Legal Limitations relating to the Application of Thai Computer–related Crime Act of B.E. 2560 to the case of “Phishing”
คำสำคัญ:
Phishing, Computer crime, Computer fraud, Computer related crime Act.บทคัดย่อ
Phishing” is one of the important cybercrimes in digital age. This article focused on the legal aspect of controlling and criminalizing of “Phishing” in the context of the Computer related Crime Act B.E. 2550 as amended in B.E. 2560. Although “phishing” was stipulated in the draft Bill as a reason of government for amending section 14 (1) in B.E.2560, the author argued that this law could partially cover the practice of “Phishing” due to the fact that main elements of section 14 (1) demonstrate several limitations. The element of “input false of distort data”, for example, limits the application of this section to the practice of representing false pretense to human or deceiving person. Hence, it could hardly apply to “phishing” that aims at deceiving system or manipulating the automatic computation of computer system. By conducting a comparative analysis of section 14 (1) to cybercrime convention of Europe, certain EU member’s laws and phishing laws of the U.S., the author proposes the amendment of section 14 (1) in order to comprehensively regulate the practice of “Phishing”.
เอกสารอ้างอิง
[2] Yatindra Singh. (2011). Cyber Laws: A Guide to Cyber Laws, Information Technology, Computer Software. Universal law publishing Co.
[3] Jim Melnick and Ken Dunham. (2008). Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet. Auerbach Publications.
[4] Anti-Phishing Working Group. (2018). Phishing Report.
[5] Rasha S El-Din, Paul Cairns, and John Clark. (2015). “The Human Factor in Mobile Phishing”. In New Threats and Countermeasures in Digital Crime and Cyber Terrorism. edited by Maurice Dawson and Marwan Omar. IGI Global.
[6] Markus Jakobsson and Steven Myers. (2007). Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity theft. John Wiley and Sons Publication.
[7] Joanna L Grama. (2011). Legal Issues in Information Security. Jones & Bartlett Learning, LLC.
[8] Rick Howard. (2010). Cyber Fraud: Tactics, Techniques and Procedures. CRC Press.
ดาวน์โหลด
เผยแพร่แล้ว
รูปแบบการอ้างอิง
ฉบับ
ประเภทบทความ
สัญญาอนุญาต
Any views or opinions expressed in this issue of the Kasem Bundit University Journal are those of the authors alone and do not necessarily reflect the views or opinions of Kasem Bundit University or the editors.
