Peculiarities of cybercrime investigation in the banking sector of Ukraine: review and analysis
-
DOIhttp://dx.doi.org/10.21511/bbs.16(1).2021.07
-
Article InfoVolume 16 2021 , Issue #1, pp. 69-80
- Cited by
- 1147 Views
-
610 Downloads
This work is licensed under a
Creative Commons Attribution 4.0 International License
The rapid growth in the number of cybercrimes committed in the banking sector requires the creation of an effective system for preventing such crimes and ensuring the cybersecurity of the state. The constant updating of means and methods for cybercrime commission necessitates the identification of effective measures to combat them. The paper uses a survey method to study the theoretical experience and practical measures to prevent cybercrime in the banking sector to identify effective ways to combat crime in the virtual space of Ukraine. The paper analyzes the experience of the world’s leading countries concerning cybercrime prevention, deals with measures to improve the level of cybersecurity of national and international cyberspace. It is concluded that the current state of cybersecurity in Ukraine does not meet contemporary requirements and needs initiating effective measures and coordinated cooperation between private and public sectors in order to effectively combat cybercrime, in particular: enshrining the classification of cybercrimes in the regulatory legal acts of Ukraine; introduction of the concept of “banking criminal law” in the scientific and legal sphere; creation of Ukrainian cyber forces, whose activities will be aimed at preventing and combating crimes committed in cyberspace.
- Keywords
-
JEL Classification (Paper profile tab)K14, K24, E58
-
References38
-
Tables0
-
Figures2
-
- Figure 1. Top 5 types of fraud in the world according to the results of the PwC survey in 2020
- Figure 2. Approaches to increasing the level of cybersecurity in Ukraine
-
- Ajkov, D., Sejger, K., & Fonstorh, U. (1999). Kompyuternyye prestupleniya. Rukovodstvo po borbe s kompyuternymi prestupleniyami [Computer crimes. A Guide to Combating Computer Crime] (351 p.). Moscow: Mir. (In Russian).
- Ben-Itzhak, Y. (2008). Organized Cybercrime. ISSA Journal, 6(10), 37-48.
- Bissel K., LaSalle, R. M., & Richards, K. (2017). The Assenture Security Index. Redefining Security Performance and How to Achieve it.
- Borisov, V. І., & Zelenec’kij, V. S. (2010). Problemy zabezpechennia efektyvnostі dіialnostі orhanіv krymіnalnoho pereslіduvannia v Ukrainі [Problems of ensuring the effectiveness of criminal prosecution in Ukraine] (400 p.). Kharkiv: Pravo. (In Ukrainian).
- Brenner, S. (2006). Cybercrime: criminal threats from cyberspace (281 p.). Praeger.
- Buhtіarova, A. G., & Huscha, A. V. (2019). Combating Cybercrime in the Banking Sector. Pryazovskyi ekonomіchnyi vіsnyk – Priazovsky Economic Bulletin, 3(14), 355-361. (In Ukrainian).
- Burbelo, B. A. (2013). Krymіnalіstychnі osnovy protydіi kіberzlochynnostі [Forensic foundations of combating cybercrime]. Aktualnі pytannia rozslіduvannia kіberzlochynіv: materіaly Mіzhnarodnoi naukovo-praktychnoi konferentsіi [Current issues cybercrime investigation: materials of the International scientific and practical conference] (pp. 179-182). Kharkіv: Kharkіvskyi natsіonalnyi unіversitet vnutrіshnіkh sprav. (In Ukrainian).
- Decree of the President of Ukraine. (2016). Stratehіia kіberbezpeky Ukrainy [Cybersecurity strategy of Ukraine].
- Douschi, M. I. (2018). Pravove rehuliuvannia zabezpechennia kiberbezpeky v Ukraini [Legal regulation of cyber security in Ukraine]. Proceedings of the Kiberbezpeka v Ukraini: pravovi ta orhanizatsiini pytannia [Cybersecurity in Ukraine: legal and organizational issues: materials of the All-Ukrainian scientific-practical conference] (pp. 21-23). Odesa: ODUVS. (In Ukrainian).
- Europol. (2011). Threat Assessment on Internet Facilitated Organized Crime (IOCTA).
- Europol. (2017). Massive blow to criminal Dark Web activities after globally coordinated operation.
- Giovanni Paolo Accinni e Associati. Banking Criminal Law.
- Hilgendorf, E., & Valerius, B. (2012). Computer- und Internetstrafrecht. Springer: Verlag Berlin Heidelberg.
- Huey, L., Nhan, J., & Broll, R. (2013). Uppity civilians and cyber-vigilantes: The role of the general public in policing cyber-crime. Criminology and Criminal Justice, 13(1), 81-97.
- Ismailov, K., & Shaevskaya, Ju. V. (2016). Kіberzlochynnіst fіnansovoі sfery Ukrainy [Cybercrime in the financial sphere of Ukraine]. Collection of scientific articles based on the reports of the participants of the All-Ukrainian scientific-practical conference (pp. 134-139). Odesa: ODUVS. (In Ukrainian).
- Jahankhani, H., Al-Nemrat, A., & Hosseinian-Far, A. (2015). Cybercrime classification and characteristics. In Cyber Crime and Cyber Terrorism Investigator’s Handbook (pp. 149-164). Waltham.
- Janke, G. (2008). Kompendium Wirtschaftskriminalitat. Peter Lang GmbH International Verlag der Wissenschaften. Frankfurt am Main.
- Kroes, N. (2013). Speech: EU Cybersecurity Strategy.
- Leonov, B. D., & Ser’ogіn, V.S. (2019). Udoskonalennia metodychnoho zabezpechennia ekspertnykh doslіdzhen spetsіalnykh prohramnykh zasobіv u sferі protydіi kіberzlochinnostі [Improving the methodological support of expert research of special software in the field of combating cybercrime]. Іnformatsіia і pravo – Information and Law, 4(31), 98-106. (In Ukrainian).
- Marbeth-Kubicki, A. (2010). Computer- und Internetstrafrecht. München: Verlag C. H. Beck.
- Markov V. V. (2015). Do pytannia shchodo zarubіzhnoho dosvіdu protydіi kіberzlochynnostі [On the issue of foreign experience in combating cybercrime]. Pravo і bezpeka – Law and security, 2(57), 107-113. (In Ukrainian).
- Mazzone, A. (2006). Identity Fraud – Government Legislative Responses. Victorian Government Solicitor’s Office.
- Miles, T. (2017). U.N. survey finds cybersecurity gaps everywhere except Singapore. Reuters.
- Muhin, G. N., & Isjutin-Fedotkov, D. V. (2013). Osobennosti struktury i soderzhaniya metodiki rassledovaniya prestupleniy, svyazannykh s posiagatelstvom na informatsionnyye resursy [Features of the structure and content of the methodology for investigating crimes related to infringement of information resources]. Biblioteka kriminalista – Forensic Library, 5, 280-286. (In Russian).
- Muliar, G. V., & Khovpun, O. S. (2019). Features of evidence of cybercrime. Law. Human. Environment, 10(3), 132-138. (In Ukrainian).
- Nekrasov, V. (2016). Lehki hroshi: Ukraina peretvoriuietsia na Mekku dlia kiberzlochyntsiv [Economic truth. Easy money: Ukraine is becoming a Mecca for cybercriminals]. (In Ukrainian).
- Odenthal, R. (2009). Korruption und Mitarbeiterkriminalitat: Wirtschaftskriminalitat vorbeugen, erkennen und aufdecken. Springer Gabler, Wiesbaden.
- Pushkarenko, P. І. (2006). Kiberzlochynnist yak novitnii fenomen tiniovoi ekonomiky [Cybercrime as a new phenomenon of the shadow economy]. Problemy i perspektyvy rozvytku bankivskoi systemy Ukrainy – Problems and prospects of development of the banking system of Ukraine, 17, 75-82. (In Ukrainian).
- Rogatjuk, І. V. (2015). Rozslіduvannia kіberzlochinіv: okremі aspekty dіialnostі prokurora і slіdchykh orhanіv vnutrіshnіkh sprav [Investigation of cybercrime: some aspects of the activities of the prosecutor and investigative law enforcement agencies]. Aktualnі pravovі pytannia siohodennia v umovakh yevrointehratsii Ukrainy [Current legal issues in the context of Ukraine’s European integration] (pp. 18-21). (In Ukrainian).
- Schjølberg, S. (2008). Report of the Chairman of HLEG. ITU Global Cybersecurity Agenda (GCA).
- Schjolberg, S. (2010). A cyberspace treaty – A United Nations convention or protocol on cybersecurity and cybercrime. Twelfth United Nations Congress on Crime Prevention and Criminal Justice. Salvador, Brazil.
- Sen, R. Ju. (2014). Dosvіd іnozemnykh krain u sferі rozslіduvannia kіberzlochynіv [Experience of foreign countries in the field of cybercrime investigation]. Aktualni pytannia diialnosti pravookhoronnykh orhaniv u sferi protydii kiberzlochynnosti. Materialy Mizhnarodnoi naukovo-praktychnoi konferentsii [Current issues of law enforcement in the field of combating cybercrime: materials of the international scientific-practical conference] (pp. 192-194). Kharkіv: Prava liudyny. (In Ukrainian).
- Sindhu, K. K., Kombade, R., Gadge, R., & Meshram B. B. (2012). Forensic Investigation Processes for Cyber Crime and Cyber Space. Proceedings of International Conference on Internet Computing and Information Communications (pp. 193-206).
- Smith, R. G., Grabosky, P., & Urbas, G. (2004). Criminals on Trial (263 p.). Cambridge University Press.
- Steele, J. (2020). Credit card fraud and id theft statistics.
- Stein, A. R. (2004). Personal Jurisdiction and the Internet: Seeing Due Process Through the Lens of Regulator Precision. Northwestern University Law Review, 98(2), 411-454.
- The Verkhovna Rada of Ukraine. (2017). Zakon Ukrainy Pro osnovni zasady zabezpechennia kiberbezpeky Ukrainy [Law of Ukraine On the Basic Principles of Cyber Security in Ukraine].
- Wegberg, R., & Verburgh, T. (2018). Lost in the Dream? Measuring the effects of Operation Bayonet on vendors migrating to Dream Market. In Evolution of the Darknet Workshop at the Web Science Conference (WebSci 18) (pp. 1-5). Association for Computing Machinery (ACM).