Abstract
The emergence and rapid development of the global Internet computer network at the end of the last century have entailed an inevitable attack by terrorist organizations, criminal associations, and groups, as well as certain criminal elements, at the information and telecommunications infrastructures of industrialized countries. The chapter is devoted to one of the actual problems of modern society—the Internet as a crime zone. As a result of the research, the main measures of counteracting terrorist activity on the Internet, ways to combat hackers-fraudsters, as well as other Internet crimes are suggested. The data obtained from the study can be used to predict and counteract crimes committed on the Internet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kuru, D., Bayraktar, S.: The effect of cyber-risk insurance to social welfare. J. Fin. Crime. 24(2) (2017)
Carryev, B.S., Aidarkhanov, M.B. Balafanov, E.K.: World intervision: basics of information culture. Teaching-methodical manual. Almaty 404 (2006)
Byers, S., Rubin, A.D., Kormann, D.: Defending against an internet-based attack on the physical world. ACM Trans. Internet Technol. 4(3), 239–254 (2004)
White, R.: The four ways of eco-global criminology. Int. J. Crime, Justice Soc. Democracy 6(1), 8–22 (2017)
Tarasic, N.M.: Analysis of the legal basis for combatting cybercrime. Adv. Chem. Chem. Technol. XXX(5), 66–68 (2016)
Vekhov, V.B.: Peculiarities of the organization and tactics of the crime scene search in the investigation of crimes in the field of computer information. Russ. Investigator 7 (2004)
Cavezza, C., McEwan, T.E.: Cyberstalking versus off-line stalking in a forensic sample. Psychol. Crime Law 20 (10) (2014)
Gottschalk, P.: Categories of financial crime. J. Fin. Crime 17(4) (2010)
Convention on Computer Crimes. http://www.coe.int/ru/web/conventions/full-list/-/conventions/treaty/185. Accessed 06 Oct 2017
Criminal Code of the Russian Federation of 13.06.1996 № 63-FL, 29.07.2017. Search System “Consultant”
Convention on Computer Crimes. http://www.coe.int/ru/web/conventions/full-list/-/conventions/treaty/185. Accessed 06 Oct 2017
Manakhov, S.A.: On improving the activities to detect and investigate crimes committed using modern information technologies. In: Meeting of the Collegium of the Ministry of Internal Affairs of Russia (2014)
Baldwin, J.M.: Investigating the programmatic attack: a national survey of veterans treatment courts. J. Crim. law Criminol. 105(3), 705–752 (2017)
Herzberg, A., Jbara, A.: Security and identification indicators for browsers against spoofing and phishing attacks. ACM Trans. Intern. Technol. 8(4) (2008)
Solvak, M., Vassil, K.: Could internet voting halt declining electoral turnout? New evidence that E-voting is habit forming. Policy Intern. 10(1), 4–21 (2018)
Meshcheryakov, V.A.: Basics of the methodology for investigating crimes in the field of computer information. Ph.D. Thesis. Voronezh. Voronezh State University, 387 (2001)
Penney, J.: Internet surveillance, regulation, and chilling effects online: a comparative case study. Internet Policy Rev. 6(2) (2017)
Chen, N.-Y., Liu, Y., Zhang, Z.-J.: A forecasting system of micro-blog public opinion based on artificial neural network. J. Internet Technol. 16(6), 999–1004 (2015)
Brantingham, P.J.: Crime diversity. Criminology 54(4), 553–586 (2016)
Kratcoski, P.C. Edelbacher, M. (eds.): Perspectives on Elderly Crime and Victimization (2018)
Evdokimov, K.N.: Structure and state of computer crime in the russian federation. Legal Sci. Law Enforcement Pract. 1(35), 86–94 (2016)
Dremlyuga, R.I.: Internet Crimes: Monograph. Publishing House of Far East University, Vladivostok, pp. 240 (2008)
Cabaye, M.: Studies and Surveys of Computer Crime. Northfield 2 (2001)
Ifrah, L.: Cybercrime: Current Threats and Trends. COE (2008)
Klinger, D.: Spreading diffusion in criminology. Criminol. Public Policy 2(3), 461 (2003)
Global Risks Report, 2016. The World Economic Forum. The Global Risks Report 2016.pdf http://book.itep.ru/depository/annuals/. Accessed 06 Oct 2017
De Sanctis, F.M.: Football, gambling, and money laundering. A Global Crim. Justice Perspect. I, 213 (2014)
Gercke, M.: Understanding Cybercrime: A Guide for Developing Countries. ITU (2009)
Nomokonov, V.A., Tropina, T.L.: Cybercrime as the new criminal threat. Criminol.: Yesterday, Today, Tomorrow 24(1), 45–55 (2012)
Evdokimov, K.N.: Structure and state of computer crime in the Russian federation. Legal Sci. Law Enforcement Pract. 1(35), 86–94 (2016)
Quyên, L.X., Kravets, A.G.: Development of a protocol to ensure the safety of user data in social networks, based on the Backes method. In: Communications in Computer and Information Science, 466 CCIS, pp. 393–399 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Prokofieva, E., Mazur, S., Chervonnykh, E., Zhuravlev, R. (2019). Internet as a Crime Zone: Criminalistic and Criminological Aspects. In: Kravets, A. (eds) Big Data-driven World: Legislation Issues and Control Technologies. Studies in Systems, Decision and Control, vol 181. Springer, Cham. https://doi.org/10.1007/978-3-030-01358-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-01358-5_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01357-8
Online ISBN: 978-3-030-01358-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)