employee
employee
Russian Federation
UDC 330.101
UDC 004
The authors present theoretical analysis of the phenomenon of social engineering under conditions of digital space development and discuss the principal methods of social engineering used by fraudsters to gain access to the confidential information about a potential victim. Correlation and regression analysis of economic factors impact on the coefficient of victims of crimes committed using social engineering methods is carried out. The factors under consideration include average salary and unemployment in the regions. The analysis was conducted using the data from statements registered with the Ministry of Internal A airs of the Russian Federation by citizens who suffered from fraudulent actions committed using information and telecommunication technologies or in the field of computer information. A direct relationship between the number of criminal incidents committed using social engineering methods and unemployment rates in the regions of the Russian Federation, as well as an inverse relationship between the dependent variable and the average salary of residents of the regions have been revealed. Measures to deal with the digital fraud problem are proposed.
social engineering, opportunistic behavior, fraud, cyberattack, digital space
1. Bekarev A. M., Plotnikov M. V. “Problems of Social Engineering”. Lichnost’. Kul’tura. Obshchestvo = Personality. Culture. Society 14.1 (2012): 219—227. (In Russian). EDN: https://elibrary.ru/OUPPBT.
2. Kaveyeva A., Gurin K. “ ‘VKontakte’ Fake Accounts and Their Influence on the Users’ Social Network”. Zhurnal sotsiologii i sotsialnoy antropologii = The Journal of Sociology and Social Anthropology 21.2 (2018): 214—231. (In Russian). https://doi.org/10.31119/jssa.2018.21.2.8 EDN: https://elibrary.ru/XZOGHB.
3. Laminina O. G. “Possibilities of Social Engineering in Information Technologies”. Gumanitarnyye, sotsial’no-ekonomicheskiye i obshchestvennyye nauki = Humanities, Socio-Economic and Social Sciences 2 (2017): 21—23. (In Russian). EDN: https://elibrary.ru/YFNAWP.
4. Parfenova I., Pekarskaya O. “Basic Concepts of Information Security”. Aktual’nyye problemy infotelekommunikatsiy v nauke i obrazovanii (APINO 2023): sb. nauch. st. XII Mezhdunar. nauch.-tekhn. i nauch.-metod. konf. (S.-Peterburg, 28 fevr. — 01 mar. 2023). Ed. by S. I. Makarenko, comp. V. S. Elagin, E. A. Anikevich. Vol. 2. St. Petersburg: SPbSUT n. a. M. A. Bonch-Bruyevich, 2023. 833—837. (In Russian). EDN: https://elibrary.ru/OBWAEF. 4 vols.
5. Ravochkin N. N. “Idea as an Instrument of Social Engineering: Philosophical Analysis”. Sotsiodinamika = Sociodynamics 12 (2019): 237—255. (In Russian). https://doi.org/10.25136/2409-7144.2019.12.31237 EDN: https://elibrary.ru/IXWAYP.
6. Revenkov P. V., Berdyugin A. A. “Social Engineering as a Source of Risks in Online Banking Services”. Natsional’nyye interesy: prioritety i bezopasnost’ = National Interests: Priorities and Security 13.9 (354) (2017): 1747—1760. (In Russian). https://doi.org/10.24891/ni.13.9.1747 EDN: https://elibrary.ru/WTCYWU.
7. Reznik Yu. M. “Social Engineering: Subject Area and Boundaries of Application”. Sotsiologicheskiye issledovaniya = Sociological Studies 2 (1994): 87—95. (In Russian).
8. Strizhak A. “The Contagiousness of Opportunism in Cyberspace: Trends and Ways of Leveling”. Novoye v ekonomicheskoy kibernetike = New in Economic Cybernetics 3-4 (2020): 346—353. (In Russian). EDN: https://elibrary.ru/QAQHUB.
9. Strizhak A. “Opportunist Behavior in Cyberspace: A New Pandemic Challenge”. Vestnik DonNU. Ser. V. Ekonomika i pravo = Bulletin of Donetsk National University. Series V. Economics and Law 3 (2020): 184—189. (In Russian). EDN: https://elibrary.ru/RMRQQB.
10. Strizhak A. Yu., Pekarskaya O. A. “Problems of Social Engineering in Cyberspace: Regional Aspect”. Innovatsionnaya paradigma ekonomicheskikh mekhanizmov khozyaystvovaniya: sb. nauch. tr. IX Mezhdunar. nauch.-prakt. konf. (Simferopol’, 15 maya 2024). Simferopol: Tip. “Arial”, 2024. 621—623. (In Russian). EDN: https://elibrary.ru/JHJJKB.
11. Urzha O. A. “Social Engineering as Methodology of Management Activity”. Sotsiologicheskiye issledovaniya = Sociological Studies 10 (402) (2017): 87—96. (In Russian). https://doi.org/https://doi.org/10.7868/S0132162517100099 EDN: https://elibrary.ru/ZNGYKL.
12. Nikiforova V. D., Volokobinskiy M. Yu., Nikiforov A. A., Pekarskaya O. A. “Economic and Mathematical Approaches to the Investigation on the Russian Banking System”. Tekhnologicheskaya perspektiva v ramkakh Evraziyskogo prostranstva: Novyye rynki i tochki ekonomicheskogo rosta: materialy 4-y Mezhdunar. nauch. konf. (S.-Peterburg, 13—15 dek. 2018). Ed. by O. N. Korableva et al. St. Petersburg: TsNIT “Asterion”, 2018. 248—253. (In Russian). EDN: https://elibrary.ru/QWJPNF.
13. Bhusal Chandra S. “Systematic Review on Social Engineering: Hacking by Manipulating Humans”. Journal of Information Security 12.1 (2021): 104—114. https://doi.org/10.4236/jis.2021.121005 EDN: https://elibrary.ru/LVCSDE
14. Cialdini Robert. Influence: The Psychology of Persuasion. New York: Harper Collins, 2006. 336 p.
15. Lawson Patrick, Pearson Carl J., Crowson Aaron, Mayhorn Christopher B. “Email Phishing and Signal Detection: How Persuasion Principles and Personality Influence Response Patterns and Accuracy”. Applied Ergonomics 86 (2020): 103084. https://doi.org/10.1016/j.apergo.2020.103084 EDN: https://elibrary.ru/ZJBDGC
16. Heartfield Ryan, Loukas George. “A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks”. ACM Computing Surveys 48.3 (2015): 1—39. https://doi.org/10.1145/2835375
17. Kaul Priya, Sharma Deepak. “Study of Automated Social Engineering, Its Vulnerabilities, Threats and Suggested Countermeasures”. International Journal of Computer Applications 67.7 (2013): 13—16. https://doi.org/10.5120/11406-6726
18. Manske Kurt. “An Introduction to Social Engineering”. Information Systems Security 9.5 (2000): 53—59. https://doi.org/10.1201/1086/43312.9.5.20001112/31378.10
19. Mouton François, Leenen Louise, Venter H. S. “Social Engineering Attack Examples, Templates and Scenarios”. Computers & Security 59 (2016): 186—209. https://doi.org/10.1016/j.cose.2016.03.004
20. Parhi Katariina, Pietikainen Petteri. “Socialising the Anti-Social: Psychopathy, Psychiatry and Social Engineering in Finland, 1945—1968”. Social History of Medicine 30.3 (2017): 637—660. https://doi.org/10.1093/ shm/hkw093
21. Roberts John C. II, Al-Hamdani Wasim. “Who Can You Trust in The Cloud? A Review of Security Issues Within Cloud Computing”. Proceedings of the 2011 Information Security Curriculum Development Conference. New York: ACM, 2011. 15—19. https://doi.org/10.1145/2047456.2047458
22. Krombholz K., Hobel H., Huber M., Weippl E. “Social Engineering Attacks on the Knowledge Worker”. Proceedings of the 6th International Conference on Security of Information and Networks. New York: ACM, 2013. 28—35. https://doi.org/10.1145/2523514.2523596
23. Bullée Jan-Willem H., Montoya Lorena, Pieters Wolter, Junger Marianne, Hartel Pieter H. “The Persuasion and Security Awareness Experiment: Reducing the Success of Social Engineering Attacks”. Journal of Experimental Criminology 11 (2015): 97—115. https://doi.org/10.1007/s11292-014-9222-7 EDN: https://elibrary.ru/ZZPYIM



