<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">jssi</journal-id>
      <journal-title-group>
        <journal-title>Journal of Security and Sustainability Issues</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2029-7017</issn>
      <issn pub-type="ppub">2029-7017</issn>
      <publisher>
        <publisher-name>LKA</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">JSSI834</article-id>
      <article-id pub-id-type="doi">10.9770/jssi.2019.8.3(4)</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Cyber Security Issues: Problematic Aspects of Hacking</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>Marcinauskaitė</surname>
            <given-names>Renata</given-names>
          </name>
          <email xlink:href="mailto:r.marcinauskaite@lat.lt">r.marcinauskaite@lat.lt</email>
          <xref ref-type="aff" rid="j_jssi_aff_000"/>
        </contrib>
        <aff id="j_jssi_aff_000">Mykolas Romeris University, Ateities g. 20, LT-08303 Vilnius, Lithuania,
The Supreme Court of Lithuania, Gynėjų g. 6, 01109 Vilnius, Lithuania</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Pukanasytė</surname>
            <given-names>Indrė</given-names>
          </name>
          <email xlink:href="mailto:indre.pukanasyte@kam.lt">indre.pukanasyte@kam.lt</email>
          <xref ref-type="aff" rid="j_jssi_aff_001"/>
        </contrib>
        <aff id="j_jssi_aff_001">Ministry of National Defence of Republic of Lithuania, Totorių st. 25, LT-01121 Vilnius, Lithuania</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Šukytė</surname>
            <given-names>Jolita</given-names>
          </name>
          <email xlink:href="mailto:jolitasukyte@mruni.eu">jolitasukyte@mruni.eu</email>
          <xref ref-type="aff" rid="j_jssi_aff_002"/>
        </contrib>
        <aff id="j_jssi_aff_002">Mykolas Romeris University, Ateities g. 20, LT-08303 Vilnius, Lithuania</aff>
      </contrib-group>
      <volume>8</volume>
      <issue>3</issue>
      <fpage>331</fpage>
      <lpage>343</lpage>
      <pub-date pub-type="ppub">
        <day>30</day>
        <month>03</month>
        <year>2019</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>30</day>
        <month>03</month>
        <year>2019</year>
      </pub-date>
      <permissions>
        <ali:free_to_read xmlns:ali="http://www.niso.org/schemas/ali/1.0/"/>
      </permissions>
      <abstract>
        <p>The research paper discusses different issues of interpretation and qualification of illegal access to an information system (IS), taking into account international instruments and European Union legislation as well as the relevant case law of Lithuania. Analysis of criminal cases and legal regulation shows that such cases require an appropriate combination of the technical and legal sides of such criminal offences. In this context, it is also important that criminal liability for illegal access to an IS must be underpinned not only by the principles of technological neutrality and equivalent assessment but also must ensure respect for the ultima ratio (last resort) principle. It is this principle which in particular is the subject of considerable attention in the research paper in terms of over-criminalisation of illegal access to an IS. While solving the puzzle of technology and terminology alignment, the paper also explores the elements of illegal access to an IS. In the light of developments in Lithuanian case law, more emphasis is placed on the debatable infringement of security measures, as an element, and on possible interpretation of its content.</p>
      </abstract>
      <kwd-group>
        <label>Keywords</label>
        <kwd>cybercrime</kwd>
        <kwd>hacking</kwd>
        <kwd>illegal access</kwd>
        <kwd>information system</kwd>
        <kwd>security measures</kwd>
        <kwd>ultima ratio</kwd>
        <kwd>over-criminalisation</kwd>
      </kwd-group>
      <kwd-group kwd-group-type="JEL">
        <label>JEL</label>
        <kwd>O33</kwd>
      </kwd-group>
    </article-meta>
  </front>
</article>
