Filters








742 Hits in 3.8 sec

Uncovering Cybercrimes in Social Media through Natural Language Processing

Julián Ramírez Sánchez, Alejandra Campo-Archbold, Andrés Zapata Rozo, Daniel Díaz-López, Javier Pastor-Galindo, Félix Gómez Mármol, Julián Aponte Díaz, Kai Hu
2021 Complexity  
Among the myriad of applications of natural language processing (NLP), assisting law enforcement agencies (LEA) in detecting and preventing cybercrimes is one of the most recent and promising ones.  ...  The paper at hand proposes a solution that uses neural network (NN) based NLP to monitor suspicious activities in social networks allowing us to identify and prevent related cybercrimes.  ...  FPU18/00304 and RYC-2015-18210) and cofunded by the European Social Fund.  ... 
doi:10.1155/2021/7955637 fatcat:2u3ykb32ajdebo3lhulb35vkve

A Probabilistic Generative Model for Mining Cybercriminal Network from Online Social Media: A Review

Parvathy G., Bindhu J.S.
2016 International Journal of Computer Applications  
An application of this is to scan a set of documents in natural language for predictive classification purposes.  ...  Recent researches shows that the number of crimes are increasing through social media that may cause tremendous loss to organizations.  ...  Concept level approaches to natural language processing can better grasp the implicit meaning associated with each text.  ... 
doi:10.5120/ijca2016908121 fatcat:53b4jordtnbothilf5eghnig4q

Towards Designing a Multipurpose Cybercrime Intelligence Framework

Mariam Nouh, Jason R. C. Nurse, Michael Goldsmith
2016 2016 European Intelligence and Security Informatics Conference (EISIC)  
Existing literature in the area of cybercrime intelligence focuses on several research questions and adopts multiple methods using techniques such as social network analysis to address them.  ...  In this paper, we study the broad state-of-the-art research in cybercrime intelligence in order to identify existing research gaps.  ...  They mainly focus on studying textual content through the use of Natural Language Processing (NLP) techniques in order to achieve the following: authorship profiling; authorship analysis; text classification  ... 
doi:10.1109/eisic.2016.018 dblp:conf/eisic/NouhNG16 fatcat:ru6inhz5grfkpap25meyq5pwj4

Illuminating the Dark Side of the Internet with Actor-Network Theory: An Integrative Review of Current Cybercrime Research

Rocci Luppicini
2014 Global Media Journal: Canadian Edition  
Cybercrime is a relatively new area of research within criminology and media studies.  ...  Findings provided a strong indication of ANT's role in key areas of current cybercrime, namely, cyber bullying, cyber theft, and cyber terrorism and cyber espionage.  ...  Second, more attention to ANT in other areas of cyber criminology may increase the impact of ANT beyond selected areas of cybercrime (cyber bullying, cyber theft, and cyber terrorism and cyber espionage  ... 
doaj:8e4b3deb19354b929312ce3f25d34454 fatcat:bepzuj6fk5hulgbswmjrtm7i5a

Systematic Review on the Suspicious Profiles Detection on Online Social Media Data

Asha Asha, Dr. Balkishan
2017 Oriental journal of computer science and technology  
The process is manual in nature i.e. mostly done by humans only and cannot be automated easily.  ...  Through this, suspicious activities can be uncovered by analyzing the interests of all users.  ... 
doi:10.13005/ojcst/10.03.13 fatcat:4elxm4hqu5h57nz74xq4qiinp4

Assessing the Credibility of Cyber Adversaries

Jenny A. Wells, Australian Signals Directorate, Australia, Dana S. LaFon, Margaret Gratian, National Security Agency, U.S.A., National Security Agency, U.S.A.
2021 International journal of cybersecurity intelligence and cybercrime  
In the current times of disinformation and misinformation, understanding what we are reading and to who we are paying attention to is essential for us to make considered, informed, and accurate decisions  ...  This paper employs a literature review to examine the empirical evidence across online credibility, trust, deception, and fraud detection in an effort to consolidate this information to understand adversary  ...  Modality, Agency, Interactivity, and Navigability) in digital media that serve to influence credibility assessments through heuristic processing.  ... 
doi:10.52306/04010221fhte2115 fatcat:htqb42is3va3phy4g7ex5hnhea

Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum [chapter]

Sergio Pastrana, Alice Hutchings, Andrew Caines, Paula Buttery
2018 Lecture Notes in Computer Science  
That being said, underground forums have played a significant role in several recent high-profile cybercrime activities.  ...  This work provides the first step towards identifying ways to deter the involvement of young people away from a career in cybercrime.  ...  We also thank our colleagues from the Cambridge Cybercrime Centre for access to the CrimeBB dataset and their invaluable feedback, and Flashpoint, for assistance relating to actors of interest.  ... 
doi:10.1007/978-3-030-00470-5_10 fatcat:2bt2kbbo4zfjxhbjjwtmgi2bda

Prediction of The Security Threats in Social Media Using Artificial Intelligence

2021 Qalaai Zanist Scientific Journal  
The outcomes have demonstrated how AI calculations work in distinguishing misleading messages and con artists through AI methods .  ...  The online social network clients are exposed to various weaknesses dangers deliberately by actualizing social designing systems.  ...  The article suggests that cybercrimes are preventable by analyzing people's behavioral changes and sentiment analysis by predicting their thoughts through their social media posts using iterative clustering  ... 
doi:10.25212/lfu.qzj.6.1.38 fatcat:ijwnjim7ujeidfzimlnztncq5q

Cyber Attacks Impacting on Communication Using Social Media: Systematic Review Using Data Cluster Ball

2021 International Journal of Advanced Trends in Computer Science and Engineering  
In this advanced technological era, the internet especially social media plays an important role in our lives.  ...  Because through social media everyone can easily communicate with their relatives and loving ones.  ...  Then, using the title and text, the conventional natural language processing techniques like tokenization, stemming, stop word removal, punctuation, and number filtering were used to get a collection of  ... 
doi:10.30534/ijatcse/2021/1301032021 fatcat:shgtpx2c7bb3llnj7wqey7aifa

The Internet and Everyday Life in Indonesia: A New Moral Panic?

Merlyna Lim
2013 Bijdragen tot de Taal-, Land- en Volkenkunde  
In reality, social media is a social space where activities are mostly revolved around fun, self-expression, and social gain (Lim 2013) .  ...  The law's vague defijinition of defamation, however, lends itself to be easily used against individuals and groups who express opinions on the internet and through social media.  ... 
doi:10.1163/22134379-12340008 fatcat:nz6wax34azgxtndp3qvwahie74

Open Source Intelligence and its Applications in Next Generation Cyber Security - A Literature Review

U. Yogish Pai, K. Krishna Prasad
2021 Zenodo  
To avoid human errors, the dependency on humans in decision-making ought to reduce. To eradicate any incorrect information, a truth discovery process is mandatory.  ...  The information gathered is then analyzed in order to identify the problem areas that may exist in the chosen topic.  ...  Within the context of natural language processing, semantic analysis evaluates and reflects human language and analyses words written in English as well as other natural languages with human-like interpretations  ... 
doi:10.5281/zenodo.5171579 fatcat:fp6wodk45zgwtnuxsnnxjnw7oa

Requirements of the social work institutions and faculties in confronting electronic crime from the view point of a sample of faculty members

Mayada Mansour Omar, Mervat Gamal El Dein Ali
2021 مجلة کلیة الخدمة الاجتماعیة للدراسات والبحوث الاجتماعیة  
The main question was: what is the reality of the requirements of social work institutions and faculties in facing cybercrime?  ...  determining the requirements of the social work institutions and faculties in confronting electronic crimes from the view point of faculty members in some institutions and faculties of social work.  ...  Criminal Procedures Law in line with the nature of information crime.  ... 
doi:10.21608/jfss.2021.169587 fatcat:qdak572byvbgfnxoerlokpzmla

Cyberbullying detection: advanced preprocessing techniques & deep learning architecture for Roman Urdu data

Amirita Dewani, Mohsin Ali Memon, Sania Bhatti
2021 Journal of Big Data  
One such language that has been recently adopted worldwide and more specifically by south Asian countries for communication on social media is Roman Urdu i-e Urdu language written using Roman scripting  ...  However, the existing research is directed towards mature languages and highlights a huge gap in newly embraced resource poor languages.  ...  Automatic Cyberbullying detection has remained very challenging task since social media content is in natural language and is usually posted in unstructured free-text form leaving behind the language norms  ... 
doi:10.1186/s40537-021-00550-7 pmid:34956818 pmcid:PMC8693595 fatcat:ywyixq5lobhchh6t4favr5ojby

A design-led approach to transforming wicked problems into design situations and opportunities

Mark Bailey, Emmanouil Chatzakis, Nicholas Spencer, Kate Lampitt Adey, Nate Sterling, Neil Smith
2019 Journal of Design Business & Society  
"From wicked problem to design problem: Developing actionable briefs and solution opportunities through a collaborative, multidisciplinary design-led approach".  ...  In: Design Research Society (DRS) 2018, Design as a catalyst for change. Limerick, Ireland, 25-28 June 2018.  ...  media ('social media' activity), exploring what is ethical and legal ('ethical vs legal' activity) and drawing scenarios to describe perceived cybercrimes ('comic strip' activity) (Figure 8 ).  ... 
doi:10.1386/dbs.5.1.95_1 fatcat:a2jz4mir3rcttmavid3dxwidsu

Open Source Intelligence and its Applications in Next Generation Cyber Security - A Literature Review

Yogish Pai U., Krishna Prasad K.
2021 International journal of applied engineering and management letters  
To avoid human errors, the dependency on humans in decision-making ought to reduce. To eradicate any incorrect information, a truth discovery process is mandatory.  ...  The information gathered is then analyzed in order to identify the problem areas that may exist in the chosen topic.  ...  Within the context of natural language processing, semantic analysis evaluates and reflects human language and analyses words written in English as well as other natural languages with human-like interpretations  ... 
doi:10.47992/ijaeml.2581.7000.0100 fatcat:23qjlrnxdjbpldxivurywnbxoa
« Previous Showing results 1 — 15 out of 742 results