![]() ![]() The betray of trust is very common technique used by dating fraudsters, they engage in the purposeful creation of trust with their victim, often over a period of weeks or months, with the goal of betraying them after extorting money from them. Cybercriminals also exploit the natural desires of humans to trust others to send unsolicited electronic mails to unsuspecting victims, as though they originated from legitimate sources. Fake emails are also used by hackers to deceive victims into opening dangerous attachments or clicking on hazardous links. For instance, phishing emails are the most typical means through which hackers distribute ransomware. Cybercriminals have access to a wide variety of psychological manipulation techniques. Most often, cyber-attacks such as hacking, phishing, business email compromise (BEC) malware attacks, password attacks, man-in-the-middle attacks, insider threats, and crypto-jacking are the most frequently suffered by victims. Research conducted by Pew research center (PEW) in 2014, reveal an astonishing 40% of all adult internet users admit to experience cyber victimization of different variants. The development of technology creates opportunities for people, such as business and leisure activities, but also enables criminals to commit crimes. The global cyber threat continues to evolve at a rapid pace, with a rising number of people falling victims on daily bases. Malicious cyber activity poses a danger to public safety, national security, and economic stability. This enables them feel the love and moral supports from close associates, other than wallow in loneliness and isolation which can breed unpleasant stimuli.Ĭyber-attacks are growing in multiple dimensions globally. Thus, victims of cybercrime could absorb shock by spending quality time with significant others. To this end, victims are left battered and shattered, and could act irrationally against own-self before state actors set out to track the offender(s). It starts with what seem to be a friendly conversation and exchange of correspondences and pleasantries which turns into a scamming spree. The study found that the peculiarity of cybercrime lies in the fact that the victims willingly land themselves into it without being forced to do so. The data for this study came from a variety of sources, including books, articles, essays, tabloids, and journal publications a content analysis approach was used to evaluate the data and present using certain words, themes, concepts, or codifications. This necessitated the present study that examines the shock absorption mechanism of the cybercrime victims in Nigeria. In Nigeria, cyber threat continues to evolve rapidly with rising number of victims on daily bases. The development of technology creates opportunities for businesses, seamless communications and leisure activities to thrive. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |