You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/366842227

A Review on Nature, Cybercrime and Best Practices of Digital Footprints

Conference Paper · October 2022


DOI: 10.1109/ICCR56254.2022.9995834

CITATIONS READS

3 110

2 authors:

Nurdiana Jamal Jasni Mohamad Zain


Universiti Teknologi MARA Universiti Teknologi MARA
1 PUBLICATION 3 CITATIONS 202 PUBLICATIONS 3,160 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Nurdiana Jamal on 03 April 2023.

The user has requested enhancement of the downloaded file.


A Review on Nature, Cybercrime and Best Practices
of Digital Footprints
Nurdiana Jamal Jasni Mohamad Zain
Aman Manusia Sdn Bhd Institute for Big Data Analytics and Artificial Intelligence (IBDAAI),
Wisma Manikar, Lorong Manikar 1, Kompleks Al-Khawarizmi, Universiti Teknologi MARA,
88400 Kota Kinabalu, Sabah, Malaysia 40450, Shah Alam, Selangor, Malaysia
nurdiana.jamal@sapulut.com jasni67@uitm.edu.my

Abstract—Information and communication technology have self-control [4]. The second aspect is also known as the active
accelerated the rate of change in society. As a result, digital digital footprints.
identities have begun to form throughout this moment of
transition. These identities are related to the acts people carry All the data collected is used to target individuals with
out in online settings. Through these actions, a digital footprint specific services and goods. It provides several avenues for
is created. However, many cybercrime attacks have occurred investigating individuals' histories, personalities, interests,
due to negligence of not properly understanding and taking care activities, habits, and preferences. It will aid businesses in
of digital footprints. This paper reviewed the importance and targeted advertising, recommendation engines, and client
awareness of the digital footprints, the cybercrime involving acquisition. However, sadly, hackers and cybercriminals are
digital footprints, and countermeasures associated with the using the same tendency.
digital footprints. First, the research is carried out by examining
the nature of digital footprints to understand the operation of If they are not careful, they can access a person's private
digital footprints. Then, cybercrime related to digital footprints and personal information, resulting in identity theft and
2022 International Conference on Cyber Resilience (ICCR) | 978-1-6654-6122-1/22/$31.00 ©2022 IEEE | DOI: 10.1109/ICCR56254.2022.9995834

is examined to comprehend their threats to digital footprints. financial damage [5]. Furthermore, as the amount of time
Finally, the best practices to protect digital footprints are spent in digital environments increases, so do the number of
examined. Thus, understanding digital footprints will help users digital transactions and sharing. Thus, the investigations
of all ages be more vigilant and attentive in taking care of their emphasized the importance of employing digital tools safely
digital lifestyles. [6].

Keywords—digital footprints, digital identity, awareness, The paper reviews the importance and awareness
malware, phishing, pharming, identity theft, identity fraud, regarding the digital footprints while finding the related
mitigations, social engieering cybercrime and mitigation related to the digital footprints.
Section II shows the overview of the digital footprints. Section
I. INTRODUCTION III examines the cybercrime related to the digital footprints.
Most of our professional and personal lives are mediated Section IV discusses the management of digital footprints.
by digital technology, so we constantly interact with Finally, Section V and VI presents the analysis and conclusion
information systems without realizing it. Moreover, this of this paper.
conversation is often logged and stored for an extended
II. OVERVIEW OF DIGITAL FOOTPRINTS
period. These enormous digital footprints can be analyzed to
acquire insight into an individual's behavior, personal The blurring between online and offline personal existence
preferences, and needs and even to forecast future behaviors provides several visible or non-visible identities, ranging from
[1]. professional to personal responsibilities, which continually
change data gathering with social feedback. The first aspect of
Typically for commercial purposes, but occasionally for digital footprints is that digital identities are based on
other reasons, users' digital footprints follow, personalize, and computer-coded systems comprising sensors, gadgets,
promote according to users. These actions are conducted platforms, and online networks [7]. Digital services and online
primarily for the organization in question. In short, users' network activities presume the existence of a personal data
digital footprints are a monetizable asset [2]. However, the repository. Digital identity has two different meanings.
users do not receive any direct profit from their digital
footprints [1]. The first definition includes smart identification
technologies, such as biometrics, blockchain, and more data-
Digital footprints are the traces and recordings users leave driven services [8]. Consequently, digital data corpora are
behind each time they use the Internet. Each footprints users connected with sensitive data sets, identity theft risks, and
leave generates information that service providers can access. online dangers [9]. The second definition verifies encoded
For example, users leave a digital footprint on channels in entities inside social and content networks. The user's
each zone by sharing comments, images, videos, blogs, objective on digital platforms and apps is to connect safe and
bookmarks, reviews, ratings, social shopping, and linking to consistent data sets [10]. These data sets provide identity
government applications, among other activities [3]. verification, which allows for continued online control [4].
Users leave two aspects of digital footprints: digital These first aspects are also widely known as the passive digital
identity and online self. The first aspect refers to the digital footprints, as the data are generated unintentionally [11].
data corpus created by people and digital systems, also known The second aspect of digital footprints is the online self.
as the passive digital footprints. The second aspect Moreover, the second aspect is also known as the active digital
demonstrates that the 'Me' in social networks and digital footprints [12]. In social networks and online communities,
information possesses self-reflection, self-expression, and individual users generate visual representations, personal
narratives, and narratives as part of their digital footprints

978-1-6654-6122-1/22/$31.00 ©2022 IEEE

Authorized licensed use limited to: UNIVERSITI TEKNOLOGI MARA. Downloaded on January 04,2023 at 07:22:03 UTC from IEEE Xplore. Restrictions apply.
[13]. Targeting optimal online self-promotion or self- anonymous data from their partners and use it to target ads. As
expression, users manage their impressions on social media analyses relying on information from a single website cannot
platforms through various modes of expression, including convey the full scope of online consumer activity, many third-
selfies, images, videos, and other content [14]. Moreover, the party data aggregators are filling this void by combining the
effects of the Internet on social interactions dictate self-esteem data from numerous websites [22]. Table I shows the
through social comparison traps [15]. Therefore, online self- summarized nature of digital footprints.
representation requires an ongoing effort to regulate.
TABLE I. NATURE OF DIGITAL FOOTPRINTS
The three main digital footprints components are cache,
cookies, and linkability. The cache functionality improves the Properties Functions Types Details
Aspects Types of Passive The data are generated
web-browsing experience of a user by downloading and Digital unintentionally [11]
storing a local copy of website artefacts to increase the Footprints Active Individual users generate
efficiency of re-rendering a website on subsequent visits. visual representations,
Moreover, the cache can reveal a user's surfing patterns. For personal narratives, and
instance, although Internet history records may document the narratives as part of their
digital footprints [13].
websites a user has visited online, the cache might disclose the Components Operation Cache Saves portions of sites,
information on these web pages. In addition, the cache saves in Digital such as photos, to help
portions of sites, such as photos, to help them load more Footprints them load more quickly on
quickly on the user's subsequent visit [16]. the user's subsequent visit
[16]
The next component is a cookie, a random string of letters Cookies Cookies' digital traces
enhance the Internet's
and numbers devoid of intrinsic value that a website transmits usability and safeguard
to users' web browsers. Cookies' digital traces enhance the individual transactions
Internet's usability and safeguard individual transactions. [17].
Cookies are files that are produced by the websites the user Linkability key concept in any analysis
of online privacy [18]
visit. They facilitate users' online experience by storing users' Party that A person or company that
Players Advertisers
browsing data. Cookies do not only link transactions; they also uses pays to have a product,
allow websites to follow visitors whenever they visit [17]. Digital event, or job advertised
Footprints online, in a newspaper, on
The third component is linkability. Linkability is a key television, or a billboard.
concept in any analysis of online privacy because linkability The collected user data is
does more than anything else to erode users' ability to keep filtered, aggregated,
processed, and mined to
personal data within a single context and thus manage their provide marketers with
privacy [18]. As the data in digital footprints are collected and increased targeting
used to target individuals with specific services and goods, it capabilities [19]
is important to comprehend the players who provide these Publishers A publisher is a place to
display that message, with
services. These players are the advertisers, publishers, and a viewership the advertiser
aggregators. is interested in converting
[21].
An advertiser is a person or company that pays to have a Aggregators As analyses relying on
product, event, or job advertised online, in a newspaper, on information from a single
television, or a billboard. The collected user data is filtered, website cannot convey the
aggregated, processed, and mined to provide marketers with full scope of online
consumer activity, many
increased targeting capabilities [19]. They exploit users' third-party data
digital footprints to generate many marketing channels for aggregators are filling this
marketers to contact current and potential customers. Users' void by combining the data
digital footprints is an interactive resource that illuminates and from numerous websites
[22].
identifies current digital presence and growth potential that
would assist business owners and marketers in navigating the III. CYBERCRIME AROUND DIGITAL FOOTPRINTS
dynamic and often difficult array of options to engage clients
through digital media. In addition, this resource would be Digital footprints can identify a person's digital reputation,
useful for advertisers and marketing agents seeking to increase which is frequently regarded as equally important as their
potential reach and marketing expenditures [20]. offline reputation. Furthermore, they are generally permanent,
and once the information is made public or semi-public, online
The second player that uses the digital footprints is the phrases and images can be altered to cause an unintended
publishers. A publisher is a place to display that message, with offense. It is possible, for instance, for content intended for a
a viewership the advertiser is interested in converting. The private group to spread to a larger audience, damaging
relationship between advertisers and publishers is feasible to relationships, and friendships. Moreover, social engineering
serve simultaneously as an advertiser and a publisher. For attacks are rising and weakening the cybersecurity chain. In
example, if an app runs its adverts and hosts advertisements, the interest of cybercriminals, they seek to manipulate
it is both an advertiser and a publisher. The security of a individuals and businesses into divulging sensitive and
website may not immediately impact the user's experience, but valuable data.
it sends a message about how much the publisher regards the
user's safety from harmful use of its product and how well it In addition, cybercriminals might use users' digital
protects its advertising from fraud [21]. footprints for purposes such as phishing for account access or
creating false identities based on user data. Therefore, it is
Data aggregators and brokers get involved when the essential to comprehend the digital footprints’ cybercrime to
advertiser wants to be more specific. Data aggregators collect understand how to protect the digital footprints. The next

Authorized licensed use limited to: UNIVERSITI TEKNOLOGI MARA. Downloaded on January 04,2023 at 07:22:03 UTC from IEEE Xplore. Restrictions apply.
section will discuss the details related to these threats. Table D. Malvertising
II shows the types of cybercrime and its operations. Malvertising refers to the dissemination of malware
A. Malwares through online advertising. Unknowingly, targeted
advertising violates a user's personal privacy information [36].
Malware is an abbreviation for "malicious software" and
Malvertising attacks begin when a cybercriminal places a
refers to any software used to harm computing equipment or
malicious advertisement on a legitimate ad server or content
stored material. Malware corruption can express itself in
delivery network (CDN). An example of a malvertising attack
various ways, including formatting the hard drive, losing or
is using malicious toolkits such as exploit kits.
corrupting data, stealing saved login details, gathering
sensitive information, or even displaying unwelcome adverts Exploit kits are malicious toolkits or platforms that exploit
on screen [23]. Therefore, while monitoring internet behavior software or system security flaws to accomplish various
via a digital footprint, hackers infect devices with malware harmful acts, such as data theft and malware distribution [37].
that transmits sensitive information [24]. By accessing a user's Using an exploit kit, they can insert a harmful dynamic link or
social media account, for instance, hackers gain access to a hidden code within an advertisement or elements, such as
network of contacts to compromise. Different types of creative imagery, banner ad copy, or a video segment. The
malware attacks are ransomware [25], viruses, worms, trojans, exploit kit is an expert at concealing dangerous code or links
backdoor, malicious mobile code, backdoor, and rootkits [26]. from malware detection techniques that ad networks employ
to identify malicious behavior. It will scan the user's device to
B. Phishing find and exploit any vulnerabilities or flaws to install malware
Phishing frequently deceives people into entering personal [38]. After malware compromises a user's device, sensitive
information on a website whose design and user experience data may be corrupted, encrypted, held for ransom, or stolen
are nearly identical to those of a legitimate website [27]. for sale on the dark web [39].
Furthermore, phishers continually evolve their phishing
assaults to redirect visitors to bogus login pages and steal their E. Identity Theft
sensitive data by deeply hiding the phishing principle, and the Identity theft is the crime of getting the personal
lifespan of phishing URLs is becoming shorter [28]. Hackers information of another person for the sole intention of
usually send a spoofed email with a real-looking source name committing transactions or making purchases under that
to get the victim to click on the malicious link or attachment. person's name [40]. It happens when someone uses users'
When they succeed, hackers gain access to their target's personal information to illegally open new accounts or
private information. services in their name or to impersonate them in other ways
[41]. Unfortunately, getting another person's data has never
Scammers rely on software or security flaws installed on
been easier than it is today. Thieves gain access to personal
the user's device for their scheme to succeed. However,
information via data breaches or the dark web.
phishing assaults are not confined to email alone, and
cybercriminals often utilize SMS [29] and voice messages Moreover, bad actors may obtain all the information
[30] to impersonate genuine sources and target potential necessary to commit identity theft using a simple Google
victims. For instance, this would be the event if a search [42]. Because data brokers and people-search websites
cybercriminal pretended to be an employee of the user's bank. have complete profiles on millions of people, anyone can gain
The most common phishing attacks are smishing, fax, and access to user personal information for a nominal charge or
vishing [31]. for free and use it to impersonate them. There have been
reports of identity thieves utilizing data broker services,
C. Pharming although this normally occurs in secret and without anyone's
The email has become a crucial networking tool for knowledge [43].
business and personal needs. Unfortunately, among the
numerous security risks that affect computer users, F. Identity Fraud
"pharming" is a hazard that is becoming more prevalent [32]. Identity fraud is the fraudulent use of another person's
Pharming is the technique of sending unwanted emails using personal information or the combination of actual data with
a fake website hosted on a Domain Name System (DNS) false data to fool a third party [44]. The difference between
server. It may even be a portal to a malicious website designed identity theft and identity fraud is when someone obtains or
to deceive users into uploading malware or disclosing misuses users' personal information to access their existing
sensitive information [33]. These fraudulent websites may accounts [45]. Today, identity theft is a pervasive problem that
has caused several financial institutions to incur enormous
appear authentic at first glance, but they have the ulterior
losses. Javelin defines identity fraud as any action performed
purpose of stealing sensitive data, such as the user's login by a criminal to directly encourage a consumer to disclose
credentials, personal information, and banking information personal information or undertake transactions that reveal
[34]. personal information through face-to-face, phone, text, or
Additionally, hackers may hijack real links and domains email interaction. Victims of identity fraud frequently recall
to steal user data. Due to the prevalence of social engineering the precise moment or approach that led to their victimization
schemes and the low likelihood of internet consumers spotting [46].
a hidden threat, pharming can be more harmful to them.
Predominantly, phishing schemes are carried out via
exploiting the DNS. Pharming employs tactics such as DNS
cache poisoning, spoofing, and hijacking [35].

Authorized licensed use limited to: UNIVERSITI TEKNOLOGI MARA. Downloaded on January 04,2023 at 07:22:03 UTC from IEEE Xplore. Restrictions apply.
TABLE II. CYBERCRIME RELATED TO DIGITAL FOOTPRINTS There are now relatively few good reasons for a site that
Cybercrime Operations collects information from users to lack a secure site. Due to
Malware Malware corruption can express itself in various the amount of information from the browser, even surfing
ways, including formatting the hard drive, losing or certain sites might be risky. Moreover, never enter sensitive
corrupting data, stealing saved login details, information on an unprotected website, especially financial or
gathering sensitive information, or even displaying
unwelcome adverts on screen [23] payment information. An insecure website could also be a
Phishing Phishing frequently deceives people into entering "fake" site for phishing purposes [51].
personal information on a website whose design and
user experience are nearly identical to those of a Identity Resolution is a data management method that
legitimate website [27] verifies, validates, and appends information across devices
Pharming Pharming is the technique of sending unwanted and digital footprints using a unique matching technique to
emails using a fake website hosted on a DNS server
[32].
generate a single, data-rich profile for an individual or
Malvertising Malvertising refers to the dissemination of malware organization [52]. It eliminates customer data duplications and
through online advertising [36]. discrepancies by combining data management approaches and
Identity Theft Identity theft is the crime of getting the personal reliable reference data. Identity Resolution assists
information of another person for the sole intention organizations in preparing, cleansing, merging, or migrating
of committing transactions or making purchases
under that person's name [40]. data, identifying marketing targets, enhancing analytics,
Identity Fraud Identity fraud is the fraudulent use of another preventing fraud, and ensuring compliance with data or
person's personal information or the combination of industry rules [53].
actual data with false data to fool a third party [44].
V. ANALYSIS
IV. DIGITAL FOOTPRINTS MANAGEMENT
Social media connects people virtually; nevertheless, as
Digital footprints are permanent. Each new account, email the increasing number of people are negligent in caring for
exchanged, pictures uploaded, and geotagged location adds to their digital footprints, the risk of cybercrime increases. All of
a person's digital footprints. This data creates a digital this could be avoided or reduced when people understand how
representation of an individual's interests, hobbies, activities, digital footprints work. Unfortunately, although most papers
beliefs, and habits. Marketing firms may use this information reviewed to discuss the digital footprints in specific topics,
to send tailored adverts, but hackers can also use it to none has discussed the digital footprints as a whole from its
perpetrate identity theft. nature, affiliated parties, related cybercrimes, and best
Moreover, the digital footprints also determine a practices. As the review in this paper aims to give people
company's digital reputation, which is just as crucial as its awareness of digital footprints, it is important to review them
offline reputation today. Once a brand publishes something on as a whole so that people can illustrate the importance and
the Internet, it is there permanently. Sadly, it may also be dangers surrounding them.
exploited against the brand's reputation in the future. VI. CONCLUSION
Therefore, it is important to manage the digital footprints to
avoid and reduce exploitation from hackers or bad players on Based on the papers examined, the nature of digital
the Internet. Three best practices are examined: social media footprints identified understand its importance in everyone's
sharing, trusted websites, and identity resolution. daily life, regardless of all age. Despite its importance in
helping companies find their potential customers, users also
Privacy is a sacrifice many individuals are willing to make should be aware of how important their digital footprints is.
for the convenience and functionality of user-friendly Moreover, several papers are examined to understand
products and services. Sadly, this is also the most dangerous different digital footprints threats. Finally, several papers are
route from a safety standpoint. When contributing to the active examined to find the best practices to manage digital
digital footprints, supply as little information as feasible. This footprints.
general rule can assist in limiting the damage if users' personal
information is compromised and leaked. Today's digital surroundings satisfy individual
requirements through online and offline contexts. However,
Social sharing refers to the sharing of information through after each transaction is conducted in digital environments, a
various social media platforms. Many people make their conscious or unconscious contribution is made to constructing
phone number, address, and email address too accessible. certain records. Thus, digital footprints are left behind. From
They automatically broadcast their whereabouts, making it this perspective, individuals have significant obligations in
simple to trace them [47]. In addition, when users "like" their this process while doing certain transactions in digital settings.
own banks, healthcare providers, pharmacies, and many more.
They can direct fraudsters directly to their sensitive accounts. The review on the nature of digital footprints helps people
As the traces of digital footprints are permanent, it is important understand how digital footprints can affect their online
to think twice before sharing anything [48]. privacy. Moreover, identifying the parties involved behind
digital footprints helps people decide to allow these parties to
Next, it is important to verify the authentication and manipulate their data based on their digital footprints. Other
security of the website. A dangerous website is a malicious, than that, comprehending the cybercrime-related digital
unsafe, or fraudulent content with a harmful purpose toward footprints helps people be more vigilant in taking care of their
its viewers. These websites are susceptible to distributing digital footprints.
various forms of malware, fraud and phishing techniques, and
other cybercriminal activities [49]. If the URL begins with The best practices reviewed are not the ultimate solution
"HTTP" rather than "HTTPS," you should reconsider entering in taking care of people's digital footprints. However, it gives
any personal information because the "S" in the URL signifies people an alternative to maintaining their digital footprints. On
"secure" [50]. the other hand, given that young people predominantly utilize
digital environments, it is reasonable to assert that the issue of

Authorized licensed use limited to: UNIVERSITI TEKNOLOGI MARA. Downloaded on January 04,2023 at 07:22:03 UTC from IEEE Xplore. Restrictions apply.
digital footprints should be emphasized more for higher [15] C. Andersson, “Searching and deleting: youth, impression
education students. management and online traces of search,” Aslib Journal of Information
Management, vol. 72, no. 1, pp. 34–48, Nov. 2019, doi: 10.1108/ajim-
05-2019-0129.
ACKNOWLEDGMENT
[16] G. Horsman, “I didn’t see that! An examination of internet browser
This work is supported by Universiti Teknologi MARA cache behaviour following website visits,” Digital Investigation, vol.
under the research grant no. 600-RMC/GPK 5/3 (250/2020). 25, pp. 105–113, Jun. 2018, doi: 10.1016/j.diin.2018.02.006.
The authors are grateful to Institute for Big Data Analytics and [17] F.-C. Cheng and Y. S. Wang, “THE DO NOT TRACK MECHANISM
Artificial Intelligence (IBDAAI), Center of Computing FOR DIGITAL FOOTPRINTS PRIVACY PROTECTION IN
MARKETING APPLICATIONS,” Journal of Business Economics and
Technology and Network (CTN) Faculty of Computer and Management, vol. 19, no. 2, pp. 253–267, Sep. 2018, doi:
Mathematical Sciences, Universiti Teknologi Mara, Malaysia, 10.3846/jbem.2018.5200.
for offering research facilities. [18] M. D. Masseno and C. Teixeira Santos, “Personalization and profiling
of tourists in smart tourism destinations - a data protection
REFERENCES perspective,” rabida.uhu.es, vol. 4, no. 2, 2019, Accessed: Jul. 13,
[1] J. Hinds and A. Joinson, “Human and Computer Personality Prediction 2022. [Online]. Available: http://hdl.handle.net/10272/17838
From Digital Footprintss,” Current Directions in Psychological [19] L. Zhang, “Optimization of the Marketing Management System Based
Science, vol. 28, no. 2, pp. 204–211, Feb. 2019, doi: on Cloud Computing and Big Data,” Complexity, vol. 2021, pp. 1–10,
10.1177/0963721419827849. Apr. 2021, doi: 10.1155/2021/9924302.
[2] V. Arya, D. Sethi, and J. Paul, “Does digital footprints act as a digital [20] J. Banja, “Ethical Perspectives on Neuromarketing: An Interview With
asset? – Enhancing brand experience through remarketing,” Will Allred,” AJOB Neuroscience, vol. 10, no. 2, pp. 71–74, Apr. 2019,
International Journal of Information Management, vol. 49, pp. 142– doi: 10.1080/21507740.2019.1618619.
156, Dec. 2019, doi: 10.1016/j.ijinfomgt.2019.03.013. [21] J. Holcomb, “Digital Adaptation in Local News,” Columbia Journalism
[3] S. S. Muhammad, B. L. Dey, and V. Weerakkody, “Analysis of Factors School, Sep. 2018. Accessed: Jul. 13, 2022. [Online]. Available:
that Influence Customers’ Willingness to Leave Big Data Digital https://academiccommons.columbia.edu/doi/10.7916/d8-nhbp-st96
Footprintss on Social Media: A Systematic Review of Literature,” [22] S. Damangir, R. Y. Du, and Y. Hu, “Uncovering Patterns of Product
Information Systems Frontiers, vol. 20, no. 3, pp. 559–576, Oct. 2017, Co-consideration: A Case Study of Online Vehicle Price Quote
doi: 10.1007/s10796-017-9802-y. Request Data,” Journal of Interactive Marketing, vol. 42, pp. 1–17,
[4] K. Feher, “Digital identity and the online self: Footprints strategies – May 2018, doi: 10.1016/j.intmar.2017.11.002.
An exploratory and comparative research study,” Journal of [23] N. A. Hassan, “Introduction: Understanding Digital Forensics,” in
Information Science, vol. 47, no. 2, p. 016555151987970, Oct. 2019, Digital Forensics Basics, Berkeley, CA: Apress, 2019. doi:
doi: 10.1177/0165551519879702. 10.1007/978-1-4842-3838-7.
[5] S. V. Gies, N. L. Piquero, A. R. Piquero, B. Green, and A. Bobnis, [24] R. Islam, M. O. F. Rokon, A. Darki, and M. Faloutsos, “HackerScope:
“Wild, Wild Theft: Identity Crimes in the Digital Frontier,” Criminal the dynamics of a massive hacker online ecosystem,” Social Network
Justice Policy Review, vol. 32, no. 6, p. 088740342094965, Aug. 2020, Analysis and Mining, vol. 11, no. 1, Jun. 2021, doi: 10.1007/s13278-
doi: 10.1177/0887403420949650. 021-00758-8.
[6] Y. Sürmelioğlu and S. S. Seferoğlu, “An examination of digital [25] N. M. Chayal, A. Saxena, and R. Khan, “A review on spreading and
footprints awareness and digital experiences of higher education Forensics Analysis of Windows-Based ransomware,” Jun. 2022. doi:
students,” World Journal on Educational Technology: Current Issues, 10.1007/s40745-022-00417-5.
vol. 11, no. 1, pp. 48–64, Feb. 2019, doi: 10.18844/wjet.v11i1.4009.
[26] O. K. Akinde, A. O. Ilori, A. O. Afolayan, and O. B. Adewuyi, “Review
[7] N. Dutta, N. Jadav, S. Tanwar, H. K. D. Sarma, and E. Pricop, of computer malware: Detection and preventive strategies,” Jan. 2022.
Introduction to Digital Forensics. Singapore: Springer, 2021, pp. 71– doi: 10.5281/zenodo.5847958.
100. doi: 10.1007/978-981-16-6597-4_5.
[27] G.-G. Geng, Z.-W. Yan, Y. Zeng, and X.-B. Jin, “RRPhish: Anti-
[8] M. Li, L. Zhu, and X. Lin, “Efficient and Privacy-preserving phishing via mining brand resources request,” Jan. 2018. doi:
Carpooling using Blockchain-assisted Vehicular Fog Computing,” 10.1109/icce.2018.8326085.
IEEE Internet of Things Journal, vol. 6, no. 3, pp. 1–1, 2018, doi:
[28] V. Drury, L. Lux, and U. Meyer, “Dating Phish: An Analysis of the
10.1109/jiot.2018.2868076.
Life Cycles of Phishing Attacks and Campaigns,” Aug. 2022. doi:
[9] X. Cheng et al., “Combating emerging financial risks in the big data 10.1145/3538969.3538997.
era: A perspective review,” Fundamental Research, vol. 1, no. 5, pp.
[29] G. Sonowal, “Detecting Phishing SMS Based on Multiple Correlation
595–606, Sep. 2021, doi: 10.1016/j.fmre.2021.08.017.
Algorithms,” SN Computer Science, vol. 1, no. 6, Nov. 2020, doi:
[10] S. Duguay, C. Dietzel, and D. Myles, “The year of the ‘virtual date’: 10.1007/s42979-020-00377-8.
Reimagining dating app affordances during the COVID-19 pandemic,”
[30] M.-H. Tran, T. H. L. Hoai, and H. Choo, “A Third-Party Intelligent
New Media & Society, p. 146144482110722, Jan. 2022, doi:
System for Preventing Call Phishing and Message Scams,” in Future
10.1177/14614448211072257.
Data and Security Engineering. Big Data, Security and Privacy, Smart
[11] M. McDermott, “Digital Footprintss,” in Distance Learning, A. City and Industry 4.0 Applications, 2020, pp. 486–492. doi:
Orellana, K. Azaiza, E. Luyegu, and J. G. Flores, Eds. Information Age 10.1007/978-981-33-4370-2_37.
Publishing, 2018, pp. 51–53. Accessed: Jul. 13, 2022. [Online].
[31] K. L. Chiew, K. S. C. Yong, and C. L. Tan, “A survey of phishing
Available:
attacks: Their types, vectors and technical approaches,” Expert
https://books.google.com.my/books?id=HVVuDwAAQBAJ&printsec
Systems with Applications, vol. 106, pp. 1–20, Sep. 2018, doi:
=frontcover
10.1016/j.eswa.2018.03.050.
[12] I. P. Cahyani, V. Sevilla, and R. M. B. Wadu, “Beware of digital
[32] R. Damaševičius, R. Maskeliūnas, S. Misra, B. B. Salaudeen, and N.
footprintss: Wise social media usage for parents of early childhood
A. Azeez, “Identifying phishing attacks in communication networks
students,” Abdimas: Jurnal Pengabdian Masyarakat Universitas
using URL consistency features,” International Journal of Electronic
Merdeka Malang, vol. 7, no. 3, pp. 599–610, Aug. 2022, doi:
Security and Digital Forensics, vol. 12, no. 2, p. 200, 2020, doi:
10.26905/abdimas.v7i3.7467.
10.1504/ijesdf.2020.10027595.
[13] L. V. Kapustina, “Digital Footprints Analysis to Develop a Personal
[33] Z. Alkhalil, C. Hewage, L. Nawaf, and I. Khan, “Phishing Attacks: A
Digital Competency-Based Profile,” in Current Achievements,
Recent Comprehensive Study and a New Anatomy,” Frontiers in
Challenges and Digital Chances of Knowledge Based Economy, vol.
Computer Science, vol. 3. Mar. 09, 2021. doi:
133, Springer Nature, 2020, pp. 591–596. doi: 10.1007/978-3-030-
10.3389/fcomp.2021.563060.
47458-4_68.
[34] A. Kovac, I. Dunder, and S. Seljan, “An overview of machine learning
[14] J. W. Rettberg, “Self-Representation in Social,” in The SAGE
algorithms for detecting phishing attacks on electronic messaging
Handbook of Social Media, SAGE, 2018, pp. 429–443. doi:
services,” May 2022. doi: 10.23919/mipro55190.2022.9803517.
10.4135/9781473984066.n24.

Authorized licensed use limited to: UNIVERSITI TEKNOLOGI MARA. Downloaded on January 04,2023 at 07:22:03 UTC from IEEE Xplore. Restrictions apply.
[35] ChoiJae-Won, “Web Server Hacking and Security Risk using DNS Fraud Victimization,” Child Maltreatment, p. 107755952211015, May
Spoofing and Pharming combined Attack,” Journal of the Korea 2022, doi: 10.1177/10775595221101504.
Institute of Information and Communication Engineering, vol. 23, Art. [46] J. Buzzard, “2022 Identity Fraud Study: The Virtual Battleground,”
no. 11, Nov. 2019. Javelin, Mar. 29, 2022. https://javelinstrategy.com/2022-Identity-
[36] Y. Cai, G. O. M. Yee, Y. X. Gu, and C.-H. Lung, “Threats to Online fraud-scams-report
Advertising and Countermeasures,” Digital Threats: Research and [47] V. R, “Comparative Analysis for Personality Prediction by Digital
Practice, vol. 1, no. 2, pp. 1–27, Jul. 2020, doi: 10.1145/3374136. Footprintss in Social Media,” June 2021, vol. 3, no. 2, pp. 77–91, May
[37] T. Mokoena, T. Zuva, and M. Appiah, “Analysis of Social Engineering 2021, doi: 10.36548/jitdw.2021.2.002.
Attacks Using Exploit Kits,” in Intelligent Algorithms in Software [48] M. MAYDA, “Digital Footprints Management In Digital Visual
Engineering, 2020, pp. 189–204. doi: 10.1007/978-3-030-51965-0_16. Culture,” Erciyes İletişim Dergisi, vol. 9, no. 2, Jul. 2022, doi:
[38] P. Bountakas, C. Ntantogian, and C. Xenakis, “EKnad: Exploit Kits’ 10.17680/erciyesiletisim.1116477.
network activity detection,” Future Generation Computer Systems, vol. [49] A. Ali Ahmed, “Malicious Website Detection: A Review,” Journal of
134, pp. 219–235, Sep. 2022, doi: 10.1016/j.future.2022.04.001. Forensic Sciences & Criminal Investigation, vol. 7, no. 3, Feb. 2018,
[39] S. Sibi Chakkaravarthy, D. Sangeetha, and V. Vaidehi, “A Survey on doi: 10.19080/jfsci.2018.07.555712.
malware analysis and mitigation techniques,” Computer Science [50] [50]K. Krombholz, K. Busse, K. Pfeffer, M. Smith, and E. von
Review, vol. 32, pp. 1–23, May 2019, doi: Zezschwitz, “‘If HTTPS Were Secure, I Wouldn’t Need 2FA’ - End
10.1016/j.cosrev.2019.01.002. User and Administrator Mental Models of HTTPS,” IEEE Xplore, May
[40] A. K. M. B. Haque, R. Sultana, M. S. Fahad, and T. Islam, “Identity 01, 2019. https://ieeexplore.ieee.org/abstract/document/8835228/
Theft in South-East Asia: Causes and Precautions,” 2020. doi: (accessed Jun. 06, 2022).
10.20944/preprints202005.0330.v1. [51] J. Cui, H. Wang, W. Xue, and B. Wang, “Application of identity
[41] J. Blue, J. Condell, and T. Lunney, “Digital Footprintss: Your Unique resolution and blockchain technology in the whole industrial chain
Identity,” Jul. 2018. doi: 10.14236/ewic/hci2018.173. management of electrical equipment,” Journal of Physics: Conference
[42] C. Cross and R. Layt, “‘I Suspect That the Pictures Are Stolen’: Series, vol. 1800, no. 1, p. 012011, Feb. 2021, doi: 10.1088/1742-
Romance Fraud, Identity Crime, and Responding to Suspicions of 6596/1800/1/012011.
Inauthentic Identities,” in Social Science Computer Review, Mar. [52] H. Wang and Z. Sun, “Research on multi decision making security
2021, p. 089443932199931. doi: 10.1177/0894439321999311. performance of IoT identity resolution server based on AHP,”
[43] G. Birckan, M. L. Dutra, D. D. J. de Macedo, and A. F. Godoy Viera, Mathematical Biosciences and Engineering, vol. 18, no. 4, pp. 3977–
“Personal Data Protection and Its Reflexes on the Data Broker 3992, 2021, doi: 10.3934/mbe.2021199.
Industry,” in Lecture Notes of the Institute for Computer Sciences, [53] H. Kazemian, M.-H. Amirhosseini, and M. Phillips, “Application of
Social Informatics and Telecommunications Engineering, 2020, pp. Graph-Based Technique to Identity Resolution,” in IFIP Advances in
103–117. doi: 10.1007/978-3-030-50072-6_9. Information and Communication Technology, L. Iliadis, J. Macintyre,
[44] W. Wang, J. Zhang, Q. Li, C. Zong, and Z. Li, “Are You for Real? and P. Cortez, Eds. Springer Cham, 2022, pp. 471–482. doi:
Detecting Identity Fraud via Dialogue Interactions,” arXiv:1908.06820 10.1007/978-3-031-08333-4_38
[cs], Aug. 2019, [Online]. Available: https://arxiv.org/abs/1908.06820 .
[45] J. R. Gyourko and J. K. P. Greeson, “Annual Credit Checks for
Adolescent Youth in Foster Care: Factors Associated with Identity

Authorized licensed use limited to: UNIVERSITI TEKNOLOGI MARA. Downloaded on January 04,2023 at 07:22:03 UTC from IEEE Xplore. Restrictions apply.
View publication stats

You might also like