Features of the initial stage of investigating fraud with financial resources in cyberspace

Keywords: criminal offenses, cyberspace, fraud, financial resources, investigation.

Abstract

The article aims to characterize the forensic features of the initial stage of investigating fraud with financial resources in cyberspace, its significance, analysis, and justification as a type of cybercrime that is dangerous for everyone, and prove the need for urgent measures to prevent and combat such criminal offenses. The authors used several methods of scientific cognition: logical-semantic, system-structural, analytical, formal-legal, forecasting, dialectical, interpretation, and hermeneutics. The article focuses on the general provisions of the forensic characteristics of Internet fraud with financial resources; analysis of the information model of the mechanism of committing fraud with financial resources in the field of computer information; coverage of the tactical features of individual investigative actions at the initial stage of the investigation of fraud with financial resources in cyberspace. It was concluded that the effectiveness of combating Internet fraud and the level of cybersecurity in Ukraine is very low. Therefore, the investigation of fraud with financial resources in cyberspace requires in-depth specific knowledge from the subjects of the investigation.

Downloads

Download data is not yet available.

Author Biographies

Oleg Reznik, Sumy State University, Ukraine.

Doctor of Juridical Sciences, Associate Professor, Department of Administrative, Economic Law and Financial and Economic Security, Sumy State University, Ukraine.

Andrii Fomenko, Dnipropetrovsk State University of Internal Affairs, Ukraine.

Candidate of Juridical Sciences, Rector, Dnipropetrovsk State University of Internal Affairs, Ukraine.

Andrii Melnychenko, Dnipropetrovsk State University of Internal Affairs, Ukraine.

Candidate of Juridical Sciences, Associate Professor of the Department of Criminal Procedure, Faculty of Training for Pre-trial Investigation, Dnipropetrovsk State University of Internal Affairs, Ukraine.

Natalia Pavlova, Dnipropetrovsk State University of Internal Affairs, Ukraine.

Candidate of Juridical Sciences,Associate Professor of the Department of Criminalistics and Domestic Training, Dnipropetrovsk State University of Internal Affairs, Ukraine.

Andrii Prozorov, National Academy of the Security Service of Ukraine, Ukraine.

Candidate of Juridical Sciences,Associate Professor of the Department "Organizations of information security with limited access" of the National Academy of the Security Service of Ukraine, Ukraine.

References

Babanina, V., Tkachenko, I., Matiushenko, O., & Krutevych, M. (2021). Cybercrime: History of formation, current state and ways of counteraction. Amazonia Investiga, 10(38), 113-122. https://doi.org/10.34069/AI/2021.38.02.10

Belkin, R.S. (2013). Forensics course. General theory of criminology. Moscow: Lawyer.

Bhavna, A. (2016). Exploring and analyzing Internet crimes and their behaviours. Perspectives in Science, 8, 540-542. Recovered from: https://www.sciencedirect.com/science/article/
pii/S2213020916301537

Bondarenko, O.S., & Repin, D.A. (2018). Cybercrime in Ukraine: causes, signs and countermeasures. Comparative-analytical law, № 1. 246–248. Recovered from: https://essuir.sumdu.edu.ua/bitstream-download/123456789/67982/1/Bondarenko_Repin_
KIberzlochinist.pdf

Chekunov, I.G. (2012). Modern cyber threats. Criminal law and criminological classification and qualification of cybercrimes. Moscow: Jurist.

Ciardhuáin, S.Ó. (2004). An Extended Model of Cybercrime Investigations. International Journal of Digital Evidence, 3(1). Recovered from: https://www.utica.edu/academic/institutes/
ecii/publications/articles/A0B70121-FD6C-3DBA-0EA5C3E93CC575FA.pdf

Council of Europe (2001) Convention on Cybercrime on 23. XI. 2001 No 185. Recovered from: https://rm.coe.int/1680081561

Dovzhenko, O. Yu. (2019). On the question of tactics of interrogations in cases of cyber crimes. Scientific Bulletin of the International Humanities University, № 37, 143-145. Recovered from: http://vestnik-pravo.mgu.od.ua/archive/juspradenc37/37.pdf

Dulenko, V.A., Mamleev, R. R., & Pestrikov, V.A. (2007). The use of high technology in a criminal environment. Fighting crimes in the field of computer information: textbook. help. Kyiv: Riv pres.

Dumchikov, M., Kononenko, N., Batsenko, L., Halenin, R., & Hlushchenko, N. (2020). Issues of regulating cryptocurrency and control over its turnover: international experience. Amazonia Investiga, 9(31), 10-20. https://doi.org/10.34069/AI/2020.31.07.1

EMA de Ucrania (2016). Safe Card: the first results were summed up at the Forum of Security of Settlements and Credits Source Recovered from: https://www.ema.com.ua/news/pervye-itogi-podvedeny-na-forume-bezopasnosti-raschetov-i-kreditov/

Furnell, S. (2002). Cyber Crime: Vandalizing the Information Society. London: Addison Wesley.

Uplan (2017) How are cybercrimes investigated in Ukraine? Recovered from: https://uplan.org.ua/analytics/iak-v-ukraini-rozsliduiut-kiberzlochyny/

Ilyushin, D.A. (2007). Peculiarities of initiating criminal cases on crimes committed in the sphere of providing Internet services. Visnyk of SamSU, № 1(51), 9-16. Recovered from https://cyberleninka.ru/article/n/osobennosti-vozbuzhdeniya-ugolovnyh-del-o-prestupleniyah-sovershaemyh-v-sfere-predostavleniya-uslug-internet/viewer

Karchevskaya, Yu. S. (2017). Carding as the most popular type of cyber crime of minors in the republic of Belarus. Theoretical and applied issues of combating crimes committed with the use of information technology, № 2, 17-20. Recovered from http://www.institutemvd.by/components/com_chronoforms5/
chronoforms/uploads/20180103154844_Karchevskaja.pdf

Kurmaiev, P., Seliverstova, L., Bondarenko, O., & Husarevych, N. (2020). Cyber insurance: the current situation and prospects of development. Amazonia Investiga, 9(28), 65-73. https://doi.org/10.34069/AI/2020.28.04.8

McGuire, M., and S. Dowling (2013). Cybercrime: A Review of the Evidence. Home Office. Recovered from:https://assets.publishing.service.gov.uk/
government/uploads/system/uploads/attachment_data/
file/248621/horr75-chap2.pdf

Nguyen, T.V. (2020). Cybercrime in Vietnam: An Analysis based on Routine Activity Theory. International Journal of Cyber Criminology, 14(1), 156-173. http://dx.doi.org/10.5281/zenodo.3747516

Nomokonov, V.A., & Tropina, T.L. (2013). Cybercrime: problems of struggle and forecasts. Forensic Library, Vol. 1, 148-159.

Rossinskaya, O. R. (2015). Computer crimes: criminal law and forensic aspects. Voronezh forensic readings, Vol. 3, 169-183.

Rozsoliv, I.M. (2009). Law and the Internet. Theoretical problems. Moscow: Norma.

Vorobiev, V. V. (2014). Crimes in the field of computer information: Legal characteristics composition qualification (PhD thesis), Syktyvkar State University named after Pitirim Sorokin, Russia. Recovered from: https://www.dissercat.com/content/prestupleniya-v-sfere-kompyuternoi-informatsii-yuridicheskaya-kharakteristika-sostavov-i-kva

Zuban, O.V. (2003). The problem of spam and its solution. Moscow: Norma.
Published
2021-06-29
How to Cite
Reznik, O., Fomenko, A., Melnychenko, A., Pavlova, N., & Prozorov, A. (2021). Features of the initial stage of investigating fraud with financial resources in cyberspace. Amazonia Investiga, 10(41), 141-150. https://doi.org/10.34069/AI/2021.41.05.14
Section
Articles
Bookmark and Share