0% found this document useful (0 votes)
61 views

Case Studies of Cybercrime and Its Impact To Social Media Users

This document discusses case studies of cybercrime and its impact on social media users. It begins with an introduction that defines cybercrime and discusses common types like fraud, child pornography, intellectual property theft, and privacy violations. The background section then notes that cybercrime has always concerned internet users and businesses, and discusses common attacks like viruses, spam emails, Trojans, phishing, and carding. It also explains how botnets and spambots have enabled more rapid and widespread cybercriminal activity.

Uploaded by

martin james
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views

Case Studies of Cybercrime and Its Impact To Social Media Users

This document discusses case studies of cybercrime and its impact on social media users. It begins with an introduction that defines cybercrime and discusses common types like fraud, child pornography, intellectual property theft, and privacy violations. The background section then notes that cybercrime has always concerned internet users and businesses, and discusses common attacks like viruses, spam emails, Trojans, phishing, and carding. It also explains how botnets and spambots have enabled more rapid and widespread cybercriminal activity.

Uploaded by

martin james
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CASE STUDIES OF CYBERCRIME AND ITS IMPACT TO SOCIAL MEDIA USERS

INTORDUCTION:

Cybercrime, also called computer crime, the use of a computer as an instrument

to further illegal ends, such as committing fraud, trafficking in child pornography

and intellectual property, stealing identities, or violating privacy. Jaishankar is the

Founding Father of the academic discipline Cyber Criminology and he coined and

defined Cyber Criminology as “the study of causation of crimes that occur in the

cyberspace and its impact in the physical space”. Most cybercrime uses some form of

malware or another, which can infect your computer, pilfer through your personal data in

search of info for identity theft, and lock up your files and demand money for their

release.

BACKGROUND

Cybercrime had always been a concern to Internet users and businesses. It was

defined as criminal action that uses or targets computers. There were many kinds of

cyber-attacks such as viruses, spam emails, Trojan, phishing, and carders. The purpose

of these attacks ranged from stealing confidential information to cyber terrorism.

Unfortunately, the frequency of cybercrime activities had increased over the years.

Advanced technologies were used by the cybercriminals to ease their actions. One of

these was the one that was called bot. defined bots as autonomous programs that do

some actions automatically, and botnets as networks of autonomous programs that act

on instructions. Botnets provided convenience for the cybercriminals that they did not

have to do the work by themselves and for the rapid rate of actions. Barmasters
(designers of botnet) were reported to make a lot of money by offering their botnet

services. Web spambot was a specific variant of bot which was used to spread spam

contents on the web. According to, the global spam rate in 2010 averaged 89.1% and

spambots were responsible for the 88.2% of all spam. Such high rate of spam created

problems for Internet users and businesses. Recently spam also targets community

websites such as social networking sites, blogs, wikis, and online forums. A website full

of spam annoyed its visitors. To make things worse, some of those spam contents were

designed for phishing purpose which was harmful to the users. Internet businesses 2

also suffered from spam that their precious resources were wasted by unsolicited

contents. Moreover, it also damaged the businesses’ reputation. A number of solutions

were proposed to fight spam, either by prevention or detection. Unfortunately, most of

those techniques were focusing on the spam content, not on the source, which were not

very effective as the spammers could easily change or modify the content to bypass the

security. This research proposed a solution to detect bots by observing web navigation

behavior. The technique used aimed to stop spam dissemination from its source

directly, the bots, which some other spam filtering techniques did not do. Nowadays

cybercrime or cyberbullying is very rampant in our current time. Activity like personal

identity theft is the most common cybercrime activity. Cyber criminals use other

person’s identity to fool other person for many reasons like to gain money, for self-

satisfaction, for sexual purposes, and maybe just to make their self to feel satisfied

when they commit this insane activity.

UNKNOWN PROBLEM

You might also like