Would You Agree That Social Networks Such as, Twitter, Facebook and Myspace Contribute Significantly to the High Increase of Cyber Crimes?

Topics: Social network service, Facebook, Web 2.0 Pages: 6 (1633 words) Published: May 6, 2013
Would you agree that social networks such as, twitter, facebook and myspace contribute significantly to the high increase of cyber crimes?

The world of online social interactivity has undergone a sea of change which has been highlighted by the continued rise in the importance and increased usage of social networking sites on the Internet. Unfortunately, the increasing popularity of cyber communities, such as social networks, has been accompanied by an equivalent growth of cyber crimes. As social networking continues to modernize and change in nature, so to have cyber crime activities, adapted to this change. Cyber crime has become a deadly and silent epidemic across the globe and ranks as one of the top four (4) economic crimes ("Price waterhouse coopers"). The most intriguing aspect of modern cyber crimes is that most of them are not being newly created, but are in fact greatly adapting to today’s cyber society and virtual environments, which has however, contributed to the high increase of cyber crimes.

Social Networks such as Facebook, Myspace, LinkedIn, Twitter and Tumblr have grown at impressive rates with online usage statistics, providing powerful figures that suggests social networking is here to stay. Today 1.5 billion people across the world have their profiles in social networking sites (Das, and Sahoo). As of April 2012, Facebook has reached a capacity of 900 plus million active users (Touryalai) and it is reported that for every six minutes a user spends on the Internet, one of these minutes is spent on social networking (Nelms).

In tandem with this drastic social networking growth, so to have the attacks through social networking sites increased. Cyber criminals target and will continue targeting social networking to take advantage of the immense online user capacity which such sites encompass. Social networking sites have eclipsed web-based email for cyber crimes and these sites are now rated as the third most preferred medium of attacks. Websites are rated first and Peer to Peer networks being second (Casilli). McAfee recently reported that malware directed at social media are some of the fastest growing threats today. In 2010, McAfee detected an average of 60,000 new pieces of malware each day which were directly targeted social networking sites.

Social networks are portals that effectively host a variety of content. They have grown beyond the need of individual users. Now, even as widely accepted by businesses, social networking sites can no longer be ignored. It is important to note, however, that the users’ behavior within the social networking circle is different from their behavior on the internet. Social Networking gives the end-user a great amount of power with regards to personal security. This power, now almost fully handed to the end-user can be seen as another major reason for the immense growth of cyber crimes in social networking. Cyber criminals no longer have to reinvest significant profits into developing new capabilities for circumventing modern security technologies. Cyber criminals now routinely exploit what is considered to be the greatest vulnerability and the weakest link of Social Networking sites - the end user.

Cyber criminals now target users via social engineering techniques via scams and ruses that criminals use to make a user believe they are co-workers, customers, or other legitimate parties. Stealth techniques enable cyber criminals to act without fear of timely detection, let alone capture and successful prosecution. It is among some of the most insidious and profitable of crimes, and can be conducted from a well-equipped workstation, even perhaps within an organization. People have grown wise towards email spam and can readily recognise all the warning signs of a malicious e-mail. However, a lot more people are tricked by spam messages sent by their ‘friends’ on sites like Facebook, as they have a position of trust. End users tend to place a greater level of...

Cited: Boyd, D.. "Social network sites: Definition, history, and scholarship." Indiana university. Journal of Computer-Mediated Communication, 2007. Web. 6 May 2012. .
Casilli, Antonio A.. "Use Social Networking Services, Get Free Cancer." Antonio A. Casilli :: BodySpaceSociety:Antonio A. Casilli :: BodySpaceSociety A blog for recovering social scientists . WordPress, 2007. Web. 6 May 2012. .
Check Point Software Technologies Ltd, , ed. "Facebook: A Prime Target for Cybercrime." ZoneAlarm. Check Point Software Technologies, Inc., 2012. Web. 6 May 2012. .
"Cybercrime Spreading on Facebook." PC Magazine Online 30 June 2009. Academic OneFile. Web. 1 Apr. 2012. .
Douglas, John E., Ann W. Burgess, et al. Crime Classification Manual: A Standard System for Investigating and Classifying Violent Crimes. 2nd. San Francisco, CA: Jossey-Bass, 2006. Print.
Facebook, . "Facebook Statistics." Facebook. Facebook, 2011. Web. 6 May 2012. .
Gaudin, S.. "Study: 54% of companies ban facebook, twitter at work." Computerworld. Computerworld, 2009. Web. 6 May 2012. .
. "Global Economic Crime Survey." Price waterhouse coopers. Price Waterhouse Coopers, 2011. Web. 6 May 2012. .
Lenhart, A., and M. Madden. Teens, privacy and online social networks . N.p., 2007. Web. 6 May 2012. .
Moffatt, K.. "Top 15 most popular social networking sites."The ebusiness knowledgebase . eBizMBA Inc, 2012. Web. 6 May 2012. .
Nelms, D.. "Social networking growth stats and patterns." . Social Media Today, 2011. Web. 6 May 2012. .
Web2forDev: Web 2.0 for Development Gateway, , ed. "The Next Billion – The Rise of Social Network Sites in Developing Countries." Web2forDev: Web 2.0 for Development Gateway. N.p., 2009. Web. 6 May 2012. .
Webroot Inc, , ed. "New Webroot Survey Reveals Poor Password Practices That May Put Consumers ' Identities At Risk." Webroot. Webroot Inc., 2004-2012. Web. 6 May 2012. .
Zainudin, Norulzahrah M., Madjid Merabti, and David Llewellyn-Jones. "A Digital Forensic Investigation Model for Online Social Networking. "Liverpool John Moores University. LJMU, 2012. Web. 1 Apr 2012. .
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • cyber crime Essay
  • CYBER CRIME Essay
  • Essay on cyber crime
  • Social Network Service and Facebook Essay
  • Social Network Service and Facebook Essay
  • Essay about Cyber Crime
  • Religion Contributes to Social Order. Do You Agree? Essay
  • Social Network Service and Twitter Essay

Become a StudyMode Member

Sign Up - It's Free