викладача вищого вшськового навчального закладу мае бути спрямована на формування позитивно! мотиваци, набуття необхщних компетенцiй для И здiйснення, оволодшня iнформацiйною культурою, науковим пошуком, розвиток творчих здiбностей i рефлексивного мислення.
Список лiтератури
1. Дичк1вська I. М. Формування штелектуаль-них мотивiв у контекстi iнновацiйного навчання в шдготовщ фахiвцiв: методологiя, технологiя, тео-рiя, досвiд, проблеми. Збiрник наук. праць. Ч. 3. / I. М. Дичшвська. - Ки!в - Вшниця, 2003. - С.327 -331.
2. Дичшвська I. М. 1нновацшш педагопчш технологи / I. М. Дичшвська. - К.: Академвидав, 2004.
3. Дичшвська 1.М. 1нновацшш педагопчш технологи: Навчальний поабник. - К.: Академвидав, 2004.- 352 с. (Альма-матер)
4. Завалевський Ю. I. Конкурентоспроможний вчитель: теор1я i практика: Навч. поабник / Ю. I. Завалевський. - Чершвщ: Букрек, 2010. - 216 с.
5. Завалевський Ю. I. Сутнють шновацшно! пе-дагопчно! дгяльносп/ Юрш Завалевський Педа-гопчний дискурс, випуск 17, 2014 / Pedagogical Discourse, Volume 17, 2014
6. Сиротенко Г.О. 1нновацшна д1яльн1сть педагога: ввд теори до устху. 1нформацшно- методич-ний зб1рник /Упорядник Г.О. Сиротенко. - Полтава: ПОШЛО, 2006. -124 с.
SPAM AS TRIGGER OF SOCIAL ANXIETY VIA DIGITAL DEVICES AND MEDIA SEMANTIC
RESEARCH\EMPIRICAL ANALYSIS
Makarova E., Marchenko S., Maximets S.
Don State Technical University, Russian Federation
Abstract
Modern electronic communication became an attractive medium to spread spam: according to statistics of 2019 the spam share in Russian mail traffic was about 82%. In the study spam different aspects are investigated; one of them being verbal manipulation. For any Internet user, spam is a mass mailing of advertising messages carried out without the recipient's consent. The paper purpose is to teach how to be safe surfing the Internet or communicating via diverse array of mass media technologies. The text structure is to show the user verbal manipulation techniques used by spammers and to analyze the manipulative speech impact on recipients of electronic spam emails. Research is based on the content analysis of spam letters, the results presented show specific words usage frequency. As media becoming an important part of our life, special attention should be paid to learning how to recognize spam messages.
Keywords: anxiety, media, email, digital, network, spam, scam.
1. Introduction
Although the emergence of digitalization has created great opportunities for learning and working online, especially in these challenging times of pandemic COVID-19 lockdown, recent studies show significant adverse effects of the pandemic situation for the mental health of the population (Makarova, Makarova, Mishchenko, 2021). These impacts have yet to be assessed and carefully studied; however, it is already obvious that for their understanding mass social surveys using standard psychological tools are insufficient. The authors emphasize the need to take into account and give a qualitative and quantitative analysis of the entire completeness with stressful influences of digital information: virtual threat and information stress (Geric & Hutinski, 2007), deprivation, socio-economic stress (Whelan & Maitre, 2013), social anxiety and fake news (Shu et al., 2020), and suggest a further research of stress-associated mental and psychosomatic diseases. The present research is devoted to spam and scam as triggers of social anxiety and cyberbullying via digital devices and media.
Digital technologies have become an important part of everyday routine, entered all spheres of life and made them dynamic. They spare us a lot of time and
effort as they make different sophisticated assignments easy and fast to complete. We can send an E-mail letter and get a response within seconds, can search for and get necessary information within minutes. We can ask experts for and get assistance with a difficult problem solution or decision-making issue within hours. Younger generation (the so-called "digital citizens") cannot survive in life without their devices and gadgets. They communicate via Iphones, search information in their laptops and watch movies, listen to music via their desktops or IPads and IPods. Their tablets are their best friends. These young people form the foundation for the inclusive, knowledge societies we need for the twenty-first century.
Digitalization today is not just a modern trend, but an everyday necessity. During a COVID-19 lockdown, people have started to use their digital devices more often than usual, for work, study, communication with family and friends, entertainment and even relationship. We cannot deny the usefulness of digitalization in today's life, but to be on a safe side, we should consider both advantages and disadvantages of using digital devices in our routine uneventful existence in the situation of self-isolation or a complete lockdown. It is up to every person to decide which way and technology of
communication to choose and how to use them. Among disadvantages we should name cyber bullying, fake accounts, Internet games violence, cyber fraud, and spam, of course.
Everyone who uses a computer, has an e-mail box or a page in social networks, knows what spam is. Sometimes unimportant and completely unnecessary letters literally "fill up" the feed of incoming messages and clog it up. Of course, this annoys and angers a person, but for those who send such "letters" it brings income, so it probably here to stay. Although new versions of Spam Reader are more sophisticated than regular Antispam systems, spammers also use more advanced and new ways and methods of spamming. "The threat of a coronavirus drew attention of the whole world that could not remain unnoticed by cybercrimi-nals. They will continue to use the interest of society for distribution spam campaigns, connected with the outbreak of a virus" (Vasily Dyagilev, the chief representative of Check Point Software Technologies in Russia and the CIS). In order for people to open and read spam letter spammers put the words "COVID-19", pandemic, virus in the domain names of their fraudulent websites or as a subject of their junk mail letters. For example, the vaccinecovid-19.com website registered in Russia was detected on February 11, 2020. The website created by malefactors suggested its visitors to purchase "the best and fastest test for detection of a coronavirus at the fantastic price — 19,000 rubles".
II. Literature Review
All spam can be conditionally divided into harmless and dangerous. Harmless letters do not threaten a recipient with anything, except that a spoiled mood or a loss of a certain amount of time. This is an ordinary junk mail for completely ordinary things - clothes, shoes, equipment or a car service. What is spam in social networks? Previously, spammers created separate accounts to send letters of an advertising or political nature (and not only). But in recent years, a more sophisticated method of spamming has emerged. Dishonest users hack into the accounts of other users and send spam from these accounts. As a rule, this is a request to transfer a certain amount of money. As a result, a person can lose money or it will harm a computer (Polin, 2019).
A scam is a fraudulent schematic trick which is cleverly made successful by gaining the confidence of a gullible victim. We might say, it is an illocutionary speech act, that is saying or writing something with the intention of stating an opinion (some goods are the best; for example), confirming or denying something, making a promise (you will lose weight if you use our pharmaceutical product) (Alston, 2000 ). A scam is a scheme or a plan to trick, deceive or cheat someone out of money or something else of value. This is definitely perlocutionary speech act, the aim of which is to change feelings, thoughts or actions of a recipient (Green, 2017). While many are perpetrated over email, they can also happen in person, by phone, in newspaper ads, social networks, posters or many other ways. Scams are probably as old as human civilization. Indeed, such letters often contain dubious proposals aimed at cheating and getting "easy" money. This is an illegal practice
where criminals scam legitimate users and get financial benefits from them, like opening an account against some other person's information or withdrawing some amount from a bank account without consent. This is done by getting access to financial information or bank details. Many online scams are set off using spam. A spam, thus, is one of the many tools for a scam. Incidentally, numerous individuals who coordinate scams spam to achieve their objectives. Dangerous spam phishing is when cybercriminals send a letter in which, allegedly on behalf of the bank (payment system, etc.), they scare a person with a problem, say a person has to pay a big fine or to lose money in the account. The problem, they say, needs to be solved immediately. To solve the issue, a person is offered to follow the link to the official (actually not) website of the bank. The domain will certainly be very similar, and the site itself will be like two peas in a pod similar to the site of the bank (Conway, 2014).
Not only E-mail, but social networks and telephones can be sources of spam. Easy access to partially open accounts, as well as the ability to spam E-mail large number of target audience attracts experienced malicious fraudsters and spammers. Some of social networks have multifunctional characteristics; others can perform only a limited number of actions allowing even novice spammers to use a variety of ways of spam sending. Using social networks, they send private messages to many users. Fraudsters can open fake accounts, get access to other users' profiles; add or ban friends, create groups, subscribe to newsletters; give likes; share or comment; and take different actions to attract users' attention. By doing this, spammers can organize a spam attack in social media.
Modern technology has replaced human operators with bots. This made it possible to increase the number of spam calls. Spam in online games is due to the popularity of online games and the emergence of a free-to win distribution models. It leads to the emergence of many alternative sites that are somehow related to the game. Spammers are able to receive quite tangible funds in multiplayer online games, but to achieve this they need to somehow attract gamers' attention. More often users encounter ad spam in games in the form of messages in chat or private messages; voice messages from bots, bots with an advertising profile name are added to friends. It makes it extremely difficult to spot and to identify spam messages (Gupta A. et al., 2015 ).
The use of verbal manipulation in spam emails is defined as the genre-forming component of letters, within which it distinguishes a number of typical manipulative techniques. The latter are subdivided into two groups: manipulative speech techniques, used as a manipulation tool, the pragmatic characteristics of spam letters, and manipulative verbal techniques, the main tool which is thematic content (description of ways to get "easy" money, the creation of an autobiographical legend about financial success). Quantitative data on the frequency of the analyzed manipulative speech or verbal techniques used by the spam emails authors, as well as discussion of the results of a linguistic perception of spam emails by e-mail users are the main goals of the present study. On the one hand, the
degree of recognition of spam emails in general is revealed; on the other hand, speech techniques are identified that provide the most manipulative influence on the addressees of spam letters (Fenina, 2017).
Speech manipulation, as a rule, is aimed at ensuring that the addressee acts in response to the spam letter in the interests of addresser of the message, but not necessarily coinciding with the interests of the addressee, "speech manipulation is influence aimed at an implicit, hidden motivation to perform certain actions; hidden introduction into consciousness of desires, relationships, attitudes that serve to implement the interests of the addresser of the message. The purpose of speech manipulation is to persuade the manipulated person (addressee) to consider certain statements as true without considering all the arguments"(Chernyavskaya, 2013 ).
III. Methods and Materials
Content is any information that is generated by a person (company or group of people) to fill pages (social networks, blogs, websites, etc.). To analyze text content a method of collecting data (words, pictures, symbols, concepts, topics or other messages) and analyzing vocabulary is used. This method is called content analysis, and it can be applied to any objects of communication. When we use the word "text", we do not necessarily mean something printed or written, but anything visible or audible sending a message and acting as a communication space. The space is filled with signs and pictures, books or articles, commercials, presentations, legal papers, messages, poems and songs, photos, labels or works of art. Content analysis refers to non-poll methods, since it processes words, symbols, etc. in the text, without providing communication with the writer or the recipient of information, does not depend on the influence of the researcher who analyzes the content of the text. Content analysis allows identifying intentions, meanings in communication. It allows experimenting with quantitative and qualitative methods of text analysis.
With the help of content analysis, the researcher can compare the content of many texts and analyze it with a quantitative method (for example, diagrams and tables). Content analysis can be documented using objective, quantitative indicators to show whether vague sensations based on unsystematic observation are true. It delivers reproducible, accurate results based on text research.
Content analysis includes at the same time a random sample, accurate dimension and operational definitions of abstract constructs. To reveal aspects of content that represent content in quantitative terms coding is used. After the researcher collects the data, they are entered into the computer program and subjected to statistical processing in the same way surveys or experiments results are processed. Content analysis has been in use for nearly a century, although initially used only
for the purposes of psychology, it later found application in other spheres of art and life. Mentality or culture of a researcher dictates and limits conclusions based on content analysis results. Analysis of fiction texts is biased due to cultural, aesthetic or literary preferences of a particular nation. The vocabulary of the literary text can be analyzed, but no interpretation of the content or conclusion about the text's artistic value can be made. As R. Holsti pointed out, "content analysis can be considered only as a supplement, not a substitute, to the subjective examination of documents" (Holsti, 1968 . Content analysis is very useful for investigating three types of problems. Firstly, it is fruitful for researching large texts such as literary works of a writer, collection of newspaper sets for several years. Secondly, it is useful for analyzing historical documents, reminiscences, memoirs or movie scripts from time ago. Finally, using content analysis, messages in the text that are difficult to see at a cursory glance can be found. The third one is exactly what we need for our research.
Materials for our research were picked out of a number of spam messages that researchers have got into their E-mail boxes during a period since 2019. All of the spam messages were classified and analyzed using content analysis. Among the letters there were regular spam advertisements from mailing lists offering different goods and services, also there were scam messages from people trying to cheat the addressees and get their money. Content analysis helps identify trigger keywords that serve as a red flag, messages with these words should be marked as spam, their content should be avoided. Thus, a recipient can identify spam messages even if they get through spam filters. Definitely, we should add that not all the suspicious words mean the message is spam, context also matters. The context of such messages can be one of these: free gifts, promises, bank returns you don't expect, extra cash, free trial, delivery you don't expect, an inheritance /winning prize payment due /owed to you etc.
IV. Results
We applied content analysis to spam email classification at low or high levels of three stimulus dimensions: premise plausibility, prose quality, and email structure. Relevant to assignment, this approach helped identify perceptual and decisional biases that could be leveraged to individual perception of spam letters. The analysis was made on the example of 33 spam e-mails of various topics. Of these, the largest number belonged to letters of a stereotypical content on immigration offer to various countries (10 letters), inheritance and possibility of obtaining some investment (7 letters respectively). In 4 letters, it is proposed to receive certain cash payments under various pretexts. And 3 of them are related to conferences held on various issues. Two more letters were different: a proposal to make contact based on previous correspondence, and a proposal to give feedback on the activities of a certain company.
Table.
Content analysis results to spam email classification
Parameter Meaning
Spaced characters 40626
Characters without spaces 33874
Total words 6778
Water (words or sentences of no value to the 59%
reader)
Classical text nausea 16.58
Vocabulary 1535 words
Core vocabulary 1239 words
Language English
Topics "Goods and services", "Offers" , "Communication", "Advertising",
For quantitative lexical analysis, the method of content analysis was used. The following was revealed:
• The subject of all letters is immediately defined as "Goods and services", "Communication", "Advertising", "Offers".
• The total number of words used is 6778, with the level of classic text nausea is 16.58%, while the norm is not more than 7%. This suggests that the texts of spam letters there use keywords, presumably affecting the minds of those who read them and forcing recipients to pay attention to these concepts.
• The unimportant content of the text in the analyzed spam emails is 59% on average, while the specified rate is up to 33%. This indicates the fact that the reader's attention is blurred with excessive unnecessary information, and that the water makes lose concentration when deciding whether to trust or distrust the content of the letter.
• Content analysis of the most commonly used lexemes has shown that most often keywords used are "country, fund, money, contact, visa, conference, bank, application, immigration, million, business, etc." The accentuation of these concepts and their regular repetition allows the recipient to subconsciously tune in to the formation of the required positive attitude towards the problems of the letter and, with a greater degree of confidence, follow the lead of the scammers.
• For most people the likelihood of receiving material benefits is a strong incentive to make an affirmative decision. In this regard, in the spam messages there is a great predominance of lexemes with a meaning related to money: fund (30), money (25), bank (17), transfer (13), million (13), business (11), investment (11), interest (9), dollar (8), etc.
• A significant predominance of lexemes with positive connotations was also revealed, they frame a positive mood: free (10), interested (9), expert (8), eligibility (8), legal (6), friend (6), sustainable (5), important (5), etc.
• The opposite situation occurs with tokens of negative connotation. Their use in spam emails is greatly reduced compared to words of neutral and positive semantics. However, some lexemes are also encountered quite often; it is exclusively related to the nature of the letter's content. For example, in letters offering to inherit some money after a deceased distant relative, lexemes such as deceased (9), cancer (7), die (6) and death (4) are logically common. But this literally limits the
use of tokens of negative connotation. These lexemes, even in quantitative terms, are significantly inferior to the semantically positive lexemes given above. Linguistic analysis of spam emails was carried out next. We have identified the most effective lexical and semantic constructions that induce the recipient to trust the scammers and fulfill their requirements.
• It is worth noting the satiety of politeness formulas. Each letter contains at least one construction that disposes the reader to the person who wrote this message. However, in most letters they predominate. Such constructions are "I would like to note that in order to confirm your eligibility", "I am worried that you still haven't moved forward...", "Should you wish to use our services to continue?" , "I sincerely hope that all is well with you and your family", "I really hope that you are a bit better than in 2020", "I humbly implore for your utmost consideration", "It is a great pleasure to invite you to the forthcoming International conference", etc.
• The focus of the appeal directly on the recipient should be highlighted. The authors of such letters try to indicate the uniqueness of the reader and the fact that this letter is addressed only to this person only. To do this, phrases and expressions such as "will handle your case personally", "I hope you qualify, so that you can not only earn good money, but also enjoy such a beautiful country as New Zealand", "Have I convinced you yet? "," If this is indeed your current occupation, we have excellent news for you", "I contacted you because you have the same last name as the deceased, and I can introduce you as the recipient and next of kin of my deceased client's funds, then you will become his next of kin and claim the funds", "I want you to take 20% of the total money for your personal use, while 80% of the money will go to orphanage building charity home", "I will advise you to keep this transaction secret to yourself alone", "I am contacting you independently of my investigation and no one is informed of this communication", are used. Such a personal attachment affects the recipient through belief in uniqueness and importance.
• Spammers increase the percentage of confidence in the information presented by illustrating their own positive experience or significance: "I was pleasantly surprised to find out that New Zealand's passport had become the fourth most powerful on the planet accord-
ing to the Passport Index of 2021!", "I thought that today I would tell you a few things about the country I live in, the country I love & the country I am very proud of - Australia! "," Let our experienced team of experts help you and your family to explore your options "," I am not afraid of death hence I know where I am going "," This is 100 percent risk-free, and I have all the papers to support the claim", " I am Mr. Dawei, one of the Outside Director of China National Offshore Oil
Most of the spam emails analyzed contain suggestions that are extremely difficult for the average person to perceive. For example, "Your relative deposited the sum of $ 9 million 5 hundred thousand dollars in one of our financial firms", "I want you to stand as beneficiary to the sum of my $ 5.5 Million", "Please, my dear, use this fund valued at $ 10.937.210 Million Dollars", "In 2016, a client of mine Mr. Johns passed away, leaving behind a cash inheritance of 7.5 million US dollars",
have criminal history or origin", "This conference is one of the most highly acclaimed meetings in Child's Rights & Sexual Violence", etc. As can be seen from these examples, the reader is shown the absolute safety of actions proposed in the letter with examples of already existing positive experience, the unconditional status of the organizing company, etc. The most important and strong influencing effect is great in comparison with the amount of investment.
"The bank contacted me to find his next of kin, so that the fund left by him in the amount of 4,211,000 million dollars was not confiscated", " I will also provide you with the contact details where you can get the herbal seeds from India, where you can buy them at the price of $ 982USD per packet and then sell to my company at the price of $ 2,500USD per packet, and trust me my company buys them a lot", etc.
Corp.", " Funds are from private investors and do not
Fig. 1. Frequency of keywords of positive connotation in spam letters
Fig. 2. Frequency of keywords of neutral connotation in spam letters
The contrast is the minimalism of the requirements for receiving such rewards. In most cases, it is limited to either sending the recipient's contact details or a small investment, for example, "Our 2% commission as facilitators/Brokers should be paid immediately", "Meanwhile you are require to send us the registration fee". Sometimes it is proposed to divide the received amount into parts with the person responsible for the operation, which can also be considered as adding a factor of realism of what is happening: "Mode sharing after transferring money to the bank account you is 50%
for me and 50% for you ... If this suggestion complies with your inner desire for success, you are strongly encouraged to respond quickly", "After successful claims of the fund I and you will share the money as follows: 60 to 40%. I guarantee that this will happen under a legitimate arrangement that will protect both of us, as it is 100% risk free for both sides".
"You are required to reply within 72 hours at that point I will walk you through the process of clearing and claiming the money, otherwise your payment will be confiscated by the Federal Bureau of Investigation".
country (38) project (6)
email (24) conference (18)
information (19)
contact (20)
neutral connotation
SPAM / SCAM messages
New Zealand (22)
assessment (6)
visa (19)
positive connotation
inheritance (4)
bank (17) / money (25)
negative connotation
payment (5)
cancer (7)
deceased (9)
investment (11)
sustainable (5) fund (30) financial (6) legal (6)
Fig. 3. A map representing relationships among concepts
Similarly, trust is built by the proposal to use only a smaller part of the funds received for their own purposes, and a larger part for charity: "I want you to take 20% of the total money for your personal use, while 80% of the money will go to a charity fund", "I want to donate this money to support churches and orphanages in your country", "Please, my dear, use this fund valued at $10.937.210 million US dollars to help charities in your country", "it contained a part payment of $410,000 United States Dollar value certified payment bond", etc. In our opinion, that fact that the sender takes care of needy segments of the population, and not just
money
deceased
relation
wealth
company
V. Discussion
Virtual threat and information stress are among major disadvantages of network using. The informational pressure now exerted on people all over the world in connection with the pandemic, is extremely strong; traumatic the nature of the content of information messages deserves additional study. Information space is overflowing with contradictory information about the COVID-19 in various forms: reports, statistics, analytics, gnosis, comments, recommendations, social advertising and so on. Psychological manipulation techniques are the basis of all these messages, true or fraudulent (Akopova, 2013; Amin, 2017 ; Goncharova, 2020; Levina, 2018; Melnichuk, 2019). Quite likely that a careful analysis of the consequences of information stress in the context of a pandemic allows filling this term with a specific psychological and psycho-pathological content. Strict quarantine measures introduced in most countries in relation to the COVID-19 pandemic are unprecedented. Self-isolation requirement and other restrictions to prevent the spread of infections, seriously deformed the habitual way of life of the majority of people, new needs of different levels from basic to the highest are being developed. Without dwelling on the difficulties which gave rise to quarantine norms in life, most people note that the narrowing of the physical space and social activity, with illusory compensation driven by the availability of the Internet, launches systemic adaptive changes in the person's
gives money to one individual, should work as a kind of mechanism for creating an additional positive aura for the whole situation, which can a recipient give a push to actions desired by the fraudsters. Mentioning official organizations of major reputation should also help build the trust. Time pressure is used to make a person take urgent action: "If you do not pay this your package will be returned to sender", "Failure to comply with the requirements may lead to your arrest, interrogation and,/or you being prosecuted in the Court of Law for tax evasion and/or money laundering".
million ==~-bank
transfer
investment
donate
body. Even an elementary change in the physical mental activity and nutrition can have detrimental effect due to lockdown restrictions. And even greater effects are to be expected from blocking individual's multiple social needs and activities. The Internet and E-mail remain the only way of communication people use during the lockdown. However, there is a reason to believe that this strategy is not always effective, and a significant proportion of those staying in self-isolation are people showing signs of adjustment disorders and conditions, borderline between mental norm and pathology. And in this situation spam and scam can be those triggers that give a push to social anxiety, behavioral disorder, depression and even suicides. With the present study we try and reveal peculiarities of spam and its manipulative nature. Spam (in its current use) is an unwanted and unsolicited marketing or advertising email (SMS, messages, phone calls, and commercials). It could be from the most reliable company in the world, but if you do not want it, it is spam. Spam is relatively new, as it only started when emails appeared - this first was 1978, although they were not called spam at that time. Spam is letters without the explicit consent of the recipient, a message that is randomly sent to a large number of people who did not solicit that message. This may be from an advertising company to promote products or services or the workings of a con artist. Spam letters are mostly seen in the internet, and often transmitted
inheritance
charity
Fig. 4. Pairs of co-occurring words from Spam E-mails
through emails. Senders of spam do not know who specifically their recipients are, but they dish out enticing messages en masse, stay back and wait while the ignorance, vulnerability, gullibility and mercy of their victims do the rest of the work. The main goal of a spammer is to make you believe in benefit of a deal. Spamming e-mail is much cheaper and easier than doing the same on paper (although unwanted advertising, leaflets and posts are often found in the mailboxes also). Every day, about 250 billion letters are sent around the world, and almost half of this amount is spam. Letters with offers to lose weight in the shortest possible time, restore mental health, immigrate to some country and make quick money by investing a little money right now are the most popular types of spam. Most articles cited in this research describe legal regulation, technical protection against spam or economic damage caused by spam (Elchaninova, 2008; Nartsissova, 2015; Katasev, et al., 2015;Polin et al., 2019 ; Rao & Reiley, 2012 ). Not very many researchers study stylistic peculiarities of this genre (Loutovinova, 2008). Even fewer pay attention to psychological impact of spam content on mental health of a recipient (Park et al., 2007).
The method used in our research to prove the manipulative nature of spam messages is content analysis (Vaismoradi, Turunen & Bondas, 2013; White & Marsh, 2006; Timmermans & Tavory, 2012; Conway, 2014 ; Denisenko & Chebotareva, 2008 ; Semyonova & Korsunskaya 2010). Content analysis was chosen to be an instrumental tool for the study. Content analysis of the E-mail messages can:
• identify the intentions, focus or communication trends of an individual, group or institution;
• describe attitudinal and behavioral responses to communications;
• determine psychological or emotional state of persons or groups of people;
• reveal international differences in communication content and manipulation no matter how concealed it is;
• reveal patterns in communication content and words that frequently used to deliver a message;
• describe modern trends in communication content;
• analyze texts vocabulary and their persuasive potential to complement quantitative data.
VI. Conclusion
The conclusion that can be made on the basis of the above research is that in the period of the COVID-19 pandemic there is significant population mental health deterioration, in the greatest least for those who are directly affected by the problem of COVID -19 - not only sick patients and doctors involved in the fight against the virus, but all people isolated from the society. On the one hand, the virus is able to directly influence the activity of the central nervous system and thus cause psychosomatic and physiological disorders of emotions, cognitive sphere, consciousness, and, on the other hand, a pandemic poses a risk of widespread psychogenic disorders resulting from an individual's inability to effectively cope with the stress due to lack of socialization and communication. Loneliness is a main
challenge during lockdowns, and people rely on the media more than ever before and become gullible. Negative effects of malfunction of communication digital systems, fraud and spam, fake news and fraudulent schemes and their impact on people's psyche were shown above: spam is considered among serious problems that can just either be annoying or cause really great trouble for network users. But we hope that now, knowing more about spam, people will understand how to relate to this or that type of spam letters and will not waste time or money. Knowing specific features of spam\scam messages, keywords typical for fraud messages recipients can avoid opening junk mail, or if open, would not continue and give away personal information like name, address, phone number, E-mail address and credit card number. People should know if they get interested and trust fraudsters, something awful may happen: they may lose their money or the trojan virus will be loaded on their computer.
This knowledge might keep them safe in the uncertain times of worldwide panic and distress, can help them survive in dangerous situation of isolation, quarantine and information hunger and to spot and identify spam mail if Antispam filter system doesn't work properly.
6. Acknowledgements
The reported study was a part of the RFBR project number 20-04-60485.
References
1. Akopova, 2013 - Akopova A. (2013). Linguistic manipulation: definition and types. International Journal of Cognitive Research in Science, Engineering and Education. 1 (2). 78-82
2. Alston, 2000 - Alston W. (2000). Illocution-ary Acts and Sentence Meaning. Ithaca: Cornell University Press
3. Amin, 2017 - Amin M.Y.M. (2017). Communication Strategies and Gender Differences: A Case Study. International Journal of Humanities and Cultural Studies. 4(3). 226-238
4. Chernyavskaya, 2013 - Chernyavskaya V.E. (2013). Power discourse and discourse power: problems of speech influence: manual. M: Flinta: Nauka. 208 p.
5. Conway, 2014 - Conway A. (2014)."Twenty Years of Spam". Cloudmark. https://www.doud-mark.com/en/blog/twenty-years-spam
6. Denisenko & Chebotareva, 2008 - Denisenko V.N., Chebotareva E. Y. (2008). Modern psycholin-guistic methods of analysis of speech communication: a textbook. - M.: RUDN. 258 p.
7. Elchaninova, 2008 - Elchaninova N.B. (2008) Legal methods of spam fighting. News of SFEDU. Technical sciences. Special Issue. 138-143
8. Fenina, 2017 - Fenina V. V. (2017). Peculiarities of verbal manipulation techniques in spam E-mails. Language and Culture. 37. 97-114
9. Geric & Hutinski, 2007 - Geric S. & Hutinski Z. (2007). Information system security threats classifications. Journal of Information and Organizational Sciences. 31(1). 51-61
10. Goncharova, 2020 - Goncharova V.A. (2020). Verbal Manipulation In The Context Of Teaching Intercultural Foreign Language Communication. Conference: Dialogue of Cultures - Culture of Dialogue: from Conflicting to Understanding. European Proceedings of Social and Behavioural Sciences. 176-183
11. Green, Mitchell, 2017 - Green M. (2017). Zalta, Edward N. (ed.). "Speech Acts". The Stanford Encyclopedia of Philosophy
12. Gupta A. et al., 2015 - Gupta A. et al. (2015)."Improving spam detection in Online Social Networks". 2015 International Conference on Cognitive Computing and Information Processing (CCIP). www.ieee.org. IEEE. pp. 1-6. doi:10.1109/CCIP.2015.7100738.
13. Holsti, 1968 - Holsti R. (1968). Content analysis. Handbook of Social Psychology, 2-nd ed. Vol. 2, ed. By Zindzey Y., Aronson E. 596-692
14. Katasev, et al., 2015 - Katasev A.S., Kataseva D. V., Kirpichnikov A. P., Semyonov Y. E. (2015). Spam filtering of E-mail messages based on neural networks and neural fuzzy models. Technological University Bulletin. 18 (15). 217-220
15. Levina, 2018 - Levina O.M. (2018). Speech manipulation in the context of intercultural foreign language education: interpretation of the concept. Philological sciences. Questions of theory and practice. Tambov: Diploma. 7 (85). Part 2. 429-429
16. Loutovinova, 2008 - Loutovinova O.V. (2008). Spam as a variety of e-mail genre. Herald of TSU. 1(57). 189-194
17. Makarova, Makarova, Mishchenko, 2021-Makarova E.A., Makarova E.L., Mishchenko V.I. (2021). Phenomena of Loneliness and Fear Caused by the Mass Media Threat in the Situation of COVID-19 Pandemic. International Journal of Media and Information Literacy. 6(1). 151-160
18. Melnichuk, 2019 - Melnichuk, M. V. (2019). Means of verbal manipulation in advertising discourse of financial companies. Gumanitarnye Nauki. Vestnik
Finansovogo Universiteta = Humanities and Social Sciences. Bulletin of the Financial University. 9(6). 111115
19. Nartsissova, 2015 - Nartsissova S.Y. (2015) Psychology of argumentation in legal decisions and opinions about interaction in cyberspace: monograph / S.Y. Nartsissova. - M.: Publishing house "MNEPU Academy". 207p.
20. Park et al., 2007 - Park, I., Sharman R., Rao H.R. & Upadhyaya S. (2007). The Effect of Spam and Privacy Concerns on E-mail Users' Behavior. Journal of Information System Security. 3(1). 37-61
21. Polin et al., 2019 - Polin Ya. et al., (2019). Types of Spam. In the book:Fundamentals of Innovative Development in Education. Penza, p. 246-253
22. Rao & Reiley, 2012 - Rao, J. and Reiley, D. (2012). The economics of spam. Journal of Economic Perspectives. 26(3). 87-110
23. Semyonova & Korsunskaya 2010 - Se-myonova A.V., Korsunskaya M.V. (2010). Content analysis of the media: problems and experience of application / Ed. V. A. Mansurov. - M.: Institute of Sociology RAS, 2010. 324 p.
24. Shu et al., 2020 - Shu K., Hassan A., Dumais S., Liu H. (2020). Detecting Fake News with Weak Social Supervision. Intelligent Systems, IEEE.PP(99).1-1
25. Timmermans & Tavory, 2012 - Timmermans, S., Tavory, I. (2012). Theory Construction in Qualitative Research. Sociological Theory. 30 (3). 167-186
26. Vaismoradi, Turunen & Bondas, 2013 - Vais-moradi, M., Turunen, H., Bondas, T. (2013). Content analysis and thematic analysis: Implications for conducting a qualitative descriptive study. Nursing & Health Sciences. 15 (3). 398-405
27. Whelan & Maitre, 2013 - Whelan. C.T. & Maitre B. (2013). Material Deprivation, Economic Stress and Reference Groups in Europe: An Analysis of EU-SILC2009. European Sociological Review. 29(6). 1162-1174
28. White & Marsh, 2006 - White, M.D.; Marsh, E.E. (2006). Content Analysis: A Flexible Methodology. Library Trends. 55 (1). 22-45