17,632 Hits in 7.6 sec

Innovative Technologies in Combating Cyber Crime

Azernikov A. D., Norkina A. N., Myseva E. R., Chicherov K. A.
2018 KnE Social Sciences  
of information security measures and an approach that is completely different from that applied to combating common crime.  ...  So far, development and enhancement of global communication networks, distribution of software, and upgrading of computer systems are accompanied by the evolution of criminal environment, with the latter  ...  Chapter 28, which led to an increase in cyber crime in Russia due to almost total impunity of criminals as contemporary Russian legislation is absolutely unadapted to new types of crime in the IT sphere  ... 
doi:10.18502/kss.v3i2.1550 fatcat:nsy7yvf5avgcporgxqew2lh6ry

Corruption Criminal Study in the Sphere of Russian Federation Local Government

Gulnaz M. Aglyamova, Dinara A. Musabirova, Mariya V. Talan, Radik N. Khamitov
2017 Tarih Kültür ve Sanat Araştırmaları Dergisi  
<p>The purpose of the study is the criminological analysis of a criminal identity who commits corruption crimes in the sphere of local self-government.  ...  Therefore, ti is necessary to pay attention to the mechanisms of disposition and sanction implementation concerning the norms of criminal legislation in law enforcement practice.</p>  ...  Acknowledgements The work is performed according to the Russian Government Program of Competitive Growth of Kazan Federal University.  ... 
doi:10.7596/taksad.v6i5.1264 fatcat:ijkdstibgngfzhfodsgbbx6vtu

Neuromonitoring and neuroclassification of crime events in distributed network

Le Trung Kien
2020 Revista Amazonía investiga  
A systematic analysis of the problem has been carried out, on the basis of which methods of transition from traditional monitoring of a specific (problem-oriented) criminal situation to intellectual, systemic  ...  Systemic analysis of criminal events and situations in some distributed network is a pressing problem not only of law enforcement structures, but also of the authorities, the whole society.  ...  Monitoring information "in the sphere of interest" of some distributed network is the result of implementation (under the corresponding hypotheses) of special procedures for obtaining and updating the  ... 
doi:10.34069/ai/2020.29.05.54 fatcat:jvyt2otyfvhnzieet6iktlaro4

White-Collar Cybercrime: Evaluating the Redefinition of a Criminological Artifact

Christopher Hamerton
2020 Journal of Law and Criminal Justice  
to the modern networked workplace.  ...  White-collar crime itself offers the rare example of a criminological theory that has the attributes of an artifact -establishing a distinct criminal offence type within law and criminal justice and entering  ...  Traditional cybercrime relates to immediately recognisable criminal behaviors with which the criminal justice system is familiar and which it regularly encounters; 2. Hybrid cybercrime.  ... 
doi:10.15640/jlcj.v8n2a6 fatcat:ppyxzadwyzajvdky5hmod6qo6m

Mind the Gap! Making Stronger Connections Between Hate Crime Policy and Scholarship

Neil Chakraborti
2015 Criminal Justice Policy Review  
This includes the limited reach of hate crime scholarship, and specifically the perception that academic theorising is often too detached from the everyday realities confronting those who respond to -or  ...  live with -the consequences of hate crime in the 'real world'.  ...  Over the course of this UKbased two-year study of hate crime victimization we heard from nearly 1,500 victims of hate crime, the majority of whom had little or no familiarity with the term 'hate crime'  ... 
doi:10.1177/0887403415599641 fatcat:w7salxg4kzbshbcp6t6i7sdwzi

Organized Crime in Europe: Conceptions and Realities

K. von Lampe
2008 Policing: A Journal of Policy and Practice  
While the seclusion is used to shield criminal activities from detection, criminal actors are familiar enough with the host culture to take some advantage of its infrastructure, including communication  ...  Control beyond illicit spheres In a number of cases territorial control of criminal groups is not confined to the underworld but also extends to legal businesses.  ... 
doi:10.1093/police/pan015 fatcat:uy7xsdw4czew7ks7u2veo75f74

Cybercrime: History of formation, current state and ways of counteraction

Viktoria Babanina, Iryna Tkachenko, Olena Matiushenko, Mykola Krutevych
2021 Revista Amazonía investiga  
In the course of the study, the differences between the concepts of "cybercrime" and "computer crimes" were identified, as well as the main features of cybercrimes.  ...  The factors contributing to the growth of cybercrime were also analyzed.  ...  Today, active implementation of information technologies in all spheres of activity has led to change of the list of crimes relating to economic.  ... 
doi:10.34069/ai/2021.38.02.10 fatcat:i4bph4vlrrgjlbf2sawbkdqxlq

Strictly business: Critical Theory and the society of rackets

Edward Granter
2017 Competition & Change  
This scenario will be familiar to those with an interest in contemporary organized crime, from Colombia and Mexico, to southern Italy, but the preceding vignette is, of course, the story of the Capone  ...  In doing to, I have tried to highlight the parallels between rackets in the criminal world, and in the sphere of business and politics.  ... 
doi:10.1177/1024529417690716 fatcat:vfazcr5tyngwxbnnjx5khlcvwy

Differentiating criminal networks in the illegal wildlife trade: organized, corporate and disorganized crime

Tanya Wyatt, Daan van Uhm, Angus Nurse
2020 Trends in Organized Crime  
involved criminal networks as well as predictions as to the future of these networks.  ...  Nowadays, this image has changed: criminal networks are believed to be highly involved in wildlife trafficking, which has become a significant area of illicit activity.  ...  The presence or absence of a legal trade and the amount of profit to be had from the species of wildlife seem to be relevant to which type of criminal group or network becomes involved.  ... 
doi:10.1007/s12117-020-09385-9 fatcat:f7qv3vznrve2jpm7t4jso3sbxq

Protecting the life and health of students from the negative impact of digital technologies

Elena Millerova, Igor Napkhanenko, Alexander Fedorov, D. Rudoy, A. Olshevskaya, N. Ugrekhelidze
2021 E3S Web of Conferences  
The article examines the problematic aspects of familiarizing minors with such information on the Internet, analyzes the norms of the Criminal Code of the Russian Federation, which provide for criminal  ...  As a result of the analysis of these criminal law norms, the authors have identified a number of gaps that need to be filled.  ...  Through this computer network, citizens perform their work in various spheres of life, spend their personal time.  ... 
doi:10.1051/e3sconf/202127310016 fatcat:qyijbyakvbgbbckf56hlbzrboq

Extralegal Agency and the Search for Safety in Northeast Brazil

Hollis Moore
2020 The Cambridge Journal of Anthropology  
An extralegal agency approach to analysing interconnected prison/urban fields, which decentres masculinized criminal organizations and resists romanticizing the rule of law, enables a disruption of dominant  ...  Extralegal agency is central to a practice of safety that represents an alternative to the dominant model of carceral security.  ...  Anthropologies of urban crime and criminalization overemphasize street crime, specifically offences that involve violence and organized groups.  ... 
doi:10.3167/cja.2020.380104 fatcat:nivl36ijrnavhltuehjzxhyptm

Cheats, Threats and Reflexivity: Organizational Narratives on Policing Organized and Economic Crime

Annette Vestby
2021 British Journal of Criminology  
WRC is a policy term denoting organized crime and economic offences (i.e. tax evasion, benefits fraud, labour exploitation and immigration law offences) and is framed as a threat to the viability of the  ...  While the concept signals an intent to coordinate across agencies, policing takes place within local and institutional contexts.  ...  ACKNOWLEDGEMENTS I am grateful for invaluable feedback from professor Helene O.I.  ... 
doi:10.1093/bjc/azab054 fatcat:qjdof3kijfdt7gh77onzpj24dm

Organized transnational crime in the Black Sea Region: a geopolitical dilemma?

Lada L. Roslycky
2009 Trends in Organized Crime  
To understand how, and why, states experience transnational organized crime as a national security threat differently, it is necessary to learn about the states and the culture of organized crime in the  ...  The objective here is to present the Post-Soviet Political Criminal Nexus as a part of the identity of Newly Independent States in the Black Sea Region (Azerbaijan, Georgia, Moldova and Ukraine) which  ...  However, to understand the Post-Soviet political criminal nexus as an existential threat to Newly Independent (western leaning) states in the Black Sea Region, it is necessary to be familiar with the specifics  ... 
doi:10.1007/s12117-008-9061-x fatcat:dyer7hbe2zfjtd7z4d5lbojpba

Cybercrime Case As Impact Development Of Communication Technology That Troubling Society

M Chairul Basrun Umanailo
2019 Figshare  
This article aims to analyse cybercrime in society as a model of crime that develops as the advancement of Internet technology.  ...  Through the simulation model, humans are framed in one space, which isidentified as real, even if it is a pseudo or mere imaginary that the emergence of cybercrime as human practice in public sphere is  ...  RESULT Along with the development of Internet technology, led to the emergence of crimes called "Cybercrime" or crimes through the Internet network.  ... 
doi:10.6084/m9.figshare.9890591 fatcat:u3y2oyz6evcmbmeyu5yqqugbwe

Crime and Justice in Digital Society: Towards a 'Digital Criminology'?

Greg Stratton, Anastasia Powell, Robin Cameron
2017 International Journal for Crime, Justice and Social Democracy  
entity and acknowledges the incorporation of digital technologies, media, and networks in our everyday lives (Lupton 2014), including in crime perpetration, victimisation and justice.  ...  In this article, we explore potential for an interdisciplinary concept of digital society to expand and inspire innovative crime and justice scholarship within an emerging field of 'digital criminology  ...  offender' theories that seek to explain technology as merely a tool in the commission of otherwise familiar crimes.  ... 
doi:10.5204/ijcjsd.v6i2.355 fatcat:dghakm25hraitfqmeo2gfczjjy
« Previous Showing results 1 — 15 out of 17,632 results