Since the 1990s, when the first computers were introduced as workplace tools and the technological expansion began, computers, information technologies, and the internet have become an indispensable part of our daily lives. Computers are now an essential tool in all aspects of life, including business, telecommunications, and personal use. Given the increased use of information technologies in our businesses and daily lives, it is not surprising that computer-related crimes are on the rise. The widespread use of computers in our society has resulted in a rapid rise in issues and problems associated with crime, particularly cybercrime. As cybercrime committed via the internet and computer networks becomes more prevalent, courts require technical personnel who are experts in this field. The proper legal framework and division of investigative responsibility are not always clear. Law enforcement faces new challenges as it works to improve its capacity to investigate and prosecute cybercrime. This paper discusses crime scene management for cybercrime criminal offenses. So, we aim to research and present in the most meaningful way what the crime scene is, how site inspection is carried out, how the crime scene is preserved and secured, and what the crime scene documentation is, knowing that traces and material evidence in cybercrime cases occupy a special place in the investigative process. Received: 17 November 2022 / Accepted: 12 February 2023 / Published: 5 March 2023
Magna Carta in 1215 and 1789 from the French Revolution in parallel to globalization of human rights all over the world to this day and the state based on the rule of law and forms of government have improved. Therefore, the importance of individual human rights has increased alongside the community rights. The Internet has emerged as a closed circuit in which the computer is connected to withstand up to 1960. The first day, this day of information systems that have manifested themselves in all areas of human existence and has been an integral part of human existence. Knowledge is one of the most important values of modern life. Every day, government agencies and private organizations collect, store, process and transfer significant amounts of data about individuals. This is a natural reflection of the situation has been in government. Protection of personal data is a right of individuals against unauthorized use of their data by other persons or organizations. Especially after 2002 indicate the presence of public institutions in Turkey as well as to offer their digital services to citizens in both. Personal Data related to the establishment of this right The Law on the Protection of the Conservation was passed by the Turkish Grand National Assembly on March 24, 2016. has been enacted. One of the most used services offered by the staff of public institutions and staff to their email. In our study, government extension and content of the person's own e-mail account does not belong to the state providing services it has been examined in the light of the Law on the Protection of Personal Data in Turkey and international regulations in this field. Received: 11 August 2021 / Accepted: 7 January 2022 / Published: 5 March 2022
Since the first moment of the history of humanity, various means of evidence and evidence have been used to reach and detect the offender. As crime types and means of crime have changed and evolved, evidence detection and analysis methods have changed over time. At this point, with the rapid advancement of technology, the emergence of various and new types of crime that can affect many people at the same time in the global world is inevitable. Wherever you are in the world, it is now possible to commit crimes in one way or another that affect one or more people on the other side of the world through the Internet and digital systems. This, in turn, has led states to safeguard their cyber security. For this reason, firstly, it has made a legal regulation to protect its own citizens in domestic law and then it has been forced to cooperate internationally. The way in which classic crime types are committed and the method of evidence is different from the crimes committed through digital systems. The main purpose of the methods of obtaining and proving evidence is to reveal the material truth for a past event. There are also legal requirements, technical methods and scientifically accepted methodologies that must be followed when uncovering material truth. Because digital evidence is both different and more open to manipulation than other classical proofs, it is a matter of adherence to laws and technical rules when obtaining evidence. In order to obtain digital evidence in the Code of Criminal Procedure No. 5271; It has been arranged as a search, copy and seizure protection measure in computers, computer programs and files. Although the heading of the respective substance is initially considered only as a protection measure for computers, it will find application for all devices and systems containing digital data, as detailed below. Received: 5 June 2021 / Accepted: 15 July 2021 / Published: 5 September 2021
Evidence is an important concept in order to reveal whether a crime really exists or not and integrate it with all its elements. There are numerous methods of crime scene investigation in forensic cases. During the judgment phase, the most important factor that will help understand and decide the manner in which the incident took place is the evidence that will provide proof with regard to the incident. Therefore, evidence helps prosecutors and judges correctly understand and establish the relationship between the crime and the criminals and prove the committed crime and ensure correct, fair and rapid execution of the trial with the aim of reaching the material truth. Evidence obtained in the crime scene provides information with regard to the manner in which the crime was committed, the time of the crime, thebehaviour of the perpetrator, the suspect, the victim and the crime scene ensuring the establishment of the relationship between them. On the other hand, with the digital systems gaining more placein the life of the society, the crime scene has shifted from a physical environment to a digital one. Consequently, new types of crimes are committed digitally and as a result, the concept of digital evidence has arisen. There are no specific laws on the collection of digital evidence under Kosovo's legislation. On the other hand, there are legal regulations regarding digital evidence in exemplary countries such as Turkey. This study will comprise of the methods of gathering evidence in forensic cases and the comparison of the legal legislation on digital evidence in Kosovo and Turkey. Received: 5 June 2021 / Accepted: 15 July 2021 / Published: 5 September 2021
In the last century, it has been emphasized that children differ from adults and that they should be protected, and many national and international regulations have been made to ensure the rights of children, including children who are delinquents. Despite all the importance given to children, many wars and efforts for their sake, they can be the subject or victim of the crime as adults, or they can be the perpetrators of the crime themselves. For this reason, juvenile delinquency has been a highly debated issue in the legal world due to different worldviews that aim to define its full meaning. Given that the factors affecting juvenile delinquency vary according to conditions and countries, its determination is of great importance. For this reason, the laws that guarantee that the child has the right to life, protection, development and participation aim to provide social justice for all children. This paper presents general insights into the dominant factors influencing juvenile delinquency as well as research using qualitative, statistical and legal-dogmatic methods, which are the main reasons supporting the emergence of juvenile delinquency in the city of Fushe Kosova. Received: 26 July 2021 / Accepted: 26 October 2021 / Published: 5 November 2021
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.