scholarly journals The Phenomenon of Cybercrime in the 21st Century

Author(s):  
T. V. Plotnikova ◽  
◽  
O. V. Kotelnikova ◽  

The spread and development of the “Internet” has erased the boundaries of communication and the dissemination of information. With the massive spread of computers, the world community is faced with such phenomena as illegal activities using a computer (and / or against computers), as well as this activity through the Internet. Many scientists and experts distinguish between cybercrime as a legal category and as a social phenomenon. The first is characterized by a specific unlawful act using a computer, computer network or the Internet. The qualification of these acts within the framework of cybercrime is not in doubt and complexity, because here are clearly expressed signs of a virtual illegal act. These illegal acts are aimed at all spheres of public life. There is no clear division into specific types of cybercrime. For cybercriminal prosecution, it is necessary to prove their involvement in this illegal act. The “virtual traces” of an illegal act are easy to hide due to the ease of changing and destroying computer information. A procedure for processing and seizing evidence is quite complicated, and sometimes impossible. These facts make it difficult to prove the guilt and involvement of a person in a virtual crime, thereby contributing to an increase in the percentage of unsolved crimes. Cybercrime has become a threat to security of man, society and the government. It poses a real threat not only to individual states, but also to the entire world community as a whole.

Author(s):  
Victor Sychov

Migration processes are highlighted as a social phenomenon that determines the state of both individual states and the entire world community. It is emphasized that today migration is one of the most urgent problems not only of social, but also economic and political spheres. In recent decades, there has been a significant revival of migration processes associated with political and socio-economic upheavals in the lives of many countries in the world. The complexity of this phenomenon often leads to contradictions between the interests of the state (including the entire world community as a global mechanism of social organization) and the rights of an individual, nation, ethnic group. In this regard, migration processes are a means of adapting people to the changes that are happening, which explains the relevance of their comprehensive research. Numerous statistics on migration processes, as well as other data in the field of migration research, need to be considered, which will make some migration fluidity more understandable and possibly more controlled and manageable. Concepts such as «migration», «migration process» and their relation are considered. The basic conceptual models (bases) of migration policy are investigated. Keywords: migration; migration policy.


Author(s):  
Inderjeet Singh Sodhi

This chapter highlights the constant increase in the number of attacks on computer network systems, which has pushed governments, researchers, and experts to devise better security policies and strategies. However, the rapid growth of systems, components, and services offered has increased the difficulty of administering them. In many organizations in developed and developing countries, more emphasis is being given on use of Automatic Computing for proper network security. The chapter clarifies how various projects and tools could be relevant for network security. The chapter provides insights about what steps have been taken for network security in a developing country like India. It looks into various strategies adopted for communication data and network security in India. It emphasizes that, with increasing demand for basic/citizen services over the Internet, it has become important to protect data and ensure efficient backup and data recovery. The chapter proposes a need for better and effective policy and strategy for communication data and network security to make the government citizen-oriented in developing countries.


2021 ◽  
pp. 203-210
Author(s):  
Jenna Supp-Montgomerie

The telegraph wove its way across the ocean at a time when religion’s role in public life was commonplace. Since then, networks have become more vital to everyday life in easily perceptible ways while religion is considered a less overt part of so-called secular public culture in the United States. The epilogue proposes that the relationship of telegraphic networks to the networks that shape our world today is not causal or continuous but one of resonance in which some elements are amplified and some are damped. The protestant dreams for the telegraph in the nineteenth century—particularly the promise of global unity, the celebration of unprecedented speed and ubiquity, and the fantasy of friction-free communication—reverberate in dreams for the internet and social media today. In cries that the internet makes us all neighbors reverberates the electric pulse of the celebrations of the 1858 cable’s capacity to unite the world in Christian community. And yet, it is not a straight shot from then to now. Some elements have faded, particularly overt religious motifs in imaginaries of technology. The original power of public protestantism in the first network imaginaries continues to resonate today in the primacy of connection.


Author(s):  
Andrey Paramonov ◽  
Vadim Kharin

The relevance of the study is confirmed by the fact that extremism is one of the most dangerous phenomena in the security of the world community, which pose a threat to the whole society both with committed crimes and the destruction of generally recognized rules of morality, law and human values. We point out that in modern conditions the dissemination of extremist ideas is actively promoted by information and communication technologies, especially the Internet. It is emphasized that extremists have the opportunity not only to demonstrate their materials to a multimillion audience, but also to enter into discussions and uphold their ideas and views. The Internet is very promising for extremists. This study considers the benefits that the Internet provides in disseminating extremist information. We believe that the problem of the spread of extremist information on the Internet is especially perceptible to young people. Due to personal and psychological characteristics, this social group is very vulnerable, as they are easily imposed on the ideas and views of extremists. In the context of the active spread of extremism on the Internet, the regulatory framework for combating these crimes is extensively presented. We indicate some problems with the practical implementation of countering extremism on the Internet.


2002 ◽  
Vol 111 (12) ◽  
pp. 1139-1143 ◽  
Author(s):  
Dimitrios G. Balatsouras ◽  
Dimitrios Kandiloros ◽  
Antonis Kaberos ◽  
Eleftherios Ferekidis ◽  
Stavros G. Korres ◽  
...  

During recent years, the Internet has evolved into the largest computer network in the world, allowing access to vast amounts of information and services. Medical information is increasingly available to both patients and professionals, and ever more biomedical resources are becoming available on-line to assist in research, clinical medicine, and education. The Internet has always provided useful resources to otolaryngologists, implemented at various academic departments and national organizations or by specialists or specific medical web sites offering technical, scientific, and biomedical information. The purpose of this article is to provide as complete a list as possible of the World Wide Web sites accessible through the Internet that are of interest to otolaryngologists. It summarizes different types of resources available, including educational material, audiology sites, outcomes research, discussion lists, research laboratories, publications, medical libraries, news and medical conferences, organizations, academic departments, otolaryngological and medical resources, medical and surgical equipment and suppliers, and miscellaneous other sites of interest to otolaryngologists. This review is intended to present the wealth of the accessible information on the Internet and to promote the use of the network to otolaryngologists who do not have extensive experience in computers or telecommunications.


Kosmik Hukum ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 121
Author(s):  
Reza Hikmatulloh ◽  
Evy Nurmiati

Cybercrime can be defined as illegal activities with computer intermediaries that can be carried out through global electronic networks. In computer networks such as the internet, the problem of crime is becoming increasingly complex due to its wide scope. The purpose of this study is to see what strategies are suitable for preventing cybercrime actions via cell phones based on the ITE Law in Indonesia. The data analysis method used in this study is to use routine activity theory. Cohen and Felson's incidence that crime against crime is related to three variables, namely someone who is motivated, the target who is the target, and the absence of protection from the target (absence of a capable guard). The suggestion is that Gojek provides education about awareness in this fraud case. Gojek appeals to users on their social media to be more careful in trusting information. In addition, the government should not only give warnings to its users as a form of vigilance, but the government should be more optimal in giving more effort.Keywords: Cybercrime, ITE Law, Routine Activity Theory


2020 ◽  
Vol 14 (3) ◽  
pp. 112-122
Author(s):  
A. N. Chumakov ◽  
P. S. Yurchenko

The coronavirus pandemic has generated a lot of talk about the post-coronavirus future of the world community and has drawn close attention to the globalization process. The article notes that something similar in the public consciousness took place after the publication of the first report to the Club of Rome, when the awareness of the danger posed by global problems had quickly come. Now, one of the global problems — the coronavirus pandemic — has changed the usual life rhythm of the entire world community in a matter of weeks. The relevance of the topic is so high that even those who, before that, not only professionally, but even seriously were not interested in either the problems of medicine or global problems, actively joined its discussion. As a result, on the pages of many print and electronic publications, along with serious and verified information, all sorts of guesses and speculations about the nature and correlation of coronavirus and globalization are multiplied. Only knowledge can be opposed to this, according to the authors.


2017 ◽  
Vol 7 (3) ◽  
Author(s):  
Safril Hidayat dan Ridwan

<p><strong>Abstract - </strong>The maritime and marine potentials are so great on the one hand, were a blessing on<strong> </strong>Indonesia's geographical condition, but on the other hand, it can lead to conflict. Exploitation and illegal activities on marine resources without considering to sustainability will worsen the welfare of society and oftenly conflicting international relations. As a country that becomes the crossing of foreign ships where four straits of the seven important straits of the world exist in Indonesian waters, Indonesia is a country that is vulnerable from the side of maritime security. Crime in Indonesian waters is still frequent, either by Indonesian citizens themselves or foreign nationals. The Government of Indonesia with the Nawa Cita program has the vision of Indonesia as a maritime axis of the world. Meanwhile, as a policy, the successful implementation of maritime axis policy is largely determined by content of policy and context of implementation. The successful implementation of maritime axis policy will impact the realization of the welfare and security of Indonesian society. This article uses a qualitative approach with data sources and literature related to maritime axis. Validity and reliability of data is done by reference triangulation. The results show that the implementation of maritime shaft policy still requires the readiness of the implementer as the front guard of maritime axis policy along with the development of maritime infrastructure of international standard.</p><p><strong>Key words: </strong>maritime axis, content of policy, context of implementation, national security</p>


Author(s):  
Nigora Salieva ◽  
◽  
Ulugbek Saliev ◽  

Respect for women is a noble quality inherent in our people. A worthy encouragement of the role and work of women in the upbringing of a healthy and harmoniously developed generation, the creation of the best conditions for them are among the priority directions of state policy. Widely used in the world community, the concept of "gender equality" implies the equal participation of men and women in all spheres of state and public life, in particular, in governance, decision-making and the security sector. A solid legal basis for equality between women and men has been created in our country. Their equality is enshrined in the Constitution. Labor law also provides for gender equality. As a result of the large-scale reforms being implemented in the country, the place of women in the socio-economic sphere is increasingly being strengthened.


2019 ◽  
Vol 33 (67) ◽  
pp. 123-141
Author(s):  
Flaviano de Souza Alves

O homem consegue conversar com o mundo inteiro por meio da Internet, fazendo despertar para esta era de inovações e crescimento tecnológico. Embora pareça que, com o surgimento dessas redes, tenha-se estreitado laços entre pessoas de diversas partes do mundo, ao mesmo tempo, esta prática tem aumentado a vulnerabilidade das pessoas. O trabalho tem como objetivo mostrar a rede de atos criminosos existentes dentro da Deep Weeb. A justificativa para este estudo é o crescente interesse sobre o assunto, sobretudo nos meios acadêmicos, militares, nas áreas de Defesa e Segurança e em áreas policiais, visando também à grande necessidade de informar, analisar, investigar e alertar todos os cidadãos sobre os perigos e os riscos aos quais toda a sociedade está exposta. É necessário continuar com novas pesquisas e apontar novos mecanismos de combate para esses crimes cibernéticos, desenvolver melhores softwares (browser, antivírus, firewall etc.) e a configuração ideal desses softwares para acesso seguro a essa camada da rede. Na Deep Web depende de cada um escolher o que buscar.   Man mange to communicate with the entire world through the Internet and have awaked to this era of innovations and technological growth. Although it seems that ties between people from several parts of the world have been strengthened with the emergence of such networks, at the same time, this practice has increased the vulnerability of people. The paper aims to show the criminal acts network within the Deep Web. The rationale for this study is the rising interest on the subject, especially in the academic, military, defense and security areas and in police areas, seeking as well the great need to inform, analyze, investigate and alert all citizens about the dangers and the threats society has been exposed to. It is a need to continue with new researches and point out original mechanisms to combat these cyber crimes, develop better software (browser, antivirus, firewall, etc.) and its ideal configuration for a secure access to this network layer. At Deep Web, the search depends on everyone’s choice.   El hombre logra comunicarse con el mundo entero a través de Internet, haciendo despertar para esta era de innovaciones y crecimiento tecnológico. Aunque parezca que con el surgimiento de esas redes ha estrechado lazos entre personas de diversas partes del mundo, al mismo tiempo, esta práctica ha aumentado la vulnerabilidad de las personas. El trabajo tiene como objetivo de mostrar la red de actos criminales existentes dentro de Deep Weeb. La justificación para este estudio es el creciente interés sobre el tema, sobre todo en los medios académicos, en los militares, en las áreas de Defensa y Seguridad y en áreas policiales, buscando también la gran necesidad de informar, analizar, investigar y alertar a todos los ciudadanos sobre los mismos peligros y los riesgos a los que toda la sociedad está expuesta. Es necesario continuar con nuevas investigaciones y apuntar nuevos mecanismos de combate para esos crímenes cibernéticos, desarrollar mejores softwares (navegador, antivirus, firewall, etc.) y su configuración ideal para acceso seguro a esa capa de la red. En Deep web depende de lo que cada uno elija.


Sign in / Sign up

Export Citation Format

Share Document