Case Studies of Cybercrime and Its Impact To Social Media Users
Case Studies of Cybercrime and Its Impact To Social Media Users
INTORDUCTION:
Founding Father of the academic discipline Cyber Criminology and he coined and
defined Cyber Criminology as “the study of causation of crimes that occur in the
cyberspace and its impact in the physical space”. Most cybercrime uses some form of
malware or another, which can infect your computer, pilfer through your personal data in
search of info for identity theft, and lock up your files and demand money for their
release.
BACKGROUND
Cybercrime had always been a concern to Internet users and businesses. It was
defined as criminal action that uses or targets computers. There were many kinds of
cyber-attacks such as viruses, spam emails, Trojan, phishing, and carders. The purpose
Unfortunately, the frequency of cybercrime activities had increased over the years.
Advanced technologies were used by the cybercriminals to ease their actions. One of
these was the one that was called bot. defined bots as autonomous programs that do
some actions automatically, and botnets as networks of autonomous programs that act
on instructions. Botnets provided convenience for the cybercriminals that they did not
have to do the work by themselves and for the rapid rate of actions. Barmasters
(designers of botnet) were reported to make a lot of money by offering their botnet
services. Web spambot was a specific variant of bot which was used to spread spam
contents on the web. According to, the global spam rate in 2010 averaged 89.1% and
spambots were responsible for the 88.2% of all spam. Such high rate of spam created
problems for Internet users and businesses. Recently spam also targets community
websites such as social networking sites, blogs, wikis, and online forums. A website full
of spam annoyed its visitors. To make things worse, some of those spam contents were
designed for phishing purpose which was harmful to the users. Internet businesses 2
also suffered from spam that their precious resources were wasted by unsolicited
those techniques were focusing on the spam content, not on the source, which were not
very effective as the spammers could easily change or modify the content to bypass the
security. This research proposed a solution to detect bots by observing web navigation
behavior. The technique used aimed to stop spam dissemination from its source
directly, the bots, which some other spam filtering techniques did not do. Nowadays
cybercrime or cyberbullying is very rampant in our current time. Activity like personal
identity theft is the most common cybercrime activity. Cyber criminals use other
person’s identity to fool other person for many reasons like to gain money, for self-
satisfaction, for sexual purposes, and maybe just to make their self to feel satisfied
UNKNOWN PROBLEM