Use of computer engineering in crimes against economy (some features criminal of the characteristic and technique of investigation)
##plugins.themes.bootstrap3.article.main##
Abstract
Issues analysed under this article are related to usage of computer equipment for committing various crimes, criminal characterisation of such acts persons and peculiarities of interrogation acts.
Presumption can be made that as long as the Criminal Code does not directly indicate acts committed using computer equipment as crime, it may be asserted that computer crimes do not exist in Lithuania. Though it does not mean that such acts are not dangerous to society, state or individuals, and this is no longer a presumption but reality.
Persons that commit dangerous actions using computer equipment can be relatively divided into three groups: crackers, criminals and vandals. Different sources provide different definitions though they are all united by the same means of committing criminals acts – computer equipment and possible ways of using it.
Ways of using computer equipment are multiple and they are constantly improving and depend upon the level of hardware and software.
The most common acts of interrogation when computer equipment is examined and confiscated are following: examination of place of event, search of the place and seizure. General regulations are applicable to the acts of interrogation indicated above. One of them is calling for a computer (hardware and software) specialist. Other regulations are related to examination of computer equipment, its seizure and preserving information.
Presumption can be made that as long as the Criminal Code does not directly indicate acts committed using computer equipment as crime, it may be asserted that computer crimes do not exist in Lithuania. Though it does not mean that such acts are not dangerous to society, state or individuals, and this is no longer a presumption but reality.
Persons that commit dangerous actions using computer equipment can be relatively divided into three groups: crackers, criminals and vandals. Different sources provide different definitions though they are all united by the same means of committing criminals acts – computer equipment and possible ways of using it.
Ways of using computer equipment are multiple and they are constantly improving and depend upon the level of hardware and software.
The most common acts of interrogation when computer equipment is examined and confiscated are following: examination of place of event, search of the place and seizure. General regulations are applicable to the acts of interrogation indicated above. One of them is calling for a computer (hardware and software) specialist. Other regulations are related to examination of computer equipment, its seizure and preserving information.
##plugins.themes.bootstrap3.article.details##
Section
Articles
Authors contributing to Jurisprudence agree to publish their articles under a Creative Commons Attribution-NoDerivatives 4.0 International Public (CC BY-NC-ND) License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit, and that in the event of reuse or distribution, the terms of this licence are made clear.
Authors retain copyright of their work, with first publication rights granted to the Association for Learning Technology.
Please see Copyright and Licence Agreement for further details.
Authors retain copyright of their work, with first publication rights granted to the Association for Learning Technology.
Please see Copyright and Licence Agreement for further details.