Articles | Open Access |

Recalibrating Cybercrime Investigation and Digital Evidence Governance: A Comparative Legal-Operational Framework with Insights from India And Selected Arab Jurisdictions

Elena Markovic , Faculty of Law, University of Ljubljana, Slovenia

Abstract

Background: Cybercrime has evolved from isolated computer misuse into a systemic threat spanning critical infrastructure, personal data ecosystems, and cross-border digital markets. Legal systems have responded through criminalization, procedural adaptations, and recognition of electronic transactions and signatures, yet enforcement effectiveness continues to hinge on investigative capacity and the integrity of digital evidence. Comparative legal scholarship across Arab jurisdictions has long emphasized the procedural fragility of internet-crime investigations and the evidentiary uncertainties that arise when traditional criminal law confronts dematerialized proof and volatile data environments (Al-Shawa, 1994; Al-Hawal, 2007; Ahmed, 2013). India’s rapidly digitizing society adds a distinct operational layer: public-private collaboration constraints, cyber hygiene disparities, cybersecurity capacity gaps, and the lived reality of ransomware and critical-infrastructure risk (Bhatia, 2020; Gupta & Mehta, 2020; Mehta, 2023; CERT-In, 2023).

Objective: This study develops a publication-ready, doctrinal and operational framework for cybercrime investigation and digital evidence governance by integrating comparative legal principles with institution-focused findings drawn from India’s cybersecurity landscape.

Methods: A qualitative research design was applied using doctrinal legal analysis of legislative instruments and comparative scholarship, paired with thematic synthesis of institution and policy-oriented literature. The analysis triangulates: (i) foundational Arab legal writings on cybercrime, investigation, and digital evidence; (ii) selected statutory instruments relating to cybercrime and electronic transactions; and (iii) India-focused scholarship and national threat reporting addressing coordination, resilience, skills, and critical infrastructure. Evidence quality, chain-of-custody, and procedural legitimacy were treated as central analytic lenses (Al-Hamad, 2014; Al-Faili, 2012; Al-Maamari, 2018).

Results: The study finds that cybercrime governance fails most predictably at “interfaces”: between substantive criminalization and procedural proof; between investigative bodies and private intermediaries; between national capacity and transnational evidence flows; and between formal legal standards and day-to-day cyber hygiene realities. A comparative framework is derived that emphasizes legally defensible evidence-handling protocols, role clarity for investigative devices, calibrated public-private cooperation, and targeted capacity-building that addresses awareness divides and institutional shortcomings (Kumar & Singh, 2022; Rao, 2023; Sharma, 2023).

Conclusion: Effective cybercrime control is less a question of introducing new offences and more a question of building proof-resilient procedures and collaboration architectures that can withstand judicial scrutiny while operating at the pace of digital threats. The proposed framework prioritizes evidence quality governance, investigatory specialization, and collaboration design that reduces friction without diluting due process (Al-Khalaf, 2016; Pillai, 2023).

Keywords

Cybercrime investigation, digital evidence, chain of custody, public-private collaboration

References

Ahmed, H. A. T. (2013). Legislative response to computer and internet crimes: A comparative study. Cairo: Dar Al-Fikr Wal-Qanun. https://daralfikr.com

Al-Bushari, M. A. (2005). Investigation in computer crimes. Paper presented at the Law, Computer and Internet Conference, UAE University. https://www.uaeu.ac.ae

Al-Deirbi, A. A., & Ismail, M. S. (2012). Electronic crimes: A legal and judicial comparative study. Cairo: National Center for Legal Publications. https://ncplp.com

Al-Faili, A. A. (2012). Investigation procedures and evidence collection in cybercrimes: A comparative study (Master’s thesis). University of Mosul. https://uomosul.edu.iq

Al-Hamad, M. K. (2014). Digital evidence and its quality standards. Amman: Academic Book Center. https://abcbooks.jo

Al-Hawal, N. H. (2007). Procedural aspects of internet crimes in the evidence collection stage. Alexandria: Dar Al-Fikr Al-Jami’i. https://daralfikr.com

Al-Kaabi, M. A. (2005). Crimes arising from the unauthorized use of the internet. Cairo: Al-Nahda Al-Arabia. https://nahdaegypt.com

Al-Khalaf, J. K. (2016). Criminal evidence in cybercrime. Law Journal of Legal Studies Research, University of Dhi Qar. https://law.uodiyala.edu.iq

Al-Maamari, M. B. H. (2018). Electronic evidence to prove cybercrime. Kuwaiti International Law College Journal, 2(2). https://kilaw.edu.kw

Al-Qahouji, A. A. (1997). Criminal protection of computer programs. Alexandria: Dar Al-Jama’a Al-Jadida. https://daraljamaea.com

Al-Shawa, M. S. (1994). The information revolution and its impact on criminal law. Cairo: Al-Nahda Al-Arabia. https://nahdaegypt.com

Al-Shukri, A. Y. (2008). The cybercrime and the crisis of criminal law. Kufa Studies Center. https://kufa-center.org

Al-Thanyan, N. A. (2012). Proving cybercrime: A foundational and practical study (Master’s thesis). Naif Arab University for Security Sciences. https://nauss.edu.sa

Amara, M. B., & Ali, S. A. (2020). The electronic crime investigation device in Algerian legislation (Master’s thesis). University of Bouira. https://univ-bouira.dz

Bhatia, A. (2020). Public-private collaboration in cyber security: An Indian perspective. Journal of Cyber Policy, 5(2), 101–119. https://doi.org/10.1080/23738871.2020.1720954

CERT-In. (2023). Annual cybersecurity threat report 2023. Ministry of Electronics and Information Technology. https://www.cert-in.org.in

Foda, N. A. M. F. (2004). Computer crimes: A theoretical and applied study. Cairo: Al-Nahda Al-Arabia. https://nahdaegypt.com

Gupta, P., & Mehta, R. (2020). Cyber hygiene practices in India: Challenges and solutions. Indian Journal of Information Technology, 12(3), 45–58. https://ijitjournal.org

Gupta, R. (2023). Challenges in public-private cybersecurity collaboration in India. Cybersecurity Journal of India, 15(3), 45–58. https://cyberjournalindia.com

Hegazy, A. B. (2006). Combating computer and internet crimes in Arab law. Alexandria: Dar Al-Fikr Al-Jami’i. https://daralfikr.com

Ibrahimi, J. (2018). Criminal investigation in cybercrimes (Doctoral dissertation). Mouloud Mammeri University. https://ummto.dz

Ibrahim, R. B. (2008). Criminal investigation in information technology crimes: A practical study in Abu Dhabi. Strategic Studies Journal. https://ecssr.ae

Iraq. (2012). Law No. 78 of 2012 on electronic signatures and electronic transactions. https://iraqld.hjc.iq

Kumar, A., & Singh, P. (2022). Institutional shortcomings in India’s cybersecurity framework. National Cyber Studies, 28(4), 12–21. https://nationalcyberstudies.org

Kumar, S., Mishra, P., & Singh, A. (2021). Institutional challenges in India’s cyber security landscape. Cyber Security Review, 9(4), 32–47. https://cybersecurityreview.org

Mamdouh, A. (2000). Digital forensics and investigating computer and internet crimes. Cairo: Dar Al-Kutub Al-Qanuniya. https://daralkotoblegal.com

Mamdouh, I. K. (2010). The art of criminal investigation in cybercrimes. Alexandria: Dar Al-Fikr Al-Jami’i. https://daralfikr.com

Mehta, V. (2023). Ransomware attacks on critical infrastructure: The Indian context. Journal of Cybersecurity, 19(1), 73–89. https://academic.oup.com/cybersecurity

Mishra, V., & Sharma, R. (2022). Rethinking India’s national cyber security policy. Defence Strategy Studies Journal, 15(1), 89–103. https://defencestudiesjournal.org

Pillai, S. (2023). Evaluating India’s Digital Personal Data Protection Act. Legal Perspectives in Cybersecurity, 22(2), 36–48. https://legalcyberjournal.org

Rabei, H. (2015). The cybercriminal: His personality and categories. Human Sciences Journal, Mohamed Khider University of Biskra. https://univ-biskra.dz

Raghavan, S., & Singh, K. (2021). Cyber resilience in India: Opportunities and challenges. International Journal of Cyber Studies, 18(2), 67–81. https://ijcsjournal.org

Rao, M. (2023). Cybersecurity awareness in India: A rural-urban divide. Economic and Political Weekly, 58(7), 18–25. https://www.epw.in

Saidi, N. (2013). Methods of research and investigation of cybercrime in Algerian law (Master’s thesis). University of El-Hadj Lakhdar. https://univ-batna.dz

Saudi Arabia. (2007). Royal Decree No. 17 of 8/3/1428 on cybercrime prevention. https://laws.boe.gov.sa

Sharma, N. (2023). Bridging the cybersecurity skills gap: India’s roadmap. NASSCOM Cybersecurity Report. https://nasscom.in

Sharma, P. (2021). Securing critical infrastructure in India: A cyber security perspective. Energy Policy Research Quarterly, 6(1), 13–24. https://energyresearchjournal.org

Sultan Al-Olama, M. A. R. (2005). Internet crimes and their accountability. Paper presented at the Law, Computer and Internet Conference, UAE University. https://uaeu.ac.ae

Sultanate of Oman. (2011). Law No. 12 of 2011 on cybercrime. https://omanportal.gov.om

Taheri, A. (2015). Criminal evidence by digital evidence (Master’s thesis). University of M’sila. https://univ-msila.dz

Article Statistics

Copyright License

Download Citations

How to Cite

Elena Markovic. (2026). Recalibrating Cybercrime Investigation and Digital Evidence Governance: A Comparative Legal-Operational Framework with Insights from India And Selected Arab Jurisdictions. International Journal of Law And Criminology, 6(03), 1–13. Retrieved from https://theusajournals.com/index.php/ijlc/article/view/9421