computer crimes
Recently Published Documents


TOTAL DOCUMENTS

111
(FIVE YEARS 28)

H-INDEX

5
(FIVE YEARS 1)

Lex Russica ◽  
2021 ◽  
pp. 102-118
Author(s):  
E. R. Rossinskaya ◽  
I. A. Ryadovskiy

The paper considers the doctrine of information and computer forensic support of investigative and judicial actions tactics, which is part of the system of the private theory of information and computer support of forensic activity. The subject of the teaching is the laws of gathering, scrutinizing and applying computer information in the production of investigative and judicial actions. The objects are the tactics and technology of investigative and judicial actions. Based on the theoretical aspects of the teaching, the authors have developed the tactics and technology of non-verbal investigative actions in cases of computer crimes. Among these are inspection of the scene of the crime, search, seizure, investigative experiment, given the choice of tactical impact and making a tactical decision depending on the specifics of investigative situations in the conditions of tactical risk associated with possible counteraction to the investigation. The tactical and technological support for the production of the above-mentioned non-verbal investigative actions is developed taking into account the features of digital traces, which are characterized by a high speed of transformation, are easily destroyed and modified, can be represented by an almost infinite number of copies, are characterized by the impossibility of perception directly by the senses, but only with the use of special devices and programs for detection, fixation and preservation, are confirmed by control numbers (hash sums) or other data indicating their integrity. The basic principles of working with digital traces in the production of non-verbal investigative actions are determined. They are the preservation of digital traces unchanged at all stages of working with them; full reflection of all manipulations in the protocols of investigative actions; the exceptional importance of preparatory measures, including the selection of a specialist and the determination of his competence, the availability of the necessary equipment and software for working with digital traces. For each of the above-mentioned investigative actions in the investigation of computer crimes, tactical techniques and technological support for the most effective obtaining of criminally significant evidentiary and investigative information have been developed.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Tripti Bhushan

Purpose We live in a techno savvy era that is called as virtual connection and communication. Design/methodology/approach During this pandemic crisis, we all are dependent upon technology, internet for connecting to our families and our friends; this all is monitored by cyberlaw. Findings Today, the computer crimes are increasing at a high rate, and it should be controlled and managed to maintain the platform .Cyberspace on the other hand can be discussed as the space where all internet-related activities are taking place and cyberlaw regulates. The paper will throw light on the impact of internet on the COVID-19 pandemic. Originality/value The paper will throw light on the impact of internet on the COVID-19 pandemic.


Author(s):  
Stephen Errol Blythe, Ph.D., Ph.D., J.D.

Cambodia has a bold new strategy to stimulate E-commerce and to grow the economy. The Digital Signature (DSL), Consumer Protection (CPL), and E-Commerce Laws (ECL) are important components of that strategy. The DSL provides for licensing of certifying authorities and does not prohibit other types of E-signatures. The CPL prohibits deceptive advertising and creates a consumer complaint procedure. The ECL recognizes the legal validity of secure E-documents and E-signatures, including as evidence in a court of law. The ECL states requirements of secure E-signatures and secure E-documents; E-contract rules; rules for liability of internet service providers and E-sellers; E-government provisions; E-payments services rules; and computer crimes. The ECL should be improved by: (a) recognizing electronic wills, powers of attorney, and real estate documents; (b) adding attribution rules and acknowledge receipt rules for E-contracts; (c) adding mandatory E-government; (d) adding a comprehensive computer crimes law; and (e) adding IT Courts.


2021 ◽  
Vol 10 (38) ◽  
pp. 113-122
Author(s):  
Viktoria Babanina ◽  
Iryna Tkachenko ◽  
Olena Matiushenko ◽  
Mykola Krutevych

The article examines the history of the emergence and development of cybercrime, the specifics of the current situation in society, which contributes to an increase in the number of cybercrimes and ways of countering cybercrime. It has been established that cybercrime first appeared in the middle of the last century. This was due to the emergence and subsequent intensive growth in the number of computers, and then smartphones. However, cybercrime that exists today is significantly different from what it was in its early days. Today, the number of devices and services provided via the Internet is growing, the number of users is growing, and, accordingly, the number of cybercrimes and the level of their organization is growing. In the course of the study, the differences between the concepts of "cybercrime" and "computer crimes" were identified, as well as the main features of cybercrimes. The problems that law enforcement agencies face in the investigation and fight against cybercrimes were revealed. The factors contributing to the growth of cybercrime were also analyzed. Based on the analysis, the main directions of combating cybercrime and preventing the growth of the number of cybercrimes in society were developed.


2021 ◽  
Vol 18 ◽  
pp. 434-443
Author(s):  
Firas Hashem

The current study investigated the role of forensic accounting techniques in reducing Cloud Based Accounting risks in the Jordanian five stars hotels. The study population consisted of all accountants in Jordanian five stars hotels. Five stars hotels accountants located in Amman the capital were selected subjects. The total is (170) accountants. A random sample amounting 118 accountants were selected. 118 questionnaires were distributed and 96ones were collected. The study concluded that: There is a significant role of Forensic Accounting Techniques ((FPDDS), (FAIIS), (LMAS), (CARDR)) in reducing Cloud Based Accounting risks in the Jordanian five stars hotels. Despite the fact that nature of computer crime is increasing daily, so there is a need for different types of efforts, to be made on all levels of cloud investigations. And in the same time all legislations and codification related to computer crimes must be updated and reviewed from time to time to keep up with emerging technology.


2021 ◽  
Vol 11 (3) ◽  
pp. 320-342
Author(s):  
Katrin Höffler ◽  
Lucia Sommerer

The rhizome is an infinite, dynamic root network without a main branch. It is not just a scientific term that describes the growth of fungi; the image of the rhizome also reflects today’s interconnectedness of society driven by globalisation and digitisation. This article explores how rhizomatic structures are currently mirrored in criminal law (scholarship). First a distinction is drawn between the rhizomatic perspective and existing theoretical concepts for the description of global dependencies, such as the “world (risk) society”. Second the article analyses how new criminal norms are needed to address newly created vulnerabilities. Such novel global vulnerabilities include e.g., computer crimes. Further, it is explained how a world-wide interconnectedness of vulnerabilities may lead to a convergence of criminal law standards. The paper concludes by advocating for an interconnected criminal law scholarship.


Author(s):  
Eduard Lantukh ◽  
Vladimir Ishigeev ◽  
Oleg Gribunov

The authors come to the conclusion that it is necessary to involve specia­lists in computer equipment in the process of investigation because the investigation and detection of computer crimes requires the analysis of computer information and its carriers. The characteristic features of examined objects determine, first of all, special rules for obtaining and registering them, as well as taking into consideration research methodology when ordering and conducting computer forensic examinations. Confiscation, examination, recording of computer information of evidential significance requires specialist knowledge. In this connection, it is necessary to involve specialists and (or) experts in the process of investigation, detection and prevention of computer crimes. The latent character of computer crimes, a wide use of remote assess, the absence of visual perception of virtual objects and other factors hinder the collection of computer information. Thus, ordering and conducting different types of computer forensic examination play a special role in the investigation, detection and prevention of crimes. A modern and high-quality examination conducted by specialists with expert knowledge in the sphere of hi tech during the investigation of computer technology-related criminal cases offers considerable support to the law enforcement bodies in combating not only these crimes, but also a whole range of crimes where information technology acts as a partial platform for criminal activities. When law enforcement bodies thus influence one of the components of regional and international criminal activities, they raise the level of both physical and information security of citizens. The authors also stress that the more actively information technologies enter the life of a society, the more vulnerable this society is to the criminals who use these technologies for their own purposes.


Author(s):  
Elena Rossinskaya ◽  
Igor Ryadovskiy

The authors analyze problems connected with malware from the standpoint of the doctrine of the methods of computer crimes/offenses as one of the components of the theory of information-computer support of criminalistic work. Most methods of computer crimes are based on the unauthorized access to computer facilities and systems gained through malware that, in fact, acts as a weapon of crime. The authors present a classification of malware based on different parameters: from the standpoint of criminal law and criminology; the standpoint of information technology; the standpoint of the doctrine of computer crimes/offenses. Various grounds for the classification of malware are examined. A general classification, widely used by the developers of antiviral software, includes virus-programs, worm-programs and trojan-programs. In the modern situation of massive digitization, it is not practical to regard masquerading as a legitimate file as a dominant feature of trojan software. On the contrary, criminals try hard to hide from the user the downloading, installation and activity of malware that cannot self-propagate. The key method of propagating trojan programs is sending mass emails with attachments masquerading as useful content. The classification of malware by the way and method of propagation - viruses, worms and trojan programs - is only currently used due to traditions and does not reflect the essence of the process. A different classification of malware into autonomous, semi-autonomous and non-autonomous programs is based on the possibility of their autonomous functioning. At present there is practically no malware whose functions include only one specific type of actions, most of it contains a combination of various types of actions implemented through module architecture, which offers criminals wide opportunities for manipulating information. The key mechanisms of malwares work are described and illustrated through examples. Special attention is paid to harmful encryption software working through stable cryptographic algorithms - ransomware, when criminals demand ransom for restoring data. There is no criminal liability for such theft. The authors outline the problems connected with the possibility of the appearance of new malware that would affect cloud resources.


Author(s):  
Alexandra Yuryevna Bokovnya ◽  
Zarina Ilduzovna Khisamova ◽  
Ildar Rustamovich Begishev ◽  
Elvira Yuryevna Latypova ◽  
Elena Vladimirovna Nechaeva

In January 2020, the World Health Organization announced an outbreak of SARS-CoV2, which caused COVID-19 coronavirus disease. Soon, a continuous outbreak of coronavirus infection was declared a pandemic. This situation has led to an increase in cybercrime. Cybercriminals did not stray from the situation and used the pandemic to commit various digital frauds and cyberattacks. As a result, the objective of the investigation was to analyze computer crimes at the COVID-19 scene and identify their social and legal consequences. This is a documentary-based investigation. It is concluded that, security standards have deteriorated in the context of forty social as many organizations were not prepared for remote work and the number of victims of cybercrime will only grow soon. International organizations and law enforcement agencies in many countries issue many recommendations to prevent digital criminal acts against businesses and citizens. This situation also prompted active legislation around the world to deal with the crisis. Most of the rules adopted in recent months are likely to be derogated.


Sign in / Sign up

Export Citation Format

Share Document