Countering Fraud Committed Using Information Technology in Kazakhstan
Abstract
The relevance of this article is that with the development of modern technologies, conditions have formed for the emergence of such a new type of crime as fraud committed with the help of modern information technologies. Today in Kazakhstan, the amount of damage caused and the number of facts of this type of crime in recent years has grown many times. The practice of law enforcement indicates that computer technology is increasingly acting as a tool for committing crimes. Most of these crimes can cause real harm to a person and the state. The aim of the article is to study the theoretical and practical aspects of countering a new type of fraud. The methodological base of the article is composed of general scientific principles, approaches and methods of scientific knowledge, dialectical and comparative methods of cognition of social and legal processes and phenomena. The theoretical and practical significance of the article lies in the fact that the results of the work can become the foundation for amendments to the legislation of Kazakhstan, as well as for the development of methodological manuals on the investigation of the type of criminal offenses in law enforcement.
References
[2] Artemenko, N.A. 2018. Carding as a form of fraudulent activity. Humanities, Socio-Economic and Social Sciences77-80. https://cyberleninka.ru/article/n/karding-kak-vid-moshennicheskoy-deyatelnosti.
[3] Assetova, G., Kubeyev, Y., and Kizdarbekova, A. 2018. Problems of legislation systematization in the sphere of entrepreneurial activity. Journal of Advanced Research in Law and Economics 9(7): 2239-2247.
[4] Atkociuniene, V., and Balkibayeva, A. 2019. The role of cooperation for the needs of bioeconomy development. Research for Rural Development 2: 87-94.
[5] Bogoviz, A.V. et al. 2017. Evaluation of economic effectiveness of the state purchases system: Criteria and priorities. European Research Studies Journal 20(3): 548-555.
[6] Comprehensive study of the problem of cybercrime and responses to it by Member States, the international community and the private sector. 2013. https://undocs.org/en/UNODC/CCPCJ/EG.4/2013/2.
[7] Data from the International Telecommunication Union for Information and Communication Relations. https://www.itu.int/ru/mediacenter/Pages/default.aspx.
[8] Dielini, M. 2017. Development of social responsibility of business in China: experience for Ukraine. Skhid 6(152): 17-21. https://doi.org/10.21847/1728-9343.2017.6(152).122329.
[9] Dremlyuga, R.I. 2008. Internet Crime. Far Eastern University Publishing House.
[10] Goloshchapova, L.V. et al. 2018. Analytical review of risks of loss of profits in cargo transportation. International Journal of Mechanical Engineering and Technology 9(11): 1897-1902.
[11] Goloshchapova, L.V. et al. 2017. Theoretical and methodological basis of organization of the internal control system of the industrial enterprise. International Journal of Applied Business and Economic Research 15(12): 261-271.
[12] International Telecommunication Union. Global Cybersecurity Index. 2018. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E.pdf.
[13] Kogamov, M.Ch. 2015. Commentary on the Code of Criminal Procedure of Kazakhstan in 2014. Jetijarğı.
[14] Kostruba, A.V. 2017. Methodological basis of legal personality of the state (civil aspects). Journal of Legal, Ethical and Regulatory Issues 20(Special issue 1): 1544-0044-20-SI-1-110.
[15] Kostruba, A.V. 2018a. Legal regulatory mechanism of social relations for ensuring dynamics in civil relationship. Journal of Advanced Research in Law and Economics 9(5): 1689-1695.
[16] Kostruba, A.V. 2018b. Right deprivation in the legal regulation mechanism of civil property relations. Journal of Legal, Ethical and Regulatory Issues 21(Special Issue 1): 1544-0044-21-S1-252.
[17] Kostruba, A.V. 2019. The notion and attributes of right – terminating legal facts. Journal of Advanced Research in Law and Economics 10(1): 254-262.
[18] Kulmatova, B.A., Buranova, D.A., and Zaparov, Z.A. 2018. Methods of protection against online fraud. Academy78-79. https://cyberleninka.ru/article/n/sposoby-zaschity-ot-internet-moshennichestva.
[19] Lance, J. 2008. Phishing Computer Crime Technique. NT Preaa.
[20] Lebedeva, A.A. 2015. High Tech Fraud. http://xn----7sbbaj7auwnffhk.xn--p1ai/article/1673.
[21] Message from the President of Kazakhstan ‘On the Third Modernization of Kazakhstan: Global Competitiveness’. 2017. http://adilet.zan.kz/rus/docs/K1700002017.
[22] Mikhailov, M.F. 2008. The Method of Committing a Criminal Offense and Its Criminal Legal Significance. Academy of Management of the Ministry of Internal Affairs of Russia.
[23] Mishchenko, V. et al. 2018. Special aspects of using hybrid financial tools for project risk management in Ukraine. Investment Management and Financial Innovations 15(2): 257-266.
[24] Popkova, E.G. et al. 2019. The model of state management of economy on the basis of the internet of things. Studies in Computational Intelligence 826: 1137-1144.
[25] Rakhmetollov, A.K. et al. 2018. Law enforcement agencies in the system for the rights of entrepreneurs protection. Journal of Advanced Research in Law and Economics 9(7): 2408-2414.
[26] Rudenko, M.N. 2017. Economic security of regions. Journal of Advanced Research in Law and Economics 8(8): 2568-2585.
[27] Rudenko, M.N. 2019. Economic security of the region (Perm krai). Astra Salvensis 7: 385-410.
[28] Statistical data of the Committee on Legal Statistics of the General Prosecutor's Office of Kazakhstan. https://qamqor.gov.kz/portal/page/portal/POPageGroup/Services/Pravstat.
[29] Tatsiy, V., Serohina, S. 2018. Bicameralism: European tendencies and perspectives for Ukraine. Baltic Journal of European Studies 8(1): 101-122.
[30] Tereshchenko, E.Y. et al. 2017. Methodological basis of business value estimation. International Journal of Applied Business and Economic Research 15(11): 11-18.
[31] Ushakov, D.S. et al. 2018. Countries’ competitiveness as a factor of MNCs’ global expansion. Journal of Advanced Research in Law and Economics 9(6): 2169-2175.
[32] Vekhov, V.B., Popova, V.V., and Ilyushin, D.A. 2004. Tactical Features of the Investigation of Crimes in The Field of Computer Information. LyeksEst.
[33] Volevodz, A.G. 2001. Countering Computer Crime: The Legal Basis for International Cooperation. Yurlitinform.
[34] Zveryanskaya, L.P. 2016. Historical analysis of the stages of development of cybercrime and features of modern cybercrime. Concept 15: 881-885.
The Copyright Transfer Form to ASERS Publishing (The Publisher)
This form refers to the manuscript, which an author(s) was accepted for publication and was signed by all the authors.
The undersigned Author(s) of the above-mentioned Paper here transfer any and all copyright-rights in and to The Paper to The Publisher. The Author(s) warrants that The Paper is based on their original work and that the undersigned has the power and authority to make and execute this assignment. It is the author's responsibility to obtain written permission to quote material that has been previously published in any form. The Publisher recognizes the retained rights noted below and grants to the above authors and employers for whom the work performed royalty-free permission to reuse their materials below. Authors may reuse all or portions of the above Paper in other works, excepting the publication of the paper in the same form. Authors may reproduce or authorize others to reproduce the above Paper for the Author's personal use or for internal company use, provided that the source and The Publisher copyright notice are mentioned, that the copies are not used in any way that implies The Publisher endorsement of a product or service of an employer, and that the copies are not offered for sale as such. Authors are permitted to grant third party requests for reprinting, republishing or other types of reuse. The Authors may make limited distribution of all or portions of the above Paper prior to publication if they inform The Publisher of the nature and extent of such limited distribution prior there to. Authors retain all proprietary rights in any process, procedure, or article of manufacture described in The Paper. This agreement becomes null and void if and only if the above paper is not accepted and published by The Publisher, or is with drawn by the author(s) before acceptance by the Publisher.