Call for Paper - July 2019 Edition
IJCA solicits original research papers for the July 2019 Edition. Last date of manuscript submission is June 20, 2019. Read More

Data Mining Social Media Model for Detecting Cybercriminal Network (DMSM-CN)

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2018
Authors:
Ejiofor C. I, Onuodu .F
10.5120/ijca2018916526

Ejiofor C I and Onuodu .F. Data Mining Social Media Model for Detecting Cybercriminal Network (DMSM-CN). International Journal of Computer Applications 179(34):1-4, April 2018. BibTeX

@article{10.5120/ijca2018916526,
	author = {Ejiofor C. I and Onuodu .F},
	title = {Data Mining Social Media Model for Detecting Cybercriminal Network (DMSM-CN)},
	journal = {International Journal of Computer Applications},
	issue_date = {April 2018},
	volume = {179},
	number = {34},
	month = {Apr},
	year = {2018},
	issn = {0975-8887},
	pages = {1-4},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume179/number34/29215-2018916526},
	doi = {10.5120/ijca2018916526},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

A Data Mining Social Media Model for Detecting Cybercriminal Network (DMSM-CN) has been designed. This model locate hidden pattern found in cybercriminal network with the aim of mitigating it. The model comprises of The model comprises of: Online social media, File and network analyzer, Positive data, Negative data, Classifier, Gibb sampling Algorithms, Laplacin Semantic Inference and inferential language modeling. The model will mitigate cybercrime, eliminating cyber network and enhancing the usefulness of social media.

References

  1. Gladwell, M. (2011). "Malcolm Gladwell and Clay Shirky on Social Media and Revolution, Foreign Affairs March/April 2011". Foreignaffairs.com. Retrieved 24 April 2012.
  2. Hajirnis, A. (2015). "Social media networking: Parent guidance required". The Brown University Child and Adolescent Behavior Letter. 31 (12): 1–7.
  3. Hayat, T. Samuel-A., T. (2017). ""You too, Second Screeners?" Second Screeners' Echo Chambers During the 2016 U.S. Elections Primaries". Journal of Broadcasting & Electronic Media. 61 (2): 291–308.
  4. Kaplan A. M., Haenlein M. (2010). "Users of the world, unite, The challenges and opportunities of social media" (PDF). Business Horizons. 53 (1): 61. doi:10.1016/j.bushor.2009.09.003.
  5. Mangold, W. Glynn; F., David J. (2009). "Social media: The new hybrid element of the promotion mix". Business Horizons. 52 (4): 357–65.
  6. Mortimer, N. (2016) 'Magnum invests £13m in campaign to promote new Magnum Double' Available at:  http://www.thedrum.com/news/2016/04/11/magnum-invests-13m-campaign-promote-new-magnum-double
  7. Neela M. M. (2012), Impact of Cyber Crimes on Social Networking Pattern of Girls, International Journal of Internet of Things 2012, 1(1): 9-15 DOI: 10.5923/j.ijit.20120101.02
  8. Obar, J. A.; Wildman, S. (2015). "Social media definition and the governance challenge: An introduction to the special issue". Telecommunications policy. 39 (9): 745–750.
  9. Pajala, M. (2012). "Television as an Archive of Memory?". Critical Studies in Television. 5 (2): 133–145.
  10. Reginald H. G. (2014), Social Media as a Channel and its Implications on Cyber Bullying, Presented at the DLSU Research Congress 2014
  11. Tang, Q.; Gu, B.; Whinston, A. B. (2012). "Content Contribution for Revenue Sharing and Reputation in Social Media: A Dynamic Structural Model". Journal of Management Information Systems. 29 (2): 41–75.

Keywords

Cybercrime, cyber network, Social media