Cybercrimes committed through Social networking
School of Computing and Communication, Lancaster University, Lancaster, LA1 4YW, UK email@example.com
With the development of the internet, it had been easier to share the information globally and today with the technological advancements, it has become possible to dynamically interact with the web, which is also termed as the web 2.0.With the rise of web 2.0, there has been a noted rise in the social networking sites which have promoted a different level of sharing and staying in touch with all the friends and family at the click of a button. The good side of this technological innovation is as lucrative as its bad side for the cybercriminals to access all information about a individual with just few clicks. This has led to a reported increase in the number of cybercrime cases which generated a need for a policy framework to highlight the various preventive measures that can be used to protect an individual from being a victim of cybercrime. Therefore, the present paper is representation of the research which starts by focusing on general privacy of the social networking sites and moves to case studies in the field of identity theft, cyberstalking and child pornography in particular. Each case study tries to majorly address their connection with social networking, the general issues and the legal provisions. The final part of the research paper was drawn in form a advisory policy document which defines the general ways through which individuals can protect themselves from being the victim of a cybercrime and the need for global system for controlling cybercrime.
The development of the internet and moreover, the rise of the web 2.0 has led to a rapid increase in sharing of information and interaction with different people, community and cultures. The sharing is usually done by creating an online identity of an individual in anonymous environment. This environment has no or restricted means to identify and verify the true identity of the individual with respect to the physical world. Although, this has made the web quite helpful and interactive by giving the individuals the right of freedom of speech without the attendant fear of being identified .But synchronously, even the number of cybercrimes committed has substantially increased. The anonymous and complex nature of the identities on the internet makes it further difficult to catch the perpetrator. One of major platform for the sharing of information and committing cybercrimes in the present scenario are the social networking sites. Social networking can be defined as a virtual platform or “web-based services that allow individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a
Identity theft basically relates to the fact of stealing your legal identity to commit either a financial fraud or a kind of crime , the criminal doesn’t want to...
References: 1. 2. Boyd, d. m.& Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1) Barnes, S. B. (2006). A privacy paradox: social networking in the United states. first monday , 11 (9).
Cybercrimes committed through Social networking 5 3. 4. 5. facebook. (2011). Privacy » Privacy: Privacy settings and fundamentals. Retrieved from http://www.facebook.com: http://www.facebook.com/help/?page=839 Finch, E. (2006). The Problem of stolen identity and the internet. Cullompton : Willan Publishing. Gross, R. & Acquisti, A. (2005). Information Revelation and Privacy in Online Social Networks. Proceedings of WPES '05. (pp. 71-80). Alexandria, VA: Association of Computing Machinery OECD. (2009). Online identity theft. OECD publications. Cifas. (2009, oct). The Anonymous Attacker. Retrieved from ttp://www.identitytheft.org.uk: http://www.identitytheft.org.uk/cms/assets/The_Anonymous_Attacker.pdf myId. (2011, april). How to Protect Yourself from Identity Theft. Retrieved from http://www.myid.com: http://www.myid.com/blog/how-to-protect-yourself-fromidentity-theft/ m86security. (2011). m86security. Retrieved from http://www.m86security.com: http://www.m86security.com safety web (2010, june 16). cyberstalking. Retrieved from http://www.safetyweb.com: http://www.safetyweb.com/cyberstalking Blake, M. (2011, june). Government to launch inquiry into 'outdated ' cyberstalking laws. Retrieved from http://www.independent.co.uk: telegraph. (2011). Social networks 'should do more ' on cyberstalking. Retrieved from http://www.telegraph.co.uk: http://www.telegraph.co.uk/technology/socialmedia/8630244/Social-networks-should-do-more-on-cyberstalking.html cyberstalking. (1999). CYBERSTALKING: A NEW CHALLENGE FOR LAW ENFORCEMENT AND INDUSTRY. Retrieved from http://www.justice.gov: http://www.justice.gov/criminal/cybercrime/cyberstalking.ht Haryani, H., & Yusof, F. B. (2010). Cyber Stalking: The Social Impact of Social Networking Technology. IEEE. International Conference on Education and Management Technology ncvc. (2011). Cyberstalking. Retrieved from http://www.ncvc.org: http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32 458 legal-dictionary. (2007, march). Child Pornography. Retrieved from http://legaldictionary.thefreedictionary.com/Child+Pornography: http://legaldictionary.thefreedictionary.com/Child+Pornography ost, S. (2009). child pornography and sexual grooming. cambridge university press. Edwards, l., & Waelde, c. (2009). Law and the internet. HART publishing.
9. 10. 11. 12.
Please join StudyMode to read the full document