scholarly journals Some Types of Computer Crime and Cybercrime in Ukraine

2021 ◽  
Vol 4 (3) ◽  
pp. 191-197

In this note, the most frequent types of computer crime on the Internet in Ukraine are analysed. It is suggested that international experience in computer crime investigation should be used to combat this because cybercrime has become an international problem, causing enormous damage to governments, commercial entities, and computer systems of individual users. Governments and commercial entities spend significant funds to prevent losing information and ensure its protection. Cybercrime is based on technical knowledge, which is difficult to detect or prevent. This type of criminal activity has a high latency because of the difficulty of determining the qualification of a criminal offence.

Author(s):  
D. V. Zavialova

The article focuses on the technical features of Internet operation, causing legal and forensic consequences when investigating cybercrimes. Decentralized nature and the specificity of Internet governance resulting from its technical architecture lead to difficulties in identifying the jurisdiction during cybercrime investigations. In the article, the author also analyses IT crimes’ particular features, which make them difficult to investigate, as well as some contemporary ideas on the possibility of delineating borders on the Net, the consequences of such measures, and the ways to identify jurisdiction when looking into cybercrimes. Apart from that, the article examines the Internet governance system, managing organizations as well as their hierarchy, and accountability. The technical mechanism of Internet operation is analyzed. Some factors threatening the operation are reviewed. Following the research results, the author proposes some methods to enhance international cooperation regarding cybercrime investigations and resolving jurisdictional issues. The need to increase informational and technical knowledge at all levels and to support interdepartmental cooperation is noted. 


2014 ◽  
Vol 3 ◽  
pp. 94-112
Author(s):  
Angelė Pečeliūnaitė

The article analyses the possibility of how Cloud Computing can be used by libraries to organise activities online. In order to achieve a uniform understanding of the essence of technology SaaS, IaaS, and PaaS, the article discusses the Cloud Computing services, which can be used for the relocation of libraries to the Internet. The improvement of the general activity of libraries in the digital age, the analysis of the international experience in the libraries are examples. Also the article discusses the results of a survey of the Lithuanian scientific community that confirms that 90% of the scientific community is in the interest of getting full access to e-publications online. It is concluded that the decrease in funding for libraries, Cloud Computing can be an economically beneficial step, expanding the library services and improving their quality.


Think India ◽  
2019 ◽  
Vol 22 (2) ◽  
pp. 315-328
Author(s):  
Vishal Patel ◽  
Pravin H. Bhathawala

Anti Virus are nasty software’s. It is designed to damage computer systems without the knowledge of the owner using the system and technique advancements are posing big challenges for researchers in both academia and the industry. The purpose of this study is to examine the available literatures on Anti Virus analysis and to determine how research has evolved and advanced in terms of quantity, content and publication outlets. Most Anti Virus programs are large and complex and one can’t possibly understand every detail. Educating the internet users about Anti Virus attack, as well as the implementation and proper application of anti-Anti Virus tools, are critical steps in protecting the identities of online consumers against Anti Virus attacks.


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


Author(s):  
Paul Rafael SIORDIA-MEDINA ◽  
Nadia Sarahi URIBE-OLIVARES ◽  
Sofía de Jesús GONZÁLEZ-BASILIO

The creation of virtual learning environments requires extensive pedagogical, methodological and technical knowledge that generates relevant training processes and contributes to the development of student learning. That is why this article presents a proposal for a theoretical framework from which environments and scenarios can be designed and developed based on the Internet habits of students and teachers. Various theoretical and author proposals are integrated that allow understanding the complexity of this great task not only for those who work in the non-school modality, but now for those who have had to make the transition from face-to-face to virtual, which has meant significant changes in their teaching practice, but not only for them, but the students have acquired new habits or reinforced those they already had in order to face the new challenges posed by changes in reality.


2020 ◽  
Vol 26 (6) ◽  
pp. 747-761
Author(s):  
Łukasz Apiecionek ◽  
Jacek Czerniak ◽  
Dawid Ewald ◽  
Mateusz Biedziak

There is currently an era of Internet of Things in the computer systems, which consists in connecting all possible devices to the Internet in order to provide them with new functionalities and thus { to improve the user's life standard. One of such solutions could be Smart Home. The possibility of monitoring inner environment is required for such solutions. Such monitoring provides potential for e.g. better heating control. The authors of this paper propose some heating control method with Fuzzy Logic. The proposed method was tested in a special climate chamber. The authors provided conclusions at the end of the paper.


Author(s):  
R. Baranenko

Today cybercrime and computer terrorism are identified as one of the threats to Ukraine’s national security in the information sphere. Cybersecurity measures include achieving and maintaining security features in the resources of an institution or users, aimed at preventing relevant cyber threats. Cybercrime is a set of criminal offenses committed in cyberspace by computer systems or by using computer networks and other means of access to cyberspace, within computer systems or networks, as well as against computer systems, computer networks and computer data, has been widely developed. The paper considers such terms as «computer crime», «information crime», «crime in the field of computer information», «crimes in the field of information technology». Scientific works of domestic and foreign researchers on the issues of countering cybercrime are analyzed. The connection of the concept of «cybersecurity» with the terms «cybercrime», «computer crime» and «cybercrime» the concepts of «cybercrime» was given. The difference in the interpretation of the concepts «cybersecurity» and «information security» was considered. The definitions of «cybercrime», «computer crime» and «cyber offense» were given for comparison. Their main features were considered. The concept of «computer victimhood» and its components were considered. With the introduction of the institute of criminal offenses in the national criminal law, the terms «cybercrime» and «computer crime» should lose their relevance, as evidenced by the change of title of Chapter XVI of the Criminal Code of Ukraine to «Criminal offenses in the use of electronic computing machines (computers), systems and computer networks and telecommunications networks». Therefore, instead, we can recommend the use of the term «cyber offense», which we propose to understand as «socially dangerous criminal act in cyberspace and/or using it, liability for which is provided by the law of Ukraine on criminal liability and/or which is recognized as a criminal offense by international treaties of Ukraine, and cybercrime is a set of cyber offences». It is clear that this will require the introduction of appropriate terminological changes in the Law of Ukraine «On the Basic Principles of Cyber Security of Ukraine» and other regulations.


2020 ◽  
pp. 203-220
Author(s):  
Ian J. Lloyd

This chapter examines key forms of computer related crimes. Computer fraud is a topic that attracts much legal and media attention. As the name suggests, it is essentially a variant of well-established principles of this area of the law. If a perpetrator obtains funds belonging to a victim through some form of deception or manipulation, this will be considered criminal with the most significant legal issues being concerned with the question when or where an offence has occurred. The deliberate promulgation of computer viruses or malware is also generally regarded as a criminal offence although there are issues regarding the degree of intent that needs to be established to secure a conviction. Viruses are generally spread through the conduct of individuals other than those who create to program. Conduct might be characterized as negligent rather than deliberate and will generally not be criminal. Similar issues of intent and knowledge may arise in respect of other forms of conduct such as denial of service attacks.


Sign in / Sign up

Export Citation Format

Share Document