International Electronic Journal of Mathematics Education

Criminological Analysis of Determinants of Cybercrime Technologies
  • Article Type: Research Article
  • International Electronic Journal of Mathematics Education, 2016 - Volume 11 Issue 5, pp. 1127-1134
  • Published Online: 02 Aug 2016
  • Article Views: 944 | Article Download: 970
  • Open Access Full Text (PDF)
AMA 10th edition
In-text citation: (1), (2), (3), etc.
Reference: Tatarinova LF, Shakirov KN, Tatarinov DV. Criminological Analysis of Determinants of Cybercrime Technologies. Int Elect J Math Ed. 2016;11(5), 1127-1134.
APA 6th edition
In-text citation: (Tatarinova et al., 2016)
Reference: Tatarinova, L. F., Shakirov, K. N., & Tatarinov, D. V. (2016). Criminological Analysis of Determinants of Cybercrime Technologies. International Electronic Journal of Mathematics Education, 11(5), 1127-1134.
Chicago
In-text citation: (Tatarinova et al., 2016)
Reference: Tatarinova, Lola F., Karimzhan N. Shakirov, and Danila V. Tatarinov. "Criminological Analysis of Determinants of Cybercrime Technologies". International Electronic Journal of Mathematics Education 2016 11 no. 5 (2016): 1127-1134.
Harvard
In-text citation: (Tatarinova et al., 2016)
Reference: Tatarinova, L. F., Shakirov, K. N., and Tatarinov, D. V. (2016). Criminological Analysis of Determinants of Cybercrime Technologies. International Electronic Journal of Mathematics Education, 11(5), pp. 1127-1134.
MLA
In-text citation: (Tatarinova et al., 2016)
Reference: Tatarinova, Lola F. et al. "Criminological Analysis of Determinants of Cybercrime Technologies". International Electronic Journal of Mathematics Education, vol. 11, no. 5, 2016, pp. 1127-1134.
Vancouver
In-text citation: (1), (2), (3), etc.
Reference: Tatarinova LF, Shakirov KN, Tatarinov DV. Criminological Analysis of Determinants of Cybercrime Technologies. Int Elect J Math Ed. 2016;11(5):1127-34.

Abstract

An important task, the government, particularly law enforcement officers and scientists, faces in the rapid development of information technologies, is to prevent crimes committed with their application. Comprehensive analysis of the criminological characteristics of computer crimes, which is the aim of this study, provides an opportunity to identify the motives of these crimes to determine the most effective ways to eliminate them, as well as to work out the best ways and investigation means of criminal cases in this category. One of the fundamental structural elements of the national security of any state in the period of cyberspace development is to protect all information resources and communication networks against criminal assault. A complete analysis of computer crimes requires the understanding of motivation of illegal intrusion into information systems in order to obtain the information, stored in them, as well as using the opportunities provided by these systems or disabling the whole system or its components. The statement above is confirmed by the global use of computer technologies, information and communication networks.

References

  • Al-Alosi, H. (2016) The role of bystanders in cyberbullying. Precedent NSW Conference in the Sydney, 132, 20-24.
  • Alazab, M. & Broadhurst, R. (2015) The Role of Spam in Cybercrime: Data from the Australian Cybercrime Pilot Observatory. Cybercrime Risks and Responses. Palgrave Macmillan, 103-120.
  • Angus, C. (2016) Cyberbullying of children. Parliament of NSW Government, 1-22.
  • Arntfield, M. (2015) Toward a Cybervictimology: Cyberbullying, Routine Activities Theory, and the Anti-Sociality of Social Media. Canadian Journal of Communication, 40(3), 138-144.
  • Chalmers, C., Campbell, M., Spears, B., Butler, D., Cross, D., Slee, P. & Kift, S. (2016) School policies on bullying and cyberbullying: perspectives across three Australian states. Educational Research, 58, 91-92.
  • Clairmont, D., & Waters, K. (2015) The Nova Scotia Restorative Justice Program. Dalhousie: Dalhousie University. 104p.
  • Cross, D. (2016) Longitudinal impact of the Cyber Friendly Schools program on adolescents’ cyberbullying behavior. Aggressive behavior, 42(2), 166-180.
  • Driscoll, K. (2016) Cyber safety and security for Reduced Crew Operations. Integrated Communications Navigation and Surveillance, 1-21. .
  • Hopkins S. & Ostini J. (2015) Digitized Domestic Violence: Technology Abuse is a Feminist Issue. Media, Technology, 23-25.
  • Hughes, M. (2015) Facing Cyberbullying: A National Implementation Plan. The London Anti-Bullying Coalition, 1-28.
  • Kerstens J. & Jansen J. (2016) The Victim–Perpetrator Overlap in Financial Cybercrime: Evidence and Reflection on the Overlap of Youth’s On-Line Victimization and Perpetration. Deviant Behavior, 37(5), 585-600.
  • Lee, M. (2015) Sexting among young people: Perceptions and practices. Trends & Issues in Crime and Criminal Justice, 508, 1-35.
  • Leukfeldt, E .R. (2015a) Organised Cybercrime and Social Opportunity Structures. A Proposal for Future Research Directions. European Review of Organised Crime, 2, 91-103.
  • Leukfeldt, E. R. (2015b) Comparing victims of phishing and malware attacks: Unraveling risk factors and possibilities for situational crime prevention. arXiv preprint arXiv, 1506.00769
  • Leukfeldt, E. R., Kleemans, E. R. & Stol, W. P. (2016) Cybercriminal Networks, Social Ties and Online Forums. British Journal of Criminology, 9, 35-44.
  • Moise, A. C. (2015) Some Considerations on the Phenomenon of Cyberterrorism. Law Annals Titu Maiorescu, 5, 146.
  • Murashbekov, O. B. (2015) Methods for Cybercrime Fighting Improvement in Developed Countries. The Journal of Internet Banking and Commerce, 5, 24-29.
  • Musa, M. K. (2015) Cyber Stalking: Social Issues of Harassment on Internet. Direct access: idosi.org/aejaes/jaes15(tesms)15/2.pdf
  • Taivo, R. (2015) Cyber Behavior. Encyclopedia of Information Science and Technology, 3rd Edition, Hershey, 638-646.
  • Williams M., & Pearson O. (2016) Hate Crime and Bullying in the Age of Social Media. Current Perspectives. Hate Crime Awareness Week, 35, 25-26.

License

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.