{"id":20340,"date":"2019-02-12T13:55:06","date_gmt":"2019-02-12T12:55:06","guid":{"rendered":"https:\/\/piek.international\/?p=20340"},"modified":"2020-01-29T02:53:05","modified_gmt":"2020-01-29T01:53:05","slug":"cybercrime-social-media","status":"publish","type":"post","link":"https:\/\/piekblog.com\/en\/cybercrime-social-media\/","title":{"rendered":"Cybercrime, social media and IS"},"content":{"rendered":"<p>We can no longer imagine a world without social media, of all sorts and sizes. What we can see are shifts in popularity from one platform to another. YouTube and Pinterest are currently firm favourites, whereas Twitter and Facebook have been losing customers, also because of newly introduced privacy legislation and various scandals in the past few years.<\/p>\n<p>Cybercriminals, too, make abundant use of social media. Especially because computer technology is more and more integrated into devices that we use every day, criminals now have an easy job sneaking into our social and private lives.<\/p>\n<p>There are already over 400 different social media platforms. These are not only used by \u2018ordinary\u2019 people. Also IS terrorists use them to disseminate their terrorist propaganda. The YouTube and Facebook guardians are unable to put a stop them. Take YouTube for example. Every minute more than 300 hours of contents are uploaded there. This is beyond YouTube\u2019s own power to contain, check and control.<\/p>\n<p>Artificial Intelligence (AI) and machine learning could be useful in combatting online undesirable behaviour, abuse and crime. The British government has developed a new system that helps to recognise IS terrorist propaganda with 99.99% accuracy and that can then delete it from the platform. This programme is attuned to videos, which means that out of a 100 videos only one needs to be checked and assessed by a human being. That is a huge step forward in fighting digital terrorism and propaganda.<\/p>\n<p>Tackling cybercrime requires a multi-pronged approach because it is a very complex problem. From a sociological perspective, we can ask ourselves why we are sometimes so gullible when we are online. From a psychological perspective, we can ask ourselves why we are blind to fraud, e.g. when we click phishing emails. Various disciplines would have to cooperate to tackle this form of crime. The legislator is also part of the task force and will have to become much more pro-active by updating legislation. This should make cybercrime less rewarding and the chance to get caught bigger. Cooperation between the technical interconnect industry, AI and machine learning is also self-evident.<\/p>\n<p>It is an illusion to think that we can ever stamp out cybercrime and terrorism in our society, but we can prevent ourselves from being attacked by remaining alert and keeping each other informed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We can no longer imagine a world without social media,  [&#8230;]<\/p>\n","protected":false},"author":2,"featured_media":20401,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[229],"tags":[111],"class_list":["post-20340","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-cybercrime"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercrime, social media and IS - PIEK<\/title>\n<meta name=\"description\" content=\"We can no longer imagine a world without social media, of all sorts and sizes. What we can see are shifts in popularity from one platform to another.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/piekblog.com\/en\/cybercrime-social-media\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime, social media and IS - PIEK\" \/>\n<meta property=\"og:description\" content=\"We can no longer imagine a world without social media, of all sorts and sizes. What we can see are shifts in popularity from one platform to another.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/piekblog.com\/en\/cybercrime-social-media\/\" \/>\n<meta property=\"og:site_name\" content=\"PIEK\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PiekIEC\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-12T12:55:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-29T01:53:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-1-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"523\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PIEK\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PiekIEC\" \/>\n<meta name=\"twitter:site\" content=\"@PiekIEC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PIEK\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-social-media\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-social-media\\\/\"},\"author\":{\"name\":\"PIEK\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#\\\/schema\\\/person\\\/d4e1a7e17c2635190da8f30a076231e8\"},\"headline\":\"Cybercrime, social media and IS\",\"datePublished\":\"2019-02-12T12:55:06+00:00\",\"dateModified\":\"2020-01-29T01:53:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-social-media\\\/\"},\"wordCount\":388,\"publisher\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-social-media\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cybercrime-1-2.jpg\",\"keywords\":[\"Cybercrime\"],\"articleSection\":[\"PIEK News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-social-media\\\/\",\"url\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-social-media\\\/\",\"name\":\"Cybercrime, social media and IS - PIEK\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-social-media\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-social-media\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cybercrime-1-2.jpg\",\"datePublished\":\"2019-02-12T12:55:06+00:00\",\"dateModified\":\"2020-01-29T01:53:05+00:00\",\"description\":\"We can no longer imagine a world without social media, of all sorts and sizes. What we can see are shifts in popularity from one platform to another.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-social-media\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-social-media\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-social-media\\\/#primaryimage\",\"url\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cybercrime-1-2.jpg\",\"contentUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cybercrime-1-2.jpg\",\"width\":1200,\"height\":523,\"caption\":\"cybercrime\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-social-media\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/piekblog.com\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime, social media and IS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/piekblog.com\\\/en\\\/\",\"name\":\"PIEK\",\"description\":\"Your knowledge provider for the electronics industry\",\"publisher\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/piekblog.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#organization\",\"name\":\"PIEK International Education Centre (I.E.C.)\",\"url\":\"https:\\\/\\\/piekblog.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/PIEK-Logo-2x.png\",\"contentUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/PIEK-Logo-2x.png\",\"width\":300,\"height\":120,\"caption\":\"PIEK International Education Centre (I.E.C.)\"},\"image\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PiekIEC\",\"https:\\\/\\\/x.com\\\/PiekIEC\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/piek-international-education-centre-bv\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PIEKtraining\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#\\\/schema\\\/person\\\/d4e1a7e17c2635190da8f30a076231e8\",\"name\":\"PIEK\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d7f713fc2a694cc9495c04b9b7509ef9af9da47d5cb5b341213f14f6539c9e8e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d7f713fc2a694cc9495c04b9b7509ef9af9da47d5cb5b341213f14f6539c9e8e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d7f713fc2a694cc9495c04b9b7509ef9af9da47d5cb5b341213f14f6539c9e8e?s=96&d=mm&r=g\",\"caption\":\"PIEK\"},\"url\":\"https:\\\/\\\/piekblog.com\\\/en\\\/author\\\/adminpiektraining-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrime, social media and IS - PIEK","description":"We can no longer imagine a world without social media, of all sorts and sizes. What we can see are shifts in popularity from one platform to another.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/piekblog.com\/en\/cybercrime-social-media\/","og_locale":"en_US","og_type":"article","og_title":"Cybercrime, social media and IS - PIEK","og_description":"We can no longer imagine a world without social media, of all sorts and sizes. What we can see are shifts in popularity from one platform to another.","og_url":"https:\/\/piekblog.com\/en\/cybercrime-social-media\/","og_site_name":"PIEK","article_publisher":"https:\/\/www.facebook.com\/PiekIEC","article_published_time":"2019-02-12T12:55:06+00:00","article_modified_time":"2020-01-29T01:53:05+00:00","og_image":[{"width":1200,"height":523,"url":"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-1-2.jpg","type":"image\/jpeg"}],"author":"PIEK","twitter_card":"summary_large_image","twitter_creator":"@PiekIEC","twitter_site":"@PiekIEC","twitter_misc":{"Written by":"PIEK","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/piekblog.com\/en\/cybercrime-social-media\/#article","isPartOf":{"@id":"https:\/\/piekblog.com\/en\/cybercrime-social-media\/"},"author":{"name":"PIEK","@id":"https:\/\/piekblog.com\/en\/#\/schema\/person\/d4e1a7e17c2635190da8f30a076231e8"},"headline":"Cybercrime, social media and IS","datePublished":"2019-02-12T12:55:06+00:00","dateModified":"2020-01-29T01:53:05+00:00","mainEntityOfPage":{"@id":"https:\/\/piekblog.com\/en\/cybercrime-social-media\/"},"wordCount":388,"publisher":{"@id":"https:\/\/piekblog.com\/en\/#organization"},"image":{"@id":"https:\/\/piekblog.com\/en\/cybercrime-social-media\/#primaryimage"},"thumbnailUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-1-2.jpg","keywords":["Cybercrime"],"articleSection":["PIEK News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/piekblog.com\/en\/cybercrime-social-media\/","url":"https:\/\/piekblog.com\/en\/cybercrime-social-media\/","name":"Cybercrime, social media and IS - PIEK","isPartOf":{"@id":"https:\/\/piekblog.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/piekblog.com\/en\/cybercrime-social-media\/#primaryimage"},"image":{"@id":"https:\/\/piekblog.com\/en\/cybercrime-social-media\/#primaryimage"},"thumbnailUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-1-2.jpg","datePublished":"2019-02-12T12:55:06+00:00","dateModified":"2020-01-29T01:53:05+00:00","description":"We can no longer imagine a world without social media, of all sorts and sizes. What we can see are shifts in popularity from one platform to another.","breadcrumb":{"@id":"https:\/\/piekblog.com\/en\/cybercrime-social-media\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/piekblog.com\/en\/cybercrime-social-media\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/piekblog.com\/en\/cybercrime-social-media\/#primaryimage","url":"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-1-2.jpg","contentUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-1-2.jpg","width":1200,"height":523,"caption":"cybercrime"},{"@type":"BreadcrumbList","@id":"https:\/\/piekblog.com\/en\/cybercrime-social-media\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/piekblog.com\/en"},{"@type":"ListItem","position":2,"name":"Cybercrime, social media and IS"}]},{"@type":"WebSite","@id":"https:\/\/piekblog.com\/en\/#website","url":"https:\/\/piekblog.com\/en\/","name":"PIEK","description":"Your knowledge provider for the electronics industry","publisher":{"@id":"https:\/\/piekblog.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/piekblog.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/piekblog.com\/en\/#organization","name":"PIEK International Education Centre (I.E.C.)","url":"https:\/\/piekblog.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/piekblog.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/piekblog.com\/wp-content\/uploads\/PIEK-Logo-2x.png","contentUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/PIEK-Logo-2x.png","width":300,"height":120,"caption":"PIEK International Education Centre (I.E.C.)"},"image":{"@id":"https:\/\/piekblog.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PiekIEC","https:\/\/x.com\/PiekIEC","https:\/\/www.linkedin.com\/company\/piek-international-education-centre-bv","https:\/\/www.youtube.com\/c\/PIEKtraining"]},{"@type":"Person","@id":"https:\/\/piekblog.com\/en\/#\/schema\/person\/d4e1a7e17c2635190da8f30a076231e8","name":"PIEK","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d7f713fc2a694cc9495c04b9b7509ef9af9da47d5cb5b341213f14f6539c9e8e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d7f713fc2a694cc9495c04b9b7509ef9af9da47d5cb5b341213f14f6539c9e8e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d7f713fc2a694cc9495c04b9b7509ef9af9da47d5cb5b341213f14f6539c9e8e?s=96&d=mm&r=g","caption":"PIEK"},"url":"https:\/\/piekblog.com\/en\/author\/adminpiektraining-com\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/posts\/20340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/comments?post=20340"}],"version-history":[{"count":0,"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/posts\/20340\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/media\/20401"}],"wp:attachment":[{"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/media?parent=20340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/categories?post=20340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/tags?post=20340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}