The essence and classification of cybercrime in the field of computer information

Keywords: crimes in the field of computer information, information crimes, cybercrime, crimes in the field of payment systems, computer crimes, COVID-19.

Abstract

Cimes in the field of computer information have become pressing issue in society today. Its relevance is evidenced by news from around the world, criminal statistics, problematic issues in the science of criminal law, as well as problems in criminal proceedings. All this is due to the fact that as a phenomenon, crimes in the field of computer information belong to the very specific category that is constantly evolves technological progress.

The purpose of the article is to study the phenomenon of crimes in the field of computer information, to define the concept of crimes in the field of computer information and types of these crimes, to provide general characteristics of crimes in the field of computer information, as well as to identify their classification.

Various methods of scientific knowledge were used as a methodological basis for writing this article. In particular, comparison methods, analogies and generalization methods were used.

In our time, cybercrime has spiraled out of the control of one state's law enforcement agencies and has become a significant interstate and transnational problem.

Downloads

Download data is not yet available.

Author Biographies

Mykhailo Dumchikov, Sumy State University, Ukraine.

Senior lecture. Department of Criminal Legal Disciplines and Procedure, Sumy State University, Ukraine.

Andrii Fomenko, Dnipropetrovsk State University of Internal Affairs, Ukraine

Candidate of Juridical Sciences, Rector, Dnipropetrovsk State University of Internal Affairs, Ukraine

Oleksandr Yunin, Dnipropetrovsk State University of Internal Affairs, Ukraine.

Docror of Juridical Sciences, Vice Rector, Dnipropetrovsk State University of Internal Affairs, Ukraine.

Volodymyr Pakhomov, Sumy State University, Ukraine.

Doctor of Juridical Sciences, Professor, Department of Administrative, Economic Law and Financial and Economic Security, Sumy State University, Ukraine.

Yuliia Kabenok, Kyiv National University of Trade and Economics, Ukraine.

Ph.D in Law, Associate Professor, Associate Professor of the Department of International, Civil and Commercial Law Kyiv National University of Trade and Economics, Ukraine.

References

Aghatise, E.J. (2008) Cybercrime Definition. Computer Research Center, Retrived from https://www.researchgate.net/publication/265350281_Cybercrime_definition#:~:
text=Cybercrime%20is%20defined%20as%20crimes,murder%20or%20theft%20need%20not

Baturin, Y.M. (1991). Computer crime and computer security. M.: Legal Literature. Recovered from: https://ua1lib.org/book/3215802/04b963

Begishev, I. R. (2017). Concept and types of crimes in the sphere of digital information circulation. (PHD thesis). Kazan (Volga Region) Federal University. Recovered from: https://www.prlib.ru/item/1156241

Bessonov, V.A. (2000). Victimological aspects of crime prevention in the field of computer information. (Doctoral thesis). Nizhny Novgorod Law. Inst. of the Ministry of Internal Affairs of the Russian Federation. Recovered from: https://rusneb.ru/catalog/000200_000018_RU_NLR_bibl_294121/

Bolgov, V.M., & Gladun, O.Z. (2015). The competence of the National Securities and Stock Market Commission in countering the legalization (laundering) of obtained incomes by criminal ways. Revision of the National Institute of Justice, 2(33). Recovered from: https://ibn.idsi.md/sites/default/files/imag_file/28_32_Kompetentsiya%20Natsionalnoy%
20komissii%20po%20tsennyim%20bumagam%20i%20fondovomu%20ryinku%20v%
20sfere%20protivodeystviya%20legalizatsii%20%28otmyivaniyu%29%20dohodov_
poluchennyih%20prestupnyim%20putem.pdf

Borovukiv, V.B. (2015). Criminal Law. Kharkiv: Odyssey. Recovered from: https://stud.com.ua/53996/pravo/zagalna_chastina

Copyright (1999). Copyright Law of the United States Title 17. Recovered from: https://www.copyright.gov/title17/

Cyber police in Ukraine. (2018). Official Web site. Recovered from: https://cyberpolice.gov.ua/results/2018/

Dobrovolsky, D.V. (2005). Actual problems of combating computer crime: Criminal-legal and criminological problems. (PHD thesis). Modern HUmanitarian Academy, Moscow. Recovered from: http://www.dslib.net/kriminal-pravo/aktualnye-problemy-borby-s-kompjuternoj-prestupnostju-ugolovno-pravovye-i.html

Dictionary of banking terms. (2022). Banki. Recovered from: https://www.banki.ru/wikibank/skimming/

Klochko, A.N., Kulish, A.N., & Reznik, O.N. (2016). The social basis of criminal law protection of banking in Ukraine. Russian Journal of Criminology, 10(4), pp. 790–800. Recovered from: https://essuir.sumdu.edu.ua/handle/123456789/49217

Kumar, A., Chatterjee, J.M., & Díaz, V.G. (2020). A novel hybrid approach of SVM combined with NLP and probabilistic neural network for email phishing. International Journal of Electrical and Computer Engineering (IJECE), 10(1), 486–493. doi: 10.11591/ijece.v10i1.

Kurushin, V. D. (1998). Computer crimes and information security. M.: New lawyer. Recovered from: https://www.twirpx.com/file/587744/

Lyadskiy, V.V. (2014). Crimes in the field of computer information. Electronic Bulletin of the Rostov Socio-Economic Institute, № 6. Recovered from: https://cyberleninka.ru/article/n/prestupleniya-v-sfere-kompyuternoy-informatsii

Law № 2341-III. Criminal Code of Ukraine. Information of the Verkhovna Rada of Ukraine, № 25-26, 2001. Recovered from: https://zakon.rada.gov.ua/laws/show/2341-14

Michael, A.D. (2019). Cybercrime: Facts & Related Content. The Information Architects of Encyclopaedia Britannica. Recovered from: https://www.britannica.com/facts/cybercrime

Privat Bank (2022) Official site. Recovered from: https://privatbank.ua/strahovaniye/zakhyst-vid-shakhraystva#:~:text=3.,4.

Rusch, J. (2005). The compleat cyber-angler: A guide to phishing. Computer Fraud & Security, (1), 4-6. doi: 10.1016/S1361-3723(05)00145-4.

Sergeev, D.R., Lyubimenko, O.A., & Savvateeva, O.V. (2020). Fraud on the internet as threat to economic security States. Theoretical Economics, 3, 76-84. Recovered from: https://cyberleninka.ru/article/n/moshennichestvo-v-seti-internet-kak-ugroza-ekonomicheskoy-bezopasnosti-gosudarstva/viewer

Smirnova, T. G. (1998). Criminal law fight against crimes in the field of computer information. (PHD thesis). Academy of Management of the Ministry of Internal Affairs of Russia. Recovered from: http://www.dslib.net/kriminal-pravo/ugolovno-pravovaja-borba-s-prestuplenijami-v-sfere-kompjuternoj-informacii.html

Vakulyk, O.O., Andriichenko, N.S., Reznik, O.M., Volik, V.V., & Yanishevska, K.D. (2019). International aspect of a legal regulation in the field of financial crime counteraction by the example of special services of Ukraine and the CIS countries. Journal of Legal, Ethical and Regulatory Issues, 22(1). Recovered from: https://www.abacademies.org/articles/international-aspect-of-a-legal-regulation-in-the-field-of-financial-crime-counteraction-by-the-example-of-special-services-of-ukr-7870.html

Verjovna Rada de Ucrania (2001). Cybercrime Convention: Convention, International document Voice of Ukraine from № 9-10. Recovered https://zakon.rada.gov.ua/laws/show/994_575#Text

Voitko, B.S., Marchenko, M.M., & Antonov, Yu. S. (2020). Social engineering as a tool for penetration into the information system of enterprise. Applied aspects of the use of information systems, 1. Recovered from: https://jait.donnu.edu.ua/article/view/9023

Yurchuk, A.M. (April, 2017). Types of cybercrime. In Korsun Yaroslav Petrovich (Presidency), VII regional interuniversity student scientific "practical conference" problems of ukrainian society: cyber crime. Separate structural subdivision "Rivne College of the National University of Life and Environmental Sciences", Rivne. Recovered from: http://prog-rdak.16mb.com/wp-content/uploads/2017/04/kiberzlochunu.pdf
Published
2022-04-20
How to Cite
Dumchikov, M., Fomenko, A., Yunin, O., Pakhomov, V., & Kabenok, Y. (2022). The essence and classification of cybercrime in the field of computer information. Amazonia Investiga, 11(51), 291-299. https://doi.org/10.34069/AI/2022.51.03.29
Section
Articles
Bookmark and Share