{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T13:31:29Z","timestamp":1770989489949,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030763459","type":"print"},{"value":"9783030763466","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-76346-6_54","type":"book-chapter","created":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T11:08:18Z","timestamp":1622200098000},"page":"615-625","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Analysis of Cybercrime on Social Media Platforms and Its Challenges"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4898-9888","authenticated-orcid":false,"given":"Afrah","family":"Almansoori","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohammed","family":"Alshamsi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1213-2014","authenticated-orcid":false,"given":"Sherief","family":"Abdallah","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6073-3981","authenticated-orcid":false,"given":"Said A.","family":"Salloum","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,5,29]]},"reference":[{"key":"54_CR1","doi-asserted-by":"crossref","unstructured":"Salloum, S.A., Alshurideh, M., Elnagar, A., Shaalan, K.: Machine learning and deep learning techniques for cybersecurity: a review. In: Joint European-US Workshop on Applications of Invariance in Computer Vision, pp. 50\u201357 (2020)","DOI":"10.1007\/978-3-030-44289-7_5"},{"issue":"5","key":"54_CR2","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","volume":"80","author":"J Jang-Jaccard","year":"2014","unstructured":"Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973\u2013993 (2014)","journal-title":"J. Comput. Syst. Sci."},{"issue":"4","key":"54_CR3","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1080\/14241277.2015.1120014","volume":"17","author":"AM Kaplan","year":"2015","unstructured":"Kaplan, A.M.: Social media, the digital revolution, and the business of media. Int. J. Media Manag. 17(4), 197\u2013199 (2015)","journal-title":"Int. J. Media Manag."},{"key":"54_CR4","doi-asserted-by":"crossref","unstructured":"Chy, M.K.A., Ahmed, S.A., Doha, A.H., Masum, A.K.M., Khan, S.I.: Social media user\u2019s safety level detection through classification via clustering approach. In: 2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2), pp. 1\u20134 (2019)","DOI":"10.1109\/IC4ME247184.2019.9036489"},{"issue":"1","key":"54_CR5","doi-asserted-by":"publisher","first-page":"127","DOI":"10.25046\/aj020115","volume":"2","author":"SA Salloum","year":"2017","unstructured":"Salloum, S.A., Al-Emran, M., Monem, A.A., Shaalan, K.: A survey of text mining in social media: Facebook and Twitter perspectives. Adv. Sci. Technol. Eng. Syst. J 2(1), 127\u2013133 (2017)","journal-title":"Adv. Sci. Technol. Eng. Syst. J"},{"issue":"2","key":"54_CR6","doi-asserted-by":"publisher","first-page":"73","DOI":"10.12785\/IJCDS\/060203","volume":"6","author":"SA Salloum","year":"2017","unstructured":"Salloum, S.A., Al-Emran, M., Shaalan, K.: Mining social media text: extracting knowledge from Facebook. Int. J. Comput. Digit. Syst. 6(2), 73\u201381 (2017)","journal-title":"Int. J. Comput. Digit. Syst."},{"key":"54_CR7","unstructured":"Habes, M., Alghizzawi, M., Khalaf, R., Salloum, S.A., Ghani, M.A.: The relationship between social media and academic performance: Facebook perspective. Int. J. Inf. Technol. Lang. Stud. 2(1) (2018)"},{"key":"54_CR8","doi-asserted-by":"crossref","unstructured":"Salloum, S.A., Al-Emran, M., Habes, M., Alghizzawi, M., Ghani, M.A., Shaalan, K.: Understanding the impact of social media practices on E-learning systems acceptance. In: International Conference on Advanced Intelligent Systems and Informatics, pp. 360\u2013369 (2019)","DOI":"10.1007\/978-3-030-31129-2_33"},{"key":"54_CR9","unstructured":"Alghizzawi, M., Habes, M., Salloum, S.A., Ghani, M.A., Mhamdi, C., Shaalan, K.: The effect of social media usage on students\u2019e-learning acceptance in higher education: a case study from the United Arab Emirates. Int. J. Inf. Technol. Lang. Stud. 3(3) (2019)"},{"key":"54_CR10","unstructured":"Alghizzawi, M., Salloum, S.A., Habes, M.: The role of social media in tourism marketing in Jordan. Int. J. Inf. Technol. Lang. Stud. 2(3) (2018)"},{"key":"54_CR11","unstructured":"Salloum, S.A., Mhamdi, C., Al Kurdi, B., Shaalan, K.: Factors affecting the adoption and meaningful use of social media: a structural equation modeling approach. Int. J. Inf. Technol. Lang. Stud. 2(3), 96\u2013109 (2018)"},{"key":"54_CR12","unstructured":"Icha, O., Agwu, P.E.: Effectiveness of social media networks as a strategic tool for organizational marketing management. J. Internet Bank Commer, S2 (2015)"},{"key":"54_CR13","doi-asserted-by":"crossref","unstructured":"Ye, X., Zhao, B., Nguyen, T.H., Wang, S.: Social media and social awareness. In: Manual of Digital Earth, Singapore, pp. 425\u2013440 (2020)","DOI":"10.1007\/978-981-32-9915-3_12"},{"key":"54_CR14","doi-asserted-by":"crossref","unstructured":"Sharma, B.K., Joseph, M.A., Jacob, B., Miranda, L.C.B.: Emerging trends in digital forensic and cyber security-an overview. In: Sixth HCT Information Technology Trends (ITT) 2019, pp. 309\u2013313 (2019)","DOI":"10.1109\/ITT48889.2019.9075101"},{"issue":"5","key":"54_CR15","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.1108\/ITP-06-2018-0280","volume":"32","author":"S Asongu","year":"2019","unstructured":"Asongu, S., Nwachukwu, J., Orim, S.M., Pyke, C.: Crime and social media. Inf. Technol. People 32(5), 1215\u20131233 (2019)","journal-title":"Inf. Technol. People"},{"key":"54_CR16","unstructured":"Al Mansoori, S., Almansoori, A., Alshamsi, M., Salloum, S.A., Shaalan, K.: Suspicious activity detection of Twitter and Facebook using sentimental analysis"},{"issue":"4","key":"54_CR17","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1177\/1477370818773610","volume":"16","author":"SGA van de Weijer","year":"2019","unstructured":"van de Weijer, S.G.A., Leukfeldt, R., Bernasco, W.: Determinants of reporting cybercrime: a comparison between identity theft, consumer fraud, and hacking. Eur. J. Criminol. 16(4), 486\u2013508 (2019)","journal-title":"Eur. J. Criminol."},{"issue":"1","key":"54_CR18","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1093\/bjc\/azz064","volume":"60","author":"ML Williams","year":"2020","unstructured":"Williams, M.L., Burnap, P., Javed, A., Liu, H., Ozalp, S.: Hate in the machine: anti-black and anti-muslim social media posts as predictors of offline racially and religiously aggravated crime. Br. J. Criminol. 60(1), 93\u2013117 (2020)","journal-title":"Br. J. Criminol."},{"key":"54_CR19","doi-asserted-by":"crossref","unstructured":"Ristea, A., Al Boni, M., Resch, B., Gerber, M.S., Leitner, M.: Spatial crime distribution and prediction for sporting events using social media. Int. J. Geogr. Inf. Sci. 1\u201332 (2020)","DOI":"10.1080\/13658816.2020.1719495"},{"key":"54_CR20","unstructured":"The python graph gallery (2017)"},{"key":"54_CR21","doi-asserted-by":"crossref","unstructured":"S. Canada, \u201cStatistics Canada\u201d (2018)","DOI":"10.1787\/itcs-v2018-1-2-en"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2021)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-76346-6_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T23:34:57Z","timestamp":1672270497000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-76346-6_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030763459","9783030763466"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-76346-6_54","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"29 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AICV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Artificial Intelligence and Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Settat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aicv12021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/egyptscience.net\/AICV2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}