A theoretical review of social media usage by cyber-criminals

    Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

    Abstract

    Social media plays an integral part in individual's everyday lives as well as for companies. Social media brings numerous benefits in people's lives such as to keep in touch with close ones and specially with relatives who are overseas, to make new friends, buy products, share information and much more. Unfortunately, several threats also accompany the countless advantages of social media. The rapid growth of the online social networking sites provides more scope for criminals and cyber-criminals to carry out their illegal activities. Hackers have found different ways of exploiting these platform for their malicious gains. This research englobes some of the common threats on social media such as spam, malware, Trojan horse, cross-site scripting, industry espionage, cyber-bullying, cyber-stalking, social engineering attacks. The main purpose of the study to elaborates on phishing, malware and click-jacking attacks. The main purpose of the research, there is no particular research available on the forensic investigation for Facebook. There is no particular forensic investigation methodology and forensic tools available which can follow on the Facebook. There are several tools available to extract digital data but it's not properly tested for Facebook. Forensics investigation tool is used to extract evidence to determine what, when, where, who is responsible. This information is required to ensure that the sufficient evidence to take legal action against criminals.

    Original languageEnglish
    Title of host publication2017 International Conference on Computer Communication and Informatics, ICCCI 2017
    PublisherIEEE, Institute of Electrical and Electronics Engineers
    Pages1-6
    Number of pages6
    ISBN (Electronic)9781467388542
    DOIs
    Publication statusPublished - 21 Nov 2017
    Event7th International Conference on Computer Communication and Informatics, ICCCI 2017 - Coimbatore, India
    Duration: 5 Jan 20177 Jan 2017

    Conference

    Conference7th International Conference on Computer Communication and Informatics, ICCCI 2017
    CountryIndia
    CityCoimbatore
    Period5/01/177/01/17

    Fingerprint Dive into the research topics of 'A theoretical review of social media usage by cyber-criminals'. Together they form a unique fingerprint.

  • Cite this

    Patel, P., Kannoorpatti, K., Shanmugam, B., Azam, S., & Yeo, K. (2017). A theoretical review of social media usage by cyber-criminals. In 2017 International Conference on Computer Communication and Informatics, ICCCI 2017 (pp. 1-6). [17392924] IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/ICCCI.2017.8117694