Jun 29

4.1. Privacy breaches and theft of data

What is data privacy breach? A data breach is an incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner. A small company or large organization may suffer a data breach. A privacy breach occurs when someone accesses information without permission. It starts with a security […]

Read More
Jun 29

4.2. Hacking and cyber extortion

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorized access to or control over computer network security systems for some illicit purpose. Cyber extortion is an internet crime in which someone holds electronic files or your business data hostage until you pay […]

Read More
Jun 29

4.3. Identity thefts

Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases. Identity theft is committed in many different ways and its victims are typically left with damage to their credit, finances, and reputation. Identity theft occurs when […]

Read More
Jun 29

4.4. Cyberbullying

Cyberbullying can be defined as an aggressive, intentional and repeated act carried out by a group or individually, performed via electronic means such as mobile phones or the internet, against a victim who cannot easily defend himself or herself (Slonje, Smith and Frisén, 2013).  Bullying, in general, is separated from other aggressive behaviors based on two […]

Read More
Jun 29

4.5. Phishing techniques

Phishing – fraudulent activities designed to steal personal and / or other confidential information (e.g. identity data, passwords, payment card details, etc.). Usually, the main goal of phishing is to get personal data and login credentials for online banking. User IDs, passwords and other credentials enable fraudsters to access individuals’ bank accounts and dispose of […]

Read More
Jun 29

4.6. Financial crimes and investments frauds

Financial crimes are crimes in which criminal organizations benefit financially. In financial crimes, usually, one party provides a financial benefit, and the other party suffers a financial loss. These are frequently committed for the personal benefit of the criminal and involve the illegal conversion of ownership of the property involved. When we talk about ‘consumer […]

Read More
Jun 29

4.7. Fake news and propaganda

Propaganda is communication that is primarily used to influence an audience and further an agenda, which may not be objective and may be selectively presenting facts in order to encourage a particular synthesis or perception, or using loaded language in order to produce an emotional rather than a rational response to the information that is being presented (Wikipedia contributors, 2020b). In the digital era we […]

Read More
Jun 29

4.8. Fraud advertising (fake products, supplements)

Whenever money is involved, there is always an opportunity for a fraud. From a technical perspective, online advertising fraud has been relatively easy (and yes – lucrative) business for fraudsters and a financial disaster for advertisers, publishers and online ad platforms themselves. Online ad business was built on a number of Internet Open Standard technologies […]

Read More
Jun 29

4.9. PC/online gaming, casino, addiction

Play is an innate human drive, which appears in early childhood (Kuss & Griffiths, 2012, p. 5). After the millennium internet gaming has increased significantly because of the huge technological development. PC gaming and, in general, online gaming gives players the opportunity to experience different gaming environments simultaneously, to design and develop virtual characters they […]

Read More