Abstract

Today, crime in the cyberspace has been declared a global international problem, as evidenced by international agreements that provide for joint steps to combat this high-tech and technical phenomenon, as well as the actual use of cyberespionage and cyberterrorism methods by various countries. At the same time, the danger from criminal offenses committed in cyberspace is also recognized by law enforcement agencies of various countries of the world. Currently, crime in cyberspace is one of the main threats to the national security and defense of Ukraine. The past year became a certain catalyst for the development of new tactical-oriented methods of combating criminal offenses in cyberspace, both within the framework of public relations in the fieldof national security and in other areas, in particular, the safe functioning of digital devices.Carrying out the correct typology of criminal offenses committed in cyberspace is of great importance in the correct investigation of this type of criminal offences, and the development of the correct methodology for collecting the evidence base.In our scientific work, we investigated several grounds for the typology of criminal offenses in cyberspace, in particular: 1) Convention «On Cybercrime»; 2) forensic significance of elements of information and telecommunication technologies; 3) by the methods of committing this type of socially dangerous acts; 4) qualifications of subjects who commit criminal offenses in cyberspace; 5) according to the objects of criminal encroachment.It is emphasized that the study of criminal offenses committed in cyberspace in terms of their criminological understanding should have a complex nature and should be considered from different angles.It has been established that in the course of typological research of socially dangerous acts committed in cyberspace, one cannot be limited to the distribution of criminalistic typology on only one basis, the essence of the matter obliges to build typological systems based on all possible real signs.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call