materials and actions connected with sexual abuse
children, illegally published via information systems and grooming. The next document is the Strategy of the
European Commission on 28 November 2008 on combating cyberbullying (Conclusion of the Council 2009/C
62/05: 1-4). The Strategy recommends undertaking numerous operational measurements, e.g. founding so called
“Cyberpatrols”, common investigation teams, and implementing remote searching in the Internet and separate
research units that would be involved in combating cyberbullying in the next 5 years. It also implements particular
solutions for closer cooperation and exchange f information between judgement organs and private sector units
(Kosiński, Kmiotek: 6).
5. Conclusions
As the above dissertation assumes, in the Polish and the EU legislation there is no single legal act that would
completely and directly regulate cyber bullying issues. According to huge diversity of cybercrime types, there is no
one definition of crime and offences committed in cyberspace (Gruchoła 2012: 85). Efficient cooperation between
investigation organs often depends on at least partial unified definitions of cyber bullying, thus the key aim remain
the works on harmonization and amending legal regulations of the member states in the area. Constantly appearing
new threats in cyberspace oblige to implement additional legal regulations and their unification in all member states.
References
Barta J., Markiewicz R., (1998). Internet a prawo. Universitas, Kraków. pp.11-12.
Dooley, J. Pyżalski, J., Cross, D. (2009). Cyberbullying versus face-to-face bullying: A theoretical and
conceptual review. Zeitschrift fur Psychologie / Journal of Psychology. 217(4), 182-188.
Directive 2011/92/EU of the European Parliament and of the Council of 13 December 2011 on combating the
sexual abuse and sexual exploitation of children and child pornography, and replacing Council Framework Decision 2004/68/JHA (Journal of
Laws L 335 on 17.12.2011)
Directive 2011/92/EU of the European Parliament and of the Council of 13 December 2011
Directive 2002/58/WE of the European Parliament and of the Council of 12 July 2002
Ferdon, D.C., Hertz, F.M. (2007). Electronic media, violence, and adolescents: An emerging public health
problem. Journal of Adolescent Health. 41, 1-5.
Gruchoła M. (2012). Ochrona użytkowników internetu w państwach Unii Europejskiej, Lublin , p. 37.
Gruchoła M. (2012). Polityka Unii Europejskiej w zakresie cyberprzestępczości, [in] „Patologie
w cyberświecie” (eds.) Bębas S., Plis J., Bednarek J. Wyższa Szkoła Handlowa, Radom, p. 85.
Huesmann, L. R. (2007). The impact of electronic media violence: scientific theory and research. [in] Journal Adolescent Health, 41, 6-13.
Communication KOM(2007)267 on 22 May 2007, p. 3.
Communication KOM(2007) 267 on 22 May 2007, p. 7.
Council conclusions (2009/C 62/05) on 27 November 2008, pp. 1-4.
Council conclusions of 27 November 2008 on a concerted work strategy and practical measures against
cybercrime (Journal of Laws C. on 17.03.2009).
Kotomska, M. (2012). Przemoc wirtualna, jej skutki i metody przeciwdziałania [in] „Patologie w cyberświecie”
(eds.) Bebas s., Plis J., Bednarek J. Wydawnictwo Wyższa Szkoła Handlowa, Radom, s.85
Kowalski R. M., Lamber S. P., Agatston P. W. (2010). Cyberprzemoc wśród dzieci i młodzieży. s. 1-3, 76
34 Sylwia Ćmiel / Procedia - Social and Behavioral Sciences 109 ( 2014 ) 29 – 34
Kosińska J. (2008). Prawnokarna problematyka stalkingu. [in] „Prokuratura i Prawo” nr 10, s. 34
Kosiński J. , Kmiotek S. Międzynarodowa współpraca w zwalczaniu cyberprzestępczości. WSPoL, s. 5-6;
Kowalski R. M., Lamber S. P., Agatston P. (2010) Cyberprzemoc wśród dzieci i młodzieży. pp. X-XII
Pyżalski J. (2012). Agresja elektroniczna i cuberbullying jako nowe ryzykowne zachowanie młodzieży. pp. 121,
122-123
Tokunaga, R. S. (2010). Following you home fromschool: A critical review and synthesis of research on
cyberbullying victimization. Computers in Human Behavior, pp. 278.
Śledziewski D. (2013). Cyberstalking w polskim prawie karnym [in] „Cyberprzestepczość i ochrona informacji.
Bezpieczeństwo w Internecie. Tom II” (red.) Hołyst B., Pomykała J., Wydawnictwo Wyższej Szkoły
Menedżerskiej, Warszawa, p. 275
Waglowski P. (2005). Prawo w sieci. Wydawnictwo Helion, Gliwice, p.291
Ybarra, M. L., Mitchell, K. J., Lenhart A. (2010). Cyberbullying research in the United States. [in] J. A. Mora-
Merchan, T. Jager, T. (eds.). Cyberbullying: A cross-national comparison. Landau: Verlag Empirische
Padagogik.
http://www.i-slownik.pl/323,cyberprzestrzen/ - on 14.03.2013
act.200a Penal Code on6 June 1997, Journal of Laws 1997 No 88 pos. 533 with later ammendments, http://prawo.legeo.pl/prawo/kodeks-
karny-z-dnia-6-czerwca-1997-r/czesc-s_rozdzial-xxv_przestepstwa
przeciwko-wolnosci-seksualnej-i-obyczajnosci/? - on 01.06.2012
act on 25 February 2001 on the ammendment of the Act Penal Code (Journal of Laws 2011., No 72 pos.381)
... The percentage of adolescents that had experienced cyberbullying in Poland was similar to rates reported elsewhere in Europe [9]. In contrast to Romania and Greece, Poland has enforced legislation targeting cyberbullying as a form of emotional violence and has included ICT literacy in the primary and secondary school curricula [57]. All the same, rates of cyberbullying victimization in this study were greater than those reported in the "EU Kids Online" study [14]. ...
Article
Full-text available
Background: The increasing use of the Internet and social network sites (SNS) has created a new domain of socio-emotional development for adolescents. The aim of this cross-sectional study was to explore cybervictimization across seven European countries, in relation to socio-demographic, Internet use and psychosocial variables. Methods: A cross-sectional school-based study was conducted in the participating countries: Germany, Greece, Iceland the Netherlands, Poland, Romania and Spain. Anonymous self-completed questionnaires included sociodemographic data, internet usage characteristics, school achievement, parental control, the Internet Addiction Test and Achenbach's Youth Self-Report. Results: The highest rate of cyber victimization was found in Romania (37.3%) and the lowest in Spain (13.3%). Multiple logistic regression analyses gave differing results between countries. In Romania, Poland and Germany cyberbullying victimization was associated with SNS use, whereas Internet use was associated with increased odds of cybervictimization only in Romania. Cybervictimization was associated with greater internalizing behavior problems in all countries analysed, and with externalizing problems in all except Romania. Conclusions: Cyberbullying victimization is an on-going problem, which is subject to country-specific socio-demographic factors and diverse patterns of current Internet use and its development. Preventive measures should emphasize the integration of Internet communication technology education in educational contexts, and focus on the consistent association between cybervictimization and internalizing and externalizing difficulties.
... Poland has also passed legislation that specifically targets cyber-bullying. It remains to be seen to which extent, if any, these provisions will specifically protect LGBTQI learners [288]. ...
... 1114), "system teleinformatyczny" oznacza zespół współpracujących ze sobą urządzeń informatycznych i oprogramo wania zapewniający przetwarzan ie, przechowywanie, a także wysyłanie i odbieranie danych przez sieci teleko munikacyjne za po mocą właściwego dla danego rodzaju sieci teleko munikacy jnego urządzen ia końcowego. 3 Raport NIK (2015) -Realizacja przez pod mioty państwowe zadań w zakresie ochrony cyberprzestrzeni RP. Nr ewid. ...
Article
Full-text available
For many to cross the borders of real identity in the cyberspace means to be allowed to break the general principles. Criminal practices grow diverse along with the advancement of cyberspace technologies. This dependency is complemented with the ubiquitous and easier access to new information and communication techniques and instruments. Among these devices the mobile phone with the built-in camera has become a standard appliance that influenced greatly the frequency of the criminal usage of this function. In this context one should accent the inadequate usage of advanced technologies. Usually the young people using mobile phones and computers in a thoughtless and irresponsible way bring on violent behaviours online. Sexting represents a specific criminal (or cyberviolent) behaviour online. The legal dimension of this problem is very important. Criminal sexting behaviour is regulated by the laws concerning child pornography as well as under-15 grooming with the use of information systems or networks. Criminal behaviours based online require thorough theoretic and practical elaboration especially after the 23 June 2015 report by the Supreme Audit Office concerning the insufficient protection of the Polish cyberspace. Keywords: criminology, criminal law, cyberspace, security, new information technologies
Article
Full-text available
div> Cybercrime has resulted in astronomical losses for the business community. However, the reactive policy model must be more effective at preventing cybercrime, and the due process model is also inappropriate for combating cybercrime with a high level of speed and mobility. This study is normative legal research employing a conceptual strategy and case studies. The results indicate that the reactive model must be improved in order to prevent cybercrime. The model of due process is not appropriate for deterring cybercrime with a high degree of speed and mobility. The preventative law enforcement strategy is effective, but it requires a high level of law enforcement capability to detect and disable cybercrime, which is something that few Indonesian law enforcement officials possess. Prevention based on the user, which places responsibility on internet users, is fine for individuals but not for businesses. Based on collaboration between corporations, universities, civic society, and non-governmental groups, the collaborative model synthesizes the aforementioned paradigms. Because they are based on plans or roadmaps created by internet stakeholders, regulations, technical aspects, and law enforcement may be effectively implemented and developed. </div
Article
Full-text available
With the wide application of Internet, the negative sides related to cyberspace become prominent, including cyberbullying. In such a sense, it is necessary to delimit and define cyberbullying as one important legal term for some relevant cybercrimes. Cyberbullying, in its different forms, is common among children and adolescents, and is facilitated by the increased use of technology. But there is no global legal definition and standard in this area. The authors consider it significant to take into account the international perspective of instrumentalization of law in respect of cyberbullying, which may lead to the formulation of such a definition. This article first explores the definitions, legal mechanisms and its relevant laws in the US, the EU and China to find out their similarities and differences. It is found that cyberbullying as a sign is socially-constituted, is interpreted differently in various jurisdictions, which indicates that the exploration of a sign should be located within and is intertwined with social, cultural and historical backgrounds. This research, as a case study, also provides useful implications for the understanding and interpretation of legal terms in a more general context. At the same time, cultures nowadays pervade one another, and so phenomena that were initially local may quickly and unexpectedly become global. This is the case of cyberbullying, initially associated with children and adolescents as perpetrators and victims, being now also practiced by adults who harass other adults.
Data
Full-text available
In the Journal "International Journal of New Economics and Social Sciences" ISSN 2450-2146, referred to as the acronym IJONESS) are published scientific articles, book reviews and reports from scientific conferences in the broadly understood subject of social sciences, economics, management, finance security, cybercrime, new online media, biotechnology, ecology, etc. In addition, there are published texts on interdisciplinary issues combining social sciences with economics, finance, management or another field of knowledge and / or economy, business and financial, public and other functioning, implementing projects research or business in such areas as: public administration, production of enterprises, production technologies, IT, financial systems and markets, risk management, environmental protection, biotechnology, Internet, medicine, transport rt, construction, energy, ecology and others.
Article
Full-text available
This article discusses the key problems faced by specific governments of the Duchy of Warsaw in terms of the objectives and actions of the police authority. These were matters related to the determination of the competence of the specific ministries and the location of the Ministry of the Police between them and the issuance of a number of legal acts related to its functioning. Wars that took place during the existence of the Duchy of Warsaw played a significant role in the implementation of the applicable law. The author paid particular attention to the issue of the impact of the creation, development and functioning of the police. As a consequence, issues related to the formation of state authorities and administration at key moments in the history of a small state were included in this issue. The analysis in this area focused on the operation of the police in critical situations.
Article
For many to cross the borders of real identity in the cyberspace means to be allowed to break the general principles. Criminal practices grow diverse along with the advancement of cyberspace technologies. This dependency is complemented with the ubiquitous and easier access to new information and communication techniques and instruments. Among these devices the mobile phone with the built-in camera has become a standard appliance that influenced greatly the frequency of the criminal usage of this function. In this context one should accent the inadequate usage of advanced technologies. Usually the young people using mobile phones and computers in a thoughtless and irresponsible way bring on violent behaviours online. Sexting represents a specific criminal (or cyberviolent) behaviour online. The legal dimension of this problem is very important. Criminal sexting behaviour is regulated by the laws concerning child pornography as well as under-15 grooming with the use of information systems or networks. Criminal behaviours based online require thorough theoretic and practical elaboration especially after the 23 June 2015 report by the Supreme Audit Office concerning the insufficient protection of the Polish cyberspace. Keywords: criminology, criminal law, cyberspace, security, new information technologies
Article
Full-text available
Napoleon victories with fourth coalition allowed to create the Duchy of Warsaw. Just on the beginning 1807 year Imperator decree brought to live the interim government Komisja Rządząca. It face the difficult task of setting up polish administration, created polish army and supplied Great Army. Basis of actions was law. Author analyzed acts which were created between 1807 and 1813 year. For the most fruitful period of time should be considered first years existence. To the end 1808 year announced decree about organisations Police Directorate constitutions or princely decree about organisation of ministries. In particular, recent documents, submitted in work, played a significant role in the work of the police. Submitted organization and work regional structures police authority to. Deserves special attention President of Warsaw or National Guard. Their activity had greatly improved safety and effectiveness of the state.
Article
Full-text available
Cyberbullying has been described as a type of electronic bullying and has recently been subjected to intense media scrutiny largely due to a number of high profile and tragic cases of teen suicide. Despite the media attention relatively little is known about the nature of cyberbullying. This is, at least in part, due to a lack of theoretical and conceptual clarity and an examination of the similarities and differences between cyberbullying and face-to-face bullying. This paper reviews the limited theoretical and empirical literature addressing both cyberbullying and face-to-face bullying, using some specific examples from a qualitative study for illustration. We compare and contrast individual factors common to cyber and face-to-face bullying. We then examine social information processing factors associated with face-to-face bullying and present a discussion of the similarities and differences that may characterize cyberbullying
Article
Since the early 1960s, research evidence has been accumulating that suggests that exposure to violence in television, movies, video games, cell phones, and on the Internet increases the risk of violent behavior on the viewer???s part, just as growing up in an environment filled with real violence increases the risk of them behaving violently. In the current review this research evidence is critically assessed and the psychological theory that explains why exposure to violence has detrimental effects for both the short and long-term is elaborated. Finally the size of the ???media violence effect??? is compared with some other well-known threats to society to estimate how important a threat it should be considered.
Article
Adolescents' access to and use of new media technology (e.g., cell phone, personal data assistant, computer for Internet access) are on the rise, and this explosion of technology brings with it potential benefits and risks. Attention is growing about the risk of adolescents to become victims of aggression perpetrated by peers with new technology. In September 2006, the Centers for Disease Control and Prevention convened a panel of experts in technology and youth aggression to examine this specific risk. This special issue of the Journal of Adolescent Health presents the data and recommendations for future directions discussed at the meeting. The articles in the Journal support the argument that electronic aggression is an emerging public health problem in need of additional prevalence and etiological research to support the development and evaluation of effective prevention programs.
Council conclusions of 27 November 2008 on a concerted work strategy and practical measures against cybercrime
  • Council
  • Council
92/EU of the European Parliament and of the Council of 13 December 2011 on combating the sexual abuse and sexual exploitation of children and child pornography, and replacing Council Framework Decision
  • Directive
  • Directive
Przemoc wirtualna, jej skutki i metody przeciwdziałania [in] „Patologie w cyberświecie” (eds.) Bebas s
  • Kotomska
  • M Kotomska
  • Kotomska
  • M Kotomska
Prawnokarna problematyka stalkingu. [in] „Prokuratura i Prawo” nr 10, s
  • Kosińska
  • Kosińska
i-slownik.pl/323,cyberprzestrzen/- on 14.03.2013. act.200a Penal Code on6 Journal of Laws 1997 No 88 pos. 533 with later ammendments, http://prawo.legeo.pl/prawo/kodeks- karny-z-dnia-6-czerwca-1997-r/czesc-s_rozdzial-xxv_przestepstwa przeciwko-wolnosci-seksualnej-i-obyczajnosci/? - on 01
  • Anon
  • Anon