<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">Vestnik of the East Siberian institute of the Ministry of internal affairs of the Russian Federation</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">Vestnik of the East Siberian institute of the Ministry of internal affairs of the Russian Federation</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Вестник Восточно-Сибирского института МВД России</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="print">2312-3184</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">58944</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>ДИСКУССИОННАЯ ТРИБУНА</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>DISCUSSION TRIBUNE</subject>
    </subj-group>
    <subj-group>
     <subject>ДИСКУССИОННАЯ ТРИБУНА</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">ACTUAL PROBLEMS OF FIGHTING CRIME IN THE INFORMATION TECHNOLOGY FIELD IN MONGOLIA</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>АКТУАЛЬНЫЕ ПРОБЛЕМЫ БОРЬБЫ С ПРЕСТУПНОСТЬЮ В СФЕРЕ ИНФОРМАЦИОННЫХ ТЕХНОЛОГИЙ В МОНГОЛИИ</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Даваажав</surname>
       <given-names>Сумъяацэрэн </given-names>
      </name>
      <name xml:lang="en">
       <surname>Davaagav</surname>
       <given-names>Cumyaazayrayn </given-names>
      </name>
     </name-alternatives>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">Институт научного исследования и развития университета Монголии</institution>
     <country>ru</country>
    </aff>
    <aff>
     <institution xml:lang="en">Research and Development Institute, Law Enforcement University, Mongolia</institution>
     <country>ru</country>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2017-12-25T14:01:20+03:00">
    <day>25</day>
    <month>12</month>
    <year>2017</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2017-12-25T14:01:20+03:00">
    <day>25</day>
    <month>12</month>
    <year>2017</year>
   </pub-date>
   <issue>4</issue>
   <fpage>194</fpage>
   <lpage>198</lpage>
   <history>
    <date date-type="received" iso-8601-date="2017-12-15T14:01:20+03:00">
     <day>15</day>
     <month>12</month>
     <year>2017</year>
    </date>
    <date date-type="accepted" iso-8601-date="2017-12-15T14:01:20+03:00">
     <day>15</day>
     <month>12</month>
     <year>2017</year>
    </date>
   </history>
   <self-uri xlink:href="https://vestnikesiirk.ru/en/nauka/article/58944/view">https://vestnikesiirk.ru/en/nauka/article/58944/view</self-uri>
   <abstract xml:lang="ru">
    <p>Статья посвящена состоянию киберпреступности в Монголии. Дается краткая характеристика киберпреступности на основе анализа статистических данных за последние 10 лет, исследованы способы совершения данного вида преступлений, на основании чего предложены конкретные предложения по борьбе с киберпреступностью в стране.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>The article is devoted to cybercrime in Mongolia and the problem of their detection. The author gave a brief overview of cybercrime, based on the analysis of statistical data for the last 10 years, explored ways of committing this type of crimes on the basis of what put forward concrete proposals to combat cybercrime in the country.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>киберпреступление</kwd>
    <kwd>киберпреступность</kwd>
    <kwd>преступность в сфере информационных технологий</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>cybercrime</kwd>
    <kwd>cybercrime</kwd>
    <kwd>crime in the field of information technology</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Комиссия по регулированию коммуникаций Монголии. Статистика потребителей интернета. 2016 г.</mixed-citation>
     <mixed-citation xml:lang="en">Komissiya po regulirovaniyu kommunikaciy Mongolii. Statistika potrebiteley interneta. 2016 g.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Цогтбаяр Л. Theoretical and methodical basics of investigation of crimes in cyber environment. Улан-Батор, 2015. С. 150.</mixed-citation>
     <mixed-citation xml:lang="en">Cogtbayar L. Theoretical and methodical basics of investigation of crimes in cyber environment. Ulan-Bator, 2015. S. 150.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Уголовный кодекс Монголии. 2002 г.</mixed-citation>
     <mixed-citation xml:lang="en">Ugolovnyy kodeks Mongolii. 2002 g.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Статистика преступлений (2006-2016 г.) / Национальное полицейское агентство.</mixed-citation>
     <mixed-citation xml:lang="en">Statistika prestupleniy (2006-2016 g.) / Nacional'noe policeyskoe agentstvo.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Отдел кибербезопасности. URL: http://ncsc.gov.mn/index.php?id=135</mixed-citation>
     <mixed-citation xml:lang="en">Otdel kiberbezopasnosti. URL: http://ncsc.gov.mn/index.php?id=135</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Комсомольская правда. URL: http://www.kp.ru/daily/26555/3027133/</mixed-citation>
     <mixed-citation xml:lang="en">Komsomol'skaya pravda. URL: http://www.kp.ru/daily/26555/3027133/</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Цогтбаяр Л. Theoretical and methodical basics of investigation of crimes in cyber environment. С. 294.</mixed-citation>
     <mixed-citation xml:lang="en">Cogtbayar L. Theoretical and methodical basics of investigation of crimes in cyber environment. S. 294.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Сборник научных статей по материалам международной науч.-практ. конф., посвящ. 20-летию образования Бурятского филиала академии труда и социальных отношений. Улан-Удэ, 2015. С. 468.</mixed-citation>
     <mixed-citation xml:lang="en">Sbornik nauchnyh statey po materialam mezhdunarodnoy nauch.-prakt. konf., posvyasch. 20-letiyu obrazovaniya Buryatskogo filiala akademii truda i social'nyh otnosheniy. Ulan-Ude, 2015. S. 468.</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
