2020 | 2 | 10-14
Article title

Threats of identity theft in cyberspace - case study

Title variants
Languages of publication
We can certainly say that identity theft on the Internet is a growing criminal phenomenon. The perpetrators’ actions are most often motivated by financial gain. The article discusses selected issues concerning so-called Internet fraudsters. In particular, it draws attention to the actions taken in cyberspace and the risks that accompany such decisions. I point out that the most vulnerable to identity theft are elderly people who do not even know basic security procedures. The article not only draws attention to the dangers themselves but also describes the way criminals act. It also states that in order to minimize the risks faced by network users, attention should be paid to training needs related to with security in cyberspace. An important aspect of this is to draw attention to the risks associated with personal data improperly stored on electronic media integrated into the Internet.
Physical description
  • Department of Law and Social Science Bielsko-Biala School of Finance and Law Cz. Tańskiego 5, 43-300 Bielsko-Biała – Poland
  • Borokhvostov , V., Skurinevska , L. and Lutsik, J. (2019) “Information and financial technologies of hybrid wars: methodological approaches to the analysis of the content, occurrence, response and prevention”, Journal of Scientific Papers «Social development and Security», 9(6), pp. 56 -. doi: 10.33445/sds.2019.9.6.5.
  • Nastuła, A. (2020) “Dilemmas related to the functioning and growth of Darknet and the Onion Router network”, Journal of Scientific Papers «Social development and Security», 10(2), pp. 3-10. doi: 10.33445/sds.2020.10.2.1.
  • Widiyanti, M.; Hendrawaty, E.; , D. 2019. Antecedents of economic convergence in asean countries: foreign direct investment, trade, government size, population and economic convergence, Journal of Security and Sustainability Issues 9(2): 431-445.
  • Raport z badania wzorców umownych pożyczek krótkoterminowych,,
  • Ławrowski P., (2016), Uważaj komu dajesz dowód osobisty takie mogą być tego konsekwencję,,
  • Barbrich P. et all. (2020), Raport ZBP Cyberbezpieczny portfel, Edycja III,,
  • Barbrich P. et. all, (2018), Raport ZBP Cyberbezpieczny portfel,,
  • Rylski A., (2018), Zagrożenia technologiczne,,
  • Szafrański, B. (2016), Kradzież danych osobowych narastające zagrożenie,
Document Type
Publication order reference
YADDA identifier
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.