Legal Limitations relating to the Application of Thai Computer–related Crime Act of B.E. 2560 to the case of “Phishing”

  • kanathip Thonraweewong
Keywords: Phishing, Computer crime, Computer fraud, Computer related crime Act.

Abstract

Phishing” is one of the important cybercrimes in digital age. This article focused on the legal aspect of controlling and criminalizing of “Phishing” in the context of the Computer related Crime Act B.E. 2550 as amended in B.E. 2560. Although “phishing” was stipulated in the draft Bill as a reason of government for amending section 14 (1) in B.E.2560, the author argued that this law could partially cover the practice of “Phishing” due to the fact that main elements of section 14 (1) demonstrate several limitations. The element of “input false of distort data”, for example, limits the application of this section to the practice of representing false pretense to human or deceiving person. Hence, it could hardly apply to “phishing” that aims at deceiving system or manipulating the automatic computation of computer system. By conducting a comparative analysis of section 14 (1) to cybercrime convention of Europe, certain EU member’s laws and phishing laws of the U.S., the author proposes the amendment of section 14 (1) in order to comprehensively regulate the practice of “Phishing”.

Downloads

Download data is not yet available.

References

Stephen D. Fried. (2006). “Phishing : A New twist to an old game”. in Information Security Management Handbook. edited by Harold F Tipton and Micki Krause. Taylor & Francis Group, LLC.
[2] Yatindra Singh. (2011). Cyber Laws: A Guide to Cyber Laws, Information Technology, Computer Software. Universal law publishing Co.
[3] Jim Melnick and Ken Dunham. (2008). Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet. Auerbach Publications.
[4] Anti-Phishing Working Group. (2018). Phishing Report.
[5] Rasha S El-Din, Paul Cairns, and John Clark. (2015). “The Human Factor in Mobile Phishing”. In New Threats and Countermeasures in Digital Crime and Cyber Terrorism. edited by Maurice Dawson and Marwan Omar. IGI Global.
[6] Markus Jakobsson and Steven Myers. (2007). Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity theft. John Wiley and Sons Publication.
[7] Joanna L Grama. (2011). Legal Issues in Information Security. Jones & Bartlett Learning, LLC.
[8] Rick Howard. (2010). Cyber Fraud: Tactics, Techniques and Procedures. CRC Press.
Published
2018-06-25
Section
Research articles