The aim of the study is to analyze in depth and further develop the existing theoretical and practical developments of domestic and foreign specialists in the field of investigation of crimes related to information technology. On the basis of studying and researching different points of view of specialists in this field, - to reveal and analyze different approaches of scientists to the formation of discussion questions. According to the purpose of the research, the article uses: dialectical, system-structural, formal-logic, statistical, comparative, as well as some sociological methods. The specificity and complexity in the investigation of such cases lies in the fact that this type of crime has no territorial or spatial limitations, and th...
Desde los comienzos de la era de la información han existido seresgeniales, creadores, aventureros, ...
Globalization and economic transformations have made possible the development and massproduction of ...
This article analyses the crime of cyber espionage, with an emphasis on its definition and delimitat...
The aim of the study is to analyze in depth and further develop the existing theoretical and practic...
Due to the evolution of the Internet and new technologies, new criminal forms have emerged through ...
The purpose of this article is to analyse some terminological issues surrounding the study of the ma...
The aim of this paper work is to deeply analyse the phenomenon of cyber crime. On the one hand we w...
The aim of this research is to examine levels of social cybervictimization in relation to an analyz...
This article describes and analyses the evolution and conceptual framework of computer crime raised ...
Cybercrime is a dangerous consequence of the evolution of information technology. This is how it is ...
The article develops a new approach to computer crime, which consists in the forensic differentiatio...
Este trabalho tem como objetivo apresentar crimes cibernéticos de forma analítica no âmbito da s...
The development that technology has experienced today has caused a considerable impact on crime, tra...
Este artículo está basado en una parte de mi Trabajo Final del Máster, dirigido por Alejandro Bia Pl...
This article aims to analyze the view of different authors about emergence of cybercrime in the terr...
Desde los comienzos de la era de la información han existido seresgeniales, creadores, aventureros, ...
Globalization and economic transformations have made possible the development and massproduction of ...
This article analyses the crime of cyber espionage, with an emphasis on its definition and delimitat...
The aim of the study is to analyze in depth and further develop the existing theoretical and practic...
Due to the evolution of the Internet and new technologies, new criminal forms have emerged through ...
The purpose of this article is to analyse some terminological issues surrounding the study of the ma...
The aim of this paper work is to deeply analyse the phenomenon of cyber crime. On the one hand we w...
The aim of this research is to examine levels of social cybervictimization in relation to an analyz...
This article describes and analyses the evolution and conceptual framework of computer crime raised ...
Cybercrime is a dangerous consequence of the evolution of information technology. This is how it is ...
The article develops a new approach to computer crime, which consists in the forensic differentiatio...
Este trabalho tem como objetivo apresentar crimes cibernéticos de forma analítica no âmbito da s...
The development that technology has experienced today has caused a considerable impact on crime, tra...
Este artículo está basado en una parte de mi Trabajo Final del Máster, dirigido por Alejandro Bia Pl...
This article aims to analyze the view of different authors about emergence of cybercrime in the terr...
Desde los comienzos de la era de la información han existido seresgeniales, creadores, aventureros, ...
Globalization and economic transformations have made possible the development and massproduction of ...
This article analyses the crime of cyber espionage, with an emphasis on its definition and delimitat...