scholarly journals DIGITALIZATION AS A DIRECTION OF TRANSFORMATION OF CRIMINAL PROCEEDINGS

2021 ◽  
pp. 96-102
Author(s):  
T. О. Pavlova

The article is devoted to the study of the influence of the process of digitalization on the transformation of modern criminal proceedings, the functioning of the institution of justice in general. The introduction of electronic criminal proceedings in our country is due to the development of a modern electronic society and trends in the introduction of information and communication technologies in the world. Electronic criminal proceedings is a “smart” information and analytical system that digitizes paper documents, allows the exchange of files within the framework of criminal proceedings. It is proposed to carry out a detailed and systematic analysis of the provisions of the current national legislation in order to introduce the appropriate substantiated legislative changes and consolidate the concept, stages, and algorithm of the electronic criminal proceedings; the introduction of electronic criminal proceedings on the basis of the functioning of Unified Register of Pre-trial Inquiry. Electronic criminal proceedings are an inevitable phenomenon of the modern information world. For the quality of operation of electronic criminal proceedings, it is necessary to take into account the advantages and risks of the functioning of a “smart” system. The advantages of introducing electronic criminal proceedings include: saving money and time; reduction of terms for consideration of procedural documents; simplification of access of subjects of criminal proceedings within their competence to procedural materials; increasing the efficiency of the investigation of criminal proceedings and so on. The introduction of electronic criminal proceedings should take place quite deliberately, with the understanding that digital technologies will inevitably affect relationship between people and the formation of their thinking. We believe that digital intelligence is not capable to replace a specialist completely. The digitalization of criminal proceedings will entail certain risks and difficulties. It is necessary to protect the collected personal data, which will prevent the drafting of clone documents and the «leaking» of confidential information in connection with cyber-attacks. It is also necessary to protect the provision of necessary equipment for law enforcement officers and judges in the field; the need to integrate among themselves the working electronic systems of the pre-trial inquiry bodies and the court; training of personnel capable of working with digital computer technologies and so on.

2019 ◽  
Vol 137 (1) ◽  
pp. 33-37
Author(s):  
Dominik Engel

AbstractThe mission to move from fossil to renewable energy sources is accompanied and enabled by the digitalization of our energy systems. With the introduction of information and communication technologies, the widespread integration of distributed, renewable sources, even in the distribution grid, are enabled. New use cases such as fast EV charging, local energy communities and dynamic energy tariffs are also enabled. However, this move toward digitalization also increases the exposure of the energy systems for cybercrime and raises concerns regarding the privacy of personal data. In this article, we address the issue of privacy in smart energy systems and give an overview of current methods to enhance privacy.


Urban Studies ◽  
2016 ◽  
Vol 54 (4) ◽  
pp. 984-998 ◽  
Author(s):  
Tali Hatuka ◽  
Eran Toch

Over recent decades, cities have been radically transformed by information and communication technologies (ICTs) that modify people’s daily lives by reorganising mobility, infrastructure systems and physical spaces. However, in addition to the role that technology plays in the development of the infrastructure in our cities, it is also being used ‘as a means of control’. This view of technology as a disciplinary tool that restructures space, time and the relations among activities has been promoted by scholars who have shown that technology is also a means of saturating and sustaining contemporary capitalist societies and deepening inequalities. However, the situation is far more complex than that. Technology is not only used top-down but also bottom-up, with individuals using technological devices to share and enhance their visibility in space. This bidirectional paradigm – of vertical surveillance and horizontal sharing – contributes to a sense of ‘being exposed’ in public space that normalises practices of sharing personal data by individuals and thus results in diminished privacy. This argument is supported by an experiment conducted on smartphone users that includes personal interviews and the use of a smartphone Android application that combines online tracking with experience sampling. The findings show a convergence between the online and offline worlds (a ‘public’ situation in the offline world is also considered as such in the online world), which is a condition that contributes to the normalisation of ‘asymmetrical visibility’. Based on these results, the paper ends with a discussion of the contemporary meaning of public space.


2020 ◽  
Vol 26 (3) ◽  
pp. 39-42
Author(s):  
Mihaela Anamaria Bostan-Pop ◽  
Romana Oancea

AbstractConsidering that the level of cyber threats is constantly increasing, a necessary demand emerges from organizations and corporations worldwide to protect their networks against possible cyber-attacks. In the future all malicious actions that occur in cyberspace will continue to alter the way we approach the security of an entire network. The article presents the most stringent need concerning the technical specialization of future officers, highlighting the knowledge entailed in order to better understand the complexity of a mission that takes place in virtual space. Undoubtedly, modern battlefield incorporates a virtual component where nearly all weapons systems rely upon information and communication technologies in order to connect and achieve operational level. The demand for future cyber defence specialists in the military domain reached a high level all over the world, and there will be a challenging process to be able to create a highly skilled workforce to fight against a large scale of malicious activities that have impact upon the national security system.


Author(s):  
Chiara Meret ◽  
Michela Iannotta ◽  
Mauro Gatti

In line with the recent tendencies of limited natural resources, demographic development, dematerialization, and digitalization, this chapter underlines the necessity of deepening the role information and communication technologies (ICTs) play for corporate social responsibility (CSR) challenges. In fact, due to the diffuse integration of ICT into most of people's and firms' daily activities, companies cannot neglect the role of ICT in shaping CSR strategies. Hence, ICT has the potential to support the three main aspects of sustainable development—people, profit, and planet—which can be found in the so-called triple bottom line approach (TBL). However, the role of ICTs in supporting the shear zones between the abovementioned lines still counts a lack of contribution. Through a systematic analysis of the literature, the chapter affords insights for a further advance compared to the extant literature as the content analysis provides a description of how ICT support the sub-dimensions included in the three shear zones.


Author(s):  
P. Borovik

The results of a forensic analysis of typical methods of committing crimes involving the use of electronic payment methods are presented. It is shown that the basis of this criminal activity are the methods of social engineering based on the application of the achievements of modern information and communication technologies, as well as on actions and approaches through which offenders gain unauthorized access to the personal data of the victim. Taking into account the study of the stages of the mechanism of the considered criminal acts, the sources of trace information are formulated, reflecting the processes of interaction of participants in a criminal event with each other and with the environment.


2021 ◽  
Vol 7 (4) ◽  
pp. 358-367
Author(s):  
Olga A. Ignatieva

The rapid development of information and communication technologies creates new opportunities not only for science, technology and society, but also for political power and governance. Global capitalism is being replaced by platform imperialism. Political power and the state apparatus now have ample opportunities to improve their performance, from the use of algorithmic management based on big data and digital control of the population to increasing trust in the decisions they make by creating the possibility of direct communication between citizens and public authorities through digital platforms. This paper will examine the specifics of legitimizing power through communication platforms, both at the level of a single state and in the international arena. The theoretical framework of this paper is the systematic analysis of D. Easton. Easton. F. Sсharpf and W. Schmidt. Also, to understand the peculiarities of platform interaction M. Foucault's concept of governmentality is involved. The work examines not only the peculiarities of the legitimization of power at the national and global level in the era of digitalization, but also analyzes the types of legitimacy of political decisions made through regional and global platforms.


Author(s):  
Olivia Swee Leng Tan ◽  
Rossanne Gale Vergara ◽  
Raphael C. W. Phan ◽  
Shereen Khan ◽  
Nasreen Khan

The progression of information and communication technologies (ICT) use have been matched by the rise in corruption and abuse of technology for criminal activities. In 2018, The Malaysia Computer Emergency Response Team reported 10,699 incidents, of which “fraud” had the highest reported incidents (5,123) and the second highest “intrusion attempt” (1,805) of the total incidents. Malaysia cyber laws have existed since 1997 and are still used today to prosecute cybercrimes. Most recent cases were charged under Malaysian laws—Computer Crimes Act 1997, Copyright (Amendment) Act 1997, Communications and Multimedia Act 1998, Personal Data Protection Act 2010, and Malaysian Penal Code—to combat cybercrimes. This chapter discusses Malaysia's cyber laws, cases charged under these laws, and their relevance to combating cybercrimes in Malaysia.


Author(s):  
Ravdeep Kour ◽  
Ramin Karim ◽  
Adithya Thaduri

With the advancements in and widespread adoption of information and communication technologies in infrastructures, cyber-attacks are becoming more frequent and more severe. Advanced cybersecurity threats with automated capabilities are increasing in such sectors as finance, health, grid, retail, government, telecommunications, transportation, etc. Cyber-attacks are also increasing in railways with an impact on railway stakeholders, e.g. threat to the safety of employees, passengers, or the public in general; loss of sensitive railway information; reputational damage; monetary loss; erroneous decisions; loss of dependability, etc. There is a need to move towards advanced security analytics and automation to identify, respond to, and prevent such security breaches. The objective of this research is to reduce cyber risks and vulnerabilities and to improve the cybersecurity capabilities of railways by evaluating their cybersecurity maturity levels and making recommendations for improvements. After assessing various cybersecurity maturity models, the Cybersecurity Capability Maturity Model (C2M2) was selected to assess the cybersecurity capabilities of railway organizations. The contributions of this research are as follows. First, a new maturity level MIL4 (Maturity Indicator Level 4) is introduced in the C2M2 model. Second, the C2M2 model is adapted by adding advanced security analytics and threat intelligence to develop the Railway-Cybersecurity Capability Maturity Model (R-C2M2). The cybersecurity maturity of three railway organizations is evaluated using this model. Third, recommendations and available standards & guidelines are provided to the three railway organizations to improve maturity levels within different domains. In addition, they are given an action plan to implement the recommendations in a streamlined way. The application of this model will allow railway organizations to improve their capability to reduce the impacts of cyber-attacks and eradicate vulnerabilities. The approach can also be extended to other infrastructures with necessary adaptations.


2015 ◽  
Vol 8 (1) ◽  
pp. 35-45
Author(s):  
Marta Sjeničić

E-health is, in many European countries, one of the health care areas that are in the fastest development, due to the endeavor to apply modern information and communication technologies for the purpose of meeting the needs of citizens, patients, health professionals and the health policy creators. E-health potentials are virtually endless and can reach from the delivery of health information and health controle over the internet, through on-line consultations, issuing of drugs through electronic devices, till robotised surgeries or care of elderly population. European Union works actively in this field through different conventions and directives related to the patients’ rights in cross-border healthcare, but also protection of individuals with regard to the processing of personal data. One of the most recent and important documents in this field was Working Document 01/2012 on epSOS (Article 29 Data Protection Working Party), which was enacted January, 2012, and which was the basis for so-called epSOS project that has been impelemented from July 1, 2008 till June 31, 2014. The main objective of epSOS project is to shape, establish and evaluate the infrastructure of services which would enable the crossborder operability between the system of electronic health documentation in Europe. epSOS project aims to develop practical frame for e-health and information-communication infrastructure that would be basis for the safe access to the information on patients' health, in the diferent European health systems.


2021 ◽  
Vol 11 (16) ◽  
pp. 7363
Author(s):  
Giovanni Battista Gaggero ◽  
Paola Girdinio ◽  
Mario Marchese

Microgrids are growing in importance in the Smart Grid paradigm for power systems. Microgrid security is becoming crucial since these systems increasingly rely on information and communication technologies. Many technologies have been proposed in the last few years for the protection of industrial control systems, ranging from cryptography, network security, security monitoring systems, and innovative control strategies resilient to cyber-attacks. Still, electrical systems and microgrids present their own peculiarities, and some effort has to be put forth to apply cyber-protection technologies in the electrical sector. In the present work, we discuss the latest advancements and research trends in the field of microgrid cybersecurity in a tutorial form.


Sign in / Sign up

Export Citation Format

Share Document