Downloads provided by UsageCounts
Abstract High-tech crime encompasses a diverse set of illegal activities that take place in cyberspace. This new type of crime is becoming more and more prevalent with the development of information and communication technologies. Hacking attacks, identity theft, cyber espionage, various frauds and distribution of illegal content over the Internet represent different types of high-tech crime. In today's world, states must be able to adapt to the rapid and continuous development of technology in order to successfully suppress high-tech criminal activities. The fight against this phenomenon requires an adequate legal framework, various protection measures, as well as international cooperation. The reason for this should be found in the principle that high-tech crime does not stop at the borders of states. The paper aims to examine the very concept of high-tech crime, its various forms, as well as the most important normative provisions and institutional mechanisms that exist in the Republic of Serbia. Key words: High-tech crime, cyber crime, Republic of Serbia.
High-tech crime, cyber crime, Republic of Serbia
High-tech crime, cyber crime, Republic of Serbia
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 15 | |
| downloads | 13 |

Views provided by UsageCounts
Downloads provided by UsageCounts