Skip to main content

Program Modeling in the Investigation of Crimes Against Cybersecurity in Russia

  • Conference paper
  • First Online:
Creativity in Intelligent Technologies and Data Science (CIT&DS 2019)

Abstract

In a series of recently conducted forensic studies related to methods of a criminal investigation in the sphere of computer information, scientifically interesting data about the constancy of connections of particular characteristics of these criminal actions have been obtained. On their basis, a researcher is supposed to build typical and then individual models of an event being investigated. As practice shows, such a problem is quite complicated for officials of preliminary investigation agencies since they have to choose necessary data from legal regulations and a wide range of reference materials (the Criminal Code, the Code of Criminal Procedure, federal laws, and other statutory acts regulating public relations in the sphere of information, information technologies, and protection of information, forensic scientific products, etc.), most of which don’t apply to a particular case under investigation. It appears that in present-day conditions of science and technology development this problem should be solved on the basis of forensic computer modeling.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kravets, E., Birukov, S., Pavlik, M.: Remote investigative actions as the evidentiary information management system. In: Kravets, A.G. (ed.) Big Data-driven World: Legislation Issues and Control Technologies. SSDC, vol. 181, pp. 95–103. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-01358-5_9

    Chapter  Google Scholar 

  2. Hyland, J.M., Hyland, P.K., Corcoran, L.: Cyber aggression and cyberbullying: widening the net. In: Jahankhani, H. (ed.) Cyber Criminology. ASTSA, pp. 47–68. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-97181-0_3

    Chapter  Google Scholar 

  3. Kravets, A.G., Bui, N.D., Al-Ashval, M.: Mobile security solution for enterprise network. In: Kravets, A., Shcherbakov, M., Kultsova, M., Iijima, T. (eds.) JCKBSE 2014. CCIS, vol. 466, pp. 371–382. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11854-3_31

    Chapter  Google Scholar 

  4. Saltykov, S., Rusyaeva, E., Kravets, A.G.: Typology of scientific constructions as an instrument of conceptual creativity. In: Kravets, A., Shcherbakov, M., Kultsova, M., Shabalina, O. (eds.) Creativity in Intelligent Technologies and Data Science. CCIS, vol. 535, pp. 41–57. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-23766-4_4

    Chapter  Google Scholar 

  5. Montasari, R., Hosseinian-Far, A., Hill, R.: Policies, innovative self-adaptive techniques and understanding psychology of cybersecurity to counter adversarial attacks in network and cyber environments. In: Jahankhani, H. (ed.) Cyber Criminology. ASTSA, pp. 71–93. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-97181-0_4

    Chapter  Google Scholar 

  6. Pournouri, S., Zargari, S., Akhgar, B.: Predicting the cyber attackers; a comparison of different classification techniques. In: Jahankhani, H. (ed.) Cyber Criminology. ASTSA, pp. 169–181. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-97181-0_8

    Chapter  Google Scholar 

  7. Quyên, L.X., Kravets, A.G.: Development of a protocol to ensure the safety of user data in social networks, based on the backes method. In: Kravets, A., Shcherbakov, M., Kultsova, M., Iijima, T. (eds.) JCKBSE 2014. CCIS, vol. 466, pp. 393–399. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11854-3_33

    Chapter  Google Scholar 

  8. Kananizadeh, S., Kononenko, K.: Development of dynamic protection against timing channels. Int. J. Inf. Secur. 16, 641 (2017). https://doi.org/10.1007/s10207-016-0356-7

    Article  Google Scholar 

  9. Vasilev, D., Kravets, E., Naumov, Y., Bulgakova, E., Bulgakov, V.: Analysis of the data used at oppugnancy of crimes in the oil and gas industry. In: Kravets, A.G. (ed.) Big Data-driven World: Legislation Issues and Control Technologies. SSDC, vol. 181, pp. 249–258. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-01358-5_22

    Chapter  Google Scholar 

  10. Yemelyanova, E., Khozikova, E., Kononov, A., Opaleva, A.: Counteracting the spread of socially dangerous information on the internet: a comparative legal study. In: Kravets, A.G. (ed.) Big Data-driven World: Legislation Issues and Control Technologies. SSDC, vol. 181, pp. 135–143. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-01358-5_13

    Chapter  Google Scholar 

  11. Nikonovich, S.L., Makeeva, I.V., Avdalyan, A.Ya., Likholetov, A.A., Mogutin R.I.: Qualification problems of credit card fraud. Int. J. Econ. Perspect. 11(3), 42 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Valentina Khorsheva .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Solovieva, N., Khorsheva, V., Likholetov, E., Naumov, Y., Kairgaliev, D. (2019). Program Modeling in the Investigation of Crimes Against Cybersecurity in Russia. In: Kravets, A., Groumpos, P., Shcherbakov, M., Kultsova, M. (eds) Creativity in Intelligent Technologies and Data Science. CIT&DS 2019. Communications in Computer and Information Science, vol 1084. Springer, Cham. https://doi.org/10.1007/978-3-030-29750-3_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-29750-3_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-29749-7

  • Online ISBN: 978-3-030-29750-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics