Unauthorized entry into the computer system, unauthorized insertion, deletion, modification or covering of computer data or any unauthorized interference in the operation of the computer system, which caused financial damage to others, in order to obtain property rights for oneself or others or to receive any kind of financial benefit.
Published in Chapter:
Social Networks and Security Challenges
Tamari Chinchaladze (East Europian University, Georgia)
Copyright: © 2023
|Pages: 21
DOI: 10.4018/978-1-6684-5760-3.ch002
Abstract
In contrast to the last century, in the 21st century internet communications and technology have developed quite a bit. Various sites and social networks appeared on the world stage, through which it became easier to find information and communicate with other people who are in another city or country. The pandemic in 2019-2022 has forced the developed and developing countries of the world to face a new situation – manage countries/companies, work and perform official duties remotely, have contact with relatives, get education, and carry out other activities. This topic will discuss and analyze the pros and cons of the most famous social networks, the protection of their users' information, and the crimes committed through said networks that violate human economic freedom, dignity, and the right to receive information. The chapter will discuss various crimes that are committed through social networks, for example, fraud, distribution of pornographic works, cyberbullying, cybercrimes.