Chapter One: Introduction
Background
The social networking platform has undergone various changes since the introduction of Facebook on the internet. It offered a platform for all people across the world to interact freely and make new friends. Different organizations as well got an opportunity to sell their services and products to a wide number of customers on the platform. Due to the excitement of the public, they people began to post information carelessly without paying attention to the audience that is capable of reading it. As a result, cybercrime thrived slowly through manipulation of technology. Therefore, the cybercriminals have over time been innovating new ways, to ruin people through hacking their accounts, spreading pornography and other internet vices. Although Facebook intended to improve global relationship and interactions, cybercrime has posed major threats to its objective.
Facebook was founded by Mark Zuckerberg in 2004 ( Hempel & Kowitt, 2009) . He studied at Harvard University and had the intention to bring people together across the world to share their different experiences. He also intended Facebook to make the world a global village at no cost. Today, Facebook is the leading social network platform on the internet, having the highest number of followers as compared to Twitter, Instagram, telegram, and WhatsApp among others. As a result, it has made it prone to phishers and scammers. Thus, the Facebook users are likely to fall into the hands of these scammers now and then. It has commanded a high membership population with its technological advantages as people can chat, write on each other’s virtual wall, send an email and join various social groups on Facebook. It has therefore strengthened communication by offering its affiliates with a centralized social hub on the internet. It has also allowed individuals and companies to market their skills and their products. With all these advantages, it has attracted malicious people, who conduct evil activities on the unsuspecting innocent Facebook users.
Delegate your assignment to our experts and they will do the rest.
Cybercrime is a type of criminal activity that is conducted on the internet through computer network system (Wright, 2017) . Although cybercrime is popular on the computer devices, there are cases of cybercrime reported over the mobile devices. Therefore, both computer and mobile phone owners are all at the risk of falling victim of cybercrime. The cybercriminals have taken advantage of the anonymity of the internet. As well, they work to understand the details of the modern technology to enable them to conduct their malicious activities. Therefore, it has become difficult to track them down despite the existence of technology intelligence organizations. The cybercriminals can hack even bank accounts and get away with the money from customers of different banks. Also, it has become difficult to post some form of information on the internet, due to the fear of being misused.
The U.N had characterized cybercrime into the following categories:
Computer espionage
Unauthorized access
Interference of computer data and programs
Disruption of the functioning system of computer
Unlawful capturing of data from, to and within a network.
Statement of the Problem
The internet and mass media reveal that social media networks are growing speedily, while the dangers related to these sites are equally increasing. The problem might continue to worsen if the platform is not solved. Cybercriminals target Facebook, in particular, to manage to capture vast information as exposed by individuals and organizations. Therefore, the Facebook administrators are familiar with the vice; hence they try to inform their users of such malicious activities.
Objective of the Study
The research study will be directed by three goals, which are discussed below:
To educate people on the possible risks, they may encounter on the social media while carelessly posting sensitive information
To offer an understanding of how cybercrime can be regulated on the cyberspace
To educate people on the crimes that take place on the cyberspace
Hypothesis
The research study aims to determine whether:
The growth and development of social media networks has led to advent of cybercrime
Criminals have moved to social networks since they attract attention of many people
The anonymity of internet has led to the increase of cybercriminals
Many social media users have become victims of cybercrime
Significance of the Study
The research study is intended to determine the extent that social media platforms primarily Facebook have contributed to the spread of cybercrime. Furthermore, the study is designed to give findings that will help people to become careful while posting their personal information on social platforms.
Scope and Limitations of the Study
Many platforms have proven to encourage the spread of cybercrime. However, this study will focus on the social media networks, which has become the primary focus of criminals across the globe. The criminals work effortlessly to maneuver through the social media sites with the help of modern technology. Facebook has registered the highest number of users, thus becoming the main target of cyber criminals (Morales, 2018) . Facebook has millions of users across the globe, but this research study will be limited to Chicago, U.S. The study assumes that the experiences that the Facebook users have in Chicago are the same as other users across the globe. Through the finding of the study, it is expected that the collected data will reflect the experiences (including cybercrime) of Facebook users not only in the U.S but also in the other parts of the world.
Definition of terms
Coding : a systematic method of condensing sets of data into smaller units that can be easily analyzed through the creation of concepts and categories drawn from the data.
Cybercrime: It is a type of crime committed using computer and internet networks to disrupt the systems through the use of malicious programs to hack information on the cyberspace.
Cyber criminal : a person who performs malicious activities on the internet by interfering with computer systems to acquire unauthorized data and misusing it for his/her benefit.
Cyberspace: It is an electronic platform of computer and internet networks where online communication usually takes place.
Facebook: It is a social media website that was launched in 2004, and it is operated by Facebook, Inc.
Sophos: a company that is owned privately that develops security hardware and software such as anti-virus, anti-spam, anti-spyware and encryption software among other gateways of networks.
Twitter : A social media website that is run by a Twitter Inc.
UNLV : University of Nevada, Las Vegas
Limitations and Delimitations of the Study
The research study will be handicapped by a vast scope of the problem, a limited budget and the widespread of Facebook, which will be addressed in the following techniques:
The limited budget will not result in the partial study since funding will be sought from businesses and academic institutions to meet the required budget.
The research study will focus on experiences by victims of cybercrime, despite the widespread of experiences faced by Facebook users.
The study is intended to draw some general conclusions on the area of study.
Chapter Two: Literature Review
The social network websites have become the target of spam, phishing, and malware, as reported in a security threat report in 2011 by Sophos. The report revealed that scammers and cybercriminals were trained in conducting criminal activities on social networks such as Twitter and Facebook. According to Sophos, two-thirds of social media users complained about cybercrime in the year 2009 ( Kritzinger & von Solms, 2010) . The number of complaints had doubled compared to the number of criminal activities on the cyberspace that had been reported in the previous two years. Richard Wang, the Sophos manager, Labs U.S observed that there were increased malicious activities on the social networking sites. As a result, Facebook is struggling to keep up with the threats posed by spammers and cybercriminals.
According to research, most of the social networking activities take place in the working areas. Thus, 59% of the participants of the survey believe that the employees can risk the corporate security through these social networking activities. As well, 57% participants of the survey agree that most people are sharing much information on their social platforms concerning the organizations where they work. Additionally, 82% of them feel that Facebook is a significant threat to the security of institutions. In total, the number of threats realized in 2009 and 2010 was at the same level, despite the increase in social networking activities.
The research study will seek to identify the contributions of Facebook to the alarming rate of cyberspace crime, which has been the second threat after viruses ( Vincent, 2017) . Apart from bringing up the contributions of the social network, the study will show how users have contributed indirectly to criminal activities in the social media by exposing their information carelessly. It is evident that Facebook and other social networking sites have made significant contributions to the increase of cybercrime. However, there is no information given anywhere to prove that they are the source of these malicious activities. Therefore, this study will establish the correct report, based on relevant sources.
Chapter 3: Research Methodology
Research Design
The research study will be done through a questionnaire survey executed by the group members of the study team. Pertinent issues that may arise during the survey will be addressed through exploratory questions to the interviewees by the group members.
Target Population
The intended population will be Facebook users in Chicago, which is one of the popular states in the United States. The target population age is between 17 years to 35 years.
Sampling Procedures
Simple random sampling will be used in the drawing of the sample of the study
Data Collection
The data will be collected using questionnaires directly from the respondents
Data Analysis and Interpretation
The group members win the study team will edit the results to ensure that all data is accurate. All questionnaires with at least 25% blanks will be nullified. Data will then be typed to enable computer analysis. The data will be categorized into classes that are mutually exclusive, which include religion, age, and gender. Data analysis will be done through regression analysis, descriptive statistics, chi-square, and t-test. The major measures of tendencies will as well be used which as mean, mode, and medium.
The data categories will be explored and described by use of charts, graphs, cross tabulation, calculating mean and using standard deviations. An advanced technique of modeling will be used to develop complex explanations on the relationship between questions and the results generated.
Furthermore, qualitative analysis will be used in the description and summarizing the reports received from respondents. Also, the findings will be recorded in documentation to either prove or disapprove the hypothesis. The results also will help in drawing up the conclusions and recommendations.
Chapter Four: Work Plan
Work Plan and Budget
The study will be conducted in five months’ time starting from June 2018, as illustrated in table 4.1. The budget of the study is shown in table 4.2.
Table 4.1 Work Plan
Period | Activity |
February-May, 2018 | Preparing, presenting and defending the proposal |
June 2018 | Collecting data |
August-September, 2018 | Analyzing the data |
October 2018 | Compiling the report |
November 2018 | Typing and printing the report |
January 2019 | Presenting the report |
February 2019 | Defending the report |
March 2019 | Publishing the report |
Table 4.2 Budget
Item | Unit Cost ($) | Total ( $) |
Hire a car for one month | 1000 |
1, 000 |
Fuel |
4000 |
4, 000 |
Accommodation for two people one month |
500 |
500 |
Typing and printing |
100 |
100 |
Stationery |
200 |
200 |
Upkeep and allowance |
1000 |
1, 000 |
Total |
6, 800 |
References
Abraham, S., & Chengalur-Smith, I. (2010). An overview of social engineering malware: Trends, tactics, and implications. Technology in Society , 32 (3), 183-196.
Hempel, J., & Kowitt, B. (2009). How Facebook is taking over our lives. Fortune International , 159 (4), 34-41.
Kritzinger, E., & von Solms, S. H. (2010). Cybersecurity for home users: A new way of protection through awareness enforcement. Computers & Security , 29 (8), 840-847.
Morales, K. E. (2018). Cybercrime and Facebook: An Examination of Lifestyle Routine Activity Theory (Doctoral dissertation).
Vincent, N. A. (2017). 1 Victims of cybercrime. Cybercrime and Its Victims , 27.
Wright, S. (2017). The mythology of Cyber-Crime—Insecurity & Governance in Cyberspace: Some Critical Perspectives. In Cyberspace (pp. 211-227). Springer International Publishing.