Abstract

The article is devoted to comparative legal research of cybercrime as a threat to the national security of the Baltic States and Ukraine. The purpose of the scientific article is to study the systems of criminal legislation in the part of cybercrime in the Baltic States and Ukraine, to determine the public danger of cybercrime, as well as to study ways of countering this criminal category. The object of research is cybercrime as a criminal and legal category. The subject of the study is the peculiarities of combating cybercrimes in the Baltic States and Ukraine, and carrying out a comparative analysis of their criminal legislation. The authors analyze the essence of the concept of cybercrime and identify the main types of cybercrime that are committed most often. Thus, in this article, "cybercrime" means any crime committed with the help of information technologies or in the information space. Special attention is focused on cybercrime in the Baltic States, in particular Latvia, Lithuania, and Estonia. The main types of cybercrimes, the responsibility for the commission of which is provided for by Chapter XVII of the Criminal Code of Ukraine, are described. The Convention on Cybercrime was considered, and it was determined which norms should be implemented in the legislation of the Baltic countries and Ukraine. It was determined that the issue of countering cybercrime in the Baltic States. The main threats, prevention, and countermeasures against cybercrimes in the Baltic States and Ukraine and the main features of international and legal cooperation with cybercrimes within the framework of the European Union are outlined. It was concluded that in order to combat crimes committed with the use of modern information technologies in Ukraine, it is necessary to constantly increase the security of information systems, develop modern information technologies, improve legislation in the field of information crimes, develop competitive means of informatization, expand international cooperation in the field of safe use of information resources.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.