Please use this identifier to cite or link to this item:
https://essuir.sumdu.edu.ua/handle/123456789/97245
Or use following links to share this resource in social networks:
Tweet
Recommend this item
Title | Strategies and Challenges of Combating Cyber-Financial Fraud: An Analysis of Ukraine's Experience During the Military Conflict |
Authors |
Rieznik, Oleh Mykolaiovych
Samsin, R. Nikolenko, L. Butyrska, I. Kozakova, I. |
ORCID |
http://orcid.org/0000-0003-4569-8863 |
Keywords |
Cybersecurity models information sources financial fraud detection analysis techniques cryptocurrency manipulation anomalous transaction monitoring |
Type | Article |
Date of Issue | 2024 |
URI | https://essuir.sumdu.edu.ua/handle/123456789/97245 |
Publisher | Library Progress International |
License | In Copyright |
Citation | Oleg Reznik, Roman Samsin, Liudmyla Nikolenko, Iryna Butyrska, Kozakova Iryna (2024) Strategies and Challenges of Combating Cyber-Financial Fraud: An Analysis of Ukraine's Experience During the Military Conflict. Library Progress International, 44(3), 21444-21457. |
Abstract |
The article is dedicated to a detailed analysis of modern methods of financial fraud in cyberspace, substantiating the prospects for combating this destructive phenomenon based on Ukraine's experience. In this study, the authors employed an interdisciplinary approach, combining methods from legal science, economics, and information technology. Financial fraud is constantly evolving, taking on new forms and scales. Cybercriminals actively utilize various methods such as phishing attacks, hacking banking systems, stealing payment data, and deploying malicious software to gain unauthorized access to the financial resources of individuals and organizations. Simultaneously, illegal activities are increasingly spreading on cryptocurrency exchanges, where fraudsters manipulate digital assets. It is emphasized that effective counteraction to financial cybercrime requires a comprehensive approach. This includes monitoring financial transactions to detect anomalous activity, analyzing cyber threats, and enhancing cybersecurity measures. It is also crucial to educate users about potential threats and ways to protect personal data, as the majority of fraudulent schemes are executed through negligence and lack of knowledge. During the course of the investigation, the authors identified the main forms of financial cyber fraud and developed effective methodologies for investigating, preventing, and analyzing such socially dangerous acts. |
Appears in Collections: |
Наукові видання (ННІП) |
Views
Unknown Country
1
Downloads
Files
File | Size | Format | Downloads |
---|---|---|---|
Reznik_analysis_techniques.pdf | 1.21 MB | Adobe PDF | 0 |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.