Cybercrime and subculture of cybercriminals

https://doi.org/10.21744/lingcure.v5nS4.1769

Authors

  • Yevgen V. Kotukh Sumy State University, Sumy, Ukraine
  • Denis V. Kislov Open International University of Human Development “Ukraine”, Kyiv, Ukraine
  • Tykhon S. Yarovoi Interregional Academy of Personnel Management, Kyiv, Ukraine
  • Ruslana O. Kotsiuba Legislation Institute of the Verkhovna Rada of Ukraine, Kyiv, Ukraine
  • Oleksandr H. Bondarenko National Academy of the National Guard of Ukraine, Kharkiv, Ukraine

Keywords:

computer, cybercrime, cyber-security, government agencies, hackers

Abstract

Unlike traditional types of crime, such as murder or theft, that have a long history, cybercrime is a relatively young phenomenon and a new one that emerged with the advent of the Internet. It should be noted that the very nature of the Internet is quite favourable for committing crimes. Its properties such as globality, cross-border nature, the anonymity of users, wide audience coverage, distribution of main network nodes, and their interchangeability create advantages for cybercriminals who use the Internet at all stages of crime and also allow them to effectively hide from law enforcement agencies. An important aspect of cybercrime that contributes to its spread and hinders the fight against it is the subculture of cybercriminals. This subculture needs to be given special attention, so this issue is discussed in detail in the article. Therefore, the purpose of the article was to analyse cybercrime as one of the youngest types of crime in the modern world. The history of the emergence of cybercrime and cyber-security was considered, the types of cybercrime were characterized, and the functions of cybercrime were analysed. 

Downloads

Download data is not yet available.

References

Andreev, A., Davidovich, S. (2002). On information confrontation during the armed conflict in Kosovo.

Aryani, I. G. A. I., & Rahayuni, N. K. S. (2016). Innovation of teaching and learning english applied to animal sciences’ student with the combination of computer media and audio visual. International Journal of Linguistics, Literature and Culture, 2(1), 1-7. Retrieved from https://sloap.org/journals/index.php/ijllc/article/view/78

Barber, R. (2001). Hackers profiled—who are they and what are their motivations?. Computer Fraud & Security, 2001(2), 14-17. https://doi.org/10.1016/S1361-3723(01)02017-6

Beigl, M., Gellersen, H. W., & Schmidt, A. (2001). Mediacups: experience with design and use of computer-augmented everyday artefacts. Computer Networks, 35(4), 401-409. https://doi.org/10.1016/S1389-1286(00)00180-8

Danilyan, O.G. (2006). Philosophy of law. Moscow: Publishing House “Eksmo”.

De Joode, A. (2011). Effective corporate security and cybercrime. Network Security, 2011(9), 16-18. https://doi.org/10.1016/S1353-4858(11)70097-6

Denisov, N. L. (2002). Influence of criminal subculture on the formation of the personality of a minor criminal: Dis.... cand. jurid. sciences.

Denning, D. E. (2001). Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy. Networks and netwars: The future of terror, crime, and militancy, 239, 288.

Diorditsa, I. V., Telestakova, A. A., Koval, O. M., Nazarenko, O. A., & Nastiuk, A. A. (2021). Information interventions as a new dimension of Ukraine’s cyber-vulnerability. Linguistics and Culture Review, 5(S2), 152-166. https://doi.org/10.21744/lingcure.v5nS2.1337

Dolgova, A. I. (2003). Crime, its organization and criminal society. Russian Criminology Associations, Moscow, 191-194.

Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), 491-497. https://doi.org/10.1016/j.jare.2014.02.006

Golubev, V.A. (2002). “Cyber terrorism” – myth or reality?

Halchin, L. E. (2004). Electronic government: Government capability and terrorist resource. Government Information Quarterly, 21(4), 406-419. https://doi.org/10.1016/j.giq.2004.08.002

Hamner, M. (2009). Expanding the technology acceptance model to examine personal computing technology utilization in government agencies in developing countries. Government information quarterly, 26(1), 128-136. https://doi.org/10.1016/j.giq.2007.12.003

Kaspersky, K. (2004). Technique and philosophy of hacker attacks. Moscow: SOLON-Press.

Kaspersky, K. (2005). Shellcoder's Programming Uncovered (Uncovered series). ???-?????????.

Kesareyeva, T. P. (2002). Criminological characteristics and crime prevention in the Russian segment of the Internet: abstract of dissertation for the degree of candidate of Law. Moscow: University of the Prosecutor's Office of the Russian Federation.

Kurakov, L. P., & Smirnov, S. N. (1998). Information as an object of legal protection. Helios, 18.

Lemos, R. (2011). Cyberterrorism: The real risk.

Lindbom, L., Pihlgren, P., & Jonsson, N. (2005). PsN-Toolkit—a collection of computer intensive statistical methods for non-linear mixed effect modeling using NONMEM. Computer methods and programs in biomedicine, 79(3), 241-257. https://doi.org/10.1016/j.cmpb.2005.04.005

Lukatsky, A. (2010). Hackers control reactor.

Mahyudi, J., Saryono, D., Siswanto, W., & Pratiwi, Y. (2017). Construction of visual features of Indonesian digital poetry. International Journal of Linguistics, Literature and Culture, 3(5), 1-13. Retrieved from https://sloap.org/journals/index.php/ijllc/article/view/218

Manky, D. (2013). Cybercrime as a service: a very modern business. Computer Fraud & Security, 2013(6), 9-13. https://doi.org/10.1016/S1361-3723(13)70053-8

Mentor. (1986). The hacker manifesto.

Nersesyants, V. S. (2004). Problems of the general theory of law.

Oli, M. C. (2021). Proficiency amidst COVID-19 challenges in developing computer programs: An outcomes-based approach in discrete structures. Linguistics and Culture Review, 5(S3), 770-783. https://doi.org/10.21744/lingcure.v5nS3.1593

Pavlova, A. A. (2004). Subculture of shadow economic activity: Essence and factors of reproduction in Russia: abstract of dissertation for the degree of candidate of Sociology. ?oscow: Russian Academy of Public Administration.

Qiang, X. (2003). China's Virtual Revolution. Project Syndicate.

Rassolov, I. M. (2003). Law and the Internet. Theoretical problems. Moscow: Publishing House “NORMA”.

Schultz, E. E. (2002). Taking a stand on hackers. Computers & Security, 21(5), 382-384. https://doi.org/10.1016/S0167-4048(02)00501-1

Schweitzer, D. (2003). Incident response: computer forensics toolkit. Wiley.

Smirnova, I.A. (2000). The virtual space of culture. In Materials of the scientific conference on April 11-13, 2000, (pp. 148-149). St. Petersburg: St. Petersburg Philosophical Society.

Tulegenov, V. V. (2003). Criminal Subculture and Its Criminological Meaning/Tulegenov Vadim V.

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102. https://doi.org/10.1016/j.cose.2013.04.004

Widana, I.K., Dewi, G.A.O.C., Suryasa, W. (2020). Ergonomics approach to improve student concentration on learning process of professional ethics. Journal of Advanced Research in Dynamical and Control Systems, 12(7), 429-445.

Zong, F., & Zhen, S. X. (2021). The link between language and thought. Macrolinguistics and Microlinguistics, 2(1), 12–27. Retrieved from https://mami.nyc/index.php/journal/article/view/12

Published

2021-11-13

How to Cite

Kotukh, Y. V., Kislov, D. V., Yarovoi, T. S., Kotsiuba, R. O., & Bondarenko, O. H. (2021). Cybercrime and subculture of cybercriminals. Linguistics and Culture Review, 5(S4), 858-869. https://doi.org/10.21744/lingcure.v5nS4.1769

Issue

Section

Research Articles