z-logo
open-access-imgOpen Access
ANALYSIS OF IT FRAUD SCHEMES: CLASSIFICATION AND COUNTERACTION
Author(s) -
O.A. Starostenko
Publication year - 2021
Publication title -
vestnik udmurtskogo universiteta. èkonomika i pravo
Language(s) - English
Resource type - Journals
eISSN - 2413-2446
pISSN - 2412-9593
DOI - 10.35634/2412-9593-2021-31-6-1072-1077
Subject(s) - cyberspace , confusion , computer security , intersection (aeronautics) , element (criminal law) , property (philosophy) , criminology , crime prevention , criminal investigation , computer science , internet privacy , cyber crime , criminal behaviour , political science , business , law , sociology , psychology , engineering , the internet , world wide web , epistemology , philosophy , psychoanalysis , aerospace engineering
The article analyzes common criminal IT fraud schemes, examines the dynamics of cyber fraudulent actions on the territory of Russia for the period 2019-2020. It was revealed that the most important element of the mechanism of the criminal behavior of a cyber fraudster is the method of committing a crime. An empirical analysis of the views of criminologists on the way IT fraud is committed made it possible to single out its three main properties (actions must be performed in the course of a criminal act; actions are aimed at achieving a criminal result; actions reflect the individual characteristics of a crime). The analysis of criminal schemes made it possible to systematize the data, develop the author's criteria for their classification (depending on the communication channels; by the area of influence; by referential means; by the degree of psychoemotional impact on the victim), as well as traditional and criminological methods of countering IT fraud that can help the user avoid confusion and intersection of concepts, organize data, strengthen personal and property security in cyberspace.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here