Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2020 | 2 | 10-14

Article title

Threats of identity theft in cyberspace - case study

Title variants

Languages of publication

EN

Abstracts

We can certainly say that identity theft on the Internet is a growing criminal phenomenon. The perpetrators’ actions are most often motivated by financial gain. The article discusses selected issues concerning so-called Internet fraudsters. In particular, it draws attention to the actions taken in cyberspace and the risks that accompany such decisions. I point out that the most vulnerable to identity theft are elderly people who do not even know basic security procedures. The article not only draws attention to the dangers themselves but also describes the way criminals act. It also states that in order to minimize the risks faced by network users, attention should be paid to training needs related to with security in cyberspace. An important aspect of this is to draw attention to the risks associated with personal data improperly stored on electronic media integrated into the Internet.

Year

Issue

2

Pages

10-14

Physical description

Dates

published
2020-06-30

Contributors

  • Department of Law and Social Science Bielsko-Biala School of Finance and Law Cz. Tańskiego 5, 43-300 Bielsko-Biała – Poland

References

  • Borokhvostov , V., Skurinevska , L. and Lutsik, J. (2019) “Information and financial technologies of hybrid wars: methodological approaches to the analysis of the content, occurrence, response and prevention”, Journal of Scientific Papers «Social development and Security», 9(6), pp. 56 -. doi: 10.33445/sds.2019.9.6.5.
  • Nastuła, A. (2020) “Dilemmas related to the functioning and growth of Darknet and the Onion Router network”, Journal of Scientific Papers «Social development and Security», 10(2), pp. 3-10. doi: 10.33445/sds.2020.10.2.1.
  • Widiyanti, M.; Hendrawaty, E.; , D. 2019. Antecedents of economic convergence in asean countries: foreign direct investment, trade, government size, population and economic convergence, Journal of Security and Sustainability Issues 9(2): 431-445. https://doi.org/10.9770/jssi.2019.9.2(6)
  • Raport z badania wzorców umownych pożyczek krótkoterminowych, fedaercja-konsumentow.org.pl,
  • Ławrowski P., (2016), Uważaj komu dajesz dowód osobisty takie mogą być tego konsekwencję, finanse.wp.pl,
  • Barbrich P. et all. (2020), Raport ZBP Cyberbezpieczny portfel, Edycja III, www.zbp.pl,
  • Barbrich P. et. all, (2018), Raport ZBP Cyberbezpieczny portfel, www.zbp.pl,
  • Rylski A., (2018), Zagrożenia technologiczne, sp.zsprzeginia.pl,
  • Szafrański, B. (2016), Kradzież danych osobowych narastające zagrożenie, biznes.interia.pl

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.desklight-1e688b89-7a02-4dea-b0eb-da2920237c18
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.