Emerging technologies and cyber-crime: strategies for mitigating cyber-crime and misinformation on social media and cyber systems
DOI:
https://doi.org/10.36096/ijbes.v6i4.635Keywords:
Crime, Law Enforcement, Government, South Africa, Policymaking, Social Disorganised TheoryAbstract
Currently, numerous institutions, organisations, and governments globally have issues associated with rising technological crimes and misinformation within cyber systems, which jeopardise societal faith in these entities. A cyber-system is a framework that employs cyberspace and encompasses information infrastructures, along with individuals and other entities engaged in the system's business operations and activities. Social media platforms facilitate communication, commercial transactions, and various lucrative endeavours. Nonetheless, these sites have been utilised by cybercriminals and fraudsters for nefarious activities, including executing assaults on their targets and disseminating misinformation. This article examines the assessment of developing technological crimes on social media platforms and techniques for mitigating disinformation in cyber networks. A mixed-method approach was employed for data collecting, incorporating both qualitative and quantitative techniques, with unstructured interviews and surveys. The findings indicated that disinformation has adversely affected multiple sectors, including health, social, security, and education. Conspiracy theorists have utilised cyber systems and social media platforms to propagate misinformation, while fraudsters and cybercriminals have exploited these mediums to victimise individuals. Recommendations encompass the necessity for governmental regulation of online activities, the education of cyber system and social media users to exercise caution regarding their online conduct, the implementation of robust cyber policies and legislation, the verification and authentication of information prior to dissemination, the training and retraining of criminal justice officials, and the engagement of cyber law enforcement to scrutinise messages and information traversing cyber systems and social media platforms.
tem. Social media platforms are used for communication, business transactions, and other profitable initiatives. However, these platforms have also been exploited by cyber criminals and fraudsters for malicious activities, such as launching attacks on their targets and spreading false information. This paper focuses on evaluating emerging technology crimes on social media platforms and strategies for reducing misinformation on cyber systems. A mixed method was used for data collection, including qualitative and quantitative methods, as well as unstructured interviews and questionnaires. The findings revealed that misinformation has had negative impacts on various sectors including health, social, security, and education. Cyber systems and social media platforms have been used by conspiracy theorists to disseminate false information, while fraudsters and cybercriminals have victimized their targets using social media and other cyber systems. Recommendations include the need for government regulation of online activities, educating cyber system and social media users to be cautious about their online activities, implementing effective cyber policies and legislation, verifying and authenticating information before sharing, training and retraining criminal justice officials, and engaging cyber cops to filter messages and information passing through cyber systems and social media platforms.
Downloads
References
Barlow, J. P. (2012). Crime and public policy. (Eds.). London: Hodder and Stoughton Publishing.
Barkun, M. (2011). Chasing phantoms, reality, imagination, and homeland security, since, 9/11. Chapel Hill: University of North Carolina Press. ISBN: 9781315602585 DOI: https://doi.org/10.5149/9780807877692_barkun
Brown, S. (2012). Criminology: explaining crime and its context. (Eds.). New Providence: Anderson. https://doi.org/10.4324/9780323357395 DOI: https://doi.org/10.4324/9780323357395
Burton, B., Kelling, G. L. & Coles, C. (1994). Fixing Restoring order and Reducing Crime in American cities. New York: Free Press.
Casey, E. (2016). Digital evidence and computer forensic science, computer and the internet. London: Academic Press.
Casey, E. (2005). Digital Evidence and Computer crime; Forensic Science, computer and the internet. London: Academic Press.ISBN:978-0-12-374268-1
Crosby, F. (2000). A model of egoistical relative deprivation. Psychological Review, 83(2), 85–113. https://doi.org/10.1037/0033-295X.83.2.85 DOI: https://doi.org/10.1037//0033-295X.83.2.85
Coombs, T. (2012). The ongoing crisis communication, planning, managing and responding (3rd ed.). London: Sage Publications Ltd. doi: 10.1109/TPC.2010.2046099. DOI: https://doi.org/10.1109/TPC.2010.2046099
Christian, V. W. & Mohan K. K. P. (2021). The Detection and Dissemination of Fake news on Social Media Platforms. Centre for Research in Privacy Technologies. National University of Singapore: NUS
Douglas, K, Sutton, T. and Robbie, M. (2011). Endorsement of conspiracy theories is influenced by personal willingness to conspire. British Journal of Social Psychology,10 (3), 544–552. doi: 10.1111/j.2044-8309.2010.02018.x DOI: https://doi.org/10.1111/j.2044-8309.2010.02018.x
Ezeji, C. (2014). Combating cyber-related crimes in South Africa. Pretoria: Tshwane University of Technology.oai:encore.tut.ac.za:d1001776
Ezeji, C. (2018). Overview of intelligence-led policing and crime prevention. Pretoria: Tshwane University of Technology.doi: 10.31920/2056-5658/2018/v5n2a9 DOI: https://doi.org/10.31920/2056-5658/2018/v5n2a9
Ezeji, C. (2019). The challenges faced by the criminal justice system and role players in combating cybercrime in Nigeria. Journal of Democratic Studies. Abuja: National Institute for Legislative & Democratic Studies. https://ir.nilds.gov.ng/handle/123456789/157
Ezeji, C. L. (2020). Application of Criminal Intelligence as Holistic tools in addressing Crime in Nigeria. Journal of African Studies, 2(2), 86 – 96.
Goldberg, R. (2001). Enemies within, the culture of conspiracy in modern America. New Haven: Yale University Press.https://doi.org/10.12987/yale/9780300090000.001.0001 DOI: https://doi.org/10.12987/yale/9780300090000.001.0001
Grazioli, A.M & Jarvenpa, J. (2013). Information about Phishing Methods. New York: Harper Collins.https://www.researchgate.net/publication/363054897
Heath, R. (2011). Best Practices in Crisis Communication: Evolution of Practice through Research. Journal of Applied Communication Research, 3(4), 245-248. doi: 10.1080/00909880600771577 DOI: https://doi.org/10.1080/00909880600771577
Ikuomola, A., Okunola, R. and Heap, S. (2020). Historical Analysis of Touts as a Deviant Subgroup in Lagos State, Nigeria. https://doi.org/10.57054/asr.v20i2.3810
Institute of Public Understanding of Risk. (2021). Innovation Research Link. Singapore: Lloyd’s Register Foundation Institute.
Jackson, J.E. (2012). Information security management handbook. Boston: Allyn & Bacon. doi: 10.1080/15536548.2011.10855907 DOI: https://doi.org/10.1080/15536548.2011.10855907
Joyce, S. & Barrett, L. (2012). Human rights and criminal justice. Ben Emerson, Q.C. Andrew, C. & Macdonald, A. London: CPI Group UK.
Halder, D. & Jaishankar, K. (2011). Cyber-crime and the victimization of women. Carnegie, UK: IPR/Business books. doi: 10.4018/978-1-60960-830-9 DOI: https://doi.org/10.4018/978-1-60960-830-9
Kowalski, R.M & Susan P. (2013). Electronic bullying among middle school students. Clemens: Elsevier Publishing. doi: 10.1016/j.jadohealth.2007.08.017 DOI: https://doi.org/10.1016/j.jadohealth.2007.08.017
Louw, D. (2017). Mentoring children guilty of minor first-time crime methods strength and limitations. Bloemfontein: Van Schaik.
Matthew, L., Lawrence, A. & Michael, A. (2013). Child pornography and likelihood of contact abuse: comparison between child sexual offenders and non-contact offenders. Liverpool: University of Liverpool Press.doi: 10.1016/b978-0-12-819174-3.00002-4 DOI: https://doi.org/10.1016/B978-0-12-819174-3.00002-4
Maguire, J. and Radosh, D. (2011). Introduction to criminology. Belmont, Calif: Wadsworth Publishing. ISBN 10: 0534537847
Moore, E. (2011). Cybercrime investigating high technology computer crime. Cincinnati, Ohio: Anderson Publishing. https://doi.org/10.4324/9781315721767 DOI: https://doi.org/10.4324/9781315721767
Nauven, R.T. (2020). Respiratory Physiotherapy and call for Information and Guidance to COVID-19. UK: Lancashire Teaching Hospitals.
Peter, K. (2011). Glitch and error in digital culture. London: University of Minneapolis Press. doi: 10.16997/wpcc.158 DOI: https://doi.org/10.16997/wpcc.158
Palencha, J. (2011). Incorporating Social Media in Risk and Crisis Communication. Journal of Contingencies and Crisis Management, 19 (2), 111-121. doi: 10.1111/j.1468-5973.2011.00639.x DOI: https://doi.org/10.1111/j.1468-5973.2011.00639.x
Schultz, E. (2013). Fighting malicious code. New York: Elsevier.
Sullivan, D. (2011). Information system and information technology practice. London: Cambridge University Press.https://doi.org/10.1177/0309132507086879 DOI: https://doi.org/10.1177/0309132507086879
Skocpol, T. (1994). Social revolutions in the modern world. Cambridge University Press. https://doi.org/10.1017/CBO9781139173834 DOI: https://doi.org/10.1017/CBO9781139173834
Tarrow, S. (1998). Power in Movement: Social Movements and Contentious Politics. Cambridge: Cambridge University Press. https://doi.org/10.1017/CBO9780511813245 DOI: https://doi.org/10.1017/CBO9780511813245
United Nations. (2017). Compendium of United Nations standards and norms in crime prevention and criminal justice. New York: United Nations.
Zikmund, W. C., Babin, B. J., Carr, J. C., & Griffin, M. (2013). Business Research Methods. Boston, MA: Cengage Learning Custom Publishing
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Chiji Longinus Ezeji
This work is licensed under a Creative Commons Attribution 4.0 International License.
© 2025 retained by the authors. Licensee BSC International Academy, Istanbul, Turkey. This article is an open-access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).