Cyber Crime Malicious Activities Like Identity Theft Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

Cyber Crime

Malicious activities like identity theft, harassment and phishing activities are conducted by the cyber criminals by making use of the anonymous context of the cyber world to their advantage. Phishing scams are conducted in such a manner by the scammers that websites are created by them and emails are sent out in order to trick the account holders into revealing sensitive information like passwords and account numbers. These crimes are usually solved by the investigators in such a manner that they back trap the IP addresses on the basis of the data which is present in the header of these anonymous emails. Although, at times the information which is gathered from the IP address isn't enough to identify the culprit in case that the information is sent from a proxy server or if the computer used to send the email has more than one user (Fouss et al., 2010).

The main problem with anonymity is that the authorship analysis techniques are used to address the online communication. There is a long history associated with the study of authorship when it comes to solving authorial disputes like poetic and historic work, although, in case of the online textual communication the study of authorship analysis is very restricted. The reason behind this is the fact that in the traditional written works there is a lot of data which is written in a very well-structured manner by making use of the grammatical rules and common syntactic. Whereas, in comparison to this the online documents like the instant messages and emails are written in a short and poorly structured manner, these are written mostly in the paragraph language and have a lot of grammatical and spelling mistakes. Due to these differences some of the features of authorship analysis can't be applied to the online textual data (Abbassi and Chen, 2009).

Following are the three main authorship analysis problems that have been addressed in this paper.

Firstly, identification of authorship with the large training samples: take this situation where from among a group of suspects a cybercrime investigator wants to pinpoint a likely author of a particular anonymous text message; it is assumed by us that a huge collection of messages which have previously been written by the suspects are available to the investigator. In the actual investigations, the sample text messages can be gotten from the chat logs or email archives of a suspect's personal computer with the help of a warrant. This is done in order to get a sample of the writing styles of each suspect. A large amount of the previous work that has been done on the authorship identification assumes that there is only one writing style followed by every suspect. An argument has been presented by us regarding the changing in writing style depending on the nature of topic. The challenge that we face here is regarding the identification of particular stylistic variations and making use of these variations in order to bring improvement in the authorship identification's accuracy (Fouss et al., 2010).

Secondly, identification of authorship with small training samples: There are a number of anonymous messages that have been given to a cybercrime investigator, a group of suspects is present as well and the investigator wants to correctly identify the author of every one of those anonymous messages. In this problem the assumption is that there is only a small number of training samples that the investigator has access to. The challenge here is to make identification on the basis of the inadequate training data by finding specific patterns (Fouss et al., 2010).

Thirdly, authorship characterization: In this scenario the cybercrime investigator has a collection of the anonymous text messages but he/she doesn't have any idea about the probable suspects and for this reason there are no training samples available of the suspects either. Still the investigator would prefer concluding some of the characteristics like age group, ethnicity and genders of the authors. This will be done by the investigator by observing the writing styles of the authors. The assumption here is that there are some external sources of the text messages like social network websites or blog postings that the investigator has access to. The challenge here is how to make use of these kinds of external sources in order to deduce the characteristics of these authors (Abbassi and Chen, 2009).

Literature review

The linguistic and computational characteristic of the documents written by individuals is known as the authorship analysis. Extracting the particular writing traits or writing styles from the written documents of an individual can be made use of in order to distinguish one person from another. There are 5 main categories that the writing styles can be categorized into, these categories are: structural, namely lexical, idiosyncratic features, stylometric and content-specific features (Hu et al., 2010).

When we talk about solving the authorship identification disputes regarding conventional and literary writings, we can see that a very important role has been played by authorship analysis in this. It is a lot more challenging to conduct an analysis of the online documents as, they are smaller in size and have insufficient amount of training data that can be made use of in order to know about an author's writing patterns. Also, the online documents have informal writing style and these have many grammatical and spelling errors in them. For these reasons the techniques that might be very effective in the traditional and literary work are most of the times not applicable to these online documents. For this reason it is very important to come up with analytical techniques which are more appropriate for the online document. Emails, chat logs, web forums and web postings have all got authorship applied to them (Hu et al., 2010).

In a survey conducted by researchers on authorship it was found that there are three main perspectives to an authorship problem which are: authorship identification, authorship characterization and authorship similarity detection (Abbassi et al., 2010).

For the identification of the most probable author from among a group of suspects, authorship identification is made use of. In many of the studies, classification model is developed with the help of the stylometric features that have been extracted from a set of sample documents authored by the suspects, later on, in order to find the most probable suspect these features applied to the anonymous document. We argue that there is a lot of possibility for this assumption to not be true as, the writing style of an individual can change depending on the topic or situation (Abbassi et al., 2010).

In order to determine if two objects are formed by a single entity without its knowledge we make use of the authorship similarity. There are many applications of similarity detection such as, online marketplace and plagiarism detection. With the revolution of the digital world it has become very easy to distribute and copy creative works and because of this a lot of copyright violations are taking place all over the world (Abbassi et al., 2010).

In this same manner there is often a manipulation in the reputation system of online marketplaces as, multiple names are entered into it when actually it is built by making use of the customer's feedback. Researchers have developed some techniques which can help us in detecting the aliases present in the online systems such as eBay. This is done by studying the feedback of the users. Similarity detection techniques have also been developed by researcher and these techniques are used to identify the fraudulent and malicious websites (Abbassi et al., 2010).

In order to collect sociolinguistic attributes like occupation, gender, age and educational level of the probable author of a particular anonymous document the authorship characterization is made use of. Gender-preferential attributes' effects have been studied by some of the researchers on the authorship analysis. Neuroticism, educational level, language background and age are some of the factors that have also been discussed in profiling studies (Abbassi et al., 2010).

There are three categories that the machine learning techniques, which have been employed in many of the authorship analysis, fall into. These are:

1. Probabilistic classifiers,

2. Decision trees and

3. Support vector machine and its alternatives (Iqbal et al., 2010).

There are limitations to each one of these techniques with regards to interpretability, accuracy and scalability.

When it comes to the significant processing steps in data mining and machine learning, feature selection is considered to be a very important step. Various feature selection techniques can be made use of in the authorship studies as well. These can be used in order to define a subset of stylometric features through which the authors can be discriminated. There are two general approaches to the feature selection and these are: Forwards selection and backward selection. An important thing to note here is that the property of uniqueness between the write prints of suspects is not guaranteed by feature selection (Iqbal et al., 2010).

Techniques for authorship analysis

In the initial studies…[continue]

Cite This Term Paper:

"Cyber Crime Malicious Activities Like Identity Theft " (2014, February 03) Retrieved October 26, 2016, from

"Cyber Crime Malicious Activities Like Identity Theft " 03 February 2014. Web.26 October. 2016. <>

"Cyber Crime Malicious Activities Like Identity Theft ", 03 February 2014, Accessed.26 October. 2016,

Other Documents Pertaining To This Topic

  • Identity Theft in America and

    Pharmers now not only small local servers operated by Internet service providers (ISP) but they also target the 13 servers on which all other DNS servers depend. Implications Businesses & Large Organizations: Among large scale businesses that get affected includes the financial sector other than individuals. Electronic banking services have been greatly affected by these criminals who are euphemistically called hackers or crackers who conduct phishing or pharming. They not only

  • Cyber Crime Purpose & Audience

    Part of the problem is that America's national crime reporting systems, such as the National Incident-Based Crime Reporting System and the Uniform Crime Report Program managed by the Federal Bureau of Investigation (FBI) in cooperation with thousands of U.S. law enforcement agencies, do not specifically identify or distinguish between many forms of online crimes. Nor do they effectively distinguish between traditional in-person forms of crime that are substantially facilitated

  • Cybercrime What s in a Name

    In this scenario, "if a bad guy wants to take over an account, he'll have someone else speak in a different language in a different location, and that's all they do. Their expertise is calling financial institutions for social engineering" (Piazza 2006). According to Piazza (2006), cybercrime consists of any crime a person commits by using a computer or computer technology. He classifies various types of cybercrime into four

  • Cyber Crime and Technology Crime

    Cyber Crimes The available and accessible features of 21st century make it hard for any individual to think about a life without technology. In real, the world has crossed several stages and eras devoid of the cyber world. Despite this truth, imagining life without technology is a difficult task today. This is because communication between countries of the two opposite poles has now become easy; it's merely like being in touch

  • Computer Crime Can Be Classified

    Phishing is another criminal technique used to cull bank account or credit card information. Lovet (2007) describes how simple and potentially lucrative phishing can be: "the total costs for sending out 100,000 phishing emails can be as little as $60. This kind of 'phishing trip' will uncover at least 20 bank accounts of varying cash balances, giving a 'market value' of $200 - $2,000 in e-gold." Most incidents of

  • History of Cyber Crimes

    Cybercrime, Cybercriminals, And Cybercops Cybercrime Cybercrime has long been perceived to represent new crimes arising from the emergence of technological advancement, but an examination of the history of cybercrime reveal that its roots are as ancient as the crimes of fraud, harassment, and malicious property damage. The history of cybercrime is reviewed briefly here, as are the challenges faced by law enforcement efforts to curb cybercrime. Some gains have been realized, such

  • Canadian Policies to Thwart Terrorist and Criminal

    Canadian Policies to Thwart Terrorist and Criminal Activities Canadian Policies to Combat Crime and Terrorism Problems being faced due to Cyber-Crime in Today's World What is Identity Theft? How and Why Cyber-Crime Occurs? Why Cyber-Crime has become an Important Issue? How Release of Personal Information makes an Individual vulnerable to Identity Theft? Future Implications Since time immemorial, crime and criminal activities have been found at an accelerated pace, however, with the penetration of the world into the twenty

Read Full Term Paper
Copyright 2016 . All Rights Reserved