https://inlibrary.uz/index.php/digital_technology_offenses/issue/feedCombating offenses in the field of digital technologies and issues of organizational and legal support of information security2022-07-06T13:17:00+08:00Общий отделtadqiqotinstituti@adliya.uzOpen Journal Systems<p>International scientific and practical conference materials compilation</p>https://inlibrary.uz/index.php/digital_technology_offenses/article/view/7542Intellectual alternative dispute resolutions in the field of property or settlement the disputes out of the judicial system2022-07-06T07:22:21+08:00Sherbek Rasulovinfo@nlibrary.uzIn modern legal systems, the use of alternative pre-trial methods is more important than the litigation of intellectual property disputes. Resolving intellectual property disputes in court is costly, time consuming, and making the wrong decision can lead to unpredictable and inconsistent results. This research paper examines the possibility of extensive use of alternative methods such as mediation, arbitration, and arbitration to resolve intellectual property disputes, and analyzes how appropriate they are to resolve disputes. In the legal system of Uzbekistan, special attention is paid to the existing problems in the settlement of intellectual property disputes and what steps are needed to introduce alternative dispute resolution. The study concludes that alternative dispute resolution mechanisms are very suitable for intellectual property, and Uzbekistan needsto take big steps to implement such a system2022-04-06T00:00:00+08:00Copyright (c) 2021 Шербек Расуловhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7550Problems of combating cybercrime and ways to solve them2022-07-06T08:51:03+08:00Bekzod Rashidovnoreplay@inlibrary.uzAinura Sabirbayevanoreplay@inlibrary.uzThe article analyzes the investigative and judicial practice and issues during the investigation of cyber fraud, as well as a comparative legal analysis of foreign legislation, including the criminal codes of Germany, Spain, Japan. Specific examples from investigative and judicial practice are considered with a detailed analysis of the identified errors and shortcomings. Statistical data related to cybercrime, namely cyberfraud, are given. The author’s definition of the concepts of “cyber fraud” and “identity theft” is formulated based on the study of qualification problems that arise in practice. It was found that there are cases when the same act is qualified in different ways, based on some key concepts, such as “deception”, “secrecy”, “voluntariness”, “ignorance”, “misleading”. As cyber fraud continues to evolve at a rapid pace, with an unprecedented scale, current and expected future trends require the enhancement and continuous improvement of criminal and criminal procedure legislation, the development of practical recommendations to address existing gaps and problems in practice. In addition, new changes in legislation to eradicate cyber fraud should aim to be as complete as possible to avoid the need for regular updates in the future or limit the ability to investigate. Cybercrime is developing due to the lack of territorial boundaries, the possibility of remote access to funds in digital form for millions of kilometers through 100 country borders. While there are opportunities to track and pursue cybercriminals, this requires cross-border cooperation; cooperation, in which the criminal does not need. Countries need to improve their cybersecurity criminal and criminal procedure laws, but also need to have a system in place to enable cooperation with other countries. The severity of this problem requires concerted action by law enforcement agencies to eradicate cybercrime, successfully detect and investigate crimes, detect all available evidence in the case, including electronic evidence, and identify the perpetrators of these crimes2022-04-06T00:00:00+08:00Copyright (c) 2021 Бекзод Рашидов, Айнура Сабирбаеваhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7549Object in crimes of embezzlement of another’s property using computer equipment2022-07-06T08:37:41+08:00Surayo Rakhmanovnoreplay@inlibrary.uzIn this article, the objective signs of the composition of crimes of theft of someone else’s property using computer technology have been comprehensively studied, a special object of such categories of crimes – someone else’s property and property rights of other persons has been studied in a separate way. A scientific and practical review of non-cash money in the form of computer information, which are special features of the subject of the crime, was also carried out. 2022-04-06T00:00:00+08:00Copyright (c) 2021 Сурайё Рахмановаhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7548Prevention of crimes against youth in the field of information technology2022-07-06T08:28:10+08:00Bekhruza Baxriddinovainfo@nlibrary.uzThe relevance of this article lies in the analysis of the juvenile delinquency in the Republic of Uzbekistan, the reasons contributing to them, as well as the study of foreign experience and put forward proposals for the prevention of crimes among young people in the world of information technology2022-04-06T00:00:00+08:00Copyright (c) 2021 Бехруза Бахриддиноваhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7547The peculiarity of interpol’s activities in coordinating international cooperation in countering cybercrime2022-07-06T08:20:29+08:00Alimzhan Matchanovnoreplay@inlibrary.uzThe article discusses the problems associated with determining the role and place of Interpol as an international criminal police organization in coordinating the activities of national law enforcement agencies in developing uniform recommendations on the methodology of their disclosure and investigation. A scientific analysis of the Interpol Statute, adopted resolutions regulating international cooperation of law enforcement agencies directly involved in coordinating activities represented by the National Central Bureaus of Interpol through the exchange of necessary information is carried out. The opinions of scientists defining the concept of cybercrime as socially dangerous acts in the virtual space are given, direct recommendations are given regarding the development and implementation of joint practical programs to counter cybercrime2022-04-06T00:00:00+08:00Copyright (c) 2021 Алимжан Матчановhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7546The meaning and role of cybersecurity in the prevention of crimes against life and health2022-07-06T08:14:28+08:00Diora Rakhimberganovainfo@nlibrary.uzIn this article, the author explores cyberspace and its capabilities, cybersecurity and methods of ensuring it, types of cybercrime, as well as its role of influence through social networks on the Internet at the subconscious level of people, contributing to the commission of crimes, both murder and suicide2022-04-06T00:00:00+08:00Copyright (c) 2021 Диёра Рахимбергановаhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7545Features of international legal cooperation in the fight against crime in the field of information technologies2022-07-06T08:04:58+08:00Timur Butunbaevnoreplay@inlibrary.uzСybersecurity plays an important role in the world of information technology. Securing data is one of the biggest challenges that the governments are facing today. In this case, the first thing that has to be taken into consideration is not only the implementation of solid legal measures to fight cybercrime, but also introducing specific tools that can essentially prevent those cybercrimes on rapidly growing information space. However, the effectiveness of these measures seem questionable given the global nature of the problem, unless a solid foundation for international legal cooperation is established. Thus this article looks at the existing challenges faced by governments that are adopting international legislations and conventions against cybercrime and also discuss the potential prospects of a single global framework for international cooperation in this area.2022-04-06T00:00:00+08:00Copyright (c) 2021 Тимур Бутунбаевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7544Cyber security issues and international legal fundamentals in the global information space2022-07-06T08:01:05+08:00Ohunjon Yigitalievinfo@nlibrary.uzIn today’s world of technology, almost all countries around the world use digitalization, computer technology, artificial intelligence, programming and software, databases to store and maintain their information. However, with the development of technical and technological processes, today there are more and more attacks and threatsto the appearance of information in the virtualspace. This article analyzes the issues of cyber security and its international legal framework2022-04-06T00:00:00+08:00Copyright (c) 2021 Охунжон Йигиталиевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7543Criminal and legal aspects of committing the crime of extremism through information and communication technologies2022-07-06T07:40:00+08:00Rustam Kabulovnoreplay@inlibrary.uzAmiriddin Anorboevnoreplay@inlibrary.uzThis article is devoted to explaining the essence and importance of effective ways and mechanisms to ensure cybersecurity in Uzbekistan.This article outlines the criminal law and criminological characteristics of cyber extremism.2022-04-06T00:00:00+08:00Copyright (c) 2021 Рустам Кабулов, Амириддин Анорбоевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7551Prevention of offenses in the context of digitalization of the world2022-07-06T09:05:50+08:00 Kseniya Popovainfo@nlibrary.uzIn this article, the author revealed the relevance of the need to introduce the latest information and communication support for law enforcement agencies of the Republic of Uzbekistan and in particular to ensure the direction of crime prevention. The author also highlighted the importance of improving crime prevention measures in the field of information and communication technologies, adopting the best practices of developed foreign countries, because thisissue cannot but be associated with the country’s security. Considering that now the problem of combating the world of cybercrime is being brought to the forefront of the day and indeed, if we talk about such a rapid digitalization of the world, it should be noted right away that this aspect also covers the global Internet, which is currently one of the most important means of mass media and the infamous "yellow press". Therefore, it is worth noting once again the importance of mastering law enforcement officers of modern technologies and the virtual world in order to prevent cybercrime and quickly and completely disclose already committed cybercrimes2022-04-06T00:00:00+08:00Copyright (c) 2021 Ксения Поповаhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7541Cooperation with the public in the investigation of crimes in the sphere of information technologies2022-07-06T07:13:08+08:00Bakhtiyorjon Murodovnoreplay@inlibrary.uzThe article is devoted to the investigation of crimes in the field of information technology, which are becoming more and more dangerous in our society and are relatively new to the practice of law enforcement agencies. This article directly analyzes the dynamics of growth and current statistics of crimes committed with the help of information technology, the indicators of detection of investigated crimes in this area. The article also substantiates the necessity and conditions for the interaction of investigating authorities with the public in the investigation of crimes committed with the help of information technology. In the article, the authors describe the international legal framework and the importance of cooperation between the investigative authorities and the public in pre-trial proceedings. In particular, today there is an objective need to establish cooperation with financial institutions, banks, mobile operators, Internet providers and payment systems to detect, investigate and prevent crimes committed using information technology. At the same time, the need for the Central Bank to create a single base for interaction with law enforcement agencies of the country is substantiated. The authors of the article analyze the problems associated with the involvement of specialists in the investigation of this category of cases and make a number of proposals to address these issues.2022-04-06T00:00:00+08:00Copyright (c) 2021 Бахтиёржон Муродовhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7540Organizational and legal aspects of combating violations in the field of digital technologies and ensuring information security2022-07-06T07:04:42+08:00Sardor Tuxtaevinfo@nlibrary.uzThе аrtiсlе dеаls with thе соnсеpt оf digitаl tесhnоlоgy, сybеrspасе, сybеrсrimе, its еssеnсе, thе fight аgаinst it, prоblеms, sоlutiоns. Thе сurrеnt situаtiоn in thе wоrld, thе еffоrts bеing mаdе in Uzbеkistаn аgаinst сybеrсrimе, lеgаl issuеs, thе wоrk tо bе dоnе will bе соvеrеd2022-04-06T00:00:00+08:00Copyright (c) 2021 Сардор Тухтаевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7539Organizational and legal issues of combating violations in the field of digital technologies and ensuring information security2022-07-06T06:52:48+08:00Jalolidin Rustamovinfo@nlibrary.uzToday along with the development of digital technologies, the problems associated with them are growing. These problems are observed in various areas. That is the problems that arise in the process of work of institutions, organizations and enterprises working with the use of digital technologies are one of the global problems that arise not only in our country, but in almost all countries of the world. Solving the problems associated with digital technologies, finding our own solutions is very important for both the people and the state2022-04-06T00:00:00+08:00Copyright (c) 2021 Жалолидин Рустамов https://inlibrary.uz/index.php/digital_technology_offenses/article/view/7538International cooperation to fighting against crimes in virtual space2022-07-06T06:39:27+08:00Ruftullo Nigmatovnoreplay@inlibrary.uzThe article examines cybercrime as a new threat to the security of modern society, analyzes the reasons for the increase in The level of crimes in the virtual space, and also examines the problems arising in the course of countering cybercrime associated with insufficient training of specialists, insufficient legislative framework to combat cybercrime, an increase in the level of latency of cybercrime due to the unwillingness of victims to report crimes. New approaches using modern achievements of science and technology in the fight against cybercrime have been identified. The article notes that of particular concern are the frequent cases of cyber-attacks in both the private and public sectors due to the ignorance of users of the existing security rules in the Internet space, as well as difficulties in detecting and identifying cybercriminals on the territory of foreign states. It should be noted that one of the reasons for the increase in the growth of cybercrime is the fact that international cooperation in the fight against cybercrime is not at the proper level, many states are far from realizing the full extent of the danger of these types of crimes, which harm not only individuals or legal entities, but also the state as a whole. On the one hand, there is a huge damage caused to the economies of countries in the form of the development of illegal shadow business, tax concealment, illegal legalization of proceeds from crime, deterioration of the financial situation of entrepreneurs and the private sector. On the other hand, public confidence in the state, technology or banking institutions is being lost. There is an increase in the number of unsolved cybercrimes due to the impossibility or difficulty of identifying attackers, finding the necessary evidence base and the impossibility of ensuring the inevitability of punishment. For law enforcement officers, the fight against cybercrime is one of the priorities, since more and more victims of crimes are turning to law enforcement agencies with a request to provide compensation for material damage or to ensure that persons are brought to criminal responsibility. To solve the existing problems, it is proposed to improve the skills of specialists to obtain the necessary skills and abilities in the IT-sphere, as well as the introduction of a new material and technical base that allows you to locate hackers, as well as detain them and bring them to the established responsibility. As a solution to one of the global problems, which lies in the insufficient interaction of law enforcement agencies of states due to the lack of a unique international document, as well as signed bilateral and trilateral agreements between the countries, it is proposed to create a unique international document – the Convention “On Countering Cybercrime” at the UNO base. 2022-04-06T00:00:00+08:00Copyright (c) 2021 Руфтулло Нигматовhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7537Overcoming the “digital divide” as a guarantee of the human right access to information2022-07-06T06:31:27+08:00AShakhsanem Saliyevainfo@nlibrary.uzThis article is devoted to explaining the concept of "digital divide" and how this phenomenon affects the provision of human rights in the country, analyzing current trends and statistics of the "digital divide". The author makes proposals to improve the Basic Law of the country by enshrining the norm of guaranteeing access to information and draws conclusions and recommendations on overcoming the "digital divide"2022-04-06T00:00:00+08:00Copyright (c) 2021 Шахсанем Салиеваhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7536Fighting against offenses and fraud in the field of crypto-asset transactions 2022-07-06T06:30:09+08:00Davron Maksudovnoreplay@inlibrary.uzCurrently, we are becoming witnesses to the fact that digitalization and the development of technologies contribute to the emergence of new opportunities in building and regulating relationships between organizations, enterprises and citizens. The term "cryptocurrency" was first used in 2009 with the advent of the previously unknown payment system "Bitcoin", in which transactions are made with the same currency.2022-04-06T00:00:00+08:00Copyright (c) 2021 Даврон Максудовhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7533“E-parliament”: basic principles and the role of modern technologies2022-07-06T05:58:35+08:00Bobir-Mirzo Tuxtaevinfo@nlibrary.uzThe basic principles of the"electronic Parliament" are explained by their contribution to the strengthening of productive and democratic values in the sphere of activity. In particular, today the reports of foreign organizations and experts of the electronic Parliament separately distinguish the following principles of activity2022-04-06T00:00:00+08:00Copyright (c) 2021 Бобир-Мирзо Тухтаевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7532Review of international legal documents in the field of information security and countering cybercrime: current state and challenges2022-07-06T05:51:35+08:00Lavisa Iskhakovanoreplay@inlibrary.uzThe article contains an overview of international legal documents in the field of information security and combating cybercrime. Documents of the UN, ITU, EU, OECD, CIS, SCO are analyzed. The position of Uzbekistan in relation to these documents, as well as problems requiring international legal regulation are presented2022-04-06T00:00:00+08:00Copyright (c) 2021 Лавиза Исхаковаhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7552Cybersecurity legal framework: current state and improvement issues2022-07-06T09:13:19+08:00Foziljon Otakhonovnoreplay@inlibrary.uzAkmal Turaevnoreplay@inlibrary.uzThe article analyzes the current state and issues of improving the legal framework that are important in ensuring cybersecurity. Based on the results of the study of the practice and problems of the legislation, reasonable proposals were developed to eliminate the shortcomings.2022-04-06T00:00:00+08:00Copyright (c) 2021 Фозилжон Отахонов, Акмал Тураевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7553Typical situations of a conflict of interest in the sphere of educational relations2022-07-06T09:46:44+08:00Nozimakhon Sobirovanozimakhon.sobirova@gmail.comIn this study, the author presents his first research work on a comprehensive study of conflicts of interest in the field of educational relations in the future. The article discusses potential typical situations of conflict of interest that arise between a student and a teacher at various stages of education2022-04-06T00:00:00+08:00Copyright (c) 2021 Нозимахон Собироваhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7554The role of government agencies in ensuring information security in modern society2022-07-06T10:11:02+08:00Amiriddin Anorboevnoreplay@inlibrary.uzBased on the Constitution and legislation of the Republic of Uzbekistan, the state expresses the will of the people and serves their interests. State bodies and officials are responsible to society and citizens.2022-04-06T00:00:00+08:00Copyright (c) 2021 Амириддин Анорбоевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7555The purpose and social necessity of introducing the institution of a plea agreement in the criminal process2022-07-06T10:20:37+08:00Otabek Toshevotabek_toshev@inbox.ruThe article analyzes the purpose and social necessity of introducing the institution of a plea agreement into the criminal process, the features of the application of this institution, explores the main provisions of the law regarding plea agreements, important aspects of the plea agreement procedure, the advantages and disadvantages of this institution. The role of the court in concluding a plea agreement, the differences between such concepts as “plea agreement”, “cooperation agreement” and “abbreviated forms of litigation”, as well as their essence are highlighted. In addition, the views of scientists on the appointment and main functions of the institution of admission of guilt are studied, the author’s conclusions and conclusions are presented2022-04-06T00:00:00+08:00Copyright (c) 2021 Отабек Тошевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7556Application of artificial intelligence technologies in ensuring information security 2022-07-06T10:26:45+08:00Temur Azamovnoreplay@inlibrary.uzAkmal Savurbaevnoreplay@inlibrary.uzParviz Nasrullaevnoreplay@inlibrary.uzAn analysis of possible ways of using artificial intelligence in the field of information security was carried out, and the possibilities of using this high technology to prevent unauthorized access to information, as well as to reduce the consequences of information security violations were studied. The methods of using artificial intelligence technologies in information security and the expected results of its implementation are studied2022-04-06T00:00:00+08:00Copyright (c) 2021 Темур Аъзамов, Акмал Савурбаев, Парвиз Насруллаевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7557Concession is an important model of public and private partnership2022-07-06T10:39:34+08:00Akhmad Jabbarovahmadjabbarov@gmail.comThis article analyzes the implementation of the concession, which is one of the main and integral types of public-private partnership mechanism in our country, the legal framework, institutional and other conditions governing it. Among the public-private partnership projects, special emphasis is placed on the role of the concession and its distinguishing features from other types. Opinions are also expressed on the division of concessions into types according to their objects. At the same time, special attention is paid to the obstacles to the implementation of the concession model in Uzbekistan2022-04-06T00:00:00+08:00Copyright (c) 2021 Ахмад Жаббаровhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7558Protection of personal data and legal regulation of using them2022-07-06T10:44:29+08:00Bakhodir Usmonovnoreplay@inlibrary.uzIn the Republic of Uzbekistan, the protection and use of personal data of citizens is regulated by the Law of the Republic of Uzbekistan “On Personal Data” dated July 2, 2019 No. O’RQ-547.2022-04-06T00:00:00+08:00Copyright (c) 2021 Баходир Усмановhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7559Social aspects of ensuring information security in the modern period2022-07-06T11:06:32+08:00Azamat Seitovnoreplay@inlibrary.uzInformation and electronic methods of its delivery to the individual are beginning to play a special role in the development of modern society. Significant progress has been made in many of the “information society” indicators in Uzbekistan since 2016. In this regard, the material considers various social aspects of information security, based on the modern realities of “hybrid wars”. The main factors and corresponding problems of the transformation of social ties in virtual networks, the formation of personality under the influence of information and communication technologies in the context of globalization and computerization of society in the modern period are analyzed. In conclusion, the author’s vision of solving the problems of information security is given on the example of the Republic of Uzbekistan. 2022-04-06T00:00:00+08:00Copyright (c) 2021 Азамат Сеитовhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7560The main directions of information security in the era of digital technology development2022-07-06T11:21:24+08:00Ahror Saidovnoreplay@inlibrary.uzAt present, in the process of globalization and the rapid development of information technologies on Earth, the threats and dangers arising in the information space remain one of the main tasks of the world community to ensure security in this area.2022-04-06T00:00:00+08:00Copyright (c) 2021 Ахрор Саидовhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7561Actual issues of cyberrisk insurance regulation2022-07-06T11:30:50+08:00Hassan Tukhtamatovnoreplay@inlibrary.uzThis article discusses the issue of cyberrisk insurance. The activities of American International Group and Lloyd’s Group of London Ltd in the field of cyber insurance have been disclosed. Cyberrisks subject to insurance are described and classified. Along with this, proposals were made on the need to develop the sphere of insurance of cyber threats in our country2022-04-06T00:00:00+08:00Copyright (c) 2021 Хасан Тухтаматовhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7562The need to insurance the risk of crime committed with the use of information technologies2022-07-06T11:43:50+08:00Odin Zakirovanoreplay@inlibrary.uzFarangiz Nurboboevanoreplay@inlibrary.uzThis article focuses on information risk insurance, which is one of the most pressing issues today. The specific features of this type of insurance, its integral connection with cybercrime, and its relevance today will be analyzed. The purpose of the article is to reveal the essence and necessity of the content of cyber insurance, aimed at protecting against theft and damage to information, funds, which are important in the activities of any company2022-04-06T00:00:00+08:00Copyright (c) 2021 Одина Закирова, Фарангиз Нурбобоеваhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/75634gw strategy and information battleground in modern conditions2022-07-06T11:59:30+08:00Bakhodir Ismailovnoreplay@inlibrary.uz In conditions of political, socio-economic instability, armed conflicts, the role of means of informational influence on the opposing side increases many times over. It is an integral component of the fourth-generation warfare aimed at manipulating public consciousness.2022-04-06T00:00:00+08:00Copyright (c) 2021 Баходир Исмаиловhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7564Cyber security is the requirement of the time 2022-07-06T12:11:54+08:00Akhtam Tursunovnoreplay@inlibrary.uzRavshan Nurmatovnoreplay@inlibrary.uz The article touches on the experience of foreign insurance companies in the field of information security in our country, including work carried out in the field of cybersecurity, as well as insurance of cybersecurity and cybersecurity. Also in our republic, proposals for cybersecurity insurance have been developed.2022-04-06T00:00:00+08:00Copyright (c) 2021 Ахтам Турсунов, Равшан Нурматовhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7565Problems and prospects for the development of satellite communications in the republic of Uzbekistan2022-07-06T12:25:34+08:00Farhod Buranovnoreplay@inlibrary.uzThis article reveals the technological, economic and social possibilities of satellite communications in modern conditions. Taking into account the specificity and the fact that this area is a relatively new industry in public telecommunications, the author in the first block of his work explains the features of satellite communications itself and the conceptual apparatus. The article also provides international experience in the development of this type of communication, its essence, promising and vulnerable sides. Regarding Uzbekistan, the author provides the current situation: problems and prospects. The final part of the work consists of the initially necessary organizational and legal measures that contribute to the development of the industry in the country. 2022-04-06T00:00:00+08:00Copyright (c) 2021 Фархо Бурановhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7566Public administration in the field of cybersecurity in Uzbekistan2022-07-06T13:17:00+08:00Kumriniso Abdurasulovanoreplay@inlibrary.uzRavshan Nurmatovnoreplay@inlibrary.uz In the article, the work carried out in the direction of information security in our country and the content and essence of the law of the Republic of Uzbekistan “On cybersecurity” adopted on 15 April of this year were covered in detail2022-04-06T00:00:00+08:00Copyright (c) 2021 Кумринисо Абдурасулова, Равшан НурматовNurmatovhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7516Violation of intellectual property rights in telecommunication networks 2022-07-05T13:37:32+08:00Yesemurat Kanyazovnoreplay@inlibrary.uzThis scientific thesis is devoted to intellectual property and its types, legal protection and enforcement of intellectual property, as well as violations of intellectual property rights in telecommunications networks, reforms in this area, and the results achieved. The scientific thesis analyses the existing problems in ensuring the protection of intellectual property objects, in particular copyrights and trademark rights in telecommunications networks, including the Internet, and provides appropriate reasonable solutions2022-04-06T00:00:00+08:00Copyright (c) 2021 Есемурат Каньязовhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7500Cyber security: lessons learned2022-07-05T11:12:33+08:00Dobran Bozicnoreplay@inlibrary.uzIn 2015-16 we started a cybersecurity strategy in Slovenia. We gathered IT experts from public administration to prepare a Strategy on Cyber Security. It is a readable document that is a compromise of everything: what we want to achieve, how much resources we need and what will be our path. The strategy changes every 2-3 years and now we are going to update it again. The EU has requested us to implement the Directive on network and informational security (NIST) in Slovenian legislation in 2019. Slovenia also was obliged to use the GDPR rules (protection of personal data) and started to work on Law was a compromise between the privacy and security. 2022-04-06T00:00:00+08:00Copyright (c) 2021 Добран Божичhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7502Organizational-legal mechanisms of the regulation of relations in the sphere of information security2022-07-05T11:24:25+08:00Gulnoza Ismailovainfo@nlibrary.uzYulduz Jonuzokova info@nlibrary.uz This article discusses the organizational and legal mechanisms for regulating relations in the field of information security, which has become an urgent issue today. It also includes information on the protection of information in modern society, the compliance of information security with the entire system of regulatory legal acts of the Republic of Uzbekistan and the adoption of comprehensive measures to form legislation in this area2022-04-06T00:00:00+08:00Copyright (c) 2021 Гулноза Исмаилова, Юлдуз Жонузоковаhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7503Use of artificial intelligence in public administration: the experience of slovenia2022-07-05T11:32:41+08:00Mitya Yermolnoreplay@inlibrary.uzSlovenia is doing a lot of work on making public data publicly available. The Ministry of Public Administration has a project that covers all the public databases – Open data governmental portals. There is another portal, called ERAR, that has been originally started by Goran Klemencic, while presiding the Commission for the Prevention of Corruption of Slovenia. In this database you have all the information about all state expenditures: sources of funds, expenditures, and the purpose of used funds. 2022-04-06T00:00:00+08:00Copyright (c) 2021 Митя Йермолhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7504Perspectives on ransomware2022-07-05T11:50:24+08:00Shardul Desainoreplay@inlibrary.uzPrior to working for Holland & Knight I spent 9 years working as a federal prosecutor in Western District, Pennsylvania. I handled some of the Department of Justice’s most significant cybercrime cases, including a Gameover ZeuS and Evil Corp prosecution. Both involved organized Russian cybercriminals who were involved with some of the most pernicious malware. I also have a background in computer science and physics.2022-04-06T00:00:00+08:00Copyright (c) 2021 Шардул Десаиhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7505Cryptocurrency: analytics, tracing, seizing2022-07-05T12:09:10+08:00Zia Farooqinoreplay@inlibrary.uzWhen I used to work at the US Department of Justice for 12 years and I was involved in international cyber and national security investigations. We conducted an investigation of the website “Welcome to video” – the site was run for the purpose of child exploitation. After the year of investigation and international cooperation with many countries we took down the site on the dark web. This was the largest dark net child pornography website.2022-04-06T00:00:00+08:00Copyright (c) 2021 Зия Фарукиhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7506Actual problems and solutions of ensuring information security of national scientific and educational electronic resources2022-07-05T12:10:43+08:00Marat Raxmatullaevinfo@nlibrary.uzSherbek Normatovinfo@nlibrary.uzIn the modern information society, many business structures have established their activities for the sale of information and information services. The increase in the volume of information in electronic form around the world, the development of technologies for creating information resources, as well as the improvement of information search and retrieval tools, further acceleration of the information flow, various functions in the general network and the dissemination of information at the level of confidentiality lead to an increase in the scale of threats to important information resources. Information about science and education has already established itself as an important strategic asset in the modern information society, influencing the development of such areas as science, education, technology, innovation, production, public administration. Scientific and educational resources are understood as licensed information contained in libraries, information resource centers, patent offices and information centers, as well as all types of scientific, technical and educational resources. Since there is any significant asset, it is necessary to protect it from harmful effects. The problem of information protection for science and education is primarily related to the assessment of the importance of such information. Since an organization can take the same level of protection measures for all information resources, it cannot adequately protect critical information resources, or the effectiveness of information security may be insufficient. The article investigated the artificial intelligence methods of value assessment scientific and educational information from the point of view of security, analysis of their characteristics and ensuring information security2022-04-06T00:00:00+08:00Copyright (c) 2021 Марат Рахматуллаев, Шербек Норматов https://inlibrary.uz/index.php/digital_technology_offenses/article/view/7507Features of the investigation of crimes committed using information technology:analysis and problems 2022-07-05T12:25:42+08:00Ulugbek Avilovnoreplay@inlibrary.uzToday, the rapid development of information technology and the widespread use of the Internet in all areas of civil society have become part of everyday activities, have entered the service, science, education, e-commerce, as well as the way of thinking of a modern person with its positive influence.2022-04-06T00:00:00+08:00Copyright (c) 2021 Улугбек Авиловhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7508Prosecutorial supervision over the investigation of crimes in the field of digital technologies2022-07-05T12:42:10+08:00Azamat Razikovnoreplay@inlibrary.uzIn connection with the intensive development of information technology and telecommunications in the world, the number of crimes in the field of information technology has increased. According to the World Economic Forum's 2019 Global Risk Report, data changes and cyberattacks are ranked the fourth and fifth global risks that every organization faces.2022-04-06T00:00:00+08:00Copyright (c) 2021 Азамат Разиковhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7509Recognition system of biometric identification of a person’s face based on the anti-spoofing model2022-07-05T12:44:12+08:00Saida Beknazarovainfo@nlibrary.uzMekhriban Jaumitbaevainfo@nlibrary.uzBiometric identification is often referred to as pure or real authentication, since it uses not a virtual, but a biometric attribute that is actually relevant to a person. Passwords can be stolen,spied on, forgotten, keys can be forged. But the unique characteristics of the person himself are much more difficult to fake and lose. This can be fingerprints, voice, drawing of blood vessels of the retina, gait, etc. Face recognition looks like a very promising direction for use in the mobile sector. If everyone includes long been used to using fingerprints, and technologies for working with voice are gradually and rather predictably developing, then with face identification the situation is rather unusual and worthy of a small excursion into the history of the issue.2022-04-06T00:00:00+08:00Copyright (c) 2021 Саида Бекназарова, Мехрибан Жаумитбаеваhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7510Overview of judicial practice in dealing with cases of crimes committed using digital technologies2022-07-05T12:52:54+08:00Behzod Muminovnoreplay@inlibrary.uzDigitalization in all spheres of life automatically leads to the digitization of the process of proof in criminal proceedings, the person who committed the crime, committing a crime in the virtual world, leaves a digital trace of himself, and not a physical one.2022-04-06T00:00:00+08:00Copyright (c) 2021 Бехзод Муминовhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7511Introduction of departmental electronic interaction in pre-judicial proceedings – the imperative requirement of the time2022-07-05T13:02:04+08:00Dilrabo Karimovainfo@nlibrary.uzThis article analyzes the need to introduce electronic interaction in the activities of law enforcement agencies, in particular the internal affairs bodies. The forms and directions of interaction are considered as a sociologically important element in the organization of their activities. The article substantiates the conditionality of the introduction of information and communication tools and methods in the activity of detecting and investigating crimes. The essence of the implementation of the “Unified Information System” Electronic Inquiry and Preliminary Investigation approved by the resolution of Shavkat Mirziyoyev dated January 28, 2022 “On measures to introduce a unified system of interdepartmental electronic interaction in pre-trial proceedings” is revealed. In addition, the opinions ofscientists who define the concept of electronic interaction as a necessary condition for organizing effective activities in the virtual space are given. Suggestions and recommendations are given for the development and implementation of conceptual approaches to improving law enforcement activities through the introduction of electronic interaction in pre-trial proceedings, digitalization of interaction2022-04-06T00:00:00+08:00Copyright (c) 2021 Дилрабо Каримоваhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7512Methods of computer-technical expertise on crimes in the field of digital technologies2022-07-05T13:04:59+08:00Lyudmila Yugainoreplay@inlibrary.uzThe article reveals the concept and essence of computer-technical expertise, the features of obtaining computer information and studying its carriers based on the methodology of searching, securing and researching digital evidence for crimes in the field of information technology. A comparative analysis of foreign and national practice in the field of methods of production of computer- technical expertise is carried out. The paper provides a fundamental list of requirements put forward by the court proceedings when an expert chooses methods of examination. The authors have formulated proposals and recommendations for improving this type of forensic examination2022-04-06T00:00:00+08:00Copyright (c) 2021 Людмила Югайhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7513The relevance of cybersecurity with the help of artificial intelligence2022-07-05T13:15:41+08:00Doston Tojimatovinfo@nlibrary.uzIn an increasingly digitized world, "cybersecurity" the relevance of the route is also increasing. Digital data increasing in size is also their safety it becomes more complicated.2022-04-06T00:00:00+08:00Copyright (c) 2021 Достонбек Тожиматов https://inlibrary.uz/index.php/digital_technology_offenses/article/view/7514Offenses in the electronic payment system and measures to prevent them2022-07-05T13:26:46+08:00Olimjon Talipovnoreplay@inlibrary.uzToday, as a result of the rapid development of remote services and online sales in the process of globalization of the world market, it has become possible for customers to freely use these services from anywhere in the world. Especially, the use of electronic payment services via the Internet is becoming increasingly popular in the Republic of Uzbekistan.2022-04-06T00:00:00+08:00Copyright (c) 2021 Олимжон Талиповhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7515Analysis of the legislation of the republic of uzbekistan and international legislation in the field of personal information security2022-07-05T13:37:01+08:00Gayrat Sadullaevinfo@nlibrary.uzThe article analyzes the legislation of the Republic of Uzbekistan and international legislation on ensuring personal information security, as well as the scientific views of leading scientists in the field of information security and the author’s opinions are expressed. As a result of the analysis, a number of proposals and recommendations were developed to ensure personal information security in national legislation2021-02-14T00:00:00+08:00Copyright (c) 2021 Гайрат Саъдуллаевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7499Legal policy in the field of countering crimes in the field of digital technologies in therepublic of Uzbekistan2022-07-05T10:38:45+08:00Abdulaziz Rasulevnoreplay@inlibrary.uzIn this article, the author examined the features of the legal policy of the Republic of Uzbekistan in the field of countering crimes in the field of digital technologies. The author pointed out as the main achievements of Uzbekistan’s legal policy the legislative consolidation of the protection of the interests of the individual, society and the state in the information sphere, in particular when using digital technologies, the prohibition of the illegal use of digital technologies as a crime, the creation of organizational and technical foundations for countering crimes in the field of information technology, the implementation of measures for digitalization. Despite the existing achievements in the field of countering crimes in the field of digital technologies in the Republic of Uzbekistan, new challenges and threats emerging in the world require the adoption of new measures and improvement of state policy. In this regard, the author proposes to identify three priority areas: the first direction is the improvement of the criminal legislation of the Republic of Uzbekistan (harmonization of the norms of the Criminal Code of the Republic of Uzbekistan in terms of responsibility for cybercrime to the norms of legislation in the field of information technology and security, implementation of international law, improvement of the current head of the Criminal Code of the Republic of Uzbekistan to modern challenges and threats to cybersecurity); the second direction is strengthening organizational and technical support of cybersecurity; the third direction is the adoption of measures for the prevention and prevention of crimes in the field of digital technologies. 2022-04-06T00:00:00+08:00Copyright (c) 2021 Абдулазиз Расулевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7517New challenges and threats in the field of information and ideology in central asia2022-07-05T13:39:07+08:00Sayfiddin Juraevinfo@nlibrary.uzThe intensification of reforms in the Central Asian states, the new situation in international relations, in particular, in foreign economic activity, coincided with the new global political and ideological conditions that require strengthening the comprehensive informatization of society and adequate inclusion in the international information and ideological system2022-04-06T00:00:00+08:00Copyright (c) 2021 Сайфиддин Жураевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7518Issues of mutual cooperation of ministries and departments in the fight against violations of legislative requirements in the internet world information network2022-07-05T13:48:17+08:00Mamura Mamajanovanoreplay@inlibrary.uzIn the current process of globalization of digital technologies in our country, comprehensive measures are being implemented for the active development of the economy, the widespread introduction of modern information and communication technologies in all industries and areas, primarily in public administration, education, healthcare and agriculture.2022-04-06T00:00:00+08:00Copyright (c) 2021 Маъмура Мамаджановаhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7519Prevention and protection of ideological threats in the internet in the global environment2022-07-05T14:44:08+08:00Jamila Shermuhammedovainfo@nlibrary.uzThis article discusses the actual problem of our time – ideological threats emanating from the Internet in the context of globalization, their protection and prevention2022-04-06T00:00:00+08:00Copyright (c) 2021 Жамила Шермухаммедоваhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7520Prospects of legal regulation of social networks in the republic of uzbekistan2022-07-05T15:08:52+08:00Shokhjakhon Khujayevinfo@nlibrary.uzThis article is devoted to the analysis of problems and prospects of legal regulation of social networks in the Republic of Uzbekistan. Today, in the conditions of globalization, the virtualization of relations and digitalization of almost all forms of activity have become an irreversible and integral element of our life. Virtual space, especially social networks, expanding the possibilities of relationships between members of society, has created a new form of public relations on the World Wide Web. In turn, the absence of any regulatory mechanisms, in particular legal norms regarding social networks, require the adoption of timely and adequate response measures by the state. The ongoing pandemic of the COVID-19 coronavirus further convinces that the delay in taking measures to regulate social networks can lead to various kinds of problems of a political, social and economic nature. Solving the problems of regulating the activities of social networks has both theoretical and practical significance. The presence of complex problems testifies to the importance of a theoretical study of the essence of social networks within the framework of a comprehensive system of cyber law, since traditional branches of law (civil law, administrative law) are not fully capable of ensuring the effectiveness of regulation and proper protection of the rights and freedoms of the individual, society and the state. While legislation regulates some aspects of these problems in various regulatory legal acts, the lack of an integrated approach to social networks leadsto the emergence of multi-vector problems2022-04-06T00:00:00+08:00Copyright (c) 2021 Шохжахон Хужаевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7521The role of information technology in the development of social and spiritual life of young people2022-07-05T15:25:05+08:00Sharofiddin Xonimovinfo@nlibrary.uzThis article is devoted to the theoretical foundations of the role of digital technologies in the development of the social and spiritual life of young people. The article also describes the level of use of information and communication technologies by young people, the results of research that reflect current problems in the formation of a culture of information consumption.2022-04-06T00:00:00+08:00Copyright (c) 2021 Шарофиддин Хонимовhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7522Destructive ideologies on the internet: direct and side effects of confrontation2022-07-05T15:38:30+08:00Zakir Abdullayevinfo@nlibrary.uzThe problem of confronting the religiously motivated ideology of extremism today remains the most relevant in the field of preventive measures. Of the methods we use to counteract destructive ideologies, we primarily rely on the so-called. “raddiya” (religious denials). The logic of such a calculation is understandable – the religious argumentation of Islamic radicalsis most reasonable to refute with the same religious counterarguments. However, the realities of today’s state of this “eternal religious dispute” rather testify to the weak impact of this method. This article explores the reasons for the low effect of this method on the example of some of the responses of Islamic theologians2022-04-06T00:00:00+08:00Copyright (c) 2021 Закир Абдуллаевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7523The protection of journalist’s activity: legal mechanisms need to be improved2022-07-05T16:05:35+08:00Khurshida Abzalovainfo@nlibrary.uzZafar Ergashevinfo@nlibrary.uzThe article deals with issues related to the protection of journalistic rights. The experience of foreign countries in bringing journalists to justice for interfering in their activities is presented2022-04-06T00:00:00+08:00Copyright (c) 2021 Хуршида Абзалова, Зафар Эргашевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7524Negative consequences of use of information and communication technologies for harmful purposes and prospects for information security2022-07-05T16:23:53+08:00Otabek Toshevinfo@nlibrary.uzAmiriddin Anorboevinfo@nlibrary.uzAs we all know, Uzbekistan in 2017-2021 Five priority directions of development of the Republic Performing the tasks of the prospect defined in the strategy of action in order to increase the digital sector of the Republic's economy large-scale measures are being taken to develop, electronic document management systems, e-commerce the regulatory framework is being improved, electronic payments and digital operating on information and technological platforms the economy is developing rapidly, "Blokcheyn" technologies (information distributed registry technologies), "artificial intelligence", using the capabilities of supercomputers, as well, activities on crypto assets are underway, bunda announced the launch of "Blokcheyn" technologies not only reach many sectors of the economy, but also astasekin is being introduced to the public administration system and other public relations2022-04-06T00:00:00+08:00Copyright (c) 2021 Отабек Тошев, Амириддин Анорбоевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7525Digital higher education is a requirement of the time2022-07-05T17:24:52+08:00Ranokhon Tursnunovainfo@nlibrary.uzThe article “Digital higher education is a requirement of the time” touches upon issues related to the improvement of the higher education system and the transition to a digital platform in connection with the challenges of the time and the need to adapt in a pandemic. The Republic of Uzbekistan has adapted its system of higher education and today is actively using a hybrid form of education. However, along with the positive experience in the transition to online learning, negative points have also been revealed that need to be addressed by joint efforts2022-04-06T00:00:00+08:00Copyright (c) 2021 Ранохон Турсуноваhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7526Improving the environmental expertise of draft regulatory legal acts in the new-digital uzbekistan2022-07-06T04:10:19+08:00Sherzod Bahronovinfo@nlibrary.uzThe importance and relevance of environmental expertise of draft regulatory legal acts in the context of a significant increase in the impact of environmental problems on the life of each state, society and person is revealed. In particular, the legislation and experience of foreign countries were analyzed. In Uzbekistan, several proposals have been put forward to improve the organizational and legal mechanisms for conducting environmental expertise of draft regulatory legal acts2022-04-06T00:00:00+08:00Copyright (c) 2021 Шерзод Бахроновhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7527The level of media literacy in uzbekistan, current problems and prospects of developmeNT2022-07-06T04:24:29+08:00Azamjon Xudaykulovinfo@nlibrary.uzIn the age of digital technologies, information security, prevention of violations in the information and digital space is becoming a topical issue. Information attacks have become the main weapon that can seriously affect the security of the state and society. Therefore, today the level of media literacy among the population is one of the most important tools in the fight against various manipulations and information attacks. This article examines the benefits of media literacy and its current problems and prospects in Uzbekistan2022-04-06T00:00:00+08:00Copyright (c) 2022 Аъзамжон Худайкуловhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7528The concept of psychological security of information, its essence2022-07-06T04:39:34+08:00Xurshid Eshovinfo@nlibrary.uzNafisa Ponsotovainfo@nlibrary.uzThe role of information and psychological factors in world politics intensive visually, it is increasing in different ways. Mass of the world computerization, implementation of new information technology and development in the fields of education, business, industrial production, scientific strong Silge forward in research and socio-political life provided. Information to human resource that does not end in a global character became. The new stage of civilization is precisely the acquisition of information and it has become a period of management2022-04-06T00:00:00+08:00Copyright (c) 2021 Хуршид Эшов, Нафиса Понсотоваhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7529The relevance of using artificial intelligence technologies to ensure information security2022-07-06T04:39:55+08:00Temur Azamovinfo@nlibrary.uzParviz Nasrullayevinfo@nlibrary.uzYuldoshboy Sultanovinfo@nlibrary.uzThis article discusses the relevance of using artificial intelligence technologies in information security. In the field of information security, an analysis of possible ways of using artificial intelligence was carried out and the possibilities of using this high technology to prevent unauthorized access to information, as well as to reduce the consequences of information security violations, were studied2022-04-06T00:00:00+08:00Copyright (c) 2021 Темур Аъзамов, Парвиз Насруллаев, Йулдошбой Султановhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7530The evolution of the development of digital diplomacy in us foreign policy2022-07-06T05:26:40+08:00Bobirjon Izzatullayevinfo@nlibrary.uzDigital diplomacy for the first time as a term 1996 year in the US "Washington Files" was used in the online edition [1]. Later this terminus in other newspapers, magazines, radio and television in the United States the beginning of its wide application began to lead to its popularity2022-04-06T00:00:00+08:00Copyright (c) 2021 Бобуржон Иззатуллаевhttps://inlibrary.uz/index.php/digital_technology_offenses/article/view/7531Alternative methods of pre-trial resolution of disputes arising from public-legal relations2022-07-06T05:41:56+08:00Sanobarkhan Kabulova info@nlibrary.uzTo date, the provision of alternative methods of resolving administrative disputes by filing a claim to the court in addition to the consideration of mass legal disputes in judicial proceedings is not only scientific it is an urgent and priority task not only in the direction, but also at the legislative level2022-04-06T00:00:00+08:00Copyright (c) 2021 Санобархон Кабулова