Published 2021-06-29
Keywords
- criminal offenses, cyberspace, fraud, financial resources, investigation.
How to Cite
Abstract
The article aims to characterize the forensic features of the initial stage of investigating fraud with financial resources in cyberspace, its significance, analysis, and justification as a type of cybercrime that is dangerous for everyone, and prove the need for urgent measures to prevent and combat such criminal offenses. The authors used several methods of scientific cognition: logical-semantic, system-structural, analytical, formal-legal, forecasting, dialectical, interpretation, and hermeneutics. The article focuses on the general provisions of the forensic characteristics of Internet fraud with financial resources; analysis of the information model of the mechanism of committing fraud with financial resources in the field of computer information; coverage of the tactical features of individual investigative actions at the initial stage of the investigation of fraud with financial resources in cyberspace. It was concluded that the effectiveness of combating Internet fraud and the level of cybersecurity in Ukraine is very low. Therefore, the investigation of fraud with financial resources in cyberspace requires in-depth specific knowledge from the subjects of the investigation.
Downloads
References
Belkin, R.S. (2013). Forensics course. General theory of criminology. Moscow: Lawyer.
Bhavna, A. (2016). Exploring and analyzing Internet crimes and their behaviours. Perspectives in Science, 8, 540-542. Recovered from: https://www.sciencedirect.com/science/article/
pii/S2213020916301537
Bondarenko, O.S., & Repin, D.A. (2018). Cybercrime in Ukraine: causes, signs and countermeasures. Comparative-analytical law, ? 1. 246–248. Recovered from: https://essuir.sumdu.edu.ua/bitstream-download/123456789/67982/1/Bondarenko_Repin_
KIberzlochinist.pdf
Chekunov, I.G. (2012). Modern cyber threats. Criminal law and criminological classification and qualification of cybercrimes. Moscow: Jurist.
Ciardhuáin, S.Ó. (2004). An Extended Model of Cybercrime Investigations. International Journal of Digital Evidence, 3(1). Recovered from: https://www.utica.edu/academic/institutes/
ecii/publications/articles/A0B70121-FD6C-3DBA-0EA5C3E93CC575FA.pdf
Council of Europe (2001) Convention on Cybercrime on 23. XI. 2001 No 185. Recovered from: https://rm.coe.int/1680081561
Dovzhenko, O. Yu. (2019). On the question of tactics of interrogations in cases of cyber crimes. Scientific Bulletin of the International Humanities University, ? 37, 143-145. Recovered from: http://vestnik-pravo.mgu.od.ua/archive/juspradenc37/37.pdf
Dulenko, V.A., Mamleev, R. R., & Pestrikov, V.A. (2007). The use of high technology in a criminal environment. Fighting crimes in the field of computer information: textbook. help. Kyiv: Riv pres.
Dumchikov, M., Kononenko, N., Batsenko, L., Halenin, R., & Hlushchenko, N. (2020). Issues of regulating cryptocurrency and control over its turnover: international experience. Amazonia Investiga, 9(31), 10-20. https://doi.org/10.34069/AI/2020.31.07.1
EMA de Ucrania (2016). Safe Card: the first results were summed up at the Forum of Security of Settlements and Credits Source Recovered from: https://www.ema.com.ua/news/pervye-itogi-podvedeny-na-forume-bezopasnosti-raschetov-i-kreditov/
Furnell, S. (2002). Cyber Crime: Vandalizing the Information Society. London: Addison Wesley.
Uplan (2017) How are cybercrimes investigated in Ukraine? Recovered from: https://uplan.org.ua/analytics/iak-v-ukraini-rozsliduiut-kiberzlochyny/
Ilyushin, D.A. (2007). Peculiarities of initiating criminal cases on crimes committed in the sphere of providing Internet services. Visnyk of SamSU, ? 1(51), 9-16. Recovered from https://cyberleninka.ru/article/n/osobennosti-vozbuzhdeniya-ugolovnyh-del-o-prestupleniyah-sovershaemyh-v-sfere-predostavleniya-uslug-internet/viewer
Karchevskaya, Yu. S. (2017). Carding as the most popular type of cyber crime of minors in the republic of Belarus. Theoretical and applied issues of combating crimes committed with the use of information technology, ? 2, 17-20. Recovered from http://www.institutemvd.by/components/com_chronoforms5/
chronoforms/uploads/20180103154844_Karchevskaja.pdf
Kurmaiev, P., Seliverstova, L., Bondarenko, O., & Husarevych, N. (2020). Cyber insurance: the current situation and prospects of development. Amazonia Investiga, 9(28), 65-73. https://doi.org/10.34069/AI/2020.28.04.8
McGuire, M., and S. Dowling (2013). Cybercrime: A Review of the Evidence. Home Office. Recovered from:https://assets.publishing.service.gov.uk/
government/uploads/system/uploads/attachment_data/
file/248621/horr75-chap2.pdf
Nguyen, T.V. (2020). Cybercrime in Vietnam: An Analysis based on Routine Activity Theory. International Journal of Cyber Criminology, 14(1), 156-173. http://dx.doi.org/10.5281/zenodo.3747516
Nomokonov, V.A., & Tropina, T.L. (2013). Cybercrime: problems of struggle and forecasts. Forensic Library, Vol. 1, 148-159.
Rossinskaya, O. R. (2015). Computer crimes: criminal law and forensic aspects. Voronezh forensic readings, Vol. 3, 169-183.
Rozsoliv, I.M. (2009). Law and the Internet. Theoretical problems. Moscow: Norma.
Vorobiev, V. V. (2014). Crimes in the field of computer information: Legal characteristics composition qualification (PhD thesis), Syktyvkar State University named after Pitirim Sorokin, Russia. Recovered from: https://www.dissercat.com/content/prestupleniya-v-sfere-kompyuternoi-informatsii-yuridicheskaya-kharakteristika-sostavov-i-kva
Zuban, O.V. (2003). The problem of spam and its solution. Moscow: Norma.