Журнал «Современная Наука»

Russian (CIS)English (United Kingdom)
MOSCOW +7(495)-142-86-81

IDENTITY FEATURES OF CRIMINALS WHO USE SOCIAL ENGINEERING IN COMMITTING FRAUD USING TELECOMMUNICATION TECHNOLOGIES

Semenova Natalia Alexandrovna  (Lecturer of the Department of Criminal Law, Process and Criminalistics, postgraduate student of the Department of Criminal Law, Process and Criminalistics, Dorzhi Banzarov Buryat State University, Russia )

An impressive number of scientific works are devoted to the criminological study of the identity of a fraudster who uses telecommunication technologies to commit a crime, in most of them, there is a clear tendency to endow this category of criminals with such characteristics as sociability, observation, conspiracy, secrecy, high intelligence and even empathy. Some authors single out strong-willed qualities in the subjects of fraud: self-control, understanding of people's psychology and other personality traits. In our opinion, such a combination of personal qualities, ceteris paribus, could make almost any person successful, a member of society. But the facts often conflict with the harsh reality, confirmed by statistical data, which, on average, present us with a fraudster as a very disadvantaged, socially unadapted, previously convicted, with a secondary education, lack of a permanent job and often with various kinds of addictions, an individual. The purpose of this study is to identify the leading personality traits of a criminal who uses social engineering for his own illegal purposes. The scientific novelty of the study lies in the fact that the author attempts to determine the identity of the fraudster depending on the schemes or patterns of social engineering he uses and answer the question: what is the most dangerous factor in committing fraud: the identity of the offender or the social engineering scheme that he consciously or unconsciously applies? The scientific approach is expressed in the analysis of audio recordings of communications of scammers and potential victims; analysis of comments on social networks and media platforms regarding cases of fraud, analysis of interviews with victims of fraud and analysis of data obtained during a public opinion survey.

Keywords:fraud using telecommunication technologies, social engineering, manipulation, fraud methods

 

Read the full article …



Citation link:
Semenova N. A. IDENTITY FEATURES OF CRIMINALS WHO USE SOCIAL ENGINEERING IN COMMITTING FRAUD USING TELECOMMUNICATION TECHNOLOGIES // Современная наука: актуальные проблемы теории и практики. Серия: ЭКОНОМИКА и ПРАВО. -2023. -№06. -С. 185-189 DOI 10.37882/2223-2974.2023.06.13
LEGAL INFORMATION:
Reproduction of materials is permitted only for non-commercial purposes with reference to the original publication. Protected by the laws of the Russian Federation. Any violations of the law are prosecuted.
© ООО "Научные технологии"