MEASURES OF CRIME CONCEALING WITH USE OF INFORMATION TECHNOLOGIES

被引:0
|
作者
Malyshkin, P. V. [1 ]
机构
[1] Ogarev Mordovia State Univ, Law, Kovylkino Campus,26 Zheljabova Str, Kovylkino, Russia
来源
关键词
resistance to crime investigations; crimes committed with the use of information technologies; ways of concealing crimes; criminal staging;
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The article reveals the importance of effectiveness of countermeasures against resistance to investigation. It should be noted that dominating usage of criminal staging does not assume nonapplication of other concealing measures with use of information technologies. They are in use too, but much more seldom than staging. Besides, hacker attacks, made for distracting from a committed crime, obtain currency. One of countermeasures against investigation is concealing measures with use of information technologies, such as imitation of technical malfunction. Information technologies develop, and so do the concealing measures. One of peculiarities of computer crimes is the fact that the way and the mechanism of committing of it usually includes actions, aimed at concealing of the crime, in the first instance, hiding of a fact of a crime. The article also deals with other concealing measures with use of information technologies.
引用
收藏
页码:42 / 47
页数:6
相关论文
共 50 条
  • [1] Information Communication Technologies in crime prevention
    Aguirre Sala, Jorge Francisco
    URVIO-REVISTA LATINOAMERICANA DE ESTUDIOS DE SEGURIDAD, 2016, (18): : 90 - 103
  • [2] Information concealing games
    Sarkar, Saswati
    Altman, Eitan
    El-Azouzi, Rachid
    Hayel, Yezekael
    27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 166 - 170
  • [3] Information Concealing Games
    Sarkar, Saswati
    Altman, Eitan
    Vaidyanathan, Pramod
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (09) : 4608 - 4630
  • [4] INFORMATION TECHNIQUES AND CRIME - FORMS AND SECURITY MEASURES
    POERTING, P
    BETRIEBSWIRTSCHAFTLICHE FORSCHUNG UND PRAXIS, 1990, 42 (03): : 177 - 187
  • [5] The Firm as a Means of Concealing Information
    Li, Shiqiang
    LABOUR-ENGLAND, 2011, 25 (04): : 468 - 484
  • [6] Crime control in the sphere of information technologies in the Republic of Turkey
    Shukan, Aliya
    Abdizhami, Aitugan
    Ospanova, Gulnar
    Abdakimova, Dana
    DIGITAL INVESTIGATION, 2019, 30 : 94 - 100
  • [7] ELECTRICITY USE IN INFORMATION TECHNOLOGIES
    NORFORD, L
    HATCHER, A
    HARRIS, J
    ROTURIER, J
    YU, O
    ANNUAL REVIEW OF ENERGY, 1990, 15 : 423 - 453
  • [8] On the robustness of concealing cost information in oligopoly
    Hornig, Stephan O.
    Stadler, Manfred
    ECONOMICS BULLETIN, 2006, 12
  • [9] Technologies of speed, technologies of crime
    Bell, DF
    YALE FRENCH STUDIES, 2005, (108) : 8 - 19
  • [10] Mothers' Use of Information and Communication Technologies for Information Seeking
    Jang, Juyoung
    Dworkin, Jodi
    Hessel, Heather
    CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING, 2015, 18 (04) : 221 - 227