Have a personal or library account? Click to login
Social Media-Related Cybercrimes and Techniques for Their Prevention Cover

Social Media-Related Cybercrimes and Techniques for Their Prevention

Open Access
|Jun 2019

References

  1. [1] N. Thabet and T. R. Soomro, “Big Data Challenges,” Journal of Computer Engineering & Information Technology, vol. 4, no. 3, 2015. https://doi.org/10.4172/2324-9307.100013310.4172/2324-9307.1000133
  2. [2] Internetlivestats.com, “Internet Users,” Internet Live Stats, 2019.
  3. [3] S. Inc., “Number of social media users worldwide from 2010 to 2021 (in billions),” Statista: The Statistics Portal, New York, 2019.
  4. [4] T. R. Soomro and H. Wahba, “Perspectives of Cloud Computing: An Overview,” Proceedings 14th International Business Information Management Association (IBIMA) Conference on Global Business Transformation through Innovation and Knowledge Management, Istanbul, 2010.
  5. [5] M. Yar, Cybercrime and Society. SAGE, 2016.
  6. [6] R. Broadhurst, “Developments in the globallLaw enforcement of cybercrime,” Policing: An International Journal of Police Strategies and Management, vol. 29, no. 3, pp. 408–433, 2006. https://doi.org/10.1108/1363951061068467410.1108/13639510610684674
  7. [7] “Social Media Use in Law Enforcement: Crime prevention and investigative activities,” LexisNexis, 2014.
  8. [8] J. Blomberg, “Fighting Crime Through Social Media and Social Network Analysis,” SAS, 2012.
  9. [9] NW3C, “Criminal Use of Social Media (2013),” NW3C, 2013.
  10. [10] BBC News, “Kim Kardashian robbery: How do you sell high-profile diamonds?,” Ocober 4, 2016.
  11. [11] Symantec, “What is social engineering?,” Symantec Corporation, 2015.
  12. [12] M. Sauter, “Nine Major Ways Criminals Use Facebook,” Fox Business, 2012.
  13. [13] B. Nahorney, “Internet Security Threat Report (2017),” ISTR, 2017.
  14. [14] Symantec, “Internet Security Threat Report,” Symantec Corporation, 2019.
  15. [15] M. Dadkhah, M. Lagzian and G. Borchardt, “Identity Theft in the Academic World Leads to Junk,” Science and Engineering Ethics, vol. 24, no. 1, pp. 287–290, 2018. https://doi.org/10.1007/s11948-016-9867-x10.1007/s11948-016-9867-x
  16. [16] S. Irshad and T. R. Soomro, “Identity Theft and Social Media,” International Journal of Computer Science and Network Security, vol. 18, no. 1, pp. 43–55, 2018.
  17. [17] FBI, “Internet Crime Report (2016),” Internet Crime Complaint Center, 2016.
  18. [18] FBI, “Internet Crime Report (2017),” Internet Crime Complaint Center, 2017.
  19. [19] FTC, “FTC Releases Annual Summary of Consumer Complaints (2017),” FTC, 2017.
  20. [20] F. T. Commission, “Consumer Sentinel Network Data Book 2017,” Consumer Sentinel Network, 2018.
  21. [21] F. T. Commission, “Consumer Sentinel Network Data Book 2018,” Commission, Federal Trade, 2019.
  22. [22] NW3C, “Cyberstalking (March 2015),” NW3C, 2015.
  23. [23] A. A. Moore, “Cyberstalking and Women: Facts and Statistics,” thoughtco.com, 2018.
  24. [24] Bureau Of Justice Statistics, “Stalking”. [Online]. Available from: https://www.bjs.gov/index.cfm?ty=tp&tid=973
  25. [25] M. Duggan, “Online Harassment 2017,” Pew Research Center, 11 July 2017. [Online]. Available: http://www.pewinternet.org/2017/07/11/online-harassment-2017/. [Accessed 16 March 2019].
  26. [26] P. Saariluoma and H. Sacha, “How cyber breeds crime and criminals,” The Society of Digital Information and Wireless Communications (SDIWC), 2014.
  27. [27] NW3C, “Credit Card Fraud (2017),” NW33, 2017.
  28. [28] FTC, “Consumer Sentinel Newtork Data Book 2016,” Consumer Sentinel Newtork, 2017.
  29. [29] NW3C, “Cyber Intrusion and Data Breaches 2017,” NW3C, 2017.
  30. [30] A. Kaphle, “These are the 5 members of the Chinese military charged with cyber-espionage,” The Washington Post, 2014.
  31. [31] J. Lyne, “14 Year Olds Hack ATM In Lunch Hour - How It Happened,” Forbes, 2014.
  32. [32] L. Harding, “What we know about Russia’s interference in the US election,” The Guardian, 2016.
  33. [33] I. B. M. (IBM), “2018 Cost of a Data Breach Study: Global Overview,” International Business Machines (IBM).
  34. [34] NW3C, “Disaster Fraud 2017,” NW3C, 2017.10.1016/S1361-3723(17)30104-5
  35. [35] R. Surette, “How social media is changing the way people commit crimes and police fight them,” LSE, 2016.
  36. [36] A. McGovern and S. Milivojevic, “Social media and crime: the good, the bad and the ugly,” University of New South Walse, Sydney, 2016.
  37. [37] S. Schneider, “Hoffman Estates family turns to Facebook to help identify home burglars,” Fox 32 Chicago, 2016.
  38. [38] J. Crump, “What Are the Police Doing on Twitter? Social Media, the Police and the Public,” Policy& Internet, vol. 3, no. 4, 2011. https://doi.org/10.2202/1944-2866.113010.2202/1944-2866.1130
  39. [39] G. R. Weir, F. Toolan and D. Smeed, “The threats of social networking: Old wine in new bottles?,” Information Security Technical Report, vol. 16, no. 2, pp. 38–43, 2011. https://doi.org/10.1016/j.istr.2011.09.00810.1016/j.istr.2011.09.008
  40. [40] R. D’Amore, “Toronto police tap into power of social media to catch city’s most wanted criminals,” CTV News Toronto, 2018.
  41. [41] C. Rose, “The Security Implications Of Ubiquitous Social,” International Journal of Management & Information Systems (IJMIS), vol. 15, no. 1, 2011. https://doi.org/10.19030/ijmis.v15i1.159310.19030/ijmis.v15i1.1593
  42. [42] M. Rajab, “An anti-phishing method based on feature analysis,” Proc. The 2nd International Conference on Machine Learning and Soft Computing, pp. 133–139, Vietnam, 2018. https://doi.org/10.1145/3184066.318408210.1145/3184066.3184082
  43. [43] L. J. Singh and N. Imphal, “A Survey on Phishing and Anti-Phishing Techniques,” International Journal of Computer Science Trends and Technology (IJCST), vol. 6, no. 2, pp. 62–68, 2018.
  44. [44] K. Thakur, J. Shan and A.-S. K. Pathan, “Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies,” International Journal of Communication Networks and Information Security (IJCNIS), vol. 10, no. 1, pp. 19–27, 2018.
  45. [45] Kaspersky, “Learn about malware and how to protect all your devices against it,” Kaspersky. [Online]. Available: https://www.kaspersky.com/resource-center/preemptive-safety/what-ismalware-and-how-to-protect-against-it. [Accessed 15 July 2018].
  46. [46] D. He, S. Chan and M. Guizani, “Mobile application security: malware threats and defenses,” IEEE Wireless Communications, vol. 22, no. 1, pp. 138–144, 2015. https://doi.org/10.1109/MWC.2015.705472910.1109/MWC.2015.7054729
  47. [47] W. Wang, Y. Yuan and N. Archer, “A contextual framework for combating identity theft,” IEEE Security & Privacy, vol. 4, no. 2, pp. 30–38, 2006. https://doi.org/10.1109/MSP.2006.3110.1109/MSP.2006.31
  48. [48] A. Hedayati, “An analysis of identity theft: Motives, related frauds, techniques and prevention,” Journal of Law and Conflict Resolution, vol. 4, no. 1, 2012.
  49. [49] Matt, “6 Ways to Avoid Becoming a Cyberstalking Victim,” NAI, 2017.
  50. [50] S. Symanovich, Norton Security Center, “Cyberstalking: Help protect yourself against cyberstalkers,”, Retrieved February 2019.
  51. [51] A. Merton-McCann, “Cybercasing – How Sharing Your Pics, Videos and Status Updates Can Get You Into Trouble”, McAfee, 2013.
  52. [52] G. Friedland and R. Sommer, “Cybercasing the joint: on the privacy implications of geo-tagging,” in HotSec’10 Proceedings of the 5th USENIX conference on Hot topics in security, Washinton, DC, 2010.
  53. [53] P. H. Tran, et al., “Real Time Data-Driven Approaches for Credit Card Fraud Detection,” in Proceedings of the 2018 International Conference on E-Business and Applications, pp. 6–9, Vietnam, 2018. https://doi.org/10.1145/3194188.319419610.1145/3194188.3194196
  54. [54] J. T. S. Quah and M. Sriganesh, “Real-time credit card fraud detection using computational intelligence,” Expert Systems with Applications: An International Journal, vol. 35, no. 4, pp. 1721–1732, 2008. https://doi.org/10.1016/j.eswa.2007.08.09310.1016/j.eswa.2007.08.093
  55. [55] C. Dhasarathan, V. Thirumal and D. Ponnurangam, “Data privacy breach prevention framework for the cloud service,” Security and Communication Networks, vol. 8, no. 6, 2014. https://doi.org/10.1002/sec.105410.1002/sec.1054
  56. [56] R. G. Brody and V. J. Kimball, “Natural catastrophe and disaster fraud,” Fraud Magazine, 2006.
  57. [57] A. J. A. AGENCIES, “Timeline: Egypt’s revolution,” Al Jazeera, 2011.
  58. [58] M. Kramer, “The Astronauts You Should Start Following on Twitter,” National Geographic, 2013.
  59. [59] C. Syme, “How to Use Social Media to Gather Valuable Marketing Data,” Social Media today, 2014.
  60. [60] K. Collins, “Government pays companies to monitor you on social media,” Wired, 2015.
  61. [61] M. L. Williams, B. Pete and L. Sloan, “Crime Sensing With Big Data: The Affordances and Limitations of Using Open-source Communications to Estimate Crime Patterns,” The British Journal of Criminology, vol. 57, no. 2, pp. 320–340, 2016. https://doi.org/10.1093/bjc/azw03110.1093/bjc/azw031
  62. [62] D. M. M. Alghamdi, “A Data Mining Based Approach for Burglary Crime Rate Prediction,” University of Illinos, Chicago, Chicago, 2017.
  63. [63] R. W. Adderley, “The Use Of Data Mining Techniques In Crime Trend Analysis And Offender Profiling,” University of Wolverhampton, Wolverhampton, 2007.
  64. [64] M. Al-diabat, “Detection and Prediction of Phishing Websites using Classification Mining Techniques,” International Journal of Computer Applications, vol. 147, no. 5, pp. 5–11, August 2016. https://doi.org/10.5120/ijca201691106110.5120/ijca2016911061
  65. [65] P. Akansha and E. Meenakshi, “Detection of phishing websites using C4.5 data mining algorithm,” in 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, 2017.
  66. [66] Y. Ye, T. Li, D. Adjeroh and S. S. Iyengar, “A Survey on Malware Detection Using Data Mining Techniques,” ACM Computing Surveys (CSUR), vol. 50, no. 3, October 2017. https://doi.org/10.1145/307355910.1145/3073559
  67. [67] M. Siddiqui, “Data Mining Methods For Malware Detection,” University of Central Florida, 2008.
  68. [68] C. Phua, K. Smith-Miles, V. Lee, and R. Gayler, “Resilient Identity Crime Detection,” IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 3, pp. 533–546, January 2010. https://doi.org/10.1109/TKDE.2010.26210.1109/TKDE.2010.262
  69. [69] A. Kshirsagar and L. Dole, “A Review On Data Mining Methods For Identity,” International Journal of Electrical, Electronics and Computer Systems (IJEECS), vol. 2, no. 1, 2014.
  70. [70] C. Lekha and S. Prakasam, “Implementation Of Data Mining Techniques For Cyber Crime Detection,” International Journal of Engineering, Science and Mathematics, vol. 7, no. 4, January 2018.
  71. [71] X. Feng, A. Asante, E. Short and I. Abeykoon, “Cyberstalking Issues,” in 2017 IEEE 15th Intl. Conf. on Dependable, Autonomic and Secure Computing, 15th Intl. Conf. on Pervasive Intelligence and Computing, 3rd Intl. Conf. on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), Orlando, FL, 2017, pp. 373–376. https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.7810.1109/DASC-PICom-DataCom-CyberSciTec.2017.78
  72. [72] E. Spyrou and P. Mylonas, “A Survey of Geo-tagged Multimedia Content,” in IFIP International Conference on Artificial Intelligence Applications and Innovations, Paphos, pp. 126–135, 2014. https://doi.org/10.1007/978-3-662-44722-2_1410.1007/978-3-662-44722-2_14
  73. [73] G. Suresh and R. J. Raj, “A Study on Credit Card Fraud Detection using Data Mining Techniques,” International Journal of Data Mining Techniques and Applications, vol. 7, no. 1, pp. 21–24, June 2018.10.20894/IJDMTA.102.007.001.004
  74. [74] X. Li, J. Chen, Z. Lin, L. Zhang, Z. Wang, M. Zhou and W. Xie, “A Mining Approach to Obtain the Software Vulnerability Characteristics,” in Fifth International Conference on Advanced Cloud and Big Data (CBD), Shanghai, 2017. https://doi.org/10.1109/CBD.2017.5810.1109/CBD.2017.58
  75. [75] B. Gadidov and L. Le, “A Case Study of Mining Social Media Data for Disaster Relief: Hurricane Irma,” in SAS Global Forum, 2018.
DOI: https://doi.org/10.2478/acss-2019-0002 | Journal eISSN: 2255-8691 | Journal ISSN: 2255-8683
Language: English
Page range: 9 - 17
Published on: Jun 20, 2019
In partnership with: Paradigm Publishing Services
Publication frequency: Volume open

© 2019 Tariq Rahim Soomro, Mumtaz Hussain, published by Riga Technical University
This work is licensed under the Creative Commons Attribution 4.0 License.