ANALYSIS OF IT FRAUD SCHEMES: CLASSIFICATION AND COUNTERACTION

  • O.A. Starostenko
    • Krasnodar University of the Ministry of Internal Affairs of Russia
Keywords: IT fraud, criminal scheme, method, security, victim, Internet, intruder, mechanism of behavior

Abstract

The article analyzes common criminal IT fraud schemes, examines the dynamics of cyber fraudulent actions on the territory of Russia for the period 2019-2020. It was revealed that the most important element of the mechanism of the criminal behavior of a cyber fraudster is the method of committing a crime. An empirical analysis of the views of criminologists on the way IT fraud is committed made it possible to single out its three main properties (actions must be performed in the course of a criminal act; actions are aimed at achieving a criminal result; actions reflect the individual characteristics of a crime). The analysis of criminal schemes made it possible to systematize the data, develop the author's criteria for their classification (depending on the communication channels; by the area of influence; by referential means; by the degree of psychoemotional impact on the victim), as well as traditional and criminological methods of countering IT fraud that can help the user avoid confusion and intersection of concepts, organize data, strengthen personal and property security in cyberspace.

References

Received 2021-10-11
Published 2021-12-03
Section
Jurisprudence
Pages
1072-1077