Criminological and forensic characteristics of forms of embezzlement committed through the use of information technology
The article's purpose is the criminological and forensic characteristics of the forms of embezzlement of funds by the use of information technology and international and foreign experience in combating this destructive phenomenon. The object of this article is the relationship that arises in connection with the implementation and counteraction to theft in the field of information technology. The authors used various methods of scientific cognition to write this work. In particular, historical, observation, generalization, comparison and analogy, statistical, analytical, and others. The article emphasizes that the emergence and rapid development of new information technologies do not always positively affect criminals because criminals can transform positive qualities into crime. In particular, crimes of embezzlement through the use of information technology are now widespread. This article has tried to provide a criminological description of the three main forms of cybercrime against money: carding, phishing, and embezzlement committed using NFC technology. In addition, emphasis was placed on the importance, role, tasks of computer and technical expertise in the investigation of embezzlement dedicated through the use of information technology. The importance of implementing international conventions and the positive experience of foreign countries in combating the embezzlement of funds committed through the use of information technology.
Batyushkin, M. V. (2021). "Phishing" – a computer fraud? International scientific journal "symbol of science", 1, 90-93. Recovered from: https://cyberleninka.ru/article/n/fishing-kompyuternoe-moshennichestvo/viewer
Bondarenko, L. P., Yaroshevich, N. B., & Tarabinovich, A. B. (2019). Practice of Using Contactless Payments in Ukraine and the World. Effective economy, No. 2, Recovered from: http://www.economy.nayka.com.ua/pdf/2_2019/54.pdf. DOI: 10.32702 / 2307-2105-2019.2.52
Bondarenko, O. S., & Repin, D. A. (2018). Cybercrime in Ukraine: causes, signs and countermeasures. Comparative and Analytical Law, No. 1, 246–248. Recovered from: https://essuir.sumdu.edu.ua/bitstream-download/123456789/67982/1/Bondarenko_Repin_KIberzlochinist.pdf
Council of Europe (2001) Convention on Cybercrime on 23. XI.2001. No 185. Recovered from: https://rm.coe.int/1680081561
Criminal Code of the Federal Republic of Germany. Federal Law Gazette Bundesgesetzblatt I, 24 de septiembre de 2013, p. 3322, Recovered from:https://www.legislationline.org/documents/section/criminal-codes/country/28/Germany/show
Criminal Code of the Republic of Korea, National legislative bodies / National authorities of Jan. 1, 1998. Recovered from: https://www.refworld.org/docid/3f49e3ed4.html
Criminal Code of the Republic of Poland, Principios de responsabilidad penal, of 6 June 1997. Recovered from: https://www.legislationline.org/download/id/7354/file/Poland_CC_1997_en.pdf
Criminal Code of the French Republic, Legislative part, January 01, 2020. Recovered from: https://www.legislationline.org/documents/section/criminal-codes/country/30/France/show
Ermolenko, O. M. (2015). Banking Innovation as а Trend of Increasing Competitiveness of Credit Institutions at The Present Stage of Functioning. Scientific Bulletin of YIM, No. 1, 49-55. Recovered from: https://cyberleninka.ru/article/n/kriterii-razvitiya-rynka-bankovskih-kart-na-sovremennom-etape-funktsionirovaniya-bankovskogo-sektora/viewer
Golovinov, O. N., & Pogorelov, A. V. (2016). Cybercrime in the modern economy: state and development trends. Innovation Economics, Issues, 6(1), 73-88. doi: 10.18334 /vinec.6.1.35353
Golub, A. (2016). Cybersecurity in all manifestations: see, heritage and ways to fight. Resource Center GURT: website. Recovered from: http://www.gurt.org.ua/articles/34602
Grib, D. (2019). Theft Of Property Through The Use Of Information Technology In The Criminal Code Of The Russian Federation And The Republic Of Belarus: A Comparative Aspect. Bulletin of the Moscow University of the Ministry of Internal Affairs of Russia, No. 4, 76-80. DOI 10.24411/2073-0454-2019-10199
Jahankhani, H., Al-Nemrat, A., & Hosseinian-Far, A. (2014). Cybercrime classification and characteristics. Cyber Crime and Cyber Terrorism Investigator's: Handbook. London: Waltham.
Khilyuta, V.V. (2013). Computer theft or computer fraud? Criminalist Library, No. 5(10), 55-65
Kunz, M., & Wilson, P. (2004). Computer Crime and Computer Fraud. Report to the Montgomery County Criminal Justice Coordinating Commission. Recovered from: https://www.montgomerycountymd.gov/cjcc/
Kurmaiev, P., Seliverstova, L., Bondarenko, O., & Husarevych, N. (2020). Cyber insurance: the current situation and prospects of development. Amazonia Investiga, 9(28), 65-73. https://doi.org/10.34069/AI/2020.28.04.8
Likholetov, A. A. (2016). Responsibility for the theft of funds in the bank accounts of citizens in the context of reforming criminal legislation. Bulletin of the Volgograd Academy of the Ministry of Internal Affairs in Russia, No. 1(36), 59-63. Recovered from: http://va-mvd.ru/vestnik/arhiv/36.pdf
Mogunova, M. M. (2020). Implementation technology and legal regulation of illegal seizure of personal bank data (phishing). Bulletin of the Saratov State Law Academy, No. 4, 135-141. Recovered from: https://elibrary.ru/item.asp?id=43846129
Order No. 909, Criminal Code of Denmark, of September 27, 2005. Recovered from:https://www.legislationline.org/documents/section/criminal-codes/country/34/Czech%20Republic/show
Penal Code of Turkey. European commission for democracy through law, Council of Euope, 15 February 2016. Recovered from: https://www.legislationline.org/documents/section/criminal-codes/country/50/Tajikistan/show
Pilipchuk, V. G., & Dzioban, O. P. (2011). Theoretical and state-legal aspects of anti-information terrorism in the minds of globalization. Strategic priorities, No. 4(21), 12-17.
Resolution No. 65/230 of Twelfth United Nations Congress on Crime Prevention and Criminal Justice. April 1, 2011. Recovered from: https://undocs.org/en/A/RES/65/230
Sachkov, D. I., Smirnova, I. G. (2015). Ensuring information security in government: textbook. Irkutsk, NovaPravo.
Shaevich, A. A. (2011). Features of use of special knowledge in the field of computer technologies at investigation of crimes: monograph. Irkutsk: Vost.- Sib. in-t M-va vnutr. Affairs of Russia.
Smagorinsky, B. P., & Senchenko, P. P. (2016). Features of detecting thefts committed using payment cards. Volgograd Academy of the Ministry of Internal Affairs in Russia, No. 4 (39), 102-106. Recovered from: http://va-mvd.ru/vestnik/arhiv/39.pdf
Sujono, I. (2019). Cybercrime Law Reconstruction in the National Cybersecurity Concept. http://doi.org/10.5281/zenodo.3462123
Swiss Criminal Code № SR 311.0. The Federal Assembly of the Swiss Confederation, 3 de marzo de 2020. Recovered from: https://business-swiss.ch/zakonodatel-stvo-shvejtsarii/ugolovnoe-pravo/ugolovny-j-kodeks-shvejtsarii/
Tereshchenko, L. K., & Starodubova, O. E. (2017). Mysteries of information law, Journal of Russian law, 1, 156-161. Recovered from: https://cyberleninka.ru/article/n/zagadki-informatsionnogo-prava/viewer
Utkina, M., Bondarenko, O., & Malanchuk, P. (2021). Patent Trolling and Intellectual Property: Challenges for Innovations. International Journal of Safety and Security Engineering, 11(1), pp. 69-77. https://doi.org/10.18280/ijsse.110108
United Nations (2021). Global Program on Cybercrime. Recovered from: https://www.unodc.org/unodc/en/cybercrime/global-programme-cybercrime.html
United Nations (2021). Comprehensive Study on Cybercrime Recovered from: http:///www.unodc.org
Vardanyan, A. V., & Gribunov, O. P. (2016). Forensic examinations assigned in the investigation of thefts at transport facilities. Theory and Practice of Countering Crime in the Asia-Pacific Region, No. 1 274-277 Recovered from: http://journals.tsu.ru/uploads/import/1800/files/437_205.pdf
Vorontsova, S. V. (2011). Cybercrime: masalah kualifikasi tindakan kriminal (criminal act qualification problema). Russian journal of economy, 2, 14-15.