DEPENDENCE OF THE LEVEL OF DIGITAL FRAUD COMMITTED USING SOCIAL ENGINEERING METHODS ON ECONOMIC FACTORS IN THE FEDERAL SUBJECTS OF THE RUSSIAN FEDERATION
Abstract and keywords
Abstract:
The authors present theoretical analysis of the phenomenon of social engineering under conditions of digital space development and discuss the principal methods of social engineering used by fraudsters to gain access to the confidential information about a potential victim. Correlation and regression analysis of economic factors impact on the coefficient of victims of crimes committed using social engineering methods is carried out. The factors under consideration include average salary and unemployment in the regions. The analysis was conducted using the data from statements registered with the Ministry of Internal A airs of the Russian Federation by citizens who suffered from fraudulent actions committed using information and telecommunication technologies or in the field of computer information. A direct relationship between the number of criminal incidents committed using social engineering methods and unemployment rates in the regions of the Russian Federation, as well as an inverse relationship between the dependent variable and the average salary of residents of the regions have been revealed. Measures to deal with the digital fraud problem are proposed.

Keywords:
social engineering, opportunistic behavior, fraud, cyberattack, digital space
Text
Text (PDF): Read Download
References

1. Bekarev A. M., Plotnikov M. V. “Problems of Social Engineering”. Lichnost’. Kul’tura. Obshchestvo = Personality. Culture. Society 14.1 (2012): 219—227. (In Russian). EDN: https://elibrary.ru/OUPPBT.

2. Kaveyeva A., Gurin K. “ ‘VKontakte’ Fake Accounts and Their Influence on the Users’ Social Network”. Zhurnal sotsiologii i sotsialnoy antropologii = The Journal of Sociology and Social Anthropology 21.2 (2018): 214—231. (In Russian). https://doi.org/10.31119/jssa.2018.21.2.8 EDN: https://elibrary.ru/XZOGHB.

3. Laminina O. G. “Possibilities of Social Engineering in Information Technologies”. Gumanitarnyye, sotsial’no-ekonomicheskiye i obshchestvennyye nauki = Humanities, Socio-Economic and Social Sciences 2 (2017): 21—23. (In Russian). EDN: https://elibrary.ru/YFNAWP.

4. Parfenova I., Pekarskaya O. “Basic Concepts of Information Security”. Aktual’nyye problemy infotelekommunikatsiy v nauke i obrazovanii (APINO 2023): sb. nauch. st. XII Mezhdunar. nauch.-tekhn. i nauch.-metod. konf. (S.-Peterburg, 28 fevr. — 01 mar. 2023). Ed. by S. I. Makarenko, comp. V. S. Elagin, E. A. Anikevich. Vol. 2. St. Petersburg: SPbSUT n. a. M. A. Bonch-Bruyevich, 2023. 833—837. (In Russian). EDN: https://elibrary.ru/OBWAEF. 4 vols.

5. Ravochkin N. N. “Idea as an Instrument of Social Engineering: Philosophical Analysis”. Sotsiodinamika = Sociodynamics 12 (2019): 237—255. (In Russian). https://doi.org/10.25136/2409-7144.2019.12.31237 EDN: https://elibrary.ru/IXWAYP.

6. Revenkov P. V., Berdyugin A. A. “Social Engineering as a Source of Risks in Online Banking Services”. Natsional’nyye interesy: prioritety i bezopasnost’ = National Interests: Priorities and Security 13.9 (354) (2017): 1747—1760. (In Russian). https://doi.org/10.24891/ni.13.9.1747 EDN: https://elibrary.ru/WTCYWU.

7. Reznik Yu. M. “Social Engineering: Subject Area and Boundaries of Application”. Sotsiologicheskiye issledovaniya = Sociological Studies 2 (1994): 87—95. (In Russian).

8. Strizhak A. “The Contagiousness of Opportunism in Cyberspace: Trends and Ways of Leveling”. Novoye v ekonomicheskoy kibernetike = New in Economic Cybernetics 3-4 (2020): 346—353. (In Russian). EDN: https://elibrary.ru/QAQHUB.

9. Strizhak A. “Opportunist Behavior in Cyberspace: A New Pandemic Challenge”. Vestnik DonNU. Ser. V. Ekonomika i pravo = Bulletin of Donetsk National University. Series V. Economics and Law 3 (2020): 184—189. (In Russian). EDN: https://elibrary.ru/RMRQQB.

10. Strizhak A. Yu., Pekarskaya O. A. “Problems of Social Engineering in Cyberspace: Regional Aspect”. Innovatsionnaya paradigma ekonomicheskikh mekhanizmov khozyaystvovaniya: sb. nauch. tr. IX Mezhdunar. nauch.-prakt. konf. (Simferopol’, 15 maya 2024). Simferopol: Tip. “Arial”, 2024. 621—623. (In Russian). EDN: https://elibrary.ru/JHJJKB.

11. Urzha O. A. “Social Engineering as Methodology of Management Activity”. Sotsiologicheskiye issledovaniya = Sociological Studies 10 (402) (2017): 87—96. (In Russian). https://doi.org/https://doi.org/10.7868/S0132162517100099 EDN: https://elibrary.ru/ZNGYKL.

12. Nikiforova V. D., Volokobinskiy M. Yu., Nikiforov A. A., Pekarskaya O. A. “Economic and Mathematical Approaches to the Investigation on the Russian Banking System”. Tekhnologicheskaya perspektiva v ramkakh Evraziyskogo prostranstva: Novyye rynki i tochki ekonomicheskogo rosta: materialy 4-y Mezhdunar. nauch. konf. (S.-Peterburg, 13—15 dek. 2018). Ed. by O. N. Korableva et al. St. Petersburg: TsNIT “Asterion”, 2018. 248—253. (In Russian). EDN: https://elibrary.ru/QWJPNF.

13. Bhusal Chandra S. “Systematic Review on Social Engineering: Hacking by Manipulating Humans”. Journal of Information Security 12.1 (2021): 104—114. https://doi.org/10.4236/jis.2021.121005 EDN: https://elibrary.ru/LVCSDE

14. Cialdini Robert. Influence: The Psychology of Persuasion. New York: Harper Collins, 2006. 336 p.

15. Lawson Patrick, Pearson Carl J., Crowson Aaron, Mayhorn Christopher B. “Email Phishing and Signal Detection: How Persuasion Principles and Personality Influence Response Patterns and Accuracy”. Applied Ergonomics 86 (2020): 103084. https://doi.org/10.1016/j.apergo.2020.103084 EDN: https://elibrary.ru/ZJBDGC

16. Heartfield Ryan, Loukas George. “A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks”. ACM Computing Surveys 48.3 (2015): 1—39. https://doi.org/10.1145/2835375

17. Kaul Priya, Sharma Deepak. “Study of Automated Social Engineering, Its Vulnerabilities, Threats and Suggested Countermeasures”. International Journal of Computer Applications 67.7 (2013): 13—16. https://doi.org/10.5120/11406-6726

18. Manske Kurt. “An Introduction to Social Engineering”. Information Systems Security 9.5 (2000): 53—59. https://doi.org/10.1201/1086/43312.9.5.20001112/31378.10

19. Mouton François, Leenen Louise, Venter H. S. “Social Engineering Attack Examples, Templates and Scenarios”. Computers & Security 59 (2016): 186—209. https://doi.org/10.1016/j.cose.2016.03.004

20. Parhi Katariina, Pietikainen Petteri. “Socialising the Anti-Social: Psychopathy, Psychiatry and Social Engineering in Finland, 1945—1968”. Social History of Medicine 30.3 (2017): 637—660. https://doi.org/10.1093/ shm/hkw093

21. Roberts John C. II, Al-Hamdani Wasim. “Who Can You Trust in The Cloud? A Review of Security Issues Within Cloud Computing”. Proceedings of the 2011 Information Security Curriculum Development Conference. New York: ACM, 2011. 15—19. https://doi.org/10.1145/2047456.2047458

22. Krombholz K., Hobel H., Huber M., Weippl E. “Social Engineering Attacks on the Knowledge Worker”. Proceedings of the 6th International Conference on Security of Information and Networks. New York: ACM, 2013. 28—35. https://doi.org/10.1145/2523514.2523596

23. Bullée Jan-Willem H., Montoya Lorena, Pieters Wolter, Junger Marianne, Hartel Pieter H. “The Persuasion and Security Awareness Experiment: Reducing the Success of Social Engineering Attacks”. Journal of Experimental Criminology 11 (2015): 97—115. https://doi.org/10.1007/s11292-014-9222-7 EDN: https://elibrary.ru/ZZPYIM

Login or Create
* Forgot password?