Open Access Open Access  Restricted Access Subscription or Fee Access

Investigation of Offences Committed in Social Network and its Countermeasures

M. Sahana, E. Saravanan

Abstract


Recent years have seen a massive increase in the number of online social networks such as MySpace, Face book, Twitter etc., by which people are getting connected easily often with their friends and relatives and their well wishers too. This rapid growth of online social networks has also resulted in increased criminal activities such as phishing, spoofing, cyber stalking, net banking frauds etc. We have reviewed a standard investigation model that is used to investigate these online social network crimes. And here we are proposing to investigate offences committed in social networks by implementing the reviewed investigation model. Further the investigation is carried out by implementing some real time cases related to crimes such as cyber stalking, net bank frauds. This investigation process is carried out with the help of forensic tools. Countermeasures for the abovementioned crimes are discussed with relevant IT Act and Indian penal sections.

Keywords


Social Networks, Cyber Stalking, Net Bank Fraud, Forensics, Investigation

Full Text:

PDF

References


D. M. Boyd and N. B. Ellison, "Social Network Sites:Definition, History, and Scholarship," Journal of Computer-Mediated Communication, vol. 13, pp. 210-230, 2008.

O. Angelopoulou, "ID Theft: A Computer Forensics’Investigation Framework," presented at Proceedings of the 5th Australian Digital Forensics Conference Perth, Western Australia, 2007.

M. Rogers, "The role of criminal profiling in the Computer forensics process," Computers & Security, vol. 22, pp. 292-298, 2003.

W. K. II and J. Heiser, Computer Forensics: IncidentResponse Essentials: Addison-Wesley, 2002.

"Electronic Crime Scene Investigation: A Guide forFirst Responders.," U.S. Department of Justice 2001.

B. Carrier and E. H. Spafford, "Getting Physical withthe Investigation Process," International Journal ofDigital Evidence, vol. 2, 2003.

H. Lee, T. Palmbach, and M. Miller, Henry Lee’s Crime Scene Handbook: Academic Press, 2001.

N. I. o. Justice, "Results from Tools and TechnologieWorking Group, Goverors," presented at Summit onCybercrime and Cyberterrorism, Princeton NJ, 2002.

M. Reith, C. Carr, and G. Gunsch, "An Examinationof Digital Forensic Models," International Journal ofDigital Evidence, vol. 1, 2002.

S. Ó. Ciardhuáin, "An Extended Model of Cybercrime Investigations," International Journal of Digital Evidence, vol. 3, 2004.

Norulzahrah Mohd Zainudin, Madjid Merabti, David Llewellyn-Jones “A Digital Forensic Investigation Model and Tool for Online Social Networks”


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.