Cybercrime as the Newest Phenomenon of Information and Communication Society and the Means of Its Prevention
##plugins.themes.academic_pro.article.main##
Abstract
The purpose of the research is to analyze cybercrime as the most recent phenomenon of the information society, induced by the technological breakthrough of the Fourth Industrial Revolution, which brought risks and challenges to all mankind. Objective of the study is the theoretical analysis of a rather complex and dangerous phenomenon of cybercrime, the occurrence of which is caused by a dynamic process of criminal use of disruptive technologies in selfish purposes of criminals for the enrichment and unlawful use. Cybercriminals are regularly updating techniques and tools to apply the latest technology to their illegal activities. Today, criminals are developing their clandestine mobile radio telecommunications systems in all countries and are demonstrating the highest level of technical expertise to improve them and in doing so outperform the defenders of law and order. Nowadays cybercriminals are practicing hacking into hundreds of millions of dollars’ worth of accounts, and they are far ahead of the curve. Thus, today we must realize the threatening scale of both organized cybercrime and terrorist organizations, to which governments have fallen out of favor as they turn on the people. The control of cybercrime in the information space acts as an object of research. The subject of the study includes ways to overcome the challenges and threats spread in cyberspace.
DOI
https://doi.org/10.61439/ZTUH3582
##plugins.themes.academic_pro.article.details##
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
References
Andriukaitiene, R., Voronkova, V., Kivlyuk, O., Romanenko, T., & Rizhova, I. (2017). Conceptualization of smart society and smart technologies in the context of the development of modern civilization. In Mokslas Ir praktika: Aktualijos Ir Perspektyvos (pp. 11–12). Lietuvos sporto universitetas.
Antonescu, M., & Birău, R. (2015). Financial and non-financial implications of cybercrimes in emerging countries. Procedia. Economics and Finance, 32, 618–621. https://doi.org/10.1016/s2212-5671(15)01440-9
Boddy, M. (2018). Phishing 2.0: the new evolution in cybercrime. Computer Fraud & Security, 2018(11), 8–10. https://doi.org/10.1016/s1361-3723(18)30108-8
Brewster, B., Kemp, B., Galehbakhtiari, S., & Akhgar, B. (2015). Cybercrime. In Application of Big Data for National Security (pp. 108–127). https://doi.org/10.1016/b978-0-12-801967-2.00008-2
Broadhead, S. (2018). The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments. Computer Law & Security Review, 34(6), 1180–1196. https://doi.org/10.1016/j.clsr.2018.08.005
Cherep, A. V. & Lubenets, I.O. (2010). Konceptualni zasadi ekonomichnoyi bezpeki pidpriyemstv [Conceptual Bases Of Economic Security Enterprises]. Bulletin of Zaporizhzhіa National University. Economics, 1(5), 63–66.
Drewer, D., & Miladinova, V. (2017). The BIG DATA Challenge: Impact and opportunity of large quantities of information under the Europol Regulation. Computer Law & Security Review, 33(3), 298–308. https://doi.org/10.1016/j.clsr.2017.03.006
Eddolls, M. (2016). Making cybercrime prevention the highest priority. Network Security, 2016(8), 5–8. https://doi.org/10.1016/s1353-4858(16)30075-7
Glenny, M. (2012). Organized Crime In A Network Society. Journal of International Affairs, 66(1), 145–149. http://www.jstor.org/stable/24388256
Goode, A. (2019). Digital identity: solving the problem of trust. Biometric Technology Today, 2019(10), 5–8. https://doi.org/10.1016/s0969-4765(19)30142-0
Goodman, M. (2016). Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It. Corgi Books.
Harris, S. (2015). WAR: The Rise of the Military-Internet Complex. Houghton Mifflin Harcourt.
Lee, L. (2019). Cybercrime has evolved: it’s time cyber security did too. Computer Fraud & Security, 2019(6), 8–11. https://doi.org/10.1016/s1361-3723(19)30063-6
Maglaras, L. A., Kim, K., Janicke, H., Ferrag, M. A., Rallis, S., Fragkou, P., Maglaras, Α., & Cruz, T. (2018). Cyber security of critical infrastructures. ICT Express, 4(1), 42–45. https://doi.org/10.1016/j.icte.2018.02.001
Maltsev, O. V. (2018). Vekovoj obman [The Age-Old Deceiving]. Serednyak T. K. https://books.google.com.ua/books?vid=ISBN6177696635
Newitz, A. (2019). The real fake menace. New Scientist, 244(3256), 24. https://doi.org/10.1016/s0262-4079(19)32160-8
Nikitenko, V., Andriukaitiene, R., & Punchenko, O. (2019). Formation of sustainable digital economical concept: challenges, threats, priorities. Humanities Studies, 1(78), 140–153. http://dx.doi.org/10.26661/hst-2019-1-78-11
Oleksenko, R. (2019). Position and role of modern economic education as the main megatrend of innovative development of Ukraine. Humanities Studies, 2(79), 169–181. https://doi.org/10.26661/hst-2019-2-79-11
Olivero, M. A., Bertolino, A., Mayo, F. J. D., Escalona, M. J., & Matteucci, I. (2020). Digital persona portrayal: Identifying pluridentity vulnerabilities in digital life. Journal of Information Security and Applications, 52, 102492. https://doi.org/10.1016/j.jisa.2020.102492
On the basic principles of cybersecurity of Ukraine: the Law of Ukraine of October 5, 2017 No. 2163-VIII. No. 45. art. 403. (2017) https://zakon.rada.gov.ua/laws/show/2163-19#Text
Onyeji, I., Bazilian, M., & Bronk, C. (2014). Cyber security and critical energy infrastructure. The Electricity Journal, 27(2), 52–60. https://doi.org/10.1016/j.tej.2014.01.011
Punchenko, O., & Punchenko, N. (2019). Basic strategic technology of intellectual duality of humanity in information technology. Humanities Studies, 2(79), 95–114. https://doi.org/10.26661/hst-2019-2-79-07
Rodofile, N. R., Radke, K., & Foo, E. (2019). Extending the cyber-attack landscape for SCADA-based critical infrastructure. International Journal of Critical Infrastructure Protection, 25, 14–35. https://doi.org/10.1016/j.ijcip.2019.01.002
Schwab, K. (2017). The Fourth Industrial Revolution. Penguin UK.
Tsakalidis, G., Vergidis, K., Petridou, S., & Vlachopoulou, M. (2019). A cybercrime incident architecture with adaptive response policy. Computers & Security, 83, 22–37. https://doi.org/10.1016/j.cose.2019.01.011
Voronkova, V., Kapitanenko, N., & Nikitenko, V. (2019). Legal principles of intellectual property protection in the digital society. ScienceRise: Juridical Science, 4(10), 32–37. http://dx.doi.org/10.15587/2523-4153.2019.188163