CFP last date
22 April 2024
Reseach Article

Data Mining Social Media Model for Detecting Cybercriminal Network (DMSM-CN)

by Ejiofor C. I, Onuodu .F
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 34
Year of Publication: 2018
Authors: Ejiofor C. I, Onuodu .F
10.5120/ijca2018916526

Ejiofor C. I, Onuodu .F . Data Mining Social Media Model for Detecting Cybercriminal Network (DMSM-CN). International Journal of Computer Applications. 179, 34 ( Apr 2018), 1-4. DOI=10.5120/ijca2018916526

@article{ 10.5120/ijca2018916526,
author = { Ejiofor C. I, Onuodu .F },
title = { Data Mining Social Media Model for Detecting Cybercriminal Network (DMSM-CN) },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2018 },
volume = { 179 },
number = { 34 },
month = { Apr },
year = { 2018 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number34/29215-2018916526/ },
doi = { 10.5120/ijca2018916526 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:57:22.421210+05:30
%A Ejiofor C. I
%A Onuodu .F
%T Data Mining Social Media Model for Detecting Cybercriminal Network (DMSM-CN)
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 34
%P 1-4
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Data Mining Social Media Model for Detecting Cybercriminal Network (DMSM-CN) has been designed. This model locate hidden pattern found in cybercriminal network with the aim of mitigating it. The model comprises of The model comprises of: Online social media, File and network analyzer, Positive data, Negative data, Classifier, Gibb sampling Algorithms, Laplacin Semantic Inference and inferential language modeling. The model will mitigate cybercrime, eliminating cyber network and enhancing the usefulness of social media.

References
  1. Gladwell, M. (2011). "Malcolm Gladwell and Clay Shirky on Social Media and Revolution, Foreign Affairs March/April 2011". Foreignaffairs.com. Retrieved 24 April 2012.
  2. Hajirnis, A. (2015). "Social media networking: Parent guidance required". The Brown University Child and Adolescent Behavior Letter. 31 (12): 1–7.
  3. Hayat, T. Samuel-A., T. (2017). ""You too, Second Screeners?" Second Screeners' Echo Chambers During the 2016 U.S. Elections Primaries". Journal of Broadcasting & Electronic Media. 61 (2): 291–308.
  4. Kaplan A. M., Haenlein M. (2010). "Users of the world, unite, The challenges and opportunities of social media" (PDF). Business Horizons. 53 (1): 61. doi:10.1016/j.bushor.2009.09.003.
  5. Mangold, W. Glynn; F., David J. (2009). "Social media: The new hybrid element of the promotion mix". Business Horizons. 52 (4): 357–65.
  6. Mortimer, N. (2016) 'Magnum invests £13m in campaign to promote new Magnum Double' Available at:  http://www.thedrum.com/news/2016/04/11/magnum-invests-13m-campaign-promote-new-magnum-double
  7. Neela M. M. (2012), Impact of Cyber Crimes on Social Networking Pattern of Girls, International Journal of Internet of Things 2012, 1(1): 9-15 DOI: 10.5923/j.ijit.20120101.02
  8. Obar, J. A.; Wildman, S. (2015). "Social media definition and the governance challenge: An introduction to the special issue". Telecommunications policy. 39 (9): 745–750.
  9. Pajala, M. (2012). "Television as an Archive of Memory?". Critical Studies in Television. 5 (2): 133–145.
  10. Reginald H. G. (2014), Social Media as a Channel and its Implications on Cyber Bullying, Presented at the DLSU Research Congress 2014
  11. Tang, Q.; Gu, B.; Whinston, A. B. (2012). "Content Contribution for Revenue Sharing and Reputation in Social Media: A Dynamic Structural Model". Journal of Management Information Systems. 29 (2): 41–75.
Index Terms

Computer Science
Information Sciences

Keywords

Cybercrime cyber network Social media