A theoretical review of social media usage by cyber-criminals
Title | A theoretical review of social media usage by cyber-criminals |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Patel, P., Kannoorpatti, K., Shanmugam, B., Azam, S., Yeo, K. C. |
Conference Name | 2017 International Conference on Computer Communication and Informatics (ICCCI) |
Date Published | Jan. 2017 |
Publisher | IEEE |
ISBN Number | 978-1-4673-8855-9 |
Keywords | click-jacking prevention, Computer crime, Cross Site Scripting, Cross Site Scripting (XSS), cyber-criminals, cybercriminal, Electronic mail, Facebook, Human Behavior, human factor, human factors, identity theft, invasive software, Malware, online social networking sites, phishing, pubcrawl, resilience, Resiliency, Scalability, Social Engineering Attacks, social media, social media usage, social networking (online), spam, stalking, threats, Tools |
Abstract | Social media plays an integral part in individual's everyday lives as well as for companies. Social media brings numerous benefits in people's lives such as to keep in touch with close ones and specially with relatives who are overseas, to make new friends, buy products, share information and much more. Unfortunately, several threats also accompany the countless advantages of social media. The rapid growth of the online social networking sites provides more scope for criminals and cyber-criminals to carry out their illegal activities. Hackers have found different ways of exploiting these platform for their malicious gains. This research englobes some of the common threats on social media such as spam, malware, Trojan horse, cross-site scripting, industry espionage, cyber-bullying, cyber-stalking, social engineering attacks. The main purpose of the study to elaborates on phishing, malware and click-jacking attacks. The main purpose of the research, there is no particular research available on the forensic investigation for Facebook. There is no particular forensic investigation methodology and forensic tools available which can follow on the Facebook. There are several tools available to extract digital data but it's not properly tested for Facebook. Forensics investigation tool is used to extract evidence to determine what, when, where, who is responsible. This information is required to ensure that the sufficient evidence to take legal action against criminals. |
URL | http://ieeexplore.ieee.org/document/8117694/ |
DOI | 10.1109/ICCCI.2017.8117694 |
Citation Key | patel_theoretical_2017 |
- online social networking sites
- tools
- threats
- stalking
- spam
- social networking (online)
- social media usage
- social media
- Social Engineering Attacks
- Scalability
- Resiliency
- resilience
- pubcrawl
- Phishing
- click-jacking prevention
- malware
- invasive software
- identity theft
- Human Factors
- human factor
- Human behavior
- Electronic mail
- cybercriminal
- cyber-criminals
- Cross Site Scripting (XSS)
- Cross Site Scripting
- Computer crime