Matches in SemOpenAlex for { <https://semopenalex.org/work/W4382563564> ?p ?o ?g. }
Showing items 1 to 62 of
62
with 100 items per page.
- W4382563564 endingPage "592" @default.
- W4382563564 startingPage "585" @default.
- W4382563564 abstract "The expansion of digital communication technology in state administration and economics invariably increases the risks of rapid informatization. The victims of fraudsters committing computer crimes and crimes in the information and communication technology sphere are users of social networks and various electronic resources involving electronic financial resources. However, due to poor computer literacy and people’s credulity, criminals imply new methods to commit crimes. Therefore, under these circumstances, including crime methods, prevalence, and constant quantitative increase, I found it challenging to detect, suppress, and prevent crimes. The study aims to identify the most frequently used methods of committing crimes by criminals using the method of social engineering, discover and describe the determinants of crime, and assess the prevention effectiveness within the system for preventing secondary victimization. The research involves primary scientific research methods: (1) analysis, (2) synthesis, (3) induction, (4) deduction, (5) generalization, and (6) modeling. In addition, specific research methods were also used: sociological and statistical. However, the primary result of the study is the effective detection and suppression of crimes in the sphere of information and communication technology, committed by means of social engineering, improving the tactics and methods of law enforcement intelligence operations, efficient interaction between state authorities and legal entities, and preventing victim behavior. Nowadays, social engineering in digital information security is one of the primary methods to commit crimes in information and communication technology. Therefore, preliminary investigation bodies, prosecutors, and courts should employ more effective crime prevention mechanisms to exclude secondary and new victimization within criminal proceedings. The research novelty lies in identifying and describing the primary methods and determinants of committing crimes in the sphere of information and communication technology, including the method of social engineering, establishing preventive measures against the crimes within criminal procedures." @default.
- W4382563564 created "2023-06-30" @default.
- W4382563564 creator A5003720054 @default.
- W4382563564 date "2023-01-01" @default.
- W4382563564 modified "2023-09-25" @default.
- W4382563564 title "Social Engineering as a Way of Committing Computer Crimes: Detection, Suppression, and Prevention" @default.
- W4382563564 doi "https://doi.org/10.1007/978-3-031-23856-7_51" @default.
- W4382563564 hasPublicationYear "2023" @default.
- W4382563564 type Work @default.
- W4382563564 citedByCount "0" @default.
- W4382563564 crossrefType "book-chapter" @default.
- W4382563564 hasAuthorship W4382563564A5003720054 @default.
- W4382563564 hasConcept C108827166 @default.
- W4382563564 hasConcept C11413529 @default.
- W4382563564 hasConcept C136764020 @default.
- W4382563564 hasConcept C153180980 @default.
- W4382563564 hasConcept C15744967 @default.
- W4382563564 hasConcept C17744445 @default.
- W4382563564 hasConcept C199539241 @default.
- W4382563564 hasConcept C2776348852 @default.
- W4382563564 hasConcept C2776352007 @default.
- W4382563564 hasConcept C2780262971 @default.
- W4382563564 hasConcept C38652104 @default.
- W4382563564 hasConcept C41008148 @default.
- W4382563564 hasConcept C48103436 @default.
- W4382563564 hasConcept C70118762 @default.
- W4382563564 hasConcept C73484699 @default.
- W4382563564 hasConcept C77088390 @default.
- W4382563564 hasConceptScore W4382563564C108827166 @default.
- W4382563564 hasConceptScore W4382563564C11413529 @default.
- W4382563564 hasConceptScore W4382563564C136764020 @default.
- W4382563564 hasConceptScore W4382563564C153180980 @default.
- W4382563564 hasConceptScore W4382563564C15744967 @default.
- W4382563564 hasConceptScore W4382563564C17744445 @default.
- W4382563564 hasConceptScore W4382563564C199539241 @default.
- W4382563564 hasConceptScore W4382563564C2776348852 @default.
- W4382563564 hasConceptScore W4382563564C2776352007 @default.
- W4382563564 hasConceptScore W4382563564C2780262971 @default.
- W4382563564 hasConceptScore W4382563564C38652104 @default.
- W4382563564 hasConceptScore W4382563564C41008148 @default.
- W4382563564 hasConceptScore W4382563564C48103436 @default.
- W4382563564 hasConceptScore W4382563564C70118762 @default.
- W4382563564 hasConceptScore W4382563564C73484699 @default.
- W4382563564 hasConceptScore W4382563564C77088390 @default.
- W4382563564 hasLocation W43825635641 @default.
- W4382563564 hasOpenAccess W4382563564 @default.
- W4382563564 hasPrimaryLocation W43825635641 @default.
- W4382563564 hasRelatedWork W2032264538 @default.
- W4382563564 hasRelatedWork W2375668737 @default.
- W4382563564 hasRelatedWork W2563537784 @default.
- W4382563564 hasRelatedWork W2888787938 @default.
- W4382563564 hasRelatedWork W2890189536 @default.
- W4382563564 hasRelatedWork W2933127114 @default.
- W4382563564 hasRelatedWork W2970258663 @default.
- W4382563564 hasRelatedWork W3080686208 @default.
- W4382563564 hasRelatedWork W3207435812 @default.
- W4382563564 hasRelatedWork W655879763 @default.
- W4382563564 isParatext "false" @default.
- W4382563564 isRetracted "false" @default.
- W4382563564 workType "book-chapter" @default.