CFP last date
20 February 2026
Call for Paper
March Edition
IJCA solicits high quality original research papers for the upcoming March edition of the journal. The last date of research paper submission is 20 February 2026

Submit your paper
Know more
Random Articles
Reseach Article

Modeling Propagation of Financial Fraud: A Case Study of Cryptocurrency Scam in Social Networks

by Naglaa Mostafa, Hatem Abdelkader, Asmaa Ali
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 73
Year of Publication: 2026
Authors: Naglaa Mostafa, Hatem Abdelkader, Asmaa Ali
10.5120/ijca2026926242

Naglaa Mostafa, Hatem Abdelkader, Asmaa Ali . Modeling Propagation of Financial Fraud: A Case Study of Cryptocurrency Scam in Social Networks. International Journal of Computer Applications. 187, 73 ( Jan 2026), 54-58. DOI=10.5120/ijca2026926242

@article{ 10.5120/ijca2026926242,
author = { Naglaa Mostafa, Hatem Abdelkader, Asmaa Ali },
title = { Modeling Propagation of Financial Fraud: A Case Study of Cryptocurrency Scam in Social Networks },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2026 },
volume = { 187 },
number = { 73 },
month = { Jan },
year = { 2026 },
issn = { 0975-8887 },
pages = { 54-58 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number73/modeling-propagation-of-financial-fraud-a-case-study-of-cryptocurrency-scam-in-social-networks/ },
doi = { 10.5120/ijca2026926242 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2026-01-20T22:56:18.684359+05:30
%A Naglaa Mostafa
%A Hatem Abdelkader
%A Asmaa Ali
%T Modeling Propagation of Financial Fraud: A Case Study of Cryptocurrency Scam in Social Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 73
%P 54-58
%D 2026
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information diffusion in social networks enables rapid knowledge sharing but also facilitates the viral spread of misinformation. This duality becomes particularly dangerous in the context of financial schemes. The OneCoin cryptocurrency scam exploited social media platforms and personal networks to spread deceptive narratives about its legitimacy. Utilizing emotional triggers such as the fear of missing out (FOMO), trust in influencers, and fabricated blockchain claims, the scam reached millions globally, exploiting the structure and dynamics of social networks, including echo chambers. Influencer hubs played a crucial role in the speed and scale of this misinformation cascade. This study aims to investigate how misinformation related to financial fraud propagates through social networks. It focuses on the OneCoin case to understand the mechanisms of influence, diffusion patterns, and the role of social structures in the sustainability of misinformation. By analyzing user impact, engagement behavior, and viral spread patterns, the objective is to propose data-driven strategies to detect, contain, and ultimately prevent the future dissemination of fraudulent content. We employed a multi-method analytical approach that combines quantitative and structural techniques. Data was sourced from YouTube and social media posts related to OneCoin and Ruja Ignatova. Metrics, including average views, engagement rates, and influencer activity, were analyzed over time. We integrated network analysis models to identify key propagation nodes and cascades, and applied sentiment and hashtag economic analysis to evaluate the virality of information. Findings reveal that the One Coin misinformation campaign achieved broad reach through early influencer amplification, repeated emotional appeals, and minimal counter-narratives. The average engagement rate was 0.76%, with significant spikes during orchestrated events. These results underscore the urgency of early detection systems grounded in network science.

References
  1. S. Vosoughi, D. Roy, and S. Aral, "The spread of true and false news online," science, vol. 359, no. 6380, pp. 1146–1151, 2018.
  2. News, in The Cryptoqueen who disappeared with billions, 2023.
  3. Fbi, in Ten Most Wanted: Ruja Ignatova, 2023.
  4. W. Chung, Y. Zhang, and J. Pan, "A theory-based deep-learning approach to detecting disinformation in financial social media," Information Systems Frontiers, vol. 25, no. 2, pp. 473–492, 2023.
  5. Brand24, Ed., "Hashtag and sentiment analysis for cryptocurrency scams." 2024.
  6. F. Pierri, C. Piccardi, and S. Ceri, "Topology comparison of Twitter diffusion networks effectively reveals misleading information," Scientific reports, vol. 10, no. 1, p. 1372, 2020.
  7. H. T. Phan, N. T. Nguyen, and D. Hwang, "Fake news detection: A survey of graph neural network methods," Applied Soft Computing, vol. 139, p. 110235, 2023.
  8. X. Wu, "A trust-based detection scheme to explore anomaly prevention in social networks," Knowledge and Information Systems, vol. 60, pp. 1565–1586, 2019.
  9. O. Patel, "ANOMALY DETECTION IN CRYPTOCURRENCY TRANSACTIONS USING MACHINE LEARNING."
  10. Y. Zhu, T. Michalak, X. Luo, X. Zhang, and K. Zhou, "Toward secrecy-aware attacks against trust prediction in signed social networks," IEEE Transactions on Information Forensics and Security, vol. 19, pp. 3567–3580, 2024.
  11. K. Kajol, S. Devarakonda, R. Singh, and H. K. Baker, "Drivers influencing the adoption of cryptocurrency: a social network analysis approach," Financial Innovation, vol. 11, no. 1, pp. 1–25, 2025.
  12. F. Mlika, W. Karoui, and L. Ben Romdhane, "Trustworthy decentralization based on blockchain tools for social network architectures," Social Network Analysis and Mining, vol. 14, no. 1, p. 95, 2024.
Index Terms

Computer Science
Information Sciences

Keywords

Information diffusion Misinformation Social Network Analysis Cryptocurrency Scam