Semantics of Computer Crime in the EC/RAUF ÖZARSLAN (original) (raw)

The ways of computer use and its role in the commission of criminal acts

1St International Symposium on Computing in Informatics and Mathematics, 2013

In this article there is presented the role of computer use in the commission of offenses, serious consequences from these illegal acts, as well as measures to prevent them. Through this paper we have attempted to handle the computer in relation to crime in four different plans: Computer systems are presented as targets when they are attacked, in order to change the data or crush them. These systems are introduced as a means of committing criminal acts (modus operandi) because computer processes used to enable, facilitate and expedite the realization of certain criminal acts. Computer often used as a mechanism of stash, planning and organization in the commitment of criminal action. Offenders in the computer field, by using computer systems perform criminal acts in the form of fraud, by manipulating data in order to benefit illegally. These illegal actions affect electronic commerce, banking, private investments etc. A special attention in this paper is devoted the computer system, as an instrument that prevent and prove criminal acts. Through information technology, state domestic authorities and overseas exchange accurate and rapid information in order to precede criminal acts. At the end of the paper are identified computer offences and legal measures that authorities should take in order to isolate the criminal acts.

Criminal law aspects of computer crime

Parallel to the enormous technological advances of the late 20th century in terms of the strong development of modern information technology, there is also the problem of the use of computers in various fields of human activity. This issue includes a lot of important issues and it should be noted that the general impression that the legislation is lagging behind technological development. This paper discusses the most common forms of computer crime from which it is clear from the kind of issues encountered legal systems into their national legislation must provide penal provisions relating to offenses of computer crime.

Computer crime forms and mechanism for security and protection

2019

The constant technology development in the past seven decades has made the computers necessary in all areas of modern life, for which also influence the decreasing of the technology’s today's price, especially of computers as a big part that now can be found in almost every home and in every human being hands. As a tool that speeds up every work and facilitates access to information, it's hard to imagine modern life without the use of a computer. Unfortunately, the emergence of computers and the further development of technology have led to the emergence of new forms of criminal offenses and new ways of their execution. The way the computer is used is suitable for knowledge of the workings with a computer of the average person, so that potential perpetrator of crimes can be anyone, and the global use of the Internet allows such works to be made everywhere in the world. Criminals exploit the enormous speed, simplicity and, above all, the "anonymity" offered by moder...

Criminality and the new information and communication technologies

This work aims to present concepts related to crime in the face of new information and communication technologies. Methodologically, articles and books were used in addition to the legislation dealing with the matter, in particular the Brazilian Penal Code and Law 12.737/12 (Carolina Dieckmann Law). The increasing advance of technology, in addition to providing convenience to people, has expanded the possibility of commitment of crimes. Some already covered by traditional legislation, others needing new classification. In this context, after presenting fundamental notions to understand the topic — such as the concept of computer crime, classification, subjects and applicable legislation —, we sought to analyze some of the main computer crimes, especially the crime of computer device invasion. It was concluded that Criminal Law, in its purpose of protecting the most important legal assets, must act in order to curb the practice of computer crimes. In addition, despite the legislation covering a large part of the crimes committed on the network, the law must continue to update itself in the face of new threats, and the criminal offense of computer device invasion must be improved. Finally, it is addressed the difficulties related to the criminal investigation of this type of crime.

Information criminality - a phenomenon met within the informatics field

Computing Research Repository, 2010

The phenomenon described as "information criminality" has taken significant proportions in the last decade, fact that carried out towards an international legislative frame, by implementing judicial forms, which might stop its occurrences. As matter of fact, the information criminality represents an information technology aiming towards fraud and prejudicing the users of informational data, by various means to infringement of the law. In this way, some international organizations have dealt with performing a legislative framework, able to punish the phenomenon of information criminality and implicitly to protect the users of computers. The transnational expansions, extremely fast as concerns the computer networks, and extending the access to these networks, by means of mobile telephony, have brought the increasing of these systems' vulnerability and the creating of opportunities of breaking the law. Considering these aspects, the world legislation is continuously changing, due to a more and more accelerated development of the information technology.

“Computer Crime: Crisis or Beat-Up?”

2001

The increased use of computers and communications technologies over the preceding decade has created considerable apprehension in the international community that they are being put to illegal use of various kinds. Fears of wide-scale electronic vandalism, copyright infringement,

Computer related crime: The decision of the Council of Europe

Pravo - teorija i praksa, 2015

The significance of information and communication technologies has created the need to establish worldwide measures and mechanisms for the protection of both the society and individual against abuses in this area, through adopting appropriate legislative solutions and improving the international cooperation. The result of these efforts, among other things, is the adoption of the Council of Europe Convention on Cybercrime, which has, in the opinion of the international community, established minimum standards that are necessary to meet the national legislation in order to effectively combat the abuse of high technology. 2