izpis_h1_title_alt

Možnosti in izzivi kazenskega preiskovanja kibernetske kriminalitete
ID Kralj, Maša (Author), ID Završnik, Aleš (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (1,10 MB)
MD5: E08F5B9027918E371A346604B25D875C

Abstract
Uvodoma sta predstavljena narava digitalnih podatkov in osnovni pravni izzivi zaradi posegov v človekove pravice. Nato je prikazan pravni izziv identificiranja identificiranje osebe preko podatkov o IP naslovu, možnosti obhajanja kriptiranja, dovoljenost uporabe dokazov, ki jih predložijo tretje osebe in prikriti preiskovalni ukrepi s katerimi se prestreza in pridobiva podatke o kriminalnih aktivnostih. Na kratko sta opisana uporaba velikega podatkovja in spremljanje toka denarja kot načina preiskovanja kibernetske kriminalitete. Sledi predstavitev vsebine sodne odločbe za preiskavo in zaseg elektronske naprave z vidika specificiranosti. Kot neke vrste napotki za preiskavo pa so izpostavljeni še nekateri argumenti obrambe.

Language:Slovenian
Keywords:Kazenski postopek, IP naslov, prikriti preiskovalni ukrepi, kriptiranje, vsebina sodne odredbe, dokazi pridobljeni od tretjih oseb.
Work type:Master's thesis/paper
Organization:PF - Faculty of Law
Year:2019
PID:20.500.12556/RUL-110093 This link opens in a new window
COBISS.SI-ID:16975185 This link opens in a new window
Publication date in RUL:12.09.2019
Views:948
Downloads:214
Metadata:XML RDF-CHPDL DC-XML DC-RDF
:
Copy citation
Share:Bookmark and Share

Secondary language

Language:English
Title:Opportunities and challenges of investigating cybercrime
Abstract:
This master's thesis explores selected challenges of investigating cybercrime, as well as possible ways authorities can deal with these challenges. The first part presents nature of digital data and the basic legal challenges which occur due to interference with human rights. This is followed by an exposition of the legal challenge of identifying an individual by the means of their IP address, legal possibilities of bypassing encryption, the admissibility of evidence put forward by third persons and clandestine investigative measures of intercepting and obtaining data on criminal activity. A short passage is dedicated to the use of big data and the tracking of money flows as means of investigating cyber-crime. This is followed by a presentation of the content of a court order for search and seizure. Finally, some defense arguments are presented.

Keywords:Criminal proceedings, IP address, clandestine investigative measures, encryption, content of court order, evidence provided by third parties.

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Back