The impact of digitalization on the legal protection of victims of cybercrime: A critical analysis and perspectives for Albania
DOI:
https://doi.org/10.55312/op.v17i1.7266Abstract
In an increasingly digitalized society, where social, economic, and institutional interactions are shifting to the virtual sphere, cybercrime has become a major challenge for criminal justice and the protection of individuals’ fundamental rights. This paper analyzes the impact of digitalization on the legal protection of victims of cybercrime, by examining the transformation of the nature of crime, the new forms of victimization, and the legal challenges arising from these developments. Relying on a theoretical and comparative analysis methodology, the paper identifies gaps in the current protection of victims at both the European and national levels, and critically addresses the limitations of the traditional punitive model in the context of digital crime. Within this framework, alternatives are proposed for building a new model of protection, based on integrated assistance, harm restoration, and the guarantee of victims’ rights, inspired by the most advanced models of the European Union. The paper concludes with concrete recommendations for adapting the Albanian system to the new challenges of cybercrime, highlighting the need for institutional, legal, and social reforms to ensure the effective protection of fundamental rights in the digital age.Keywords:
cybercrime, digitalization, victim protection, restorative justice, Albania, EU law.Downloads
References
-
1. Bélanger, F., & Crossler, R. E. (2011). Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Quarterly, 35 (4), 1017-1041. https://misq.umn.edu/privacy-in-the-digital-age-a-review-of-information-privacy-research-in-information-systems.html
-
2. Bolivar, D. Aertsen, I. Mesmaecker, V. Lauwers, N. (2011). Restorative justice and the active victim: exploring the concept of empowerment context: DOI: 10.2298/TEM1101005A Researchgate https:// www.researchgate.net/publication/215564643_Restorative_justice_and_the_active_victim_ exploring_empowerment
-
3. Brenner, S. W. (2010). Cybercrime: Criminal threats from cyberspace. Praeger, 2010
-
4. Broadhurst, R. (2006). Developments in the global law enforcement of cyber-crime. Policing: An International Journal, 29(3),
-
5. https://www.researchgate.net/publication/27465550_Developments_in_the_global_law_ enforcement_of_cyber-crime
-
6. European Union Agency for Fundamental Rights. (2021). Protecting victims’ rights in the digital age. Publications Office of the European Union.
-
7. European Union. (2012). Directive 2012/29/EU establishing minimum standards on the rights, support and protection of victims of crime. Official Journal of the European Union, L 315/57.
-
8. FraudeHelpdesk. (2021). Over ons. https://www.fraudehelpdesk.nl
-
9. Komisioni Evropian. (2020). e-Victims Project: Enhancing protection of cybercrime victims in the EU. Brussels.
-
10. McGuire, M. (2021). The Dark Web and Cybercrime: Current Threats and Future Trends (2021) https://www.surrey.ac.uk/people/michael-mcguire
-
11. McGuire, M. (2016). Cybercrime 4.0: Which way now. p.251-275 Palgrave Macmillan.
-
13. Wall, D. S. (2024). Cybercrime: The Transformation of Crime in the Information Age, 2nd edition, Cambridge, Cambridge: Polity. ISBN-10: 0745653529
-
14. https://www.researchgate.net/publication/378013252_Cybercrime_The_Transformation_of_ Crime_in_the_Information_Age_2nd_edition
-
15. Weisser Ring. (2020). Hilfe für Opfer von Kriminalität und Gewalt. https://weisser-ring.de
-
16. AKCESK – Autoriteti Kombëtar për Certifikimin Elektronik dhe Sigurinë Kibernetike. (2023).
-
Raporti vjetor mbi sigurinë kibernetike në Shqipëri. Tiranë.
-
17. Yar, M. (2013). Cybercrime and Society (2nd ed.). SAGE Publications.
References
1. Bélanger, F., & Crossler, R. E. (2011). Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Quarterly, 35 (4), 1017-1041. https://misq.umn.edu/privacy-in-the-digital-age-a-review-of-information-privacy-research-in-information-systems.html
2. Bolivar, D. Aertsen, I. Mesmaecker, V. Lauwers, N. (2011). Restorative justice and the active victim: exploring the concept of empowerment context: DOI: 10.2298/TEM1101005A Researchgate https:// www.researchgate.net/publication/215564643_Restorative_justice_and_the_active_victim_ exploring_empowerment
3. Brenner, S. W. (2010). Cybercrime: Criminal threats from cyberspace. Praeger, 2010
4. Broadhurst, R. (2006). Developments in the global law enforcement of cyber-crime. Policing: An International Journal, 29(3),
5. https://www.researchgate.net/publication/27465550_Developments_in_the_global_law_ enforcement_of_cyber-crime
6. European Union Agency for Fundamental Rights. (2021). Protecting victims’ rights in the digital age. Publications Office of the European Union.
7. European Union. (2012). Directive 2012/29/EU establishing minimum standards on the rights, support and protection of victims of crime. Official Journal of the European Union, L 315/57.
8. FraudeHelpdesk. (2021). Over ons. https://www.fraudehelpdesk.nl
9. Komisioni Evropian. (2020). e-Victims Project: Enhancing protection of cybercrime victims in the EU. Brussels.
10. McGuire, M. (2021). The Dark Web and Cybercrime: Current Threats and Future Trends (2021) https://www.surrey.ac.uk/people/michael-mcguire
11. McGuire, M. (2016). Cybercrime 4.0: Which way now. p.251-275 Palgrave Macmillan.
13. Wall, D. S. (2024). Cybercrime: The Transformation of Crime in the Information Age, 2nd edition, Cambridge, Cambridge: Polity. ISBN-10: 0745653529
14. https://www.researchgate.net/publication/378013252_Cybercrime_The_Transformation_of_ Crime_in_the_Information_Age_2nd_edition
15. Weisser Ring. (2020). Hilfe für Opfer von Kriminalität und Gewalt. https://weisser-ring.de
16. AKCESK – Autoriteti Kombëtar për Certifikimin Elektronik dhe Sigurinë Kibernetike. (2023).
Raporti vjetor mbi sigurinë kibernetike në Shqipëri. Tiranë.
17. Yar, M. (2013). Cybercrime and Society (2nd ed.). SAGE Publications.



