Mobile Hacking
Mobile Hacking
Mobile Hacking
RANJINI SHANMUGAM
DECEMBER 2014
v
DEDICATION
ACKNOWLEDGEMENTS
I would thank all those who have helped me in finishing this research. I
would like to thank my supervisor Pn. HafizaAbas. She has assisted me with her
guidance. Next, I would like to acknowledge Dr.Shahidan who has assisted me
during the completion part of the report.
I also like to thank all my family members mainly my sister Ms. S.Sumathi
for their support. Thank you all.
vii
ABSTRACT
ABSTRAK
TABLE OF CONTENTS
DECLARATION ii
DEDICATION v
ACKNOWLEDGEMENTS vi
ABSTRACT vii
ABSTRAK viii
TABLE OF CONTENTS x
LIST OF FIGURES xiii
LIST OF TABLES xiv
LIST OF APPENDICES xv
1 INTRODUCTION 1
1.1 Background of the Problem 1
1.2 Problem Statement 7
1.3 Research Questions 8
1.4 Objectives of the Research 9
1.5 Research Scope 9
1.6 Research Significance 10
1.7 Purpose of Research 10
2 LITERATURE REVIEW 11
2.1 Introduction 11
x
2.1.1 Definition 15
2.2 The Usage Social Media in Malaysia 16
2.3 Social Media and Ethical Issues 17
2.4 Use of social media by college students 20
2.5 Motives for Hacking 24
2.6 Hacking for a Cause 25
2.7 Law enforcement agencies smaller role 30
2.8 The structure of hackers and their groups 32
2.9 Social learning theory 33
2.9.1 Differential Association 35
2.9.2 Differential Reinforcement 36
2.9.3 Definitions 36
2.9.4 Imitation 37
2.10 Low Self-Control Theory 38
2.10.1 Impulsivity 41
2.10.2 Risk Taking 41
3 RESEACRH METHODOLOGY 42
3.1 Introduction 43
3.2 Basis for the Use of a Qualitative 43
Methodology
3.2.1 Features of Qualitative Research 43
3.3 Research Operational Framework 45
3.4 The Current Research 47
3.4.1 Methods 47
3.4.2 Initial Design Considerations to 48
format a survey
3.5 Survey 48
3.5.1 Measures 49
3.5.1.1 Risk Taking 49
3.5.1.2 Impulsivity 49
xi
4 ANALYSIS OUTCOME 53
4.1 Qualitative Analysis 52
4.2 Survey as research tool to assist 54
findings
4.3 Survey report 56
4.3 Interviews 57
4.3.1 Semi structured Interview 58
4.3.1.1 Semi structured Interview 1 58
4.3.2 Unstructured Interview 59
4.3.2.1 Unstructured Interview 1 61
4.3.2.2 Unstructured Interview 2 62
4.3.2.3 Unstructured Interview 3 62
4.3.2.4 Unstructured Interview 4 63
4.4 Interviews disclose all notions of Social 63
Learning Theory
5 CONCLUSION 65
5.1 Concluding Remarks 65
5.2 Contribution 67
5.3 Limitation and suggestions for future 70
research
REFERENCES 72-80
xii
LIST OF FIGURES
LIST OF TABLES
LIST OF APPENDICES
INTRODUCTION
Youngsters are actively using social media for various reasons as it bring
adventures and fun to them. They have been using social media for more than a
decade ever since it was launched. It has become their favorite interaction mode as it
helps them to keep in touch with their associates and relatives (Sponcil et al.,
2013).Online interaction still keep it’s level at top as a main communication mode
when it comes to business , educational, professional or even administration
organizations. Therefore, the employers of such organization seek contenders with
immense online interaction skills such as much social media exposure. Bloggers get
them exposed to public by writing blogs in the Internet and this in a way promote
3
Online users across the world comprise of a huge population. The price of
technical gadgets such smartphones, tablets or laptops are getting cheaper alongside
the computers. The Internet transmission rate are also coming up to much better
speed with the value many can afford. Many public places such cafes provide free
wireless access to their customers. Globally, the population of Internet users are
growing in size. Thus, cyber criminal activities are also seen escalating despite
innovations in cyber security. There are many criminals activities operated using
the Internet as the base and it’s indeed tough in finding out about those who are
being involve in such activities with their numbers. It is possible for a very small
group of criminals to launch attacks on millions of computers located within any
distance in the world. This shows the ratio between the offenders and victims could
be vastly different. The rapidly growing online users also create troubles for the
lawfully authorized organization to take action as it’s obviously intricate to track
down the criminals online.
Crimes which are committed via online are considered hazardous and pose
greater impact on nations overall. The hackers too accumulate in many parts of the
world, where offences are committed everyday. Many online users tend to get
cheated via the Internet and they lose huge sum of money to the criminals. A decade
4
ago, losses were predicted more than thirty billion. Money generated via the Internet
raked into billions, thus outshining other unlawful trades such cocaine distribution or
smuggling. More than half of the trades operating in US implicate online crimes are
much more expensive than other real live robberies. The Internet users such as
hackers are wrongly using it for criminal purpose and this causes worries for many,
thus debating it in many platforms. There are resolutions instigated towards this
matter done globally. The cybercriminal activities are often executed with a variety
of ways in using the technical expertise (Gercke,2012).
Everyone has heard of hacking since decades of years ago. The history of
hacking returns to the 60’s era where firstly it was used where “hacking” means
breaking into systems illegally. Technical expertise was misused to obtain details
which are not to be received and this issue became a major menace for the
information technology world (Kirwan et al., 2012). Criminals do have also seized
online users’ interaction to derive important messages (Gercke,2012).
market are not sufficient to address this problem . Now everybody are entitled to
have them own websites and publish whatever they want others to read online. Even
contents books that banned by some countries are being uploaded in the Internet for
public to read. Photos are even displayed in the Internet for general view may cause
problems as many youngsters or even kids are using the Internet. Fastness of the
Internet is also taken into account as it dampen down the authorities’ effort in
curbing online criminal activities. This is because criminals promptly commit
offences online and it’s difficult for the police to track them online (Gercke,2012).
There many criminal activities done using the Internet which are still remain
unknown to the public. Lack of evidences are found for such crimes, compared to
robberies involving physical weapons like revolvers. Victims, especially commercial
organizations hardly report any damages done to them via Internet as they fear it
may bring bad images to them. Many even fail to make statements to the police as of
being victimized through the Internet by the criminals. This is because they think
it’s useless as no cases were successfully solved that came into the public limelight.
Furthermore they need to allocate their time the most for reporting such events. But
there are also some online frauds are being reported when such crimes are being
linked to high profile people or public at large (Gercke,2012).
Existing safety methods don’t really pave problems faced by billions Internet
users. The leading authorities in the cyber security must really take stern actions for
the peril that worries everyone. What matter the most is that online criminals should
be brought down to justice. Many realized that the critical issues that the Internet
users are facing are often condoned by law-enforcement agencies. Although it’s
difficult handling such kind of task, it would be rather better having things resolved
earlier than when it is too late. Cyber criminals are more dynamic where they aptly
produced highly advanced tools which they circulate within them. Security
programs also equally becoming better technically. Many nations find it tough to
employ such technical security measures as of financial constrains and other
6
limitations. Those countries also suffer in this matter as they have poor legal control
over it. Security features should had been integrated into Internet much earlier in
order to cut down the online criminal activities. As financial barriers can never be
used to impede the necessary procedures needed to overcome the problem. The
losses estimated after the online attacks as far much higher compared to the price of
available security tools. But having unnecessary or feeble security tools neither help
much in fighting cyber crime. Safety of online users is crucial to ensure secured
online interactions that contribute much to the growth of global industries
(Gercke,2012).
Social media is being abused for many reasons. Malaysia is also has been
facing much problems such as its hacking that result worries and other serious issues
(Gercke,2012). Unlawful intrusion is done to benefit hackers at large. Mastery of
technical knowledge in hacking also lends much to the spread of hacking. The
increase in online criminal activities especially social media’s hacking doubt the
appropriateness of existing Malaysian Internet ‘s rules and regulation. The hacking
in social media has damaged one’s public life with bad postings or vulgar word or
images . It’s one way of getting into other people’s life to see their links and seek
information. Its also a way of intimidating users and rob their privacy. Hacking of
social media is seen as rising rapidly despite the usage of online security tools. The
social media users tend to be anxious, worrying the kind of problems it can lead.
Many users even lost their savings when their social media account got manipulates
by hackers from different locations worldwide. Past researches has shown college
students as active users the social media because they constantly engage themselves
using different kind of gadgets. Their addiction towards social media has also
tempted them for other acts which includes hacking. This has also have resulted
poor grades for their education achievement. With a strategic location, Malaysia is
becoming an educational site for many students worldwide where it’s leading
universities or colleges provide variety of courses (Malaysian Statistics Department,
2014). The international students who gained entrance to this country are not only
limited to their role as students but also playing other significant parts in some
destructive acts such as hacking. This is because of their much wider exposure of
connection associates or links in the world.
8
The study on research works done earlier reveal that the demographic measure was
used as a variable to research upon influence regarding hacking of the social media.
(APPENDIX B). The research questions are seen in the Table 1.1.
ii. What are the ways the students acquire Qualitative Questionnaire
the influences? Literature review
Interviews
iii. Why most of the hacker students are Qualitative Literature review
foreigners? Interviews
Questionnaire
i. To figure out the aspects of hacking social media among college students
9
The way of gaining knowledge is made easy via social media (Cheung et al.,
2011). The main aim here is that to analyze the reasons that add up to the factors in
hacking in regards to college students. Thus, this promotes consciousness about the
bad sides of social media which are less known among many people. The hacking in
social media tend to create more problems for society as it may used to fake
documents or images. SKMM (Suruhanjaya Komunikasi Multimedia Malaysia), a
law enforcement agency in Malaysia was started to address the problem where it
also assure the users regarding the safety of social media. Globally, cyber safety
professionals are facing challenges in guiding companies which are seeking security
solutions for their woes (B.Still, 2005).
REFERENCE
Bandura, A. (1971). Social learning theory.In Social Learning Theory (pp. 1–46).
Cheung, C. M. K., Chiu, P.-Y., & Lee, M. K. O. (2011). Online social networks:
Why do students use facebook? Computers in Human Behavior.
doi:10.1016/j.chb.2010.07.028
Conway, M. (2006). Terrorism and the Internet: New media - New threat?
Parliamentary Affairs. doi:10.1093/pa/gsl009
Cooper, R. (2004). Why Hacking is wrong about human kinds. British Journal for
the Philosophy of Science, 55, 73–85. doi:10.1093/bjps/55.1.73
73
Correa, T., Hinsley, A. W., & de Zúñiga, H. G. (2010). Who interacts on the Web?:
The intersection of users’ personality and social media use. Computers in
Human Behavior, 26, 247–253. doi:10.1016/j.chb.2009.09.003
Curtis, L., Edwards, C., Fraser, K. L., Gudelsky, S., Holmquist, J., Thornton, K.,
&Sweetser, K. D. (2010).Adoption of social media for public relations by
nonprofit organizations.Public Relations Review, 36, 90–92.
doi:10.1016/j.pubrev.2009.10.003
Dana, J., Dawes, R., & Peterson, N. (2013). Belief in the unstructured interview: The
persistence of an illusion. Judgment and Decision Making, 8, 512–520.
Hadnagy, C. (2010). Social Engineering: The Art of Human Hacking. The Art of
Human Hacking (p. 408). doi:10.1093/cid/cir583
Higgins, G. E., & Makin, D. A. (2004). Does Social Learning Theory Condition the
Effects of Low Self-Control on College Students ’ Software Piracy ?, 2(2), 1–
22.
Hoath, P., &Mulhall, T. (1998). Hacking: Motivation and deterrence, part II.
Computer Fraud & Security.doi:10.1016/S1361-3723(98)80094-8
Holt, K., Shehata, A., Strömbäck, J., &Ljungberg, E. (2013). Age and the effects of
news media attention and social media use on political interest and
participation: Do social media function as leveller? European Journal of
Communication, 28, 19–34. doi:10.1177/0267323112465369
Holt, T. J., Bossler, A. M., & May, D. C. (2011). Low Self-Control, Deviant Peer
Associations, and Juvenile Cyberdeviance.American Journal of Criminal
Justice, 37(3), 378–395. doi:10.1007/s12103-011-9117-3
Holt, T. J., Strumsky, D., Smirnova, O., &Kilger, M. (2012).Examining the Social
Networks of Malware Writers and Hackers, 6(1), 891–903.
Lin, J.-H., Peng, W., Kim, M., Kim, S. Y., &LaRose, R. (2012).Social networking
and adjustments among international students.New Media &
Society.doi:10.1177/1461444811418627
McClure, S., Scambray, J., Kurtz, G., & Kurtz. (2009). Hacking exposed: network
security secrets and solutions. Network (pp. 1–249). doi:10.1036/0072192143
Morse, J. M., Barrett, M., Mayan, M., Olson, K., &Spiers, J. (2008).Verification
Strategies for Establishing Reliability and Validity in Qualitative
Research.International Journal of Qualitative Methods. doi:10.1063/1.2011328
Palen, L. (2008). Online Social Media in Crisis Events.Educause Quarterly, 31, 76–
78.
Russo, A., Watkins, J., & Groundwater‐Smith, S. (2009). The impact of social media
on informal learning in museums.Educational Media
International.doi:10.1080/09523980902933532
Salman, A., Saad, S., & Ali, M. N. S. (2013). Dealing with ethical issues among
Internet users: do we need legal enforcement? Asian Social Science, 9, 3–8.
doi:10.5539/ass.v9n8p3
Saw, G., Abbott, W., Donaghey, J., & McDonald, C. (2013). Social media for
international students – it’s not all about Facebook. Library Management, 34,
156–174. doi:10.1108/01435121311310860
http://search.ebscohost.com/login.aspx?direct=true&db=lih&AN=62640214&si
te=ehost-live
Steinfield, C., Ellison, N. B., & Lampe, C. (2008). Social capital, self-esteem, and
use of online social network sites: A longitudinal analysis. Journal of Applied
Developmental Psychology, 29, 434–445. doi:10.1016/j.appdev.2008.07.002
Stollak, M., Vandenberg, A., Burklund, A., & Weiss, S. (2011). GETTING
SOCIAL : THE IMPACT OF SOCIAL NETWORKING USAGE ON
78
Svensson, M., & Larsson, S. (2012). Intellectual property law compliance in Europe:
Illegal file sharing and the role of social norms. New Media &
Society.doi:10.1177/1461444812439553
Tess, P. a. (2013).The role of social media in higher education classes (real and
virtual) – A literature review.Computers in Human Behavior, 29, A60–A68.
doi:10.1016/j.chb.2012.12.032
The Nielsen Company. (2011). The state of media: The social media report 2011.
http://blog.nielsen.com/nielsenwire/social/2011/. Retrieved from
http://blog.nielsen.com/nielsenwire/social/2011/the-media-the-social-media-
report-2012.html
Valenzuela, S. (2008). Lessons from Facebook: The Effect of Social Network Sites
on College Students’ Social Capital. Communication, 39. Retrieved from
http://online.journalism.utexas.edu/2008/papers/Valenzuela.pdf
Weinberg, B. D., &Pehlivan, E. (2011). Social spending: Managing the social media
mix. Business Horizons, 54, 275–282. doi:10.1016/j.bushor.2011.01.008
Wilson, H. J., Guinan, P., Parise, S., & Weinberg, B. D. (2011). What’s your social
media strategy? Harvard Business Review, 89, 17.
Yang, C. C., & Ng, T. D. (2007). Terrorism and Crime Related Weblog Social
Network: Link, Content Analysis and Information Visualization. 2007 IEEE
Intelligence and Security Informatics. doi:10.1109/ISI.2007.379533
Youn, S. J., Trinh, N.-H., Shyu, I., Chang, T., Fava, M., Kvedar, J., & Yeung, A.
(2013). Using online social media, Facebook, in screening for major depressive
80