Received:
2017-06-17 | Accepted:
2017-10-20 | Published:
2017-12-29
Title
Userfocus - tool for criminality control of social networks at both the local and international level
Abstract
There are many benefits, but also risks related to using the social networks. Among the benefits of social networking belong an easy way to be kept in touch, sharing news, photos, videos and statuses with friends, colleagues, but also meeting new people with similar interests. The risks include, in particular, loss of privacy, misuse of shared records, abuse of personal data, unknown real identity of social network members, and even addiction on social networking. The paper focuses the need to invent a complex tool of prevention in the field of controling the criminality in particular the users of social networks. In the papers is introduced a proposals how to develop a specific prevention tool called "Userfocus". Further, there are described techniques to implement this tool into the social networks. The work comprises a research (questionnaire survey) aimed at users of social networks and their understanding of prevention in social networks. The results showed that the communication (interaction) among social network users is a main reason to actively use those services, loss of privacy is the most negative aspect of social networking, the perceiving of users related to the fight against anti-social networks is mostly negative, they strongly agree with the necessity to apply preventive methods focusing the user of social networks and consider the developing the preventive techniques and their application by competent authorities in prevention of crime on social network.
Keywords
social network infiltration, Userfocus, profile, intervention, anonymity, security
JEL classifications
K14
, C88
URI
http://jssidoi.org/jesi/article/151
DOI
HAL
Pages
297-314
This is an open access issue and all published articles are licensed under a
Creative Commons Attribution 4.0 International License
Journal title
Entrepreneurship and Sustainability Issues
Volume
5
Number
2
Issue date
December 2017
Issue DOI
ISSN
ISSN 2345-0282 (online)
Publisher
VšĮ Entrepreneurship and Sustainability Center, Vilnius, Lithuania
Cited
Article views & downloads
HTML views: 3698 | PDF downloads: 1918
References
Akatyev, N., James, J.I. 2015. Cyber peacekeeping. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST 157, pp. 126–139. https://doi.org/10.1007/978-3-319-25512-5_10
Search via ReFindit
Bihariová, I. 2012. Cyber hate – nenávisť na internete. [Cyber hate - hate on Internet]. Available on the Internet http://www.beznenavisti.sk/wp-content/themes/beznenavisti/podklady-a-materialy/Cyberhate-Nenavist-na-internete.pdf
Search via ReFindit
Brantingham, P.J., Faust, F.L. 1976. A conceptual model of crime prevention. Crime and Delinquency, 22(3): 290.
Search via ReFindit
Clancey, G. 2014. Thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy. University of Sydney – Faculty of Law.
Search via ReFindit
Guštafík P. 2016. Gamifikácia vo vzdelávaní: čo to je, ako na ňu, a prečo o ňu usilovať? [Gamification in education: what it is how to on it, and why seeking it?]. Available on the Internet: http://www.pdcs.sk/sk/blog/gamification-vo-vzdelavani.html
Search via ReFindit
Krejčí, V. 2010. Kyberšikana. [Cyberbullying]. Available on the Internet: http://www.e-nebezpeci.cz/ke-stazeni/materialy-pro-studium-studie-atd?download=11:kyberikana-studie-krejci
Search via ReFindit
Meteňko, J. et al. 2004. Kriminalistické metódy a možnosti kontroly sofistikovanej kriminality [Investigative techniques and sophisticated options to control crime]. Bratislava: Akadémia Policajného zboru.
Search via ReFindit
Moustafa, A., Al-Shomrani, M. M., Al-Marghirani, A., Al-Rababah, A. A. 2013. Hacking and cyber crimes: A preventive guide. Journal of Engineering and Applied Sciences, Vol. 8 (7), p. 225-229.
Search via ReFindit
Perina, T. 2011. Sociálne siete a ich využitie v marketingu. [Social networks and their use in marketing]. Trenčín: Vysoká škola manažmentu v Trenčíne.
Search via ReFindit
Sadhukhan, K., Mallari, R.A., Yadav, T. 2015. Cyber Attack Thread: A control-flow based approach to deconstruct and mitigate cyber threats, International Conference on Computing and Network Communications, CoCoNet 2015, art. no. 7411183, pp. 170-178.
Search via ReFindit
Sekgwathe, V., Talib, M. 2011. Cyber crime detection and protection: Third world still to cope-up. 2011. Communications in Computer and Information Science, 171 CCIS, pp. 171-181.
Search via ReFindit
Šišulák, S., Šalmík, M. 2013. Cyberbullying ako forma zneužitia sociálnych sietí na internete [Cyberbullying as a form of abuse of social networking on the internet], Policajná teória a prax. 21(4), pp. 112-123.
Search via ReFindit
Smyth, S. M. 2005. Crime prevention and community safety: From realspace to cyberspace (MR07360). ProQuest Central; ProQuest Dissertations & Theses A&I.
Search via ReFindit
Somer, T., Hallaq, B., Watson, T. 2016. Utilising journey mapping and crime scripting to combat cyber crime. Proceedings of the European Conference on Information Warfare and Security (ECCWS), January 2016, pp. 276-281.
Search via ReFindit
Tomková, J. 2016. Adolescenti a negatívne zážitky na internete. Kyberšikanovanie. [Adolescents and negative experiences on the internet. Cyberbullying]. Available on the Internet: http://www.prevenciasikanovania.sk/
Search via ReFindit
Vnouček, P. 2010. Facebookový vrah má doživotí. Sociální síť sklízí kritiku [The Facebook murderer has life. Social network reaps criticism], Týden. Available on the Interne: http://www.tyden.cz/rubriky/media/internet/facebookovy-vrah-ma-dozivoti-socialni-sit-sklizi-kritiku_161662.html
Search via ReFindit
Wasserman, S., Faust, K. 1994. Social Network Analysis: Methods and Applications. Cambridge: Cambridge University Press.
Search via ReFindit