Fishing as a Cybercrime in the Internet Banking System: Economic and Legal Aspects

By Ilchenko, Oleksandr; Chumak, Volodymyr et al. | Journal of Legal, Ethical and Regulatory Issues, January 1, 2019 | Go to article overview

Fishing as a Cybercrime in the Internet Banking System: Economic and Legal Aspects


Ilchenko, Oleksandr, Chumak, Volodymyr, Kuzmenko, Serhii, Shelukhin, Oleksandr, Dobrovinskyi, Artem, Journal of Legal, Ethical and Regulatory Issues


INTRODUCTION

In the conditions of the rapid development of the society in the field of technology of the XXI century, the Internet has taken an important place in the life of almost every person in the world, since it provides access to information, a fast data transfer process, and most importantlythe opportunity to carry out banking, trading, exchange operations, funds remittance, etc.

As a global trend, the transition to non-cash payments is no longer a novelty. However, not all countries of the world have such a rapid process, because it depends on many factors that can slow it down, in particular from the lack of awareness about the benefits and convenience of cashless settlements, the level of distrust in the safety of the use of such types of payments, etc.

As a result of the steady increase in the number of different banking services, it becomes clear that the determination of the quality of the bank operations is not only the criterion of the existing set of services, but also depends on the level of implementation of computer technology, which simplifies interaction between the bank and the client. The use of Internet technologies by banks is due to the presence of many factors, including the need for customer service with minimal costs on large territorial scales, ensuring the maximum degree of universality of banking services and their convenience, existence of a high level of competition in banking services, etc. Expansion of the market for banking services has led to the emergence of remote service, which includes Internet banking.

Given the fact that the Internet-based operations has become a mass phenomenon around the world, crimes committed through the use of computer technologies and using various means of access to the virtual world have become widespread. Such crimes are called ""cybercrime" (or "cyberfraud'). A vivid example of cybercrime is phishing, which today has become the most popular and most dangerous kind of crime of this kind.

LITERATURE REVIEW

Phishing is a kind of internet fraud aimed at gaining access to confidential user data - their logins and passwords. This is accomplished through the mass mailing of emails on behalf of popular brands, as well as personal messages within various services, for example, on behalf of banks, or within social networks. Kazykhanov & Bayrushin (2016) define the main purpose of today's phishers as receiving information from users about their credit cards, as well as their accounts. The phishing is aimed at search for client's credentials as one of the most common ways of fraudulent behaviour with payment cards on the Internet, due to the increasing number of electronic banking operations and shopping on websites. Rajab (2019) states that such data is necessary for the perpetrator to access financial information and conduct banking operations as the card owner. A web-site that is visually similar to the original design of the website is even created with the aim to deceive users.

When investigating the issue of the nature of phishing, Kazykhanov & Bayrushin (2016) note that there are very frequent cases when the letter contains a direct link to a web-site that is externally difficult to distinguish from the real one or web-site with a redirection. After a user goes to a fake page, fraudsters try to use various psychological techniques to force a user to enter their login and password on the fake page, which he/she uses to access the cabinet on the website, which allows fraudsters to access their accounts and bank accounts.

One of the phishing methods is also the direct search for a victim to further reception of confidential information about her/his bank card details and personal data. The feature of the investigated type of fraud lies in the fact that the victim itself participates in a crime committed by the perpetrator. The said above speaks of the presence of victim's "mediation" activities. In this regard, Pivovarov & Tereschenko (2015) conclude that a significant reduction in potential risks for the general population is possible by studying typical varieties of victim's behaviour, personal characteristics, etc. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA 8, MLA 7, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Note: primary sources have slightly different requirements for citation. Please see these guidelines for more information.

Cited article

Fishing as a Cybercrime in the Internet Banking System: Economic and Legal Aspects
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen
Items saved from this article
  • Highlights & Notes
  • Citations
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA 8, MLA 7, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Search by... Author
    Show... All Results Primary Sources Peer-reviewed

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.