Cyber Crimes in Online Social Networking Services

Authors

  • Kanak Sharma B.Tech. Student of Lakshmi Narayan College of Technology Excellence, Bhopal, Madhya Pradesh, India

Keywords:

Cyber Crime, online threats, IT Crimes, precautions for social sites etc

Abstract

Cyber crimes are now a global problem that affects lots of spheres of human life. The police all over the world must study how to deal with
this type of crimes, the safety lessons for kids prepare them for the hazards of digital world… Of course, the big companies that have all the
reasons to keep their data secret and intact invest incredible amounts of money to increase the digital security all over the world. Every new
gadget and software product becomes the target for cyber criminals sooner or later, so their manufacturers do everything that is possible
to be one step ahead. Almost everything we see in our daily life may need some of a cyber security. Even when we are totally offline walking
in the park, there are cameras around us and lots of digital devices that could be turned on us if not the security specialists who protect
them from intervention and enhance this protection every day. The vulnerabilities of the digital world shouldn’t cause paranoia, but still
the basics of digital security are worth learning for everyone who uses the benefits of modern civilization.

References

A. Acquisti and R. Gross. Imagined Communities Awareness, Information Sharing, and Privacy on the Facebook, . In 6th Workshop on Privacy Enhancing Technologies, June 2006. Available at: www.careerjournal.com/jobhunting/usingnet/20060112- flesher.html.

R. Gross and L. Sweeney. Towards real-world face deidentification. In IEEE Conference on Biometrics: Theory, Applications and Systems.

D. Boyd. Reflections on friendster, trust and intimacy. In Intimate (Ubiquitous) Computing Workshop - Ubicomp,Seattle, Washington, USA, October 2003.

D. Boyd. Friendster and publicly articulated social networking. In Conference on Human Factors and Computing Systems (CHI 2004), Vienna, Austria, April 2004.

D. B. Donath, J. Public displays of connection. In BT Technology Journal 22, pages 71 – 82, 2004.

R. Feizy. Evaluation of Identity on Online Social Networking: Myspace. In 18th Conference on Hypertext and Hypermedia (HT ’07), December 2007.

A. Gross R., Acquisti. Privacy and information revelation in online social networks. In ACM Workshop on Privacy in the Electronic Society (WPES), 2005.

D. Rosenblum. What Anyone Can Know. In The Privacy Risks of Social Networking Sites, IEEE Security and Privacy, 2007.

R. Gross and L. Sweeney. Towards real-world face deidentification. In IEEE Conference on Biometrics: Theory, Applications and Systems, 2007.

J. Flesher. How to Clean Up Your Digital Dirt Before It Trashes Your Job Search. In The Internet Engineering Task Force, 2006. Available at: http://www.careerjournal.com/jobhunting/usingnet/2006011 2-flesher.html

A. Fuller. Employers snoop on Facebook. In The Stanford Daily, January 2006. Available at: http://daily.stanford.edu/article/2006/1/20/employersSnoop OnFacebook.

E. Pilkington. Blackmail claim stirs fears over Facebook. In The Guardian, July 2007. Available at http://www.guardian.co.uk/international/story/0,,2127084,0 0.html.

Chen, Y., Roussev, V., Richard, G. III, Gao, Y. Content- based image retrieval for digital forensics. In Proceedings of the First International Conference on Digital Forensics (IFIP).

M. Sutter, T. Müller,R. Stotzka et al. Inspector Computer. In German eScience Conference.

R. Datta, D. Joshi, J. Li, and J. Z. Wang. Image Retrieval: Ideas, Influences, and Trends of the New Age. In ACM Computing Surveys.

J. N. J. M. M. F. Jagatic, T. Social phishing. In Communications of the ACM Forthcoming, 2006. www.indiana.edu/~phishing/social-network- experiment/phishing-preprint.pdf.

G. Hogben. Security Issues and Recommendations for Online Social Networks. Position paper, ENISA, European Network and Information Security Agency, October 2007. http://www.enisa.europa.eu/doc/pdf/deliverables/enisa_pp_s ocial_networks.pdf.

W. Mackay. Triggers and barriers to customizing software. In proceedings of CHI’91, ACM Press, pages 153–160, 1991.

UNITED NATIONS OFFICE ON DRUGS AND CRIME, Vienna 2013, Comprehensive Study on Cybercrime Draft—February 2013

India Infoline News Service/ Mumbai 12:32 , Aug 10, 2013

National Crime Records Bureau, Government of IndiaNCRB Report, 2012, “Crime in India 2012 Compendium”.

Kaspersky Security Bulletin 2012. Retrieved from http://www.securelist.com/en/analysis/204792255/Kaspersky_Security_Bulletin_2012_The_overall_statistics_for_2012 (accessed June 2013).

Norton Symantec report on Cyber Crime, 2013.

http://articles.economictimes.indiatimes.com/2013-08-07/news/41167675_1_cyber-attacks-national-cyber-security-policy-websites 7th Aug 2013

85 Li, X., 2008. The Criminal Phenomenon on the Internet: Hallmarks of Criminals and Victims Revisited through Typical Cases Prosecuted. University of Ottawa Law & Technology Journal, 5(1-2):125-140, (‘Li’); Lu, C.C., Jen, W.Y., Chang, W. and Chou, S., 2006. Cybercrime & Cybercriminals. Journal of Computers, 1(6):1-10, (‘Lu’); and BAE Systems Detica and London Metropolitan University, 2012. Organised Crime in the Digital Age (‘BAE Detica’).

UNICRI and Chiesa, R., 2009. Profiling Hackers. Available at: www.unicri.it/emerging_crimes/cybercrime/cyber_crimes/docs/profiling-hackers_add-info.pdf (‘HPP’).

Published

2021-01-22