Abstract

It should be noted that some types of plundering can damage not only property, but also other social relations protected by criminal law, that is, such crimes affect several social relations at once. In criminal law, crimes of this type are called crimes of a complex nature if the damage is caused to more than one object as a result of the commission of a socially dangerous act.
 The crime of looting other people's property by means of computers is also a crime of a complex nature, ie not only property relations, but also social relations in the field of information technology, and in some cases social relations in the field of public administration. will also be damaged.
 As a rule, in complex crimes, the object is qualified depending on the main direct object, if the objects affected are two or more social relations protected by criminal law.
 In robberies of other people's property using computer tools in most cases, the object of the crime is not in the direct possession of the victim, ie non-cash money is usually kept in a special institution (bank) or device (plastic card) where the money is stored and authorized to carry out certain operations.
 Generally, the property of another is defined as property that is not in the possession or legal possession of the offender. However, such an interpretation does not apply to the crime of misappropriation or robbery of another's property by means of computers, as the subject of the crime uses special powers in relation to the subject of the robbery, ie abuses the trust of the owner and the perpetrator robs him.
 The fact that special powers in relation to property are the main special feature of the crime of embezzlement or plundering is determined by the disposition of the property in the disposition of the criminal law.
 However, non-cash money in a specific account entrusted or pledged to the defendant or at the disposal of the defendant shall not constitute the subject of misappropriation or misappropriation by computer means.
 In this case, the actions of the offender are qualified by the relevant articles of the Special Part of the Criminal Code, which provide for liability for crimes against justice, and are not qualified as a set of crimes under the articles of liability for robbery.

Highlights

  • Global cybercrime is becoming increasingly trouble by taking more than 200,000 casualties, causing nearly 500 billion www.psychologyandeducation.net property damage to individuals and businesses as a result of these crimes, and by Juniper Research in 2016, the loss from computer fraud by 2019 is about 2.1 trillion US dollars, the crime rates by 10-15% each month indicate that the fight against these crimes is internationally recognized

  • The act deserving a criminal punishment - the analysis of the content of the crime begins with the identification of the object of the crime. ―Object‖ is derived from the Latin word ―objicio‖, which means ―against‖ [1; p. 130], and the object of the crime represents the social relations associated with values, wealth, protected by criminal law in itself [2; 356 -b.]

  • It is expedient to distinguish the following special features of non-cash money in the form of computer information accepted as a subject of crime of looting other's property by means of computers: 1) computer information as a subject of crime is personal property in electronic form; 2) information that has been subjected to criminal aggression - as a subject of the crime of robbery does not have a sign of materiality; 3) computer information affected by the offender is protected by a number of other laws (―On informatization", "On legal protection of computer programs and databases", "On telecommunications", "On electronic payments", etc.).; 4) this information is stored on information carriers, computers, as well as computer systems or networks

Read more

Summary

Introduction

Global cybercrime is becoming increasingly trouble by taking more than 200,000 casualties, causing nearly 500 billion www.psychologyandeducation.net property damage to individuals and businesses as a result of these crimes, and by Juniper Research in 2016, the loss from computer fraud by 2019 is about 2.1 trillion US dollars, the crime rates by 10-15% each. Using a computer technologies in our country to spoil others' property or embezzlements (in accordance with «g» part of 3 chart of article), by 10.5% in 20102016; Theft (robbery) by using these devices (in accordance with «v» part of the second www.psychologyandeducation.net chart of article) by 20.6%, unauthorized entering the computer system and made theft (in accordance with «b» part of the third chart of article) by 16% increased The majority of these cases are unchangeable, so that it is impossible to restore the violated property rights of individuals due to the large number of damages inflicted on legal entities and individuals. This dissertation research will serve to a certain extent for the fulfillment of tasks mentioned in Criminal code of the Republic of Uzbekistan (1994) and laws of the Republic of Uzbekistan «On prevention of offenses» (2014), «On internal affair bodies» (2016), Presidential Decree «On measures to further improve the system of crime prevention and combating crime» (2017), the Decree of the President of the Republic of Uzbekistan on the «On the Strategy for Further Development of the Republic of Uzbekistan» (2017) and other legislative acts

Discussion and Results
Conclusion
To consider as a computer fraud committed by deception
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.