Intelligent Data Analytics for Terror Threat Prediction. Группа авторов
image messaging platform which allows you to chat with friends using pictures [3].
Interface through social network sites between online users is one of the major common computer-based activities. Facebook is most a dominant platform over a short span of time for social interaction across the world. Even though it stays the largest social networking site, sites like YouTube, Twitter, Google+ and Sina Wiebo all have lively and busy user populations that maintain social interactions in their own ways, with new features springing up all the time. With the help of inventive research methods and theoretical case studies, inventors can better realize how these networks work and measures their influence on various kinds of social interactions as well as the associated risks and benefits. Like sharing information which can be useful to public without hurtling other communities, religions, or political parties, etc. and the other is where people may share abusive photos, videos or sensitive information about country. For more advantages and disadvantages see Ref. [4].
1.3 What Is Cyber-Crime?
1.3.1 Definition
Cyber-crime is also called as computer-oriented crime, as this crime involves computer and network. It can be defined as “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)” [25].
1.3.2 Types of Cyber-Crimes
Nowadays, there are many ways that cyber-crimes may occur using computers and network [5]. Some of the cyber-crimes such as hacking, cyber bullying, buying illegal things and posting videos of criminal activity are explained in following subsections.
1.3.2.1 Hacking
Hacking is nothing but attacking/accessing devices like computers and mobiles without the permission of owner. It can be done by people called as hackers, who attack/access our systems without permission. Hackers are basically computer programmers who hack by intruding programmes called as virus into our systems. These viruses may steal our data like username, password, documents, files, etc. stored in computer [6]. Hacking is not limited to individual computers but can even damage computers which are in network, as well as username, password, information of emails, bank accounts, social networking sites, etc. So there is a need to concentrate on these attacks to prevent them and punish the culprit.
1.3.2.2 Cyber Bullying
Cyber bullying is bullying that happens over digital devices like cell phones, computers, and tablets [26]. It can occur by sending emails, messages through social networks like Facebook, Twitter, Instagram, WhatsApp and software services like Gmail, Yahoo, etc. where a group of people are connected and sharing social information. Some people are misusing these facilities and bullies by sharing abused photos, videos, or negative information about others, etc. [27]. It is very harmful to the society and needs attention to combat and find culprit.
1.3.2.3 Buying Illegal Things
Buying illegal things like Bit coins and drugs belong under criminal activities in India and many other countries. So this is also a one of the cyber-crime that needs attention to prevent and find the source of user who bought those [6].
1.3.2.4 Posting Videos of Criminal Activity
Posting/sharing videos of criminal activities such as abused photos, videos, and disinformation on online social networks is also under cyber-crime [5]. There are some other activities like sharing security issues of country and posts against some religions and communities also falls under this cyber-crime.
These are some popular cyber-crimes but are not limited to many others such as Denial-of-Service attack, Email bombing, spamming, Cyber stalking, etc. [6]. So there is a need to focus on these cyber-crimes and how to prevent and punish the culprits.
1.3.3 Cyber-Crimes on Social Networks
Nowadays, social networks like Facebook, Twitter, WhatsApp, Sina Wiebo, etc. are become very popular in sharing and diffusing any kind of digital information. But sharing all kinds of information is not legal in any social networks. If anyone is sharing illegal information in social networks then it is considered as cyber-crime. Some of the cyber-crimes on social networks are listed in the section below.
1 A. Posting RumorsPosting/sharing any misinformation (unknown) or disinformation (wontedly wrong) is called as rumors. The diffusion of rumors is very fast comparing to the actual news in social networks [5]. Finding whether particular post content is rumor or not is a challenging task, and if it is a rumor, detecting the source of rumor is also becomes a big challenge to many people like government, police and experts who are working on social networks. Therefore, it is important to put more effort on how to control rumors in social networks and also detection of rumor source to punish them.
2 B. Sharing Abusive Photos/VideosSharing any kind of abusive photo or video of anyone is illegal activity and treated as cyber-crime [6].
3 C. Posting Comments Against Religions, Communities or Country
4 D. Movie Release Online Without Permission.These are other occurring cyber-crimes in social networks but are not limited to these four important cyber-crimes. Whatever it may be, there is a need to prevent them and if anyone has done these, a need to find and punish them. In the next section, a discussion is given about how to detect whether a given data is rumor or fact-based on some classification algorithms.
1.4 Rumor Detection
Rumor is a currently trending topic which contains an unverified content. This content may be either wrong information (misinformation) or intentionally wrong information (disinformation) [31]. Social media is capable of diffusing the information rapidly in the network as these rumors are also disseminated over the network. Some people may not know the difference between rumor and fact and may share the same rumor to other communities.
It is observed that rumors (about politics, religions, communities, etc.) diffuse very fast when compared to normal news. Thus, it is important to stop diffusion of rumors in social media, which requires detecting whether the information is rumor or not. Nowadays, rumor detection becomes a challenging task and many researchers are working on it. How a information can be classified rumor or non-rumor is shown in Figure 1.2. The figure shows how a rumor is classified as true or false and if it is false how it is classified as misinformation or disinformation.
1.4.1 Models
In order to classify whether given data is rumor or not, follow the procedure as shown in Figure 1.3.
Initially, we consider a rumor dataset (messages) from social network. Next, to process the data, data processing is used. After processing, it is required to extract features like user features, Tweet features, and comment features from processed Twitter data as shown in Table 1.2. Later, use any classification algorithm to classify rumors based on these features. Classification models classify and produce results. In order to detect whether a given text is a rumor or not, the most common approach is to simply tokenize the text and apply classification algorithms. There are many classification algorithms that exist, but only few algorithms give better results. They are algorithms like Naïve Bayes, SVM, Neural network with TF, Neural network with Keras, decision tree, random forest,