Abstract

The article is devoted to the study of the mechanism of embezzlement of someone else's property, which is carried out using information technologies in the context of current legislation. The methodological basis was a systematic approach to the study of the mechanism of criminal offenses related to the theft of other people's property and the influence of information technologies. The main role was played by general scientific methods, historical, logical, comparative, generalization and classification, analysis and synthesis, deduction and induction. The following private research methods were used: comparative legal, formal legal, legal modeling. The object of the article is the relations arising in connection with theft in the field of information technologies as one of the most popular types of cybercrime. It is noted that criminal wrongdoing in cyberspace is a very specific category that is constantly evolving along with technological progress. Criminal offenses related to embezzlement of someone else's property using information and communication technologies - fraud, theft, embezzlement and embezzlement - were analyzed. It is noted that the mechanism of the crime as a whole system of circumstances, processes, factors that cause the emergence of carriers of information about the event of a criminal offense, its participants, provides the possibility of planning an investigation, searching for consequences, contributes to the criminal-legal qualification of the offender, acts as an object of forensic knowledge. It is emphasized that the scattering mechanism with the use of information technologies determines the appearance of traces. The mechanism of the criminal offense indicates the nature, essence and content of the functional side of the criminal activity, the regularities of the processes of interaction of the participants of the criminal event with each other and with the surrounding material environment, the regularities that cause the emergence of sources of forensically significant information about the crime and its participants. Further research should be directed to the study of the influence of certain information technologies on the theft of other people's property.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call