Information and Computer Criminalistic Model of a Crime Related to the Rules’ Violation of Centralised Management of Hardware and Software against Threats of Stability, Security and Integrity of the Information and Telecommunications Network «Internet» and Public Communication Network Functioning: A Theoretical and Predictive Approach
Автор: Kharisova Z.I.
Журнал: Вестник Института права Башкирского государственного университета @vestnik-ip
Рубрика: Криминалистика, судебно-экспертная деятельность, оперативно-разыскная деятельность
Статья в выпуске: 2 (26), 2025 года.
Бесплатный доступ
The article describes the elements of the information and computer criminalistic model of a crime in the field of computer information, their content is detailed on the example of a criminal act related to the rules’ violation of centralised management of hardware and software against threats of stability, security and in-tegrity of the information and telecommunications network «Internet» and public communication network’s functioning on the territory of the Russian Federation. The analysis of the identified elements, taking into account the modern develop-ment of information technology and the theoretical and predictive approach, al-lowed concluding that it is possible to form on their basis a digital twin of the crime in question in the form of its digital copy, which will subsequently optimise the ef-fectiveness of the investigation. A digital twin of a crime, built on the basis of the criminalistic characteristics offered to modern realities, will be a virtual model re-flecting the state and dynamics of a real criminal act.
Computer crimes, cybercrimes, information model of crime, information and computer criminalistic model, digital model of crime, criminalistic characteristics of crimes, investigation algorithms, computer criminalistics, artificial intelligence
Короткий адрес: https://sciup.org/142244943
IDR: 142244943 | DOI: 10.33184/vest-law-bsu-2025.26.18