1887
Volume 2019, Issue 2
  • E-ISSN: 2616-4930

Abstract

لا شك أن الفيسبوك قد أحدث ثورة في طريقة تفاعل الناس وتواصلهم. ومع ذلك، فإن المجرمين يجدون طرقًا جديدة لاستخدام البيانات الضخمة في الفيسبوك لارتكاب الجرائم الإلكترونية؛ فموقع الفيسبوك وحده يجمع أكثر من 500 تيرابايت من المعلومات كل يوم. ومن هنا تهدف الدراسة الحالية إلى توضيح العلاقة بين الجرائم الإلكترونية وبيانات المستخدمين في الفيسبوك في ضوء الإحصائيات المتوفرة وكذلك آراء بعض الخبراء في مجال أمن المعلومات. كما تهدف الدراسة إلى التعرف على الطرق التقنية التي يستخدمها المجرمون للانتفاع بالبيانات الضخمة للفيسبوك في ارتكاب الجرائم الإلكترونية. كذلك استقصاء الآراء حول طرق حفظ خصوصية بياناتهم الشخصية على موقع الفيسبوك. استخدمت الدراسة المنهج النوعي حيث تم تحليل الإحصائيات المتعلقة بالجرائم الإلكترونية الصادرة من مركز السلامة المعلوماتية بهيئة تقنية المعلومات، إلى جانب إجراء مقابلات مع 30 خبيرا من في أمن المعلومات، وممن يستخدمون الفيسبوك بانتظام. أظهرت النتائج أن 70٪ من المشاركين يعتقدون أن هناك علاقة بين الجرائم الإلكترونية والاستفادة من المعلومات الشخصية لمستخدمي الفيسبوك. علاوة على ذلك، بدا أن أكثر من 66٪ من المشاركين يعتقدون بأن هناك قلق من قبل المستخدمين إزاء خصوصيتهم في الفيسبوك، ورغم ذلك يرى 33٪ فقط من المشاركين بأن مستخدمي الفيسبوك يقومون بتعيين إعدادات الخصوصية لحساباتهم في موقع الفيسبوك. وخلصت الدراسة إلى وجود حاجة إلى المزيد من الدراسات لفهم أسباب تزايد الجرائم الالكترونية، والحلول الجذرية لتقليل وتيرتها في المستقبل.

Facebook has revolutionized how people interact and communicate. However, criminals find new ways to use massive data on Facebook to commit cybercrimes. Facebook alone collects more than 500 terabytes of information daily. Hence this study aims to clarify the connection between cybercrimes and the accessible users' data on Facebook in light of the available statistics and the views of some information security experts. The study also aims to identify the technical methods used by cybercrime offenders of Facebook's Big Data and to survey the users views regarding their ways to protect the privacy of their personal data, This study used the qualitative approach, analysing cybercrimes statistics issued by the Information Technology Centre of the Omani Information Technology Authority, and conducted interviews with 30 experts in information security, and regular Facebook users. The results showed that 70% of respondents believe that there is a relationship between cybercrimes and the use of personal information of Facebook users. Moreover, more than 66% of respondents believe that users are concerned about their privacy on Facebook, yet only 33% of the respondents are managing the privacy settings of their accounts. The study concluded that further studies are needed to understand the root causes and solutions of cybercrimes in order to reduce their frequency in the future.

Loading

Article metrics loading...

/content/journals/10.5339/jist.2019.7
2019-09-30
2019-10-22
Loading full text...

Full text loading...

/deliver/fulltext/jist/2019/2/jist.2019.7.html?itemId=/content/journals/10.5339/jist.2019.7&mimeType=html&fmt=ahah

References

  1. Ackerman   S., , Schutte   K. . 2015; ; , Social media as a vector for cyber crime. Retrieved from https://www.isaca.org/chapters5/Cincinnati/Events/Documents/Past%20Presentations/2015/Social%20Media%20as%20Vector%20for%20Cyber%20Crime.pdf .
  2. Al Omoush   KS., , Yaseen   SG., , Alma'aitah   MA. . The impact of Arab cultural values on online social networking: The case of Facebook. . Computers in Human Behavior . 2012; ;28: 6 : 2387– 2399 , DOI: http://doi.org/10.1016/j.chb.2012.07.010 .
    [Google Scholar]
  3. Al Swelmiyeen   I., , Al-Nuemat   A. . Facebook e-court : Online justice for online disputes. . Computer Law & Security Review . 2017; ;33: 2 : 223– 236 , DOI: http://doi.org/10.1016/j.clsr.2016.11.006 .
    [Google Scholar]
  4. Almakrami   HAA. . 2015; ; , Online self-disclosure across cultures: A study of Facebook use in Saudi Arabia and Australia. PhD Thesis. Queensland University of Technology, Australia .
  5. Al-Saggaf   Y. . An exploratory study of attitudes towards privacy in social media and the threat of blackmail: The views of a group of Saudi women. . Electronic Journal of Information Systems in Developing Countries . 2016; ;75: 7 : 1– 16 .
    [Google Scholar]
  6. Al-Saggaf   Y., , Simmons   P. . Social media in Saudi Arabia: Exploring its use during two natural disasters. . Technological Forecasting and Social Change . 2015; ;95: : 3– 15 .
    [Google Scholar]
  7. Azernikov   AD., , Norkina   AN., , Myseva   ER. . Innovative technologies in combating cyber crime. . III Network AML/CFT Institute International Scientific and Research Conference “FinTech and RegTech: Possibilities, Threats and Risks of Financial Technologies”, KnE Social Sciences . 2018; ; : 248– 252 . DOI: https://doi.org/10.18502/kss.v3i2.1550 .
    [Google Scholar]
  8. Baum   K., , Catalano   S., , Rand   M., , Rose   K. . Bureau of Justice Statistics Special Report   Stalking victimization in the United States . Washington, DC: : US Department of Justice;   2009; .
    [Google Scholar]
  9. Boyd   DM. . Facebook's privacy trainwreck: Exposure, invasion, and social convergence. . International Journal of Research into New Media Technologies . 2008; ;14: 1 : 13– 20 .
    [Google Scholar]
  10. Buchanan   B. . The cybersecurity dilemma: Hacking, trust, and fear between nations. : Oxford University Press;   2016; .
    [Google Scholar]
  11. Burke   SC., , Wallen   M., , Vail-Smith   K., , Knox   D. . Using technology to control intimate partners: An exploratory study of college undergraduates. . Computers in Human Behavior . 2011; ;27: 3 : 1162– 1167‏ .
    [Google Scholar]
  12. Christofides   E., , Muise   A., , Desmarais   S. . Information disclosure and control on Facebook: Are they two sides of the same coin or two different processes?.   CyberPsychology & Behavior . 2009; ;12: 3 : 341– 345 .
    [Google Scholar]
  13. Eterovic-soric   B., , Choo   KR., , Ashman   H., , Mubarak   S. . Stalking the stalkers – detecting and deterring stalking behaviours using technology. . Computers & Security . 2017; ;70: : 278– 289 , DOI: https://doi.org/10.1016/j.cose.2017.06.008 .
    [Google Scholar]
  14. Grosskopf   A. . Online interactions involving suspected paedophiles who engage male children. . Trends and Issues in Crime and Criminal Justice . 2010; ;403: : 1– 6 .
    [Google Scholar]
  15. Helbing   D., , Balietti   S. . From social data mining to forecasting socio-economic crises. . European Physical Journal Special Topics . 2011; ;195: : 3– 68 , Retrieved from http://link.springer.com/content/pdf/10.1140%2Fepjst%2Fe2011-01401-8.pdf .
    [Google Scholar]
  16. Helbing   D., , Balietti   S. . 2013; ; , Big Data, privacy, and trusted web: What needs to be done? Retrieved from https://mpra.ub.uni-muenchen.de/49702/ .
  17. Hoven   J. . Information technology, privacy, and the protection of personal data. . In: van den Hoven   J., Weckert   J. , eds. Information technology and moral philosophy . Cambridge: : Cambridge University Press;   2008; ; : 301– 321 .
    [Google Scholar]
  18. Ippolita . The Facebook Aquarium: The resistible rise of anarcho-capitalism . Amsterdam: : Institute of Network Cultures;   2015; .
    [Google Scholar]
  19. Jayasekara   AHD. . Facebook users and undergraduates. . International Journal of Scientific Research and Innovative Technology . 2015; ;2: 5 : 78– 85 .
    [Google Scholar]
  20. Khanna   A. . Facebook's privacy incident response: A study of geolocation sharing on Facebook Messenger. . Harvard Dataverse . 2015; ; , Retrieved from http://techscience.org/a/2015081101 .
    [Google Scholar]
  21. Kopecký   K. . Czech children and Facebook – A quantitative survey. . Telematics and Informatics . 2016; ;33: : 950– 958 , DOI: http://doi.org/10.1016/j.tele.2016.02.008 .
    [Google Scholar]
  22. Laney   D. . 2001; ; , 3D data management: Controlling data volume, velocity and variety. META Group Research Note .
  23. Livingstone   S. . Taking risky opportunities in youthful content creation: Teenagers’ use of social networking sites for intimacy, privacy and self-expression. . New Media & Society . 2008; ;10: 3 : 393– 411 .
    [Google Scholar]
  24. Lomotey   RK., , Deters   R. . Towards knowledge discovery in Big Data. The 8th international symposium on service oriented system engineering . Oxford: : IEEE Computer Society;   2014, April; ; : 181– 191 .
    [Google Scholar]
  25. Martin   KE. . Ethical issues in the Big Data industry. . MIS Quarterly Executive . 2015; ;14: 2 : 74– 87 .
    [Google Scholar]
  26. Meloy   JR. . The psychology of stalking: Clinical and forensic perspectives . Cambridge, MA: : Academic Press;   2001; .
    [Google Scholar]
  27. Moor   JH. . Towards a theory of privacy for the information age. . In: Baird   RM., Ramsower   R., Rosenbaum   SE. , eds. Cyberethics: Moral, social, and legal issues in the computer age . Amherst, NY: : Prometheus Books;   2000; ; : 200– 212 .
    [Google Scholar]
  28. National Centre for Computer Security . 2017; ; , The cyber crime law. Retrieved from https://www.ita.gov.om/ITAPortal/MediaCenter/Document_detail.aspx?NID = 54 .
  29. Navied   U., , Rashid   N., , Sultan   Q. . Implication of Facebook usage on social behavior of teenagers in public and private institutes of Lahore. . Biomedica . 2017; ;33: 1 : 14– 20 .
    [Google Scholar]
  30. Nissenbaum   H. . Privacy in context: Technology, policy, and the integrity of social life . Stanford, CA: : Stanford University Press;   2010; .
    [Google Scholar]
  31. Nosko   A., , Wood   E., , Molema   S. . All about me: Disclosure in online social networking profiles: The case of Facebook. . Computers in Human Behavior . 2010; ;26: 3 : 406– 418 .
    [Google Scholar]
  32. O'Keeffe   GS., , Clarke-Pearson   K. . The impact of social media on children, adolescents, and families. . Pediatrics . 2011; ;127: 4 : 800– 804 , DOI: http://doi.org/10.1542/peds.2011-0054 .
    [Google Scholar]
  33. Pew Research Center . 2014; ; , Online harassment. Retrieved from http://www.pewinternet.org/2014/10/22/online-harassment/ .
  34. Reinhalter   L., , Wittmann   RJ. . The library: Big Data's boomtown. . Serials Librarian . 2014; ;67: 4 : 363– 372 , DOI: http://doi.org/10.1080/0361526X.2014.915605 .
    [Google Scholar]
  35. Sar   RK., , Al-Saggaf   Y. . Contextual integrity's decision heuristic and the tracking by social network sites. . Ethics and Information Technology . 2014; ;16: 1 : 15– 26 .
    [Google Scholar]
  36. Sheridan   LP., , Blaauw   E., , Davies   GM. . Stalking: Knowns and unknowns. . Trauma, Violence, & Abuse . 2003; ;4: 2 : 148– 162 .
    [Google Scholar]
  37. Spitzberg   BH., , Cupach   WR. . The state of the art of stalking: Taking stock of the emerging literature. . Aggression and Violent Behavior . 2007; ;12: 1 : 64– 86 .
    [Google Scholar]
  38. Strasburger   VC., , Jordan   AB., , Donnerstein   E. . Children, adolescents, and the media: Health effects. . Pediatric Clinics . 2012; ;59: 3 : 533– 587 , DOI: http://dx.doi.org/10.1016/j.pcl.2012.03.025 .
    [Google Scholar]
  39. Tavani   HT. . Ethics and technology: Controversies, questions, and strategies for ethical computing . , 4th ed..   Hoboken, NJ: : John Wiley;   2013; .
    [Google Scholar]
  40. Watney   M. . When does abuse of social media constitute a crime ? – A South African legal perspective within a global context. . In: Reimer   H., Pohlmann   N., Schneider   W. , eds. ISSE 2013 securing electronic business processes . Wiesbaden: : Springer Vieweg;   DOI: http://doi.org/10.1007/978-3-658-03371-2   2013; ; : 227– 238 .
    [Google Scholar]
  41. Williams   LY. . “Who is the virtual” you and do you know who's watching you?. In: Neal   DR. , ed. Social media for academics . Sawston, UK: : Chandos;   2012; ; : 175– 192 .
    [Google Scholar]
  42. Williamson   K. . Research methods for students, academics and professionals: Information management and systems . , 2nd ed..   Wagga Wagga, NSW: : Centre for Information Studies;   2002; .
    [Google Scholar]
  43. Wilson   C. . 2010; ; , Feds: Online “sextortion” of teens on the rise. Associated Press. Retrieved from http://archive.boston.com/news/nation/articles/2010/08/14/feds_online_sextortion_of_teens_on_the_rise/ .
  44. Young   K. . Online social networking: An Australian perspective. . International Journal of Emerging Technologies and Society . 2009; ;7: 1 : 39– 57 .
    [Google Scholar]
http://instance.metastore.ingenta.com/content/journals/10.5339/jist.2019.7
Loading
/content/journals/10.5339/jist.2019.7
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error