Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ RUC. Repositorio da ...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
versions View all 2 versions
addClaim

El delito de estafa informática: su regulación y aplicación jurisprudencial

The Crime of Computer Fraud: its Regulation and Jurisprudential Application
Authors: Bourtal Bouhalloufa, Siham;

El delito de estafa informática: su regulación y aplicación jurisprudencial

Abstract

[Abstract] This paper provides an in-depth analysis of the crime of computer fraud as regulated in Article 249 of the Spanish Criminal Code, highlighting its legislative evolution, legal structure, objective and subjective elements, as well as the technological means commonly used to commit it, such as phishing, pharming, and malware. The study also examines the role of so-called money mules within the criminal framework, the criminal liability of legal entities, punishable preparatory acts, and the aggravating circumstances established by law.

[Resumen] El presente trabajo analiza en profundidad el delito de estafa informática regulado en el artículo 249 del Código Penal, destacando su evolución normativa, estructura típica, elementos objetivos y subjetivos, así como los medios tecnológicos comúnmente empleados para su comisión, como el phishing, pharming o el malware. Se examina el papel de los denominados muleros en la estructura delictiva, la responsabilidad penal de las personas jurídicas, los actos preparatorios punibles y las circunstancias agravantes previstas legalmente.

Traballo fin de mestrado (UDC.DER). Mestrado Universitario en Dereito Dixital e da Intelixencia Artificial. Curso 2024/2025

Country
Spain
Related Organizations
Keywords

Ciberdelincuencia, Cybercrime, Phishing, Código Penal, Malware, Ingeniería social, Money mules, Criminal Code, Transferencia patrimonial, Computer fraud, Muleros, Asset transfer, Social engineering, Estafa informática

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green
Related to Research communities