Criminological and forensic characteristics of forms of embezzlement committed through the use of information technology

Keywords: cybercrime, carding, phishing, Near Field Communication, computer and technical expertise, foreign experience.

Abstract

The article's purpose is the criminological and forensic characteristics of the forms of embezzlement of funds by the use of information technology and international and foreign experience in combating this destructive phenomenon. The object of this article is the relationship that arises in connection with the implementation and counteraction to theft in the field of information technology. The authors used various methods of scientific cognition to write this work. In particular, historical, observation, generalization, comparison and analogy, statistical, analytical, and others. The article emphasizes that the emergence and rapid development of new information technologies do not always positively affect criminals because criminals can transform positive qualities into crime. In particular, crimes of embezzlement through the use of information technology are now widespread. This article has tried to provide a criminological description of the three main forms of cybercrime against money: carding, phishing, and embezzlement committed using NFC technology. In addition, emphasis was placed on the importance, role, tasks of computer and technical expertise in the investigation of embezzlement dedicated through the use of information technology. The importance of implementing international conventions and the positive experience of foreign countries in combating the embezzlement of funds committed through the use of information technology.

Downloads

Download data is not yet available.

Author Biographies

Mykhailo Dumchikov, Sumy State University, Ukraine.

PhD in Law, Senior Lecturer, Department of Criminal Legal Disciplines and Procedure, Sumy State University, Ukraine.

Oleksandr Yunin, Dnipropetrovsk State University of Internal Affairs, Ukraine.

Doctor of Legal Sciences, Professor, Professor of the Department of Civil Law and Process of Dnipropetrovsk State University of Internal Affairs, Ukraine.

Nataliia Nestor, Kyiv Scientific Research Institute of Forensic Expertise,  Ukraine.

Doctor of Scienceof Law, HonoredLawyerofUkraine, Kyiv Scientific Research Institute of Forensic Expertise,  Ukraine.

Andrii Borko, Admiral Makarov National University of Shipbuilding, Ukraine.

Doctor of Scienceof Law, Assotiate Professor, Admiral Makarov National University of Shipbuilding, Ukraine.

Oleksandr Yermenchuk, National academy of internal affairs, Ukraine.

Assotiate Professor, Assotiate Professor of the operative-searching department in National academy of internal affairs, Ukraine.

References

Babanina, V., Tkachenko, I., Matiushenko, O., & Krutevych, M. (2021). Cybercrime: History of formation, current state and ways of counteraction. Amazonia Investiga, 10(38), 113-122. https://doi.org/10.34069/AI/2021.38.02.10

Batyushkin, M. V. (2021). "Phishing" – a computer fraud? International scientific journal "symbol of science", 1, 90-93. Recovered from: https://cyberleninka.ru/article/n/fishing-kompyuternoe-moshennichestvo/viewer

Bondarenko, L. P., Yaroshevich, N. B., & Tarabinovich, A. B. (2019). Practice of Using Contactless Payments in Ukraine and the World. Effective economy, No. 2, Recovered from: http://www.economy.nayka.com.ua/pdf/2_2019/54.pdf. DOI: 10.32702 / 2307-2105-2019.2.52

Bondarenko, O. S., & Repin, D. A. (2018). Cybercrime in Ukraine: causes, signs and countermeasures. Comparative and Analytical Law, No. 1, 246–248. Recovered from: https://essuir.sumdu.edu.ua/bitstream-download/123456789/67982/1/Bondarenko_Repin_KIberzlochinist.pdf

Council of Europe (2001) Convention on Cybercrime on 23. XI.2001. No 185. Recovered from: https://rm.coe.int/1680081561

Criminal Code of the Federal Republic of Germany. Federal Law Gazette Bundesgesetzblatt I, 24 de septiembre de 2013, p. 3322, Recovered from:https://www.legislationline.org/documents/section/criminal-codes/country/28/Germany/show

Criminal Code of the Republic of Korea, National legislative bodies / National authorities of Jan. 1, 1998. Recovered from: https://www.refworld.org/docid/3f49e3ed4.html

Criminal Code of the Republic of Poland, Principios de responsabilidad penal, of 6 June 1997. Recovered from: https://www.legislationline.org/download/id/7354/file/Poland_CC_1997_en.pdf

Criminal Code of the French Republic, Legislative part, January 01, 2020. Recovered from: https://www.legislationline.org/documents/section/criminal-codes/country/30/France/show

Ermolenko, O. M. (2015). Banking Innovation as а Trend of Increasing Competitiveness of Credit Institutions at The Present Stage of Functioning. Scientific Bulletin of YIM, No. 1, 49-55. Recovered from: https://cyberleninka.ru/article/n/kriterii-razvitiya-rynka-bankovskih-kart-na-sovremennom-etape-funktsionirovaniya-bankovskogo-sektora/viewer

Golovinov, O. N., & Pogorelov, A. V. (2016). Cybercrime in the modern economy: state and development trends. Innovation Economics, Issues, 6(1), 73-88. doi: 10.18334 /vinec.6.1.35353

Golub, A. (2016). Cybersecurity in all manifestations: see, heritage and ways to fight. Resource Center GURT: website. Recovered from: http://www.gurt.org.ua/articles/34602

Grib, D. (2019). Theft Of Property Through The Use Of Information Technology In The Criminal Code Of The Russian Federation And The Republic Of Belarus: A Comparative Aspect. Bulletin of the Moscow University of the Ministry of Internal Affairs of Russia, No. 4, 76-80. DOI 10.24411/2073-0454-2019-10199

Jahankhani, H., Al-Nemrat, A., & Hosseinian-Far, A. (2014). Cybercrime classification and characteristics. Cyber Crime and Cyber Terrorism Investigator's: Handbook. London: Waltham.

Khilyuta, V.V. (2013). Computer theft or computer fraud? Criminalist Library, No. 5(10), 55-65

Kunz, M., & Wilson, P. (2004). Computer Crime and Computer Fraud. Report to the Montgomery County Criminal Justice Coordinating Commission. Recovered from: https://www.montgomerycountymd.gov/cjcc/
resources/files/computer_crime_study.pdf

Kurmaiev, P., Seliverstova, L., Bondarenko, O., & Husarevych, N. (2020). Cyber insurance: the current situation and prospects of development. Amazonia Investiga, 9(28), 65-73. https://doi.org/10.34069/AI/2020.28.04.8

Likholetov, A. A. (2016). Responsibility for the theft of funds in the bank accounts of citizens in the context of reforming criminal legislation. Bulletin of the Volgograd Academy of the Ministry of Internal Affairs in Russia, No. 1(36), 59-63. Recovered from: http://va-mvd.ru/vestnik/arhiv/36.pdf

Mogunova, M. M. (2020). Implementation technology and legal regulation of illegal seizure of personal bank data (phishing). Bulletin of the Saratov State Law Academy, No. 4, 135-141. Recovered from: https://elibrary.ru/item.asp?id=43846129

Order No. 909, Criminal Code of Denmark, of September 27, 2005. Recovered from:https://www.legislationline.org/documents/section/criminal-codes/country/34/Czech%20Republic/show

Penal Code of Turkey. European commission for democracy through law, Council of Euope, 15 February 2016. Recovered from: https://www.legislationline.org/documents/section/criminal-codes/country/50/Tajikistan/show

Pilipchuk, V. G., & Dzioban, O. P. (2011). Theoretical and state-legal aspects of anti-information terrorism in the minds of globalization. Strategic priorities, No. 4(21), 12-17.

Resolution No. 65/230 of Twelfth United Nations Congress on Crime Prevention and Criminal Justice. April 1, 2011. Recovered from: https://undocs.org/en/A/RES/65/230

Sachkov, D. I., Smirnova, I. G. (2015). Ensuring information security in government: textbook. Irkutsk, NovaPravo.

Shaevich, A. A. (2011). Features of use of special knowledge in the field of computer technologies at investigation of crimes: monograph. Irkutsk: Vost.- Sib. in-t M-va vnutr. Affairs of Russia.

Smagorinsky, B. P., & Senchenko, P. P. (2016). Features of detecting thefts committed using payment cards. Volgograd Academy of the Ministry of Internal Affairs in Russia, No. 4 (39), 102-106. Recovered from: http://va-mvd.ru/vestnik/arhiv/39.pdf

Sujono, I. (2019). Cybercrime Law Reconstruction in the National Cybersecurity Concept. http://doi.org/10.5281/zenodo.3462123

Swiss Criminal Code № SR 311.0. The Federal Assembly of the Swiss Confederation, 3 de marzo de 2020. Recovered from: https://business-swiss.ch/zakonodatel-stvo-shvejtsarii/ugolovnoe-pravo/ugolovny-j-kodeks-shvejtsarii/

Tereshchenko, L. K., & Starodubova, O. E. (2017). Mysteries of information law, Journal of Russian law, 1, 156-161. Recovered from: https://cyberleninka.ru/article/n/zagadki-informatsionnogo-prava/viewer

Utkina, M., Bondarenko, O., & Malanchuk, P. (2021). Patent Trolling and Intellectual Property: Challenges for Innovations. International Journal of Safety and Security Engineering, 11(1), pp. 69-77. https://doi.org/10.18280/ijsse.110108

United Nations (2021). Global Program on Cybercrime. Recovered from: https://www.unodc.org/unodc/en/cybercrime/global-programme-cybercrime.html

United Nations (2021). Comprehensive Study on Cybercrime Recovered from: http:///www.unodc.org

Vardanyan, A. V., & Gribunov, O. P. (2016). Forensic examinations assigned in the investigation of thefts at transport facilities. Theory and Practice of Countering Crime in the Asia-Pacific Region, No. 1 274-277 Recovered from: http://journals.tsu.ru/uploads/import/1800/files/437_205.pdf

Vorontsova, S. V. (2011). Cybercrime: masalah kualifikasi tindakan kriminal (criminal act qualification problema). Russian journal of economy, 2, 14-15.
Published
2021-06-29
How to Cite
Dumchikov, M., Yunin, O., Nestor, N., Borko, A., & Yermenchuk, O. (2021). Criminological and forensic characteristics of forms of embezzlement committed through the use of information technology. Amazonia Investiga, 10(41), 131-140. https://doi.org/10.34069/AI/2021.41.05.13
Section
Articles
Bookmark and Share