Problems of Countering Criminal Offenses in Information and Communication Networks
Abstract
The article deals with the issues of countering crime in the field of information and communication in light of the current criminal legislation of Kazakhstan. These issues are largely determined by the current time and have become particularly relevant considering the development of new approaches in the high-tech crime fighting. Based on the research, the authors have come to new theoretical conclusions important for law enforcement practice, based on which they have formulated proposals for further improvement of the criminal legislation of Kazakhstan. These conclusions and proposals are formulated based on the study of a large number of normative acts, special literature available on the topic under study, as well as the use of law-enforcement practice materials and legal statistics. The paper contains solutions to the problems aimed at the development of scientifically-grounded proposals on the improvement of the legislation and practice of criminal prosecution bodies in the course of pre-trial investigation in combating criminal offenses in information and communication networks. Several recommendations for improving the legislative and organizational support for countering criminal offenses in the field of information and communication have been developed as well.
References
[2] Alazab, M. and Broadhurst, R. 2015. The Role of Spam in Cybercrime: Data from the Australian Cybercrime Pilot Observatory. Cybercrime Risks and Responses. Palgrave Macmillan, 103-120.
[3] Abdudzhalilov, A. 2014. Theoretical problems of legal regulation of the Internet: civil-legal aspects. Er-Graf.
[4] Dzhansaraeva, R.E. and Aratuly, K. 2012. Borba s kiberprestupleniyami: sravnitelnyi analiz zakonodatelstva stran SNG [The fight against cybercrime: comparative analysis of the legislation of the CIS countries] Kriminologicheskii zhurnal BGUEP 3.
[5] Tatarinov, D.V, Erdzhanova, T.K. and Tatarinova, L.F. 2014. Pravovye osnovy borby s pravonarusheniyami v globalnykh kommunikatsionnykh setyakh [Legal framework for the fight against offenses in the global communication networks]. Almaty.
[6] Tatarinova, L. F. 2014. Prestupleniya v sfere kompyuternykh tekhnologii [Crimes in the field of computer technology]. Almaty.
[7] Tatarinova, L.F., Shakirov, K.N. and Tatarinov, D.V. 2016. Criminal Analysis of Determinants of Cybercrime Technologies. International Electronic Journal of Mathematics Education, 11(3.5): 1127-1134.
[8] Tatarinova, L.F., Sokurova, E.Zh., Tatarinov, D.V., Shagdarova, T.A., Yensebayeva, A.R. and Osmanova, D. 2014. Approach issues to criminalistic classification of computer crimes. Life Science Journal 11(12s).
[9] Akimzhanov, T., Esbulatova, R., Torgautova, B., Kulmukhanbetova, B. and Bimoldanov Y. 2016. Role and Significance of Object of the Criminal Office in the New Criminal Legislation of Kazakhstan. The Social Sciences 11(7):1113-1118.
[10] Erjanov, T.K. 2017. ‘To the question of determination of jurisdiction in respect of disputes relating to activities on the Internet’. Collection of materials of international scientific-practical conference: ‘Pravovoe regulirovanie potentsial'noopasnykh informatsionnykh tekhnologi i inovykh vidov oruzhiya’ [Legal regulation of potentially dangerous information technologies and new types of weapons’]. Almaty, 115-127.
[11] Chalmers, C., Campbell, M., Spears, B., Butler, D., Cross, D., Slee, P. and Gift, S. 2016. School policies on bullying and cyberbullying: perspectives across three Australian states. Educational Research 58: 91-92;
[12] Constitution of Kazakhstan. 1995. Statements of the Parliament of Kazakhstan. Astana.
[13] Criminal code of Kazakhstan. 2014. Statements of the Parliament of Kazakhstan. Astana.
[14] Pravstat. http://service.pravstat.kz/portal/page/portal/POPageGroup/Services/Pravstat
[15] The newspaper «Donbass». 2010. The youngest sysadmin in the world is a nine-year-old boy. http://donbass.ua/news/technology/2010/01/22/samyi-molodoi-v-mire-sisadmin-devjatiletnii-malchik.html
[16] Vesti.az. http://vesti.az/news/9835
[17] Konventsiya o kompyuternykh prestupleniyakh [Computer Crime Convention] (Budapest, November 23, 2001) Entered into force on 1 July 2004. The Additional Protocol to it concerning the criminalization of racist and xenophobic acts committed through computer systems (ETS No. 189), entered into force on March 1, 2006. http://conventions.coe.int/Treaty/rus/Treaties/Html/185.htm
[18] Yernar, T., Taskyn, M. and Bimoldanov, Ye. 2018. Characteristics of criminal responsibility for the participation of citizens of Kazakhstan in foreign armed conflicts. Journal of Advanced Research in Law and Economics IX(1, 31): 313-322
[19] Schjolberg. S. and Ghernaouti-Helie, S. 2011. A Global Treaty on Cybersecurity and Cybercrime. – Sec. Ed. Australia.
[20] Recommendation No. R (99) 5 of the Committee of Ministers to Council of Europe member states on protecting privacy on the Internet. www.zakon2.rada.gov.ua
[21] Zakaras, M.R. 2001. International computer crimes. General report. Revue internationale de droitpénal 2001/3 72: 813-829.
The Copyright Transfer Form to ASERS Publishing (The Publisher)
This form refers to the manuscript, which an author(s) was accepted for publication and was signed by all the authors.
The undersigned Author(s) of the above-mentioned Paper here transfer any and all copyright-rights in and to The Paper to The Publisher. The Author(s) warrants that The Paper is based on their original work and that the undersigned has the power and authority to make and execute this assignment. It is the author's responsibility to obtain written permission to quote material that has been previously published in any form. The Publisher recognizes the retained rights noted below and grants to the above authors and employers for whom the work performed royalty-free permission to reuse their materials below. Authors may reuse all or portions of the above Paper in other works, excepting the publication of the paper in the same form. Authors may reproduce or authorize others to reproduce the above Paper for the Author's personal use or for internal company use, provided that the source and The Publisher copyright notice are mentioned, that the copies are not used in any way that implies The Publisher endorsement of a product or service of an employer, and that the copies are not offered for sale as such. Authors are permitted to grant third party requests for reprinting, republishing or other types of reuse. The Authors may make limited distribution of all or portions of the above Paper prior to publication if they inform The Publisher of the nature and extent of such limited distribution prior there to. Authors retain all proprietary rights in any process, procedure, or article of manufacture described in The Paper. This agreement becomes null and void if and only if the above paper is not accepted and published by The Publisher, or is with drawn by the author(s) before acceptance by the Publisher.