Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс:
http://hdl.handle.net/11701/45211
Полная запись метаданных
Поле DC | Значение | Язык |
---|---|---|
dc.contributor.author | Starostenko, Nina I. | - |
dc.date.accessioned | 2024-04-01T16:25:58Z | - |
dc.date.available | 2024-04-01T16:25:58Z | - |
dc.date.issued | 2024-03 | - |
dc.identifier.citation | Starostenko, Nina I. 2024. “Forensic features of methods of committing theft using methods of social engineering and information and telecommunication technologies”. Vestnik of Saint Petersburg University. Law 1: 152–170. https://doi.org/10.21638/spbu14.2024.110 (In Russian) | en_GB |
dc.identifier.other | https://doi.org/10.21638/spbu14.2024.110 | - |
dc.identifier.uri | http://hdl.handle.net/11701/45211 | - |
dc.description.abstract | The article presents a forensic characteristic of the system of actions of a criminal in preparing, committing and concealing thefts committed using methods of social engineering and information and telecommunication technologies. This article has three main goals. Firstly, it will identify the main types of theft using methods of social engineering and information and telecommunication technologies, which were identified based on the study of judicial and investigative practice. Secondly, it presents the main methods of social engineering that are most often used by criminals to establish psychological contact and influence the psyche and behavior of victims. Thirdly, the analysis of the methods will allow us to identify natural connections between the methods of committing these thefts and other elements of the criminalistic characteristics, in particular the personality of the criminal, the personality of the victim, the mechanism of trace formation, etc. The first part of the main study presents a forensic characteristic of the personality of the criminal and his illegal activities. Next, based on special literature and forensic investigative practice, a forensic classification of methods of committing thefts using social engineering methods and information and telecommunication technologies is formulated. In conclusion, the results of the study are summed up and it is concluded that, in general, the methods under consideration are full-structural, since their content includes a certain set of actions (stages) (preparation, direct commission of illegal actions, concealment of traces of a crime). | en_GB |
dc.language.iso | ru | en_GB |
dc.publisher | St Petersburg State University | en_GB |
dc.relation.ispartofseries | Vestnik of St Petersburg University. Law;Volume 15; Issue 1 | - |
dc.subject | forensics | en_GB |
dc.subject | crime investigation | en_GB |
dc.subject | social engineering | en_GB |
dc.subject | social engineering methods | en_GB |
dc.subject | remote fraud | en_GB |
dc.subject | methods of committing thefts | en_GB |
dc.subject | information and telecommunication technologies | en_GB |
dc.title | Forensic features of methods of committing theft using methods of social engineering and information and telecommunication technologies | en_GB |
dc.type | Article | en_GB |
Располагается в коллекциях: | Issue 1 |
Файлы этого ресурса:
Файл | Описание | Размер | Формат | |
---|---|---|---|---|
152-170.pdf | 688,51 kB | Adobe PDF | Просмотреть/Открыть |
Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.