computer crime
Recently Published Documents


TOTAL DOCUMENTS

433
(FIVE YEARS 35)

H-INDEX

15
(FIVE YEARS 0)

2022 ◽  
Vol 30 (7) ◽  
pp. 0-0

This paper aims to study the Countermeasures of big data security management in the prevention and control of computer network crime in the absence of relevant legislation and judicial practice. Starting from the concepts and definitions of computer crime and network crime, this paper puts forward the comparison matrix, investigation and statistics method and characteristic measure of computer crime. Through the methods of crime scene investigation, network investigation and network tracking, this paper studies the big data security management countermeasures in the prevention and control of computer network crime from the perspective of criminology. The experimental results show that the phenomenon of low age is serious, and the number of Teenagers Participating in network crime is on the rise. In all kinds of cases, criminals under the age of 35 account for more than 50%.


Author(s):  
Bohdan Nikolaienko ◽  
Serhii Vasylenko

With the development of information technology, the need to solve the problem of information security has increased, as it has become the most important strategic resource. At the same time, the vulnerability of the modern information society to unreliable information, untimely receipt of information, industrial espionage, computer crime, etc. is increasing. In this case, the speed of threat detection, in the context of obtaining systemic information about attackers and possible techniques and tools for cyberattacks in order to describe them and respond to them quickly is one of the urgent tasks. In particular, there is a challenge in the application of new systems for collecting information about cyberevents, responding to them, storing and exchanging this information, as well as on its basis methods and means of finding attackers using integrated systems or platforms. To solve this type of problem, the promising direction of Threat Intelligence as a new mechanism for acquiring knowledge about cyberattacks is studied. Threat Intelligence in cybersecurity tasks is defined. The analysis of cyberattack indicators and tools for obtaining them is carried out. The standards of description of compromise indicators and platforms of their processing are compared. The technique of Threat Intelligence in tasks of operative detection and blocking of cyberthreats to the state information resources is developed. This technique makes it possible to improve the productivity of cybersecurity analysts and increase the security of resources and information systems.


2021 ◽  
pp. 51-63
Author(s):  
JELENA MATIJAŠEVIĆ ◽  
JOKO DRAGOJLOVIĆ

Computer crime is characterized by an exceptional phenomenological diversity that complicates its unique and precise conceptual definition, and the permanent intensive development of computer technologies contributes to the constant expansion of its forms and poses increasing challenges to the authorities responsible for combating it. After a brief review of the concept and importance of criminology as a science, and criminological methodology as a branch of criminology, and the conceptual definition and basic characteristics of crime in general, and computer crime, the paper analyzes the most important aspects of crime detection methodology in this area. The conclusion is that the basic characteristics of computer crime, difficult detection, complicated proving and ineffective prevention certainly encourage potential perpetrators to make a decision on taking criminal acts in this area, which again indicates in which direction to move in order to eliminate difficulties in the methodology of detection and collection of evidence in criminal offenses of computer crime.


2021 ◽  
Vol 15 (1) ◽  
pp. 73-106
Author(s):  
Kinfe Micheal Yilma

Ethiopia has embarked upon an ambitious project of revising a number of laws with a view to entrench human rights and democratic governance. Part of this legal reform program has been the revision of Computer Crime Proclamation No 958/2016. This article examines key aspects of the Draft Computer Crime Proclamation prepared by the Media Law Working Group from a human rights perspective. As it shall be shown in this article, making the cybercrime legal regime human rights friendly has been the overarching objective of the revision project. Most human rights concerns associated with the current cybercrime legislation are, as a result, rectified in the cybercrime Bill. However, the Bill goes overboard in embracing themes that go well beyond the scope of cybercrime legislation. With respect to the overall revision process, the article submits that the process has not been sufficiently inclusive.


2021 ◽  
Vol 7 (Extra-E) ◽  
pp. 445-460
Author(s):  
Dina Viktorovna Alontseva ◽  
Olga Anatolyevna Lavrishcheva

In the article, based on the analysis of existing approaches to the state and structure of computer crime in the Russian Federation, the authors formulated the concept of "computer crime", identified the key features of this type of crime; and also, based on the analysis of the causes and conditions of committing crimes in the field of high technologies, developed a set of special legal, ideological, managerial, organizational and forensic measures that are aimed at preventing and preventing computer crimes. Alontseva Dina Viktorovna; Lavrishcheva Olga Anatolyevna In the course of this research, the norms of international acts, domestic legislation, reports and statistics of law enforcement agencies of the Russian Federation and specialized organizations, materials of judicial practice were studied, as well as doctrinal sources on the topic of the work were analyzed. The authors used general methods of scientific cognition (dialectical, inductive, deductive), as well as private scientific methods used in the legal sciences-the method of comparative law and the formal legal method.


2021 ◽  
Vol 4 (3) ◽  
pp. 191-197

In this note, the most frequent types of computer crime on the Internet in Ukraine are analysed. It is suggested that international experience in computer crime investigation should be used to combat this because cybercrime has become an international problem, causing enormous damage to governments, commercial entities, and computer systems of individual users. Governments and commercial entities spend significant funds to prevent losing information and ensure its protection. Cybercrime is based on technical knowledge, which is difficult to detect or prevent. This type of criminal activity has a high latency because of the difficulty of determining the qualification of a criminal offence.


Author(s):  
R. Baranenko

Today cybercrime and computer terrorism are identified as one of the threats to Ukraine’s national security in the information sphere. Cybersecurity measures include achieving and maintaining security features in the resources of an institution or users, aimed at preventing relevant cyber threats. Cybercrime is a set of criminal offenses committed in cyberspace by computer systems or by using computer networks and other means of access to cyberspace, within computer systems or networks, as well as against computer systems, computer networks and computer data, has been widely developed. The paper considers such terms as «computer crime», «information crime», «crime in the field of computer information», «crimes in the field of information technology». Scientific works of domestic and foreign researchers on the issues of countering cybercrime are analyzed. The connection of the concept of «cybersecurity» with the terms «cybercrime», «computer crime» and «cybercrime» the concepts of «cybercrime» was given. The difference in the interpretation of the concepts «cybersecurity» and «information security» was considered. The definitions of «cybercrime», «computer crime» and «cyber offense» were given for comparison. Their main features were considered. The concept of «computer victimhood» and its components were considered. With the introduction of the institute of criminal offenses in the national criminal law, the terms «cybercrime» and «computer crime» should lose their relevance, as evidenced by the change of title of Chapter XVI of the Criminal Code of Ukraine to «Criminal offenses in the use of electronic computing machines (computers), systems and computer networks and telecommunications networks». Therefore, instead, we can recommend the use of the term «cyber offense», which we propose to understand as «socially dangerous criminal act in cyberspace and/or using it, liability for which is provided by the law of Ukraine on criminal liability and/or which is recognized as a criminal offense by international treaties of Ukraine, and cybercrime is a set of cyber offences». It is clear that this will require the introduction of appropriate terminological changes in the Law of Ukraine «On the Basic Principles of Cyber Security of Ukraine» and other regulations.


2021 ◽  
Vol 18 ◽  
pp. 434-443
Author(s):  
Firas Hashem

The current study investigated the role of forensic accounting techniques in reducing Cloud Based Accounting risks in the Jordanian five stars hotels. The study population consisted of all accountants in Jordanian five stars hotels. Five stars hotels accountants located in Amman the capital were selected subjects. The total is (170) accountants. A random sample amounting 118 accountants were selected. 118 questionnaires were distributed and 96ones were collected. The study concluded that: There is a significant role of Forensic Accounting Techniques ((FPDDS), (FAIIS), (LMAS), (CARDR)) in reducing Cloud Based Accounting risks in the Jordanian five stars hotels. Despite the fact that nature of computer crime is increasing daily, so there is a need for different types of efforts, to be made on all levels of cloud investigations. And in the same time all legislations and codification related to computer crimes must be updated and reviewed from time to time to keep up with emerging technology.


2021 ◽  
Vol 60 (91) ◽  
pp. 227-242
Author(s):  
Darko Dimovski

Common crime prevention measures have not yielded the expected results. It is important to examine the possibilities of using the latest achievements in crime prevention. One of the available options is digitalization. Starting from the definition of digitalization as the use of digital technologies to change the business model and provide new opportunities for generating income and value, the author emphasizes that digitalization can be used as a measure to prevent crime. In this regard, some solutions for preventing crime through digitalization are embodied in the use of digital currencies, digital identities and signatures, smart devices, and mobile applications. The author elaborates on each of these solutions, focusing on specific crime prevention measures and examples from different countries worldwide. It may help crime prevention experts perceive digitalization as a measure for reducing the volume of crime. If the benefits of digitalization are put into good use, we can expect that the volume of property-related crimes, violence-related crimes and traffic delinquency will drop in the forthcoming period. On the other hand, the implementation of these measures may give rise to the commission of Internet-related crimes, thus leading to the increase in computer crime.


Sign in / Sign up

Export Citation Format

Share Document