On measures to counter fraud (using the example of phishing)

 
PIIS102694520017465-2-1
DOI10.31857/S102694520017465-2
Publication type Article
Status Published
Authors
Occupation: doctoral candidate of the Faculty of Postgraduate education of the Academy of MIA of the Republic of Uzbekistan
Affiliation: Uzbekistan
Address: Russian Federation,
Journal nameGosudarstvo i pravo
EditionIssue 12
Pages181-185
Abstract

The article discusses types of fraud in the field of payment systems, as well as using information and communication technologies, with examples from practice and conclusions to counter common types of fraud, such as phishing and skimming.

Keywordscyber fraud, skimming, phishing, information and communication technologies, payment systems, false website, counter
Received27.11.2020
Publication date21.12.2021
Number of characters17916
Cite  
100 rub.
When subscribing to an article or issue, the user can download PDF, evaluate the publication or contact the author. Need to register.

Number of purchasers: 0, views: 442

Readers community rating: votes 0

1. Bakhteev D.V. About some modern ways of committing fraud against the property of individuals // Russ. law. 2016. No. 3. P. 25 (in Russ.).

2. Kazykhanov A.A., Bakhrushin I.T. Phishing as a problem for specialists of the Information security Department // Symbol of Science. 2016. No. 10-2. P. 54 (in Russ.).

3. Storchak S.A. Review of anti-phishing technologies // Problems of Science. 2019. No. 6 (42). P. 9 - 11 (in Russ.).

4. Khafizova L.S. Criminal-legal and criminological aspects of countering financial fraud: abstract ... PhD in Law. N. Novgorod, 2008 (in Russ.).

5. Yurochkin N.S. Cyberbullying: characteristics, techniques and methods of its commission // The Tauride Scientific Observer www.tavr.science . 2016. No.12 (17). Part 2. P. 158 (in Russ.).

6. William Joley. Common credit card frauds and how to avoid them. July 10, 2019. URL: https://www.savings.com.au/credit-cards/credit-card-fraud

7. Williams E.J., and Joinson A.N. Developing a measure of information seeking about phishing // Journal of Cybersecurity. 2020. Vol. 6. No. 1. Р. 13.

8. Xin (Robert) Luo, Wei Zhang, Stephen Burd, Alessandro Seazzu. Investigating phishing victimization with the HeuristiceSystematic Model: A theoretical framework and an exploration. Anderson School of Management, University of New Mexico, 1924 Las Lomas NE, MSC05 3090, Albuquerque, NM 87131, USA. URL: http://dx.doi.org/10.1016/j.cose.2012.12.003

9. Khursanov R.H., Anorboev A.U. Cyberfiribgarlik zhinoyati: zhinoy-ҳukukiy va criminologist tavsifi. B. 306. Yuridik fan vaуukukni kyllash amaliyetining dolzarb muammolari mavzusidagi ilmiy-amaliy conference materiallari I zhild. Tashkent, 2020.

Система Orphus

Loading...
Up