Intelligent Data Analytics for Terror Threat Prediction. Группа авторов
Чтение книги онлайн.

Читать онлайн книгу Intelligent Data Analytics for Terror Threat Prediction - Группа авторов страница 11

Название: Intelligent Data Analytics for Terror Threat Prediction

Автор: Группа авторов

Издательство: John Wiley & Sons Limited

Жанр: Программы

Серия:

isbn: 9781119711513

isbn:

СКАЧАТЬ on them, and like them. This social network is available throughout the world and even enables users to create a YouTube channel where they can share all of their personal videos to show their friends and followers [3].

      Google +: The relatively new entrant to the social interaction marketplace is designed to allow users to establish communication circles with which they can communicate and which are integrated with other Google products [3].

      MySpace: Though it initially began as a general social media site, MySpace has evolved to focus on social entertainment, providing a venue for social connections related to movies, music games and more [3].

      Snapchat: This is social image messaging platform which allows you to chat with friends using pictures [3].

      Interface through social network sites between online users is one of the major common computer-based activities. Facebook is most a dominant platform over a short span of time for social interaction across the world. Even though it stays the largest social networking site, sites like YouTube, Twitter, Google+ and Sina Wiebo all have lively and busy user populations that maintain social interactions in their own ways, with new features springing up all the time. With the help of inventive research methods and theoretical case studies, inventors can better realize how these networks work and measures their influence on various kinds of social interactions as well as the associated risks and benefits. Like sharing information which can be useful to public without hurtling other communities, religions, or political parties, etc. and the other is where people may share abusive photos, videos or sensitive information about country. For more advantages and disadvantages see Ref. [4].

      1.3.1 Definition

      Cyber-crime is also called as computer-oriented crime, as this crime involves computer and network. It can be defined as “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)” [25].

      1.3.2 Types of Cyber-Crimes

      Nowadays, there are many ways that cyber-crimes may occur using computers and network [5]. Some of the cyber-crimes such as hacking, cyber bullying, buying illegal things and posting videos of criminal activity are explained in following subsections.

       1.3.2.1 Hacking

      Hacking is nothing but attacking/accessing devices like computers and mobiles without the permission of owner. It can be done by people called as hackers, who attack/access our systems without permission. Hackers are basically computer programmers who hack by intruding programmes called as virus into our systems. These viruses may steal our data like username, password, documents, files, etc. stored in computer [6]. Hacking is not limited to individual computers but can even damage computers which are in network, as well as username, password, information of emails, bank accounts, social networking sites, etc. So there is a need to concentrate on these attacks to prevent them and punish the culprit.

       1.3.2.2 Cyber Bullying

       1.3.2.3 Buying Illegal Things

      Buying illegal things like Bit coins and drugs belong under criminal activities in India and many other countries. So this is also a one of the cyber-crime that needs attention to prevent and find the source of user who bought those [6].

       1.3.2.4 Posting Videos of Criminal Activity

      Posting/sharing videos of criminal activities such as abused photos, videos, and disinformation on online social networks is also under cyber-crime [5]. There are some other activities like sharing security issues of country and posts against some religions and communities also falls under this cyber-crime.

      These are some popular cyber-crimes but are not limited to many others such as Denial-of-Service attack, Email bombing, spamming, Cyber stalking, etc. [6]. So there is a need to focus on these cyber-crimes and how to prevent and punish the culprits.

      1.3.3 Cyber-Crimes on Social Networks

      Nowadays, social networks like Facebook, Twitter, WhatsApp, Sina Wiebo, etc. are become very popular in sharing and diffusing any kind of digital information. But sharing all kinds of information is not legal in any social networks. If anyone is sharing illegal information in social networks then it is considered as cyber-crime. Some of the cyber-crimes on social networks are listed in the section below.

      1 A. Posting RumorsPosting/sharing any misinformation (unknown) or disinformation (wontedly wrong) is called as rumors. The diffusion of rumors is very fast comparing to the actual news in social networks [5]. Finding whether particular post content is rumor or not is a challenging task, and if it is a rumor, detecting the source of rumor is also becomes a big challenge to many people like government, police and experts who are working on social networks. Therefore, it is important to put more effort on how to control rumors in social networks and also detection of rumor source to punish them.

      2 B. Sharing Abusive Photos/VideosSharing any kind of abusive photo or video of anyone is illegal activity and treated as cyber-crime [6].

      3 C. Posting Comments Against Religions, Communities or Country

      4 D. Movie Release Online Without Permission.These are other occurring cyber-crimes in social networks but are not limited to these four important cyber-crimes. Whatever it may be, there is a need to prevent them and if anyone has done these, a need to find and punish them. In the next section, a discussion is given about how to detect whether a given data is rumor or fact-based on some classification algorithms.

      Rumor is a currently trending topic which contains an unverified content. This content may be either wrong information (misinformation) or intentionally wrong information (disinformation) [31]. Social media is capable of diffusing the information rapidly in the network as these rumors are also disseminated over the network. Some people may not know the difference between rumor and fact and may share the same rumor to other communities.