KPol 2021
DOI: 10.51738/kpolisa2021.18.2p.1.04
|View full text |Cite
|
Sign up to set email alerts
|

Methodology of Detection of Computer Crime Offenses

Abstract: Computer crime is characterized by an exceptional phenomenological diversity that complicates its unique and precise conceptual definition, and the permanent intensive development of computer technologies contributes to the constant expansion of its forms and poses increasing challenges to the authorities responsible for combating it. After a brief review of the concept and importance of criminology as a science, and criminological methodology as a branch of criminology, and the conceptual definition and basic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…Even the penetration of the computer system represents damage in itself, and the deed is completed. 11 Therefore, although the opposite could be argued, we believe that, bearing in mind the peculiarity of computer crime, it can be considered that the consequence of the action -hacking -occurred on the territory of the country where the specific computer system is located. In addition, the country in whose territory the computer system that is attacked has the strongest interest in prosecuting the attackers of that computer system.…”
Section: Standards Contained In the Documents Of The Council Of Europ...mentioning
confidence: 96%
“…Even the penetration of the computer system represents damage in itself, and the deed is completed. 11 Therefore, although the opposite could be argued, we believe that, bearing in mind the peculiarity of computer crime, it can be considered that the consequence of the action -hacking -occurred on the territory of the country where the specific computer system is located. In addition, the country in whose territory the computer system that is attacked has the strongest interest in prosecuting the attackers of that computer system.…”
Section: Standards Contained In the Documents Of The Council Of Europ...mentioning
confidence: 96%