KAKO RAZUMETI KRAĐU IDENTITETA I PREVARU

Autori

DOI:

https://doi.org/10.51738/Kpolisa2024.21.2r.17mj

Ključne reči:

krađa identiteta, prevara identiteta, phishing, kompjuterski kriminal

Apstrakt

Krađa identiteta i prevara identiteta prdstavljaju najbrže rastući oblik kompjuterskog kriminala koji ima velike posledice na pojedince ali i na korporacije i finansijske institucije. Razvoj nauke i tehnologije doveo je u opasnost ličnu bezbednost svakog pojedinca ali i stvorio mogućnosti kriminalcima da na lak i perfidan način dođu do imovinske koristi ili ugroze korporacijsku i bezbednost velikih finansijskih institucija. Kao relativno nov oblik kompjuterskog kriminala, krađa identiteta je prouzrokovala i potrebu usklađivanja krivičnih zakonodavstava sa novonastalom situacijom. Cilj rada je da razjasni terminološke nedoumice prisutne u ovoj oblasti i istakne aktuelnost problema krađe identiteta i prevare vezane za krađu identiteta. Pregledom relevantne naučne literature, primenom kvantitativne i kvalitativne analize sadržaja, komparativne analize i uporednog i istorijskog metoda, ukazaćemo na značaj jasnog i preciznog definisanja krađe identiteta i njegove zakonske inkriminacije. Ukazaćemo na različite oblike krađe identiteta, način na koji se najčešće dešavaju i posledce koje izazivaju kao i mogućnosti prevencije. Rezultati istraživanja su pokazali da je krađa identiteta u ekspanziji i da je neophodno usaglašavanje zajedničkih mera na međunarodnom nivou. Takođe, na osnovu dobijenih rezultata možemo zaključiti da je neophodno preduzeti mere edukacije ugroženih kategorija stanovništva kako bi se posledice ovog oblika kriminala svele na najmanju moguću meru. Praktične implikacije ovog istraživanja ukazuju na potrebu razvijanja većeg broja istraživanja iz ove oblasti sa posebnim osvrtom na pojedine oblike krađe identiteta i prevare identiteta.

##plugins.generic.usageStats.downloads##

##plugins.generic.usageStats.noStats##

Reference

th UN Congress on Crime Prevention and Criminal Justice. (n.d.) Retrieved 15.4.2024. from https://www.unodc.org/documents/crimecongress/12th-CrimeCongress/Documents/A_CONF.213_18/V1053828e.pdf

Allison, S. F., Schuck, A. M., & Lersch, K. M. (2005). Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice, 33(1), 19-29. https://doi.org/10.1016/j.jcrimjus.2004.10.007

Beal, V. (2016). ”How to Defend Yourself Against Identity Theft”, Retrieved 13.4.2024.http://www.webopedia.com/DidYouKnow/Internet/2006/identity_theft.asp.

Beals, M., DeLiema, M., & Deevy, M. (2015). Framework for a taxonomy of fraud. Financial Fraud Research Center. https://www.finrafoundation.org/sites/finrafoundation/files/framework-taxonomy-fraud.pdf

Beltran, G. (2013), Trends in child identity theft. Identity theft resource center" Retrieved 14.5.2024 from www.idtheftcenter.org/Child-ID-Theft/trends-in-child-identity-theft.html.

Bjelajac, Ž. (2008). Korupcija kao vid organizovanog kriminala [Corruption as a form of organized crime]. Pravo – teorija i praksa, 25(3-4): 47–54.

Bjelajac, Ž. (2015). Korupcija kao izazov savremenog demokratskog društva [Corruption as a challenge of modern democratic society]. Kultura polisa 12(26): 43–57.

Bjelajac, Ž., Filipović, A. (2020). Internet addiction disorder (IAD) as a paradigm of lack of security culture. Kultura polisa, 17(43): 239–258.

Bourke, P., Ward, T. and Rose, C. (2012),Expertise and sexual offending: a preliminary empirical model" Journal of Interpersonal Violence, Vol. 27 No. 12, pp. 2391–2414. https://doi.org/10.1177/0886260511433513

Burnes, D., DeLiema, M., & Langton, L. (2020). Risk and protective factors of identity theft victimization in the United States. Preventive medicine reports, 17, 101058. https://doi.org/10.1016/j.pmedr.2020. 101058

CIFAS (2010), Identity Theft- Victims [Internet], The UKs Fraud Prevention Service (CIFAS), London.

Cole, S. A., & Pontell, H. N. (2006). “Dont be low hanging fruit”: Identity theft as moral panic. In Surveillance and security (pp. 125–147). Routledge. ISBN 9780203957257

Copes, H. & Vieraitis, L.M. (2012), Identity Thieves: Motives and Methods, Northeastern University Press, Boston.

Council of Europe (2013). Cybercrime Convention Committee – T-CY Guidance Note#4, Identity theft and phishing in relation to fraud, (n.d.) Retrieved 11.4.2024 from https://rm.coe.int/16802e7132.

Dinarević, M., & Softić, L. (2021). Razvoj, pojam i oblici cyber kriminala [Development, Concept and Forms of Cyber Crime]. Pregled: časopis za društvena pitanja/Periodical for social issues, 62(2), 125-141. UDK 004.738.5:343.9

Đukić, A. (2017). Bezbednost – Krađa identiteta-oblici, karakteristike i rasprostranjenost [Security – Identity Theft: Forms, Characteristics, and Prevalence], Interdisciplinarni naučni časopis Vojno delo br.3 /Interdisciplinary Scientific Journal Vojno delo no.3, DOI: 10.5937/ vojdelo1703099D

Filipović, A., Bjelajac, Ž., Merdović, B. & Stošić, L. (2023). Some Aspects of the Criminal Potential of Artificial Intelligence. PaKSoM 2023, 41-47. ISBN: 978-86-82602-02-6

Gill, M. (2017). Learning from Offenders: Some Iatrogenic Effect of Crime Prevention Measures. In: LeClerc, B., Savona, E. (eds) Crime Prevention in the 21st Century.Springer, Cham. https://doi.org/10.1007/978-3-319-27793-6_4

Golladay, K., & Holtfreter, K. (2017). The consequences of identity theft victimization:An examination of emotional and physical health outcomes. Victims & Offenders, 12(5), 741–760. https://doi.org/10.1080/15564886.2016.1177766

Gross, R., & Acquisti, A. (2005, November). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (pp. 71-80). https://doi.org/10.1145/1102199.1102214

Gupta, C. M., & Kumar, D. (2020). Identity theft: a small step towards big financial crimes. Journal of Financial Crime, 27(3), 897-910. https://doi.org/10.1108/JFC-01-2020-0014

Identity Theft Resource Center. (2014). Identity theft: The aftermath 2013. Retrieved 14.5.2024. from http://www.idtheftcenter.org/images/surveys_studies/Aftermath2013.pdf

Ipsos-Reid (2006). Concern Over Identity Theft Is Changing Consumer Behaviour, Ipsos-Reid on Behalf of Capital One.

Jagatic, T., Johnson, N., Jakobsson, M., & Menczer, F. (2005). Phishing attacks using social networks. Indiana University Human Subject Study, 05-9892.

Javelin Strategy & Research, “2020 Identity Fraud Study: Genesis of the Identity Fraud Crisis” https://www.javelinstrategy.com /coverage-area/2020-identity-fraud-study-genesis-identity-fraudcrisis.

Komlen-Nikolić, L., Gvozdenović, R., Radulović, S., Milosavljević, A., Jeković, R., Živković, V., ... & Aleksić, I. (2010). Suzbijanje visokotehnološkog kriminala [Suppression of cybercrime]. Udruženje javnih tužilaca i zamenika javnih tužilaca Srbije/Association of Public Prosecutors and Deputy Public Prosecutors of Serbia, Beograd.

Krivični zakonik Republike Srbije, [Criminal Law] ”Službeni glasnik Republike Srbije” broj 85/2005, 88/2005-ispr., 107/2005-ispr., 72/2009, 111/2009, 121/2012, 104/2013, 108/2014 i 94/2016.

Kroll (2019). Global Fraud & Risk Report 2019/2020. https://www.kroll.com/en/insights/publications/global-fraud-andrisk- report-2019.

Manap, N. A., Rahim, A. A., & Taji, H. (2015). Cyberspace identity theft: An overview. Mediterranean Journal of Social Sciences, 6(4), 290. http://dx.doi.org/10.5901/mjss.2015.v6n4s3p290

Mercuri, R. T. (2006). Scoping identity theft. Communications of the ACM, 49(5), 17-21. https://doi.org/10.1145/1125944.1125961

Milošević, M., & Urošević, V. (2009). Krađa identiteta zloupotrebom informacionih tehnologija [Identity theft by misuse of information technologies]. Bezbednost u postmodernom ambijentu–zbornik radova–knjiga VI [Security in a postmodern environment– Proceedings–book VI], 53-64.

Newman, J. Q. (1999). Identity theft: The cybercrime of the millennium. Loompanics Unlimited.

Nikolić-Ristanović, V., & Konstantinović-Vilić, S. (2018). Kriminologija [Criminology]. Beograd: Prometej.

OECD Ministerial meeting on the future of the internet economy – Scoping paper on Online Identity Theft, Ministerial background report: DSTI/CP (2007)3/FINAL. (n.d.) Retrieved 15.4. 2024 from http://www.oecd.org/sti/40644196.pdf

Passel, J.S. (2006), The Size and Characteristics of the Unauthorized Migrant Population in the US. [Internet, Microsoft the Pew Hispanic Centre, Washington, DC https://www.procon.org/wpcontent/uploads/sites/40/immidoc6.pdf

Prlja, D., & Reljanović, M. (2009). Visokotehnološki kriminal–uporedna iskustva. [Cyber crime – comparative experiences], Strani pravni život, (3), 161–194. https://www.stranipravnizivot.rs/index.php/SPZ/issue/view/30

Prosch, M. (2009). Preventing identity theft throughout the data life cycle. Journal of Accountancy, 207(1), 58–62. https://doi.org/10.1080/15536548.2006.10855783

Roberts, L. D. (2008). Cyber-victimisation in Australia: Extent, impact on individuals and responses. Tasmanian Institute of Law Enforcement Studies. http://hdl.handle.net/20.500.11937/9773

Rocha, K. (2013), Medical Identity Theft: The Basics, The Identity Theft Resource Center.

Sproule, S., and N. Archer. (2007). Defining Identity Theft. Eighth World Congress on the Management of eBusiness, Toronto, IEEE. https://doi.org/10.1515/9780776619927

Stojanović, Z. (2010). „Krivičnopravni ekspanzionizam i zakonodavstvo Srbije“. [Criminal law expansionism and Serbian legislation], Stanje kriminaliteta u Srbiji i pravna sredstva reagovanja,(ur. Đ. Ignjatović), IV deo/State of crime in Serbia and legal means of response, (ed. Đ. Ignjatović, part IV, Beograd, 32-48.

Stojković Numanović, K., Merdović, B., & Živaljević, D. (2023). Forging payment cards and cybercrime. Pravo – Teorija I Praksa, 40(4)/Law – Theory and Practice, 40(4), 138–154. https://doi.org/10.5937/ptp2304138S

UNHCR (2007), Why Do People Move to Another Country? [Internet], The United Nations High Commissioner for Refugees UNHCR, Geneva.

Urošević, V., Ivanović, Z., & Uljanov, S. (2012). Mač u world wide webu [A sword in the world wide web], Beograd:Eternal mix.

Vilić, V. (2017). Cybercrime: Basic criminological characteristics and legislation. Lap - Lambert Academic Publishing – International Book Market Service Ltd., member of OmniScriptum Publishing Group. -166. ISBN 978-620-2-01800-5.

World Privacy Forum (2024). Medical Identity Theft, Retrieved 11.5.2024 from https://www.worldprivacyforum.org/category/med-id-theft/

Zakon o organizaciji i nadležnosti državnih organa za borbu protiv visokotehnološkog kriminala [Law on the Organization and Competence of State Bodies for the Fight against High-Tech Crime]”Službeni glasnik Republike Srbije/ Official Gazette of the Republic of Serbia” broj 61/2005 104/2009.

Zakon o organizaciji nadležnih organa u suzbijanju organizovanog kriminala, korupcije i drugih posebno teških krivičnih dela[Law on the organization of competent authorities in the fight against organized crime, corruption and other particularly serious crimes] „Službeni glasnik Republike Srbije/ Official Gazette of the Republic of Serbia“ br.42/02,27/03,39/03,67/03,29/04,58/04-dr. zakon/ state law, 45/05,61/ 05,72/09).

Zakonik o krivičnom postupku, [Criminal Procedure Code] “Službeni glasnik Republike Srbije” br. 72/2011, 101/2011, 121/2012, 32/2013, 45/2013, 55/2014, 35/2019, 27/2021 – odluka/ decision US i 62/2021 – odluka/decision US

##submission.downloads##

Objavljeno

2024-06-30

##plugins.generic.badges.manager.settings.showBlockTitle##

Najčitanije od istog autora

1 2 > >>