Anmol Garg,
School of Computing and Communication, Lancaster University, Lancaster, LA1 4YW, UK anmolgargunique@gmail.com
Abstract.
With the development of the internet, it had been easier to share the information globally and today with the technological advancements, it has become possible to dynamically interact with the web, which is also termed as the web 2.0.With the rise of web 2.0, there has been a noted rise in the social networking sites which have promoted a different level of sharing and staying in touch with all the friends and family at the click of a button. The good side of this technological innovation is as lucrative as its bad side for the cybercriminals to access all information about a individual with just few clicks. This has led to a reported increase in the number of cybercrime cases which generated a need for a policy framework to highlight the various preventive measures that can be used to protect an individual from being a victim of cybercrime. Therefore, the present paper is representation of the research which starts by focusing on general privacy of the social networking sites and moves to case studies in the field of identity theft, cyberstalking and child pornography in particular. Each case study tries to majorly address their connection with social networking, the general issues and the legal provisions. The final part of the research paper was drawn in form a advisory policy document which defines the general ways through which individuals can protect themselves from being the victim of a cybercrime and the need for global system for controlling cybercrime.
1
Introduction
The development of the internet and moreover, the rise of the web 2.0 has led to a rapid increase in sharing of information and interaction with different people, community and cultures. The sharing is usually done by creating an online identity of an individual in anonymous environment. This environment has no or restricted means to identify and verify the true identity of the individual with respect to the physical world. Although, this has made the web quite helpful and interactive by giving the individuals the right of freedom of speech without the attendant fear of being identified .But synchronously, even the number of cybercrimes committed has substantially increased. The anonymous and complex nature of the identities on the internet makes it further difficult to catch the perpetrator. One of major platform for the sharing of information and committing cybercrimes in the present scenario are the social networking sites. Social networking can be defined as a virtual platform or “web-based services that allow individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a
connection, and (3) view and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from site to site.”[1] These sites provide ample opportunity for a cybercriminal to access the information of any of the individual present and make the targeted individual as their victims [2].The only option in such cases is to be aware of the privacy settings or the privacy policy of the specific social networking site(s) in use. The privacy settings could help by restricting/filtering the amount of the information shared or viewable by each of the individual who accesses the profile of this individual. These settings could also make the profile of the individual unsearchable from the web as well as from within the SNS. The three major cybercrimes committed through the Social networking are identity theft, cyberstalking and child pornography [3].
2
Identity theft
Identity theft basically relates to the fact of stealing your legal identity to commit either a financial fraud or a kind of crime , the criminal doesn’t want to risk committing with his own identity. If the imposter assumes the identity for living for a long time, then its identity theft. If the imposter assumes the identity for a specific purpose/goal and then return to his own identity, it is known as identity fraud [4]. The social networking sites allow each individual to create a profile (virtual identity) by just filling in certain attributes. It is not a difficult a task to add people as friends and utilize the network resources and security to reach the consequences of committing identity theft, blackmailing or simply causing embarrassment to the concerned user [5]. The major concern of identity theft is that beyond all the financial and emotional losses, victims have to spend a lot of considerable amount of time for clearing their identity related allegations. Additionally, these victims have been denied cheque accounts, loans and any further credit [6]. The major problem with defining cyber crime related law is that law and policing are preferred to be with a geographical boundary to have a better control and it is much easier to determine clear accountability and performance .With Cybercrime, there is a lot of geographical separations, as victim may be situated in one part of the globe and the criminal may be in other. Hence, the issue of jurisdiction arises and makes the situation little complicated [7]. Certain tools like the Myid (which checks for duplicate presence of the id on the internet) [8]and M86 secure browsing (which checks for the links of the site by performing real time analysis to detect presence of phished sites and harmful content) can be used for protection against identity theft[9]. There are bodies like the European convention of cybercrime and the United Nations organisation which are trying to combine the various countries allowing the cybercriminals who have committed cybercrimes across international borders to be prosecuted by these international bodies.
Cybercrimes committed through Social networking 3
3
Cyberstalking
“The National Centre for Victims of Crime defines cyber stalking as threatening behavior or unwanted advances directed at another using Internet and other forms of online and compute communications [10].” Most of cyber stalkers spend hours every single day trying to contact their victim and even try getting in contact with their friends and family to extract more information about their victims. What worries most of the people and authorities is that online social networking sites like facebook provide the perfect portal to do this [11]. For social networks , it has been proposed to sign up for “code of practice” which would involve setting up guidelines as to how quickly and efficiently, the response procedures need to be followed in case of complaint of cyberstalking cases [12] The biggest challenge is to identify the cybercriminal through its location. In the case of these cybercrimes, the cyberstalker/harasser may be in another country, state, city or might be in the adjacent cubicle. Moreover the stalker could be anyone from a friend, lover to a complete stranger. The anonymity of the internet along with difficulty in tracing the harasser goes a long way in encouraging cyberstalkers in committing such crimes [13] In England, there is no specific legalization on cyberstalking but there are majorly two old acts that are used indirectly to include for cyberstalking and online harassment cases. These are the Protection from Harassment Act (1997) and the Malicious Communications Act (1988). Effects of cyber stalking can result many serious problems for the victim mainly in terms of psychological, social and behavioural aspects. These effects could lead to loss of job, shifting from the current home location, being extremely cautious of environment around him. Medically, it could affect the victim to experience anxiety, stress, fear, state of shock or disbelief, deprivation in sleep, nightmare [14], [15].
4
Child pornography
Child pornography can be described as the visual representation of minors under the age of 18 engaged in sexual activity or the visual representation of minors engaging in lewd or erotic behaviour designed to arouse the viewer 's sexual interest [16]. “A person feeling sexual attraction to children” can be lay men’s definition to define the term paedophile or one who is interested in child pornography. [17] Grooming is an act where in the grommer or the offender trains or prepares the child for the stage of indulging in sexual acts. [17] The most disturbing fact is when the act of grooming is carried out by the paedophiles for days, weeks or months. They majorly use the social networking sites like facebook, my space or twitter for staying in touch with their victims and grooming for the future. [18] Legally, there are many laws defined for the protection of the children and to prosecute the criminals. The England governments efforts are appreciable in terms that the laws have been revised from time to time making them equally competent with the present scenario. Even most of Internet Service providers (ISP’s) in the UK are now using the block filter provided by the internet watch foundation. The block filter usage has been made mandatory by the UK government to be implemented by every internet service provider. Although this kind of web filtering or content filtering is a quite competent way of controlling. However there are issues concerning that the filtering can also lead to over filtering or under filtering of other
contents or websites present in the UK. This kind of filtering in turn questions firstly, “the free speech advocacy on the internet and the unjustified erosions of civil liberties. [18]
5
Advisory Policy Inferences
The advisory policy is mainly aimed for the general people (someone even without the specialised computer knowledge) and provides the various measures to prevent cybercrime from each of the cybercrimes mentioned above. It also describe the various sites that can be used to report and gather information in each of the cases apart from suggested governmental actions for Internet service provider (ISP) and for creating awareness. The major conclusion which was drawn from the legal section was of having a global system for controlling cybercrime. It stresses on the development of global law for controlling cybercrime but that does require the kind of governance which would mean slashing down boundaries of economic and cultural beliefs and working together globally with just motivation – to curb cybercrime and make it possible for the cybercriminals to be prosecuted on a global platform. This has been followed by the recommendation section in which one of major recommendation deals with allotting or generating a unique code for each individual, which needs to be filled in when creating an account on the third party websites like the SNS, online e-mail service providers etc. The unique code is verified and stored in the government server .The information regarding this identification is not shared with the service providers and any other agencies, thus making it private and letting the identity of the individual remain anonymous on the internet . This could be of great help for the investigation agencies in identifying the cybercriminals, thus providing some control over the cybercrimes committed.
6
Conclusion
Through this paper, the major cybercrimes (identity theft, cyberstalking, child pornography) that are committed through the social networking platform have been discussed. From the technical front, a balance needs to found between controlling the anonymity on the internet and freedom of speech. From the legal front, Organizations like the European convention of cybercrime or the United Nations can help in combining the various countries to have a global law for governing in case of cybercrime as only that can channelize the proper prosecution, many of the cybercriminals deserve. Nevertheless, one of the major factors in people becoming victims of cybercrime is the lack of awareness about these simple issues like the various ways the cyber crime can be prevented and what needs to be done, if they become victims, which websites or organization they can go for help etc. Through this research an understanding and awareness on the issues of cybercrimes could be generated, thus educating the fellow people and making them remain as safe and sound as ever.
References
1. 2. Boyd, d. m.& Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1) Barnes, S. B. (2006). A privacy paradox: social networking in the United states. first monday , 11 (9).
Cybercrimes committed through Social networking 5 3. 4. 5. facebook. (2011). Privacy » Privacy: Privacy settings and fundamentals. Retrieved from http://www.facebook.com: http://www.facebook.com/help/?page=839 Finch, E. (2006). The Problem of stolen identity and the internet. Cullompton : Willan Publishing. Gross, R. & Acquisti, A. (2005). Information Revelation and Privacy in Online Social Networks. Proceedings of WPES '05. (pp. 71-80). Alexandria, VA: Association of Computing Machinery OECD. (2009). Online identity theft. OECD publications. Cifas. (2009, oct). The Anonymous Attacker. Retrieved from ttp://www.identitytheft.org.uk: http://www.identitytheft.org.uk/cms/assets/The_Anonymous_Attacker.pdf myId. (2011, april). How to Protect Yourself from Identity Theft. Retrieved from http://www.myid.com: http://www.myid.com/blog/how-to-protect-yourself-fromidentity-theft/ m86security. (2011). m86security. Retrieved from http://www.m86security.com: http://www.m86security.com safety web (2010, june 16). cyberstalking. Retrieved from http://www.safetyweb.com: http://www.safetyweb.com/cyberstalking Blake, M. (2011, june). Government to launch inquiry into 'outdated ' cyberstalking laws. Retrieved from http://www.independent.co.uk: telegraph. (2011). Social networks 'should do more ' on cyberstalking. Retrieved from http://www.telegraph.co.uk: http://www.telegraph.co.uk/technology/socialmedia/8630244/Social-networks-should-do-more-on-cyberstalking.html cyberstalking. (1999). CYBERSTALKING: A NEW CHALLENGE FOR LAW ENFORCEMENT AND INDUSTRY. Retrieved from http://www.justice.gov: http://www.justice.gov/criminal/cybercrime/cyberstalking.ht Haryani, H., & Yusof, F. B. (2010). Cyber Stalking: The Social Impact of Social Networking Technology. IEEE. International Conference on Education and Management Technology ncvc. (2011). Cyberstalking. Retrieved from http://www.ncvc.org: http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32 458 legal-dictionary. (2007, march). Child Pornography. Retrieved from http://legaldictionary.thefreedictionary.com/Child+Pornography: http://legaldictionary.thefreedictionary.com/Child+Pornography ost, S. (2009). child pornography and sexual grooming. cambridge university press. Edwards, l., & Waelde, c. (2009). Law and the internet. HART publishing.
6. 7.
8.
9. 10. 11. 12.
13.
14.
15.
16.
17. 18.
References: 1. 2. Boyd, d. m.& Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1) Barnes, S. B. (2006). A privacy paradox: social networking in the United states. first monday , 11 (9). Cybercrimes committed through Social networking 5 3. 4. 5. facebook. (2011). Privacy » Privacy: Privacy settings and fundamentals. Retrieved from http://www.facebook.com: http://www.facebook.com/help/?page=839 Finch, E. (2006). The Problem of stolen identity and the internet. Cullompton : Willan Publishing. Gross, R. & Acquisti, A. (2005). Information Revelation and Privacy in Online Social Networks. Proceedings of WPES '05. (pp. 71-80). Alexandria, VA: Association of Computing Machinery OECD. (2009). Online identity theft. OECD publications. Cifas. (2009, oct). The Anonymous Attacker. Retrieved from ttp://www.identitytheft.org.uk: http://www.identitytheft.org.uk/cms/assets/The_Anonymous_Attacker.pdf myId. (2011, april). How to Protect Yourself from Identity Theft. Retrieved from http://www.myid.com: http://www.myid.com/blog/how-to-protect-yourself-fromidentity-theft/ m86security. (2011). m86security. Retrieved from http://www.m86security.com: http://www.m86security.com safety web (2010, june 16). cyberstalking. Retrieved from http://www.safetyweb.com: http://www.safetyweb.com/cyberstalking Blake, M. (2011, june). Government to launch inquiry into 'outdated ' cyberstalking laws. Retrieved from http://www.independent.co.uk: telegraph. (2011). Social networks 'should do more ' on cyberstalking. Retrieved from http://www.telegraph.co.uk: http://www.telegraph.co.uk/technology/socialmedia/8630244/Social-networks-should-do-more-on-cyberstalking.html cyberstalking. (1999). CYBERSTALKING: A NEW CHALLENGE FOR LAW ENFORCEMENT AND INDUSTRY. Retrieved from http://www.justice.gov: http://www.justice.gov/criminal/cybercrime/cyberstalking.ht Haryani, H., & Yusof, F. B. (2010). Cyber Stalking: The Social Impact of Social Networking Technology. IEEE. International Conference on Education and Management Technology ncvc. (2011). Cyberstalking. Retrieved from http://www.ncvc.org: http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32 458 legal-dictionary. (2007, march). Child Pornography. Retrieved from http://legaldictionary.thefreedictionary.com/Child+Pornography: http://legaldictionary.thefreedictionary.com/Child+Pornography ost, S. (2009). child pornography and sexual grooming. cambridge university press. Edwards, l., & Waelde, c. (2009). Law and the internet. HART publishing. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18.
You May Also Find These Documents Helpful
-
Since the dawn of civilization, man has sought to further communication and interaction with his fellow man. The motivation behind this pursuit has been many fold: Some sought and seek this interaction for economic purposes, some for cultural purposes, and some still for educational purposes. Regardless of the incentive, different people in different times have sought to enhance the technology so as to further this pursuit. From the advent of writing in pre-bronze age Mesopotamia to the creation of the printing press in Renaissance Germany to more modern inventions like the radio and telegraph, much of human history has been devoted to making this large world smaller and smaller and furthering our communication and interaction. In this vain, society invented the internet, possibly the most revolutionary piece of technology in human history. Like the other aforementioned innovations, the internet provided man a medium to communicate with his fellow man. Yet, the internet furthered the pursuit of shrinking the world so much that thanks to it, physical distance is a small hindrance in the free exchange of ideas and opinions. One of the major disciplines constructing internet based communication is social networking. During the recent years, social networking has been the victim of ethical issues concerning vigilance and safeguard of privacy for the members and their personal data. The invasion of personal information is a cause of distress for many individuals and organizations. Moreover, it has become an issue that requires constant effort from the concerned parties who are striving to create a safe and comfortable environment for everyone to communicate on these social sites. During the course of this paper some ethical issues regarding the social networking sites such as Facebook will be discussed and the decision making process will be implemented to explore alternatives and implement the solutions.…
- 1126 Words
- 5 Pages
Better Essays -
In this modern day society, the use of computers, technology and the internet are increasingly growing. There are websites and programmes that have been developed which are increasingly exploiting individual’s privacy, in some cases without their realisation. Social networking sites play a key role in this exploitation of user’s privacy. This essay will refer frequently to ‘Facebook’ (a social networking site).…
- 2089 Words
- 9 Pages
Powerful Essays -
Policies and features on social networking sites are evolving rapidly. Social networking is not a modern concept, for people have been trying to share information since the Stone Age. However they lacked the technology of the present, but as technology and social networking evolved, privacy resisted extinction. As networking sites evolve more features will be implemented to aide control over information. The government has created and is developing new policies that govern social networking sites.…
- 470 Words
- 2 Pages
Good Essays -
“Privacy and Social Media” by Theodore F. Claypoole, informs readers of the ways social media has developed security for its users over time. The original intention of social media cites were to share personal experiences, information and opinions on a public domain. Websites such a Google, Facebook and Twitter to name a few began to abuse the rights and sell personal information to companies who would use it to exploit the users. Individual states are beginning to take more and more steps to ensure that the private information that people put onto social media cites stays confidential.…
- 1143 Words
- 4 Pages
Good Essays -
In contemporary times especially over last five years , with the development of computer technology as well as the spread of using the Internet , it seems that the popularity of social networking sites has rapidly increased all over the world . Through the development of computer system which is called Bulletin Board System , that provide users huge opportunities to connect other people , exchanging data ,playing online games etc , Social network sites such as Facebook and so on were founded . People having account in this kind of social networking sites , especially facebook which dominates social network sectors , can share their personal information , their pictures or anything which is accepted as private knowledge . The members of this kind of sites can declare where they are , update their status or express their feelings .Moreover by using facebook , users can find chance to build and maintain relationship with their friends . This might be accepted as a most significant factor which triggers to rise reputation of social network sites . Even though it might be considered as entertaining activity or the blessing of the Internet , in fact those data can be abused . On the ground of the limitless sharing on social network sites like facebook, accessing somebody else’s personal information has been so simple that click the button. However, it would precipitate crucial crisis among users . For example , the user may be threaten or harmed by any evil-minded person who utilizes those data which was shared or posted on social sites . In other words , accessing information via the…
- 1290 Words
- 6 Pages
Better Essays -
In December 2011, Facebook had an average of 483 million daily active users (Facebook, 2012). Social networking sites all vary, yet the one feature they have in common is that they permit users to create a personal profile on the website and allows them to interact through instant messaging and e-mail. As the technology of the Internet advances, social networking sites have a greater impact on human relationships, both positive and negative. Social networking sites such as Facebook, Twitter, and My Space have negative effects on children. They increase the ease and rise of cyber bullying, and health problems. Social networks also multiply the numbers of identity theft and bring other issues such as personal insecurities. Social networking sites have increase identity theft, the safety of the children as well as cyber bullying, and health issues.…
- 1200 Words
- 5 Pages
Better Essays -
Boyd, S., & Ellison, N.B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer Mediated…
- 423 Words
- 2 Pages
Satisfactory Essays -
Danah M. Boyd and Nicole B. Ellison, “Social Network Sites: Definition, History, and Scholarship,” Journal of Computer-Mediated Communications, October 2007, article 11, http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html and David Kirkpatrick, The Facebook Effect (2010).…
- 2264 Words
- 10 Pages
Powerful Essays -
Cited: Boyd, D. M., & Ellison, N. B. (2008). Social Network Sites: Definition, History and Scholarship. Journal of…
- 2794 Words
- 12 Pages
Best Essays -
Boyd, D., & Ellison, N. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1). Retrieved from…
- 7863 Words
- 43 Pages
Powerful Essays -
A social networking site is a web-based platform that is geared towards building and strengthening social networks or relationships between people. These sites allow individuals to create an online representation of themselves, known as profiles, and to engage in various forms of online communication such as exchanging messages, making public posts and uploading pictures to name only a few. Like many things, social networking sites bring both good and bad implications to society. This essay presents the good, which are its ability to promote close connections and widen one’s social circle, but also the bad, which is the risk of being the victim of ill intentions.…
- 642 Words
- 2 Pages
Good Essays -
boyd, d. m., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer…
- 7419 Words
- 30 Pages
Powerful Essays -
References: Boyd, D. and N. Ellison. Social networking sites: definition, history, andscholarship”. http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html , September 1, 2009…
- 3069 Words
- 13 Pages
Powerful Essays -
“Privacy seems to encompass everything, and therefore it appears to be nothing in itself” (Solove, 2008, p. 7). It is an oversimplification to define privacy as all what an individual owns. With the evolution of new technologies nowadays, it is very hard to define privacy because it varies from one person to another and from one culture to another (Solove, 2008). With the rise of social networks during the last decade, new views about privacy started to emerge due to its special mechanism in sharing information. Social networks enable users to instantly share information, thoughts, photos, products and videos with the many users in the network at once. Unlike other means of communication, the information in social networks can spread to hundreds of users in seconds. Then, the users who received the information may share it among their network, and then further to other networks, which will end up in spreading the information to millions of people in no time, just like a chain reaction. This new mechanism of sharing, which is becoming faster every day, raised new concerns about privacy among individuals and organizations. In spite of all these concerns about the personal privacy on the social networks, social networks websites are the most visited websites in the internet. For example, Facebook has reached 901 million monthly active users in April, 2012 (Hachman, 2012). Although social networks enables an easy sharing of private information about individuals or low profile information about organizations, individuals and organization should not be afraid of using social networks due to privacy concerns, and instead they should be more public and utilize the social network.…
- 2270 Words
- 10 Pages
Powerful Essays -
Social media sites are virtual communities that can be publically viewed by anyone and everyone. Pictures, videos, and personal information continually get posted even with privacy statements.(Gail, Uy K 2010).All while people think they are safe from having certain people view their profiles, there is always a way to view your personal sites. The danger of having your information put out there for the world to see is the possibility of becoming a victim of identity theft. Along with identify theft; there is the possibility of fake profiling and bullying.…
- 657 Words
- 3 Pages
Good Essays