1887
لظهور النص العربي بالشكل الصحيح، انقر على
ARأعلى الشاشة وتحويلها الى  EN 
Volume 2019, Issue 2
  • E-ISSN: 2616-4930

Abstract

لا شك أن الفيسبوك قد أحدث ثورة في طريقة تفاعل الناس وتواصلهم. ومع ذلك، فإن المجرمين يجدون طرقًا جديدة لاستخدام البيانات الضخمة في الفيسبوك لارتكاب الجرائم الإلكترونية؛ فموقع الفيسبوك وحده يجمع أكثر من 500 تيرابايت من المعلومات كل يوم. ومن هنا تهدف الدراسة الحالية إلى توضيح العلاقة بين الجرائم الإلكترونية وبيانات المستخدمين في الفيسبوك في ضوء الإحصائيات المتوفرة وكذلك آراء بعض الخبراء في مجال أمن المعلومات. كما تهدف الدراسة إلى التعرف على الطرق التقنية التي يستخدمها المجرمون للانتفاع بالبيانات الضخمة للفيسبوك في ارتكاب الجرائم الإلكترونية. كذلك استقصاء الآراء حول طرق حفظ خصوصية بياناتهم الشخصية على موقع الفيسبوك. استخدمت الدراسة المنهج النوعي حيث تم تحليل الإحصائيات المتعلقة بالجرائم الإلكترونية الصادرة من مركز السلامة المعلوماتية بهيئة تقنية المعلومات، إلى جانب إجراء مقابلات مع 30 خبيرا من في أمن المعلومات، وممن يستخدمون الفيسبوك بانتظام. أظهرت النتائج أن 70٪ من المشاركين يعتقدون أن هناك علاقة بين الجرائم الإلكترونية والاستفادة من المعلومات الشخصية لمستخدمي الفيسبوك. علاوة على ذلك، بدا أن أكثر من 66٪ من المشاركين يعتقدون بأن هناك قلق من قبل المستخدمين إزاء خصوصيتهم في الفيسبوك، ورغم ذلك يرى 33٪ فقط من المشاركين بأن مستخدمي الفيسبوك يقومون بتعيين إعدادات الخصوصية لحساباتهم في موقع الفيسبوك. وخلصت الدراسة إلى وجود حاجة إلى المزيد من الدراسات لفهم أسباب تزايد الجرائم الالكترونية، والحلول الجذرية لتقليل وتيرتها في المستقبل.

Facebook has revolutionized how people interact and communicate. However, criminals find new ways to use massive data on Facebook to commit cybercrimes. Facebook alone collects more than 500 terabytes of information daily. Hence this study aims to clarify the connection between cybercrimes and the accessible users' data on Facebook in light of the available statistics and the views of some information security experts. The study also aims to identify the technical methods used by cybercrime offenders of Facebook's Big Data and to survey the users views regarding their ways to protect the privacy of their personal data, This study used the qualitative approach, analysing cybercrimes statistics issued by the Information Technology Centre of the Omani Information Technology Authority, and conducted interviews with 30 experts in information security, and regular Facebook users. The results showed that 70% of respondents believe that there is a relationship between cybercrimes and the use of personal information of Facebook users. Moreover, more than 66% of respondents believe that users are concerned about their privacy on Facebook, yet only 33% of the respondents are managing the privacy settings of their accounts. The study concluded that further studies are needed to understand the root causes and solutions of cybercrimes in order to reduce their frequency in the future.

Loading

Article metrics loading...

/content/journals/10.5339/jist.2019.7
2019-09-30
2019-11-13
Loading full text...

Full text loading...

/deliver/fulltext/jist/2019/2/jist.2019.7.html?itemId=/content/journals/10.5339/jist.2019.7&mimeType=html&fmt=ahah

References

  1. Al Omoush KS, Yaseen SG, Alma'aitah MA. The impact of Arab cultural values on online social networking: The case of Facebook. Computers in Human Behavior. 2012; 28:6:23872399, DOI: http://doi.org/10.1016/j.chb.2012.07.010 .
    [Google Scholar]
  2. Al Swelmiyeen I, Al-Nuemat A. Facebook e-court : Online justice for online disputes. Computer Law & Security Review. 2017; 33:2:223236, DOI: http://doi.org/10.1016/j.clsr.2016.11.006 .
    [Google Scholar]
  3. Almakrami HAA. 2015;, Online self-disclosure across cultures: A study of Facebook use in Saudi Arabia and Australia. PhD Thesis. Queensland University of Technology, Australia.
  4. Al-Saggaf Y. An exploratory study of attitudes towards privacy in social media and the threat of blackmail: The views of a group of Saudi women. Electronic Journal of Information Systems in Developing Countries. 2016; 75:7:116.
    [Google Scholar]
  5. Al-Saggaf Y, Simmons P. Social media in Saudi Arabia: Exploring its use during two natural disasters. Technological Forecasting and Social Change. 2015; 95::315.
    [Google Scholar]
  6. Azernikov AD, Norkina AN, Myseva ER. Innovative technologies in combating cyber crime. III Network AML/CFT Institute International Scientific and Research Conference “FinTech and RegTech: Possibilities, Threats and Risks of Financial Technologies”, KnE Social Sciences . 2018;:248252. DOI: https://doi.org/10.18502/kss.v3i2.1550 .
    [Google Scholar]
  7. Baum K, Catalano S, Rand M, Rose K. Bureau of Justice Statistics Special Report Stalking victimization in the United States. Washington, DC: US Department of Justice 2009.
    [Google Scholar]
  8. Boyd DM. Facebook's privacy trainwreck: Exposure, invasion, and social convergence. International Journal of Research into New Media Technologies. 2008; 14:1:1320.
    [Google Scholar]
  9. Buchanan B. The cybersecurity dilemma: Hacking, trust, and fear between nations. :Oxford University Press 2016.
    [Google Scholar]
  10. Burke SC, Wallen M, Vail-Smith K, Knox D. Using technology to control intimate partners: An exploratory study of college undergraduates. Computers in Human Behavior. 2011; 27:3:11621167‏.
    [Google Scholar]
  11. Christofides E, Muise A, Desmarais S. Information disclosure and control on Facebook: Are they two sides of the same coin or two different processes? CyberPsychology & Behavior. 2009; 12:3:341345.
    [Google Scholar]
  12. Eterovic-soric B, Choo KR, Ashman H, Mubarak S. Stalking the stalkers – detecting and deterring stalking behaviours using technology. Computers & Security. 2017; 70::278289, DOI: https://doi.org/10.1016/j.cose.2017.06.008 .
    [Google Scholar]
  13. Grosskopf A. Online interactions involving suspected paedophiles who engage male children. Trends and Issues in Crime and Criminal Justice. 2010; 403::16.
    [Google Scholar]
  14. Helbing D, Balietti S. From social data mining to forecasting socio-economic crises. European Physical Journal Special Topics. 2011; 195::368, Retrieved from http://link.springer.com/content/pdf/10.1140%2Fepjst%2Fe2011-01401-8.pdf .
    [Google Scholar]
  15. Helbing D, Balietti S. 2013;, Big Data, privacy, and trusted web: What needs to be done? Retrieved from https://mpra.ub.uni-muenchen.de/49702/ .
  16. Hoven J. Information technology, privacy, and the protection of personal data. In: van den Hoven JWeckert J, eds. Information technology and moral philosophy. Cambridge: Cambridge University Press 2008;:301321.
    [Google Scholar]
  17. Ippolita. The Facebook Aquarium: The resistible rise of anarcho-capitalism. Amsterdam: Institute of Network Cultures 2015.
    [Google Scholar]
  18. Jayasekara AHD. Facebook users and undergraduates. International Journal of Scientific Research and Innovative Technology. 2015; 2:5:7885.
    [Google Scholar]
  19. Khanna A. Facebook's privacy incident response: A study of geolocation sharing on Facebook Messenger. Harvard Dataverse. 2015;, Retrieved from http://techscience.org/a/2015081101 .
    [Google Scholar]
  20. Kopecký K. Czech children and Facebook – A quantitative survey. Telematics and Informatics. 2016; 33::950958, DOI: http://doi.org/10.1016/j.tele.2016.02.008 .
    [Google Scholar]
  21. Laney D. 2001;, 3D data management: Controlling data volume, velocity and variety. META Group Research Note.
  22. Livingstone S. Taking risky opportunities in youthful content creation: Teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media & Society. 2008; 10:3:393411.
    [Google Scholar]
  23. Lomotey RK, Deters R. Towards knowledge discovery in Big Data. The 8th international symposium on service oriented system engineering. Oxford: IEEE Computer Society 2014, April;:181191.
    [Google Scholar]
  24. Martin KE. Ethical issues in the Big Data industry. MIS Quarterly Executive. 2015; 14:2:7487.
    [Google Scholar]
  25. Meloy JR. The psychology of stalking: Clinical and forensic perspectives. Cambridge, MA: Academic Press 2001.
    [Google Scholar]
  26. Moor JH. Towards a theory of privacy for the information age. In: Baird RMRamsower RRosenbaum SE, eds. Cyberethics: Moral, social, and legal issues in the computer age. Amherst, NY: Prometheus Books 2000;:200212.
    [Google Scholar]
  27. National Centre for Computer Security. 2017;, The cyber crime law. Retrieved from https://www.ita.gov.om/ITAPortal/MediaCenter/Document_detail.aspx?NID = 54 .
  28. Navied U, Rashid N, Sultan Q. Implication of Facebook usage on social behavior of teenagers in public and private institutes of Lahore. Biomedica. 2017; 33:1:1420.
    [Google Scholar]
  29. Nissenbaum H. Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford University Press 2010.
    [Google Scholar]
  30. Nosko A, Wood E, Molema S. All about me: Disclosure in online social networking profiles: The case of Facebook. Computers in Human Behavior. 2010; 26:3:406418.
    [Google Scholar]
  31. O'Keeffe GS, Clarke-Pearson K. The impact of social media on children, adolescents, and families. Pediatrics. 2011; 127:4:800804, DOI: http://doi.org/10.1542/peds.2011-0054 .
    [Google Scholar]
  32. Pew Research Center. 2014;, Online harassment. Retrieved from http://www.pewinternet.org/2014/10/22/online-harassment/ .
  33. Reinhalter L, Wittmann RJ. The library: Big Data's boomtown. Serials Librarian. 2014; 67:4:363372, DOI: http://doi.org/10.1080/0361526X.2014.915605 .
    [Google Scholar]
  34. Sar RK, Al-Saggaf Y. Contextual integrity's decision heuristic and the tracking by social network sites. Ethics and Information Technology. 2014; 16:1:1526.
    [Google Scholar]
  35. Sheridan LP, Blaauw E, Davies GM. Stalking: Knowns and unknowns. Trauma, Violence, & Abuse. 2003; 4:2:148162.
    [Google Scholar]
  36. Spitzberg BH, Cupach WR. The state of the art of stalking: Taking stock of the emerging literature. Aggression and Violent Behavior. 2007; 12:1:6486.
    [Google Scholar]
  37. Strasburger VC, Jordan AB, Donnerstein E. Children, adolescents, and the media: Health effects. Pediatric Clinics. 2012; 59:3:533587, DOI: http://dx.doi.org/10.1016/j.pcl.2012.03.025 .
    [Google Scholar]
  38. Tavani HT. Ethics and technology: Controversies, questions, and strategies for ethical computing. 4th ed. Hoboken, NJ: John Wiley 2013.
    [Google Scholar]
  39. Watney M. When does abuse of social media constitute a crime ? – A South African legal perspective within a global context. In: Reimer HPohlmann NSchneider W, eds. ISSE 2013 securing electronic business processes. Wiesbaden: Springer Vieweg DOI: http://doi.org/10.1007/978-3-658-03371-2  2013;:227238.
    [Google Scholar]
  40. Williams LY. “Who is the virtual” you and do you know who's watching you? In: Neal DR, ed. Social media for academics. Sawston, UK: Chandos 2012;:175192.
    [Google Scholar]
  41. Williamson K. Research methods for students, academics and professionals: Information management and systems. 2nd ed. Wagga Wagga, NSW: Centre for Information Studies 2002.
    [Google Scholar]
  42. Wilson C. 2010;, Feds: Online “sextortion” of teens on the rise. Associated Press. Retrieved from http://archive.boston.com/news/nation/articles/2010/08/14/feds_online_sextortion_of_teens_on_the_rise/ .
  43. Young K. Online social networking: An Australian perspective. International Journal of Emerging Technologies and Society. 2009; 7:1:3957.
    [Google Scholar]
http://instance.metastore.ingenta.com/content/journals/10.5339/jist.2019.7
Loading
/content/journals/10.5339/jist.2019.7
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error