A theoretical review of social media usage by cyber-criminals

    Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

    Abstract

    Social media plays an integral part in individual's everyday lives as well as for companies. Social media brings numerous benefits in people's lives such as to keep in touch with close ones and specially with relatives who are overseas, to make new friends, buy products, share information and much more. Unfortunately, several threats also accompany the countless advantages of social media. The rapid growth of the online social networking sites provides more scope for criminals and cyber-criminals to carry out their illegal activities. Hackers have found different ways of exploiting these platform for their malicious gains. This research englobes some of the common threats on social media such as spam, malware, Trojan horse, cross-site scripting, industry espionage, cyber-bullying, cyber-stalking, social engineering attacks. The main purpose of the study to elaborates on phishing, malware and click-jacking attacks. The main purpose of the research, there is no particular research available on the forensic investigation for Facebook. There is no particular forensic investigation methodology and forensic tools available which can follow on the Facebook. There are several tools available to extract digital data but it's not properly tested for Facebook. Forensics investigation tool is used to extract evidence to determine what, when, where, who is responsible. This information is required to ensure that the sufficient evidence to take legal action against criminals.

    Original languageEnglish
    Title of host publication2017 International Conference on Computer Communication and Informatics, ICCCI 2017
    PublisherIEEE, Institute of Electrical and Electronics Engineers
    Pages1-6
    Number of pages6
    ISBN (Electronic)9781467388542
    DOIs
    Publication statusPublished - 21 Nov 2017
    Event7th International Conference on Computer Communication and Informatics, ICCCI 2017 - Coimbatore, India
    Duration: 5 Jan 20177 Jan 2017

    Conference

    Conference7th International Conference on Computer Communication and Informatics, ICCCI 2017
    CountryIndia
    CityCoimbatore
    Period5/01/177/01/17

    Fingerprint

    Industry
    Malware

    Cite this

    Patel, P., Kannoorpatti, K., Shanmugam, B., Azam, S., & Yeo, K. (2017). A theoretical review of social media usage by cyber-criminals. In 2017 International Conference on Computer Communication and Informatics, ICCCI 2017 (pp. 1-6). [17392924] IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/ICCCI.2017.8117694
    Patel, Poonam ; Kannoorpatti, Krishnan ; Shanmugam, Bharanidharan ; Azam, Sami ; Yeo, Kheng. / A theoretical review of social media usage by cyber-criminals. 2017 International Conference on Computer Communication and Informatics, ICCCI 2017. IEEE, Institute of Electrical and Electronics Engineers, 2017. pp. 1-6
    @inproceedings{a4fd71d049c04181b111d560eee24386,
    title = "A theoretical review of social media usage by cyber-criminals",
    abstract = "Social media plays an integral part in individual's everyday lives as well as for companies. Social media brings numerous benefits in people's lives such as to keep in touch with close ones and specially with relatives who are overseas, to make new friends, buy products, share information and much more. Unfortunately, several threats also accompany the countless advantages of social media. The rapid growth of the online social networking sites provides more scope for criminals and cyber-criminals to carry out their illegal activities. Hackers have found different ways of exploiting these platform for their malicious gains. This research englobes some of the common threats on social media such as spam, malware, Trojan horse, cross-site scripting, industry espionage, cyber-bullying, cyber-stalking, social engineering attacks. The main purpose of the study to elaborates on phishing, malware and click-jacking attacks. The main purpose of the research, there is no particular research available on the forensic investigation for Facebook. There is no particular forensic investigation methodology and forensic tools available which can follow on the Facebook. There are several tools available to extract digital data but it's not properly tested for Facebook. Forensics investigation tool is used to extract evidence to determine what, when, where, who is responsible. This information is required to ensure that the sufficient evidence to take legal action against criminals.",
    keywords = "click-jacking prevention, cybercriminal, identity theft, malware, phishing, Social media, spam, stalking, threats",
    author = "Poonam Patel and Krishnan Kannoorpatti and Bharanidharan Shanmugam and Sami Azam and Kheng Yeo",
    year = "2017",
    month = "11",
    day = "21",
    doi = "10.1109/ICCCI.2017.8117694",
    language = "English",
    pages = "1--6",
    booktitle = "2017 International Conference on Computer Communication and Informatics, ICCCI 2017",
    publisher = "IEEE, Institute of Electrical and Electronics Engineers",
    address = "United States",

    }

    Patel, P, Kannoorpatti, K, Shanmugam, B, Azam, S & Yeo, K 2017, A theoretical review of social media usage by cyber-criminals. in 2017 International Conference on Computer Communication and Informatics, ICCCI 2017., 17392924, IEEE, Institute of Electrical and Electronics Engineers, pp. 1-6, 7th International Conference on Computer Communication and Informatics, ICCCI 2017, Coimbatore, India, 5/01/17. https://doi.org/10.1109/ICCCI.2017.8117694

    A theoretical review of social media usage by cyber-criminals. / Patel, Poonam ; Kannoorpatti, Krishnan; Shanmugam, Bharanidharan; Azam, Sami; Yeo, Kheng.

    2017 International Conference on Computer Communication and Informatics, ICCCI 2017. IEEE, Institute of Electrical and Electronics Engineers, 2017. p. 1-6 17392924.

    Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

    TY - GEN

    T1 - A theoretical review of social media usage by cyber-criminals

    AU - Patel, Poonam

    AU - Kannoorpatti, Krishnan

    AU - Shanmugam, Bharanidharan

    AU - Azam, Sami

    AU - Yeo, Kheng

    PY - 2017/11/21

    Y1 - 2017/11/21

    N2 - Social media plays an integral part in individual's everyday lives as well as for companies. Social media brings numerous benefits in people's lives such as to keep in touch with close ones and specially with relatives who are overseas, to make new friends, buy products, share information and much more. Unfortunately, several threats also accompany the countless advantages of social media. The rapid growth of the online social networking sites provides more scope for criminals and cyber-criminals to carry out their illegal activities. Hackers have found different ways of exploiting these platform for their malicious gains. This research englobes some of the common threats on social media such as spam, malware, Trojan horse, cross-site scripting, industry espionage, cyber-bullying, cyber-stalking, social engineering attacks. The main purpose of the study to elaborates on phishing, malware and click-jacking attacks. The main purpose of the research, there is no particular research available on the forensic investigation for Facebook. There is no particular forensic investigation methodology and forensic tools available which can follow on the Facebook. There are several tools available to extract digital data but it's not properly tested for Facebook. Forensics investigation tool is used to extract evidence to determine what, when, where, who is responsible. This information is required to ensure that the sufficient evidence to take legal action against criminals.

    AB - Social media plays an integral part in individual's everyday lives as well as for companies. Social media brings numerous benefits in people's lives such as to keep in touch with close ones and specially with relatives who are overseas, to make new friends, buy products, share information and much more. Unfortunately, several threats also accompany the countless advantages of social media. The rapid growth of the online social networking sites provides more scope for criminals and cyber-criminals to carry out their illegal activities. Hackers have found different ways of exploiting these platform for their malicious gains. This research englobes some of the common threats on social media such as spam, malware, Trojan horse, cross-site scripting, industry espionage, cyber-bullying, cyber-stalking, social engineering attacks. The main purpose of the study to elaborates on phishing, malware and click-jacking attacks. The main purpose of the research, there is no particular research available on the forensic investigation for Facebook. There is no particular forensic investigation methodology and forensic tools available which can follow on the Facebook. There are several tools available to extract digital data but it's not properly tested for Facebook. Forensics investigation tool is used to extract evidence to determine what, when, where, who is responsible. This information is required to ensure that the sufficient evidence to take legal action against criminals.

    KW - click-jacking prevention

    KW - cybercriminal

    KW - identity theft

    KW - malware

    KW - phishing

    KW - Social media

    KW - spam

    KW - stalking

    KW - threats

    UR - http://www.scopus.com/inward/record.url?scp=85041435003&partnerID=8YFLogxK

    U2 - 10.1109/ICCCI.2017.8117694

    DO - 10.1109/ICCCI.2017.8117694

    M3 - Conference Paper published in Proceedings

    SP - 1

    EP - 6

    BT - 2017 International Conference on Computer Communication and Informatics, ICCCI 2017

    PB - IEEE, Institute of Electrical and Electronics Engineers

    ER -

    Patel P, Kannoorpatti K, Shanmugam B, Azam S, Yeo K. A theoretical review of social media usage by cyber-criminals. In 2017 International Conference on Computer Communication and Informatics, ICCCI 2017. IEEE, Institute of Electrical and Electronics Engineers. 2017. p. 1-6. 17392924 https://doi.org/10.1109/ICCCI.2017.8117694