Identity Theft and Social Networks

2017 ◽  
pp. 88-109 ◽  
Temida ◽  
2013 ◽  
Vol 16 (1) ◽  
pp. 151-162
Author(s):  
Vida Vilic

Global social networks contributed to the creation of new, inconspicuous, technically perfect shape of criminality which is hard to suppress because of its intangible characteristics. The most common forms of virtual communications? abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. Cyberstalking is defined as persistent and targeted harassment of an individual by using electronic communication. The victim becomes insecure, frightened, intimidated and does not figure out the best reaction which will terminate the harassment. The aim of this paper is to emphasize the importance and necessity of studying cyberstalking and to point out its forms in order to find the best ways to prevent this negative social phenomenon. Basic topics that will be analyzed in this paper are the various definitions of cyberstalking, forms of cyberstalking, and the most important characteristics of victims and perpetators.


2015 ◽  
Vol 31 (3) ◽  
pp. 1069 ◽  
Author(s):  
Maite Garaigordobil

The study aimed to analyze changes with age in cyberbullying. The sample comprised 3,026 participants from the Basque Country, aged from 12 to 18 years. The Cyberbullying Test was administered to assess the frequency with which 15 behaviors had been received, performed and observed during the past year, and to identify 4 psychometric indicators: victimization, perpetration, observation, and aggressive victimization. The results showed: 1) Similar percentages of victims from 12 to 18 years in the 15 conducts; 2) An increase of aggressors with age in 5 conducts (broadcasting private photos, blackmailing-threatening, sexual harassment, stealing a password, death threats); 3) An increase of observers with age in 12 conducts (sending offensive messages, offensive calls, broadcasting private photos/videos, taking photos in dressing rooms/beach… to humiliate; anonymous frightening calls, identity theft, stealing a password, rigging photos to humiliate, isolating on social networks, blackmail to obligate to do something, death threats, slandering/spreading rumors); and 4) An increase with age of the average of aggressive conducts performed by the aggressors and seen by the observers.  The study provides information on the significant prevalence of cyberbullying during adolescence and youth. The discussion focuses on the need to implement psychoeducational intervention programs to prevent peer violence.


2014 ◽  
Author(s):  
Constantin SPÂNU

Social networking sites such as Facebook and Twitter have gained more popularity in recent years. Because of its large user base, and large amount of information, they become a potential channel for attackers to exploit. Many social networking sites try to prevent those exploitations, but many attackers are still able to overcome those security countermeasures by using different techniques. Social network users may not be aware of such threats. Therefore, this paper will present a survey on different privacy and security issues in online social networks. The issues include privacy issues, identity theft, social networks spam, social networks malware, and physical threats. Social network privacy issues, social network security issues, social network threats, identity Theft, social network spam, social network malware, Facebook worms, Twitter Worms.


2014 ◽  
Vol 41 (5) ◽  
pp. 2345-2352 ◽  
Author(s):  
Bing-Zhe He ◽  
Chien-Ming Chen ◽  
Yi-Ping Su ◽  
Hung-Min Sun

Author(s):  
Pragati Dnyaneshwar Bharsakle

In the current era of massive knowledge, high volumes of valuable knowledge is simply collected and generated. Social networks square measure samples of generating sources of those huge knowledge. Users in these social networks square measure usually coupled by some interdependency like friendly relationship. As these huge social networks continue to grow, there square measure things during which Associate in Nursing individual user needs to seek out common teams of friends so he will suggest a similar teams to alternative users. Many users of social Network are not aware about the number of security risks in networks such as identity theft, privacy violations, sexual harassment etc,. Recent studies says that most of the social network users expose their personal information like their date of birth, email address, phone number, relationship status. If this type of data reached to the wrong person, then person used that information to harm the users. If the children are users of social network, then these risks become serious. In this paper we present an alternative data analytic solution by using pattern matching solution.


Sign in / Sign up

Export Citation Format

Share Document