Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 4

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  cybercrimes
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
This paper was inspired by the necessity to communicate the dire effects of classic stalking and to outline the penalties enforceable under Art. 190a §1 of the Polish Criminal Code. The specifics of cyberstalking are then enumerated with emphasis on quoted social site internal rules instituted for the prevention of personal harassment.
EN
The purpose of this article is to characterize organized crime from the perspective of French law in three aspects. As the first one, was presented the analysis of the definition of the studied phenomenon, noting that its penalization in French law took place just in 2004. Next, criminal behavior connected with the organized crime was identified and systematized in the following categories: illegal trade, financial crimes, cybercrimes. The third area of analysis covers the indication of a catalogue of measures undertaken in order to fight against the subject pathology. In the conclusions it was underlined that taking into account the heterogeneous character of organized crime and the new methods of its spreading, it is impossible to completely eliminate this phenomenon, as well as minimize it, for the above mentioned reasons, may present significant difficulties.
EN
In the Fourth Industrial Revolution we already have robots, also there are such technologies as genetic sequencing and editing, artificial intelligence, miniaturized sensors, 3D printing and much more. Digital technologies are constantly being developed with new methods and have been implemented worldwide into various processes and automation systems. The article describes modern digitalization components and analyzes its possible threats. Along with an increase in life comfort, modern civilizations must face with cybercrimes based on data collection, including cyber thefts and hacker attacks. Globalization enables exchanging goods and services between countries of the world. It also gives a tool phishing and illegally access vulnerable information of global enterprises to compete unfairly. Although Big Data can be helpful among organizations, it can also be a mark of the inevitable danger worldwide.
Eruditio et Ars
|
2022
|
vol. 4
|
issue 1
185-195
EN
The goal of this paper is to demonstrate application of the so called script-theoretic approach proposed by Derek Cornish in the script analysis of crimes. This method is related to the rational choice theory movement. Rejection of certain premises of this theory does not result in the inability to apply this theory in practice. However, the script approach has been translated into the criminology field without any attempts at adjusting it. The work indicates the basic problems emerging as a result of applying the conceptual framework of the script theory to analyze classic cybercrimes.
PL
Celem niniejszego opracowania jest przedstawienie zaproponowanej przez Dereka Cornisha tzw. metody scenariuszowej w analizie przestępstw. Metoda ta związana jest z nurtem teorii racjonalnego wyboru. Odrzucenie niektórych założeń tej teorii nie przekreśla jednak możliwości jej praktycznego wykorzystania. Metoda skryptowa została mimo to przeniesiona na grunt kryminologii bez jakichkolwiek prób adaptacji. Praca wskazuje podstawowe problemy, jakie rodzi wykorzystanie siatki pojęciowej teorii skryptów poprzez aplikację metody scenariuszowej do analizy klasycznych cyberprzestępstw.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.