Electronic fraud in the Ecuadorian Criminal System

Authors

DOI:

https://doi.org/10.35381/racji.v9i1.3581

Keywords:

Computer-related crime, constitutional law, social networks, (UNESCO Thesaurus)

Abstract

The general objective of the research was to legally analyse electronic fraud in the Ecuadorian Penal System. This research used the quantitative method, which produces descriptive data, originating from data collection. Supported by the documentary-bibliographic review. In addition, the inductive-deductive method was used. The analytical-synthetic method was also used. The use of these methods made it possible to analyse doctrine, normative bodies, legal documents, bibliography, which after the relevant analysis, allowed criteria and contributions to be generated. It is concluded that computer crimes are constantly evolving and due to the new contexts in which they interact, it is necessary to typify the criminal acts that are committed with the help of technology. The current Comprehensive Organic Criminal Code of Ecuador has made great progress in establishing computer crimes, but it is necessary to periodically review it in order to update it.

Downloads

Download data is not yet available.

References

Asamblea Nacional (2014). Código Orgánico Integral Penal. [Comprehensive Criminal Code]. Registro Oficial Nº 180. https://url2.cl/53c6h

Asamblea Nacional (2002). Ley de Comercio Electrónico, Firmas y Mensajes de Datos. [Law on Electronic Commerce, Signatures and Data Messages]. Ley 67 Registro Oficial Suplemento 557 de 17-abr-2002.Estado: Vigente. https://n9.cl/l1srj

Camacho, L. (1987). El delito Informático. [Computer crime]. Madrid. España. Editorial L Camacho.

Dávila Newman, G. (2006). El razonamiento inductivo y deductivo dentro del proceso investigativo en ciencias experimentales y sociales. Laurus, 12(Ext), 180-205. https://n9.cl/nx847

Devia González, E. (2017). Delito informático: Estafa informática del artículo 248.2 del Código Penal. [Computer-related crime: Computer-related fraud under Article 248(2) of the Criminal Code]. Tesis Doctoral. Universidad de Sevilla. https://n9.cl/cynqb

Jara, L., Ferruzola, E., y Rodríguez, G. (2017). Delitos a través redes sociales en el Ecuador: una aproximación a su estudio. [Crimes through social networks in Ecuador: an approximation to their study]. I+D Tecnológico, 13(2), 111-122. https://n9.cl/r23jd

Naula González, J. E., Narváez Zurita, C. I., Vázquez Calle, J. L., y Erazo Álvarez, J. C. (2020). La acción de protección: El daño grave entre particulares. [The action for protection: serious damage between private parties]. IUSTITIA SOCIALIS, 5(8), 414-429. https://doi.org/10.35381/racji.v5i8.583

Obregón, L. J., Gómez, E. F., y López, G. R. (2017). Delitos a través redes sociales en el Ecuador: una aproximación a su estudio. [Crimes through social networks in Ecuador: an approach to their study]. RIDTEC,13(2),112-122. https://n9.cl/5zgnee

Rodríguez, A., y Pérez, A. O. (2017). Métodos científicos de indagación y de construcción del conocimiento. Revista EAN, 82, 179-200. https://doi.org/10.21158/01208160.n82.2017.1647

Published

2024-02-01

How to Cite

Enríquez-Chapi, B. J., Muñoz-Chulde, D. A., Guerrón-Bracero, M. S., & Santander-Moreno, J. J. (2024). Electronic fraud in the Ecuadorian Criminal System. IUSTITIA SOCIALIS, 9(1), 336–345. https://doi.org/10.35381/racji.v9i1.3581

Issue

Section

De Investigación

Most read articles by the same author(s)