TO THE ISSUE OF IDENTIFYING ILLEGAL ASSETS
DOI:
https://doi.org/10.30890/2709-1783.2025-39-00-019Ключові слова:
cybercrime, cybercrime investigation, special knowledge, computer technology, investigator, specialist, expert, review, forensic examination.Анотація
The article is devoted to the study of the implementation in Ukraine the best practices and standards of the European Union in the field of detection, search and management of assets obtained from corruption and other crimes. A comparative analysis in theПосилання
Directive 2014/42/EU of the European Parliament and of the Council on the freezing and confiscation of instrumentalities and proceeds of crime in the European Union) (2014, April 3), accessed, Marc 2, 2022, http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2014.12-
C. Woodbury “IBM i Security Administration and Compliance”, MC Press, 2016 pp. 327.
R.A. Kalyuzhnyy, V.O. Shamray, M.YA. Shvetsʹ, V.D. Havlovsʹkyy, M.V. Hutsalyuk, R.L. Kovpak, V.S. Tsymbalyuk, YU.V. Yatsyshyn, A.S. Lastovetsʹkyy “Information support of managerial activity in the conditions of informatization: organizational and legal issues of theory and practice”, Kyiv, Ukraine, 2002, 296 p.
S. Mazuryk “The concept of information support and classification of information in the prosecutor's office”, Current issues of jurisprudence, Information and law, vol. 7, no 3, pp. 30-34, 2016.
J. Buck, J. Fottral “Mastering IBM i: The Complete Resource for Today’s IBM i System”, pp. 563-567, 2011.
Опубліковано
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2025 Автори

Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.