Skip to main content

Internet as a Crime Zone: Criminalistic and Criminological Aspects

  • Chapter
  • First Online:

Part of the book series: Studies in Systems, Decision and Control ((SSDC,volume 181))

Abstract

The emergence and rapid development of the global Internet computer network at the end of the last century have entailed an inevitable attack by terrorist organizations, criminal associations, and groups, as well as certain criminal elements, at the information and telecommunications infrastructures of industrialized countries. The chapter is devoted to one of the actual problems of modern society—the Internet as a crime zone. As a result of the research, the main measures of counteracting terrorist activity on the Internet, ways to combat hackers-fraudsters, as well as other Internet crimes are suggested. The data obtained from the study can be used to predict and counteract crimes committed on the Internet.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kuru, D., Bayraktar, S.: The effect of cyber-risk insurance to social welfare. J. Fin. Crime. 24(2) (2017)

    Article  Google Scholar 

  2. Carryev, B.S., Aidarkhanov, M.B. Balafanov, E.K.: World intervision: basics of information culture. Teaching-methodical manual. Almaty 404 (2006)

    Google Scholar 

  3. Byers, S., Rubin, A.D., Kormann, D.: Defending against an internet-based attack on the physical world. ACM Trans. Internet Technol. 4(3), 239–254 (2004)

    Article  Google Scholar 

  4. White, R.: The four ways of eco-global criminology. Int. J. Crime, Justice Soc. Democracy 6(1), 8–22 (2017)

    Article  Google Scholar 

  5. Tarasic, N.M.: Analysis of the legal basis for combatting cybercrime. Adv. Chem. Chem. Technol. XXX(5), 66–68 (2016)

    Google Scholar 

  6. Vekhov, V.B.: Peculiarities of the organization and tactics of the crime scene search in the investigation of crimes in the field of computer information. Russ. Investigator 7 (2004)

    Google Scholar 

  7. Cavezza, C., McEwan, T.E.: Cyberstalking versus off-line stalking in a forensic sample. Psychol. Crime Law 20 (10) (2014)

    Article  Google Scholar 

  8. Gottschalk, P.: Categories of financial crime. J. Fin. Crime 17(4) (2010)

    Article  Google Scholar 

  9. Convention on Computer Crimes. http://www.coe.int/ru/web/conventions/full-list/-/conventions/treaty/185. Accessed 06 Oct 2017

  10. Criminal Code of the Russian Federation of 13.06.1996 № 63-FL, 29.07.2017. Search System “Consultant”

    Google Scholar 

  11. Convention on Computer Crimes. http://www.coe.int/ru/web/conventions/full-list/-/conventions/treaty/185. Accessed 06 Oct 2017

  12. Manakhov, S.A.: On improving the activities to detect and investigate crimes committed using modern information technologies. In: Meeting of the Collegium of the Ministry of Internal Affairs of Russia (2014)

    Google Scholar 

  13. Baldwin, J.M.: Investigating the programmatic attack: a national survey of veterans treatment courts. J. Crim. law Criminol. 105(3), 705–752 (2017)

    Google Scholar 

  14. Herzberg, A., Jbara, A.: Security and identification indicators for browsers against spoofing and phishing attacks. ACM Trans. Intern. Technol. 8(4) (2008)

    Article  Google Scholar 

  15. Solvak, M., Vassil, K.: Could internet voting halt declining electoral turnout? New evidence that E-voting is habit forming. Policy Intern. 10(1), 4–21 (2018)

    Article  Google Scholar 

  16. Meshcheryakov, V.A.: Basics of the methodology for investigating crimes in the field of computer information. Ph.D. Thesis. Voronezh. Voronezh State University, 387 (2001)

    Google Scholar 

  17. Penney, J.: Internet surveillance, regulation, and chilling effects online: a comparative case study. Internet Policy Rev. 6(2) (2017)

    Google Scholar 

  18. Chen, N.-Y., Liu, Y., Zhang, Z.-J.: A forecasting system of micro-blog public opinion based on artificial neural network. J. Internet Technol. 16(6), 999–1004 (2015)

    Google Scholar 

  19. Brantingham, P.J.: Crime diversity. Criminology 54(4), 553–586 (2016)

    Article  Google Scholar 

  20. Kratcoski, P.C. Edelbacher, M. (eds.): Perspectives on Elderly Crime and Victimization (2018)

    Google Scholar 

  21. Evdokimov, K.N.: Structure and state of computer crime in the russian federation. Legal Sci. Law Enforcement Pract. 1(35), 86–94 (2016)

    Google Scholar 

  22. Dremlyuga, R.I.: Internet Crimes: Monograph. Publishing House of Far East University, Vladivostok, pp. 240 (2008)

    Google Scholar 

  23. Cabaye, M.: Studies and Surveys of Computer Crime. Northfield 2 (2001)

    Google Scholar 

  24. Ifrah, L.: Cybercrime: Current Threats and Trends. COE (2008)

    Google Scholar 

  25. Klinger, D.: Spreading diffusion in criminology. Criminol. Public Policy 2(3), 461 (2003)

    Article  Google Scholar 

  26. Global Risks Report, 2016. The World Economic Forum. The Global Risks Report 2016.pdf http://book.itep.ru/depository/annuals/. Accessed 06 Oct 2017

  27. De Sanctis, F.M.: Football, gambling, and money laundering. A Global Crim. Justice Perspect. I, 213 (2014)

    Google Scholar 

  28. Gercke, M.: Understanding Cybercrime: A Guide for Developing Countries. ITU (2009)

    Google Scholar 

  29. Nomokonov, V.A., Tropina, T.L.: Cybercrime as the new criminal threat. Criminol.: Yesterday, Today, Tomorrow 24(1), 45–55 (2012)

    Google Scholar 

  30. Evdokimov, K.N.: Structure and state of computer crime in the Russian federation. Legal Sci. Law Enforcement Pract. 1(35), 86–94 (2016)

    Google Scholar 

  31. Quyên, L.X., Kravets, A.G.: Development of a protocol to ensure the safety of user data in social networks, based on the Backes method. In: Communications in Computer and Information Science, 466 CCIS, pp. 393–399 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elena Chervonnykh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Prokofieva, E., Mazur, S., Chervonnykh, E., Zhuravlev, R. (2019). Internet as a Crime Zone: Criminalistic and Criminological Aspects. In: Kravets, A. (eds) Big Data-driven World: Legislation Issues and Control Technologies. Studies in Systems, Decision and Control, vol 181. Springer, Cham. https://doi.org/10.1007/978-3-030-01358-5_10

Download citation

Publish with us

Policies and ethics