Open Access

Social Media-Related Cybercrimes and Techniques for Their Prevention


Cite

[1] N. Thabet and T. R. Soomro, “Big Data Challenges,” Journal of Computer Engineering & Information Technology, vol. 4, no. 3, 2015. https://doi.org/10.4172/2324-9307.100013310.4172/2324-9307.1000133Search in Google Scholar

[2] Internetlivestats.com, “Internet Users,” Internet Live Stats, 2019.Search in Google Scholar

[3] S. Inc., “Number of social media users worldwide from 2010 to 2021 (in billions),” Statista: The Statistics Portal, New York, 2019.Search in Google Scholar

[4] T. R. Soomro and H. Wahba, “Perspectives of Cloud Computing: An Overview,” Proceedings 14th International Business Information Management Association (IBIMA) Conference on Global Business Transformation through Innovation and Knowledge Management, Istanbul, 2010.Search in Google Scholar

[5] M. Yar, Cybercrime and Society. SAGE, 2016.Search in Google Scholar

[6] R. Broadhurst, “Developments in the globallLaw enforcement of cybercrime,” Policing: An International Journal of Police Strategies and Management, vol. 29, no. 3, pp. 408–433, 2006. https://doi.org/10.1108/1363951061068467410.1108/13639510610684674Search in Google Scholar

[7] “Social Media Use in Law Enforcement: Crime prevention and investigative activities,” LexisNexis, 2014.Search in Google Scholar

[8] J. Blomberg, “Fighting Crime Through Social Media and Social Network Analysis,” SAS, 2012.Search in Google Scholar

[9] NW3C, “Criminal Use of Social Media (2013),” NW3C, 2013.Search in Google Scholar

[10] BBC News, “Kim Kardashian robbery: How do you sell high-profile diamonds?,” Ocober 4, 2016.Search in Google Scholar

[11] Symantec, “What is social engineering?,” Symantec Corporation, 2015.Search in Google Scholar

[12] M. Sauter, “Nine Major Ways Criminals Use Facebook,” Fox Business, 2012.Search in Google Scholar

[13] B. Nahorney, “Internet Security Threat Report (2017),” ISTR, 2017.Search in Google Scholar

[14] Symantec, “Internet Security Threat Report,” Symantec Corporation, 2019.Search in Google Scholar

[15] M. Dadkhah, M. Lagzian and G. Borchardt, “Identity Theft in the Academic World Leads to Junk,” Science and Engineering Ethics, vol. 24, no. 1, pp. 287–290, 2018. https://doi.org/10.1007/s11948-016-9867-x10.1007/s11948-016-9867-xSearch in Google Scholar

[16] S. Irshad and T. R. Soomro, “Identity Theft and Social Media,” International Journal of Computer Science and Network Security, vol. 18, no. 1, pp. 43–55, 2018.Search in Google Scholar

[17] FBI, “Internet Crime Report (2016),” Internet Crime Complaint Center, 2016.Search in Google Scholar

[18] FBI, “Internet Crime Report (2017),” Internet Crime Complaint Center, 2017.Search in Google Scholar

[19] FTC, “FTC Releases Annual Summary of Consumer Complaints (2017),” FTC, 2017.Search in Google Scholar

[20] F. T. Commission, “Consumer Sentinel Network Data Book 2017,” Consumer Sentinel Network, 2018.Search in Google Scholar

[21] F. T. Commission, “Consumer Sentinel Network Data Book 2018,” Commission, Federal Trade, 2019.Search in Google Scholar

[22] NW3C, “Cyberstalking (March 2015),” NW3C, 2015.Search in Google Scholar

[23] A. A. Moore, “Cyberstalking and Women: Facts and Statistics,” thoughtco.com, 2018.Search in Google Scholar

[24] Bureau Of Justice Statistics, “Stalking”. [Online]. Available from: https://www.bjs.gov/index.cfm?ty=tp&tid=973Search in Google Scholar

[25] M. Duggan, “Online Harassment 2017,” Pew Research Center, 11 July 2017. [Online]. Available: http://www.pewinternet.org/2017/07/11/online-harassment-2017/. [Accessed 16 March 2019].Search in Google Scholar

[26] P. Saariluoma and H. Sacha, “How cyber breeds crime and criminals,” The Society of Digital Information and Wireless Communications (SDIWC), 2014.Search in Google Scholar

[27] NW3C, “Credit Card Fraud (2017),” NW33, 2017.Search in Google Scholar

[28] FTC, “Consumer Sentinel Newtork Data Book 2016,” Consumer Sentinel Newtork, 2017.Search in Google Scholar

[29] NW3C, “Cyber Intrusion and Data Breaches 2017,” NW3C, 2017.Search in Google Scholar

[30] A. Kaphle, “These are the 5 members of the Chinese military charged with cyber-espionage,” The Washington Post, 2014.Search in Google Scholar

[31] J. Lyne, “14 Year Olds Hack ATM In Lunch Hour - How It Happened,” Forbes, 2014.Search in Google Scholar

[32] L. Harding, “What we know about Russia’s interference in the US election,” The Guardian, 2016.Search in Google Scholar

[33] I. B. M. (IBM), “2018 Cost of a Data Breach Study: Global Overview,” International Business Machines (IBM).Search in Google Scholar

[34] NW3C, “Disaster Fraud 2017,” NW3C, 2017.10.1016/S1361-3723(17)30104-5Search in Google Scholar

[35] R. Surette, “How social media is changing the way people commit crimes and police fight them,” LSE, 2016.Search in Google Scholar

[36] A. McGovern and S. Milivojevic, “Social media and crime: the good, the bad and the ugly,” University of New South Walse, Sydney, 2016.Search in Google Scholar

[37] S. Schneider, “Hoffman Estates family turns to Facebook to help identify home burglars,” Fox 32 Chicago, 2016.Search in Google Scholar

[38] J. Crump, “What Are the Police Doing on Twitter? Social Media, the Police and the Public,” Policy& Internet, vol. 3, no. 4, 2011. https://doi.org/10.2202/1944-2866.113010.2202/1944-2866.1130Search in Google Scholar

[39] G. R. Weir, F. Toolan and D. Smeed, “The threats of social networking: Old wine in new bottles?,” Information Security Technical Report, vol. 16, no. 2, pp. 38–43, 2011. https://doi.org/10.1016/j.istr.2011.09.00810.1016/j.istr.2011.09.008Search in Google Scholar

[40] R. D’Amore, “Toronto police tap into power of social media to catch city’s most wanted criminals,” CTV News Toronto, 2018.Search in Google Scholar

[41] C. Rose, “The Security Implications Of Ubiquitous Social,” International Journal of Management & Information Systems (IJMIS), vol. 15, no. 1, 2011. https://doi.org/10.19030/ijmis.v15i1.159310.19030/ijmis.v15i1.1593Search in Google Scholar

[42] M. Rajab, “An anti-phishing method based on feature analysis,” Proc. The 2nd International Conference on Machine Learning and Soft Computing, pp. 133–139, Vietnam, 2018. https://doi.org/10.1145/3184066.318408210.1145/3184066.3184082Search in Google Scholar

[43] L. J. Singh and N. Imphal, “A Survey on Phishing and Anti-Phishing Techniques,” International Journal of Computer Science Trends and Technology (IJCST), vol. 6, no. 2, pp. 62–68, 2018.Search in Google Scholar

[44] K. Thakur, J. Shan and A.-S. K. Pathan, “Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies,” International Journal of Communication Networks and Information Security (IJCNIS), vol. 10, no. 1, pp. 19–27, 2018.Search in Google Scholar

[45] Kaspersky, “Learn about malware and how to protect all your devices against it,” Kaspersky. [Online]. Available: https://www.kaspersky.com/resource-center/preemptive-safety/what-ismalware-and-how-to-protect-against-it. [Accessed 15 July 2018].Search in Google Scholar

[46] D. He, S. Chan and M. Guizani, “Mobile application security: malware threats and defenses,” IEEE Wireless Communications, vol. 22, no. 1, pp. 138–144, 2015. https://doi.org/10.1109/MWC.2015.705472910.1109/MWC.2015.7054729Search in Google Scholar

[47] W. Wang, Y. Yuan and N. Archer, “A contextual framework for combating identity theft,” IEEE Security & Privacy, vol. 4, no. 2, pp. 30–38, 2006. https://doi.org/10.1109/MSP.2006.3110.1109/MSP.2006.31Search in Google Scholar

[48] A. Hedayati, “An analysis of identity theft: Motives, related frauds, techniques and prevention,” Journal of Law and Conflict Resolution, vol. 4, no. 1, 2012.Search in Google Scholar

[49] Matt, “6 Ways to Avoid Becoming a Cyberstalking Victim,” NAI, 2017.Search in Google Scholar

[50] S. Symanovich, Norton Security Center, “Cyberstalking: Help protect yourself against cyberstalkers,”, Retrieved February 2019.Search in Google Scholar

[51] A. Merton-McCann, “Cybercasing – How Sharing Your Pics, Videos and Status Updates Can Get You Into Trouble”, McAfee, 2013.Search in Google Scholar

[52] G. Friedland and R. Sommer, “Cybercasing the joint: on the privacy implications of geo-tagging,” in HotSec’10 Proceedings of the 5th USENIX conference on Hot topics in security, Washinton, DC, 2010.Search in Google Scholar

[53] P. H. Tran, et al., “Real Time Data-Driven Approaches for Credit Card Fraud Detection,” in Proceedings of the 2018 International Conference on E-Business and Applications, pp. 6–9, Vietnam, 2018. https://doi.org/10.1145/3194188.319419610.1145/3194188.3194196Search in Google Scholar

[54] J. T. S. Quah and M. Sriganesh, “Real-time credit card fraud detection using computational intelligence,” Expert Systems with Applications: An International Journal, vol. 35, no. 4, pp. 1721–1732, 2008. https://doi.org/10.1016/j.eswa.2007.08.09310.1016/j.eswa.2007.08.093Search in Google Scholar

[55] C. Dhasarathan, V. Thirumal and D. Ponnurangam, “Data privacy breach prevention framework for the cloud service,” Security and Communication Networks, vol. 8, no. 6, 2014. https://doi.org/10.1002/sec.105410.1002/sec.1054Search in Google Scholar

[56] R. G. Brody and V. J. Kimball, “Natural catastrophe and disaster fraud,” Fraud Magazine, 2006.Search in Google Scholar

[57] A. J. A. AGENCIES, “Timeline: Egypt’s revolution,” Al Jazeera, 2011.Search in Google Scholar

[58] M. Kramer, “The Astronauts You Should Start Following on Twitter,” National Geographic, 2013.Search in Google Scholar

[59] C. Syme, “How to Use Social Media to Gather Valuable Marketing Data,” Social Media today, 2014.Search in Google Scholar

[60] K. Collins, “Government pays companies to monitor you on social media,” Wired, 2015.Search in Google Scholar

[61] M. L. Williams, B. Pete and L. Sloan, “Crime Sensing With Big Data: The Affordances and Limitations of Using Open-source Communications to Estimate Crime Patterns,” The British Journal of Criminology, vol. 57, no. 2, pp. 320–340, 2016. https://doi.org/10.1093/bjc/azw03110.1093/bjc/azw031Search in Google Scholar

[62] D. M. M. Alghamdi, “A Data Mining Based Approach for Burglary Crime Rate Prediction,” University of Illinos, Chicago, Chicago, 2017.Search in Google Scholar

[63] R. W. Adderley, “The Use Of Data Mining Techniques In Crime Trend Analysis And Offender Profiling,” University of Wolverhampton, Wolverhampton, 2007.Search in Google Scholar

[64] M. Al-diabat, “Detection and Prediction of Phishing Websites using Classification Mining Techniques,” International Journal of Computer Applications, vol. 147, no. 5, pp. 5–11, August 2016. https://doi.org/10.5120/ijca201691106110.5120/ijca2016911061Search in Google Scholar

[65] P. Akansha and E. Meenakshi, “Detection of phishing websites using C4.5 data mining algorithm,” in 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, 2017.Search in Google Scholar

[66] Y. Ye, T. Li, D. Adjeroh and S. S. Iyengar, “A Survey on Malware Detection Using Data Mining Techniques,” ACM Computing Surveys (CSUR), vol. 50, no. 3, October 2017. https://doi.org/10.1145/307355910.1145/3073559Search in Google Scholar

[67] M. Siddiqui, “Data Mining Methods For Malware Detection,” University of Central Florida, 2008.Search in Google Scholar

[68] C. Phua, K. Smith-Miles, V. Lee, and R. Gayler, “Resilient Identity Crime Detection,” IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 3, pp. 533–546, January 2010. https://doi.org/10.1109/TKDE.2010.26210.1109/TKDE.2010.262Search in Google Scholar

[69] A. Kshirsagar and L. Dole, “A Review On Data Mining Methods For Identity,” International Journal of Electrical, Electronics and Computer Systems (IJEECS), vol. 2, no. 1, 2014.Search in Google Scholar

[70] C. Lekha and S. Prakasam, “Implementation Of Data Mining Techniques For Cyber Crime Detection,” International Journal of Engineering, Science and Mathematics, vol. 7, no. 4, January 2018.Search in Google Scholar

[71] X. Feng, A. Asante, E. Short and I. Abeykoon, “Cyberstalking Issues,” in 2017 IEEE 15th Intl. Conf. on Dependable, Autonomic and Secure Computing, 15th Intl. Conf. on Pervasive Intelligence and Computing, 3rd Intl. Conf. on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), Orlando, FL, 2017, pp. 373–376. https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.7810.1109/DASC-PICom-DataCom-CyberSciTec.2017.78Search in Google Scholar

[72] E. Spyrou and P. Mylonas, “A Survey of Geo-tagged Multimedia Content,” in IFIP International Conference on Artificial Intelligence Applications and Innovations, Paphos, pp. 126–135, 2014. https://doi.org/10.1007/978-3-662-44722-2_1410.1007/978-3-662-44722-2_14Search in Google Scholar

[73] G. Suresh and R. J. Raj, “A Study on Credit Card Fraud Detection using Data Mining Techniques,” International Journal of Data Mining Techniques and Applications, vol. 7, no. 1, pp. 21–24, June 2018.10.20894/IJDMTA.102.007.001.004Search in Google Scholar

[74] X. Li, J. Chen, Z. Lin, L. Zhang, Z. Wang, M. Zhou and W. Xie, “A Mining Approach to Obtain the Software Vulnerability Characteristics,” in Fifth International Conference on Advanced Cloud and Big Data (CBD), Shanghai, 2017. https://doi.org/10.1109/CBD.2017.5810.1109/CBD.2017.58Search in Google Scholar

[75] B. Gadidov and L. Le, “A Case Study of Mining Social Media Data for Disaster Relief: Hurricane Irma,” in SAS Global Forum, 2018.Search in Google Scholar

eISSN:
2255-8691
Language:
English