Tópicos Sugeridos dentro de su búsqueda.
Tópicos Sugeridos dentro de su búsqueda.
Buscar alternativas:
computer crime » computer crimes (Expander búsqueda)
para computer » panda computer (Expander búsqueda), para competir (Expander búsqueda), para componer (Expander búsqueda)
computer crime » computer crimes (Expander búsqueda)
para computer » panda computer (Expander búsqueda), para competir (Expander búsqueda), para componer (Expander búsqueda)
1
artículo
Publicado 2025
Enlace
Enlace
This study focuses on the problem associated to the few sentences issued in the Judiciary for cases of cyber offenses, requiring effective attention from the authorities. Thus, in response to what is established in the doctrine regarding special jurisdictions, as well as the effective results obtained in the resolution of certain situations, the target of this research is to expose that the implementation of the jurisdictional bodies specialized in computer crimes would contribute to the effective processing of this type of crimes in the Judiciary. To achieve this, we will examine the statistics related to reported grievances and judgments concerning computer offenses to highlight the issue that needs attention. Then an examination will be carried out of the actions of the Judiciary against computer crimes. Subsequently, a review of the doctrine related to special jurisdictions will be c...
2
artículo
Publicado 2024
Enlace
Enlace
This article originates from the problem that has been observed in the prosecution and punishment of computer crimes, since many of these criminal cases usually go unpunished. In this line of ideas, through the aforementioned study, the factors that contribute to the non-criminal punishment of cybercriminals will be fully identified. One of these factors is the non-individualization of the cybercriminal, which is why the representative of the Public Ministry usually files the criminal process, for a simple reason: the formalization of the preparatory investigation requires the full individualization of the subject, otherwise, the investigation cannot be formalized. In order to avoid impunity for computer crimes, this research will provide certain solutions that will contribute to the investigation and punishment of these criminal acts.
3
artículo
Publicado 2023
Enlace
Enlace
In this article, the author examines the crime of illegal access to computer systems. To do so, he highlights the increase in reports over the last five years, analyzes the legislative proposal outlined in the Convention on Cybercrime, and reviews the legal formulas adopted by Latin American states that have adhered to the Convention. Then, the author conducts a historical study of computer intrusion crimes in Peruvian criminal legislation and analyzes different issues that arise in the current wording, concluding this section with a proposal for lege ferenda.In the second part, the author notes that hackers are equated with cybercriminals, which creates prejudices or stigmas towards this community and biases in criminal investigations, which could, in turn, lead to erroneous judicial decisions.
4
artículo
The use of the Internet developed a new form of illegal configuration, known as Cybercrime. In this sense, international and national instruments have been developed to avoid impunity, seeking to punish such conduct. The context of COVID-19 shows us - much more - that our activities depend on technological support, which generates new forms of Cybercrime
5
artículo
The use of the Internet developed a new form of illegal configuration, known as Cybercrime. In this sense, international and national instruments have been developed to avoid impunity, seeking to punish such conduct. The context of COVID-19 shows us - much more - that our activities depend on technological support, which generates new forms of Cybercrime
6
artículo
Publicado 2023
Enlace
Enlace
This research work is based on the problems related to the increase in the number of registered complaints of computer crimes, which negatively affects the perception of citizen insecurity and the procedural overload in the justice system, there being a need on the part of the State to address this problem. In response to this, considering that data have been collected that demonstrate that the Immediate Process has obtained effective results in the justice system, the objective of this research work is to expose the viable application of the Immediate Process as an effective tool for the processing of the crimes of Computer Fraud and Proposals to children and adolescents for sexual purposes through technological means regulated by Law No. 30096 – Computer Crime Law. For this, the crime figures, procedural overload of the justice system, citizen insecurity and the growth of complaints ...
7
artículo
Publicado 2025
Enlace
Enlace
Computer fraud is a crime that increased in the context of the Covid-19 pandemic in the world, and Peru was no exception. Therefore, we were interested in gathering Peruvians’ perspectives on the use of the press and social media in the dissemination and, eventually, their participation in a digital financial literacy strategy, as a preventive measure to avoid further losses from this crime. A survey of 429 residents in Metropolitan Lima and interviews with 25 victims of computer fraud revealed that Facebook and conventional television are the platforms most used to learn about the modus operandi of crime; that the majority do not share their experiences in the media because they distrust them or perceive that they do not contribute to clarifying their complaints. The study proposes a minimum informative strategy that the press could consider in its daily work, to guide people on how t...
8
artículo
Publicado 2025
Enlace
Enlace
Computer fraud is a crime that increased in the context of the Covid-19 pandemic in the world, and Peru was no exception. Therefore, we were interested in gathering Peruvians’ perspectives on the use of the press and social media in the dissemination and, eventually, their participation in a digital financial literacy strategy, as a preventive measure to avoid further losses from this crime. A survey of 429 residents in Metropolitan Lima and interviews with 25 victims of computer fraud revealed that Facebook and conventional television are the platforms most used to learn about the modus operandi of crime; that the majority do not share their experiences in the media because they distrust them or perceive that they do not contribute to clarifying their complaints. The study proposes a minimum informative strategy that the press could consider in its daily work, to guide people on how t...
9
tesis de maestría
Publicado 2020
Enlace
Enlace
El objetivo de la presente investigación fue demostrar cual es el efecto de la informática forense basado en una nueva metodología híbrida en el Peritaje Informático en la Empresa 2M&J Ingenieros, 2019. Es una investigación aplicada, con diseño experimental, de manera específica, diseño preexperimental, en una muestra censal de 15 computadoras. Se aplicó la prueba del pretest al grupo único y, obtenidos los resultados se realizó la aplicación de la nueva metodología en actividades, para volver a ser evaluada en la fase de postest. En el tratamiento estadístico se utilizó el software SPSS 25. La descripción de los resultados se hizo desde una mirada descriptiva (Figuras y gráficas de barras) mientras en la parte inferencial se utilizó en el contraste de hipótesis la prueba no paramétrica de rangos con signos de Wilcoxon que se utiliza para muestra...
10
11
tesis de grado
Publicado 2022
Enlace
Enlace
This work details the activities performed over my years of working experience. During this time, I have been capable of developing my technical and management abilities learned during my time as a university student. Also, I have been able to learn about new activities and processes which rely heavily on the use of different technologies to improve businesses and prevent risks. Since my first work experiences, I have been able to get involved in database administration and support from processing tools, from simple macros and spreadsheets to specialized data science and analytics software. I learned different data science techniques such as regression and classification models, anomaly detection and clustering, with the opportunity to apply models in different datasets. Through the years, I was also able to learn new topics, including financial audit, e-discovery, and forensic data anal...
12
artículo
Cybercrime is a particularly complex criminal phenomenon, and one in which the criminal justice system faces its greatest challenges and difficulties. One of these concerns the victim of crime, a central actor in the dynamics of crime, whose dimension is crucial for shaping criminal policy designs. This study provides an initial approach to the development of cybercrime victimology as a central tool of criminological knowledge that should serve as a guideline for legislative responses to cybercrime.
13
artículo
Publicado 2023
Enlace
Enlace
The present research work contemplates an analysis of the criminal type of Computer Fraud in Peruvian legislation, also analyzing the classification established in the Convention on Cybercrime or Budapest Convention, also making reference to the Argentine and Spanish legislation for which the qualitative method, oriented to the analysis of the criminal types of the aforementioned regulations, obtaining as a result that our regulations are in strict accordance with what is determined in the international standard; being a classification identical to that established in the Budapest Convention. Thus, it can also be concluded that the criminal type of computer fraud turns out to be broader in our legislation than in Argentine and Spanish legislation, finding ourselves faced with a multi-offensive crime, highlighting the atypicality in mediating consent on the part of the passive subject in ...
14
tesis de grado
Publicado 2024
Enlace
Enlace
El malware, particularmente los stealers, representa una amenaza significativa al robar credenciales, datos bancarios y otra información sensible, permitiendo a los ciberdelincuentes obtener ganancias o acceso a redes corporativas. Existen múltiples soluciones que intentan detectar y detener los problemas que estos programas maliciosos generan. Muchos de ellos usan diversas técnicas como Machine Learning (ML), heurísticas, etc. pero aún no se concentran en el problema de los stealers. Esta investigación propone una solución basada en la detección de accesos anómalos a archivos estratégicamente vigilados, lo que permite identificar el comportamiento de los stealers en tiempo real. Para ello, se desarrolló un agente con configuración flexible que monitorea los accesos a archivos valiosos y clasifica los eventos registrados como benignos o sospechosos. Esta solución se diseñó...
15
artículo
In this article, the author examines the crime of illegal access to computer systems. To do so, he highlights the increase in reports over the last five years, analyzes the legislative proposal outlined in the Convention on Cybercrime, and reviews the legal formulas adopted by Latin American states that have adhered to the Convention. Then, the author conducts a historical study of computer intrusion crimes in Peruvian criminal legislation and analyzes different issues that arise in the current wording, concluding this section with a proposal for lege ferenda.In the second part, the author notes that hackers are equated with cybercriminals, which creates prejudices or stigmas towards this community and biases in criminal investigations, which could, in turn, lead to erroneous judicial decisions.
16
artículo
Cybercrime is a particularly complex criminal phenomenon, and one in which the criminal justice system faces its greatest challenges and difficulties. One of these concerns the victim of crime, a central actor in the dynamics of crime, whose dimension is crucial for shaping criminal policy designs. This study provides an initial approach to the development of cybercrime victimology as a central tool of criminological knowledge that should serve as a guideline for legislative responses to cybercrime.
17
tesis de grado
Publicado 2024
Enlace
Enlace
En los últimos años, debido al incremento de la tecnología de la información y la comunicación se ha evidenciado por medio de una amplia investigación que han surgido nuevas modalidades denominados ciberdelitos, afectando directamente a la seguridad y tranquilidad de la población, pues como sucede en los casos de chantaje sexual, los delincuentes tienen una situación de ventaja frente a las víctimas, por lo que es imposible poder reconocer su identidad y mucho menos su ubicación. Sin embargo, no puede investigarse adecuadamente pues el Art. 230° del Código Procesal Penal, exige diversos presupuestos, siendo que, en los delitos de chantaje sexual, la pena no supera los cuatro años según lo estipulado en el Art. 176-C del Código Penal. Es por ello, que esta investigación tecnológica de tipo documental teórica o bibliográfica busca resolver problemas referidos a la impuni...
18
tesis de grado
Publicado 2025
Enlace
Enlace
La investigación se centró en comparar la aplicación del Convenio de Budapest y la Ley N° 30096 sobre delitos informáticos en Perú, con énfasis en los bienes jurídicos del patrimonio, fe pública, e indemnidad sexual en Cusco durante 2024, por tanto, el objetivo general de la investigación fue comparar la aplicación del convenio de Budapest con respecto a la ley de delitos informáticos del Perú para afrontar la ciberdelincuencia, Cusco 2024. La hipótesis planteada sugiere diferencias significativas entre ambos marcos normativos en cuanto a su alcance y efectividad. Metodológicamente, se empleó un enfoque mixto mediante cuestionarios dirigidos a expertos legales, y cualitativo a través de entrevistas semiestructuradas. La muestra incluyó a especialistas del Ministerio Público, la Policía Nacional del Perú y abogados penalistas de Cusco. Los instrumentos utilizados incl...
19
artículo
Publicado 2025
Enlace
Enlace
Significant advances in computing, telecommunications, and the internet have driven social, economic, and political progress, leading to a paradigm shift: from common crime to cybercrime. Cybercriminal activity has expanded globally, giving rise to new forms of illicit conduct and criminal activity online. This phenomenon has spread worldwide, resulting in punishable actions in cyberspace, committed through social networks, digital media, online environments, and mobile or technological devices. Consequently, legislators have had to restructure and adopt regulatory tools to prevent such crimes. Cyberspace lacks borders and legal regulations, which gives cybercriminals an advantage due to high complexity, anonymity, lack of evidence, and procedural legislation regarding electronic evidence. Currently, the role of the Public Prosecutor faces numerous challenges in the justice system, makin...
20
artículo
Publicado 2025
Enlace
Enlace
Significant advances in computing, telecommunications, and the internet have driven social, economic, and political progress, leading to a paradigm shift: from common crime to cybercrime. Cybercriminal activity has expanded globally, giving rise to new forms of illicit conduct and criminal activity online. This phenomenon has spread worldwide, resulting in punishable actions in cyberspace, committed through social networks, digital media, online environments, and mobile or technological devices. Consequently, legislators have had to restructure and adopt regulatory tools to prevent such crimes. Cyberspace lacks borders and legal regulations, which gives cybercriminals an advantage due to high complexity, anonymity, lack of evidence, and procedural legislation regarding electronic evidence. Currently, the role of the Public Prosecutor faces numerous challenges in the justice system, makin...