To see the other types of publications on this topic, follow the link: Computer crimes Computer crimes Computer networks.

Journal articles on the topic 'Computer crimes Computer crimes Computer networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer crimes Computer crimes Computer networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Stratonov, Vasyl. ""Computer crimes": some features and characteristics." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 2, no. 2 (2020): 134–41. http://dx.doi.org/10.31733/2078-3566-2020-2-134-141.

Full text
Abstract:
Unfortunately, along with positive achievements, informatization also has negative manifestations, namely, the possibility of using computer technology to commit crimes. The world has long been talking about "cy-bercrime" about "computer crime," and chapter 16 of the Criminal Code of Ukraine deals with crimes in the use of computers, computer systems and networks, as well as telecommunications. Therefore, we can state that a unified approach to the definition of a concept does not exist. However, the introduction of certain norms into the law does not solve the problems. Problems arise with th
APA, Harvard, Vancouver, ISO, and other styles
2

М.M., Haryha, Verhun L.O., and Kuznetsov O.O. "Some aspects of criminal characteristics of cyber crimes." Scientific Herald of Sivershchyna. Series: Law 2020, no. 3 (2020): 89–99. http://dx.doi.org/10.32755/sjlaw.2020.03.089.

Full text
Abstract:
The article analyzes the dynamics of crimes in the use of computers, systems, computer networks and telecommunications networks for 2019-2020, and focuses on the high “adaptive” ability of this criminal segment as well as the need to improve existing and create new effective mechanisms to combat relevant criminal acts. One of the conditions for the existence of such mechanisms is the presence of thorough forensic characteristics of this group of crimes, which allows identifying and understanding the training, commission and concealment of the group of illegal acts. The research describes the m
APA, Harvard, Vancouver, ISO, and other styles
3

Walden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.

Full text
Abstract:
AbstractAs the ‘Information Society’ emerges, the European economy and its citizens have become dependent on computers and communication networks. However, with the ravages of the viruses MyDoom and MS Blaster still being felt around the world, the vulnerability of computer systems and networks to criminal crime, as well as potentially terrorist activity, is still fresh in our minds. There is no agreed definition of what constitutes a ‘computer crime’. A computer may constitute the instrument of the crime, such as in murder and fraud; the object of the crime, such as the theft of processor chi
APA, Harvard, Vancouver, ISO, and other styles
4

Rossinskaya, E. R., and I. A. Ryadovskiy. "Modern means of committing computer crimes and patterns of their execution." Lex Russica, no. 3 (April 5, 2019): 87–99. http://dx.doi.org/10.17803/1729-5920.2019.148.3.087-099.

Full text
Abstract:
The paper notes that the integration of modern information technologies in all spheres of human activity has led to the informatization and computerization of crime, when it is possible to commit almost any crime by means of computer tools and systems. There is a commonality of some elements of the mechanism of computer crimes, including information about the methods of these crimes.Means of committing computer crimes are considered from the standpoint of a new private theory of information and computer support of forensic activities, the subject of which are the laws of occurrence, movement,
APA, Harvard, Vancouver, ISO, and other styles
5

Futra, Yumelfi. "TINJAUAN PERISTIWA CYBER CRIME YANG TERJADI PADA TAHUN 2019 DI KOTA SAWAHLUNTO." UNES Law Review 3, no. 1 (2020): 55–68. http://dx.doi.org/10.31933/unesrev.v3i1.145.

Full text
Abstract:
Cyber ​​Crimeis a form of virtual crime by utilizing computer which connected to the internet network, and exploiting other devices or computers that is connected to the internet. Cybercrime was previously regulated in the regulation Number 36 Year 1999 concerning Telecommunications, however this regulation has not been able to accommodate virtual and computer crimes. To anticipate the development of information technology, regulation Number 19 Year 2016 concerning Amendments to regulation Number 11 of 2008 concerning Electronic Information and Transactions was issued. In Sawahlunto City in 20
APA, Harvard, Vancouver, ISO, and other styles
6

Rostami, Soraya. "Juridical Study of Crimes Committed with Computer." Asian Social Science 12, no. 11 (2016): 79. http://dx.doi.org/10.5539/ass.v12n11p79.

Full text
Abstract:
<p class="a">By development of computer networks, computer -related crime spreading immoral that had negative impact on social systems including families and organizations and, more children were invaded by, the spread of computer crimes in the third world called cultural invasion.</p><p class="a">Committing dishonest acts in ignorance or belief that the right to intervene in the operation of computer systems or data entry, or data deletion, or the messages. those committed acts does not categorize in fraud documentary, if the aforementioned act intended to endamage business
APA, Harvard, Vancouver, ISO, and other styles
7

Klebanov, Lev R., and Svetlana V. Polubinskaya. "COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM." RUDN Journal of Law 24, no. 3 (2020): 717–34. http://dx.doi.org/10.22363/2313-2337-2020-24-3-717-734.

Full text
Abstract:
The article discusses the problems that arise in connection with the crimes against state and public security committed by use of computer and network technologies. This topic is becoming relevant because some states have already experienced the effects of combat computer viruses, which can be regarded as waging war using cyber weapons. The most famous example is the attack by the Stuxnet computer virus on an Iranian uranium enrichment plant. The virus was created specifically to disable industrial control systems. The use of unmanned ground and air vehicles to carry out terrorist acts is of p
APA, Harvard, Vancouver, ISO, and other styles
8

Tkalichenko, Sergiy, Valentyna Khotskina, Zhanna Tsymbal, Victoria Solovieva, and Olena Burunova. "Modern Structural Level and Dynamics of Crimes with The Use of Computers, Automation Systems, Computer Networks and Electric Connection Systems." SHS Web of Conferences 100 (2021): 01014. http://dx.doi.org/10.1051/shsconf/202110001014.

Full text
Abstract:
Actuality of surveillance the cyber-criminality problem and its impact upon a society is proved out by the rapid increase in a quantity of such crimes and material losses accordingly. The statistical analysis of their number increases and the caused losses is made in the process of cybercrimes studying. It’s revealed that besides the catastrophic number growth of such crimes, the relative size of losses is increased too. The analysis of the actual data for the nine years is made, on which basis the indicators’ table of the cyber-attacks number, the general losses and the indexes of their dynam
APA, Harvard, Vancouver, ISO, and other styles
9

Ovalle Lizcano, Tatiana Valentina, Diego Luis Coronel Peñuela, Rocío de Belén Contreras Manrique, and Alfonso Cabrera Reyes. "Impact on personal security against the regulation of cybercrime at the University of Pamplona, Villa del Rosario headquarters." Respuestas 24, no. 3 (2019): 14–25. http://dx.doi.org/10.22463/0122820x.1845.

Full text
Abstract:
Computer crime and its evolution in Colombia, is relevant, the computer crimes described in Law 1273 of January 5, 2009 on the protection of information and data. Therefore, in the political constitution, article 15. All persons have the right to their personal and family privacy and their good name, and the State must respect them and enforce them, also, they have the right to know, update and rectify the information that they have been collected on them in databases and in archives of public and private entities. For this reason, cybercriminals, have specialized mainly in theft through compu
APA, Harvard, Vancouver, ISO, and other styles
10

Tariq, Haseeb, Muhammad Kashif Hanif, Muhammad Umer Sarwar, Sabeen Bari, Muhammad Shahzad Sarfraz, and Rozita Jamili Oskouei. "Employing Deep Learning and Time Series Analysis to Tackle the Accuracy and Robustness of the Forecasting Problem." Security and Communication Networks 2021 (March 31, 2021): 1–10. http://dx.doi.org/10.1155/2021/5587511.

Full text
Abstract:
Crime is a bone of contention that can create a societal disturbance. Crime forecasting using time series is an efficient statistical tool for predicting rates of crime in many countries around the world. Crime data can be useful to determine the efficacy of crime prevention steps and the safety of cities and societies. However, it is a difficult task to predict the crime accurately because the number of crimes is increasing day by day. The objective of this study is to apply time series to predict the crime rate to facilitate practical crime prevention solutions. Machine learning can play an
APA, Harvard, Vancouver, ISO, and other styles
11

Ambika, Dr T., and Dr K. Senthilvel. "Cyber Crimes against the State: A Study on Cyber Terrorism in India." Webology 17, no. 2 (2020): 65–72. http://dx.doi.org/10.14704/web/v17i2/web17016.

Full text
Abstract:
The computer and network are utilized each and every aspect of humans wherein the internet gives equal opportunities for every aspect of human development. As the client of the internet becomes progressively differing and the scope of online communication extends, there is development in the digital violations for example break of online agreements, execution of online torts and violations, and so forth. The development of computer technology has many times proved that individuals and some groups in the country are using computer technology to threaten international governments and citizens of
APA, Harvard, Vancouver, ISO, and other styles
12

Riadi, Imam, Sunardi Sunardi, and Muhamad Ermansyah Rauli. "Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics." Jurnal Teknik Elektro 10, no. 1 (2018): 18–22. http://dx.doi.org/10.15294/jte.v10i1.14070.

Full text
Abstract:
Rapid development of computer technology is also accompanied with increasing of cybercrime. One of the most common crimes is fraud case in the online shop. This crime abuses Whatapps, one of the most popular Instant Messenger (IM) applications. WhatsApp is one of the IM applications that can be used on computers, especially on windows 8.1 operating system. All applications running on the computer leave data and information on Random Access Memory (RAM). The data and information that exist in RAM can be obtained using digital forensic technique calledLive Forensics. Live forensics can be used w
APA, Harvard, Vancouver, ISO, and other styles
13

Padirayon, Lourdes M., Melvin S. Atayan, Jose Sherief Panelo, and Carlito R. Fagela, Jr. "Mining the crime data using naïve Bayes model." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 1084. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1084-1092.

Full text
Abstract:
<p>A massive number of documents on crime has been handled by police departments worldwide and today's criminals are becoming technologically elegant. One obstacle faced by law enforcement is the complexity of processing voluminous crime data. Approximately 439 crimes have been registered in sanchez mira municipality in the past seven years. Police officers have no clear view as to the pattern crimes in the municipality, peak hours, months of the commission and the location where the crimes are concentrated. The naïve Bayes modelis a classification algorithm using the Rapid miner auto mo
APA, Harvard, Vancouver, ISO, and other styles
14

Hu, Jing Fang, and Bu Sheng Li. "Research the Computer Forensics Based on Network." Advanced Materials Research 694-697 (May 2013): 2282–85. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2282.

Full text
Abstract:
With the development of network technology, computer crimes occur from time to time. As a mean of active defense in network security aspect, network forensics have been widely studied and used. This thesis detailed introduces some network forensics techniques and methods, advances and analyzes how to design the network forensics system based on the techniques of intrusion tolerance, network monitor and so on.
APA, Harvard, Vancouver, ISO, and other styles
15

Martínez-Mascorro, Guillermo A., José R. Abreu-Pederzini, José C. Ortiz-Bayliss, Angel Garcia-Collantes, and Hugo Terashima-Marín. "Criminal Intention Detection at Early Stages of Shoplifting Cases by Using 3D Convolutional Neural Networks." Computation 9, no. 2 (2021): 24. http://dx.doi.org/10.3390/computation9020024.

Full text
Abstract:
Crime generates significant losses, both human and economic. Every year, billions of dollars are lost due to attacks, crimes, and scams. Surveillance video camera networks generate vast amounts of data, and the surveillance staff cannot process all the information in real-time. Human sight has critical limitations. Among those limitations, visual focus is one of the most critical when dealing with surveillance. For example, in a surveillance room, a crime can occur in a different screen segment or on a distinct monitor, and the surveillance staff may overlook it. Our proposal focuses on shopli
APA, Harvard, Vancouver, ISO, and other styles
16

Kirilenko, Viktor, and Georgy Alekseev. "The Harmonization of Russian Criminal Legislation on Counteracting Cybercrime with the Legal Standards of the Council of Europe." Russian Journal of Criminology 14, no. 6 (2020): 898–913. http://dx.doi.org/10.17150/2500-4255.2020.14(6).898-913.

Full text
Abstract:
Crimes that happen in the virtual environment created by digital technologies inflict considerable economic damage. Mercenary motives of criminals in the information society are giving rise to increasingly more and more sophisticated methods of abusing the trust of computer networks’ users. The harmonization of Russian legislation on counteracting cybercrimes with the legal standards of the Council of Europe is inevitable due to the trans-border character of crimes committed using information and telecommunication technologies, and to their high public danger. The methodology of researching cy
APA, Harvard, Vancouver, ISO, and other styles
17

Ku, Chih-Hao, and Gondy Leroy. "A crime reports analysis system to identify related crimes." Journal of the American Society for Information Science and Technology 62, no. 8 (2011): 1533–47. http://dx.doi.org/10.1002/asi.21552.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Arkhipova, E. A., and V. N. Dodonov. "International Legal Problems of Cooperation in the Detection, Investigation and Prevention of Crimes Committed Using Information and Telecommunication Networks and in the Field of Computer Information." Moscow Journal of International Law, no. 2 (November 19, 2020): 77–87. http://dx.doi.org/10.24833/0869-0049-2020-2-77-87.

Full text
Abstract:
INTRODUCTION. Based on the analysis of international acts, as well as the practice of their application, the authors consider the international legal problems of interaction in the detection, investigation and prevention of crimes committed using information and telecommunication networks and in the field of computer information.MATERIALS AND METHODS. The materials for the study include the Agreement on cooperation of the CIS member States in the fight against crimes in the field of computer information of June 1, 2001, the Agreement on cooperation of the CIS member States in the fight against
APA, Harvard, Vancouver, ISO, and other styles
19

Plotnikova, T. V., and O. V. Kotelnikova. "The Phenomenon of Cybercrime in the 21st Century." Pravo: istoriya i sovremennost', no. 3(12) (2020): 141–50. http://dx.doi.org/10.17277/pravo.2020.03.pp.141-150.

Full text
Abstract:
The spread and development of the “Internet” has erased the boundaries of communication and the dissemination of information. With the massive spread of computers, the world community is faced with such phenomena as illegal activities using a computer (and / or against computers), as well as this activity through the Internet. Many scientists and experts distinguish between cybercrime as a legal category and as a social phenomenon. The first is characterized by a specific unlawful act using a computer, computer network or the Internet. The qualification of these acts within the framework of cy
APA, Harvard, Vancouver, ISO, and other styles
20

Kotwal, Shallu, and Jatinder Manhas. "Investigation of Different Constraints in Cybercrime & Digital Forensics." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 222. http://dx.doi.org/10.23956/ijarcsse/v7i7/0209.

Full text
Abstract:
With rapid changes in technology and its increased use in different organizations, the cybercrime and digital forensics methods are also making advancement in new ways to tackle the latest trends in cyber crime. Cybercrime refers to any crime that involves a computer network or any public or private system. Cyber crime is emerging as a serious threat worldwide. The government organizations, police departments and various intelligence units of different countries have started to act accordingly. To control and investigate cybercrime, the investigators use various Digital forensics methods and m
APA, Harvard, Vancouver, ISO, and other styles
21

Gonov, Shamil Khasanovich, and Anton Vladimirovich Milovanov. "Topical questions of crime prevention in the Darknet." Полицейская и следственная деятельность, no. 1 (January 2021): 26–34. http://dx.doi.org/10.25136/2409-7810.2021.1.34560.

Full text
Abstract:
The article considers the topical issue of a significant growth of crimes in the field of information technologies most of which are committed in the dark and hidden web. The research object is social relations in the sphere of Internet crime prevention. The research subject is the methods and mechanisms of crimes using information systems, and the technologies of information safety provision and deanonymization. The main task of the research is to develop the scientifically-grounded ideas aimed at the enhancement of the technique of analysis and assessment of crimes committed via information
APA, Harvard, Vancouver, ISO, and other styles
22

Solovyev, V. S., and M. N. Urda. "Importance of the Internet in Illegal Migration and Migration Crimes Determination." Actual Problems of Russian Law 1, no. 12 (2020): 114–22. http://dx.doi.org/10.17803/1994-1471.2019.109.12.114-122.

Full text
Abstract:
The purpose of the paper is to identify the correlation between illegal migration, migration crimes and the use of the Internet resources. The content analysis of advertising sites, social networks in combination with other research methods has revealed that in the virtual space there is both active promotion of services facilitating illegal migration and a wide demand for them. Based on the results of the study, the authors develop the following proposals for improving measures to combat illegal migration in the global network. 1. A strategic direction for countering illegal migration should
APA, Harvard, Vancouver, ISO, and other styles
23

PANDELICĂ, Ioana-Lucia. "The Phenomenon of Cyber Crime." International Journal of Information Security and Cybercrime 9, no. 1 (2020): 29–36. http://dx.doi.org/10.19107/ijisc.2020.01.04.

Full text
Abstract:
With the rapid growth of computer and network systems in recent years, there has also been a corresponding increase in cyber-crime. Cyber crime takes many forms and has garnered much attention in the media, making information security a more urgent and important priority. With the advances in information technology (IT) criminals are using cyberspace to commit numerous cyber crimes. Cyber infrastructures are highly vulnerable to intrusions and other threats. Physical devices and human intervention are not sufficient for monitoring and protection of these infrastructures.
APA, Harvard, Vancouver, ISO, and other styles
24

Dronova, Olga Borisovna, Aleksey Aleksandrovich Kurin, Anna Pavlovna Alekseeva, Dmitriy Nikolaevich Sidorenko, and Svetlana Dmitrievna Guseva. "Information and analytical support for the detection and investigation of crimes." SHS Web of Conferences 108 (2021): 04010. http://dx.doi.org/10.1051/shsconf/202110804010.

Full text
Abstract:
The effectiveness of law enforcement agencies is constantly monitored by the public, and its indicator is the safety of citizens, the ability to exercise their rights and freedoms. One of the strategic resources of the life of modern society is various information. Computer networks, geographical information systems, means of tactical forecasting of crimes, numerous integrated databases are already widely applied in the activities of the law enforcement agencies. Despite this, the main information resource for forensic purposes represented by the information arrays of the forensic registration
APA, Harvard, Vancouver, ISO, and other styles
25

Lydia Jane G. and Seetha Hari. "Crime Prediction Using Twitter Data." International Journal of e-Collaboration 17, no. 3 (2021): 62–74. http://dx.doi.org/10.4018/ijec.2021070104.

Full text
Abstract:
As social media platforms are being increasingly used across the world, there are many prospects to using the data for prediction and analysis. In the Twitter platform, there are discussions about any events, passions, and many more topics. All these discussions are publicly available. This makes Twitter the ultimate source to use the data as an augmentation for the decision support systems. In this paper, the use of GPS tagged tweets for crime prediction is researched. The Twitter data is collected from Chicago and cleaned, and topic modelling is applied to the resultant set. Before topic mod
APA, Harvard, Vancouver, ISO, and other styles
26

Samoilenko, Olena, and Kateryna Titunina. "Internet fraud: technologies of performance, ways of counteraction and prevention." ScienceRise: Juridical Science, no. 2(16) (June 30, 2021): 65–70. http://dx.doi.org/10.15587/2523-4153.2021.235769.

Full text
Abstract:
The article proves that the separation of technologies for committing fraud on the Internet allows you to determine the causal complexes. As a result, it is possible to effectively influence the prevention and counteraction of the corresponding type of crime. The author concludes that it is necessary to introduce into the practice of law enforcement and other government agencies effective tools for preventing and combating Internet fraud. He sees such a tool as outreach activities and modes of action that will block the determinants of criminal behavior in cyberspace. In order to concretize th
APA, Harvard, Vancouver, ISO, and other styles
27

Zahoor, Rashida, and Naseem Razi. "Cyber-Crimes and Cyber Laws of Pakistan: An Overview." Progressive Research Journal of Arts & Humanities (PRJAH) 2, no. 2 (2020): 133–43. http://dx.doi.org/10.51872/prjah.vol2.iss2.43.

Full text
Abstract:
Communications have become the most essential and quite an easy as well as fast because of technology advancement. Developing states are also getting the same blessings of computer networks and internet like the developed nations of the world. Besides, such the blessings and curses take place on account of communications in the modern technology. Cyberspace - is the medium of communication on computer networking that is not safe. Criminals use such the technology to commit crimes on cyberspace. Meanwhile the sensitive data and information are hacked to injure the person, organization, society
APA, Harvard, Vancouver, ISO, and other styles
28

Malov, Aleksandr A. "INTERNATIONAL LAW STANDARDS FOR OBTAINING OF ELECTRONIC EVIDENCE FROM FOREIGN JURISDICTIONS." International criminal law and international justice 1 (January 14, 2021): 19–23. http://dx.doi.org/10.18572/2071-1190-2021-1-19-23.

Full text
Abstract:
The article discusses the features of the interaction of the competent criminal prosecution authorities with foreign jurisdictions and international legal standards for the execution of letter of request in order to obtain electronic evidence, as well as international initiatives and agreements aimed at combating crimes using computer networks.
APA, Harvard, Vancouver, ISO, and other styles
29

Gerasimenko, N. I. "Specifics of using the Internet in the investigation of extremist crimes." Penitentiary Science 14, no. 3 (2020): 388–93. http://dx.doi.org/10.46741/2686-9764-2020-14-3-388-393.

Full text
Abstract:
A fairly large number of criminal acts can be attributed to crimes of an extremist nature, but not all of them can be committed via the Internet. This type of crime has a number of characteristic features that must be established at the initial and subsequent stages of the investigation: 1) the situation in which the crimes were committed, including place and time. A feature of the place is the possibility of committing a crime by a person located anywhere in the world where there is Internet access. The specifics of time include the fact that a crime can be committed for a long time – from th
APA, Harvard, Vancouver, ISO, and other styles
30

Kagawa, Takuhiro, Sachio Saiki, and Masahide Nakamura. "Analyzing street crimes in Kobe city using PRISM." International Journal of Web Information Systems 15, no. 2 (2019): 183–200. http://dx.doi.org/10.1108/ijwis-04-2018-0032.

Full text
Abstract:
Purpose In a previous research, the authors proposed a security information service, called Personalized Real-time Information with Security Map (PRISM), which personalizes the incident information based on living area of individual users. The purpose of this paper is to extend PRISM to conduct sophisticated analysis of street crimes. The extended features enable to look back on past incident information and perform statistical analysis. Design/methodology/approach To analyze street crimes around living area in more detail, the authors add three new features to PRISM: showing a past heat map,
APA, Harvard, Vancouver, ISO, and other styles
31

Putri, M.Kom, Anggia Dasa. "SISTEM PAKAR MENDETEKSI TINDAK PIDANA CYBERCRIME MENGGUNAKAN METODE FORWARD CHAINING BERBASIS WEB DI KOTA BATAM." Edik Informatika 3, no. 2 (2017): 197–210. http://dx.doi.org/10.22202/ei.2017.v3i2.2244.

Full text
Abstract:
Advances in information technology provides much convenience for human life, but even this progress simultaneously cause a variety of problems that are not easy to find a way out. One of the problems arising from the development of information technology, namely the birth of crimes that refers to activities undertaken in the virtual world using a computer or computer network technology, known as cybercrime (cybercrime). Crime cybercrime common daily life such Decency, Gambling, humiliation or defamation, extortion or threatening, Spreading false news, Abuse, Hacker, Cracker, falsification of d
APA, Harvard, Vancouver, ISO, and other styles
32

Gilmanov, Eduard, and Danila Kirpichnikov. "On the need to develop a methodology for investigating crimes in the field of digital information circulation." Current Issues of the State and Law, no. 14 (2020): 262–77. http://dx.doi.org/10.20310/2587-9340-2020-4-14-262-277.

Full text
Abstract:
The relevance of the study is due to the transition of the processes of circulating information about the interaction of individuals into information and telecommunication devices, its systems and networks, which causes changes in the structure of crime, determines the emergence of new methods and ways of committing acts prohibited by criminal law. In accordance with the above, changes are also taking place in the sources for displaying trace information about a criminal event, which are used by information and tele-communication devices, its systems and networks with increasing frequency. The
APA, Harvard, Vancouver, ISO, and other styles
33

Borysova, L., P. Bilenchuk, M. Malii, and V. Vynohradova. "EXAMINATION AS A MEANS OF ESTABLISHING THE FACTS AND CIRCUMSTANCES OF COMMISSION OF TRANSNATIONAL COMPUTER CRIMES." Criminalistics and Forensics, no. 65 (May 18, 2020): 230–39. http://dx.doi.org/10.33994/kndise.2020.65.22.

Full text
Abstract:
The article is noted that investigators are not able to track all technological changes in the field of information technology and to study the traces of this type of crime, special attention is paid to the use of examination of computer systems and computer media (order of the Ministry of Justice of Ukraine dated 08.10.98, No. 53/5). During the examination, it is advisable to solve the following problems: – identification, that is the diagnosis of system processes and system behavior; system identification; multivariate analysis and reconstruction of the circumstances of the event place (by m
APA, Harvard, Vancouver, ISO, and other styles
34

Suryadi, Ahmad. "Responsiveness of Criminal Law to Skimming Crimes in The Era of Industrial Revolution 4.0 (Four Point Zero)." Jurnal Hukum Volkgeist 5, no. 2 (2021): 130–42. http://dx.doi.org/10.35326/volkgeist.v5i2.845.

Full text
Abstract:
This study aims to: 1)Analyze and understand the responsiveness of criminal law in entering the era of industrial revolution 4.0 (four point zero), 2)Enforcement of criminal law in cyber crime, criminal acts in cyber crime, criminal responsibility of cyber crime perpetrators. This research is normative-empirical research which is basically a merger between normative legal approach with the addition of empirical elements as the implementation of normative law in its action on every legal event that occurs in society. The results of this study show that cyber crime is a special crime. Cyber Crim
APA, Harvard, Vancouver, ISO, and other styles
35

Olukolu, Rasul Oriyomi. "An Assessment of the Impact of Municipal Laws on the Policing of Cybercrimes in Nigeria." African Journal of Legal Studies 11, no. 2-3 (2018): 234–53. http://dx.doi.org/10.1163/17087384-12340034.

Full text
Abstract:
AbstractInternet crime can be defined as unlawful acts using the computer as either a tool or a target or both. Internet networks are used positively to conduct businesses, manage industrial and governmental activities, engage in personal communications, and conduct research. Also, certain confidential information is stored or passed through the medium of the internet. Credit cards containing information of users are used as the major means of buying and selling on the internet. Information infrastructure has become a critical part of the backbone of global economies; therefore, it is imperati
APA, Harvard, Vancouver, ISO, and other styles
36

Khatun, Most Rokeya, Safial Islam Ayon, Md Rahat Hossain, and Md Jaber Alam. "Data mining technique to analyse and predict crime using crime categories and arrest records." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 1052. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp1052-1060.

Full text
Abstract:
Generally, crimes influence organisations as it starts occurring frequently in society. Because of having many dimensions of crime data, it is difficult to mine the available information using off the shelf or statistical data analysis tools. Improving this process will aid the police as well as crime protection agencies to solve the crime rate in a faster period. Also, criminals can often be identified based on crime data. Data mining includes strategies at the convergence of machine learning and database frameworks. Using this concept, we can extract previously unknown useful information and
APA, Harvard, Vancouver, ISO, and other styles
37

Gribina, E., and E. Savchenko. "UK Revenue Service Best Practices for Fighting Tax Evasion." Auditor 7, no. 6 (2021): 41–45. http://dx.doi.org/10.12737/1998-0701-2021-7-6-41-45.

Full text
Abstract:
Th e authors analyze the UK experience of the tax service, the tools used to combat tax evasion, and some of the trends that have been identifi ed. In particular, the role of specialized computer systems and social networks is noted as one of the main sources for fi nding the necessary information. Attention is also drawn to the tightening of the policy of the tax department and legislation in the fi eld of combating tax crimes.
APA, Harvard, Vancouver, ISO, and other styles
38

Rossinskaya, E. R., and A. I. Semikalenova. "Counterfeit Information and Computer Product as an Object of Forensic Research of Computer Tools and Systems." Lex Russica, no. 8 (August 25, 2020): 86–95. http://dx.doi.org/10.17803/1729-5920.2020.165.8.086-095.

Full text
Abstract:
The paper considers the impact of global digitalization on the detection and investigation of crimes in the field of copyright and related rights violations based on the doctrine of criminalistic research of computer tools and systems, which is part of the private theory of information and computer support for criminalistic activities. It is noted that since the early 2000s, approaches to investigative tactics and forensic research of audio recordings, videos, and software have been considered in isolation from these types of objects. The development of information and computer technologies ha
APA, Harvard, Vancouver, ISO, and other styles
39

Shut, Oksana A. "Fraud in Social Networks and Ways to Implement." Herald of Omsk University. Series: Law 17, no. 4 (2020): 97–106. http://dx.doi.org/10.24147/1990-5173.2020.17(4).97-106.

Full text
Abstract:
Introduction. The relevance of the article is due to the development of legal norms regulating relations in social networks, which has been delayed for years. The outdated regulatory framework does not cope with the regulation of relations in networks. Therefore, it is necessary to implement modern relations of an illegal nature that develop between users in social networks in the norms of the current Criminal Code, as well as to develop a classification of methods of fraud in social networks, and identify their features. Purpose. The purpose is to consider the features of legal regulation of
APA, Harvard, Vancouver, ISO, and other styles
40

Baird, Lindsay. "The Detection of Crimes and Errors and Omissions." EDPACS 29, no. 3 (2001): 1–8. http://dx.doi.org/10.1201/1079/43274.29.3.20010901/31729.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Volinsky, Alexander Fomich, and Vladimir Antonovich Prorvich. "Features of Formation of Integrated Legal Foundation for Electronic Litigation on Crimesin the Sphere of Eco." Russian Journal of Legal Studies 6, no. 1 (2019): 149–58. http://dx.doi.org/10.17816/rjls18487.

Full text
Abstract:
The development of the information society, various branches of the digital economy and new manifestations of crime put on the agenda the creation of an electronic litigation system with the use of modern information technologies to improve the quality documents in the courts. The relevant policy documents set out tasks and improve the quality of various types of legal proceedings, including the creation of electronic justice using artificial intelligence computer robots based on neural network algorithms. At the same time there is a high level of risks of introduction of fundamentally differe
APA, Harvard, Vancouver, ISO, and other styles
42

SONG, RONGGONG, LARRY KORBA, GEORGE YEE, and YING-CHIEH CHEN. "PROTECT VIRTUAL PROPERTY IN ONLINE GAMING SYSTEM." International Journal of Software Engineering and Knowledge Engineering 17, no. 04 (2007): 483–96. http://dx.doi.org/10.1142/s0218194007003367.

Full text
Abstract:
Massively multiplayer role-playing gaming (MMORPG) has become a very popular entertainment in Asia. Along with the success of the massively multiplayer role-playing gaming industry in Asia, online gaming-related crimes have grown at an amazing rate. Most of the criminal cases are related to virtual properties since markets have developed for the virtual properties giving them real world values. There has been little research and resulting technologies for MMORPG virtual property protection. In order to reduce the crimes and protect online gaming systems, one potential solution is protecting th
APA, Harvard, Vancouver, ISO, and other styles
43

Stevanovic, Ivana. "Criminal acts related to the exploitation of child pornography through abuse of computer systems and networks: International and domestic criminal legislation framework." Temida 12, no. 3 (2009): 27–41. http://dx.doi.org/10.2298/tem0903027s.

Full text
Abstract:
The paper points out the importance of newly adopted international norms and standards that State Parties should undertake to aim a more adequate protection of children from sexual exploitation especially a pornography exploitation. A specific section of this paper is dedicated to the overview of the domestic criminal legislation framework regarding the protection of children victims of crimes related to their exploitation in pornography through abuse of computer systems and networks, and considering the recent changes in the criminal legislation in the Republic of Serbia. In this paper the au
APA, Harvard, Vancouver, ISO, and other styles
44

Maimon, D., A. Kamerdze, M. Cukier, and B. Sobesto. "Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network: An Application of the Routine-Activities and Lifestyle Perspective." British Journal of Criminology 53, no. 2 (2013): 319–43. http://dx.doi.org/10.1093/bjc/azs067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Stéphano Rufino Belezzi, Hugo. "AS NOVAS MODALIDADES DE CRIMES CIBERNÉTICOS: O CYBERBULLYING, VINGANÇA PORNOGRÁFICA E A INTERNET PROFUNDA (DEEP WEB)." Colloquium Socialis 2, Especial 2 (2018): 154–61. http://dx.doi.org/10.5747/cs.2018.v02.nesp2.s0271.

Full text
Abstract:
This article will address the new modalities of cyberbullying such as cyberbullying, pornographic revenge and the deep internet known as the deep web, bringing its concepts and definitions to the present legal order, infraconstitutional legislation that deals with cyber crimes together with these new types, bringing insertions and changes in the legislation in force, the most common types of crimes currently committed by the Internet in reference to a considerable growth of cases of this type, where the need to establish a more adequate legislation will be taken into account. specific and appl
APA, Harvard, Vancouver, ISO, and other styles
46

Ефремов, Андрей, and Andrey Efremov. "THE DEVELOPMENT OF THE USA LEGISLATION ON THE FIGHT AGAINST TERRORISM AFTER 11 SEPTEMBER 2001." Journal of Foreign Legislation and Comparative Law 3, no. 3 (2017): 86–92. http://dx.doi.org/10.12737/article_593fc343c391e2.71878517.

Full text
Abstract:
The article is devoted to development of the USA legislation on the fight against terrorism. The author considered the objectives and tasks of the state in a particular historical period; analyzed the laws passed by the USA Congress aimed at combating home and international terrorism; identifies the main directions of the state policy of the USA in the field of counter-terrorism. The article covers the events after 11 September 2001 to the present. The author gives a brief overview of the events of 11 September 2001, discusses the Patriot Act and other laws, aimed at combating terrorism. The P
APA, Harvard, Vancouver, ISO, and other styles
47

Wahyono, Irawan Dwi, Djoko Saryono, Khoirudin Asfani, Muhammad Ashar, and Sunarti Sunarti. "Smart Online Courses Using Computational Intelligence." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 12 (2020): 29. http://dx.doi.org/10.3991/ijim.v14i12.15601.

Full text
Abstract:
Computer network security has become an important issue in recent decades, the government and several international organizations have invested in professional education and training for computer network security. In addition, with the increasing incidence of computer network security crimes, the government and several organizations have taken precautions by providing training to students about computer network security. Some parties develop learning models that are suitable for students and find appropriate learning methods to produce professionals in the field of computer network security th
APA, Harvard, Vancouver, ISO, and other styles
48

Dumchykov, M. "THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS." Criminalistics and Forensics, no. 65 (May 18, 2020): 100–108. http://dx.doi.org/10.33994/kndise.2020.65.10.

Full text
Abstract:
The article deals with some aspects of digitalization of forensic activity, such as improving the efficiency of search and cognitive activity of an investigator using digital technologies, and effective organization of such activity. Use of computer hardware, software, various computer and digital technologies and scripting to investigate crimes. The definitions of “digital trace” and “virtual trace” demonstrate the complexity of these issues. Certain dynamic movement of criminal activity in the information environment is analyzed. Defines the concept of virtual trace as a specific trace of ce
APA, Harvard, Vancouver, ISO, and other styles
49

Nurdin, Rizki. "ANALISA KEAMANAN INTERNET MENGGUNAKAN NESSUS DAN ETHEREAL UNIVERSITAS PUTRA INDONESIA “YPTK” PADANG." Jurnal Teknologi Informasi dan Pendidikan 10, no. 3 (2018): 11–25. http://dx.doi.org/10.24036/tip.v10i3.9.

Full text
Abstract:
With the existence of this information will be easily obtained, the exchange of data that occurs in the virtual world will increase. In addition to the development of this technology, unwittingly evolved also crimes that occur in cyberspace that can harm users who access these sites, ranging from the delivery of viruses, spamming or other types of crime. So that institutions connected in an Internet network will be very vulnerable to network security at the institution. This is given that the productivity of an institution or company will depend on the performance of the network in it. Damage
APA, Harvard, Vancouver, ISO, and other styles
50

Salhi, Dhai Eddine, Abdelkamel Tari, and Mohand Tahar Kechadi. "Email Classification for Forensic Analysis by Information Gain Technique." International Journal of Software Science and Computational Intelligence 13, no. 4 (2021): 40–53. http://dx.doi.org/10.4018/ijssci.2021100103.

Full text
Abstract:
One of the most interesting fields nowadays is forensics. This field is based on the works of scientists who study evidence to help the police solve crimes. In the domain of computer science, the crimes within computer forensics are usually network attacks, and most attacks are over the email (the case of this study). Email has become a daily means of communication which is mainly accessible via internet. People receive thousands of emails in their inboxes and mail servers (in which people can find emails in those lists). The aim of this study is to secure email users by building an automatic
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!