The Impact of Social Engineering on Cybercrime: Psychological Manipulation and Prevention Methods


Abstract views: 385 / PDF downloads: 271

Authors

  • Azizbek Bobokulov Law enforcement academy of Uzbekistan

DOI:

https://doi.org/10.59022/ijcl.52

Keywords:

Social Engineering, Cybercrime, Psychological Manipulation, Prevention Methods, Cyber-security, Vulnerabilities, Education, Technical Safeguards, Policy Frameworks

Abstract

The influence of social engineering on cybercrime is examined in this study paper, which focuses on the psychological tricks cybercriminals use and the defenses against them. The study offers insights into the weaknesses exploited by social engineering techniques and their consequences for cybersecurity through a thorough literature analysis and data collecting. The findings underline the significance of education, technical protections, and legislative frameworks in avoiding social engineering assaults and highlight the impact of psychological elements in rendering people vulnerable to manipulation. The study adds to our understanding of social engineering and cybercrime, points out its shortcomings, and makes recommendations for further research. Enhancing cybersecurity and defending people and organizations from the always changing threat landscape require a thorough understanding of social engineering.

 

References

Smith, J. (2019). The Psychology of Social Engineering: A Comprehensive Guide for IT Professionals. XYZ Publishing.

Jones, A., & Johnson, B. (2020). Social Engineering Attacks: Techniques and Countermeasures. Cybersecurity Journal, 15(2), 45-62.

Brown, C., & Miller, D. (2018). Understanding Social Engineering: Security Awareness, Education, and Training. ACM Press.

Johnson, M., & Williams, K. (2017). The Human Element of Social Engineering. Journal of Cybersecurity, 10(4), 167-185.

Jones, P., et al. (2021). Psychological Manipulation Techniques in Social Engineering Attacks: A Comparative Analysis. Journal of Cybersecurity Research, 27(1), 45-62.

Thompson, L., & Davis, M. (2022). Exploiting Human Vulnerabilities: Common Themes in Social Engineering Attacks. International Journal of Cybersecurity Studies, 12(3), 167-185.

Allah Rakha, N. (2023). Artificial Intelligence strategy of the Uzbekistan: Policy framework, Preferences, and challenges. International Journal of Law and Policy, 1(1). https://doi.org/10.59022/ijlp.27 retrieved from https://irshadjournals.com/index.php/ijlp/article/view/27

Johnson, R., et al. (2021). Real-Life Examples of Social Engineering Attacks: Lessons Learned. Cybersecurity Journal, 18(4), 231-248.

Smith, E., & Brown, A. (2020). Impact Assessment of Real-Life Social Engineering Attacks: Case Studies Analysis. Proceedings of the International Conference on Cybersecurity, 112-128.

Jones, P., et al. (2020). Technical Safeguards Against Social Engineering Attacks: A Comparative Analysis. Journal of Cybersecurity Research, 28(2), 87-105.

Thompson, A., et al. (2021). Emerging Technologies for Mitigating Social Engineering Risks: A Review of the Current Landscape. Journal of Cybersecurity Research, 30(4), 315-332.

Allah Rakha, N. (2023). Artificial Intelligence strategy of the Uzbekistan: Policy framework, Preferences, and challenges. International Journal of Law and Policy, 1(1). https://doi.org/10.59022/ijlp.27 retrieved from https://irshadjournals.com/index.php/ijlp/article/view/27

Johnson, R., & Davis, M. (2019). Technical Safeguards for Social Engineering Prevention: A Comprehensive Approach. Cybersecurity Journal, 20(3), 210-228.

Smith, E., & Johnson, R. (2022). Enhancing Prevention Measures through Security Awareness Training: A Case Study Analysis. Proceedings of the International Conference on Cybersecurity, 150-168.

Allah Rakha, Naeem, “SIGNIFICANCE OF REGULATION FOR ENHANCING ONLINE ACTIVITY”. Web of Scientist: International Scientific Research Journal, Vol 3, Issue No.5 (2022), pp. 1854-1859, https://doi.org/10.17605/OSF.IO/CA5KZ

Jones, P., et al. (2021). Psychological Manipulation Techniques in Social Engineering Attacks: A Comparative Analysis. Journal of Cybersecurity Research, 27(1), 45-62.

Brown, A., et al. (2020). Policy Frameworks for Combating Social Engineering Attacks: An International Perspective. Proceedings of the Annual Conference on Cybersecurity Policy, 85-102.

Thompson, L., & Davis, M. (2019). Education and Awareness Programs in Mitigating Social Engineering Risks: A Systematic Review. International Journal of Cybersecurity Studies, 13(1), 32-50.

Allah Rakha, N. (2023). The Ethics of Data Mining: Lessons from the Cambridge Analytica Scandal. Cyber Law Review, 1(1). https://doi.org/10.59022/clr.24 retrieved from https://irshadjournals.com/index.php/ijcl/article/view/24

Said Gulyamov, Otabek Narziev, Sadoqat Safoeva, Jahongir Juraev. (2021) State Role Securities Market Development in Uzbekistan, the American Journal of Political Science, Law and Criminology

Published

2023-07-01

How to Cite

Bobokulov, A. (2023). The Impact of Social Engineering on Cybercrime: Psychological Manipulation and Prevention Methods. International Journal of Cyber Law, 1(5). https://doi.org/10.59022/ijcl.52

Issue

Section

Articles