Cyber Harassment Trends Analysis: a Malaysia Case Study

  • Authors

    • Sharifah Roziah Mohd Kassim
    • Wira Zanoramy A. Zakaria
    • Faiszatulnasro Maksom
    • Kilausuria Abdullah
    2018-10-07
    https://doi.org/10.14419/ijet.v7i4.15.21430
  • Cyber Extortion, Cyber Harassment, Fake Profile, Phishing, Social Network.
  • Each year, Malaysia Computer Emergency and Response Team (MyCERT) handles more than a hundred incidents of individuals and organizations being harassed online. A common platform for the harassment activities to take place is via social networks. This case study will illustrate and uncover several prevalent threats that targets social networking users in Malaysia. This includes discussion on online fake profiles, executing cyber extortion and cyber harassment based on the incidents received by MyCERT from year 2014 until June of 2017. Perpetrator’s modus operandi and statistics analysis is highlighted in this paper. Countermeasures to cyber harassment is proposed as a preventive measure to limit the risks and impacts of potential cyber harassment threats.

     

  • References

    1. [1] Xiao, C., Freeman, D. M., & Hwa, T. (2015). Detecting clusters of fake accounts in online social networks. Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, pp. 91-101.

      [2] Priyanga, S., Priyadharshini, V. M., & Hariharan, N. (2015). Prevention of fake profile proliferation in online social networks. International Journal of Innovative Research in Science, Engineering and Technology, 4(6), 25-32.

      [3] Chandrashekhar, A. M., Muktha, G. S., & Anjana, D. K. (2016). Cyberstalking and Cyberbullying: Effects and prevention measures. Imperial Journal of Interdisciplinary Research, 2(3), 95-102.

      [4] Rizi, F., Khayyambashi, M., & Kharaji, M. (2014). A new approach for finding cloned profiles in online social networks. International Journal of Network Security, 6, 25–37.

      [5] Nandhini, M., & Das, B. B. (2016). Profile similarity technique for detection of duplicate profiles in online social network. International Journal of Computer Science and Information Technologies, 7(2), 507–512.

      [6] Ashford, W. (2015). DD4BC cyber extortion gang adds social media to arsenal. http://www.computerweekly.com/news/4500253322/DD4BC-cyber-extortion-gang-adds-social-media-to-arsenal.

      [7] Sanz, B., Laorden, C., Alvarez, G., & G Bringas, P. (2010). A threat model approach to attacks and countermeasures in on-line social networks. Proceedings of the 11th Reunion Española de Criptografía Y Seguridad de La Información, pp. 343-348.

  • Downloads

  • How to Cite

    Roziah Mohd Kassim, S., Zanoramy A. Zakaria, W., Maksom, F., & Abdullah, K. (2018). Cyber Harassment Trends Analysis: a Malaysia Case Study. International Journal of Engineering & Technology, 7(4.15), 109-112. https://doi.org/10.14419/ijet.v7i4.15.21430