Abstract
In a series of recently conducted forensic studies related to methods of a criminal investigation in the sphere of computer information, scientifically interesting data about the constancy of connections of particular characteristics of these criminal actions have been obtained. On their basis, a researcher is supposed to build typical and then individual models of an event being investigated. As practice shows, such a problem is quite complicated for officials of preliminary investigation agencies since they have to choose necessary data from legal regulations and a wide range of reference materials (the Criminal Code, the Code of Criminal Procedure, federal laws, and other statutory acts regulating public relations in the sphere of information, information technologies, and protection of information, forensic scientific products, etc.), most of which don’t apply to a particular case under investigation. It appears that in present-day conditions of science and technology development this problem should be solved on the basis of forensic computer modeling.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kravets, E., Birukov, S., Pavlik, M.: Remote investigative actions as the evidentiary information management system. In: Kravets, A.G. (ed.) Big Data-driven World: Legislation Issues and Control Technologies. SSDC, vol. 181, pp. 95–103. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-01358-5_9
Hyland, J.M., Hyland, P.K., Corcoran, L.: Cyber aggression and cyberbullying: widening the net. In: Jahankhani, H. (ed.) Cyber Criminology. ASTSA, pp. 47–68. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-97181-0_3
Kravets, A.G., Bui, N.D., Al-Ashval, M.: Mobile security solution for enterprise network. In: Kravets, A., Shcherbakov, M., Kultsova, M., Iijima, T. (eds.) JCKBSE 2014. CCIS, vol. 466, pp. 371–382. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11854-3_31
Saltykov, S., Rusyaeva, E., Kravets, A.G.: Typology of scientific constructions as an instrument of conceptual creativity. In: Kravets, A., Shcherbakov, M., Kultsova, M., Shabalina, O. (eds.) Creativity in Intelligent Technologies and Data Science. CCIS, vol. 535, pp. 41–57. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-23766-4_4
Montasari, R., Hosseinian-Far, A., Hill, R.: Policies, innovative self-adaptive techniques and understanding psychology of cybersecurity to counter adversarial attacks in network and cyber environments. In: Jahankhani, H. (ed.) Cyber Criminology. ASTSA, pp. 71–93. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-97181-0_4
Pournouri, S., Zargari, S., Akhgar, B.: Predicting the cyber attackers; a comparison of different classification techniques. In: Jahankhani, H. (ed.) Cyber Criminology. ASTSA, pp. 169–181. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-97181-0_8
Quyên, L.X., Kravets, A.G.: Development of a protocol to ensure the safety of user data in social networks, based on the backes method. In: Kravets, A., Shcherbakov, M., Kultsova, M., Iijima, T. (eds.) JCKBSE 2014. CCIS, vol. 466, pp. 393–399. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11854-3_33
Kananizadeh, S., Kononenko, K.: Development of dynamic protection against timing channels. Int. J. Inf. Secur. 16, 641 (2017). https://doi.org/10.1007/s10207-016-0356-7
Vasilev, D., Kravets, E., Naumov, Y., Bulgakova, E., Bulgakov, V.: Analysis of the data used at oppugnancy of crimes in the oil and gas industry. In: Kravets, A.G. (ed.) Big Data-driven World: Legislation Issues and Control Technologies. SSDC, vol. 181, pp. 249–258. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-01358-5_22
Yemelyanova, E., Khozikova, E., Kononov, A., Opaleva, A.: Counteracting the spread of socially dangerous information on the internet: a comparative legal study. In: Kravets, A.G. (ed.) Big Data-driven World: Legislation Issues and Control Technologies. SSDC, vol. 181, pp. 135–143. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-01358-5_13
Nikonovich, S.L., Makeeva, I.V., Avdalyan, A.Ya., Likholetov, A.A., Mogutin R.I.: Qualification problems of credit card fraud. Int. J. Econ. Perspect. 11(3), 42 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Solovieva, N., Khorsheva, V., Likholetov, E., Naumov, Y., Kairgaliev, D. (2019). Program Modeling in the Investigation of Crimes Against Cybersecurity in Russia. In: Kravets, A., Groumpos, P., Shcherbakov, M., Kultsova, M. (eds) Creativity in Intelligent Technologies and Data Science. CIT&DS 2019. Communications in Computer and Information Science, vol 1084. Springer, Cham. https://doi.org/10.1007/978-3-030-29750-3_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-29750-3_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-29749-7
Online ISBN: 978-3-030-29750-3
eBook Packages: Computer ScienceComputer Science (R0)