Problems of Countering Social Engineering Technologies as an Element of Criminal Activity
Abstract
The article examines the problems of countering social engineering technologies as an element of criminal activity and suggests ways to solve them. The circumstances that cause an increased public danger of criminal activity, the method of which is social engineering technologies, have been identified. Among these circumstances, the following are investigated: the variability and diversity of methods used by criminals to commit socially dangerous acts and harm the victim; the reasons for the high latency of these crimes; the high prevalence of such crimes in various areas of criminal activity, especially related to the use of information and telecommunication networks and IT technologies.
A range of problems is described, the solution of which will increase the effectiveness of countering crimes, the methods of which are social engineering. Among the identified problems are: the lack of terminological certainty; the lack of "information hygiene" among most citizens; insufficient consideration of the psychological characteristics of the target victim as a victim factor that determines the choice of specific methods of social engineering in relation to this victim.
The article analyzes the activities of law enforcement agencies for the prevention of crimes, the method of which is social engineering, in order to increase the effectiveness of combating them. The potential possibilities of increasing the victimological safety of "risk groups" from crimes committed using "manipulative" information systems and methods are revealed.
Downloads
References
Golovin AY, Golovina EV. Social engineering in the mechanism of criminal activity in the field of information and telecommunications technologies. Izvestiya Tulskogo gosudarstvennogo universiteta. Ekonomicheskie i yuridicheskie nauki.[Proceedings of Tula State University. Economic and legal sciences]. 2021;(2): 3-13. (In Russ).DOI: https://doi.org/10.24412/2071-6184-2021-2-3-13.
Zhmurov DV. Digital Theft: Concept, Contents, Victims and Their Classification. Vserossiiskii kriminologicheskii zhurnal [Russian Journal of Criminology]. 2023;1(17):35–43. (In Russ). DOI: https://doi.org/10.17150/2500-1442.2023.17(1).35-43.
Mayorov AV. Victimization security of society in modern conditions. Vestnik Prikamskogo social`nogo instituta [Bulletin of Prikamsky Social Institute]. 2023;1(94):8-16.(In Russ).
Romanov V., Romanova I. Social fraud-covid-19 and manipulative social Engineering technologies. Vestnik Zabajkalskogo gosudarstvennogo universiteta [Transbaikal State University journal]. 2020;9(26):57-67. DOI: https://doi.org/10.21209/2227-9245-2020-26-9-57-67.
O`Reilly C. The transnational security consultancy industry. A case of state – corporate symbiosis. Theoretical Criminology. 2010;14(2):183–210. DOI: https://doi.org/10.1177/1362480609355702183.
Leal Sh., Vrij A., Hudson Ch., Capuozzo P., Deeb H. The effectiveness of different model statement variants for eliciting information and cues to deceit. Legal and Criminological Psychology. 2022:27(2):247-264. DOI: https://doi.org/10.1111/lcrp.12200.
Huseynov F., Kose OB. Using machine learning algorithms to predict individuals’ tendency to be victim of social engineering attacks. Information Development. 2022;(2). DOI: https://doi.org/10.1177/02666669221116336.
Venkatesha S., Reddy KR., Chandavarkar BR. Сorrection to: social engineering attacks during the COVID 19 pandemic. SN Computer Science. 2021;(2):134. DOI: https://doi.org/10.1007/s42979-021-00550-7.
Copyright (c) 2023 Е.В. Никитин

This work is licensed under a Creative Commons Attribution 4.0 International License.
The author agrees that the submission of the manuscript to the editorial office of the scientific and practical journal "VICTIMOLOGY" is a conclusive action aimed at the transfer of the editorial office of the exclusive rights to the work: the right to reproduce and the right to distribute, as well as to place the article in the electronic version of the journal in open access on the Internet and in electronic databases of scientific citation.