Abstract

The purpose of the article is to analyze the technical and legal components of the problem of cybercrime, as well as an overview of informatization and legal regulation of information relations, this is a topical issue because digital technologies have confidently entered modern life, and, unfortunately, have become tools for crimes such as terrorism, espionage, fraud, theft, child pornography, etc. The research methods are methods of analysis of legal relations in the field of information and computer technologies, classification of cybercrimes and the impact of digital dishonesty on society both from a moral and from a legal or economic point of view. The novelty of the study is the disclosure of the essence of the criminal violation of the functioning of information systems, and the technical and technological side of the crime. The consequences of such crimes can be quite tragic, even though the way they are committed differs significantly from traditional terrorist acts or man-made disasters. Given these factors, the perpetration and analysis of cybercrime is a pressing and important issue today, and given the rapid development of digital technology, new methods of committing crimes are emerging, and therefore there is a need to develop and analyze modern approaches to their prevention. Conclusions. An important difference between computer crimes is, so to speak, the absence of traditional signs of a crime, such as fingerprints, physical evidence, and so on. The specificity of computer crimes is also the phenomenon of computer encroachment tools. Unlike traditional methods of crime (weapons, knives, etc.), the tools of computer crime are various software tools for computer intervention.

Highlights

  • Метою статті є аналіз технічної та правової складової проблеми комп’ютерної злочинності, а також огляд питань інформатизації та правового регулювання інформаційних відносин

  • this is a topical issue because digital technologies have confidently entered modern life

  • The novelty of the study is the disclosure of the essence of the criminal violation

Read more

Summary

СПИСОК ПОСИЛАНЬ

Особливості кваліфікації злочинів у сфері використання ЕОМ (комп’ютерів), систем та комп’ютерних мереж і мереж електрозв’язку. Злочини у сфері комп’ютерної інформації: способи скоєння та засоби захисту. Доступно: [Дата звернення 28 березня 2020]. [online] Доступно: [Дата звернення 29 березня 2020].

STATUS AND CONSEQUENCES OF COMPUTER CRIME
Conclusions
СОСТОЯНИЕ И ПОСЛЕДСТВИЯ КОМПЬЮТЕРНОЙ ПРЕСТУПНОСТИ
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call