Emerging technologies and cyber-crime: strategies for mitigating cyber-crime and misinformation on social media and cyber systems

Authors

DOI:

https://doi.org/10.36096/ijbes.v6i4.635

Keywords:

Crime, Law Enforcement, Government, South Africa, Policymaking, Social Disorganised Theory

Abstract

Currently, numerous institutions, organisations, and governments globally have issues associated with rising technological crimes and misinformation within cyber systems, which jeopardise societal faith in these entities. A cyber-system is a framework that employs cyberspace and encompasses information infrastructures, along with individuals and other entities engaged in the system's business operations and activities. Social media platforms facilitate communication, commercial transactions, and various lucrative endeavours. Nonetheless, these sites have been utilised by cybercriminals and fraudsters for nefarious activities, including executing assaults on their targets and disseminating misinformation. This article examines the assessment of developing technological crimes on social media platforms and techniques for mitigating disinformation in cyber networks. A mixed-method approach was employed for data collecting, incorporating both qualitative and quantitative techniques, with unstructured interviews and surveys. The findings indicated that disinformation has adversely affected multiple sectors, including health, social, security, and education. Conspiracy theorists have utilised cyber systems and social media platforms to propagate misinformation, while fraudsters and cybercriminals have exploited these mediums to victimise individuals. Recommendations encompass the necessity for governmental regulation of online activities, the education of cyber system and social media users to exercise caution regarding their online conduct, the implementation of robust cyber policies and legislation, the verification and authentication of information prior to dissemination, the training and retraining of criminal justice officials, and the engagement of cyber law enforcement to scrutinise messages and information traversing cyber systems and social media platforms.

tem. Social media platforms are used for communication, business transactions, and other profitable initiatives. However, these platforms have also been exploited by cyber criminals and fraudsters for malicious activities, such as launching attacks on their targets and spreading false information. This paper focuses on evaluating emerging technology crimes on social media platforms and strategies for reducing misinformation on cyber systems. A mixed method was used for data collection, including qualitative and quantitative methods, as well as unstructured interviews and questionnaires. The findings revealed that misinformation has had negative impacts on various sectors including health, social, security, and education. Cyber systems and social media platforms have been used by conspiracy theorists to disseminate false information, while fraudsters and cybercriminals have victimized their targets using social media and other cyber systems. Recommendations include the need for government regulation of online activities, educating cyber system and social media users to be cautious about their online activities, implementing effective cyber policies and legislation, verifying and authenticating information before sharing, training and retraining criminal justice officials, and engaging cyber cops to filter messages and information passing through cyber systems and social media platforms.

Downloads

Download data is not yet available.

References

Barlow, J. P. (2012). Crime and public policy. (Eds.). London: Hodder and Stoughton Publishing.

Barkun, M. (2011). Chasing phantoms, reality, imagination, and homeland security, since, 9/11. Chapel Hill: University of North Carolina Press. ISBN: 9781315602585 DOI: https://doi.org/10.5149/9780807877692_barkun

Brown, S. (2012). Criminology: explaining crime and its context. (Eds.). New Providence: Anderson. https://doi.org/10.4324/9780323357395 DOI: https://doi.org/10.4324/9780323357395

Burton, B., Kelling, G. L. & Coles, C. (1994). Fixing Restoring order and Reducing Crime in American cities. New York: Free Press.

Casey, E. (2016). Digital evidence and computer forensic science, computer and the internet. London: Academic Press.

Casey, E. (2005). Digital Evidence and Computer crime; Forensic Science, computer and the internet. London: Academic Press.ISBN:978-0-12-374268-1

Crosby, F. (2000). A model of egoistical relative deprivation. Psychological Review, 83(2), 85–113. https://doi.org/10.1037/0033-295X.83.2.85 DOI: https://doi.org/10.1037//0033-295X.83.2.85

Coombs, T. (2012). The ongoing crisis communication, planning, managing and responding (3rd ed.). London: Sage Publications Ltd. doi: 10.1109/TPC.2010.2046099. DOI: https://doi.org/10.1109/TPC.2010.2046099

Christian, V. W. & Mohan K. K. P. (2021). The Detection and Dissemination of Fake news on Social Media Platforms. Centre for Research in Privacy Technologies. National University of Singapore: NUS

Douglas, K, Sutton, T. and Robbie, M. (2011). Endorsement of conspiracy theories is influenced by personal willingness to conspire. British Journal of Social Psychology,10 (3), 544–552. doi: 10.1111/j.2044-8309.2010.02018.x DOI: https://doi.org/10.1111/j.2044-8309.2010.02018.x

Ezeji, C. (2014). Combating cyber-related crimes in South Africa. Pretoria: Tshwane University of Technology.oai:encore.tut.ac.za:d1001776

Ezeji, C. (2018). Overview of intelligence-led policing and crime prevention. Pretoria: Tshwane University of Technology.doi: 10.31920/2056-5658/2018/v5n2a9 DOI: https://doi.org/10.31920/2056-5658/2018/v5n2a9

Ezeji, C. (2019). The challenges faced by the criminal justice system and role players in combating cybercrime in Nigeria. Journal of Democratic Studies. Abuja: National Institute for Legislative & Democratic Studies. https://ir.nilds.gov.ng/handle/123456789/157

Ezeji, C. L. (2020). Application of Criminal Intelligence as Holistic tools in addressing Crime in Nigeria. Journal of African Studies, 2(2), 86 – 96.

Goldberg, R. (2001). Enemies within, the culture of conspiracy in modern America. New Haven: Yale University Press.https://doi.org/10.12987/yale/9780300090000.001.0001 DOI: https://doi.org/10.12987/yale/9780300090000.001.0001

Grazioli, A.M & Jarvenpa, J. (2013). Information about Phishing Methods. New York: Harper Collins.https://www.researchgate.net/publication/363054897

Heath, R. (2011). Best Practices in Crisis Communication: Evolution of Practice through Research. Journal of Applied Communication Research, 3(4), 245-248. doi: 10.1080/00909880600771577 DOI: https://doi.org/10.1080/00909880600771577

Ikuomola, A., Okunola, R. and Heap, S. (2020). Historical Analysis of Touts as a Deviant Subgroup in Lagos State, Nigeria. https://doi.org/10.57054/asr.v20i2.3810

Institute of Public Understanding of Risk. (2021). Innovation Research Link. Singapore: Lloyd’s Register Foundation Institute.

Jackson, J.E. (2012). Information security management handbook. Boston: Allyn & Bacon. doi: 10.1080/15536548.2011.10855907 DOI: https://doi.org/10.1080/15536548.2011.10855907

Joyce, S. & Barrett, L. (2012). Human rights and criminal justice. Ben Emerson, Q.C. Andrew, C. & Macdonald, A. London: CPI Group UK.

Halder, D. & Jaishankar, K. (2011). Cyber-crime and the victimization of women. Carnegie, UK: IPR/Business books. doi: 10.4018/978-1-60960-830-9 DOI: https://doi.org/10.4018/978-1-60960-830-9

Kowalski, R.M & Susan P. (2013). Electronic bullying among middle school students. Clemens: Elsevier Publishing. doi: 10.1016/j.jadohealth.2007.08.017 DOI: https://doi.org/10.1016/j.jadohealth.2007.08.017

Louw, D. (2017). Mentoring children guilty of minor first-time crime methods strength and limitations. Bloemfontein: Van Schaik.

Matthew, L., Lawrence, A. & Michael, A. (2013). Child pornography and likelihood of contact abuse: comparison between child sexual offenders and non-contact offenders. Liverpool: University of Liverpool Press.doi: 10.1016/b978-0-12-819174-3.00002-4 DOI: https://doi.org/10.1016/B978-0-12-819174-3.00002-4

Maguire, J. and Radosh, D. (2011). Introduction to criminology. Belmont, Calif: Wadsworth Publishing. ISBN 10: 0534537847

Moore, E. (2011). Cybercrime investigating high technology computer crime. Cincinnati, Ohio: Anderson Publishing. https://doi.org/10.4324/9781315721767 DOI: https://doi.org/10.4324/9781315721767

Nauven, R.T. (2020). Respiratory Physiotherapy and call for Information and Guidance to COVID-19. UK: Lancashire Teaching Hospitals.

Peter, K. (2011). Glitch and error in digital culture. London: University of Minneapolis Press. doi: 10.16997/wpcc.158 DOI: https://doi.org/10.16997/wpcc.158

Palencha, J. (2011). Incorporating Social Media in Risk and Crisis Communication. Journal of Contingencies and Crisis Management, 19 (2), 111-121. doi: 10.1111/j.1468-5973.2011.00639.x DOI: https://doi.org/10.1111/j.1468-5973.2011.00639.x

Schultz, E. (2013). Fighting malicious code. New York: Elsevier.

Sullivan, D. (2011). Information system and information technology practice. London: Cambridge University Press.https://doi.org/10.1177/0309132507086879 DOI: https://doi.org/10.1177/0309132507086879

Skocpol, T. (1994). Social revolutions in the modern world. Cambridge University Press. https://doi.org/10.1017/CBO9781139173834 DOI: https://doi.org/10.1017/CBO9781139173834

Tarrow, S. (1998). Power in Movement: Social Movements and Contentious Politics. Cambridge: Cambridge University Press. https://doi.org/10.1017/CBO9780511813245 DOI: https://doi.org/10.1017/CBO9780511813245

United Nations. (2017). Compendium of United Nations standards and norms in crime prevention and criminal justice. New York: United Nations.

Zikmund, W. C., Babin, B. J., Carr, J. C., & Griffin, M. (2013). Business Research Methods. Boston, MA: Cengage Learning Custom Publishing

Downloads

Published

2024-12-01

How to Cite

Ezeji, C. L. (2024). Emerging technologies and cyber-crime: strategies for mitigating cyber-crime and misinformation on social media and cyber systems. International Journal of Business Ecosystem & Strategy (2687-2293), 6(4), 271–284. https://doi.org/10.36096/ijbes.v6i4.635

Issue

Section

Leadership, Innovation and Technology