MEASURES OF CRIME CONCEALING WITH USE OF INFORMATION TECHNOLOGIES

被引:0
|
作者
Malyshkin, P. V. [1 ]
机构
[1] Ogarev Mordovia State Univ, Law, Kovylkino Campus,26 Zheljabova Str, Kovylkino, Russia
来源
关键词
resistance to crime investigations; crimes committed with the use of information technologies; ways of concealing crimes; criminal staging;
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The article reveals the importance of effectiveness of countermeasures against resistance to investigation. It should be noted that dominating usage of criminal staging does not assume nonapplication of other concealing measures with use of information technologies. They are in use too, but much more seldom than staging. Besides, hacker attacks, made for distracting from a committed crime, obtain currency. One of countermeasures against investigation is concealing measures with use of information technologies, such as imitation of technical malfunction. Information technologies develop, and so do the concealing measures. One of peculiarities of computer crimes is the fact that the way and the mechanism of committing of it usually includes actions, aimed at concealing of the crime, in the first instance, hiding of a fact of a crime. The article also deals with other concealing measures with use of information technologies.
引用
收藏
页码:42 / 47
页数:6
相关论文
共 50 条
  • [21] USE OF INFORMATION MEASURES TO EVALUATE RESEARCH
    MCDONALD, DD
    PROCEEDINGS OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE, 1979, 16 : 82 - 90
  • [22] An assistant tool for concealing personal information in text
    Iwakura, Tomoya
    Okamoto, Seishi
    HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: INTERACTING IN INFORMATION ENVIRONMENTS, PT 2, PROCEEDINGS, 2007, 4558 : 38 - +
  • [23] Measures of positive adult behavior and their relationship to crime and substance use
    Kosterman, R
    Hawkins, JD
    Abbott, RD
    Hill, KG
    Herrenkohl, TI
    Catalano, RF
    PREVENTION SCIENCE, 2005, 6 (01) : 21 - 33
  • [24] Analysis of network protocols the ability of concealing the information
    Noskov, Anton
    Jakab, Frantisek
    2016 INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA), 2016,
  • [25] Assistant tool for concealing personal information in text
    Iwakura, Tomoya
    Okamoto, Seishi
    Matsui, Kunio
    Fujitsu Scientific and Technical Journal, 2007, 43 (02): : 212 - 219
  • [26] Measures of Positive Adult Behavior and Their Relationship to Crime and Substance Use
    Rick Kosterman
    J. David Hawkins
    Robert D. Abbott
    Karl G. Hill
    Todd I. Herrenkohl
    Richard F. Catalano
    Prevention Science, 2005, 6 : 21 - 33
  • [27] DNA-inspired information concealing: A survey
    Kencl, Lukas
    Loebl, Martin
    COMPUTER SCIENCE REVIEW, 2010, 4 (04) : 251 - 262
  • [28] Assistant tool for concealing personal information in text
    Iwakura, Tomoya
    Okamoto, Seishi
    Matsui, Kunio
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2007, 43 (02): : 212 - 219
  • [29] Intentions to use information technologies: An integrative model
    Thompson, Ron
    Compeau, Deborah
    Higgins, Chris
    Journal of Organizational and End User Computing, 2006, 18 (03) : 25 - 46
  • [30] The Use of Information and Communication Technologies by Elderly People
    Ivankina, L. I.
    Trubchenko, T. G.
    Krukovac, E. M.
    Shaidullina, A. R.
    Shaftelskaya, N. V.
    Chernyak, V. K.
    III INTERNATIONAL SCIENTIFIC SYMPOSIUM ON LIFELONG WELLBEING IN THE WORLD (WELLSO 2016), 2017, 19 : 235 - 242