This article discusses the problems associated with the disclosure of information and telecommunications fraud, such as the identification and location of perpetrators. Statistical data on the analyzed issues are reflected. The research conducted on the main means used to ensure the anonymity of cybercriminals. The main methods in which information and telecommunications technologies, including the Internet, can be used for fraud are clearly demonstrated. The article also notes the opinions of various government officials, scientists and researchers in the field of countering acts of cyber fraud in the field of information and telecommunications technologies. As part of the study, a survey of practical employees was conducted, which reflects a clear picture of the issues under consideration in the daily life of a citizen and the practical work of employees of internal Affairs bodies, information security services of various organizations. The influence of Covid-19 and its consequences on the crime we investigate is demonstrative. At the conclusion of the scientific work, suggestions were made for the most effective counteraction against fraudulent acts in the field of information technology, in particular the necessary preventive measures, are taken with regard to cooperation between the Internal Affairs agencies and other law enforcement agencies and that ensure security in the cyber environment.
The article deals with the specifics of committing fraudulent actions in the field of mobile Internet applications. The question of the security of official (App Store, Google Play) and unofficial platforms for downloading user programs for various purposes is raised. Examples of fraud are given and their negative consequences are demonstrated. The essence of fleeceware-applications is revealed and the pros and cons of the IOS and Android operating systems, which are the technical base in the mobile devices of the largest companies, are noted. There is an age category that is more exposed or may be exposed to illegal actions on the part of fraudsters in the field of IT technologies. In turn, the emphasis is placed on some gaps in those. systems and legislation in which the fraudster avoids criminal prosecution. The high latency of such crimes is confirmed due to the small damage to the victims of the assault, if we consider each victim separately, as well as due to the complexity of the crime itself. Measures are taken to prevent fraudulent actions related to online applications on mobile devices against yourself.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.