Abstract

This research aims to contribute to the development of criminal law policies addressing the widespread distribution of smartphone applications, both APK and iOS, that are used as tools for unauthorized online loan activities, online fraud, threats, and intimidation. These applications often disguise themselves as legitimate online loan platforms, wedding invitation apps, and parcel delivery services. Upon download, they illicitly debit mobile banking accounts or present themselves as government auction platforms for criminal goods at discounted prices, posing significant threats to consumers, debtors, and the general public. Theoretical framework: The foundation of this research lies in cyber law theory, which endeavors to create legal strategies to address cybercrimes and safeguard the digital community. This study utilizes a multidisciplinary approach, integrating legal analysis, policy assessment, and collaboration with stakeholders. Methods: This study utilized the normative juridical method to examine digital policies by criminalizing illegal smartphone applications through cyber law policies. This approach involves a systematic legal analysis of current regulations, assessing their effectiveness, and suggesting formal legal measures to address new threats posed by unauthorized applications, with an emphasis on protecting digital society from harm. Results and Conclusions: This indicates a pressing need for comprehensive criminal law policies specifically designed to effectively combat these unauthorized applications. Such policies are crucial in preventing and mitigating the harms caused by these applications before they impact society. The author's contribution lies in proposing formal offenses against the creators and disseminators of these applications. malicious applications, thereby bridging the current gap in legal measures to counteract digital criminal activities. Originality/Value: This research underscores the urgency of formulating and implementing cyber law policies to safeguard the public from the detrimental effects of illicit smartphone applications. Its originality lies in proposing innovative legal strategies to proactively address emerging digital threats.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.