Forensic Analysis of Crimes in the Sphere of Information Technologies
Abstract
The article deals with the issues of forensic support for preventing commission of crimes in the field of information technology. It is called to attention that although introduction of modern information processes in various spheres of government activities, production and public relations has brought positive results, it has also led to an increase in the cases of committing cyber crimes. Cyber crimes are a new phenomenon in general crime, therefore, the development of advanced techniques to combat them is required. In this process, the forensic science plays an important role, first of all, for the preparation of recommendations on methods for investigating cyber crimes. Forensic analysis of information technology crimes which are called cyber crimes indicates that their investigation is different from the investigation of other crimes. This is largely due to the fact that computer objects can be both means of committing such crimes and objects of criminal encroachment. Information stored on computer media can be perceived and evaluated solely by using computer equipment and digital technology. Without this, it is impossible to identify persons involved in committing a crime and obtain the evidence necessary to solve the crime. To study and evaluate them as sources of evidence, one needs to resort to the help of specialists, computer equipment and sophisticated software. It distinguishes computer objects from other material objects that is why it is necessary to put computer objects into a separate category of sources of evidence in forensic science and criminal procedure.
Key words: information technologies, cybercrimes, forensic science, pre-trial investigation, computer objects, proofs.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).