scholarly journals AS NOVAS MODALIDADES DE CRIMES CIBERNÉTICOS: O CYBERBULLYING, VINGANÇA PORNOGRÁFICA E A INTERNET PROFUNDA (DEEP WEB)

2018 ◽  
Vol 2 (Especial 2) ◽  
pp. 154-161
Author(s):  
Hugo Stéphano Rufino Belezzi

This article will address the new modalities of cyberbullying such as cyberbullying, pornographic revenge and the deep internet known as the deep web, bringing its concepts and definitions to the present legal order, infraconstitutional legislation that deals with cyber crimes together with these new types, bringing insertions and changes in the legislation in force, the most common types of crimes currently committed by the Internet in reference to a considerable growth of cases of this type, where the need to establish a more adequate legislation will be taken into account. specific and applied to curb the criminals who use this means, in order to bring greater legal certainty to those who use the global computer network.

2018 ◽  
Vol 7 (1) ◽  
pp. 66-82
Author(s):  
Taís Vasconcelos Cidrão ◽  
Antonio Walber Muniz ◽  
Ana Abigail Alves

O objetivo primordial do presente trabalho é analisar o avanço da legislação brasileira, especialmente as leis 12.737/2012 (Lei Carolina Dieckmann) e 12.965/2014 (lei do Marco Civil da Internet), em diz respeito às inovações nas abordagens quanto aos crimes nos ciberespaços (cibercrimes). Posteriormente, far-se-á uma análise dentro do direito internacional, bem como da Convenção de Budapeste que visa solucionar as questões quanto ao mau uso da internet. Justifica-se o presente estudo através do avanço tecnológico do mundo moderno, que por sua vez contribuiu para a criação de novéis hábitos nas “novíssimas” formas de comunicação, que passaram a se valer de meios inovadores capazes de promover diálogo com as pessoas em tempo real e em qualquer lugar do mundo. Entretanto, não só no Brasil, mas emtodos os países em geral o mau uso da internet tem gerado muitos confrontos que ultrapassam as barreiras fronteiriças, como a prática de atos que violam direitos da personalidade, direito de propriedade intelectual e outros delitos criminais. Desta feita, os problemas que envolvem a internet, geralmente, têm suas repercussões extrapolando a legislação interna de cada Estado, que muitas vezes é insuficiente para resolver tal questão. Acredita-se ser, não só oportuna, mas necessária a utilização do Direito Internacional como opção catalisadora para o combate aos males que envolvem a rede mundial dos computadores. Para isso, será utilizada uma metodologia de pesquisa baseada em estudo bibliográfico de natureza qualitativa, pura em relação ao seu resultado, e descritivo-exploratória quanto aos seus objetivos. Palavras-chave: Direito Internacional. Internet. Cibercrimes.     Abstract: The main objective of this work is to analyze the progress of Brazilian legislation, especially laws 12,737 / 2012 (Carolina Dieckmann Law) and 12,965 / 2014 (Internet Civil Law Law), regarding innovations in approaches to cyber crimes (cybercrimes). Subsequently, an analysis will be made under international law, as well as the Budapest Convention, which will address the issues of misuse of the internet. The present study is justified by the technological advance of the modern world, which in turn has contributed to the creation of new habits in the "newest" forms of communication, which have come to use innovative means capable of promoting dialogue with people in time real and anywhere in the world. However, not only in Brazil, but in all countries in general, the misuse of the Internet has generated many confrontations that go beyond border barriers, such as the practice of acts that violate personality rights, intellectual property rights and other criminal offenses. This time around, the problems involving the Internet generally have their repercussions, extrapolating the internal legislation of each State, which is often insufficient to resolve this issue. It is believed to be not only timely but necessary to use International Law as a catalyst for combating the evils that surround the global computer network. For this, a research methodology based on a bibliographic study of a qualitative nature, pure in relation to its result, and descriptive-exploratory in terms of its objectives will be used. Keywords: International Law. Internet. Cybercrime.


2019 ◽  
Vol 33 (67) ◽  
pp. 123-141
Author(s):  
Flaviano de Souza Alves

O homem consegue conversar com o mundo inteiro por meio da Internet, fazendo despertar para esta era de inovações e crescimento tecnológico. Embora pareça que, com o surgimento dessas redes, tenha-se estreitado laços entre pessoas de diversas partes do mundo, ao mesmo tempo, esta prática tem aumentado a vulnerabilidade das pessoas. O trabalho tem como objetivo mostrar a rede de atos criminosos existentes dentro da Deep Weeb. A justificativa para este estudo é o crescente interesse sobre o assunto, sobretudo nos meios acadêmicos, militares, nas áreas de Defesa e Segurança e em áreas policiais, visando também à grande necessidade de informar, analisar, investigar e alertar todos os cidadãos sobre os perigos e os riscos aos quais toda a sociedade está exposta. É necessário continuar com novas pesquisas e apontar novos mecanismos de combate para esses crimes cibernéticos, desenvolver melhores softwares (browser, antivírus, firewall etc.) e a configuração ideal desses softwares para acesso seguro a essa camada da rede. Na Deep Web depende de cada um escolher o que buscar.   Man mange to communicate with the entire world through the Internet and have awaked to this era of innovations and technological growth. Although it seems that ties between people from several parts of the world have been strengthened with the emergence of such networks, at the same time, this practice has increased the vulnerability of people. The paper aims to show the criminal acts network within the Deep Web. The rationale for this study is the rising interest on the subject, especially in the academic, military, defense and security areas and in police areas, seeking as well the great need to inform, analyze, investigate and alert all citizens about the dangers and the threats society has been exposed to. It is a need to continue with new researches and point out original mechanisms to combat these cyber crimes, develop better software (browser, antivirus, firewall, etc.) and its ideal configuration for a secure access to this network layer. At Deep Web, the search depends on everyone’s choice.   El hombre logra comunicarse con el mundo entero a través de Internet, haciendo despertar para esta era de innovaciones y crecimiento tecnológico. Aunque parezca que con el surgimiento de esas redes ha estrechado lazos entre personas de diversas partes del mundo, al mismo tiempo, esta práctica ha aumentado la vulnerabilidad de las personas. El trabajo tiene como objetivo de mostrar la red de actos criminales existentes dentro de Deep Weeb. La justificación para este estudio es el creciente interés sobre el tema, sobre todo en los medios académicos, en los militares, en las áreas de Defensa y Seguridad y en áreas policiales, buscando también la gran necesidad de informar, analizar, investigar y alertar a todos los ciudadanos sobre los mismos peligros y los riesgos a los que toda la sociedad está expuesta. Es necesario continuar con nuevas investigaciones y apuntar nuevos mecanismos de combate para esos crímenes cibernéticos, desarrollar mejores softwares (navegador, antivirus, firewall, etc.) y su configuración ideal para acceso seguro a esa capa de la red. En Deep web depende de lo que cada uno elija.


2021 ◽  
Vol 76 (2) ◽  
pp. 29-37
Author(s):  
А. S. Nabidullin ◽  
◽  
Ch.K. Ordabaev ◽  

Being a living structure, the language is constantly evolving, including with the help of borrowings. It is impossible to stop this process. It is easier for young people to express their thoughts and feelings in a foreign language, rather than using fixed expressions in their native language. All this is happening as a result of increased information flows, the emergence of the global computer network – “the Internet”, the development of the world economic market, international tourism, and cultural ties. Today, the study of borrowings as manifestations of the interaction of different languages with each other is not the last among the problems of modern linguistics, and therefore, the attention of domestic and foreign researchers is directed to this issue. English plays a big role in the life of young people of Kazakhstan, who actively use foreign words in everyday life. In their opinion, it sounds beautiful and fashionable.The borrowing and use of words of foreign origin is a consequence of linguistic contacts influenced not only by historical and cultural factors, but also by the growing influence of the mass media.This article is dedicated to finding the peculiarities of the influence of English borrowings on the culture and speech of Kazakhstani youth.Being a living structure, the language is constantly evolving, including with the help of borrowings. It is impossible to stop this process. It is easier for young people to express their thoughts and feelings in a foreign language, rather than using fixed expressions in their native language. All this is happening as a result of increased information flows, the emergence of the global computer network – “the Internet”, the development of the world economic market, international tourism, and cultural ties. Today, the study of borrowings as manifestations of the interaction of different languages with each other is not the last among the problems of modern linguistics, and therefore, the attention of domestic and foreign researchers is directed to this issue. English plays a big role in the life of young people of Kazakhstan, who actively use foreign words in everyday life. In their opinion, it sounds beautiful and fashionable.The borrowing and use of words of foreign origin is a consequence of linguistic contacts influenced not only by historical and cultural factors, but also by the growing influence of the mass media.This article is dedicated to finding the peculiarities of the influence of English borrowings on the culture and speech of Kazakhstani youth.


Author(s):  
Tatsiana Serada

For several years, the Internet as an advertising platform, leading in growth compared with any other media. This article examines key indicators of the effectiveness of advertising campaigns on the Internet. The study proposes a number of measures aimed at a more complete and accurate assessment of the effectiveness of online advertising in modern conditions of the global computer network.


2020 ◽  
Vol 11 (2) ◽  
pp. 55-61
Author(s):  
Puninder Kaur ◽  
Taruna Sharma ◽  
Jaswinder Singh

In the recent era, the demand of the internet is increasing. The Internet is global computer network that provide the sharing of data and information. Internet is useful in every field. It modifies the way of working, living style and contributed positive impact on our life. With the raising of the demand new tools and technologies are developed. The internet is classified in various generations depends on the functionality and key features. In this paper the generations of the internet and functionality are discussed. The internet has 1.0, 2.0, and 3.0 that provides internet protocols. Internet 4.0 and 5.0 are grownup and it works on wireless and sensor network devices. With the development of new generation the data rate, flexibility, Quality of service, performance and many other features are improved. In this survey focus on the features, techniques and tools provided by each generation.


Author(s):  
Anton Anatolevich Komarov

The object of this research is the statistical aggregate of people who by objective (external) reasons are prone to become the victims of fraud within the Russian segment of the global computer network. The subject of this research is the quantitative aspect of the aforementioned phenomenon. Special attention is given to the search of effective methods for determination of quantitative aspects of victimization. The goal consists in most accurate assessment of the total number of the potential victims of fraud committed via Internet. The main results of this work contain the most accurate among previously existed in criminology numbers of: potential victims of fraud in the Internet (the author specifies the number of users of the Russian segment of Internet aged from 6 to 80), persons out of 24-hour Internet audience of criminogenic age; and a number of statistical indicators of victimization. All of the listed above can assist proper organization of research carried out by scholars dealing with the problems of cybercrimes.


2017 ◽  
Vol 3 (2) ◽  
pp. 261-273
Author(s):  
Rico Septiandi ◽  
Siti Madinah Ladjamuddin ◽  
Ewin Suciana

urrently the development of information technology plays a very important role in various aspects of life, the Internet is a global computer network around the world as a medium of communication and modern information that can provide and display various information and data to the public. Website security system with the configuration file.Htacces built with the aim to to protect the website from the theft of information that often occur at this time. This security system is very useful to protect information from cracker attacks. Because data theft on the Internet can not be known if the cracker is taking information without damaging the system. Another case with the theft of information that often occurs in the real world. The design of webste security system is made with the configuration file.Htaccess and Notepad ++. Not a few websites that use a lot of authentication system penetrated by the crackers, they are eyeing this website for allegedly storing confidential information. Need a special way in securing a website like this. With the website security system using the configuration file.htaccess this is one means to secure the website page.


Author(s):  
Bojan Ljuijić

Beside the fact that the Internet was not primarily educational network (it didn’t emerge from the intention to be systematically used in the field of education), shortly after it emerged, possibilities of its application in education were recognised. This paper is dedicated to analysis of the most important chronological moments (technological and social in the first place) that were crucial in sense of comprehensive application of the Internet in service of education in general, but also in service of adult education. Having all mentioned in focus, in more details, we analysed emergence and development of the Internet observed as educational computer network in frame of general development of information and communication technologies. While realising mentioned analysis, our focus was on four historical periods of educational computer technologies. We also intended to emphasize the activities of international institutions that followed, encouraged and supported the development of the Internet use and the use of other information and communication technologies in the field of education. According to that, we distinguished the main moments referring activities of these organisations which describe in the best manner their contributions to growing application of the Internet in education in general, but also in adult education.


2021 ◽  
Vol 14 (1) ◽  
pp. 95-119
Author(s):  
Emilie Chevalier

The reception of the fundamental principle of legal certainty in France shows how the characteristics of the French administrative system have consequences for the development and consideration of this principle. An analysis of the transplantation process reveals that it has been largely prepared, knowingly or unknowingly, to allow the principle of legal certainty to find at least a partial place in the French administrative system. It also shows the central role of the administrative judge in this process which led to the adaptation of the principle of legal certainty to the French legal order, and vice versa.


Sign in / Sign up

Export Citation Format

Share Document