Adapting the Budapest Convention to address emerging cyber threats
PDF

Kulcsszavak

Budapest Convention, Cybercrime, Legal framework, Emerging threats.

Hogyan kell idézni

Adapting the Budapest Convention to address emerging cyber threats. (2026). Belügyi Szemle, 74(1), 183-204. https://doi.org/10.38146/bsz-ajia-ajia.2026.v74.i1.pp183-204

Absztrakt

Aim: This paper examines the necessity of adapting the Budapest Convention to address emerging cyber threats, including ransomware, the misuse of cryptocurrencies, artificial intelligence(AI), Internet of Things (IoT) vulnerabilities, and cross-border jurisdictional challenges. The paper highlights the legal gaps and proposes updates to ensure the Convention remains relevant in combating evolving cybercrimes.

Methodology: A comparative legal research approach is employed, analyzing the current provisions of the Budapest Convention alongside case studies of emerging Cyber threats. The research integrates doctrinal analysis and practical insights, including reviews of international legal frameworks, technological developments, and enforcement practices.

Findings: The study identifies significant gaps in the Budapest Convention, including the lack of provisions addressing advanced cybercrime methods and the challenges of cross-border enforcement. These gaps hinder the Convention's ability to address contemporary Cyber threats effectively. The paper suggests concrete reforms, such as incorporating provisions for AI-driven crimes, cryptocurrency regulations, and enhanced cross-border cooperation mechanisms.

Value: This paper contributes to the ongoing discourse on international cybercrime law by proposing actionable updates to the Budapest Convention. It provides a roadmap for policymakers and legal practitioners to enhance the Convention's relevance and effectiveness in tackling the dynamic landscape of cyber threats while safeguarding fundamental rights.

PDF

Hivatkozások

AllahRakha, N. (2024). Global perspectives on cybercrime legislation. Journal of Infrastructure, Policy, and Development, 8(10), 6007. https://doi.org/10.24294/jipd.v8i10.6007

Anderson, J. (2021). Balancing evidence collection with privacy rights: A comprehensive analysis of the Convention. Journal of Law and Privacy, 12(3), 45–67.

Antonakakis, M., April, T., & Bailey, M. (2022). Understanding the Mirai botnet. Journal of Cybersecurity, 5(3), 45–56.

Backes, M., Müller, A., & Weber, P. (2019). Cybersecurity in the age of AI and IoT: Legal perspectives and challenges. Journal of Digital Security Law, 14(3), 134–150.

Brenner, S. W. (2012). Cybercrime and the law: Challenges, issues, and outcomes. International Data Privacy Law, 6(2), 78–102.

Cerezo, A. I., Lopez, J., & Patel, A. (2007). International cooperation to fight transnational cybercrime. In Digital Forensics and Incident Analysis, 2007. WDFIA 2007. Second International Workshop on (pp. 1–10). IEEE. https://doi.org/10.1109/WDFIA.2007.4299369

Gardner, A. L. (2020). Law enforcement cooperation. In Stars with stripes. Palgrave Macmillan. https://doi.org/10.1007/978-3-030-29966-8_9

Horan, C., & Saiedian, H. (2021). Cybercrime investigation: Landscape, challenges, and future research directions. Journal of Cybersecurity and Privacy, 1(4), 580–596. https://doi.org/10.3390/jcp1040029

Koops, B. J. (2021). The trouble with European data protection law. International Data Privacy Law, 11(2), 100–115.

Kuzior, A., Tiutiunyk, I., Zielińska, A., & Kelemen, R. (2024). Cybersecurity and cybercrime: Current trends and threats. Journal of International Studies, 17(2), 220–239. https://doi.org/10.14254/2071-8330.2024/17-2/12

McCall, A. (2024). Cybersecurity in the age of AI and IoT: Emerging threats and defense strategies [Manuscript]. ResearchGate. https://www.researchgate.net/publication/386050391_Cybersecurity_in_the_Age_of_AI_and_IoT_Emerging_Threats_and_Defense_Strategies

Mezei, K., & Krasznay, Cs. (2022). Cybersecurity and cybercrime in Hungary during the COVID-19 pandemic. In K. Chałubińska-Jentkiewicz & I. Hoffman (Eds.), The role of cybersecurity in the public sphere – The European dimension (pp. 133–146). Institute for Local Self-Government Maribor.

Mitchell, A. D., & Mishra, N. (2019). Regulating cross-border data flows in a data-driven world: How WTO law can contribute. Journal of International Economic Law, 22(3), 387–405. https://doi.org/10.1093/jiel/jgz016

Mohamed, N. N., & Abuobied, B. H. H. (2024). Cybersecurity challenges across sustainable development goals: A comprehensive review. Sustainable Engineering and Innovation, 6(1), 57–86. https://doi.org/10.37868/sei.v6i1.id207

Morse, J. (2021). Cryptocurrencies and cybercrime: Challenges for law enforcement. Emerging Issues in Cybersecurity, 5(1), 45–67.

Rainer, M. (2020). International law and data protection. Global Law Press.

Rehman, H., & Liu, H. (2021). Proactive cyber defense: Utilizing AI and IoT for early threat detection and cyber risk assessment in future networks [Manuscript]. ResearchGate. https://www.researchgate.net/publication/384052025_Proactive_Cyber_Defense_Utilizing_AI_and_IoT_for_Early_Threat_Detection_and_Cyber_Risk_Assessment_in_Future_Networks

Taylor, L. (2021). Adapting the Budapest Convention to the digital age: Balancing security and fundamental rights. Journal of International Cyber Law, 18(2), 45–67.

Temara, S. (2024). The ransomware epidemic: Recent cybersecurity incidents demystified. Asian Journal of Advanced Research and Reports, 18(3), 1–16. https://doi.org/10.9734/ajarr/2024/v18i3610

Thomas, J. (2019). A case study analysis of the Equifax data breach. Journal of Cybercrime Studies, 8(2), 134–150.

Wang, X. (2024). Global (re-)framing of cybercrime: An emerging common interest in flux of competing normative powers? Leiden Journal of International Law. https://doi.org/10.1017/S0922156524000402

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Copyright (c) 2026 Belügyi Szemle

Downloads

Download data is not yet available.