Académique Documents
Professionnel Documents
Culture Documents
By Wilberforce Opanga A Research Proposal Submitted to the School of Science, Engineering and Technology in Partial Fulfillment of the Requirements for the Award of the Degree of Bachelor of Science in Computer Science
Kabarak University
July, 2011
willopash@gmail.com
Declaration This is my original work and as far as I am concerned, has not been presented for the award of any degree in any other institution of higher learning. Name Wilberforce Opanga Signature Date
Approval This research proposal has been submitted for examination with my approval as a university supervisor:
Signature: .
Name: ...
Date: ....
willopash@gmail.com
Abstract
Facebook has become a force to reckon with in the field of social networking. It has been ranked as the number one social networking site with a membership of over five hundred million. It has earned trust from many people who have in turn exposed their information without thinking twice into which hands it might fall. Despite the positive contribution and impact that Facebook has provided, it still has a weak point that is easy to manipulate and misuse - this is the anonymity of the internet. It is hard to tell that the person you are interacting with on Facebook is whom he or she claims to be. It is also easy to hack someones account on Facebook and use it for personal gain and in most cases criminal activities. This has redefined cybercrime making it grow and graduate to a new level where it is difficult to differentiate between crime and genuine activities on the internet. Many crimes such as drug peddling have advanced to the level where it is hard to tell what is going on unless one understands the language that is being used by the involved parties. This study intends to establish how much cybercrime has grown as a result of social networks in general and Facebook in particular. The study also intends to enlighten the users of social networks on the existence of such crimes. Moreover, the study will strive to ascertain the number of people who fallen victim to such crimes, the consequences and how they got out of the situation. The study will be conducted using a questionnaire survey. Pertinent issues from the questionnaire survey will be pursued and clarified through probing questions posed to the interviewees. The resultant data will be analyzed using t-test, chi-square, correlation descriptive statistics and regression analysis.
willopash@gmail.com
Table of contents
Declaration and approval..ii Abstract....iii Chapter One: Introduction 1.1 Background to the study..6 1.1.0 Facebook...6 1.1.2 Cybercrime....7 1.2 Statement of the problem.7 1.3 Objective of the study..8 1.4 Hypothesis....8 1.5 Significance of the study..8 1.6 Scope and limitations of the study...8 1.7 Definition of terms...9 1.8 Limitations and delimitations of the study...9 Chapter Two: Literature review11 Chapter Three: Research methodology 3.1 Research design...................................14 3.2 Target population....14 3.3 Sample procedures..14 3.4 Data collection....14 3.5 Data analysis and interpretation.14
willopash@gmail.com
Chapter Four: Work Plan and Budget.16 4.1 Work plan..16 4.2 Budget...16 References...17 Appendices..................................19
willopash@gmail.com
Cybercrime is a computer crime, because it is mainly conducted on computer network platforms. In the recent past, however, this crime has moved to mobile devices network platforms. Everyone who owns a computer risks becoming a victim of cybercrime. Cybercrime has become an appealing large-
willopash@gmail.com
scale crime targeting modern technology. It has invaded all sectors of life that involve computer and networking technology. It is a crime that cannot be easily combated because of the anonymity of the internet. It has proven to be hard to track down the cyber criminals. It is now difficult to deposit money in the bank and be a hundred percent sure that it is safe because of the influx of cyber criminals. It is also difficult to put information online and be assured that it is safe because there are people who are waiting to acquire and misuse it. References? The United Nations has categorized cybercrime into: i) Unauthorized access ii) Damage to computer data or programmes iii) Sabotage to hinder the functioning of a computer system or network iv) Unauthorized interception of data to, from and within a system or network v) Computer espionage
willopash@gmail.com
c) To enlighten people on the major crimes occurring on social networks. 1.4 Hypothesis The study aims to ascertain whether: a) The emergence and growth of social networks has heavily impacted on the growth of cybercrime. b) Criminals have turned their focus on the social networks bearing in mind that the networks have captured peoples attention and interaction more than on any other site. c) Social networks have provided a breeding and playing ground for many major types of crime granted the anonymity of the internet. d) Many innocent people have been affected by the various kinds of cybercrimes unknowingly.
willopash@gmail.com
It is, therefore, expected that the data collected from the two towns will be reflective of the experiences of Facebook users (including cybercrime) in other major urban centres throughout the world and hence will facilitate the generalization of the study findings to other similar situations in not only Kenya but the entire world as well.
willopash@gmail.com
willopash@gmail.com
According to Sophos, about forty percent (40%) of the one hundred and two hundred (1,200) social networking users polled have been sent malware, such as worms, via the social networking sites they frequent. That is an increase of about ninety percent (90%) as compared to the second the summer of 2009. Additionally, two thirds of the users queried, said they had been spammed via social networking sites. This is more than double the proportion of social networking users affected two years earlier. Sophos also found out that forty three percent (43%) of the respondents had experienced phishing attacks, which is more than double the number of 2009.
The scams that are plaguing social networks were unheard of a few years ago (Richard Wang, Manager of Sophos Labs U.S. (Year?). According to Wang, social networking platforms like Facebook and Twitter are struggling to keep up with the swell of threats as cybercriminals and scammers seek to leverage these new mediums.
According to the study, a good deal of social networking happens in the workplace and fifty nine percent (59%) of the survey takers believe social networking behaviour could endanger corporate security while fifty seven percent (57%) worry that colleagues are sharing too much information on social networks. On the other hand, eighty two percent (82%) feel that Facebook poses the biggest risk to security. Sophos has identified "onMouseOver," the Twitter-based worm, as the "biggest single social networking security incident of 2010. Overall, the majority of the types of security threats from 2009 to 2010 stayed the same, despite their high impact on social networks.
willopash@gmail.com
Recent researches have only managed to show how cybercriminals have shifted their attention from other social networking sites especially My Space which two years ago was their favorite playing ground to Facebook which at the moment is the biggest with over five hundred million registered members. These researches show how much costs companies and individuals have to bear due to this crime. The researches have shown how much has been done by Facebook to curb this crime, but they have not shown how much contribution Facebook has made as far as cybercrime is concerned.
This study seeks to bring up the contribution of social networks to the growing field of cybercrime which has now become the biggest online threat after viruses. Apart from showing how much contribution has been made by the social sites, the study will also aspire to come up with data that will show how individuals have indirectly contributed to social sites by carelessly exposing their personal information in the social networking sites especially Facebook. It is obvious that cybercrime is a major online threat; it is evident that many people have fallen victims to this crime. It is clear that social networks make a great contribution to cybercrime, but there is no actual information on how much they have contributed. This study intends to establish the correct and factual information.
A study conducted by Trever Smith, graduate student in the Department of Criminal Justice at UNLV (2010) examines cybercrime that is committed through the utilization of Social Networking Sites. The study explains the criminal activity that is occurring on Social Networking Sites and what Social Networking Sites are doing to help users keep their information private and prevent them from being victimized. Trever argues that with the advancement of technology for the benefit of mankind, comes the advancement of new technology to commit crimes. From 2000-2004 cybercrime complaints doubled, and from 2004-2007 they remained the same. However, the latest FBI statistics, produced by the Internet Crime Complaint Center, show that in 2008 cybercrime increased by thirty percent (30%) (IC3, 2008). According to the 2009 Unsecured Economies Report produce by McAfee, one of the worlds leading antivirus software and computer security companies, cybercrime costs $1 trillion or more annually, but that is also limited to what cybercrime was reported (McAfee 2009). This figure does not take into consideration the cost of physical damages to victims, or the cost of police investigations. The latest research by the Pew Internet & American Life Project (2010) as captured in the study conducted by Trever indicates that seventy three percent (73%) of teen internet users and forty seven percent (47%) of online adults currently use social networking sites. Facebook is currently
willopash@gmail.com
the most popular social networking site among adults; among adult profile owners alone seventy three (73%) have a Facebook profile, forty eight percent (48%) maintain a MySpace profile, and fourteen percent (14%) a LinkedIn profile (Pew 2010). It should be noted that most users generally have multiple profiles on different sites, for professional and personal reasons.
Understanding that seventy three percent (73%) of online teens and seventy five percent (75%) of online young adults aged 18-24 years old maintain profiles, the amount of information accessible is phenomenal. According to research completed by the Pew Institute eight two percent (82%) of profile authors include their first name in their profiles, seventy nine percent (79%) include their photos while sixty six percent (66%) include photos of their friends and/or family members. Sixty one percent (61%) of the users include the name of their city or town; forty nine percent (49%) include the name of their school (Pew 2007 & 2009).
A similar study conducted at Carnegie Mellon University (CMU), Year? found similar results when analyzing the information available on CMU students Facebook profiles. The CMU findings content that the majority of students list their real names (89%) and contain a profile image (90.8%). In addition, forty percent (40%) of the users list a phone number to view. While these studies indicate the main components of an individuals profile, they fail to mention the up-to-the minute information that is readily accessible as well.
willopash@gmail.com
willopash@gmail.com
Data will be put into classes which are mutually exclusive such as gender, age or religion. The data will be analyzed using t-test, chi-square, correlation descriptive statistics and regression analysis. Three measures of tendencies will be used namely: mode, medium, and mean. The data characteristics will be described and explored by drawing graphs and charts, performing cross tabulation and calculating means and standard deviations. Patterns and relationships in the data will be sought by comparing means, exploring correlations, performing multiple regressions, or analyses of variance. Advanced modeling techniques will be used to build sophisticated explanations of how the data collected addresses the original question. Qualitative data analysis will be used to describe and summarize the mass of words generated from the interviews. This will establish the relationship between various themes identified from the study. A report of the findings will then be documented proving or disapproving the hypothesis besides drawing up conclusions and recommendations on the way forward.
willopash@gmail.com
willopash@gmail.com
References
Analyze the data and interpret findings http://www.rdinfo.org.uk/flowchart/Section8.htm accessed on July 10 2011 Computer application for business; Effects of cybercrimes on business http://www.scribd.com/doc/54756700/CAB-566-Assignment-2 accessed on June 15, 2011 Cybercrime Awareness http://www.cybercellmumbai.com/files/Types%20of%20cyber%20crime.pdf accessed on June 15, 2011 Cybercrime http://www.thefreedictionary.com/Cybercriminal accessed on 18th June 2010 Cybercrime: The Transformation of Crime in the Information Age, By David S. Wall. Cambridge, UK: Polity Press, 2007: http://www.bsos.umd.edu/gvpt/lpbr/subpages/reviews/wall0608.htm accessed on June 15, 2011 Cybercriminal http://www.urbandictionary.com/define.php?term=cyber%20criminal accessed on 18th June 2010 Data Analysis & Interpretation http://hubpages.com/hub/Data-Analysis-Interpretation accessed on July 10, 2011 Data Interpretation Methods http://people.uwec.edu/piercech/researchmethods/data interpretation methods/data interpretation methods index.htm accessed on July 10, 2011 Data Preparation, Interpretation and Analysis http://www.esurveyspro.com/article-data-preparationinterpretation-and-analysis.aspx accessed on July 10, 2011 Definition: cyberspace. http://www.thefreedictionary.com/cyberspace accessed on 30th June 2011 at 18:35 Different Types of Cyber Crime http://www.ehow.com/facts_4970264_different-types-cybercrime.html accessed on June 15, 2011 Grabosky, Peter. 2007. Electronic Crime. Upper Saddle River, NJ: Pearson. Social Networking a Major Security Threat, Cybercriminals Eye Facebook http://www.crn.com/news/security/229000883/social-networking-a-major-security-threatcybercriminals-eye-Facebook.htm;jsessionid=6BL4zqIzGfZT4iOHJAYPBA**.ecappj03 accessed on June 15, 2011 Social Networking Sites: Helps You Connect and Share with the People Not in Your Life http://www.sheldensays.com/socialnetworking.htm accessed on 30th June 2011
willopash@gmail.com
Sophos http://en.wikipedia.org/wiki/Sophos accessed on 18th June 2010 Stay Safe on Facebook http://www.brighthub.com/internet/security-privacy/articles/66918.aspx accessed on June 15, 2011 The Golden Age of Cyber Crime http://www.tech-faq.com/the-golden-age-of-cyber-crime.html accessed on June 15, 2011 Todays Cyber threats: Facebook Scam fest, Cybercrime Does Pay http://www.technewsdaily.com/todays-cyberthreats-Facebook-scamfest-cybercrime-does-pay-2126/ accessed on June 15, 2011 Twitter http://en.wikipedia.org/wiki/Twitter accessed on 18th June 2010 Types of Cybercrime http://www.b4usurf.org/index.php?page=types-of-cybercrime-2 accessed on June 15, 2011 Types of cybercrime http://www.crime.hku.hk/cybercrime.htm accessed on June 15, 2011 Wall, David S. 2001. Crime and the Internet, London: Routledge. What is a Social Networking Site? http://www.wisegeek.com/what-is-a-social-networking-site.htm accessed on 18th June 2010
willopash@gmail.com
Appendix Questionnaire
willopash@gmail.com