Social Media-Related Cybercrimes and Techniques for Their Prevention

Abstract

Since a past decade, social media networking has become an essential part of everyone’s life affecting cultural, economic and social life of the people. According to internetlivestats.com, in March 2019 the Internet users reached 4 168 461 500, i.e., 50.08 % penetration of world population. According to Statista, in 2019 there are 2.22 billion social media networking users worldwide, i.e., 31 % of global social media networking penetration and it is expected that in 2021 this number will reach 3.02 billion. These social networking sites are attracting users from all walks of life and keeping these users’ data in the cloud. Today’s big challenge is related to an increase in volume, velocity, variety and veracity of data in social media networking, and this leads to creating several concerns, including privacy and security; on the other hand, it also proves as a tool to prevent and investigate cybercrime, if intelligently and smartly handled. The law enforcement agencies are putting their utmost efforts to prevent cybercrime by monitoring communications activities over the Internet. In this paper, the authors discuss recommendations and techniques for preventing cybercrime.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] N. Thabet and T. R. Soomro, “Big Data Challenges,” Journal of Computer Engineering & Information Technology, vol. 4, no. 3, 2015. https://doi.org/10.4172/2324-9307.1000133

  • [2] Internetlivestats.com, “Internet Users,” Internet Live Stats, 2019.

  • [3] S. Inc., “Number of social media users worldwide from 2010 to 2021 (in billions),” Statista: The Statistics Portal, New York, 2019.

  • [4] T. R. Soomro and H. Wahba, “Perspectives of Cloud Computing: An Overview,” Proceedings 14th International Business Information Management Association (IBIMA) Conference on Global Business Transformation through Innovation and Knowledge Management, Istanbul, 2010.

  • [5] M. Yar, Cybercrime and Society. SAGE, 2016.

  • [6] R. Broadhurst, “Developments in the globallLaw enforcement of cybercrime,” Policing: An International Journal of Police Strategies and Management, vol. 29, no. 3, pp. 408–433, 2006. https://doi.org/10.1108/13639510610684674

  • [7] “Social Media Use in Law Enforcement: Crime prevention and investigative activities,” LexisNexis, 2014.

  • [8] J. Blomberg, “Fighting Crime Through Social Media and Social Network Analysis,” SAS, 2012.

  • [9] NW3C, “Criminal Use of Social Media (2013),” NW3C, 2013.

  • [10] BBC News, “Kim Kardashian robbery: How do you sell high-profile diamonds?,” Ocober 4, 2016.

  • [11] Symantec, “What is social engineering?,” Symantec Corporation, 2015.

  • [12] M. Sauter, “Nine Major Ways Criminals Use Facebook,” Fox Business, 2012.

  • [13] B. Nahorney, “Internet Security Threat Report (2017),” ISTR, 2017.

  • [14] Symantec, “Internet Security Threat Report,” Symantec Corporation, 2019.

  • [15] M. Dadkhah, M. Lagzian and G. Borchardt, “Identity Theft in the Academic World Leads to Junk,” Science and Engineering Ethics, vol. 24, no. 1, pp. 287–290, 2018. https://doi.org/10.1007/s11948-016-9867-x

  • [16] S. Irshad and T. R. Soomro, “Identity Theft and Social Media,” International Journal of Computer Science and Network Security, vol. 18, no. 1, pp. 43–55, 2018.

  • [17] FBI, “Internet Crime Report (2016),” Internet Crime Complaint Center, 2016.

  • [18] FBI, “Internet Crime Report (2017),” Internet Crime Complaint Center, 2017.

  • [19] FTC, “FTC Releases Annual Summary of Consumer Complaints (2017),” FTC, 2017.

  • [20] F. T. Commission, “Consumer Sentinel Network Data Book 2017,” Consumer Sentinel Network, 2018.

  • [21] F. T. Commission, “Consumer Sentinel Network Data Book 2018,” Commission, Federal Trade, 2019.

  • [22] NW3C, “Cyberstalking (March 2015),” NW3C, 2015.

  • [23] A. A. Moore, “Cyberstalking and Women: Facts and Statistics,” thoughtco.com, 2018.

  • [24] Bureau Of Justice Statistics, “Stalking”. [Online]. Available from: https://www.bjs.gov/index.cfm?ty=tp&tid=973

  • [25] M. Duggan, “Online Harassment 2017,” Pew Research Center, 11 July 2017. [Online]. Available: http://www.pewinternet.org/2017/07/11/online-harassment-2017/. [Accessed 16 March 2019].

  • [26] P. Saariluoma and H. Sacha, “How cyber breeds crime and criminals,” The Society of Digital Information and Wireless Communications (SDIWC), 2014.

  • [27] NW3C, “Credit Card Fraud (2017),” NW33, 2017.

  • [28] FTC, “Consumer Sentinel Newtork Data Book 2016,” Consumer Sentinel Newtork, 2017.

  • [29] NW3C, “Cyber Intrusion and Data Breaches 2017,” NW3C, 2017.

  • [30] A. Kaphle, “These are the 5 members of the Chinese military charged with cyber-espionage,” The Washington Post, 2014.

  • [31] J. Lyne, “14 Year Olds Hack ATM In Lunch Hour - How It Happened,” Forbes, 2014.

  • [32] L. Harding, “What we know about Russia’s interference in the US election,” The Guardian, 2016.

  • [33] I. B. M. (IBM), “2018 Cost of a Data Breach Study: Global Overview,” International Business Machines (IBM).

  • [34] NW3C, “Disaster Fraud 2017,” NW3C, 2017.

  • [35] R. Surette, “How social media is changing the way people commit crimes and police fight them,” LSE, 2016.

  • [36] A. McGovern and S. Milivojevic, “Social media and crime: the good, the bad and the ugly,” University of New South Walse, Sydney, 2016.

  • [37] S. Schneider, “Hoffman Estates family turns to Facebook to help identify home burglars,” Fox 32 Chicago, 2016.

  • [38] J. Crump, “What Are the Police Doing on Twitter? Social Media, the Police and the Public,” Policy& Internet, vol. 3, no. 4, 2011. https://doi.org/10.2202/1944-2866.1130

  • [39] G. R. Weir, F. Toolan and D. Smeed, “The threats of social networking: Old wine in new bottles?,” Information Security Technical Report, vol. 16, no. 2, pp. 38–43, 2011. https://doi.org/10.1016/j.istr.2011.09.008

  • [40] R. D’Amore, “Toronto police tap into power of social media to catch city’s most wanted criminals,” CTV News Toronto, 2018.

  • [41] C. Rose, “The Security Implications Of Ubiquitous Social,” International Journal of Management & Information Systems (IJMIS), vol. 15, no. 1, 2011. https://doi.org/10.19030/ijmis.v15i1.1593

  • [42] M. Rajab, “An anti-phishing method based on feature analysis,” Proc. The 2nd International Conference on Machine Learning and Soft Computing, pp. 133–139, Vietnam, 2018. https://doi.org/10.1145/3184066.3184082

  • [43] L. J. Singh and N. Imphal, “A Survey on Phishing and Anti-Phishing Techniques,” International Journal of Computer Science Trends and Technology (IJCST), vol. 6, no. 2, pp. 62–68, 2018.

  • [44] K. Thakur, J. Shan and A.-S. K. Pathan, “Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies,” International Journal of Communication Networks and Information Security (IJCNIS), vol. 10, no. 1, pp. 19–27, 2018.

  • [45] Kaspersky, “Learn about malware and how to protect all your devices against it,” Kaspersky. [Online]. Available: https://www.kaspersky.com/resource-center/preemptive-safety/what-ismalware-and-how-to-protect-against-it. [Accessed 15 July 2018].

  • [46] D. He, S. Chan and M. Guizani, “Mobile application security: malware threats and defenses,” IEEE Wireless Communications, vol. 22, no. 1, pp. 138–144, 2015. https://doi.org/10.1109/MWC.2015.7054729

  • [47] W. Wang, Y. Yuan and N. Archer, “A contextual framework for combating identity theft,” IEEE Security & Privacy, vol. 4, no. 2, pp. 30–38, 2006. https://doi.org/10.1109/MSP.2006.31

  • [48] A. Hedayati, “An analysis of identity theft: Motives, related frauds, techniques and prevention,” Journal of Law and Conflict Resolution, vol. 4, no. 1, 2012.

  • [49] Matt, “6 Ways to Avoid Becoming a Cyberstalking Victim,” NAI, 2017.

  • [50] S. Symanovich, Norton Security Center, “Cyberstalking: Help protect yourself against cyberstalkers,”, Retrieved February 2019.

  • [51] A. Merton-McCann, “Cybercasing – How Sharing Your Pics, Videos and Status Updates Can Get You Into Trouble”, McAfee, 2013.

  • [52] G. Friedland and R. Sommer, “Cybercasing the joint: on the privacy implications of geo-tagging,” in HotSec’10 Proceedings of the 5th USENIX conference on Hot topics in security, Washinton, DC, 2010.

  • [53] P. H. Tran, et al., “Real Time Data-Driven Approaches for Credit Card Fraud Detection,” in Proceedings of the 2018 International Conference on E-Business and Applications, pp. 6–9, Vietnam, 2018. https://doi.org/10.1145/3194188.3194196

  • [54] J. T. S. Quah and M. Sriganesh, “Real-time credit card fraud detection using computational intelligence,” Expert Systems with Applications: An International Journal, vol. 35, no. 4, pp. 1721–1732, 2008. https://doi.org/10.1016/j.eswa.2007.08.093

  • [55] C. Dhasarathan, V. Thirumal and D. Ponnurangam, “Data privacy breach prevention framework for the cloud service,” Security and Communication Networks, vol. 8, no. 6, 2014. https://doi.org/10.1002/sec.1054

  • [56] R. G. Brody and V. J. Kimball, “Natural catastrophe and disaster fraud,” Fraud Magazine, 2006.

  • [57] A. J. A. AGENCIES, “Timeline: Egypt’s revolution,” Al Jazeera, 2011.

  • [58] M. Kramer, “The Astronauts You Should Start Following on Twitter,” National Geographic, 2013.

  • [59] C. Syme, “How to Use Social Media to Gather Valuable Marketing Data,” Social Media today, 2014.

  • [60] K. Collins, “Government pays companies to monitor you on social media,” Wired, 2015.

  • [61] M. L. Williams, B. Pete and L. Sloan, “Crime Sensing With Big Data: The Affordances and Limitations of Using Open-source Communications to Estimate Crime Patterns,” The British Journal of Criminology, vol. 57, no. 2, pp. 320–340, 2016. https://doi.org/10.1093/bjc/azw031

  • [62] D. M. M. Alghamdi, “A Data Mining Based Approach for Burglary Crime Rate Prediction,” University of Illinos, Chicago, Chicago, 2017.

  • [63] R. W. Adderley, “The Use Of Data Mining Techniques In Crime Trend Analysis And Offender Profiling,” University of Wolverhampton, Wolverhampton, 2007.

  • [64] M. Al-diabat, “Detection and Prediction of Phishing Websites using Classification Mining Techniques,” International Journal of Computer Applications, vol. 147, no. 5, pp. 5–11, August 2016. https://doi.org/10.5120/ijca2016911061

  • [65] P. Akansha and E. Meenakshi, “Detection of phishing websites using C4.5 data mining algorithm,” in 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, 2017.

  • [66] Y. Ye, T. Li, D. Adjeroh and S. S. Iyengar, “A Survey on Malware Detection Using Data Mining Techniques,” ACM Computing Surveys (CSUR), vol. 50, no. 3, October 2017. https://doi.org/10.1145/3073559

  • [67] M. Siddiqui, “Data Mining Methods For Malware Detection,” University of Central Florida, 2008.

  • [68] C. Phua, K. Smith-Miles, V. Lee, and R. Gayler, “Resilient Identity Crime Detection,” IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 3, pp. 533–546, January 2010. https://doi.org/10.1109/TKDE.2010.262

  • [69] A. Kshirsagar and L. Dole, “A Review On Data Mining Methods For Identity,” International Journal of Electrical, Electronics and Computer Systems (IJEECS), vol. 2, no. 1, 2014.

  • [70] C. Lekha and S. Prakasam, “Implementation Of Data Mining Techniques For Cyber Crime Detection,” International Journal of Engineering, Science and Mathematics, vol. 7, no. 4, January 2018.

  • [71] X. Feng, A. Asante, E. Short and I. Abeykoon, “Cyberstalking Issues,” in 2017 IEEE 15th Intl. Conf. on Dependable, Autonomic and Secure Computing, 15th Intl. Conf. on Pervasive Intelligence and Computing, 3rd Intl. Conf. on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), Orlando, FL, 2017, pp. 373–376. https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.78

  • [72] E. Spyrou and P. Mylonas, “A Survey of Geo-tagged Multimedia Content,” in IFIP International Conference on Artificial Intelligence Applications and Innovations, Paphos, pp. 126–135, 2014. https://doi.org/10.1007/978-3-662-44722-2_14

  • [73] G. Suresh and R. J. Raj, “A Study on Credit Card Fraud Detection using Data Mining Techniques,” International Journal of Data Mining Techniques and Applications, vol. 7, no. 1, pp. 21–24, June 2018.

  • [74] X. Li, J. Chen, Z. Lin, L. Zhang, Z. Wang, M. Zhou and W. Xie, “A Mining Approach to Obtain the Software Vulnerability Characteristics,” in Fifth International Conference on Advanced Cloud and Big Data (CBD), Shanghai, 2017. https://doi.org/10.1109/CBD.2017.58

  • [75] B. Gadidov and L. Le, “A Case Study of Mining Social Media Data for Disaster Relief: Hurricane Irma,” in SAS Global Forum, 2018.

OPEN ACCESS

Journal + Issues

Search