Preview

Eurasian Scientific Journal of Law

Advanced search

Phishing as a popular method of committing cyberbullying: concept, criminological characteristics, foreign experience

https://doi.org/10.46914/2959-4197-2026-1-1-204-214

Abstract

The article examines issues arising from the development of information and communication technologies, which have generated new social relations requiring legal regulation. The pervasive adoption of the Internet enhances everyday comfort and safety but also creates opportunities for computer crime. The study’s purpose is to analyze phishing, one of the most dangerous and widespread cyber threats. To achieve this aim, the research employs historical, dialectical, comparative-legal, and formal-legal methods. The subject is phishing as a method of computer fraud perpetrated against individuals via email, text messages, phone calls, or other forms of digital communication. The commonly accepted definition of phishing is presented as a fraud method that obtains personal information and confidential data by deceiving the victim. Typical phishing variants are described. The paper also reviews measures used to counter this form of criminal activity in selected foreign jurisdictions. The authors conclude that cybercrime is global in scope and a serious challenge for many countries. Contributing factors include low public literacy in information technology, imperfect legislation regulating this sphere of social relations, and widespread access to digital resources. The conclusion proposes improving anti-phishing effectiveness through comprehensive measures: refining legislation, raising digital literacy, expanding international law-enforcement cooperation, and developing innovative security technologies.

About the Authors

Т. Volchetskaya
Immanuel Kant Baltic Federal University, Kaliningrad
Russian Federation

Volchetskaya Т., D.L.S., Professor,

Kaliningrad.



B. М. Nurgaliyev
Karaganda University of Kazpotrebsoyuz
Kazakhstan

Nurgaliyev B.М., D.L.S., Chief Researcher, Professor,

Karaganda.



А. B. Nurgaliyeva
Eurasian National University named after L.N. Gumilyov
Kazakhstan

Nurgaliyeva А.B., PhD Student,

Astana.



А. Т. Sadvakassova
Karaganda University of Kazpotrebsoyuz
Kazakhstan

Sadvakassova А.Т., PhD, Senior Researcher,

Karaganda.



References

1. Hanov T.A., Zhienbekov Zh.E. (2016) Sistema obespechenija informacionnoj bezopasnosti // Aktual’nye problemy sovremennosti. No. 2 (12). P. 37–43. (In Russian)

2. Ogonji M., Okeyo G., Wafula J. (2020) A survey on privacy and security of Internet of Things // Computer Science Review. Vol. 38. URL: https://www.sciencedirect.com/science/article/abs/pii/S1574013720304123 (accessed: 04.09.2025) (In English)

3. Orunsolu A.A., Abayomi-Alli O.O., Misra S. (2022) A predictive model for phishing detection // Journal of King Saud University – Computer and Information Sciences. Vol. 34. Issue 2. P. 232–247. (In English)

4. Ribeiro L., Sousa Guedes I., Cardoso C. (2024) Which factors predict susceptibility to phishing? An empirical study // Computers & Security. URL: https://www.sciencedirect.com/science/article/pii/S0167404823004686 (accessed: 04.09.2025) (In English)

5. Alkhalil Z., Hewage C., Nawaf L., Khan I. (2021) Phishing Attacks: A Recent Comprehensive Study and a New Anatomy // Frontiers in Computer Science. URL: https://www.frontiersin.org/journals/computerscience/articles/10.3389/fcomp.2021.563060/full (accessed: 04.09.2025) (In English)

6. Naqvi B., Perova K., Farooq A., Makhdoom I., Oyedeji S., Porras J. (2023) Mitigation strategies against the phishing attacks: a systematic literature review // Computers & Security. Vol. 123. URL: https://strathprints.strath.ac.uk/87505/1/Naqvi-etal-CS-2023-Mitigation-strategies-against-the-phishing-attacks.pdf (accessed: 05.09.2025) (In English)

7. Ivanova Ju.A., Sarbaev G.M. (2022) K voprosu o kiberprestupnosti // Cifrovye transformacii jekonomiki i prava. Sbornik nauchnyh tezisov Nacional’noj nauchno-prakticheskoj konferencii. Volgograd. P. 58–64. (In Russian)

8. Arhipova A.B., Nechaev D.A. (2023) Tehnologija formirovanija integrirovannoj antifishingovoj sistemy v cifrovom obshhestve // Vestnik SibGUTI. Vol. 17. No. 2. P. 93–103. DOI: 10.55648/1998-6920-2023-17-293-103 (In Russian)

9. Klevchuk O. Obzor ugroz: ataki-primanki. URL: https://blog.barracuda.com/2021/11/10/threatspotlight-bait-attacks. (data obrashhenija: 12.09.2025) (In Russian)

10. Zigmunt O.A. (2015) Komp’juternaja prestupnost’ v Germanii // Prestupnost’ i social’nyj kontrol’ v obshhestve postmoderna: Sb. materialov mezhdunarodnoj Baltijskoj kriminolog. konf. Ch. 1. – SPb.: AlefPress. P. 157–159. (In Russian)

11. Chimuco F.T., Sequeiros J.B.F., Lopes C.G., Simões T.M.C., Freire M.M., Inácio P.R.M. (2023) Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation // International Journal of Information Security. Vol. 22. Issue 5. P. 1121–1158. URL: https://link.springer.com/article/10.1007/s10207-023-00669-z (accessed: 05.09.2025) (In English)

12. Sethuraman S.C., Devi Priya V.S., Reddi T., Reddy M.S.T., Khan M.K. (2024) A comprehensive examination of email spoofing: Issues and prospects for email security // Computers & Security. Vol. 137. URL: https://dl.acm.org/doi/10.1016/j.cose.2023.103600 (accessed: 06.09.2025) (In English)

13. Kiberprestupnost’ i kiberkonflikty: Kazahstan. URL: https://tadviser.com/index.php/Article:Cybercrime_and_cyber_conflicts:_Kazakhstan#.2A_Online_Fraud_Detection_-_20.25 (data obrashhenija 12.09.2025) (In Russian)

14. Borisov V.R. (2021) Iinformacionnye tehnologii i cifrovizacija kak sreda dejatel’nosti kibermoshennikov // Innovacionnoe razvitie jekonomiki. No. 6 (66). P. 69–79. (In Russian)

15. Kobec P.N. (2022) Harakteristika sovremennyh osobennostej protivopravnyh projavlenij, sovershaemyh v kiberprostranstve // Sovremennaja nauka. No. 3. P. 18–21. (In Russian)

16. Correia S.G. (2022) Making the most of cybercrime and fraud crime report data: a case study of UK Action Fraud // International Journal of Population Data Science. Vol. 7. No.1. URL: https://pmc.ncbi.nlm.nih.gov/articles/PMC9152840/ (accessed: 06.09.2025) (In English)

17. Fahey E. (2024) The evolution of EU – US cybersecurity law and policy // Journal of European Integration. No. 46(7). P. 1073–1088. URL: https://www.tandfonline.com/doi/full/10.1080/07036337.2024.2411240#abstract (accessed: 13.09.2025) (In English)


Review

For citations:


Volchetskaya Т., Nurgaliyev B.М., Nurgaliyeva А.B., Sadvakassova А.Т. Phishing as a popular method of committing cyberbullying: concept, criminological characteristics, foreign experience. Eurasian Scientific Journal of Law. 2026;(1(14)):204-214. (In Russ.) https://doi.org/10.46914/2959-4197-2026-1-1-204-214

Views: 21

JATS XML


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2959-4197 (Print)
ISSN 2959-4200 (Online)