scholarly journals METHODOLOGY OF DETECTION OF COMPUTER CRIME OFFENSES

2021 ◽  
pp. 51-63
Author(s):  
JELENA MATIJAŠEVIĆ ◽  
JOKO DRAGOJLOVIĆ

Computer crime is characterized by an exceptional phenomenological diversity that complicates its unique and precise conceptual definition, and the permanent intensive development of computer technologies contributes to the constant expansion of its forms and poses increasing challenges to the authorities responsible for combating it. After a brief review of the concept and importance of criminology as a science, and criminological methodology as a branch of criminology, and the conceptual definition and basic characteristics of crime in general, and computer crime, the paper analyzes the most important aspects of crime detection methodology in this area. The conclusion is that the basic characteristics of computer crime, difficult detection, complicated proving and ineffective prevention certainly encourage potential perpetrators to make a decision on taking criminal acts in this area, which again indicates in which direction to move in order to eliminate difficulties in the methodology of detection and collection of evidence in criminal offenses of computer crime.

Author(s):  
R. Baranenko

Today cybercrime and computer terrorism are identified as one of the threats to Ukraine’s national security in the information sphere. Cybersecurity measures include achieving and maintaining security features in the resources of an institution or users, aimed at preventing relevant cyber threats. Cybercrime is a set of criminal offenses committed in cyberspace by computer systems or by using computer networks and other means of access to cyberspace, within computer systems or networks, as well as against computer systems, computer networks and computer data, has been widely developed. The paper considers such terms as «computer crime», «information crime», «crime in the field of computer information», «crimes in the field of information technology». Scientific works of domestic and foreign researchers on the issues of countering cybercrime are analyzed. The connection of the concept of «cybersecurity» with the terms «cybercrime», «computer crime» and «cybercrime» the concepts of «cybercrime» was given. The difference in the interpretation of the concepts «cybersecurity» and «information security» was considered. The definitions of «cybercrime», «computer crime» and «cyber offense» were given for comparison. Their main features were considered. The concept of «computer victimhood» and its components were considered. With the introduction of the institute of criminal offenses in the national criminal law, the terms «cybercrime» and «computer crime» should lose their relevance, as evidenced by the change of title of Chapter XVI of the Criminal Code of Ukraine to «Criminal offenses in the use of electronic computing machines (computers), systems and computer networks and telecommunications networks». Therefore, instead, we can recommend the use of the term «cyber offense», which we propose to understand as «socially dangerous criminal act in cyberspace and/or using it, liability for which is provided by the law of Ukraine on criminal liability and/or which is recognized as a criminal offense by international treaties of Ukraine, and cybercrime is a set of cyber offences». It is clear that this will require the introduction of appropriate terminological changes in the Law of Ukraine «On the Basic Principles of Cyber Security of Ukraine» and other regulations.


2018 ◽  
Vol 28 (6) ◽  
pp. 1801-1813
Author(s):  
Milenko Dzeletovic ◽  
Hatidza Berisha ◽  
Nikola Vidovic

In paper, the authors point out a description of the basic characteristics of the UN Organization, the process of establishing peacekeeping operations and their legal foundation in the UN Charter on the complexity of the UN system in the decision-making process and in process of the establishment of peacekeeping operations. Considering the interpretation of the legitimacy of the establishment of peacekeeping operations through the goals set by the United Nations Charter.Through the paper the conceptual-theoretical determination of peacekeeping operations was carried out and the classification of United Nations peacekeeping operations was given. Relying on the conceptual definition of peacekeeping operations with regard to our strategic - doctrinal documents that do not recognize this term, but they see it as the contents of multinational operations.Authors see the focus of work in the philosophy of emerging and perceiving basic conceptual differences between traditional and modern peace operations.The importance of the work is reflected in the understanding of conceptual differences and changes in the nature of the conflict, which led to the revolution and evolution of UN peacekeeping operations, from traditional to contemporary peacekeeping operations.


2017 ◽  
Vol LXXVIII (3) ◽  
pp. 199-209
Author(s):  
Serik M. Kenesbaev ◽  
Aigerim A. Makhmetova

This article examines the current trends in the development and use of computer technology in special education, as well as provides the basic characteristics of the classification of TME. Technical meansoccupy a special positionin the system of education, as their use increases the effectiveness of education. The article states that teaching geography is impossible without the use of visual aids, as most of the objects and natural phenomena presented in the school course can not be observed in nature, and, in this sense, the study of geography requires students to have an advanced imagination and distraction techniques . The use of computer technologies in teaching geography to children with hearing impairment is difficult due to the lack of specially designed electronic aids, particularly taking into account the age and mental development of children in this category and guidelines for working with modern technical means of education. Using TME in a special (remedial) school is of great importance for the overall development of students with reduced motivation to learn. It should be noted that, over time, a number of technical means of educationin special remedial schools is becoming less relevantand is being replaced by modern technical devices, computer technology, for which the methods of operation are not well developedat the moment. The use of technical means opens up new opportunities for extra-curricular and leisure activities of environmental study nature with hearing-impaired students. The intensive nature of introducing computer technology in the educational process of remedial schools and the lack of special modern technical means of teaching geography to children with hearing impairmentare indicative of the need to establish the scientific concept of developing methodological support of technical means of education. The authors highlight the significant role of TME in the formation of knowledge on geographic objects and phenomena in students with hearing impairment.


Author(s):  
Драган Јовашевић

Considering the fact that in the modern world that knows no borders between countries and even continents, legal entities commit serious criminal offenses in the field of commercial, financial, computer, environmental, and similar operations. At the end of the 20th century, a lot of countries introduced a system of criminal responsibility and punishability of legal entities. Since the legal entity has no consciousness or will, i.e. is unable to take physical movements that would cause the consequence of a crime, specific rules on responsibility and application of criminal sanctions have been prescribed for this type of perpetrators. In this way, a new branch of criminal law was constituted - commercial criminal law. This paper deals precisely with the basic characteristics of commercial criminal law.


2018 ◽  
Vol 7 (3.12) ◽  
pp. 43
Author(s):  
Anushka Kumar ◽  
Vishnudas S ◽  
R Kayalvizhi

The evolution of computer structures and networks has created an alternative set for crook acts, extensively known as the crime. Crime incidents occurrences of specific criminal offenses lead to a heavy risk to the world economy, protection, and well-being of society. This paper provides complete information of crime incidents and their corresponding offenses combining a sequence of strategies in line with the appropriate literature. Initially, this paper evaluates and identifies the alternatives to crime incidents, their individual components and proposes a combinatorial incident-description schema. The schema offers the chance to systematically blend various elements or crime traits. Moreover, a complete listing of crime-associated offenses is provided in this paper. So, to increase the performance of crime detection, it is essential to choose the data mining strategies appropriately. Hadoop enables to solve the crime as a radical expertise of the repetition and underlying criminal activities. Using Hadoop, we can locate the specific city and analyze the crime patterns, based on that give preventive measures to people.  


2019 ◽  
Vol 30 (6) ◽  
pp. 1479-1486
Author(s):  
Tose Panov

In this paper the author will try to analyze and describe the basic characteristics of the criminal offenses against official duty, and he will pay special attention to the criminal act "Abuse of official position and authority" from Article 353 of the Criminal Code of the Republic of Macedonia as a general and fundamental criminal offense against official duty. The basic elements of the criminal offense will be analyzed, starting with the status of the perpetrators, the acts of committing, the consequences of the offense, the guilt of the perpetrator, and in the end are presented the qualified forms of this criminal act. Through the outburst of the legal norms, and the stated statistics we will try to give freshness to the legal text, and that is the main contribution of this paper.


Temida ◽  
2011 ◽  
Vol 14 (2) ◽  
pp. 61-76
Author(s):  
Natasa Tanjevic

Tortious acts of legal entities have unforeseen harmful consequences in all areas. In the greedy desire to gain profit, certain legal entities do not have any regard for the most important resources of individuals and society. Damage resulting from the commission of criminal acts is very high for the whole society, especially when it comes to crimes against the environment. In order to prevent and combat corporate crime in criminal law, an increasingly wider acceptance of criminal liability of legal entities was adopted. This paper discusses the basic characteristics of corporate crime, as well as the reasons for the introduction of the criminal responsibility of legal entities. In this regard, we analyzed the law provisions regarding the liability of legal entities for criminal offenses, and concluded that despite the criminal-political need to react with more serious sanctions to the offenses of legal entities, there are certain obstacles and problems that stand in the way of introducing this responsibility.


Author(s):  
N. Mori ◽  
T. Oikawa ◽  
Y. Harada ◽  
J. Miyahara ◽  
T. Matsuo

The Imaging Plate (IP) is a new type imaging device, which was developed for diagnostic x ray imaging. We have reported that usage of the IP for a TEM has many merits; those are high sensitivity, wide dynamic range, and good linearity. However in the previous report the reading system was prototype drum-type-scanner, and IP was also experimentally made, which phosphor layer was 50μm thick with no protective layer. So special care was needed to handle them, and they were used only to make sure the basic characteristics. In this article we report the result of newly developed reading, printing system and high resolution IP for practical use. We mainly discuss the characteristics of the IP here. (Precise performance concerned with the reader and other system are reported in the other article.)Fig.1 shows the schematic cross section of the IP. The IP consists of three parts; protective layer, phosphor layer and support.


1995 ◽  
Vol 11 (3) ◽  
pp. 203-212 ◽  
Author(s):  
Frank C. Verhulst

In this article, recent developments in the assessment and diagnosis of child psychopathology are discussed with an emphasis on standardized methodologies that provide data that can be scored on empirically derived groupings of problems that tend to co-occur. Assessment methodologies are highlighted that especially take account of the following three basic characteristics of child psychopathology: (1) the quantitative nature of child psychopathology; (2) the role of developmental differences in the occurrence of problem behaviors, and (3) the need for multiple informants. Cross-cultural research is needed to test the applicability of assessment procedures across different settings as well as the generalizability of taxonomic constructs. Assessments of children in different cultures can be compared or pooled to arrive at a multicultural knowledge base which may be much stronger than knowledge based on only one culture. It is essential to avoid assuming that data from any single source reveal the significance of particular problems. Instead, comprehensive assessment of psychopathology requires coordination of multisource data using a multiaxial assessment approach.


Sign in / Sign up

Export Citation Format

Share Document