Eng During last 365 days Approved articles: 1989,   Articles in work: 305 Declined articles: 758 
Library
Articles and journals | Tariffs | Payments | Your profile

Back to contents

Algorithm of measures on analyzing the situation in suspicion of cybercrime with consideration of the specifics of the sources of the information data
Ostrovskii Oleg Aleksandrovich

Postgraduate at Novosibirsk State Agrarian University

634021, Russia, Tomsk, ul. L'va Tolstogo, 77, office 83

ostrovskii_80@mail.ru

 

 

Abstract.

This article presents the classification of computer information that identifies the means of how it was obtained, provides an algorithm for measure in investigating crimes in the area of cyberspace, as well as proposes the category of information traces of possible cybercrimes. The author carefully examines such aspects as use of information traces and conducts research on analysis of cybercrime investigation. The object of this research is cybercrime reflected in information traces, as well as tactical and technical actions aimed at discovery, storage and confiscation of information traces. The subject of this research is the regularities of crime that produces information traces, as well as regularities in the law enforcement activity in detecting, recording and using such traces in criminal investigation. Identification and analysis of cybercrimes is a difficult task in practice due to widening spectrum of crimes committed in cyberspace and constant development of means of storing and transferring information. Its solution requires not only special tactics in investigation and organizational measures, but also special knowledge in the area of computer technology. In this work, the author offers a structural schematic for the necessary measure for analysis in suspicion of cybercrime, as well as the sources of this information.

Keywords: information traces, criminology, scheme, systematization, classification, cybercrime, computer information, algorithm of measures, investigation of crimes, forensics

DOI:

10.7256/2454-0706.2018.10.22879

Article was received:

08-05-2017


Review date:

03-05-2017


Publish date:

01-11-2018


This article written in Russian. You can find full text of article in Russian here .

References
1.
Ostrovskii O.A Kriminalisticheskaya portretnaya ekspertiza po videoizobrazheniyam, kak forma opredeleniya lichnosti / The Eleventh International Conference on Eurasian scientific development Proceedings of the Conference. Editor Jana Ilyna, Russia. 2016. S. 176-179.
2.
Ugolovnyi kodeks Rossiiskoi Federatsii ot 13.06.1996 N 63-FZ (red. ot 17.04.2017) st. 272
3.
Press-reliz Mezhdunarodnogo soyuza elektrosvyazi // MSE publikuet dannye po IKT za 2016 god [Elektronnyi resurs].-Rezhim dostupa: http://www.itu.int/net/pressoffice/press_releases/2016/pdf/30-ru.pdf (data obrashcheniya: 08.05.2017).
4.
Trend Micro // TAdviser . Gosudarstvo. Biznes. IT. [Elektronnyi resurs].- Rezhim dostupa: http://tadviser.ru/a/23656 (data obrashcheniya: 08.05.2017).
5.
Garmaev Yu.P. Sovremennye informatsionnye tekhnologii v mekhanizme vnedreniya mezhotraslevykh sredstv protivodeistviya prestupnosti / Yuridicheskoe obrazovanie i nauka. 2014. 4. S. 28-33.
6.
Bagutdinov R.A. Kibernetika i programmirovanie. 2016. 5. S.10-15
7.
Vasil'ev A.N. Problemy metodiki rassledovaniya otdel'nykh vidov prestuplenii. M.: LeksEst, 2002. S.64
8.
Korolev D.G. Informatsiya i pravo: Uchebnoe posobie. Ryazan': Ryazanskii Fakul'tet Moskovskogo instituta MVD Rossiyu 2000. S. 41 55.
9.
Aslanov R. M. Zarubezhnyi opyt pravovogo regulirovaniya obespecheniya informatsionnoi bezopasnosti // Politika i Obshchestvo.-2012.-2.-C. 45-48.
10.
Voinikanis E.A. Kodifikatsiya zakonodatel'stva i ee osobennosti v sfere intellektual'nykh prav: teoretiko-pravovye aspekty // Pravo i politika.-2014.-11.-C. 1643-1646. DOI: 10.7256/1811-9018.2014.11.13319.
11.
Ostrovskii O.A. Grafologicheskii metod gnoseologicheskoi napravlennosti na styke mezhdu filosofiei, psikhologiei i kriminalistiki // V sbornike: Molodaya nauka 2017 materialy I Mezhdunarodnoi nauchno-prakticheskoi konferentsii teoreticheskikh i prikladnykh razrabotok molodykh uchenykh. 2017. S. 11-16.
12.
Bagutdinov R.A., Narimanov R.K. The calculating the fet based schottky hydrodynamic model // The First European Conference on Informational Technology and Computer Science 2015. S. 17-22.
13.
Fedorov V. Komp'yuternye prestupleniya: vyyavlenie, rassledovanie i profilaktika // Zakonnost'. 1994.-6.-S.12
14.
Mel'nikov V.R. Zashchita informatsii v komp'yuternykh sistemakh. M.: Finansy i statistika, Elektroinform, 1997.-C. 368