Cybercrime: History of formation, current state and ways of counteraction
Abstract
The article examines the history of the emergence and development of cybercrime, the specifics of the current situation in society, which contributes to an increase in the number of cybercrimes and ways of countering cybercrime. It has been established that cybercrime first appeared in the middle of the last century. This was due to the emergence and subsequent intensive growth in the number of computers, and then smartphones. However, cybercrime that exists today is significantly different from what it was in its early days. Today, the number of devices and services provided via the Internet is growing, the number of users is growing, and, accordingly, the number of cybercrimes and the level of their organization is growing. In the course of the study, the differences between the concepts of "cybercrime" and "computer crimes" were identified, as well as the main features of cybercrimes. The problems that law enforcement agencies face in the investigation and fight against cybercrimes were revealed. The factors contributing to the growth of cybercrime were also analyzed. Based on the analysis, the main directions of combating cybercrime and preventing the growth of the number of cybercrimes in society were developed.
Downloads
References
Arbeláez-Campillo, D. F., Andreyevna Dudareva, M., & Rojas-Bahamón, M. J. (2020). Las pandemias como factor perturbador del orden geopolítico en el mundo globalizado. Cuestiones Políticas, 36(63), 134-150. Recuperado a partir de https://produccioncientificaluz.org/index.php/cuestiones/article/view/31528
Azarov, D. (2007). Crimes in the field of computer information (criminal law research). Kyiv: Atika. Retrieved from https://law.ukma.edu.ua/azarov-d-s-zlochyny-u-sferi-komp-yuternoyi-informatsiyi-kryminalno-pravove-doslidzhennya/
Baturin, Yu. (1991). Problems of computer law, Moscow: Legal literature. Retrieved from http://lawlibrary.ru/izdanie7669.html
Bilenchuk, P. & Obihod, T. (2018). Cyber security and means to prevent and combat cyber crime and cyberterrorism. Journal of the Kyiv law university, 3, 235-239.
Brants, C., Johnson, D. & Wilson, T. (2020). New Wine in Old Bottles: Alternative Narratives of Cybercrime and Criminal Justice? Journal of criminal law, 84(5), 403-406.
Butuzov, V. (2010). Counteraction to computer crime in Ukraine (system-structural analysis). Кyiv: KIT. Retrieved from http://194.44.142.55/F?func=find-b&request=000267407&find_code=SYS
Council of Europe. (2001). European Convention on Cybercrime. Retrieved from https://www.europarl.europa.eu/meetdocs/2014_2019/documents/libe/dv/
7_conv_budapest_/7_conv_budapest_en.pdf.
Djerf-Pierre, M. (2018). Squaring the Circle: Public Service and Commercial News on Swedish Television. Journalism Studies, 1(2), 239 – 260.
Dovgan, O. (2018). Cybersecurity in the information society: Information-analytical digest, Kyiv: Publishing house “Artek”. Retrieved from http://nbuviap.gov.ua/images/vydannya/2018/bezpeka_no_1.pdf
Dovhan, O. and Tkachuk, T.U (2018). System of information security of Ukraine: ontological dimensions. Information and law, 1 (24), 89-103.
Europol. (2016). Public Awareness and Prevention Guides. Retrieved from https://www.europol.europa.eu/activities-services/public-awareness-and-prevention-guides/cyber-crime-vs-cyber-security-what-will-you-choose
Gritsyak, N. (2015). Information component of state policy and management, Kyiv: K.I.S. Retrieved from http://academy.gov.ua/NMKD/library_nadu/Monogr/e008ca03-7c8b-49fa-9a91-1769523a94c7.pdf
Hong, Ye & Neilson, W. (2020). Cybercrime and Punishment. Journal of legal studies, 49(2), 431-466.
Moiseev, N. (2016). Information Society as a Stage of Contemporary History. Free Thought, 1, 81-83.
Nekit, K. (2020). Social media account as an object of virtual property. Masaryk University Journal of Law and Technology, 14 (2), 201-226.
Nekit, K. Ulianova, H. & Kolodin, D. (2019). Website as an object of legal protection by Ukrainian legislation. Amazonia Investiga, 8 (21), 222-230. https://amazoniainvestiga.info/index.php/amazonia/article/view/97
Oxford Advanced American Dictionary. (2021). Cyber-. Retrieved from https://www.oxfordlearnersdictionaries.com/definition/american_english/cyber
Pogoretsky, M. (2012). Cybercrime: to define the concept. Bulletin of the Prosecutor's Office, 8, 89–96. Retrieved from http://91.217.179.134:9100/libr/DocDescription?doc_id=1888355
Pozhuyev, V. (2016). Formation of the state information policy in the conditions of globalization. Humanitarian bulletin of the Zaporozhye State Engineering Academy, 43, 4–12. Retrieved from https://cutt.ly/AxH39UA
Rogovets, V. (2015). Information wars in the modern world: causes, mechanisms, consequences. Personal, 5, 10-17.Retrieved from https://cutt.ly/uxH8b6L
Statista. (2018).The level of Internet penetration in the world as of September 2018, broken down by region. Retrieved from https://www.statista.com/statistics/269329/penetration-rate-of-the-internetby-region/
Stets, V. (2019). Theoretical and legal problems of defining the essence of cyber security as a component of information security. Actual problems of public administration, 4(80), 24-28. DOI: https://doi.org/10.35432/1993-8330appa4802019194098
Tamarit, J.M. (2020). Ciberdelincuencia: cómo facilitar la denuncia y el apoyo a las víctimas. Revista general de derecho penal, 34, 423-433.
Tench, R. & Yeomans, L. (2014). Exploring Public Relations. US: Pearson Education.
United Nation. (2000). Tenth UN Congress on the Prevention of Crime and Treatment of Offenders "Crime and Justice: Meeting the Challenges of the Twenty-first Century". Retrieved from https://www.unodc.org/congress/en/previous/previous-10.html
Yar, M. (2015). The Novelty of ‘Cyber crime’: An Assessment in Light of Routine Activity. Theory European Journal of Criminology, 2 (4), 407–427.