scholarly journals The phenomenon of cybercrime in modern criminological theory

Author(s):  
Ihor Kharytonenko

The article considers the concepts and signs of cybercrime, the phenomenon of cybercrime through the prism of indicators thatcharacterize it, in particular the level, dynamics, structure. The social conditionality and the current state are determined taking intoaccount various factors that influence the change of quantitative and qualitative indicators. Globalism, a high level of public danger andthe massive consequences of cyber threats are emphasized.It is pointed out that the scale of threats to the information space is not limited to the borders of one country, as modern globalcomputer networks cover the vast majority of countries, which further contributes to a sharp increase in criminal computer professiona lism and high mobility of criminals. Therefore, it is timely to study and analyze the system of rapidly changing high-tech cyberthreats, tactics of interaction in the field of information security, which affects the formation of sustainable development of society, thefunctioning of mechanisms to counter information threats taking into account modern realities.The signs of the phenomenon of cybercrime through the prism of indicators that characterize it are highlighted:– the scale of threats to the information space is not limited to the borders of one state;– changes in the quantitative and qualitative indicators of cybercrime, in particular a sharp increase in criminal computer professionalismand high mobility of criminals;– the level of cybercrime is closely related to the economic level of development of society in different countries and regions;– cyber threats are fast-changing and high-tech;– high level of latency;– the dependence of the geography of distribution on the factor of urbanization;– Cybercrime is a social phenomenon that manifests itself in a set of cybercrimes.It is noted that in order to prevent these crimes it is necessary to conduct further research in social and criminological areas to studythe psychophysiological properties of cybercriminals, improve domestic legislation in the field of state secrets and official information,international cooperation in information security, improve the content of higher education information security professionals states.

TRAUMA ◽  
2021 ◽  
Vol 22 (3) ◽  
pp. 12-19
Author(s):  
A.N. Kosiakov ◽  
A.Ye. Loskutov ◽  
K.A. Hrebennikov ◽  
A.V. Miloserdov ◽  
Ye.M. Fedin ◽  
...  

Background. Additive technologies are increasingly making their way from university laboratories and high-tech industries into routine clinical practice and even into our everyday lives. Any enthusiast, having a PC and a 3D printer at his or her disposal, can create any physical object — from children’s toys to works of art. The presence on the market of a wide range of software pro-ducts, equipment, and consumables along with the data from mo-dern diagnostic methods, a high level of training and cooperation between doctors and engineers provide practical medicine with unprecedented opportunities. We are finally able to fully customize our treatment and diagnostic procedures: to perform precise preoperative planning; to draw up a detailed plan of the operation; to rehearse the intervention on full-scale anatomical prototypes using a standard tool; to conduct the surgery as quickly and atraumatically as possible; to minimize risks; to ensure the optimal functional result and to manufacture and install customized implants in the most difficult cases. The purpose was to draw the attention of our distinguished colleagues to the aspects of application of additive technologies in modern orthopaedic practice, to introduce them into the history and current state of medical prototyping, as well as to share technological nuances with them. Materials and methods. While writing this article, we incorporated the data of recent publications in specialized domestic and foreign periodicals, several monographs, materials from thematic conferences, the results of informal conversations with colleagues in the operating rooms, at the computer and production site, as well as our own experience (over 200 cases of prototyping). Conclusions. The availability of equipment, software, and consumables allows for the introduction of additive technology into the everyday practice of nearly every modern orthopaedic and trauma clinic.


2020 ◽  
Vol 79 (4) ◽  
pp. 32-38
Author(s):  
І. Д. Казанчук ◽  
В. П. Яценко

Based on the analysis of scientific concepts and legal principles the author has provided the definition of information security, provision of information security in Ukraine and has characterized its components. The current state of legal regulation of the organization and activity of cyberpolice units of the National Police of Ukraine has been analyzed. Particular attention has been paid to the legal analysis of the tasks, functions and structure of the Cyberpolice Department of the National Police of Ukraine. Special attention has been drawn to certain shortcomings of Ukrainian legislation in the field of ensuring information security by the police, its compliance with the norms and standards of international law. Taking into account the specifics of the tasks, the author has provided characteristics of the functions of cyberpolice units in the information sphere, which should be divided according to the purpose into: 1) basic (external), which are focused on law enforcement and preventive aspects; 2) auxiliary (intrasystem), which are focused on promoting the implementation of basic functions, the introduction of appropriate management mechanisms within the system. It has been stated that the modern system of ensuring information security and cybersecurity in Ukraine should be one effective system, consisting of such mandatory components as legal, educational and technical. It has been concluded that in order to improve the legal principles for the organization and activities of cyberpolice units of the National Police in the field of ensuring information security and counteracting cyber threats, first of all, it is necessary to optimize the organizational structure of cyberpolice, reasonably distribute the functions (powers) between cyberpolice units and other subjects combating cyber threats in Ukraine, to create appropriate conditions for reaching a qualitatively new level of interaction between them and coordination of their activities in the field of ensuring information security in modern conditions.


2021 ◽  
pp. 71-79
Author(s):  
Yu. S. Polozhentseva ◽  
M. G. Klevtsova

In the modern conditions of economic development, the development of the industrial complex is being transformed with emphasis on digital technologies and high-tech production. The article considers new principles of the implementation of the state’s economic policy taking into account the challenges of the fourth industrial revolution, as well as the results of the analysis of the main indicators of industrial development, both in the world and in Russia in particular, including the assessment of the current state of innovation and technological activity of the industrial sector of the Russian economy. At the same time the authors pay special attention to the analysis of modern trends in the development of industry in countries with both a high level of high-tech production and a low level. The paper analyses the prospects of Russian industry development to justify the need for technological breakthrough strategies and technological modernization of industrial enterprises. 


2019 ◽  
Vol 28 (3) ◽  
pp. 423-444
Author(s):  
Jake Weidman ◽  
Jens Grossklags

Purpose Colleges and universities across the USA have seen data breaches and intellectual property theft rise at a heightened rate over the past several years. An integral step in the first line of defense against various forms of attacks are (written) security policies designed to prescribe the construction and function of a technical system, while simultaneously guiding the actions of individuals operating within said system. Unfortunately, policy analysis is an insufficiently discussed topic in many academic communities with very little research being conducted in this space. Design/methodology/approach This work aims to assess the current state of information security policies by analyzing in-use policies from 200 universities and colleges in the USA with the goal of identifying important features and general attributes of these documents. The authors accomplish this through a series of analyzes designed to examine the language and construction of these policies. Findings To summarize high-level results, the authors found that only 54 per cent of the top 200 universities had publicly accessible information security policies, and the policies that were examined lacked consistency with little shared source material. The authors also found that the tonal makeup of these policies lacked a great deal of emotion, but contained a high amount of tentative or ambiguous language leading toward policies that could be viewed as “unclear.” Originality/value This work is an extension of a paper that was presented at ECIS 2018. The authors have added additional analyzes including a cross-policy content and tonal analysis to strengthen the findings and implications of this work for the wider research audience.


Author(s):  
Alexander Korobeev ◽  
Roman Dremlyuga ◽  
Yaroslava Kuchina

The rapid development of communication systems and the use of computer equipment for the exchange of information lead to the emergence of new social relations that require criminal law protection. The Russian Federation does not stay away from this, and although it joined the high tech race late, the development of its legal norms in this sphere follows global trends. Law aimed at counteracting cybercrimes is no exception. The emergence of the global information space gives rise to previously unknown threats to national and international security. Key characteristics of information space, such as its trans-border character, anonymity, speed, difficulty of identifying the actor in the network have led to the growth in the number of IT users and increased the attractiveness of the information infrastructure from the standpoint of using the Internet for criminal purposes. Counteracting these threats has become an important element of the complex of measures to ensure security at the national and the global levels. The authors of the article present the comparative evaluation of the level of cyber-threats in Russia, offer a generalized assessment of the place that cybercrimes hold among other global threats and of the economic damage inflicted by cybercrimes. They examine the key sources of cyber threats, the critical problems and technologies. The authors also make a prediction of the possible threats associated with the introduction of artificial intelligence systems. Besides, they carry out the analysis of the current criminal law norms which prohibit illegal activities in the Internet and pay attention to the debatable scientific and practical issues.


2017 ◽  
pp. 142-154 ◽  
Author(s):  
A. Yusupova ◽  
S. Khalimova

The paper deals with the research devoted to characteristics of high tech business development in Russia. Companies’ performance indicators have been analyzed with the help of regression analysis and author’s scheme of leadership stability and sustainability assessment. Data provided by Russia’s Fast Growing High-Tech Companies’ National Rating (TechUp) during 2012-2016 were used. The results have revealed that the high tech sector is characterized by high level of uncertainty. Limited number of regions and sectors which form the basis for high tech business have been defined. Relationship between innovation activity’s indicators and export potential is determined.


Author(s):  
Alexander Votinov

Современное состояние и развитие уголовно-исполнительной системы Российской Федерации диктует необходимость овладения будущими специалистами комплексом определенных знаний, умений и навыков, позволяющих им эффективно решать служебные задачи. Одним из путей повышения профессионального уровня специалистов является формирование и развитие профессиональной культуры. Проведенный в статье анализ понятия «профессиональная культура» позволяет констатировать сложность его содержания, что связано с особенностями профессиональной деятельности сотрудников УИС, многообразием решаемых задач. Автором подробно исследуется процесс формирования профессиональной культуры в вузах ФСИН России, рассматриваются особенности работы в данном направлении профессорско-преподавательского состава, командиров строевых подразделений, сотрудников отделов по работе с личным составом, приводятся возникающие при этом проблемы и предлагаются возможные пути решения. Отмечается, что успешность формирования профессиональной культуры курсантов зависит от их профессионализма, дисциплинированности, инициативности, настойчивости и личного примера сотрудников. В заключение подчеркивается, что высокий уровень профессиональной культуры сотрудника УИС является условием успешной служебной деятельности и целью дальнейшего профессионального самосовершенствования.The current state and development of the criminal Executive system of the Russian Federation dictates the need for future specialists to master a set of certain knowledge, skills and abilities that allow them to solve official tasks effectively. One of the ways to improve the professional level of specialists is the formation and development of professional culture. The analysis of the concept of «professional culture» in the article allows us to state the complexity of its content, which is associated with the peculiarities of professional activity of employees of the UIS, the variety of tasks to be solved. The author studies in detail the process of formation of professional culture in the universities of the Federal penitentiary service of Russia, examines the features of work in this direction of the teaching staff, commanders of combat units, employees of departments for work with personnel, presents the problems arising in this case and suggests possible solutions. It is noted that the success of the formation of professional culture of cadets depends on their professionalism, discipline, initiative, perseverance and personal example. In conclusion, it is emphasized that the high level of professional culture of the employee is a condition of successful performance and the purpose of further professional self-improvement.


2021 ◽  
Vol 11 (2) ◽  
pp. 23
Author(s):  
Duy-Anh Nguyen ◽  
Xuan-Tu Tran ◽  
Francesca Iacopi

Deep Learning (DL) has contributed to the success of many applications in recent years. The applications range from simple ones such as recognizing tiny images or simple speech patterns to ones with a high level of complexity such as playing the game of Go. However, this superior performance comes at a high computational cost, which made porting DL applications to conventional hardware platforms a challenging task. Many approaches have been investigated, and Spiking Neural Network (SNN) is one of the promising candidates. SNN is the third generation of Artificial Neural Networks (ANNs), where each neuron in the network uses discrete spikes to communicate in an event-based manner. SNNs have the potential advantage of achieving better energy efficiency than their ANN counterparts. While generally there will be a loss of accuracy on SNN models, new algorithms have helped to close the accuracy gap. For hardware implementations, SNNs have attracted much attention in the neuromorphic hardware research community. In this work, we review the basic background of SNNs, the current state and challenges of the training algorithms for SNNs and the current implementations of SNNs on various hardware platforms.


2021 ◽  
Vol 5 (CHI PLAY) ◽  
pp. 1-24
Author(s):  
Andrey Krekhov ◽  
Katharina Emmerich ◽  
Ronja Rotthaler ◽  
Jens Krueger

Escape rooms exist in various forms, including real-life facilities, board games, and digital implementations. The underlying idea is always the same: players have to solve many diverse puzzles to (virtually) escape from a locked room. Within the last decade, we witnessed a rapidly increasing popularity of such games, which also amplified the amount of related research. However, the respective academic landscape is mostly fragmented in its current state, lacking a common model and vocabulary that would withstand these games' variety. This manuscript aims to establish such a foundation for the analysis and construction of escape rooms. In a first step, we derive a high-level design framework from prior literature. Then, as our main contribution, we establish an atomic puzzle taxonomy that closes the gap between the analog and digital domains. The taxonomy is developed in multiple steps: we compose a basic structure based on previous literature and systematically refine it by analyzing 39 analog and digital escape room games, including recent virtual reality representatives. The final taxonomy consists of mental, physical, and emotional challenges, thereby providing a robust and approachable basis for future works across all application domains that deal with escape rooms or puzzles in general.


Author(s):  
V. Sautkina

The following article is devoted to the study of current state of national education and healthcare systems. The cost of services in these areas constantly increases, there for even developed countries are forced to make significant efforts in order to maintain earlier achieved results. Due to this reason countries entered into the period of constant reforms with the purpose of maintaining that high level of health and educational services for all segments of population with a constant reduction of its volume of financing. The legal aspects of these changes are requiring manifestation of the will of politicians in order to overcome the opposition of parties which are defending their interests. As an example, the main opponents of the healthcare reforms proposed by Barak Obama in the USA are Republicans who are concerned about a significant increase of a state control over the entire national insurance system. The author comes to the conclusion that only joint actions of the government and every segment of population might actually improve the quality of medical and educational services.


Sign in / Sign up

Export Citation Format

Share Document