Закажите звонок

Отправить
×

Спасибо!

Ваша заявка успешно отправлена. В ближайшее время с Вами свяжется наш специалист.
×

List of publications for

×

Austrian Journal of Humanities and Social Sciences, Issue 1-2/2017

THE USE OF PERSONAL DATA FOR THE PURPOSE OF COMMITTING CRIMES

DOI: https://doi.org/10.29013/AJH-17-1.2-236-241

Pages: 236 - 241

Authors: Kirillova Е. A.

Abstract: Objective: is to determine specific features of modern cybercrime, to develop conceptual framework, to specify new forms of cybercrime and to define the main directions in combating cybercrime. Methods: was based on dialectical, comparative legal, sociological, system-structural and statistical methods, as well as on social experiment. Results: The study highlighted two new types of cybercrime — cyber-terrorism and identity theft with the view of committing crimes, which could be included into the Convention on Cybercrime. Scientific novelty: The study gave the possibility to disclose specific features of cybercrime, provided a universal definition of cybercrime, which can be used in the international conventions as well as in the international criminal investigation. Practical significance: Developed a universal conceptual framework that can be used in international legal instruments and international cooperation in combatting cybercrime and formed a unified approach to address some legal issues related to cybercrime in the global information and communication networks

Keywords: cybercrime, Internet resources, methods used to combat cybercrime, social networks; information technology.

Bibliography:
1. Al-garadi M. A., Varathan K. D., Ravana S. D. (2016) Cybercrime detection in online communications: The experimental
case of cyberbullying detection in the Twitter network. Original Research Article. Computers in
Human Behavior, Volume 63, October 2016, pp. 433–443.
2. Andreas Berger, Alessandro D’Alconzo, Wilfried N. Gansterer, Antonio Pescapé (2016) Mining agile DNS traffic
using graph analysis for cybercrime detectionOriginal Research Article. Computer Networks, Volume 100,
8 May 2016, pp. 28–44.
3. Ben Brewster, Benn Kemp, Sara Galehbakhtiari, Babak Akhgar (2015) Chapter 8 – Cybercrime: Attack Motivations
and Implications for Big Data and National Security. Application of Big Data for National Security, 2015,
pp. 108–127.
4. Berger A., D’Alconzo A., Gansterer W. N., Pescapé A. (2016) Mining agile DNS traffic using graph analysis for
cybercrime detection. Original Research Article. Computer Networks, Volume 100, 8 May 2016, Pages 28–44.
5. Christian Konradt, Andreas Schilling, Brigitte Werners (2016) Phishing: An economic analysis of cybercrime
perpetrators. Original Research Article. Computers & Security, Volume 58, May 2016, pp. 39–46.
6. Hughes J. (2003) The Internet and the Persistence of Law. 44 B. C. L. Rev.359 (2003). http: lawdigitalcommons.
bc.edu/bclr/vol44/iss2/4
7. Jahankhani H., Al-Nemrat A., Hosseinian-Far A. (2014) Chapter 12 – Cybercrime classification and characteristics.
Cyber Crime and Cyber Terrorism Investigator’s Handbook, 2014, pp. 149–164.
8. John Sammons, Michael Cross (2017) Chapter 5 – Cybercrime. The Basics of Cyber Safety, 2017, pp. 87–116.
9. Kimberly A. DeTardo-Bora, Dhruba J. Bora (2016) Chapter 8 – Cybercrimes: an overview of contemporary
challenges and impending threats. Digital Forensics, 2016, pp. 119–132.
10. Levin J., McDevitt J. (2015) Hate Crimes. International Encyclopedia of the Social & Behavioral Sciences (Second
Edition), 2015, pp. 540–545.
11. Marius-Christian Frunza (2016) Chapter 4D – Cybercrime Introduction to the Theories and Varieties of Modern
Crime in Financial Markets, 2016, pp. 207–220.
12. Mihail Antonescu, Ramona Birău (2015) Financial and Non-financial Implications of Cybercrimes in Emerging
Countries. Original Research Article. Procedia Economics and Finance, Volume 32, 2015, pp. 618–621.
13. Mohammed Ali Al-garadi, Kasturi Dewi Varathan, Sri Devi Ravana (2016) Cybercrime detection in online
communications: The experimental case of cyberbullying detection in the Twitter network. Original Research
Article. Computers in Human Behavior, Volume 63, October 2016, pp. 433–443.
14. Christian Konradt, Andreas Schilling, Brigitte Werners (2016) Phishing: An economic analysis of cybercrime
perpetrators. Original Research Article. Computers & Security, Volume 58, May 2016, pp. 39–46.
15. Procedia – Social and Behavioral Sciences, Volume 182, 13 May 2015, pp. 590–595.
16. Schjolberg S. and Ghernaouti-Helie S. A (2009) Global Treaty on Cybersecurity and Cybercrime. Oslo, 2009,
92 p.
17. Shipley T. G., Bowker A. (2014) Chapter 16 – Detection and Prevention of Internet Crimes. Investigating Internet
Crimes, 2014, pp. 375–399.
18. Solak D., Topaloglu M. (2015) The Perception Analysis of Cyber Crimes in View of Computer Science Students.
Original Research Article. Procedia – Social and Behavioral Sciences, Volume 182, 13 May 2015, pp. 590–595.
19. Suleman Ibrahim (2016) Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian
cybercriminals. Original Research Article International Journal of Law, Crime and Justice, In Press, Corrected
Proof, Available online 11 August 2016.
241
E. A. Kirillova THE USE OF PERSONAL DATA FOR THE PURPOSE OF COMMITTING CRIMES
Science of law Austrian Journal of Humanities and Social Sciences 1-2 (2017)
ISSN 2310-5593 (Print) / ISSN 2519-1209 (Online)
20. Shatalov M. A., Ahmedov A. E., Smolyaninova I. V., Mychka S.Yu. The formation of adaptive strategies of development
of the enterprises of agro-industrial complex in the conditions of realization of import substitution. Modern
Economy Success. 2016. № 1. pp. 70–78.
21. Tropina T. (2010) Cybercrime and Organized Crime, Freedom from Fear Magazine. 2010. Issue 3.