Manipulation techniques of cyber fraudsters using the example of phishing attempts for private content Cover Image

Techniki manipulacji cyberoszustów na przykładzie prób wyłudzania prywatnych treści
Manipulation techniques of cyber fraudsters using the example of phishing attempts for private content

Author(s): Marek Górka
Subject(s): Media studies, Security and defense, Studies in violence and power, ICT Information and Communications Technologies
Published by: Akademia Policji w Szczytnie
Keywords: cyber security; cyber threats; cyber fraud; cyber manipulation; phishing; social media;

Summary/Abstract: In today's digital environment, users freely use almost all available digital services, from opening and maintaining bank accounts, shopping, working, education, entertainment to sharing private content (photos, videos) and sending confidential information via email. The evolution of the Internet has also radically changed the nature of communication between individuals and influenced contemporary friendship making. The increased use of cyberspace to establish social relationships has also resulted in the emergence of new forms of crime, leading to the extortion of information, photos, videos or money. Consequently, this has increased the ability of criminals to seek out potential victims around the world and exploit ('hopeful') individuals seeking relationships with other users" . Criminals use a range of dating websites and apps to contact victims, but are increasingly using social media platforms, including Facebook, WhatsaApp, Instagram, TikTok . More often than not, these types of relationships end in a form of blackmail and the articulation of threats to disseminate intimate images or recordings if the victim does not comply with certain demands, whether behavioural (sending more sexual images or continuing an intimate relationship) or financial . The phenomenon described above is one of many pieces of evidence supporting the thesis that perceptions of the Internet have long since moved beyond the limits of technology. Analyses of cyberspace are increasingly recognising this unique environment as a set of social practices. Tools for understanding how people use technology to, among other things, interact with other users are therefore gaining importance

  • Issue Year: 150/2023
  • Issue No: 2
  • Page Range: 5-18
  • Page Count: 14
  • Language: Polish