Cybercrime analysis in economic security
DOI:
https://doi.org/10.20535/2411-1031.2013.2.1.57916Abstract
Some results were proposed based on conducted by authors a cybercrime analysis, which can consider as an economic security threat for enterprises. This analysis is made in borders of current legislation of Ukraine and some international regulatory acts. In addition, a statistical condition data are shown in specified problem area, based on which the conclusions and recommendations were formed. Some cur-rent international regulatory acts were shown in some details, which are directed to improve the state of affairs in the cybercrime.
References
Geer D. Subcommittee on Emerging Threats, Cybersecurity, and Science and Tech-nology. Geer Risk Services, LLC. [Electronic Resource] – Mode of access: http://www.verdasys.com/mt_geer.php.
Kavun S.V. Enterprise Insider Detection as an Integer Programming Problem. Intelli-gent Decision Technologies. / S.V. Kavun, I.V. Sorbat, V.V.Kalashnikov // Smart Innovation, Systems and Technologies. – 2012. – № 16 (2). – P. 281–289.
Kavun. S. Management of corporate security: new approaches and future challenges [Electronic Resource] / S. Kavun, S. R. Brumnik // Cyber security challenges for critical infra-structure protection. –Ljubljana: Institute for Corporate Security Studies. – 2013. – P. 141–151. – Mode of access: http://www.ics-institut.com/research/books/5.
Алавердов О. С. Международное сотрудничество в области борьбы с интернет-преступностью / О.С. Алавердов // Общество и право. – № 3. – 2010. – С. 165–167.
Бочаров Ю. Киберпреступность и кибертерроризм. Новая глобальная угроза государственному строю. [Электронный ресурс] / Ю.Бочаров // International expert Center for Electoral Systems (ICES) – Режим доступа: http://www.elections-ices.org/russian/publications/textid:12835.
Бураева Л.А. Глобализация информационных процессов и рост киберпреступности. [Электронный ресурс] / Л.А. Бураева // Экономика. Право. Менеджмент: современные проблемы и тенденции развития (Материалы II Международной научно-практической конференции, 31 августа 2012). – Режим доступа: http://www.apriori-nauka.ru/uploads/files/BURAEVA-K10.pdf.
Конвенція про кіберзлочинність. Рада Європи; Конвенція, Міжнародний доку-мент від 23.11.2001. [Электронный ресурс] // Офіційний вісник України – 2007. – № 65. – С. 107, ст. 2535.– Режим доступу: http://zakon2.rada.gov.ua/laws/show/994_575.
Чекунов И.Г. Современные киберугрозы. Уголовно-правовая и криминологиче-ская классификация и квалификация киберпреступлений / И.Г. Чекунов // Право и кибер-безопасность. – 2012. – № 1. – С. 23–38.
Кавун С. В. Информационная безопасность в бизнесе. Монография / С. В. Кавун. – Харьков: ХНЭУ, 2007. – 408 с
ФБР расследует взлом твиттера Associated Press. [Электронный ресурс]. – Режим доступа: http://lenta.ru/news/2013/04/24/investigation.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Collection "Information technology and security"
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors that are published in this collection, agree to the following terms:
- The authors reserve the right to authorship of their work and pass the collection right of first publication this work is licensed under the Creative Commons Attribution License, which allows others to freely distribute the published work with the obligatory reference to the authors of the original work and the first publication of the work in this collection.
- The authors have the right to conclude an agreement on exclusive distribution of the work in the form in which it was published this anthology (for example, to place the work in a digital repository institution or to publish in the structure of the monograph), provided that references to the first publication of the work in this collection.
- Policy of the journal allows and encourages the placement of authors on the Internet (for example, in storage facilities or on personal web sites) the manuscript of the work, prior to the submission of the manuscript to the editor, and during its editorial processing, as it contributes to productive scientific discussion and positive effect on the efficiency and dynamics of citations of published work (see The Effect of Open Access).