Problems of Fighting Crimes on the Internet

  • Elena Anatolyevna KIRILLOVA Southwest State University, Kursk, Russia
  • Rashad Afatovich KURBANOV Plekhanov Russian University of Economics, Moscow, Russia
  • Natalia Viktorovna SVECHNIKOVA Plekhanov Russian University of Economics, Moscow, Russia
  • Teymur El'darovich ZUL'FUGARZADE Plekhanov Russian University of Economics, Moscow, Russia
  • Sergey Sergeevich ZENIN Kutafin Moscow State Law University, Russian Penitentiary Service Research Institute, Moscow, Russia

Abstract

This article considers the problems of fighting crimes on the Internet, and defines new criminal acts committed by means of global computer networks. The aim of the study is to develop a categorical conceptual instrument, to separate a new type of cybercrime. The methodological basis of the study was the dialectic, comparative legal, sociological, systemic-structural and statistical methods as well as case study method – the method of active problem-situation analysis, by means of which the identification, selection and problem-solving in order to combat cybercrime was performed. The conducted study allows to offer the authors' definition of cyberterrorism and to identify the distinctive features of cyberterrorism, to allocate it in an independent kind of a crime and offer to include it in the Convention on Cybercrime as a separate article.

References

[1] Al-Garadi, M.A., Varathan, K.D., and Ravana, S.D. 2016. Cybercrime Detection in Online Communications: The Experimental Case of Cyberbullying Detection in the Twitter Network. Computers in Human Behavior, 63: 433-443.
[2] Brewster, B., Kemp, B., Galehbakhtiari, S., and Akhgar, B. 2015. Cybercrime: Attack Motivations and Implications for Big Data and National Security. In B. Akhgar, G.B. Saathoff, H.R. Arabnia, R. Hill, A. Staniforth, & P.S. Bayerl (Eds.), Application of Big Data for National Security. Oxford: Butterworth-Heinemann, pp. 108-127.
[3] Berger, A., D’Alconzo, A., Gansterer, W.N., and Pescapé, A. 2016. Mining Agile DNS Traffic Using Graph Analysis for Cybercrime Detection. Computer Networks, 100: 28-44.
[4] Cassese, A. 2001. International Law. Oxford: Oxford University Press, pp. 150-151.
[5] DeTardo-Bora, K.A., and Bora, D.J. 2016. Cybercrimes: An Overview of Contemporary Challenges and Impending Threats. In J. Sammons (Ed.), Digital Forensics. Amsterdam: Elsevier, pp. 119-132.
[6] Frunza, M.-C. 2016. Cybercrime. In M.-C. Frunza, Introduction to the Theories and Varieties of Modern Crime in Financial Markets. Amsterdam: Elsevier, pp. 207-220.
[7] Furnell, S., Emm, D., and Papadaki, M. 2015. The Challenge of Measuring Cyber-Dependent Crimes. Computer Fraud & Security, 2015(10): 5-12.
[8] Goodman, M. 2010. International Dimensions of Cybercrime. In S. Ghosh, & E. Turrini (Eds.), Cybercrimes: A Multidisciplinary Analysis. Berlin, Heidelberg: Springer, pp. 77-79.
[9] Goodman, S.E., Kirk, J.C., and Kirk, M.H. 2007. Cyberspace as a Medium for Terrorists. Technological Forecasting and Social Change, 74(2): 193-210.
[10] Gorge, M. 2007. Cyberterrorism: Hype or Reality? Computer Fraud & Security, 2007(2): 9-12.
[11] Ibrahim, S. 2016. Social and Contextual Taxonomy of Cybercrime: Socioeconomic Theory of Nigerian Cybercriminals. International Journal of Law, Crime and Justice, 47: 44-57.
[12] Jahankhani, H., Al-Nemrat, A., and Hosseinian-Far, A. 2014. Cybercrime Classification and Characteristics. In B. Akhgar, A. Staniforth, & F. Bosco (Eds.), Cyber Crime and Cyber Terrorism Investigator's Handbook. Amsterdam: Elsevier, pp. 149-164.
[13] Katos, V., and Bednar, P.M. 2008. A Cyber-Crime Investigation Framework. Computer Standards & Interfaces, 30(4): 223-228.
[14] Konradt, C., Schilling, A., and Werners, B. 2016. Phishing: An Economic Analysis of Cybercrime Perpetrators. Computers & Security, 58: 39-46.
[15] Kenney, M. 2015. Cyber-Terrorism in a Post-Stuxnet World. Orbis, 59(1): 111-128.
[16] Kirillova, Y.A., Vasilyeva, M.V., and Krohina, Y.A. 2014. Legal Protection of Copyright Items Inheritance in the Internet by Means of a Creative Commons License. Review of European Studies, 6(4): 232-238.
[17] Levin, J., and McDevitt, J. 2015. Hate Crimes. In N.J. Smelser, & P.B. Baltes (Eds.), International Encyclopedia of the Social & Behavioral Sciences (2nd ed.). Amsterdam: Elsevier, pp. 540-545.
[18] Sammons, J., and Cross, M. 2017. Cybercrime. In J. Sammons, & M. Cross, The Basics of Cyber Safety. Amsterdam: Elsevier, pp. 87-116.
[19] Shipley, T.G., and Bowker, A. 2014. Covert Operations on the Internet. In T.G. Shipley, & A. Bowker, Investigating Internet Crimes. Amsterdam: Elsevier, pp. 233-252.
[20] Solak, D., and Topaloglu, M. 2015. The Perception Analysis of Cyber Crimes in View of Computer Science Students. Procedia – Social and Behavioral Sciences, 182: 590-595.
[21] Staniforth, A. 2014. Police Investigation Processes: Practical Tools and techniques for Tackling Cyber Crimes. In B. Akhgar, A. Staniforth, & F. Bosco (Eds.), Cyber Crime and Cyber Terrorism Investigator's Handbook. Amsterdam: Elsevier, pp. 31-42.
[22] Willems, E. 2011. Cyber-Terrorism in the Process Industry. Computer Fraud & Security, 2011(3): 16-19.
[23] Shipley, T.G., and Bowker, A. 2014. Internet Criminals. In T.G. Shipley, & A. Bowker, Investigating Internet Crimes. Amsterdam: Elsevier, pp. 21-39.
[24] Tehrani, P.M., Manap, N.A., and Taji, H. 2013. Cyber Terrorism Challenges: The Need for a Global Response to a Multi-Jurisdictional Crime. Computer Law & Security Review, 29(3): 207-215.
[25] Tropina, T. 2010. Cybercrime and Organized Crime. Freedom from Fear Magazine, 7: 3.
Published
2017-10-25
How to Cite
KIRILLOVA, Elena Anatolyevna et al. Problems of Fighting Crimes on the Internet. Journal of Advanced Research in Law and Economics, [S.l.], v. 8, n. 3, p. 849-856, oct. 2017. ISSN 2068-696X. Available at: <https://journals.aserspublishing.eu/jarle/article/view/1457>. Date accessed: 25 apr. 2024.