Published 2022-04-20
Keywords
- crimes in the field of computer information, information crimes, cybercrime, crimes in the field of payment systems, computer crimes, COVID-19.
How to Cite
Abstract
Cimes in the field of computer information have become pressing issue in society today. Its relevance is evidenced by news from around the world, criminal statistics, problematic issues in the science of criminal law, as well as problems in criminal proceedings. All this is due to the fact that as a phenomenon, crimes in the field of computer information belong to the very specific category that is constantly evolves technological progress.
The purpose of the article is to study the phenomenon of crimes in the field of computer information, to define the concept of crimes in the field of computer information and types of these crimes, to provide general characteristics of crimes in the field of computer information, as well as to identify their classification.
Various methods of scientific knowledge were used as a methodological basis for writing this article. In particular, comparison methods, analogies and generalization methods were used.
In our time, cybercrime has spiraled out of the control of one state's law enforcement agencies and has become a significant interstate and transnational problem.
Downloads
References
text=Cybercrime%20is%20defined%20as%20crimes,murder%20or%20theft%20need%20not
Baturin, Y.M. (1991). Computer crime and computer security. M.: Legal Literature. Recovered from: https://ua1lib.org/book/3215802/04b963
Begishev, I. R. (2017). Concept and types of crimes in the sphere of digital information circulation. (PHD thesis). Kazan (Volga Region) Federal University. Recovered from: https://www.prlib.ru/item/1156241
Bessonov, V.A. (2000). Victimological aspects of crime prevention in the field of computer information. (Doctoral thesis). Nizhny Novgorod Law. Inst. of the Ministry of Internal Affairs of the Russian Federation. Recovered from: https://rusneb.ru/catalog/000200_000018_RU_NLR_bibl_294121/
Bolgov, V.M., & Gladun, O.Z. (2015). The competence of the National Securities and Stock Market Commission in countering the legalization (laundering) of obtained incomes by criminal ways. Revision of the National Institute of Justice, 2(33). Recovered from: https://ibn.idsi.md/sites/default/files/imag_file/28_32_Kompetentsiya%20Natsionalnoy%
20komissii%20po%20tsennyim%20bumagam%20i%20fondovomu%20ryinku%20v%
20sfere%20protivodeystviya%20legalizatsii%20%28otmyivaniyu%29%20dohodov_
poluchennyih%20prestupnyim%20putem.pdf
Borovukiv, V.B. (2015). Criminal Law. Kharkiv: Odyssey. Recovered from: https://stud.com.ua/53996/pravo/zagalna_chastina
Copyright (1999). Copyright Law of the United States Title 17. Recovered from: https://www.copyright.gov/title17/
Cyber police in Ukraine. (2018). Official Web site. Recovered from: https://cyberpolice.gov.ua/results/2018/
Dobrovolsky, D.V. (2005). Actual problems of combating computer crime: Criminal-legal and criminological problems. (PHD thesis). Modern HUmanitarian Academy, Moscow. Recovered from: http://www.dslib.net/kriminal-pravo/aktualnye-problemy-borby-s-kompjuternoj-prestupnostju-ugolovno-pravovye-i.html
Dictionary of banking terms. (2022). Banki. Recovered from: https://www.banki.ru/wikibank/skimming/
Klochko, A.N., Kulish, A.N., & Reznik, O.N. (2016). The social basis of criminal law protection of banking in Ukraine. Russian Journal of Criminology, 10(4), pp. 790–800. Recovered from: https://essuir.sumdu.edu.ua/handle/123456789/49217
Kumar, A., Chatterjee, J.M., & Díaz, V.G. (2020). A novel hybrid approach of SVM combined with NLP and probabilistic neural network for email phishing. International Journal of Electrical and Computer Engineering (IJECE), 10(1), 486–493. doi: 10.11591/ijece.v10i1.
Kurushin, V. D. (1998). Computer crimes and information security. M.: New lawyer. Recovered from: https://www.twirpx.com/file/587744/
Lyadskiy, V.V. (2014). Crimes in the field of computer information. Electronic Bulletin of the Rostov Socio-Economic Institute, ? 6. Recovered from: https://cyberleninka.ru/article/n/prestupleniya-v-sfere-kompyuternoy-informatsii
Law ? 2341-III. Criminal Code of Ukraine. Information of the Verkhovna Rada of Ukraine, ? 25-26, 2001. Recovered from: https://zakon.rada.gov.ua/laws/show/2341-14
Michael, A.D. (2019). Cybercrime: Facts & Related Content. The Information Architects of Encyclopaedia Britannica. Recovered from: https://www.britannica.com/facts/cybercrime
Privat Bank (2022) Official site. Recovered from: https://privatbank.ua/strahovaniye/zakhyst-vid-shakhraystva#:~:text=3.,4.
Rusch, J. (2005). The compleat cyber-angler: A guide to phishing. Computer Fraud & Security, (1), 4-6. doi: 10.1016/S1361-3723(05)00145-4.
Sergeev, D.R., Lyubimenko, O.A., & Savvateeva, O.V. (2020). Fraud on the internet as threat to economic security States. Theoretical Economics, 3, 76-84. Recovered from: https://cyberleninka.ru/article/n/moshennichestvo-v-seti-internet-kak-ugroza-ekonomicheskoy-bezopasnosti-gosudarstva/viewer
Smirnova, T. G. (1998). Criminal law fight against crimes in the field of computer information. (PHD thesis). Academy of Management of the Ministry of Internal Affairs of Russia. Recovered from: http://www.dslib.net/kriminal-pravo/ugolovno-pravovaja-borba-s-prestuplenijami-v-sfere-kompjuternoj-informacii.html
Vakulyk, O.O., Andriichenko, N.S., Reznik, O.M., Volik, V.V., & Yanishevska, K.D. (2019). International aspect of a legal regulation in the field of financial crime counteraction by the example of special services of Ukraine and the CIS countries. Journal of Legal, Ethical and Regulatory Issues, 22(1). Recovered from: https://www.abacademies.org/articles/international-aspect-of-a-legal-regulation-in-the-field-of-financial-crime-counteraction-by-the-example-of-special-services-of-ukr-7870.html
Verjovna Rada de Ucrania (2001). Cybercrime Convention: Convention, International document Voice of Ukraine from ? 9-10. Recovered https://zakon.rada.gov.ua/laws/show/994_575#Text
Voitko, B.S., Marchenko, M.M., & Antonov, Yu. S. (2020). Social engineering as a tool for penetration into the information system of enterprise. Applied aspects of the use of information systems, 1. Recovered from: https://jait.donnu.edu.ua/article/view/9023
Yurchuk, A.M. (April, 2017). Types of cybercrime. In Korsun Yaroslav Petrovich (Presidency), VII regional interuniversity student scientific "practical conference" problems of ukrainian society: cyber crime. Separate structural subdivision "Rivne College of the National University of Life and Environmental Sciences", Rivne. Recovered from: http://prog-rdak.16mb.com/wp-content/uploads/2017/04/kiberzlochunu.pdf