Criminalistic Characteristics of Crimes in the Field of Computer Information
( Pp. 33-37)

More about authors
Tambiev Sergey Arsenovich Police Major, Lecturer of the department of special technical training
North Caucasus Institute for Advanced Studies (branch) of the Krasnodar University of the Ministry of Internal Affairs of Russia
Nalchik, Russia Teunaev Akhmat Seit-Umarovich Police Captain, Cand.Sci.(Law), Associate Professor of Criminology Department
Nizhny Novgorod Academy of the Ministry of Internal Affairs of Russia
Nizhniy Novgorod, Russia
Abstract:
Abstract: The purpose of this study is to study issues related to the commission of crimes in the field of computer information. Most often, the actions of criminals are expressed in interference with the operation of computer equipment, intrusion into the operation of programs, databases, computer networks, as well as in performing illegal actions related to access to these devices. Through the use of computer technology and computer information by criminals, the work of state authorities is destabilized, as well as the work of information systems is disorganized. These actions can pose a physical threat to people's lives, create a threat of death, financial losses. Criminals can use computer information to violate public safety, put pressure on public authorities, create a stir and panic among the population. In addition, criminals can use the worldwide network not only for financial gain, but also to fight the current government. That is why it is necessary to develop effective methods of struggle. One of the important ways is to increase computer literacy among the population, conducting educational work about cybercrime through the media.
It is concluded that there is a need to create effective measures on the part of the state, whose criminal law policy should be aimed at solving urgent problems related to crimes committed in the field of computer information. These crimes differ significantly from traditional ones and have a number of features that are important to take into account. For example, it is their international nature that prevents the capture of criminals, since it is necessary to combine the legislation of different countries, often with different views on the problem. If there are no international treaties, it is necessary to conduct lengthy negotiations, which often do not succeed. Problems also arise in the investigation and collection of evidence. In addition to the fact that it is in principle more difficult than when the crime is committed physically, there remains an obstacle associated with international agreements or their absence.
How to Cite:
Tambiev S.A., Teunaev A.S. Criminalistic Characteristics of Crimes in the Field of Computer Information // Gaps in Russian Legislation. 2023. Vol. 16. №5. Pp. 033-037. (in Russ.). EDN: CUJTAU
Reference list:
Aliyev M.M. Criminalistic characteristics of computer crimes // Innovations. The science. Education. 2021. No. 33. pp. 156-159.
Belova O.A. Problems of investigation of crimes in the field of computer information // In the collection: Law, society, the state: history, current trends and development prospects. Proceedings of the III International Scientific and Practical Conference of Students and Masters. Under the general editorship of V.V. Solovyova. Voronezh, 2022. pp. 48-54.
Zueva I.A. Crime in the field of computer information in Russia: general characteristics // In the collection: Science, society, technology: problems and prospects of interaction in the modern world. Collection of articles of the II International Scientific and Practical Conference. Petrozavodsk, 2022. pp. 69-73.
Efremova I.A., Smushkin A.B., Donchenko A.G., Matushkin P.A. Cyberspace as a new crime environment // Bulletin of Tomsk State University. 2021. No. 472. pp. 248-256.
Kvyatkovsky K.S. Crimes in the field of computer information, computer crimes and cybercrime: correlation of concepts // Young scientist. 2022. No. 42 (437). pp. 108-112.
Kostyuk M.F. Digital technologies as a means of committing crimes in the sphere of economics and their legal assessment // Problems of Law. 2022. No. 4 (87). pp. 128-131.
Musatenko A.E. Criminalistic characteristics of crimes in the field of computer information // In the collection: Actual problems of modern legal science and practice. Collection of scientific articles based on the materials of the All-Russian student scientific conference with international participation. St. Petersburg, 2022. pp. 250-255.
Nafikova E.R., Khabibullina G.A. Some aspects of criminalistic characteristics of crimes in the field of computer information // In the collection: The legal system and the challenges of modernity. Collection of materials of the XVIII International Scientific Conference of students, postgraduates and young scientists. Ufa, 2021. pp. 289-293.
Rodina E.A. Cyberspace as a criminological category // Bulletin of the Kazan Law Institute of the Ministry of Internal Affairs of Russia. 2021. Vol. 12. No. 1 (43). pp. 66-71.
Rozhneva A.A. Criminalistic characteristics of crimes in the field of computer information // Alley of Science. 2022. Vol. 1. No. 8 (71). pp. 187-193.
Sukhoverkhov A.I. Problems of investigation of crimes in the field of computer information // In the collection: Global and local trends in management, economics, law. Materials of the XIX International Scientific and Practical Conference. In 4 volumes. Under the general editorship of N.V. Lebedev. Voronezh, 2022. pp. 454-460.
Khvartskiya A.R. Computer crimes: approaches to understanding // In the collection: Norm. Law. Legislation. Right. collection of materials of the XXIII International Scientific and Practical Conference of Young scientists. Perm, 2021. pp. 996-999.
Keywords:
crimes in the field of computer information, computer technology, computer networks, computer literacy, electronic environment, public safety..


Related Articles

ECONOMIC HISTORY Pages: 48-56 DOI: 10.33693/2658-4654-2023-5-2-48-56 Issue №23873
State Policy in the Field of Computer Technology Development in the 1950s: Achievements and Blocking Factors
scientific and technical policy industrial policy computer technology automation.
Show more
CURRENT PROBLEMS OF TRAINING AND DEVELOPMENT OF INTERNAL AFFAIRS STAFF IN MODERN CONDITIONS Pages: 54-59 Issue №23752
Fire Training as an Important Component of the Professional Training of Police Officers
police officers fire training digitalization of education accessibility of education computer technology
Show more
ECONOMIC HISTORY Pages: 81-89 DOI: 10.33693/2658-4654-2023-5-3-81-89 Issue №23446
The Development of Computer Technology in the First Half of the 1960s: Attempts to Overcome the Backlog
computer technology state scientific and technical policy science production technological lag.
Show more
ECONOMIC HISTORY Pages: 2658-4654 DOI: 10.33693/2658-4654-2023-5-3-81-89 Issue №
The Development of Computer Technology in the First Half of the 1960s: Attempts to Overcome the Backlog
computer technology state scientific and technical policy science production technological lag.
Show more
2. CURRENT PROBLEMS OF TRAINING AND DEVELOPMENT OF INTERNAL AFFAIRS STAFF IN MODERN CONDITIONS Pages: 87-90 Issue №19269
Application of Modern Educational Technologies in Physical Training Classes with Listeners of Educational Organizations of the MIA of Russia
physical training trainees distance education technologies electronic environment
Show more
5. CRIMINAL LAW AND CRIMINOLOGY; CRIMINAL ENFORCEMENT LAW Pages: 121-123 Issue №16680
Legal regulation of responsibility for crimes in the field of computer information: problems and prospects for development
computer information digital information crimes in the field of computer information criminal liability legal regulation of the institution of responsibility
Show more
Criminal law Pages: 140-144 Issue №23832
Modern Model of Interaction of Criminal Executive Inspections with Internal Affairs Bodies
interaction criminal executive inspections internal affairs bodies prevention crimes
Show more
Criminal law Pages: 236-243 Issue №23832
The Use of Computer Technology in the Investigation of Crimes Related to Violation of Labor Protection and Safety Requirements
crime investigation computer technology labor protection safety evidence-based information
Show more
8. Criminal procedure Pages: 168-172 Issue №15895
ELECTRONIC EVIDENCE" IN THE CRIMINAL PROCEDURAL EVIDENTIAL LAW
criminal procedural evidence law electronic evidence sources of evidence computer technology
Show more
CRIMINAL LAW (5.1.4.) Pages: 223-227 Issue №24238
Cyberspace as a Resource Base for the Spread of Terrorism
cyberspace terrorism public safety victimization computer literacy
Show more