
communications, remote control and management of 
devices,  the  implementation  of  high-tech  products 
and services in order to develop a smart city and a 
smart  home  (home automation),  security  solutions, 
monitoring  of  transport  and  environmental 
conditions, digitalization of manufacturing industries, 
work of state institutions and organizations); housing 
and  communal  services  (management  of  energy 
resources,  elevators,  maintenance  of  buildings); 
transport  complex  (geolocation  systems, 
development  of  communication  along  the  roads, 
improvement  of  vehicles  by  embedding  in  GSM-
modules,  smart  alarms  with  remote  control  units, 
insurance  telematics  trackers,  video  recorders, 
monitoring  of  commercial  vehicles  and  fuel 
consumption, a system for collecting payments from 
heavy  vehicles  (Platon  project));  trade  (on-line 
retailers are already competing with traditional stores 
by  offering  unique  and  personalized  services  to 
customers). 
In  addition,  wearable  devices  (smartphones, 
tablets,  smartwatches,  fitness  trackers),  which  are 
available to almost every person, are an example of 
everyday use of the Internet of Things. Their design 
features, having built-in electronics, software, means, 
and sensors that provide communication, allow them 
to exchange information with other devices, including 
in automatic mode, without human intervention. 
Like  any  progressive  technical  innovation,  the 
Internet  of  Things  is  fraught  with  serious  threats, 
creates  additional  risk  zones, giving  rise  to  special 
types of criminal behavior and new forms of crime 
(cybercrime),  making  its  users  more  and  more 
vulnerable from external cyber threats (Afanasyeva, 
2020; Dechamp, 2005). 
In this regard, criminological information on the 
state and trends of cybercrime is essential for targeted 
and timely prevention (Smushkin, 2020). 
2  STUDY METHODOLOGY 
The  research  is  based  on  the  general  scientific 
dialectical method of cognition. Furthermore, a set of 
research methods that had been multiply proven in 
criminological science were used, including analysis, 
synthesis,  deduction,  induction,  systemic  structural 
(when studying the results of criminological research, 
the cyber fraud  rate  and  methods,  identifying  their 
tendencies), statistical (when studying statistical data 
characterizing the number of registered cyber frauds 
and  the  persons  who  committed  them,  as  well  as 
victims  of  such  crimes),  formal-logical  (when 
formulating proposals to  improve  countering cyber 
fraud),  differentiation,  integration,  etc.,  which 
allowed  the  research  group  to  achieve  the  set 
objective. 
3  STUDY RESULTS 
According  to  the  statistics  of  the  Federal  State 
Institution “GIAC of the Ministry of Internal Affairs 
of  Russia”,  a  significant  increase  in  cybercrimes  is 
recorded annually (Table 1).  
Table  1:  Dynamics  of  cybercrimes  in  the  Russian 
Federation in 2018-2020. 
This situation is typical not only for Russia, but 
also  for  foreign  countries.  Thus,  in  2020,  791,790 
cybercrime allegations were registered in the United 
States (+ 69% compared to 2019) (Figure 1). 
 
Figure  1:  Trends  in  the  number  of  reported  cybercrime 
allegations  and  the  amount  of  damage  caused  by 
cybercrimes in the United States in 2016-2020. 
The virtual nature, anonymity, and the variety of 
possible criminal actions are most attractive for the 
implementation  of  all  kinds  of  fraudulent  schemes 
that are  impossible in  the  real  world  (Goncharova, 
2017; Shiyan, 2010; Wagen W. van der, 2015). It is 
about  cyber  fraud,  i.e.  the  embezzlement  or  the 
acquisition of the right to another person's property 
by deception or abuse of trust, committed with the use 
or application of information and telecommunication 
technologies. This is confirmed by the fact that frauds 
occupy the most significant share in the structure of 
cybercrimes (total: 237,074; 46.45%) (Figure 2). 
Cyber Fraud as a Relevant Internet of Things Security Threat
123