Some Psychological Features of Victims of Crime Committed Using Digital Technologies

Keywords: cybervictimism, types of cybercrime, Internet fraud, digital space, psychological stability, information and psychological security

Abstract

The large-scale development of information technology and the wide spread of the Internet have involved millions of people in the daily use of digitalization products as a means of communication, work, entertainment and other purposes. At the same time, the online world has become an attractive environment for various types of crime. Some attackers are interested in gaining access to confidential information, such as personal and financial data, trade secrets, intellectual property, etc. The information they receive can be used for fraud, espionage or extortion. This article provides a list of common crimes and offenses committed, including with the use of digital technologies, in accordance with the Criminal Code of the Russian Federation and the Code of the Russian Federation of Administrative Offenses; current types of cybercrime are considered, an assessment is made of the psychological characteristics of persons who commit crimes using digital technologies and their victims. At the end of the article, recommendations are given to ensure psychological resilience to the main threats of the digital environment. Compliance with the rules of information and psychological security and digital education of the society can significantly reduce vulnerability and minimize the risks of user victimization.

Downloads

Download data is not yet available.

Author Biography

Д.Р. Белодед, Kaluga State University named after K. E. Tsiolkovski, Kaluga, Russia

D.R. Beloded, Forensic psychologist, postgraduate student of the Institute of Psychology

References

Antonov AG, Aleshina-Alekseeva EN, Sokolova AV. To the question of the concept and types of cybercrime. Vestnik Permskogo instituta FSIN Rossii [Bulletin of the Perm Institute of the Federal Penitentiary Service of Russia]. 2023;(1):5-10. EDN CXJRIB. (In Russ.).

Gar'kushov VD, Smirnov VM. Phishing - as one of the main types of cybercrime in modern times. Sovremennye problemy lingvistiki i metodiki prepodavaniya russkogo yazyka v VUZe i shkole [Modern problems of linguistics and methods of teaching the Russian language at the university and school]. 2022;(40):320-322. EDN EQVFJW. (In Russ.).

Grigoryan SA. Features of the personality of a modern “cybercriminal”. Nauka i obrazovanie: khozyaistvo i ekonomika; predprinimatel'stvo; pravo i upravlenie [Science and education: economy and economy; entrepreneurship; law and management]. 2022;(8):103-106. (In Russ.).

Engalychev VF. Psychological foundations of high school training of specialists in legal psychology: specialty 19.00.07 "Pedagogical psychology", 19.00.06 "Legal psychology": [abstract dissertation]. St. Petersburg, 2006. 43 p. EDN NJVWNB. (In Russ.).

Zhmurov DV. Cyber victim: classification features. Russian criminological journal. 2022;16(4):463-472. DOI: https://doi.org/10.17150/2500-4255. EDN QFQHWL. (In Russ.).

Ivanova LV. Types of cybercrimes under Russian criminal law. Yuridicheskie issledovaniya [Legal Research]. 2019;(1):25-33. DOI: https://doi.org/10.25136/2409-7136.2019.1.28600. EDN OPWTXO. (In Russ.).

Kabanov PA. Victims of cyber fraud as one of the objects of modern cyber victimology: a brief statistical analysis of indicators of criminal victimization in 2021-2022. Viktimologiya [Victimology]. 2023;10(1):17-28. DOI: https://doi.org/10.47475/2411-0590-2023-10102. EDN OKOGGX. (In Russ.).

Korzunin VA, Dukhnovskii SV, Engalychev VF. Criminal identity of juvenile offenders in the context of modern research. Viktimologiya [Victimology]. 2023;10(1):49-58. DOI: https://doi.org/10.47475/2411-0590-2023-10105. EDN QAYXAN. (In Russ.).

Kochkina EL. Definition of the term "cybercrime". Separate types of cybercrimes. Sibirskie ugolovno-protsessual'nye i kriminalisticheskie chteniya [Siberian Criminal Procedure and Forensic Readings]. 2017;3(17):162-169. EDN ZWBOLL. (In Russ.).

Levin DK, Kuzovkov DA, Torba IV. Phishing as a type of Internet fraud: protection rules. Nauka i sovremennost': Materialy Vserossiiskoi nauchno-prakticheskoi konferentsii studentov i molodykh uchenykh [Science and Modernity: Proceedings of the All-Russian Scientific and Practical Conference of Students and Young People scientists], Taganrog, 11 noyabrya 2022 Nov 11. Taganrog. 2022:87-90. EDN NZAKUI. (In Russ.).

Leonova EV. Qualitative and quantitative research methods in psychology: [Textbook]. Kaluga. 2017. 411 p. EDN ZVDFZF. (In Russ.).

Mayorov AV. Protection of human rights: victimological aspect. Viktimologiya [Victimology]. 2014;(2):12-15. EDN TMKZXZ. (In Russ.). URL: https://victimolog.ru/index.php/victimo/article/view/424

Rozhenko VA, Valeeva RA. Actualization of the problem of prevention of victim behavior of adolescents on the Internet. Mezhdunarodnyi zhurnal eksperimental'nogo obrazovaniya [International Journal of Experimental Education]. 2022:(6):56-60. (In Russ.).

Savin IV. Cross-site scripting as an actual threat to modern web systems. Nauka, tekhnika i obrazovanie [Science, technology and education]. 2017;(9):40-43. EDN ZPDRTF. (In Russ.).

Smirnov VM. Nikolaev MD. Hacking as one of the main types of cybercrime in modern times. Tendentsii razvitiya nauki i obrazovaniya [Trends in the development of science and education]. 2023:(97-12):116-119. DOI: https://doi.org/10.18411/trnio-05-2023-676. EDN VPHDVJ. (In Russ.).

Smirnov VM. Saltykov MA. Clickjacking or a new way of deceiving users. Tendentsii razvitiya nauki i obrazovaniya [Trends in the development of science and education]. 2023:(97-12):119-121. DOI: https://doi.org/10.18411/trnio-05-2023-677. EDN PXKIAE. (In Russ.).

Shabanov AV, Anisimov IV, Ignatov DV. Analysis of e-mail spoofing threats. Tekhnika i bezopasnost' ob"ektov ugolovno-ispolnitel'noi sistemy: cbornik materialov Mezhdunarodnoi nauchno-prakticheskoi konferentsii [Technique and safety of objects of the penitentiary system: collection of materials of the International Scientific and Practical Conference]. Voronezh. 2022 May 18–19. Vol. 1. Ivanovo. 2022:308-312. EDN NKQGPS. (In Russ.).

Cañas E., Estévez E., León-Moreno C., Musitu G. Loneliness, Family Communication, and School Adjustment in a Sample of Cybervictimized Adolescents. Int J Environ Res Public Health. 2020 Jan 3;17(1):335. DOI: https://doi.org/10.3390/ijerph17010335. PMID: 31947793; PMCID: PMC6982055.

Kaouthar Ch., Birom B., Abderrahim A., Ayoub B. Overview of Social Engineering Attacks on Social Networks. Procedia Computer Science. 2022:656-661. DOI: https://doi.org/10.1016/j.procs.2021.12.302.

Zak F. Justice for Revenge Porn Victims: Legal Theories to Overcome Claims of Civil Immunity by Operators of Revenge Porn Websites. California Law Review. 2014;102(5):1303–35. http://www.jstor.org/stable/24758167.

James BD, Boyle PA, Bennett DA. Correlates of susceptibility to scams in older adults without dementia. J Elder Abuse Negl. 2014;26(2):107-122. DOI: https://doi.org/10.1080/08946566.2013.821809. PMCID: PMC3916958.

Özdemİr Ö. Cyberbullying as a virtual threat among youth. Karadeniz Uluslararası Bilimsel Dergi. 2019;(41):80-91. DOI: https://doi.org/10.17498/kdeniz.494627. EDN MSWDBX.

Michael P., Neil Sh., Presley McG. Personality and Online Deviance: The role of Reinforcement Sensitivity Theory in Cybercrime. Computers in Human Behavior. 2021;120:106745. DOI: https://doi.org/10.1016/j.chb.2021.106745.

Schiks JAM, van de Weijer SGA, Leukfeldt ER. High tech crime, high intellectual crime? Comparing the intellectual capabilities of cybercriminals, traditional criminals and non-criminals. Comput Human Behav [Internet]. 2022;126(3):106985. Available from: http://dx.doi.org/10.1016/j.chb.2021.106985

Zlokazov KV, Gurieva SD, Kawabata T. Systems of social networks of delinquent young people. SHS Web Conf [Internet]. 2021;108:05012. DOI: http://dx.doi.org/10.1051/shsconf/202110805012.

Published
2023-08-14
How to Cite
Белодед, Д. (2023). Some Psychological Features of Victims of Crime Committed Using Digital Technologies. VICTIMOLOGY [VIKTIMOLOGIA], 10(3), 320-334. https://doi.org/10.47475/2411-0590-2023-10-3-320–334
Section
Original articles