You are on page 1of 8

Facebook Misuse

Case Study

MCS1 / SBGE-101 / Group 1


Members:
Bobis, Alma
Carcueva, Mhar
Damo, Yohann Bea
Guinto, Dave
Lopez, Francis
Salvador, Kyle Joshua

I.

Introduction:

Facebook is definitely one of the most important part of many peoples life. But with all its is
usefulness in mind we should also be aware about the misuses of Facebook. No one can stop using FB
because it is such a wonderful tool to be in touch with our friends but having said that we must also take
enough security measures to avoid any risk. Facebook is the most powerful social media and the most
popular social networking site of all times. It provides an opportunity to all to learn more about the
culture, values, customs, and traditions of different communities living in various parts of the world. It
also helps to keep intact long distance relationships. It is an effective source of dissemination of
information, provision of entertainment and obtaining knowledge.
It is a fact that Facebook has experienced a dramatic growth. According to media reports, it is
growing rapidly with each passing day. It is being used by more than one billion users throughout the
world. Pakistan, with nine million users, is the 27th most popular country on Facebook. Out of these nine
million users, 70 percent are below the age of 25 years, while male users are 6.4 million and females are
2.7 million in number. Over two million users are college graduates. Around 44,000 new Pakistani users
join Facebook every week.
The Facebook users are educated people and many of them can be opinion makers but they too
indulge in negative activities and not only misuse this powerful platform but also waste their precious
time. The experts of social media are of the view that the usage of fake Facebook accounts and profiles
with obscene content, sexual material, lewd messages and vulgar photographs by males has become a
routine. Even the fake Facebook accounts of many known personalities, government officials, politicians
and judges have been created. These fake accounts are used for negative activities like blackmailing and
spreading propaganda.
The misuse of this powerful social media has been spreading unrest among its users, especially
females. These immoral and shameful activities do not suit civilised and sensible citizens. In this critical
situation, civil society activists, educators and teachers have to play a crucial role in assisting young
people in learning how to use this new technology creatively and productively.
In our society, it is being misused by most of the people. But no mechanism has been formulated to
curb its negative use. So we are discussing some cases about these misuses of facebook. We might not
know that we are already misung facebook. We must be aware about this especially the youth.
II.

Problem:
a.) Cybercriminals: The thieves inside our gadgets
According to GMA News website, dated July 31, 2014:

Manila, Philippines A young entrepreneur named Angie met her first business
loss in the Internet where she was transacting with a newly found reseller named Beth.
Trusting the security of the cyber world, she sent P50,000 worth of prepaid cards and
their PIN numbers to Beth, who would sell them. But thieves lurked in the cyber
highway, just like they do in the streets. Known as hackers, those thieves used technical
savvy to steal Beths identity, intercept the goods (the prepaid card PINS), and then
fade into the cyber highway.
Angie is definitely not the first, nor will she be the last victim of a crime
committed in the cyber world. With more people now using the Internet for social and
business connections, the number of cyber scams is expected to grow. Unfortunately,
most of them will never be reported. The reason: the victims are either embarrassed they
were too nave, or they perceive that it would be almost impossible to locate and punish
the hackers.
To illustrate only 833 cybercrimes have been reported to the National Bureau
of Investigation- Cyber Crime Division in 2012. Of those cases, online fraud, like the
case of Angie, topped the list with 137 reported cases.
b.) Investment scam operating via Facebook dupes victims of about P100M
According to Manila Bulletin website, dated October 12, 2013:
A scam operating via popular social networking site Facebook has duped over
100 people of more than P100 million by promising huge returns in their investments in
just a couple of months, the National Bureau of Investigation (NBI) said.
"Ang pangako, each P1,499 (investment) kikita ng P6,000 within one month, tapos ang
pay out daw every two weeks, said NBI Anti-Fraud Division agent Normando Anire in
an interview aired on GMA News' 24 Oras Thursday.
Anire identified the company behind the scam as Upwarm Limited Co. headed
by a certain Rodolfo Miranda Jr. Based on its Facebook page, Upwarm is a local
network marketing company selling various merchandise such as soap, food
supplements and perfume.
The company said its main office is located at Caluza Bldg. on M.H. Del Pilar
St., Sto. Cristo, Tarlac City, with branches at Regalia Bldg. on P. Tuazon St. in Cubao,
Quezon City; Manuel L. Quezon St. in Bagumbayan, Taguig; and in Baguio City.
Anire said the NBI has found out that Upwarm was not registered with the Securities and
Exchange Commission (SEC). He said the modus operandi of Upwarm was to send group
messages to random Facebook users and place advertisements on the popular social
III.

networking site.
Solution:
A.)
Facebook users should be more careful in sharing their personal information
about themselves to other users. Proper Netiquette should be observed. Even if the user

knows his/her friends or contact he/she should know its own limitations. Proper
Netiquette is not enough to secure the security of oneself. The best way to go about is
using the solutions provided by Cross-Domain Solutions. When organizations use cross
domain cyber security solutions, they can ensure that exchange of information adheres to
security protocols. The solution allows organizations to use a unified system comprising
of software and hardware that authenticates both manual and automatic transfer and
access of information when it takes places between different security classification levels.
This allows seamless sharing and access of information within a specific security
classification, but cannot be intercepted by or advertently revealed to user who is not part
of the security classification. This helps to keep the network and the systems using the
network safe.
Cross Domain Solution offers a way to keep all information confidential by using
safe and secure domains that cannot be tracked or accessed. This security solution can be
used by commercial and governmental organization to ensure an impenetrable network
while still making sure that users can get access to the required information easily.
B.)

Cyber Crime cases are one of the most uprising cases of abuse and misuse of
privacy. Every year, victims of cyber-crime cases has increase and until now its still
continue to double the number of its victims. A lot of Government from different
Countries like Philippines had started making its move to give solution to this emerging
problem. Like passing the so called law Cybercrime prevention act of 2012. The law aims
to address legal issues concerning online interactions. Among the cybercrime offenses
included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal
access to data and libel, But the law still facing a lot of petitions to the supreme court
from the concerned citizens. There are other solution like more centralized coordination
at regional (e.g. EU) and interregional levels, to streamline the fight against cybercrime.
The establishment of virtual taskforces to target internet facilitated organized
crime.These should be responsive to the evolving criminal environment e.g. more
permanent groups for information sharing, more ad hoc arrangements for specific
operations such as dismantling botnets. In all cases the authorities need to have the
flexibility to include a variety of stakeholders (law enforcement, military, and private

IV.

sector, and academia, user groups) in order to achieve the desired outcome.
Conclusion / Recommendation:
Conclusions
After knowing more about cybercrime Facebook mediated. The Facebook safety and discipline

could improve by the following statements we conclude;

1. Facebook users should lookout for illegitimate notifications, and requests for personal
information.
2. Change security information like password every month or two.
3. Be careful of personal information youre displaying in Facebook like pictures and others make it
private.
4. Keep the info about addresses or info about places belongs to your name.
5. As the saying Think before you click is very true, be careful to the things youre sayings and
information.
6. Control your power dont abuse others weaknesses.
Recommendations
This part of Chapter IV provides recommendations according to the stated conclusions, matching
with their respective numbers here are the following;
1. Something like notifications saying that youve won a prize and requesting personal information
and illegitimate transactions are obviously scams. Be aware of those or youll end up a cyber
victim.
2. Cases like cyber fraud involves hacking and identity theft to avoid cybercrimes like these, just
always update security so that Cyber harassments and crimes could be avoided.
3. Exposure of personal information could lead to cyber stalking, identity theft, or unfortunately
cyber robbery using your bank account via hacking e-mails.
4. Location information may use by robbers to rob you.
5. Reckless posting on Facebook could cause false, misinterpreted, and offensive statements, as a
netizen thats our responsible and as a Facebook user.
6. If youre knowledgeable in Informational Technology and networks it is your responsibility to
respect the Cyber Law and other peoples property.

V.

Bibliography:

Sites:
http://www.gmanetwork.com/news/story/372839/money/investment-scam-operating-via-facebookdupes-victims-of-about-p100m
http://www.mb.com.ph/cybercriminals-the-thieves-inside-our-gadgets/
VI.

Appendix / appendices:

You might also like