Source: Journal Citation ReportsTM from ClarivateTM 2022

Entrepreneurship and Sustainability Issues Open access
Journal Impact FactorTM (2022) 1.7
Journal Citation IndicatorTM (2022) 0.42
Received: 2017-06-17  |  Accepted: 2017-10-20  |  Published: 2017-12-29


Userfocus - tool for criminality control of social networks at both the local and international level


There are many benefits, but also risks related to using the social networks. Among the benefits of social networking belong an easy way to be kept in touch, sharing news, photos, videos and statuses with friends, colleagues, but also meeting new people with similar interests. The risks include, in particular, loss of privacy, misuse of shared records, abuse of personal data, unknown real identity of social network members, and even addiction on social networking. The paper focuses the need to invent a complex tool of prevention in the field of controling the criminality in particular the users of social networks. In the papers is introduced a proposals how to develop a specific prevention tool called "Userfocus". Further, there are described techniques to implement this tool into the social networks. The work comprises a research (questionnaire survey) aimed at users of social networks and their understanding of prevention in social networks. The results showed that the communication (interaction) among social network users is a main reason to actively use those services, loss of privacy is the most negative aspect of social networking, the perceiving of users related to the fight against anti-social networks is mostly negative, they strongly agree with the necessity to apply preventive methods focusing the user of social networks and consider the developing the preventive techniques and their application by competent authorities in prevention of crime on social network.


social network infiltration, Userfocus, profile, intervention, anonymity, security

JEL classifications

K14 , C88






This is an open access issue and all published articles are licensed under a
Creative Commons Attribution 4.0 International License


Šišulák, Stanislav
Academy of the Police Force in Bratislava, Bratislava, Slovakia
Articles by this author in: CrossRef |  Google Scholar

Journal title

Entrepreneurship and Sustainability Issues





Issue date

December 2017

Issue DOI


ISSN 2345-0282 (online)


VšĮ Entrepreneurship and Sustainability Center, Vilnius, Lithuania


Google Scholar

Article views & downloads

HTML views: 3632  |  PDF downloads: 1902


Akatyev, N., James, J.I. 2015. Cyber peacekeeping. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST 157, pp. 126–139.

Search via ReFindit

Bihariová, I. 2012. Cyber hate – nenávisť na internete. [Cyber hate - hate on Internet]. Available on the Internet

Search via ReFindit

Brantingham, P.J., Faust, F.L. 1976. A conceptual model of crime prevention. Crime and Delinquency, 22(3): 290.

Search via ReFindit

Clancey, G. 2014. Thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy. University of Sydney – Faculty of Law.

Search via ReFindit

Guštafík P. 2016. Gamifikácia vo vzdelávaní: čo to je, ako na ňu, a prečo o ňu usilovať? [Gamification in education: what it is how to on it, and why seeking it?]. Available on the Internet:

Search via ReFindit

Krejčí, V. 2010. Kyberšikana. [Cyberbullying]. Available on the Internet:

Search via ReFindit

Meteňko, J. et al. 2004. Kriminalistické metódy a možnosti kontroly sofistikovanej kriminality [Investigative techniques and sophisticated options to control crime]. Bratislava: Akadémia Policajného zboru.

Search via ReFindit

Moustafa, A., Al-Shomrani, M. M., Al-Marghirani, A., Al-Rababah, A. A. 2013. Hacking and cyber crimes: A preventive guide. Journal of Engineering and Applied Sciences, Vol. 8 (7), p. 225-229.

Search via ReFindit

Perina, T. 2011. Sociálne siete a ich využitie v marketingu. [Social networks and their use in marketing]. Trenčín: Vysoká škola manažmentu v Trenčíne.

Search via ReFindit

Sadhukhan, K., Mallari, R.A., Yadav, T. 2015. Cyber Attack Thread: A control-flow based approach to deconstruct and mitigate cyber threats, International Conference on Computing and Network Communications, CoCoNet 2015, art. no. 7411183, pp. 170-178.

Search via ReFindit

Sekgwathe, V., Talib, M. 2011. Cyber crime detection and protection: Third world still to cope-up. 2011. Communications in Computer and Information Science, 171 CCIS, pp. 171-181.

Search via ReFindit

Šišulák, S., Šalmík, M. 2013. Cyberbullying ako forma zneužitia sociálnych sietí na internete [Cyberbullying as a form of abuse of social networking on the internet], Policajná teória a prax. 21(4), pp. 112-123.

Search via ReFindit

Smyth, S. M. 2005. Crime prevention and community safety: From realspace to cyberspace (MR07360). ProQuest Central; ProQuest Dissertations & Theses A&I.

Search via ReFindit

Somer, T., Hallaq, B., Watson, T. 2016. Utilising journey mapping and crime scripting to combat cyber crime. Proceedings of the European Conference on Information Warfare and Security (ECCWS), January 2016, pp. 276-281.

Search via ReFindit

Tomková, J. 2016. Adolescenti a negatívne zážitky na internete. Kyberšikanovanie. [Adolescents and negative experiences on the internet. Cyberbullying]. Available on the Internet:

Search via ReFindit

Vnouček, P. 2010. Facebookový vrah má doživotí. Sociální síť sklízí kritiku [The Facebook murderer has life. Social network reaps criticism], Týden. Available on the Interne:

Search via ReFindit

Wasserman, S., Faust, K. 1994. Social Network Analysis: Methods and Applications. Cambridge: Cambridge University Press.

Search via ReFindit