U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Preventing Fraud Using Computer Networks

NCJ Number
248042
Journal
Internal Security Volume: 5 Issue: 2 Dated: July-December 2013 Pages: 63-75
Author(s)
Serhiy Vladimirovich Shapochka
Date Published
December 2013
Length
13 pages
Annotation
In the article the author studies and analyzes the general theoretical writings of experts in the field of criminal law, criminology and criminal executive law related to the study of determinants of property crime, and information and statistics in the sphere of the global Internet and computer and telecommunication devices.
Abstract
A classification of computers as communication tools for the achievement of the information society in terms of its global contemporary possibilities is presented. Appropriate conclusions are drawn. The Council of Europe Convention on Cybercrime of 23 November 2001, the legislation of Ukraine, Russian Federation and United States are analyzed. The questions of prevention of fraud, perpetrated with the use of computer networks, the issues of cyber security were discussed. Concrete proposals on how to eliminate conditions conducive to the commission of cyber fraud are made and ways of effectively countering fraud committed through computer and telecommunications devices and computer networks are proposed. The prerequisites for the birth and development of the World Wide Web are studied, and the dynamics of the growth in the number of users in the world, Europe, Asia, United States, and Ukraine are analyzed. Conclusions about the credibility of statistics on the number of active users of computer and telecommunication networks are drawn, the way they are counted, factors affecting data corruption, along with consideration for their most effective use. The reasons for passivity, lack of effectiveness of the security structures of the private sector in the fight against criminal encroachments using computer networks and technologies are identified. (Published Abstract)

Downloads

No download available

Availability