TO THE ISSUE OF IDENTIFYING ILLEGAL ASSETS
DOI:
https://doi.org/10.30890/2709-1783.2025-39-00-019Keywords:
cybercrime, cybercrime investigation, special knowledge, computer technology, investigator, specialist, expert, review, forensic examination.Abstract
The article is devoted to the study of the implementation in Ukraine the best practices and standards of the European Union in the field of detection, search and management of assets obtained from corruption and other crimes. A comparative analysis in theReferences
Directive 2014/42/EU of the European Parliament and of the Council on the freezing and confiscation of instrumentalities and proceeds of crime in the European Union) (2014, April 3), accessed, Marc 2, 2022, http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2014.12-
C. Woodbury “IBM i Security Administration and Compliance”, MC Press, 2016 pp. 327.
R.A. Kalyuzhnyy, V.O. Shamray, M.YA. Shvetsʹ, V.D. Havlovsʹkyy, M.V. Hutsalyuk, R.L. Kovpak, V.S. Tsymbalyuk, YU.V. Yatsyshyn, A.S. Lastovetsʹkyy “Information support of managerial activity in the conditions of informatization: organizational and legal issues of theory and practice”, Kyiv, Ukraine, 2002, 296 p.
S. Mazuryk “The concept of information support and classification of information in the prosecutor's office”, Current issues of jurisprudence, Information and law, vol. 7, no 3, pp. 30-34, 2016.
J. Buck, J. Fottral “Mastering IBM i: The Complete Resource for Today’s IBM i System”, pp. 563-567, 2011.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Authors

This work is licensed under a Creative Commons Attribution 4.0 International License.