Digital Theft: Concept, Contents, Victims and Their Classification

Author:

Zhmurov Dmitry1

Affiliation:

1. Baikal State University

Abstract

The goal of the article is to develop some aspects in the theoretical basis of digital thefts’ victimology. A digital theft is understood as stealing digital identifiers, assets, utilitarian digital rights or technological resources through inputting, blocking and modifying computer information. A victim of digital theft is a physical (juridical) person who suffered property or other damage from the illegal seizure of the abovementioned intangible objects. The author suggests singling out the following types of victims, depending on the crimes: 1. Thefts of means of payment (electronic and cryptocurrency, token-actions, credit tokens). They are carried out by a third party gaining illegal access to the blockchain purse of the victim or unsanctioned transfers from it. 2. Thefts of information (passwords, access keys, personal identifiers, accounts, elements of a digital person). The main type of information to be compromised is the so-called governing information in its numerous forms. 3. Thefts of resources (computational capacities, traffic, electric energy). From the economic viewpoint, this is theft of key production capacities of the information era. This subgroup includes victims of computational capacities’ theft (unsanctioned use of the victim’s processor and appropriation of the capacities of personal computers without the knowledge of the user), internet traffic (tunnelling), electric energy (unlawful use of energy resources through unsanctioned connection to the network with the use of telecommunication technologies). The author draws some conclusions regarding the spread of such crimes and the traditional risk groups among Internet users who run a higher chance of the type of victimization under analysis. The topic of digital thefts is considered to be highly urgent and relevant for complex research in the spheres of cybercriminology, cybercriminalistics and cybervictimology. This is of principal importance in the conditions of the digital transformation of the economy and criminalization of new actions infringing on the electronic means of payment (such as thefts from a bank account or other actions involving digital currency included in Part 3, Art. 158 of the Criminal Code of the Russian Federation).

Publisher

Baikal State University

Subject

Law,Sociology and Political Science

Reference26 articles.

1. Malaev M. Key Methods of Fraud with Bank Cards in 2021. Kommersant, 2021, April 5. URL: https://www.kommersant.ru/doc/4760829. (In Russian).

2. Vredina N. Cheated out of half a Million. Real-Life Stories of How Money Gets Stolen from Bank Cards. Argumenty i Fakty, 2020, June 12. URL: https://aif.ru/money/mymoney/razveli_na_polmilliona_realnye _istorii_kak_aferisty_voruyut_dengi_s_kart. (In Russian).

3. Mogunova M.M. Criminal Law Analysis of Cyber Threats in the Business Environment. Vestnik Omskogo universiteta. Seriya: Pravo = Herald of Omsk University. Series: Law, 2021, vol. 18, no. 1, pp. 89–95. (In Russian). EDN: NURXAS. DOI: 10.24147/1990-5173.2021.18(1).89-95.

4. Dvoryankin O.A. Internet Theft — New Information Internet Technologies? Annali d’Italia, 2022, no. 28, pp. 15–22. EDN: SAMLDD.

5. Starostenko O.A. To the Issue of Key Classifying Attributes of Thefts of Electronic Monies. Pravovaya kul'tura = The Legal Culture, 2022, no. 2, pp. 99–107. (In Russian).

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3