Unmasking the Shadows: Investigating Cyber Scams and its Strategies for Prevention

Kiruthiga V.*, Doreen Robin D.**, C. R. Rene Robin***
*Department of Commerce, Shrimathi Devkunvar Nanalal Bhatt Vaishnav College for Women, Chennai, India.
**Computational Intelligence Research Foundation (CIRF), Chennai, India.
***Department of Computer Science and Engineering, Sri Sairam Engineering College, Chennai, India.
Periodicity:January - March'2023
DOI : https://doi.org/10.26634/jit.12.1.19792


Cybercrime is mainly related to online fraud and encompasses various criminal activities through computers and online platforms, posing significant challenges in today's technologically advanced world. The case study presented herein investigates the use of unsolicited mass email messages as a prominent method employed by cybercriminals. These messages, disseminated via instant messaging, text messaging, or other digital messaging systems, serve as a deceptive means to defraud unsuspecting individuals. This study aims to enhance our understanding of the techniques, motives, and impact of online fraud. Furthermore, it highlights the attractiveness of online fraud to advertisers, who exploit its low operating costs beyond managing mailing lists. This aspect underscores the complex interplay between cybercriminals, their targets, and the broader digital ecosystem where illicit activities intertwine with legitimate platforms. By delving into the realm of cybercrime, this case study serves as a valuable resource for researchers and individuals seeking to understand the evolving nature of cyber threats. It emphasizes the importance of heightened awareness, robust cybersecurity measures, and the need for continuous adaptation to mitigate the risks posed by cybercriminals in an interconnected world.


Cybercrime, Cyber Scam, Phishing, Internet Fraud, Ransomware, Antivirus.

How to Cite this Article?

Kiruthiga, V., Robin, D. D., and Robin, C. R. R. (2023). Unmasking the Shadows: Investigating Cyber Scams and its Strategies for Prevention. i-manager’s Journal on Information Technology, 12(1), 32-37. https://doi.org/10.26634/jit.12.1.19792


[7]. Miriam, H., Doreen, D., Dahiya, D., & Rene Robin, C. R. (2023). Secured cyber security algorithm for healthcare system using blockchain technology. Intelligent Automation & Soft Computing, 35(2), 1889-1906.
[10]. O'Gorman, G., & McDonald, G. (2012). Ransomware: A Growing Menace. Symantec Corporation (pp. 1-15).
[11]. Richardson, R., & North, M. M. (2017). Ransomware: Evolution, mitigation and prevention. International Management Review, 13(1), 10-21.
[15]. Wu, L., Peng, Q., & Lembke, M. (2023). Research trends in cybercrime and cybersecurity: A review based on web of science core collection database. International Journal of Cybersecurity Intelligence & Cybercrime, 6(1), 5-28.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.