Аннотация и ключевые слова
Аннотация (русский):
Objective: is to determine specific features of modern cybercrime, to develop conceptual framework, to specify new forms of cybercrime and to define the main directions in combating cybercrime. Methods: was based on dialectical, comparative legal, sociological, system-structural and statistical methods, as well as on social experiment. Results: The study highlighted two new types of cybercrime - cyber-terrorism and identity theft with the view of committing crimes, which could be included into the Convention on Cybercrime. Scientific novelty: The study gave the possibility to disclose specific features of cybercrime, provided a universal definition of cybercrime, which can be used in the international conventions as well as in the international criminal investigation. Practical significance: Developed a universal conceptual framework that can be used in international legal instruments and international cooperation in combatting cybercrime and formed a unified approach to address some legal issues related to cybercrime in the global information and communication networks.

Ключевые слова:
cybercrime, Internet resources, methods used to combat cybercrime, social networks, information technology
Список литературы

1. Al-garadi M. A., Varathan K. D., Ravana S. D. (2016) Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network. Original Research Article. Computers in Human Behavior, Volume 63, October 2016, pp. 433-443

2. Andreas Berger, Alessandro D’Alconzo, Wilfried N. Gansterer, Antonio Pescapé (2016) Mining agile DNS traffic using graph analysis for cybercrime detectionOriginal Research Article. Computer Networks, Volume 100, 8 May 2016, pp. 28-44

3. Ben Brewster, Benn Kemp, Sara Galehbakhtiari, Babak Akhgar (2015) Chapter 8 - Cybercrime: Attack Motivations and Implications for Big Data and National Security. Application of Big Data for National Security, 2015, pp. 108-127

4. Berger A., D’Alconzo A., Gansterer W. N., Pescapé A. (2016) Mining agile DNS traffic using graph analysis for cybercrime detection. Original Research Article. Computer Networks, Volume 100, 8 May 2016, Pages 28-44

5. Christian Konradt, Andreas Schilling, Brigitte Werners (2016) Phishing: An economic analysis of cybercrime perpetrators. Original Research Article. Computers & Security, Volume 58, May 2016, pp. 39-46

6. Hughes J. (2003) The Internet and the Persistence of Law. 44 B. C. L. Rev.359 (2003). http: lawdigitalcommons.bc.edu/bclr/vol44/iss2/4

7. Jahankhani H., Al-Nemrat A., Hosseinian-Far A. (2014) Chapter 12 - Cybercrime classification and characteristics. Cyber Crime and Cyber Terrorism Investigator’s Handbook, 2014, pp. 149-164

8. John Sammons, Michael Cross (2017) Chapter 5 - Cybercrime. The Basics of Cyber Safety, 2017, pp. 87-116

9. Kimberly A. DeTardo-Bora, Dhruba J. Bora (2016) Chapter 8 - Cybercrimes: an overview of contemporary challenges and impending threats. Digital Forensics, 2016, pp. 119-132

10. Levin J., McDevitt J. (2015) Hate Crimes. International Encyclopedia of the Social & Behavioral Sciences (Second Edition), 2015, pp. 540-545

11. Marius-Christian Frunza (2016) Chapter 4D - Cybercrime Introduction to the Theories and Varieties of Modern Crime in Financial Markets, 2016, pp. 207-220

12. Mihail Antonescu, Ramona Birău (2015) Financial and Non-financial Implications of Cybercrimes in Emerging Countries. Original Research Article. Procedia Economics and Finance, Volume 32, 2015, pp. 618-621

13. Mohammed Ali Al-garadi, Kasturi Dewi Varathan, Sri Devi Ravana (2016) Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network. Original Research Article. Computers in Human Behavior, Volume 63, October 2016, pp. 433-443

14. Christian Konradt, Andreas Schilling, Brigitte Werners (2016) Phishing: An economic analysis of cybercrime perpetrators. Original Research Article. Computers & Security, Volume 58, May 2016, pp. 39-46

15. Procedia - Social and Behavioral Sciences, Volume 182, 13 May 2015, pp. 590-595

16. Schjolberg S. and Ghernaouti-Helie S. A (2009) Global Treaty on Cybersecurity and Cybercrime. Oslo, 2009, 92 p

17. Shipley T. G., Bowker A. (2014) Chapter 16 - Detection and Prevention of Internet Crimes. Investigating Internet Crimes, 2014, pp. 375-399

18. Solak D., Topaloglu M. (2015) The Perception Analysis of Cyber Crimes in View of Computer Science Students. Original Research Article. Procedia - Social and Behavioral Sciences, Volume 182, 13 May 2015, pp. 590-595

19. Suleman Ibrahim (2016) Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals. Original Research Article International Journal of Law, Crime and Justice, In Press, Corrected Proof, Available online 11 August 2016

20. Shatalov M. A., Ahmedov A. E., Smolyaninova I. V., Mychka S.Yu. The formation of adaptive strategies of development of the enterprises of agro-industrial complex in the conditions of realization of import substitution. Modern Economy Success. 2016. № 1. pp. 70-78

21. Tropina T. (2010) Cybercrime and Organized Crime, Freedom from Fear Magazine. 2010. Issue 3


Войти или Создать
* Забыли пароль?