NIT6130: Social Media Cybercrimes - A Comprehensive Literature Review

Verified

Added on  2025/04/30

|10
|2694
|118
AI Summary
Desklib provides past papers and solved assignments for students. This literature review examines cybercrimes on social media.
Document Page
NIT6130 Assignment 1 - Literature Review
Cyber Crimes in Social Media
Name, Student ID
1. Abstract
- The main idea behind conducting this research is to understand the current problems faced
by individuals and organisations using social media and related platforms. This will provide
knowledge for the measures and effective improvements in the security systems and
technologies to overcome the problems associated with cyber-crimes.
- The approach followed in this research paper covers the collection of knowledge and
information from various research papers and understanding the key topics to be
addressed in this research review.
- This research is going to help in analysing the current solutions for the cyber-crimes and
the steps to be taken to improve the technology supporting these security solutions.
2. Literature Review – Broad Scan and Reading
Round 1
- The research interest affecting the choice of the keywords was to understand the impact of
social media on the users and non-users of Social Media and the Internet. The threats and
harassment issues associated with the Cyber Crimes relates to the keywords selected
below.
- List of keywords and sources
No. Keywords Research Database
1. Cyber Threats IJBPS
2. Security Issues IEEE
3. Cyber Harassment IEEE
- List of search results:
No. Title Author Year Journal/Conference
Title
1. Develop a Model to Measure
the Ethical Effects of Students
Through Social Media Use
Fahad Abdullah
Moafa, Kamsuriah
Ahmad,
Waleed Mugahed
Al-Rahmi
2018 Journal
2. THE WEAPONIZATION OF
SOCIAL MEDIA: SPEAR
Michael Bossetta 2018 Journal of
International Affairs
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
PHISHING AND CYBERATTACKS
ON DEMOCRACY
3. Data analysis through social
media according to the
classified crime
Savas and Serkan 2019 Turkish Journal of
Electrical Engineering
& Computer Sciences
4. A Probabilistic Generative
Model for Mining Cybercriminal
Networks from Online Social
Media
Raymond Y.K. Lau,
Yunqing Xia, and
Yunming Ye
2014 IEEE Computational
Intelligence
Magazine
5. Bully versus victim on the
internet: The correlation with
emotional-social characteristics
Sigal EdenEmail,
Tali Heiman and
Dorit Olenik-
Shemesh
2016 Education and
Information
Technologies
6. Social media as a vector for
youth violence: A review of the
literature
Desmond Upton
Patton, Jun Sung
Hong, and Megan
Ranney
2014 Computers in Human
Behavior
- There is a massive increment in the number of Cyber Crimes encountered every year. The
current technologies working on improving the security of the systems against these
crimes are not very effective. Thus, the implementation of new technologies to improve
the current security system is very important.
Use of computational algorithms based on Machine Learning and Data Mining concepts
can be used to find relationships between various cybercriminals on the basis of some
publicly accessible messages. Developing near-perfect algorithms to enhance the
effectiveness of security should be the main goal.
- Considering the need of effective algorithms and technological applications to mitigate the
cyber risks, some new keywords are identified.
- List out the new keywords derived.
No. Keywords Research Database
1. Computer Crimes IJBPS
2. Machine Learning IEEE
3. Technological Innovations IEEE
- Details of work identified:
No. Title Author Year Journal Title Abstract
1. A Probabilistic
Generative Model
for Mining
Cybercriminal
Networks from
Online Social Media
Raymond
Y.K. Lau,
Yunqing Xia,
and
Yunming Ye
2014 IEEE
Computational
Intelligence
Magazine
Rapidly growing Cyber Crimes is
resulting in a massive loss to
many organisations.
Collaborations of the
cybercriminals is also a major
issue. The paper contributes to
developing mining methods to
detect cybercriminals online.
Document Page
Round 2
- Keywords derived in round 1
No. Keywords Research Database
1. Computer Crimes IJBPS
2. Machine Learning IEEE
3. Technological Innovations IEEE
- List of Search Results
No. Title Author Year Journal/Conference
Title
1. IMPACT OF SOCIAL
NETWORKING ON CYBER
CRIMES: A STUDY
Dr. Rekha Pahuja 2018 Epitome: International
Journal of
Multidisciplinary
Research
2. Study on Effect of Social
Networking Sites on the
Young World of Cyber Crime
Sajeesh Hamsa
, Dr. Archana
Singh and Prof.
Nehajoan
Panackal
2018 Annual Research Journal
of SCMS
3. Cyber Security for Social
Networking Sites: Issues,
Challenges, and Solutions
Mayank Patel 2017 International Journal for
Research in Applied
Science & Engineering
Technology (IJRASET)
4. Cyber Crime Analysis in
Social Media Using Data
Mining Technique
M. Ganesan and
P. Mayilvahanan
2017 International Journal of
Pure and Applied
Mathematics
5. Examining the Social
Networks of Malware
Writers and Hackers
Thomas J. Holt,
Deborah
Strumsky and
Olga Smirnova
2012 International Journal of
Cyber Criminology
6. A survey of current social
network and online
communication provision
policies to support law
enforcement identify
offenders
Horsman and
Graeme
2017 Journal
- After going through the above search results, the major concern regarding the issues and
solutions for the crimes on Social Media platforms. Increasing the use of technology for
communication has opened new ways for the cybercrimes. The main challenge of Cyber
Security is to stop unauthorized access to any system and devices available on the internet.
There is no industry safe from the cyber-attacks. Every organisation and individuals should
secure their personal information in the best way possible.
Document Page
- The amount of impact that the internet has on the daily lives of people raises a lot of
security issues and concerns. The keywords stated below are based on this consideration.
- List out the new keywords derived.
No. Keywords Research Database
1. Cyber attacks IJRASET
2. Digital World IEEE
3. Security Awareness IJRASET
- Most relevant one.
No
.
Title Author Year Journal Title Abstract
1. Cyber Security for
Social Networking
Sites: Issues,
Challenges, and
Solutions
Mayank
Patel
2017 International
Journal for
Research in Applied
Science &
Engineering
Technology
(IJRASET)
Use of the Internet and
technology is growing at a
fast pace. The paper mainly
describes the security issues
related to SNSs which are
being used in various digital
marketing and business
applications.
Round 3
- List keywords derived in round 2
No. Keywords Research Database
1. Cyber attacks IJRASET
2. Digital World IEEE
3. Security Awareness IJRASET
- List of search results
No. Title Author Year Journal/Conference
Title
1. Heterosexual and Non-
heterosexual Young University
Students’ Involvement in
Traditional and Cyber Forms of
Bullying
Kate Wensley,
MPsych, and
Marilyn Campbell
2012 Cyberpsychology,
Behavior and Social
Networking
2. Cyber Terrorism Through Social
Media: A Categorical Based
Preventive Approach.
Parlakkılıç and
Alaattin
2018 INTERNATIONAL
JOURNAL OF
INFORMATION
SECURITY
3. Cyber Media and Vulnerability:
A discourse on cyber laws and a
probe on the victimization of
cybercrimes in Pakistan.
Munir, Asad Gondal
and Maryam Tahira
2017 Journal
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4. Cyber Crime and social media
websites
Anubhav Pandey 2017 Journal/Article
5. Regulating Cybercrime through
Law Enforcement and Industry
Mechanisms
Thomas J. Holt 2018 The Annals of the
American Academy
of Political and Social
Science
6. Issues and Challenges of Cyber
Security for Social
Networking Sites (Facebook)
Roshan Jabee and
M. Afshar Alam
2016 International Journal of
Computer Applications
7. CYBER THREATS IN SOCIAL
NETWORKING WEBSITES
Wajeb Gharibi and
Maha Shaabi
2012 International Journal
of Distributed and
Parallel Systems
8. Impact of cyber crime on
adolescents through social
networking sites
Shalini Gupta,
Anamika Singh,
Sheela Kumari, and
Neelma Kunwar
2017 International Journal
of Law
- List of the new keywords derived
No. Keywords Research Database
1. Policing IEEE
2. International Crimes IEEE
3. Regulation SAGE Journals
- Most relevant search results
No
.
Title Author Year Journal Title Abstract
1. Cyber Terrorism
Through Social
Media: A
Categorical Based
Preventive
Approach.
Parlakkılıç and
Alaattin
2018 INTERNATIONAL
JOURNAL OF
INFORMATION
SECURITY
The article analyses the links
and activities that constitute
a Cyber Crime and identifies
the successes and failures of
the policies and regulations
made against these crimes.
2. CYBER THREATS
IN SOCIAL
NETWORKING
WEBSITES
Wajeb
Gharibi and
Maha Shaabi
2012 International
Journal of
Distributed and
Parallel Systems
This paper gives a detailed
investigation of the cyber
threats present on the Social
Media Websites and suggests
some of the strategies
reduce these threats.
Document Page
3. Literature Review – Focused Reading
Article 1
No
.
Title Author Year Journal Title Abstract
1. CYBER THREATS
IN SOCIAL
NETWORKING
WEBSITES
Wajeb
Gharibi and
Maha Shaabi
2012 International
Journal of
Distributed and
Parallel Systems
This paper gives a detailed
investigation of the cyber
threats present on the Social
Media Websites and suggests
some of the strategies
reduce these threats.
- Key Contribution of the Author – The contribution and research done by the author in this
research paper include:
o Analysis of the history of social media and websites.
o Identify the cyber threats involved in using the social media platform for
communication and business purpose.
o A detailed study on the history of the social media and related platform and also
the history of crimes encountered in the past.
o Classification and standardization of the crimes and cyber threats.
o The author also suggested some strategies to tackle cyber threats.
- There are a lot of existing problems in the Social Media industry which were addressed by
the author like, threats related to user profiling, risks of data leak through internet and
cloud platforms, excessive use of social media applications and its negative impact,
unauthorized access, and use of unauthorized software on the web. The main objective of
this paper was to warn users about these threats and provide some knowledge to avoid
such risks (Gharibi & Shaabi 2012).
- The authors used a great technique to gather information on the use and threats related to
Social Media and the Internet. They analyzed the data and created a graphical structure of
this data for better understanding. The authors targeted the major Social Media platforms
having a lot of crowd of both the users and attackers.
- The research helped the authors in structuring a lot of strategies for the users to help them
to stay away and recover from the threats. These strategies are:
o Importance of awareness towards data disclosure is a must. User should prevent
themselves from disclosing their information on Social Media and the Internet.
o Campaigns should be conducted to educate people about social media crimes.
o Modification of the legislation.
o Upgradation of security tools.
o Authentication should be empowered (Gharibi & Shaabi 2012).
Document Page
- Need for future work includes:
o Ways of efficient profile management should be available.
o Social networks should be integrated properly.
o Ways to integrate data spread across different networks.
- Research problems and issues identified in the research study shows that there is a lack of
description and enlightenment towards the laws and policies available to tackle the cyber
threats and their effectiveness in this report.
Article 2
No
.
Title Author Year Journal Title Abstract
1. Cyber Terrorism
Through Social
Media: A
Categorical Based
Preventive
Approach.
Alaattin
Parlakkılıç
2018 INTERNATIONAL
JOURNAL OF
INFORMATION
SECURITY
The article analyses the links
and activities that constitute
a Cyber Crime and identifies
the successes and failures of
the policies and regulations
made against these crimes.
- The major contributions made by the author in the proposed research paper are:
o Understanding the working and segmentation of different social media platforms.
o Identification of terrorism and criminal activities encountered in media.
o Categorization of the cyber-terrorism activities.
o Measures and techniques to be applied for the crimes.
- The problems identified by the author in the current system are:
o Increasing Cyber-Terrorism is helping the criminals in money laundering, data leaks
and frauds, and related activities.
o The inability of the current technology and legislation in prevention these Cyber-
Crimes.
- The approach of the author towards the conduction of this research is of understanding
the researches of different writers and then integrating the knowledge gained by the
studies with his understanding of the topic.
- Completion of this research paper helped the author to come up with some major issues in
the Social Media world and their measures. Considerations should be made on the
misinformation, business spams, control on the e-commerce business to stop supplying
funds to the cyber terrorists, the importance of firewalls and anti-malware software, etc.
(Parlakkılıç 2018).
- The focus of the laws and policies, implemented to prevent social media crimes, should
include the importance of preventing the information system and its infrastructure. There
is a need for some suggestions to promote the acceptance of criminal laws internationally.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
- The research covered a lot of cyber-terrorism activities and crimes. The categorization was
detailed and to the point. Standardization of the contents based on the Cyber-Terrorism
activities can help to ease efforts made to understand this research paper.
4. Proposed Research
- According to Parlakkılıç (2018), the categorization of the crimes and cyber terrorism will
help in the understanding and mitigating the crimes. There were a lot of measures
identified to improve the security of the system. The research paper lacks some detailed
knowledge about these activities.
- The aim of my research was to understand the current crimes and risks in the Social Media
platforms. This research enlightened me about the variety of cyber-crimes and the extent
of harm caused by these activities.
- Various approaches towards cyber-security include-
- Categorization of the crimes and cyber-terrorism activities and their components
(Parlakkılıç 2018).
- Graphical representation of the data gathered in the research is of great help.
Provides a better understanding of researched information (Gharibi & Shaabi 2012).
- The research study will educate the readers about the impact of cyber-crimes on their daily
activities and also help many organisations to improve their current security systems to
prevent malicious attacks on their databases and websites.
- In order to implement effective measures of data prevention and security, machine
learning and algorithms can be implemented in the security technologies to improve and
generate a near-perfect security solution.
- After going through a lot of research journals and reading a few main papers in detail, a
good research paper, covering all the basic components relating to the “Cyber Crimes in
Social Media”, can be generated.
5. References
Gupta, S, Singh, A, Kumari, S & Kunwar, N 2017, ‘Impact of cyber crime on adolescents through
social networking sites’, International Journal of Law, vol. 3, no. 6, Kanpur.
Gharibi, W & Shaabi, M 2012, ‘Cyber Threats In Social Networking Websites’, International
Journal of Distributed and Parallel systems, vol. 3, no. 1, pp. 119-126.
Parlakkılıç, A 2018, ‘Cyber Terrorism Through Social Media: A Categorical Based Preventive
Approach’, INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE, vol. 7, no. 4.
Abdullah Moafa, F, Ahmad, K, Al-Rahmi, W, Yahaya, N, Bin Kamin, Y & Alamri, M 2018,
‘Develop a Model to Measure the Ethical Effects of Students Through Social Media Use’, IEEE
Access, vol. 6, pp. 56685-56699.
Document Page
Lau, R, Xia, Y & Ye, Y 2014, ‘A Probabilistic Generative Model for Mining Cybercriminal
Networks from Online Social Media’, IEEE Computational Intelligence Magazine, vol. 9, no. 1,
pp. 31-43.
Patton, D, Hong, J, Ranney, M, Patel, S, Kelley, C, Eschmann, R & Washington, T 2014, ‘Social
media as a vector for youth violence: A review of the literature’, Computers in Human
Behavior, vol. 35, pp. 548-553.
Pahuja, D 2018, ‘IMPACT OF SOCIAL NETWORKING ON CYBER CRIMES : A STUDY’, Epitome:
International Journal of Multidisciplinary Research, vol. 4 no. 4.
Hamsa, S 2018, ‘Study on Effect of Social Networking Sites on the Young World of Cyber
Crime’, Annual Research Journal of SCMS, vol. 6, pp. 68-78.
Das, R 2017, ‘Cyber Security for Social Networking Sites: Issues, Challenges and Solutions’,
International Journal for Research in Applied Science and Engineering Technology, vol. 5, no. 4,
pp. 833-838.
Ganesan, M & Mayilvahanan, P 2017, ‘Cyber Crime Analysis in Social Media Using Data Mining
Technique’, International Journal of Pure and Applied Mathematics, vol. 116, no. 22.
Holt, T 2018, ‘Regulating Cybercrime through Law Enforcement and Industry Mechanisms’, The
ANNALS of the American Academy of Political and Social Science, vol. 679, no. 1, pp. 140-157.
Pandey, A 2017, ‘Cyber crime and social media websites’, vol. 2, no. 1.
Jabee, R & Alam, M 2016, ‘Issues and Challenges of Cyber Security for Social Networking Sites
(Facebook)’, International Journal of Computer Applications, vol. 144, no. 3.
Asad, M 2017, ‘Cyber Media and Vulnerability: A discourse on cyber laws and a probe on
victimization of cybercrimes in Pakistan’, vol. 10, no. 2, pp. 1-23.
BAHAR, A 2018, ‘BİLİŞİM SUÇLARI, İLETİŞİM VE SOSYAL MEDYA’, Istanbul Aydin Universitesi
Dergisi, vol. 10, no. 3, pp. 1-36.
Document Page
6 Appendix
A1.
No. Abstract Reference
1. Rapidly growing Cyber Crimes is
resulting in a massive loss to many
organisations. Collaborations of the
cybercriminals is also a major issue. The
paper contributes to developing mining
methods to detect cybercriminals online.
Lau, R, Xia, Y & Ye, Y 2014, ‘A Probabilistic
Generative Model for Mining
Cybercriminal Networks from Online
Social Media’, IEEE Computational
Intelligence Magazine, vol. 9, no. 1, pp.
31-43.
A2.
No. Abstract Reference
1. Use of the Internet and technology is
growing at a fast pace. The paper mainly
describes the security issues related to
SNSs which are being used in various
digital marketing and business
applications.
Das, R 2017, ‘Cyber Security for Social
Networking Sites: Issues, Challenges and
Solutions’, International Journal for
Research in Applied Science and
Engineering Technology, vol. 5, no. 4, pp.
833-838.
A3.
No. Abstract Reference
1. The article analyses the links and
activities that constitute a Cyber Crime
and identifies the successes and failures
of the policies and regulations made
against these crimes.
Parlakkılıç, A 2018, ‘Cyber Terrorism
Through Social Media: A Categorical
Based Preventive Approach’,
INTERNATIONAL JOURNAL OF
INFORMATION SECURITY SCIENCE, vol. 7,
no. 4.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]