Legal Limitations relating to the Application of Thai Computer–related Crime Act of B.E. 2560 to the case of “Phishing”
Keywords:
Phishing, Computer crime, Computer fraud, Computer related crime Act.Abstract
Phishing” is one of the important cybercrimes in digital age. This article focused on the legal aspect of controlling and criminalizing of “Phishing” in the context of the Computer related Crime Act B.E. 2550 as amended in B.E. 2560. Although “phishing” was stipulated in the draft Bill as a reason of government for amending section 14 (1) in B.E.2560, the author argued that this law could partially cover the practice of “Phishing” due to the fact that main elements of section 14 (1) demonstrate several limitations. The element of “input false of distort data”, for example, limits the application of this section to the practice of representing false pretense to human or deceiving person. Hence, it could hardly apply to “phishing” that aims at deceiving system or manipulating the automatic computation of computer system. By conducting a comparative analysis of section 14 (1) to cybercrime convention of Europe, certain EU member’s laws and phishing laws of the U.S., the author proposes the amendment of section 14 (1) in order to comprehensively regulate the practice of “Phishing”.
References
[2] Yatindra Singh. (2011). Cyber Laws: A Guide to Cyber Laws, Information Technology, Computer Software. Universal law publishing Co.
[3] Jim Melnick and Ken Dunham. (2008). Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet. Auerbach Publications.
[4] Anti-Phishing Working Group. (2018). Phishing Report.
[5] Rasha S El-Din, Paul Cairns, and John Clark. (2015). “The Human Factor in Mobile Phishing”. In New Threats and Countermeasures in Digital Crime and Cyber Terrorism. edited by Maurice Dawson and Marwan Omar. IGI Global.
[6] Markus Jakobsson and Steven Myers. (2007). Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity theft. John Wiley and Sons Publication.
[7] Joanna L Grama. (2011). Legal Issues in Information Security. Jones & Bartlett Learning, LLC.
[8] Rick Howard. (2010). Cyber Fraud: Tactics, Techniques and Procedures. CRC Press.
Downloads
Published
How to Cite
Issue
Section
License
ทัศนคติ ความคิดเห็นใด ๆ ที่ปรากฏในวารสารเกษมบัณฑิตฉบับนี้เป็นของผู้เขียน โดยเฉพาะ มหาวิทยาลัยเกษมบัณฑิตและบรรณาธิการ ไม่จำเป็นต้องมีความเห็นพ้องด้วย