<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">jssi</journal-id>
      <journal-title-group>
        <journal-title>Journal of Security and Sustainability Issues</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2029-7017</issn>
      <issn pub-type="ppub">2029-7017</issn>
      <publisher>
        <publisher-name>LKA</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">41_LOREK_11</article-id>
      <article-id pub-id-type="doi">10.47459/jssi.2021.11.41</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>New Forms of Crime on the Net</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-6814-8162</contrib-id>
          <name>
            <surname>Lorek</surname>
            <given-names>Marlena</given-names>
          </name>
          <email xlink:href="mailto:mlorek@prz.edu.pl">mlorek@prz.edu.pl</email>
          <xref ref-type="aff" rid="j_jssi_aff_000"/>
          <xref ref-type="corresp" rid="cor1">∗</xref>
        </contrib>
        <aff id="j_jssi_aff_000">Rzeszów University of Technology, Poland</aff>
        <contrib contrib-type="author">
          <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-0119-2705</contrib-id>
          <name>
            <surname>Malec</surname>
            <given-names>Norbert</given-names>
          </name>
          <email xlink:href="mailto:norbek@poczta.fm">norbek@poczta.fm</email>
          <xref ref-type="aff" rid="j_jssi_aff_001"/>
        </contrib>
        <aff id="j_jssi_aff_001">University of Natural Sciences and Humanities in Siedlce, Poland</aff>
      </contrib-group>
      <author-notes>
        <corresp id="cor1"><label>∗</label>Corresponding author.</corresp>
      </author-notes>
      <volume>11</volume>
      <issue>1</issue>
      <fpage>457</fpage>
      <lpage>462</lpage>
      <pub-date pub-type="epub">
        <day>30</day>
        <month>06</month>
        <year>2021</year>
      </pub-date>
      <history>
        <date date-type="received">
          <day>18</day>
          <month>02</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>15</day>
          <month>06</month>
          <year>2021</year>
        </date>
      </history>
      <permissions>
        <license license-type="open-access">
          <license-p>Creative Commons Attribution International License (CC BY)</license-p>
        </license>
      </permissions>
      <abstract>
        <p>The article indicates the threats of crime on the Internet and the specificity of criminals’ activities. Moreover, the content of the work shows how dynamically crime is changing on the Internet and it may affect all users. Nevertheless, the youngest are the most vulnerable to the actions of criminals because they can easily trust a perpetrator, who wants to commit a crime against a minor. Today, we all use different websites more frequently because the current pandemic situation in the world shows that both study, play and work only takes place in the virtual world (Hofmolk 2009).Online crime is now very dynamic and dangerous due to the high number of victims that were affected this type of online crime. Each of us could fall victim to hackers more than once in the network, however, we managed to react and prevent entry into our devices and data theft. The most dangerous thing is that the perpetrators are often anonymous because finding these people is almost impossible due to their skills in this area. The police have many mechanisms to combat this phenomenon, however, in many cases it is impossible to confirm who was the perpetrator of the incident online. Identification in the network is very difficult to detect because the perpetrators do not leave behind any signs such as: fingerprints, image or voice. The aim of the article was to indicate new forms of crime on the Internet and to show the broad spectrum of activities of offenders on the Internet. It was also indicated how big is the dynamics of crime and the emergence of newer and newer forms of online activity.</p>
      </abstract>
      <kwd-group>
        <label>Keywords</label>
        <kwd>crime</kwd>
        <kwd>police</kwd>
        <kwd>computer crime</kwd>
        <kwd>internet fraud</kwd>
        <kwd>hacking</kwd>
        <kwd>sniffing</kwd>
        <kwd>computer sabotage</kwd>
        <kwd>cracking</kwd>
        <kwd>phishing</kwd>
      </kwd-group>
      <kwd-group kwd-group-type="JEL">
        <label>JEL</label>
        <kwd>K24</kwd>
      </kwd-group>
    </article-meta>
  </front>
</article>
