Social Media-Related Cybercrimes and Techniques for Their Prevention

Open access

Abstract

Since a past decade, social media networking has become an essential part of everyone’s life affecting cultural, economic and social life of the people. According to internetlivestats.com, in March 2019 the Internet users reached 4 168 461 500, i.e., 50.08 % penetration of world population. According to Statista, in 2019 there are 2.22 billion social media networking users worldwide, i.e., 31 % of global social media networking penetration and it is expected that in 2021 this number will reach 3.02 billion. These social networking sites are attracting users from all walks of life and keeping these users’ data in the cloud. Today’s big challenge is related to an increase in volume, velocity, variety and veracity of data in social media networking, and this leads to creating several concerns, including privacy and security; on the other hand, it also proves as a tool to prevent and investigate cybercrime, if intelligently and smartly handled. The law enforcement agencies are putting their utmost efforts to prevent cybercrime by monitoring communications activities over the Internet. In this paper, the authors discuss recommendations and techniques for preventing cybercrime.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] N. Thabet and T. R. Soomro “Big Data Challenges” Journal of Computer Engineering & Information Technology vol. 4 no. 3 2015. https://doi.org/10.4172/2324-9307.1000133

  • [2] Internetlivestats.com “Internet Users” Internet Live Stats 2019.

  • [3] S. Inc. “Number of social media users worldwide from 2010 to 2021 (in billions)” Statista: The Statistics Portal New York 2019.

  • [4] T. R. Soomro and H. Wahba “Perspectives of Cloud Computing: An Overview” Proceedings 14th International Business Information Management Association (IBIMA) Conference on Global Business Transformation through Innovation and Knowledge Management Istanbul 2010.

  • [5] M. Yar Cybercrime and Society. SAGE 2016.

  • [6] R. Broadhurst “Developments in the globallLaw enforcement of cybercrime” Policing: An International Journal of Police Strategies and Management vol. 29 no. 3 pp. 408–433 2006. https://doi.org/10.1108/13639510610684674

  • [7] “Social Media Use in Law Enforcement: Crime prevention and investigative activities” LexisNexis 2014.

  • [8] J. Blomberg “Fighting Crime Through Social Media and Social Network Analysis” SAS 2012.

  • [9] NW3C “Criminal Use of Social Media (2013)” NW3C 2013.

  • [10] BBC News “Kim Kardashian robbery: How do you sell high-profile diamonds?” Ocober 4 2016.

  • [11] Symantec “What is social engineering?” Symantec Corporation 2015.

  • [12] M. Sauter “Nine Major Ways Criminals Use Facebook” Fox Business 2012.

  • [13] B. Nahorney “Internet Security Threat Report (2017)” ISTR 2017.

  • [14] Symantec “Internet Security Threat Report” Symantec Corporation 2019.

  • [15] M. Dadkhah M. Lagzian and G. Borchardt “Identity Theft in the Academic World Leads to Junk” Science and Engineering Ethics vol. 24 no. 1 pp. 287–290 2018. https://doi.org/10.1007/s11948-016-9867-x

  • [16] S. Irshad and T. R. Soomro “Identity Theft and Social Media” International Journal of Computer Science and Network Security vol. 18 no. 1 pp. 43–55 2018.

  • [17] FBI “Internet Crime Report (2016)” Internet Crime Complaint Center 2016.

  • [18] FBI “Internet Crime Report (2017)” Internet Crime Complaint Center 2017.

  • [19] FTC “FTC Releases Annual Summary of Consumer Complaints (2017)” FTC 2017.

  • [20] F. T. Commission “Consumer Sentinel Network Data Book 2017” Consumer Sentinel Network 2018.

  • [21] F. T. Commission “Consumer Sentinel Network Data Book 2018” Commission Federal Trade 2019.

  • [22] NW3C “Cyberstalking (March 2015)” NW3C 2015.

  • [23] A. A. Moore “Cyberstalking and Women: Facts and Statistics” thoughtco.com 2018.

  • [24] Bureau Of Justice Statistics “Stalking”. [Online]. Available from: https://www.bjs.gov/index.cfm?ty=tp&tid=973

  • [25] M. Duggan “Online Harassment 2017” Pew Research Center 11 July 2017. [Online]. Available: http://www.pewinternet.org/2017/07/11/online-harassment-2017/. [Accessed 16 March 2019].

  • [26] P. Saariluoma and H. Sacha “How cyber breeds crime and criminals” The Society of Digital Information and Wireless Communications (SDIWC) 2014.

  • [27] NW3C “Credit Card Fraud (2017)” NW33 2017.

  • [28] FTC “Consumer Sentinel Newtork Data Book 2016” Consumer Sentinel Newtork 2017.

  • [29] NW3C “Cyber Intrusion and Data Breaches 2017” NW3C 2017.

  • [30] A. Kaphle “These are the 5 members of the Chinese military charged with cyber-espionage” The Washington Post 2014.

  • [31] J. Lyne “14 Year Olds Hack ATM In Lunch Hour - How It Happened” Forbes 2014.

  • [32] L. Harding “What we know about Russia’s interference in the US election” The Guardian 2016.

  • [33] I. B. M. (IBM) “2018 Cost of a Data Breach Study: Global Overview” International Business Machines (IBM).

  • [34] NW3C “Disaster Fraud 2017” NW3C 2017.

  • [35] R. Surette “How social media is changing the way people commit crimes and police fight them” LSE 2016.

  • [36] A. McGovern and S. Milivojevic “Social media and crime: the good the bad and the ugly” University of New South Walse Sydney 2016.

  • [37] S. Schneider “Hoffman Estates family turns to Facebook to help identify home burglars” Fox 32 Chicago 2016.

  • [38] J. Crump “What Are the Police Doing on Twitter? Social Media the Police and the Public” Policy& Internet vol. 3 no. 4 2011. https://doi.org/10.2202/1944-2866.1130

  • [39] G. R. Weir F. Toolan and D. Smeed “The threats of social networking: Old wine in new bottles?” Information Security Technical Report vol. 16 no. 2 pp. 38–43 2011. https://doi.org/10.1016/j.istr.2011.09.008

  • [40] R. D’Amore “Toronto police tap into power of social media to catch city’s most wanted criminals” CTV News Toronto 2018.

  • [41] C. Rose “The Security Implications Of Ubiquitous Social” International Journal of Management & Information Systems (IJMIS) vol. 15 no. 1 2011. https://doi.org/10.19030/ijmis.v15i1.1593

  • [42] M. Rajab “An anti-phishing method based on feature analysis” Proc. The 2nd International Conference on Machine Learning and Soft Computing pp. 133–139 Vietnam 2018. https://doi.org/10.1145/3184066.3184082

  • [43] L. J. Singh and N. Imphal “A Survey on Phishing and Anti-Phishing Techniques” International Journal of Computer Science Trends and Technology (IJCST) vol. 6 no. 2 pp. 62–68 2018.

  • [44] K. Thakur J. Shan and A.-S. K. Pathan “Innovations of Phishing Defense: The Mechanism Measurement and Defense Strategies” International Journal of Communication Networks and Information Security (IJCNIS) vol. 10 no. 1 pp. 19–27 2018.

  • [45] Kaspersky “Learn about malware and how to protect all your devices against it” Kaspersky. [Online]. Available: https://www.kaspersky.com/resource-center/preemptive-safety/what-ismalware-and-how-to-protect-against-it. [Accessed 15 July 2018].

  • [46] D. He S. Chan and M. Guizani “Mobile application security: malware threats and defenses” IEEE Wireless Communications vol. 22 no. 1 pp. 138–144 2015. https://doi.org/10.1109/MWC.2015.7054729

  • [47] W. Wang Y. Yuan and N. Archer “A contextual framework for combating identity theft” IEEE Security & Privacy vol. 4 no. 2 pp. 30–38 2006. https://doi.org/10.1109/MSP.2006.31

  • [48] A. Hedayati “An analysis of identity theft: Motives related frauds techniques and prevention” Journal of Law and Conflict Resolution vol. 4 no. 1 2012.

  • [49] Matt “6 Ways to Avoid Becoming a Cyberstalking Victim” NAI 2017.

  • [50] S. Symanovich Norton Security Center “Cyberstalking: Help protect yourself against cyberstalkers” Retrieved February 2019.

  • [51] A. Merton-McCann “Cybercasing – How Sharing Your Pics Videos and Status Updates Can Get You Into Trouble” McAfee 2013.

  • [52] G. Friedland and R. Sommer “Cybercasing the joint: on the privacy implications of geo-tagging” in HotSec’10 Proceedings of the 5th USENIX conference on Hot topics in security Washinton DC 2010.

  • [53] P. H. Tran et al. “Real Time Data-Driven Approaches for Credit Card Fraud Detection” in Proceedings of the 2018 International Conference on E-Business and Applications pp. 6–9 Vietnam 2018. https://doi.org/10.1145/3194188.3194196

  • [54] J. T. S. Quah and M. Sriganesh “Real-time credit card fraud detection using computational intelligence” Expert Systems with Applications: An International Journal vol. 35 no. 4 pp. 1721–1732 2008. https://doi.org/10.1016/j.eswa.2007.08.093

  • [55] C. Dhasarathan V. Thirumal and D. Ponnurangam “Data privacy breach prevention framework for the cloud service” Security and Communication Networks vol. 8 no. 6 2014. https://doi.org/10.1002/sec.1054

  • [56] R. G. Brody and V. J. Kimball “Natural catastrophe and disaster fraud” Fraud Magazine 2006.

  • [57] A. J. A. AGENCIES “Timeline: Egypt’s revolution” Al Jazeera 2011.

  • [58] M. Kramer “The Astronauts You Should Start Following on Twitter” National Geographic 2013.

  • [59] C. Syme “How to Use Social Media to Gather Valuable Marketing Data” Social Media today 2014.

  • [60] K. Collins “Government pays companies to monitor you on social media” Wired 2015.

  • [61] M. L. Williams B. Pete and L. Sloan “Crime Sensing With Big Data: The Affordances and Limitations of Using Open-source Communications to Estimate Crime Patterns” The British Journal of Criminology vol. 57 no. 2 pp. 320–340 2016. https://doi.org/10.1093/bjc/azw031

  • [62] D. M. M. Alghamdi “A Data Mining Based Approach for Burglary Crime Rate Prediction” University of Illinos Chicago Chicago 2017.

  • [63] R. W. Adderley “The Use Of Data Mining Techniques In Crime Trend Analysis And Offender Profiling” University of Wolverhampton Wolverhampton 2007.

  • [64] M. Al-diabat “Detection and Prediction of Phishing Websites using Classification Mining Techniques” International Journal of Computer Applications vol. 147 no. 5 pp. 5–11 August 2016. https://doi.org/10.5120/ijca2016911061

  • [65] P. Akansha and E. Meenakshi “Detection of phishing websites using C4.5 data mining algorithm” in 2017 2nd IEEE International Conference on Recent Trends in Electronics Information & Communication Technology (RTEICT) Bangalore 2017.

  • [66] Y. Ye T. Li D. Adjeroh and S. S. Iyengar “A Survey on Malware Detection Using Data Mining Techniques” ACM Computing Surveys (CSUR) vol. 50 no. 3 October 2017. https://doi.org/10.1145/3073559

  • [67] M. Siddiqui “Data Mining Methods For Malware Detection” University of Central Florida 2008.

  • [68] C. Phua K. Smith-Miles V. Lee and R. Gayler “Resilient Identity Crime Detection” IEEE Transactions on Knowledge and Data Engineering vol. 24 no. 3 pp. 533–546 January 2010. https://doi.org/10.1109/TKDE.2010.262

  • [69] A. Kshirsagar and L. Dole “A Review On Data Mining Methods For Identity” International Journal of Electrical Electronics and Computer Systems (IJEECS) vol. 2 no. 1 2014.

  • [70] C. Lekha and S. Prakasam “Implementation Of Data Mining Techniques For Cyber Crime Detection” International Journal of Engineering Science and Mathematics vol. 7 no. 4 January 2018.

  • [71] X. Feng A. Asante E. Short and I. Abeykoon “Cyberstalking Issues” in 2017 IEEE 15th Intl. Conf. on Dependable Autonomic and Secure Computing 15th Intl. Conf. on Pervasive Intelligence and Computing 3rd Intl. Conf. on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech) Orlando FL 2017 pp. 373–376. https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.78

  • [72] E. Spyrou and P. Mylonas “A Survey of Geo-tagged Multimedia Content” in IFIP International Conference on Artificial Intelligence Applications and Innovations Paphos pp. 126–135 2014. https://doi.org/10.1007/978-3-662-44722-2_14

  • [73] G. Suresh and R. J. Raj “A Study on Credit Card Fraud Detection using Data Mining Techniques” International Journal of Data Mining Techniques and Applications vol. 7 no. 1 pp. 21–24 June 2018.

  • [74] X. Li J. Chen Z. Lin L. Zhang Z. Wang M. Zhou and W. Xie “A Mining Approach to Obtain the Software Vulnerability Characteristics” in Fifth International Conference on Advanced Cloud and Big Data (CBD) Shanghai 2017. https://doi.org/10.1109/CBD.2017.58

  • [75] B. Gadidov and L. Le “A Case Study of Mining Social Media Data for Disaster Relief: Hurricane Irma” in SAS Global Forum 2018.

Search
Journal information
Metrics
All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 1163 1163 95
PDF Downloads 1219 1219 238