Vol. 10 No. 41 (2021)
Articles

Features of the initial stage of investigating fraud with financial resources in cyberspace

Oleg Reznik
Sumy State University, Ukraine.
Bio
Andrii Fomenko
Dnipropetrovsk State University of Internal Affairs, Ukraine.
Bio
Andrii Melnychenko
Dnipropetrovsk State University of Internal Affairs, Ukraine.
Bio
Natalia Pavlova
Dnipropetrovsk State University of Internal Affairs, Ukraine.
Bio
Andrii Prozorov
National Academy of the Security Service of Ukraine, Ukraine.
Bio

Published 2021-06-29

Keywords

  • criminal offenses, cyberspace, fraud, financial resources, investigation.

How to Cite

Reznik, O., Fomenko, A., Melnychenko, A., Pavlova, N., & Prozorov, A. (2021). Features of the initial stage of investigating fraud with financial resources in cyberspace. Amazonia Investiga, 10(41), 141–150. https://doi.org/10.34069/AI/2021.41.05.14

Abstract

The article aims to characterize the forensic features of the initial stage of investigating fraud with financial resources in cyberspace, its significance, analysis, and justification as a type of cybercrime that is dangerous for everyone, and prove the need for urgent measures to prevent and combat such criminal offenses. The authors used several methods of scientific cognition: logical-semantic, system-structural, analytical, formal-legal, forecasting, dialectical, interpretation, and hermeneutics. The article focuses on the general provisions of the forensic characteristics of Internet fraud with financial resources; analysis of the information model of the mechanism of committing fraud with financial resources in the field of computer information; coverage of the tactical features of individual investigative actions at the initial stage of the investigation of fraud with financial resources in cyberspace. It was concluded that the effectiveness of combating Internet fraud and the level of cybersecurity in Ukraine is very low. Therefore, the investigation of fraud with financial resources in cyberspace requires in-depth specific knowledge from the subjects of the investigation.

Downloads

Download data is not yet available.

References

Babanina, V., Tkachenko, I., Matiushenko, O., & Krutevych, M. (2021). Cybercrime: History of formation, current state and ways of counteraction. Amazonia Investiga, 10(38), 113-122. https://doi.org/10.34069/AI/2021.38.02.10

Belkin, R.S. (2013). Forensics course. General theory of criminology. Moscow: Lawyer.

Bhavna, A. (2016). Exploring and analyzing Internet crimes and their behaviours. Perspectives in Science, 8, 540-542. Recovered from: https://www.sciencedirect.com/science/article/
pii/S2213020916301537

Bondarenko, O.S., & Repin, D.A. (2018). Cybercrime in Ukraine: causes, signs and countermeasures. Comparative-analytical law, ? 1. 246–248. Recovered from: https://essuir.sumdu.edu.ua/bitstream-download/123456789/67982/1/Bondarenko_Repin_
KIberzlochinist.pdf

Chekunov, I.G. (2012). Modern cyber threats. Criminal law and criminological classification and qualification of cybercrimes. Moscow: Jurist.

Ciardhuáin, S.Ó. (2004). An Extended Model of Cybercrime Investigations. International Journal of Digital Evidence, 3(1). Recovered from: https://www.utica.edu/academic/institutes/
ecii/publications/articles/A0B70121-FD6C-3DBA-0EA5C3E93CC575FA.pdf

Council of Europe (2001) Convention on Cybercrime on 23. XI. 2001 No 185. Recovered from: https://rm.coe.int/1680081561

Dovzhenko, O. Yu. (2019). On the question of tactics of interrogations in cases of cyber crimes. Scientific Bulletin of the International Humanities University, ? 37, 143-145. Recovered from: http://vestnik-pravo.mgu.od.ua/archive/juspradenc37/37.pdf

Dulenko, V.A., Mamleev, R. R., & Pestrikov, V.A. (2007). The use of high technology in a criminal environment. Fighting crimes in the field of computer information: textbook. help. Kyiv: Riv pres.

Dumchikov, M., Kononenko, N., Batsenko, L., Halenin, R., & Hlushchenko, N. (2020). Issues of regulating cryptocurrency and control over its turnover: international experience. Amazonia Investiga, 9(31), 10-20. https://doi.org/10.34069/AI/2020.31.07.1

EMA de Ucrania (2016). Safe Card: the first results were summed up at the Forum of Security of Settlements and Credits Source Recovered from: https://www.ema.com.ua/news/pervye-itogi-podvedeny-na-forume-bezopasnosti-raschetov-i-kreditov/

Furnell, S. (2002). Cyber Crime: Vandalizing the Information Society. London: Addison Wesley.

Uplan (2017) How are cybercrimes investigated in Ukraine? Recovered from: https://uplan.org.ua/analytics/iak-v-ukraini-rozsliduiut-kiberzlochyny/

Ilyushin, D.A. (2007). Peculiarities of initiating criminal cases on crimes committed in the sphere of providing Internet services. Visnyk of SamSU, ? 1(51), 9-16. Recovered from https://cyberleninka.ru/article/n/osobennosti-vozbuzhdeniya-ugolovnyh-del-o-prestupleniyah-sovershaemyh-v-sfere-predostavleniya-uslug-internet/viewer

Karchevskaya, Yu. S. (2017). Carding as the most popular type of cyber crime of minors in the republic of Belarus. Theoretical and applied issues of combating crimes committed with the use of information technology, ? 2, 17-20. Recovered from http://www.institutemvd.by/components/com_chronoforms5/
chronoforms/uploads/20180103154844_Karchevskaja.pdf

Kurmaiev, P., Seliverstova, L., Bondarenko, O., & Husarevych, N. (2020). Cyber insurance: the current situation and prospects of development. Amazonia Investiga, 9(28), 65-73. https://doi.org/10.34069/AI/2020.28.04.8

McGuire, M., and S. Dowling (2013). Cybercrime: A Review of the Evidence. Home Office. Recovered from:https://assets.publishing.service.gov.uk/
government/uploads/system/uploads/attachment_data/
file/248621/horr75-chap2.pdf

Nguyen, T.V. (2020). Cybercrime in Vietnam: An Analysis based on Routine Activity Theory. International Journal of Cyber Criminology, 14(1), 156-173. http://dx.doi.org/10.5281/zenodo.3747516

Nomokonov, V.A., & Tropina, T.L. (2013). Cybercrime: problems of struggle and forecasts. Forensic Library, Vol. 1, 148-159.

Rossinskaya, O. R. (2015). Computer crimes: criminal law and forensic aspects. Voronezh forensic readings, Vol. 3, 169-183.

Rozsoliv, I.M. (2009). Law and the Internet. Theoretical problems. Moscow: Norma.

Vorobiev, V. V. (2014). Crimes in the field of computer information: Legal characteristics composition qualification (PhD thesis), Syktyvkar State University named after Pitirim Sorokin, Russia. Recovered from: https://www.dissercat.com/content/prestupleniya-v-sfere-kompyuternoi-informatsii-yuridicheskaya-kharakteristika-sostavov-i-kva

Zuban, O.V. (2003). The problem of spam and its solution. Moscow: Norma.