Does Social Media Provoked to Cyber Deception? An Illustrative Based Study of Youth

  • Nasar Shah MPhil Scholar, Department of Rural Sociology, The University of Agriculture Peshawar Pakistan
  • Muhammad Jawad Department of Rural Sociology, University of Agriculture Peshawar Pakistan
  • Younas Khan Lecturer, Department of Sociology and Political Science, Bacha Khan University Charsadda, Pakistan
  • Syed Zuhaib Department of Sociology, University of Peshawar, Pakistan
Keywords: Cyber Deception, Social Media, Deviance, Youth

Abstract

Purpose: The present study was conducted with the sole aim to explore the role of social media in promotion of cyber deception among youth which further lead to deviance among the existing societal order.

Methodology: sample size of 354 respondents (youth) were randomly selected for taking primary data through structured questionnaire technique. Further, the primary data was coded into SPSS for further analysis in terms of descriptive and inferential statistics

Findings: Based on the study results, the study explored that cyber deception caused by the excessive usage of social media which further lead to psychological and physical problems among youth. Moreover, virtual social world and social games are the stakeholders of cyber deception; online shopping of various companies intentionally did cyber deception; content communities and social networking users are the major deception; youth are sharing fake picture from their profile for deception. Likewise, the study also explored that manipulation of sender identity information. Female are more indulged in deceptive behavior than male, usually girl’s misuse of social media sites to influence and cash wealthy and loved ones and kidnaping is done through cyber deception

Implications: Thus keeping in view the above results, the government should make such polices to overcome on the premises of the study in an urgent basis with corroboration to busy the future generation in more positive ground on sustainable development projects were the order of the day, along with parents must focus on their youth in terms of proper check and balance on weekly basis with corroboration of proper socialization will subjugate the tumbling factor in today world i.e., cyber deception

Downloads

Download data is not yet available.

Article Analytics Summary

References

Afroz, S., Brennan, M., & Greenstadt, R. (2012, May). Detecting hoaxes, frauds, and deception in writing style online. In 2012 IEEE Symposium on Security and Privacy (pp. 461-475). IEEE. DOI: https://doi.org/10.1109/SP.2012.34

Assunção, M. D., Calheiros, R. N., Bianchi, S., Netto, M. A., & Buyya, R. (2015). Big Data computing and clouds: Trends and future directions. Journal of Parallel and Distributed Computing, 79, 3-15. DOI: https://doi.org/10.1016/j.jpdc.2014.08.003

Banyard, V. L., Moynihan, M. M., & Plante, E. G. (2007). Sexual violence prevention through bystander education: An experimental evaluation. Journal of community psychology, 35(4), 463-481. DOI: https://doi.org/10.1002/jcop.20159

Brickman-Bhutta, C. (2009). Not by the book: Facebook as sampling frame. Disponible online en: www. thearda. com/workingpapers/download. Not% 20by% 20the% 20Book.

Burgoon, J., Adkins, M., Kruse, J., Jensen, M. L., Meservy, T., Twitchell, D. P., ... & Younger, R. E. (2005, January). An approach for intent identification by building on deception detection. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences (pp. 21a-21a). IEEE.

Chaffey, D. (2016). Global social media research summary 2016. Smart Insights: Social Media Marketing. DOI: https://doi.org/10.4324/9781315640341-5

Fox, F. E., Morris, M., & Rumsey, N. (2007). Doing synchronous online focus groups with young people: Methodological reflections. Qualitative health research, 17(4), 539-547. DOI: https://doi.org/10.1177/1049732306298754

Galán-García, P., Puerta, J. G. D. L., Gómez, C. L., Santos, I., & Bringas, P. G. (2016). Supervised machine learning for the detection of troll profiles in twitter social network: Application to a real case of cyberbullying. Logic Journal of the IGPL, 24(1), 42-53. DOI: https://doi.org/10.1093/jigpal/jzv048

Grazioli, S., & Jarvenpaa, S. L. (2000). Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 30(4), 395-410. DOI: https://doi.org/10.1109/3468.852434

Gurajala, S., White, J. S., Hudson, B., & Matthews, J. N. (2015, July). Fake Twitter accounts: profile characteristics obtained using an activity-based pattern detection approach. In Proceedings of the 2015 International Conference on Social Media & Society (pp. 1-7). DOI: https://doi.org/10.1145/2789187.2789206

Haimson, O. L., & Hoffmann, A. L. (2016). Constructing and enforcing" authentic" identity online: Facebook, real names, and non-normative identities. First Monday. DOI: https://doi.org/10.5210/fm.v21i6.6791

Hancock, J. T., & Toma, C. L. (2009). Putting your best face forward: The accuracy of online dating photographs. Journal of Communication, 59(2), 367-386. DOI: https://doi.org/10.1111/j.1460-2466.2009.01420.x

Hirschi, T. (1969). Causes of delinquency. Piscataway.

Humpherys, S. L., Moffitt, K. C., Burns, M. B., Burgoon, J. K., & Felix, W. F. (2011). Identification of fraudulent financial statements using linguistic credibility analysis. Decision Support Systems, 50(3), 585-594. DOI: https://doi.org/10.1016/j.dss.2010.08.009

Jin, L., Wang, L., Zhang, X., Liu, Y., Dai, X., Gao, H., & Liu, G. (2021). Fully spin-polarized Weyl fermions and in/out-of-plane quantum anomalous Hall effects in a two-dimensional d 0 ferromagnet. Nanoscale, 13(11), 5901-5909. DOI: https://doi.org/10.1039/D0NR07556F

Kapidzic, S., & Herring, S. C. (2015). Race, gender, and self-presentation in teen profile photographs. New Media & Society, 17(6), 958-976.

Kapidzic, S., & Herring, S. C. (2015). Race, gender, and self-presentation in teen profile photographs. New Media & Society, 17(6), 958-976. DOI: https://doi.org/10.1177/1461444813520301

Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of Social Media. Business horizons, 53(1), 59-68.

Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of Social Media. Business horizons, 53(1), 59-68. DOI: https://doi.org/10.1016/j.bushor.2009.09.003

Keijsers, L., Branje, S. J., VanderValk, I. E., & Meeus, W. (2010). Reciprocal effects between parental solicitation, parental control, adolescent disclosure, and adolescent delinquency. Journal of Research on Adolescence, 20(1), 88-113. DOI: https://doi.org/10.1111/j.1532-7795.2009.00631.x

Kim, J. L., & Ward, L. M. (2004). Pleasure reading: Associations between young women's sexual attitudes and their reading of contemporary women's magazines. Psychology of women quarterly, 28(1), 48-58.

Kim, J. L., & Ward, L. M. (2004). Pleasure reading: Associations between young women's sexual attitudes and their reading of contemporary women's magazines. Psychology of women quarterly, 28(1), 48-58.. DOI: https://doi.org/10.1111/j.1471-6402.2004.00122.x

Lenhart, A., & Madden, M. (2007). Social networking websites and teens: An overview.

Lu, S., Tsechpenakis, G., Metaxas, D. N., Jensen, M. L., & Kruse, J. (2005, January). Blob analysis of the head and hands: A method for deception detection. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences (pp. 20c-20c). IEEE.

MA, X. H., & LEI, L. (2010). Adolescents’ internet morality and deviant behavior online. Acta Psychologica Sinica, 42(10), 988.

Meservy, T. O., Jensen, M. L., Kruse, J., Burgoon, J. K., Nunamaker, J. F., Twitchell, D. P., ... & Metaxas, D. N. (2005). Deception detection through automatic, unobtrusive analysis of nonverbal behavior. IEEE Intelligent Systems, 20(5), 36-43. DOI: https://doi.org/10.1109/MIS.2005.85

Mitchell, K. J., Ybarra, M. L., & Korchmaros, J. D. (2014). Sexual harassment among adolescents of different sexual orientations and gender identities. Child abuse & neglect, 38(2), 280-295. DOI: https://doi.org/10.1016/j.chiabu.2013.09.008

Nahari, G., & Nisin, Z. (2019). Digging further into the speech of liars: Future research prospects in verbal lie detection. Frontiers in Psychiatry, 10, 56. DOI: https://doi.org/10.3389/fpsyt.2019.00056

Nain, S. 2014. Ten negative effects of internet on students. Retrieved from: http://lists10.com/1o-negative-effects-internet-students/

Roberts, S. G., & Dunbar, R. I. (2011). Communication in social networks: Effects of kinship, network size, and emotional closeness. Personal Relationships, 18(3), 439-452. DOI: https://doi.org/10.1111/j.1475-6811.2010.01310.x

Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. Journal of child psychology and psychiatry, 49(4), 376-385. DOI: https://doi.org/10.1111/j.1469-7610.2007.01846.x

Solorio, T., Hasan, R., & Mizan, M. (2013). Sockpuppet detection in wikipedia: A corpus of real-world deceptive writing for linking identities. arXiv preprint arXiv:1310.6772.

Solorio, T., Hasan, R., & Mizan, M. (2013, June). A case study of sockpuppet detection in wikipedia. In Proceedings of the Workshop on Language Analysis in Social Media (pp. 59-68).

Toma, C. L., Hancock, J. T., & Ellison, N. B. (2008). Separating fact from fiction: An examination of deceptive self-presentation in online dating profiles. Personality and Social Psychology Bulletin, 34(8), 1023-1036. DOI: https://doi.org/10.1177/0146167208318067

Tsikerdekis, M., & Zeadally, S. (2014). Multiple account identity deception detection in social media using nonverbal behavior. IEEE Transactions on Information Forensics and Security, 9(8), 1311-1321. DOI: https://doi.org/10.1109/TIFS.2014.2332820

Tsikerdekis, M., & Zeadally, S. (2014). Online deception in social media. Communications of the ACM, 57(9), 72-80.. DOI: https://doi.org/10.1145/2629612

van der Walt, E., & Eloff, J. (2017). Creating an environment for detecting Identity Deception. Technische Berichte des Hasso-Plattner-Instituts für Digital Engineering an der Universität Potsdam, 3.

Wang, G. A., Chen, H., Xu, J. J., & Atabakhsh, H. (2006). Automatically detecting criminal identity deception: an adaptive detection algorithm. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 36(5), 988-999. DOI: https://doi.org/10.1109/TSMCA.2006.871799

Ybarra, M. L., Diener-West, M., and Leaf, P. J. (2007). Examining the overlap in internet harassment and school bullying: Implications for school intervention. Journal of Adolescent Health, 41(6), S42–S50. doi:10.1016/j.jadohealth.2007.09.004. DOI: https://doi.org/10.1016/j.jadohealth.2007.09.004

Published
2021-12-31
How to Cite
Shah, N., Jawad, M., Khan, Y., & Zuhaib, S. (2021). Does Social Media Provoked to Cyber Deception? An Illustrative Based Study of Youth. Journal of Business and Social Review in Emerging Economies, 7(4), 977-983. https://doi.org/10.26710/jbsee.v7i4.2062