Online Social Networks in Business Frameworks -  - E-Book

Online Social Networks in Business Frameworks E-Book

0,0
237,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

This book presents a vital method for companies to connect with potential clients andconsumers in the digital era of Online Social Networks (OSNs), utilizing the strengthof well-known social networks and AI to achieve success through fostering brandsupporters, generating leads, and enhancing customer interactions.

There are currently 4.8 billion Online Social Network (OSN) users worldwide. Online Social Networks in Business Frameworks presents marketing through online social networks (OSNs), which is a potent method for companies of all sizes to connect with potential clients and consumers. If visitors are not on OSN sites like Facebook, Twitter, and LinkedIn, they are missing out on the fact that people discover, learn about, follow, and purchase from companies on OSNs. Excellent OSN advertising may help a company achieve amazing success by fostering committed brand supporters and even generating leads and revenue. A type of digital advertising known as social media marketing (SMM) makes use of the strength of well-known social networks to further advertise and establish branding objectives. Nevertheless, it goes beyond simply setting up company accounts and tweeting whenever visitors feel like it. Preserving and improving profiles means posting content that represents the company and draws in the right audience, such as images, videos, articles, and live videos, addressing comments, shares, and likes while keeping an eye on the reputation to create a brand network, and following and interacting with followers, clients, and influencers.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 1016

Veröffentlichungsjahr: 2024

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.


Ähnliche


Table of Contents

Cover

Table of Contents

Series Page

Title Page

Copyright Page

Preface

1 Unmasking Social Media Crimes: Types, Trends, and Impact

1.1 Introduction

1.2 Related Work

1.3 Social Media

1.4 Types of Social Media Crimes

1.5 Trends in Social Media Crimes

1.6 Law Enforcements’s Use of Social Media Surveillance

1.7 Challenges in Social Media Surveillance

1.8 Impact of Social Media Crimes

1.9 Conclusion

References

2 Study on Vulnerability in Online Social Networking: Impact on an Individual, Community

2.1 Introduction

2.2 Statistics of Online Social Media Network

2.3 Existing Research on Social Media Vulnerabilities

2.4 Vulnerability

2.5 Future Trends

2.6 Conclusion

Acknowledgement

References

3 Application of Google Lens Clone Using Image Recognition in Enterprise Environment

3.1 Introduction

3.2 Requirement and Application

3.3 Strengths and Weaknesses

3.4 Limitations

3.5 Approach

3.6 Design and Implementation

3.7 Experimental Results and Analysis

3.8 Conclusion

References

4 An Artificial Intelligence Risk Assessment of a Material Handling System Using a Cost–Safety Matrix

Introduction

References

5 Sustainable Futures: Navigating Blockchain’s Energy Dilemma

5.1 Introduction

5.2 Related Work

5.3 Understanding Blockchain Technology

5.4 Energy Dilemma in Blockchain Technology

5.5 Environmental Implications

5.6 Sustainable Solutions in Blockchain

5.7 Scalability and Efficiency Issues in Greener Consensus Mechanisms

5.8 Blockchain’s Role in Sustainable Development Goals (SDGS) [11, 12]

5.9 Industry Applications and Best Practices [7, 8]

5.10 Conclusion

References

6 Role of Online Social Networking in Smart Healthcare

6.1 Introduction

6.2 Evolution of Online Social Network and Smart Healthcare

6.3 Issues and Challenges Towards Online Social Networking in Smart Healthcare

6.4 Popular Case Study 1: Online Social Networking in Smart Healthcare

6.5 Integrating Social Networking into Healthcare Policies for Better and Reliable Services

6.6 Future Opportunities and Innovation Towards Online Social Networking in Healthcare

6.7 An Open Discussion on OSN [18, 19] for Healthcare with Cutting Edge Technologies for Modern People

6.8 Conclusion

References

7 Application and Future Trends in Online Social Networking for the Next Generation

7.1 Introduction to Online Social Networking, and Next Generation Society: Fundamentals, and Key Component and Features

7.2 Current Applications of Online Social Networking

7.3 Role of Emerging Applications in Making Effective Online Social Networking

7.4 Next-Generation Social Networking Technologies for Modern Generation

7.5 Future Research Opportunities Towards Online Social Networking for the Next Generation

7.6 Open Issues and Challenges in Next-Generation Machine-Based Social Networking

7.7 User Perspectives and Expectations Today by OSN and Its Effect on Modern Society/Generation

7.8 Conclusion

References

8 Security and Possible Threats in Today’s Online Social Networking Platforms

8.1 Introduction

8.2 Existing Security Architecture in Social Networking Platforms

8.3 Common Security Threats on Network and Websites

8.4 Security and Privacy Issues in Online Social Networking in Today’s Smart Era

8.5 Emerging Threats for Next Generation Based Online Social Networking

8.6 Security Measures and Tools Available for Protecting Network/OSNs

8.7 Regulatory Framework and Compliance for Reliable/Safe/Secure OSNs for Next Generation

8.8 Incident Response and Recovery Towards OSNs

8.9 Detection and Notification Towards OSNs

8.10 Conclusion

References

9 The Future of Artificial Intelligence and Machine Learning in Online Social Networking

9.1 Introduction

9.2 Current Landscape of Online Social Networking

9.3 Open Issues and Challenges Towards AI and ML in Social Networking

9.4 Future Research Opportunities Towards AI and ML in Social Networking

9.5 Applications of AI in Online Social Networking

9.6 Future Research Opportunities Towards AI and ML in Social Networking Using Emerging Technologies

9.7 Conclusion

References

10 Future Opportunities Towards Online Social Networking in the Era of Industry 4.0/5.0

10.1 Introduction

10.2 Evolution of Online Social Networking in Industry 4.0/5.0

10.3 Emerging Opportunities with Emerging Technologies for Social Networking in Industry 4.0/5.0

10.4 Interconnectivity and Integration of Emerging Technology with Industry 4.0/5.0 for Effective Online Social Networking

10.5 Smart Manufacturing and Social Networking Towards Industry 4.0/5.0

10.6 Open Issues and Challenges Towards Industry 4.0/5.0 for Effective Online Social Networking

10.7 Future Research Opportunities Towards Industry 4.0/5.0 for an Effective Online Social Networking

10.8 Conclusion

References

11 Online Social Networking: Power of Industry 6.0 and Beyond

11.1 Introduction

11.2 Background

11.3 Transformative Shifts in Industrial Paradigms for Industry 6.0

11.4 The Role of Online Social Networking in Industry 6.0

11.5 Integration of Emerging Technologies for Social Networking in the Era of Industry 6.0

11.6 Smart Factories and Social Collaboration

11.7 Future Research Opportunities for Social Networking in the Era of Industry 6.0 [31, 32]

11.8 Popular Issue and Challenges Towards Online Social Networking in the Era of Industry 6.0

11.9 Conclusion

References

12 An Investigation on Detection of Botnets in Online Social Networks

12.1 Introduction

12.2 Literature Survey

12.3 Challenges in Social Chatbot Detection

12.4 Socialbots Detection

12.5 Conclusion

References

13 Design and Development of Techniques for Fake Profile Detection in Online Social Networks

13.1 Introduction

13.2 Literature Survey

13.3 Methods and Results

13.4 Conclusion

References

14 Spammer Detection in Online Social Networks

14.1 Introduction

14.2 Challenges in Online Social Network Spammer Detection

14.3 Literature Review

14.4 Machine Learning for Spammer Detection

14.5 Conclusion

References

15 A Review of Various Applications of Internet of Things with Related Security Issues and Challenges

15.1 Introduction

15.2 Literature Survey

15.3 IoT Applications and Related Security Issues

15.4 Security Issues and Challenges

15.5 Conclusion

References

16 AGRO-Cloud Model and Smart Algorithm to Increase Crop Yield Prediction to Improve Agriculture Quality

16.1 Introduction

16.2 Related Work

16.3 AGRO-Cloud Model

16.4 Deep Learning for Smart Agriculture

16.5 Conclusion and Future Work

References

17 OSN in Healthcare Performance View Through Integration

17.1 Introduction

17.2 The Role of OSNs in Patient Care

17.3 OSNs and Public Health Initiatives

17.4 OSNs in Medical Research and Data Sharing

17.5 Leveraging AI and Data Analytics in Healthcare OSNs

17.6 Privacy and Security Concerns in OSN-Enabled Healthcare

17.7 Case Studies of Successful OSN Implementation in Healthcare

17.8 Future Directions and Innovation in OSN Healthcare Integration

17.9 Healthcare Organizations and OSN Adoption Strategies

17.10 Conclusion

References

18 Internet-Based Platforms and Trends Towards Online Social Networking

18.1 Introduction

18.2 Applications of OSN

18.3 Emerging Trends in Online Social Networking [12]

18.4 Implications and Challenges [5, 6]

18.5 Related Work

18.6 Proposed Methodology

References

19 Security and Threat in Online Social Networking

19.1 Introduction

19.2 User-Centric Security Challenges

19.3 Platform-Centric Vulnerabilities [13]

19.4 Content Moderation and Algorithmic Solutions [5]

19.5 Emerging Threats [1]

19.6 User Education and Privacy Controls [1–4]

19.7 Regulatory Frameworks and Industry Standards [2, 3]

19.8 Interdisciplinary Approaches [9, 10]

19.9 Case Studies and Real-World Examples [2, 3]

19.10 Conclusion

19.11 Conclusion

References

20 Social Media Platform Scraping and Extracting Paradigm

20.1 Introduction

20.2 Significance of Facebook, Twitter Data Scraping [1, 2, 11–13]

20.3 Related Work

20.4 Proposed Methodology

20.5 Conclusion

References

21 Computer-Generated Environment for Virtual Reality and Digital Information Technologies

21.1 Introduction

21.2 Advantages of Virtual Reality

21.3 Related Work: Virtual Reality and Digital Information Technologies [1–5]

21.4 Proposed Methodology: Leveraging Virtual Reality and Digital Information Technologies

21.5 Conclusion

References

22 Online Social Networking: Navigating the Myth and Reality of Friendship in the Era of Zero Trust

22.1 Introduction

22.2 Significance of Zero Trust in Online Friendship Environment

22.3 Literature Review

22.4 The Virtual Facade of Online Friendship

22.5 Psychological Dynamics of Online Friendships

22.6 Zero Trust and Safety in Virtual Spaces

22.7 State-of-the-Art Countermeasures for Cyber Crime

22.8 Public Awareness Advisory: Reporting Cybercrime Immediately

22.9 Conclusion

Acknowledgement

References

23 Various Threats and Attacks on Online Social Networks and Their Counter Measures

23.1 Introduction

23.2 Literature Survey

23.3 Privacy Breaches in Online Social Network (OSN)

23.4 Attacks and Threats on Online Social Network

23.5 Attacks on Online Social Networks

23.6 Conclusion

References

24 Blockchain-Based Decentralized Online Social Networks – Benefits and Challenges

24.1 Introduction

24.2 Online Social Network Threats

24.3 Introduction to Blockchain

24.4 Blockchain Features

24.5 Blockchain Based Social Networks

24.6 Challenges

24.7 Conclusion

References

25 Integrating TF-IDF Features to Divide Amazon Product Reviews into Positive and Negative Groups

25.1 Introduction

25.2 Proposed Work

25.3 Analysis of Results

25.4 Conclusion

References

26 Improved Supervised Classification Model for Automatically Categorizes of News Articles

26.1 Introduction

26.2 Related Work

26.3 Proposed Model

26.4 Dataset Description

26.5 Experiment, Results, and Discussion

26.6 Conclusion

References

27 OSN Traits and Vulnerability for Measurement and Analysis

27.1 Introduction

27.2 Media and Social Network Statistics Online

27.3 Open Research Problems and Difficulties [2, 4]

27.4 Conclusion

References

28 Privacy Preservation in Online Social Networks

28.1 Introduction

28.2 Privacy Protection in Online Social Networks

28.3 Security and Privacy Issues in Online Social Network

28.4 Review of Privacy Preserving Techniques for Online Social Networks

28.5 Recommendations for Privacy Preservation in Online Social Networks

28.6 Conclusion

References

29 Machine Learning Techniques for Heart Disease Detection using E-Health Monitoring System

29.1 Introduction

29.2 Literature Survey

29.3 Methodology

29.4 Results and Discussion

29.5 Conclusion

References

30 A Hybrid Method for Image Encryption Using Lagrange’s Interpolation

30.1 Introduction

30.2 Related Work

30.3 Mathematical Background in Lagrange’s Interpolation

30.4 Proposed Image Encryption Cryptosystem Using Lagrange’s Interpolation

30.5 Conclusion

References

31 Improvement of Underwater Blur Images Using Dark Channel Prior and Fuzzy Intensification Operator for Better Social Network’s Transmission

31.1 Introduction

31.2 Literature Survey

31.3 Proposed Methodology

31.4 Experimental Results

31.5 Conclusion

References

About the Editors

Index

Also of Interest

End User License Agreement

List of Tables

Chapter 2

Table 2.1 Recommendations and techniques for cybercrime prevention.

Table 2.2 Popular case study based on vulnerability.

Table 2.3 Study of vulnerability trends.

Chapter 4

Table 4.1 Cost per unit.

Table 4.2 Cost – safety matrix (a).

Table 4.3 Cost–safety matrix (b).

Chapter 8

Table 8.1 Types of security threats, along with their features.

Table 8.2 Security and privacy issues in online social networking.

Table 8.3 Deepfake technology threat to modern OSNs.

Table 8.4 Security tools used in OSNs.

Table 8.5 Key components of a regulatory framework.

Chapter 15

Table 15.1 Major issues in IoT.

Chapter 16

Table 16.1 Comparative analysis table for crop yield prediction using hybrid d...

Table 16.2 Comparison of crop yield prediction results using different deep le...

Chapter 17

Table 17.1 Misinformation mitigation process diagram [3–7].

Chapter 22

Table 22.1 Historical perspective of friendship.

Table 22.2 The evolution of social networking platforms and its key features.

Table 22.3 Online vs. offline friendship.

Table 22.4 Zero trust model principles.

Table 22.5 Cybercrime and state of the art countermeasures.

Table 22.6 Public awareness advisory to counter measure cybercrime.

Chapter 24

Table 24.1 Comparison of traditional and blockchain based social networks

Table 24.2 Blockchain-based social platforms.

Chapter 25

Table 25.1 Review of a product on amazon classified review class C as an outpu...

Table 25.2 Precision.

Table 25.3 Recall.

Table 25.4 F1-score.

Table 25.5 Utilization of memory.

Table 25.6 Training time.

Table 25.7 Performance summary.

Chapter 31

Table 31.1 Peak signal to noise ratio (base method and proposed method) calcul...

Table 31.2 Entropy value (base method and proposed method).

List of Illustrations

Chapter 2

Figure 2.1 Proliferation of online social networking.

Figure 2.2 No of online social networking users [2].

Figure 2.3 Biggest social media platform worldwide [3].

Figure 2.4 Comparative study of information disclosure on different social med...

Figure 2.5 Classification of vulnerabilities.

Chapter 3

Figure 3.1 Adoption of the review process.

Figure 3.2 Architectural design of the work.

Figure 3.3 Design fragment.

Chapter 6

Figure 6.1 Timeline of social media network. Adopted from

1

.

Figure 6.2 Benefits of online social networking in healthcare.

Figure 6.3 Online social networking in smart healthcare.

Figure 6.4 Online social networking in smart healthcare.

Chapter 8

Figure 8.1 Types of online social networking platforms.

Figure 8.2 Security in online social networking.

Figure 8.3 Existing security architecture in social networking platforms.

Figure 8.4 Emerging threats for next generation based online social networking...

Chapter 9

Figure 9.1 Current landscape of online social networking.

Figure 9.2 Role of algorithms in social networking.

Figure 9.3 Key issues and challenges associated with AI and ML in the context ...

Figure 9.4 Artificial intelligence technology landscape.

Figure 9.5 Application of artificial intelligence in marketing.

Chapter 12

Figure 12.1 A machine learning-based framework for social chatbots classificat...

Chapter 13

Figure 13.1 Machine learning-based framework for spam profile detection in onl...

Figure 13.2 Accuracy of model for spam profile detection in online social netw...

Figure 13.3 Sensitivity of model for spam profile detection in online social n...

Figure 13.4 Specificity of model for spam profile detection in online social n...

Chapter 14

Figure 14.1 Spammer detection in online social network using optimized machine...

Chapter 15

Figure 15.1 IoT applications.

Chapter 16

Figure 16.1 Smart agriculture.

Figure 16.2 AGRO-Cloud model.

Figure 16.3 Putting together a convolutional neural network in one dimension (...

Chapter 17

Figure 17.1 Patient consent workflow diagram [1, 2].

Figure 17.2 Ethical guidelines framework [5, 7].

Figure 17.3 System architecture diagram.

Figure 17.4 Data flow diagram [3, 6, 7, 10, 11].

Figure 17.5 Future trends and implications diagram [16, 17].

Chapter 18

Figure 18.1 Poll for people engaged in OSN usage [2–5].

Chapter 19

Figure 19.1 Paradigm of OSN channels [8, 9].

Figure 19.2 Gateways of information transfer [10–13].

Chapter 20

Figure 20.1 OSN platform scraping [6, 7].

Figure 20.2 OSN users globally during 2017–2027 [12, 13].

Figure 20.3 Authentication process (web scraping) [1, 4–7].

Figure 20.4 JSON formatted data structure [10–13].

Figure 20.5 JSON formatted data structure [6–9].

Chapter 21

Figure 21.1 Model of virtual reality [7, 8].

Figure 21.2 Flow of digital information technologies [9, 10].

Figure 21.3 Flow of virtual reality features [6–9].

Figure 21.4 Productivity of virtual reality features [5–8].

Chapter 22

Figure 22.1 Use of social media platforms in the US during 2019 [8].

Figure 22.2 Factors responsible for online social networking and friendship [3...

Figure 22.3 Dark side of online friendship.

Figure 22.4 Motives of cyber crime. Data source: NCRB Government of India.

Figure 22.5 Reports on identity theft and fraud, 2018–2022. Data source: [Fede...

Figure 22.6 Addiction of online social media [22].

Figure 22.7 Classification of positive impact and challenges faced due to onli...

Figure 22.8 Cybercrime reported in year 2023 in India under IT Act.

Chapter 24

Figure 24.1 Number of OSN users (in billion).

Figure 24.2 Percentage of social media users vs. total population (in billion)...

Figure 24.3 Percentage of organizations targeted worldwide in 2021.

Figure 24.4 Original and tempered blockchain.

Figure 24.5 Features of decentralized social networks.

Chapter 25

Figure 25.1 Proposed system architecture.

Figure 25.2 Precision.

Figure 25.3 Recall.

Figure 25.4 F1-result.

Figure 25.5 Memory utilization.

Figure 25.6 Exercise period.

Chapter 26

Figure 26.1 Categories of methods with its benefits and findings [16–24].

Figure 26.2 Proposed model for automatically categorizing news articles [25–28...

Figure 26.3 Categories of articles [29–31].

Figure 26.4 Count of articles [13–16].

Figure 26.5 News category performance [17–19].

Figure 26.6 Method performance [26–30].

Chapter 27

Figure 27.1 Connection of OSN [5–7].

Figure 27.2 The quantity of users on various social media sites [6, 9].

Figure 27.3 Hazards of various platforms [3–6, 11].

Figure 27.4 The top five categories of 2021 hacking [4–6].

Figure 27.5 Threat classification [12, 16, 17].

Chapter 29

Figure 29.1 A framework to predict heart disease.

Figure 29.2 Result comparison of classifiers for heart disease detection.

Figure 29.3 Accuracy, sensitivity, and specificity of machine learning for hea...

Chapter 30

Figure 30.1 Image cryptography.

Chapter 31

Figure 31.1 Illustration of the colour attenuation for different wavelength at...

Figure 31.2 Illustration of forward scatter, backward scatter and direct compo...

Figure 31.3 Haze removal using equation (a) input hazy image (b) dark channel ...

Figure 31.4 Flow chart of proposed method.

Figure 31.5 Experiment dataset.

Figure 31.6 Comparison results of approach [15] and proposed approach.

Guide

Cover Page

Table of Contents

Series Page

Title Page

Copyright Page

Preface

Begin Reading

About the Editors

Index

Also of Interest

WILEY END USER LICENSE AGREEMENT

Pages

ii

iii

iv

xxv

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

432

433

434

435

436

437

438

439

440

441

442

443

444

445

446

447

449

450

451

452

453

454

455

456

457

458

459

460

461

462

463

464

465

466

467

468

469

470

471

472

473

474

475

476

477

479

480

481

482

483

484

485

486

487

488

489

490

491

492

493

494

495

496

497

498

499

500

501

503

504

505

506

507

508

509

510

511

512

513

514

515

516

517

518

519

520

521

522

523

524

525

526

527

528

529

530

531

532

533

534

535

536

537

538

539

540

541

542

543

544

545

546

547

548

549

551

552

553

554

555

556

557

558

559

560

561

562

563

564

565

567

568

569

570

571

572

573

574

575

576

577

578

579

580

581

583

584

585

586

587

588

589

590

591

592

593

594

595

596

597

598

599

600

601

602

603

604

605

606

607

608

609

611

612

613

614

615

616

617

618

619

620

621

622

623

625

626

627

628

629

630

631

632

633

634

635

636

637

638

639

641

642

643

644

645

646

647

648

649

650

651

653

654

655

656

657

658

659

660

661

662

663

664

665

666

667

668

669

670

671

672

673

674

675

676

677

678

679

680

681

682

683

685

686

687

688

Scrivener Publishing100 Cummings Center, Suite 541JBeverly, MA 01915-6106

Publishers at ScrivenerMartin Scrivener ([email protected])Phillip Carmical ([email protected])

Online Social Networks in Business Frameworks

Edited by

Sudhir Kumar Rathi

Bright Keswani

Rakesh Kumar Saxena

Sumit Kumar Kapoor

Sangita Gupta

and

Romil Rawat

This edition first published 2024 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA© 2024 Scrivener Publishing LLCFor more information about Scrivener publications please visit www.scrivenerpublishing.com.

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.

Wiley Global Headquarters111 River Street, Hoboken, NJ 07030, USA

For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.

Limit of Liability/Disclaimer of WarrantyWhile the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.

Library of Congress Cataloging-in-Publication Data

ISBN 9781394231096

Front cover images supplied by Adobe FireflyCover design by Russell Richardson

Preface

The book discusses marketing through online social networks (OSNs), which is a potent method for companies of all sizes to connect with potential clients and consumers. If visitors are not on OSN sites like Facebook, Twitter, and LinkedIn, they are missing out on the fact that people discover, learn about, follow, and purchase from companies on OSN. Excellent OSN advertising may help a company achieve amazing success by fostering committed brand supporters and even generating leads and revenues. A type of digital advertising known as social media marketing (SMM) makes use of the strength of well-known social networks to further advertise and establish branding objectives. Nevertheless, it goes beyond simply setting up company accounts and tweeting whenever visitors feel like it. Preserving and improving the profiles means posting content that represents the company and draws in the right audience, such as images, videos, articles, and live videos. Addressing comments, shares, and likes while keeping an eye on reputation to create a brand network, follow and interact with followers, clients, and influencers.

1Unmasking Social Media Crimes: Types, Trends, and Impact

Rijvan Beg1, Vivek Bhardwaj2, Mukesh Kumar3, Prathamesh Muzumdar4, Aman Rajput5* and Kamal Borana6

1Department of Computer Science and Engineering, Maulana Azad National Institute of Technology (MANIT), Bhopal, India

2School of Computer Science and Engineering, Manipal University Jaipur, Jaipur, India

3Department of CSE, Chandigarh College of Engineering, Chandigarh Group of Colleges, Jhanjeri, Punjab, India

4Department of Management, Suresh Gyan Vihar University, Jaipur, Rajasthan, India

5Department of Computer Science & Engineering, Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, M.P., India

6Department of CSE, Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, India

Abstract

Social media platforms have profoundly transformed how humans interact, offering new avenues for communication and self-expression. Yet, this digital revolution has also led to the emergence of social media crimes, presenting unique challenges. This research comprehensively explores these crimes, delving into their various types, evolving trends, and wide-ranging impact on individuals, communities, and civil rights. Through a multifaceted research approach, this study meticulously investigates social media crimes, drawing from extensive literature reviews, real-world cases, legal documents, and expert insights. The research also examines the roles played by social media platforms themselves, shedding light on their policies, data-sharing practices, and enforcement methods. Both qualitative and quantitative methodologies are employed to categorize and trace the evolution of social media crimes, addressing issues such as cyberbullying, identity theft, and the dissemination of extremist content. The findings underscore the profound implications of social media crimes on individuals and society, with marginalized communities and younger generations bearing the brunt of these consequences. The paper emphasizes the need for clear guidelines governing the use of social media in intelligence gathering, particularly in cases related to community organizing and public protests. In conclusion, this research highlights the pressing necessity for legislative and technological measures to combat social media crimes and protect civil rights. It advocates for educational programs to equip law enforcement, legal professionals, and individuals with the knowledge to navigate the digital landscape responsibly while preserving fundamental rights in the digital age.

Keywords: Social media crimes, cyberbullying, identity theft, online harassment, extremist content

1.1 Introduction

Social media’s rise traces back to the early 2000s, with platforms like Friendster and MySpace laying the foundation. Facebook’s 2004 debut marked a turning point, fostering rapid social media adoption. Platforms such as Twitter, Instagram, Snapchat, and TikTok have since become central to global online interaction. User-friendly profiles and content sharing have led to substantial online presences for individuals and communities. Social media crimes, including cyberbullying, online harassment, identity theft, cyberstalking, malware distribution, and extremist content dissemination, have grown with these platforms. Their anonymity and connectivity facilitate these activities, harming individuals and society. Statistics reveal the extent of these crimes:

Cyberbullying:

59% of U.S. teens experience online harassment; 63% witness it.

Identity Theft:

20% of 2020 consumer complaints to the FTC involved identity theft.

Online Harassment:

37% of U.S. internet users aged 18-29 face online harassment.Extremist Content: In 2019, 59% of U.S. extremist-related murders were tied to white supremacists who used social media.

A substantial body of research and literature has begun to address various aspects of social media crimes. Studies have examined the psychological implications of online harassment, the legal dimensions of cybercrimes, and the role of social media platforms in combating harmful content. Research has also delved into the evolving strategies employed by criminals and extremists in exploiting the digital realm for their purposes. These investigations have yielded insights into the multifaceted nature of social media crimes, their causes, and the mechanisms employed to perpetrate them.

Despite the growing body of research, notable gaps persist in our understanding of social media crimes. Existing studies often focus on specific aspects of these crimes or approach them from individual disciplinary lenses. The literature tends to emphasize psychological, legal, or sociological dimensions in isolation, often overlooking the complex interplay of these factors. As a result, a comprehensive, multidisciplinary overview of social media crimes, which synthesizes their types, dynamic trends, and overarching impact, remains an unaddressed challenge.

The primary objective of this research paper is to unmask social media crimes by conducting a thorough examination of their types, trends, and impact. We aim to bridge the gaps in existing literature by providing a holistic analysis that considers psychological, legal, and sociological aspects in conjunction. We seek to categorize and track the evolution of social media crimes, identifying the latest trends and strategies employed by wrongdoers. Moreover, we aspire to uncover the extent of social media platforms’ involvement in shaping the landscape of these crimes.

This research paper will focus on a wide range of social media crimes, including but not limited to cyberbullying, online harassment, identity theft, and the dissemination of extremist content. It will encompass both qualitative and quantitative data analysis, incorporating real-world cases and expert insights. While the study will emphasize the United States, it will also draw from international cases to provide a global perspective. The research will not delve into the technical aspects of cybercrimes but will explore the sociological and psychological dimensions. Additionally, it will raise critical questions about law enforcement’s role in social media surveillance and intelligence gathering, highlighting potential ethical and legal concerns in these areas.

1.2 Related Work

A comprehensive literature survey reveals a wealth of studies and research papers that have explored various aspects of social media crimes. These studies provide valuable insights into the types, trends, and impact of these crimes and the challenges they pose to individuals and society.

Cyberbullying and Online Harassment:

Research in this area has delved into the psychological and emotional consequences of cyberbullying and online harassment. For instance, a study by Hinduja and Patchin (2010) examined the emotional and psychological impacts on victims, shedding light on the detrimental effects of online harassment.

Identity Theft:

Studies have investigated the methods and techniques employed by cybercriminals to commit identity theft on social media platforms. “Fraud on Facebook” by Arun Vishwanath and Heng Xu (2018) explores the tactics used to deceive users and steal their personal information, highlighting the sophisticated nature of these crimes.

Extremist Content and Online Radicalization:

The dissemination of extremist ideologies on social media platforms has attracted significant attention. A report by the Institute for Strategic Dialogue (2019) detailed the use of social media in promoting extremist content and radicalizing individuals, contributing to the understanding of this pressing issue.

Social Media and Law Enforcement:

Research has also examined the relationship between social media and law enforcement agencies. A study by Jyoti Mishra (2019) investigates the challenges faced by law enforcement in dealing with social media crimes and highlights the need for improved strategies and tools.

Privacy Concerns and Online Security:

Studies such as “The Privacy Paradox: Social Networking in the United States” by Rainie and Madden (2015) delve into the privacy concerns of social media users and the implications for online security. These concerns are closely tied to social media crimes involving data breaches and the misuse of personal information.

While these studies have contributed valuable insights, a research gap persists in providing a holistic analysis of the various types of social media crimes, their evolving trends, and the broader impact on individuals and society. Few studies have attempted to connect the dots between different types of social media crimes, the changing landscape of social media platforms, and the resulting societal consequences. This research paper aims to bridge this gap by offering a comprehensive analysis of social media crimes, their emerging trends, and their profound impact on individuals and communities.

1.3 Social Media

Social media has become an integral part of modern society, reshaping the way we communicate, share information, and connect with others. It encompasses a wide range of platforms, each with its unique features and purposes.

The history of social media platforms is a captivating journey that has fundamentally reshaped the way we connect, communicate, and disseminate information. This evolution has spanned several decades and has seen the rise and fall of numerous platforms, each leaving a significant mark on the social media landscape. Let’s delve deeper into the intricate history of social media platforms, tracing their origins, key features, and the impact they’ve had on our digital and physical lives.

SixDegrees (1997)

: Often heralded as one of the pioneers of social media, SixDegrees made its debut by allowing users to create personal profiles and connect with friends online. This marked the inception of the idea that the internet could be a space for fostering digital relationships. However, SixDegrees had a relatively short-lived existence, primarily due to its limited features and a somewhat modest user base.

Friendster (2002)

: Friendster is another early trailblazer in the social media landscape. It popularized the concept of connecting with friends through an online platform and introduced the world to the notion of a social network. While it gained significant traction in Asia, it eventually lost ground to emerging competitors.

LinkedIn (2003)

: LinkedIn, a platform solely focused on professional networking, emerged as one of the earliest players in this space. It provided a platform for users to connect with colleagues, potential employers, and industry professionals, emphasizing the importance of professional relationships in the digital age.

MySpace (2003)

: MySpace, with its innovative features allowing users to personalize their profiles with music, photos, and more, played a pivotal role in shaping the early social media landscape. It became a creative haven, particularly for musicians and artists. However, it eventually ceded its position to Facebook, which offered a more user-friendly and streamlined experience.

Facebook (2004)

: The brainchild of Mark Zuckerberg and his Harvard classmates, Facebook began as a platform exclusively for college students. However, it quickly expanded its user base to include other universities and, ultimately, the general public. Facebook’s success redefined the social media landscape and established many of the conventions and features we associate with the medium today.

YouTube (2005)

: YouTube disrupted the way we create, share, and consume video content. This platform allowed users to upload, view, and share videos, empowering the rise of content creators, influencers, and online video as a dominant medium for information and entertainment.

Twitter (2006)

: Twitter introduced the concept of microblogging, with its signature 140-character limit (later expanded to 280 characters). This microblogging approach transformed Twitter into a real-time hub for information, conversations, and trending topics, influencing news dissemination and public discourse.

Tumblr (2007)

: Tumblr blended elements of traditional blogging with social networking, encouraging users to share text, images, and multimedia content in a more casual and creative manner. It embraced the concept of microblogging and appealed to users seeking an outlet for personal expression and creativity.

Pinterest (2010)

: Pinterest, with its focus on visual content and the creation of virtual pinboards, redefined how we organize and share images and ideas. It emerged as a hub for inspiration, DIY projects, and visual discovery, especially popular among those seeking creative and lifestyle inspiration.

Instagram (2010)

: Instagram concentrated on photo and video sharing, emphasizing the visual medium. It gained immense popularity for its simplicity and creative features, enabling users to apply filters and share visually stunning moments.

Snapchat (2011)

: Snapchat introduced the revolutionary concept of temporary multimedia messaging. It allowed users to send photos and videos that would disappear after a brief period. This ephemeral approach to communication quickly gained traction, especially among a younger demographic.

WhatsApp (2011)

: WhatsApp disrupted the messaging landscape by offering a secure, cross-platform messaging app. It provided users with the ability to send text messages, make voice and video calls, and share various forms of media, all while emphasizing end-to-end encryption. This made it a favorite choice for individuals and groups seeking private, reliable communication.

Vine (2013)

: Vine, a short-form video platform, enabled users to create and share six-second looping videos. It fostered creativity and humor, inspiring a wave of short-form content creators. Despite its influence, Vine was discontinued in 2017.

TikTok (2016)

: TikTok, a spiritual successor to Vine, breathed new life into short-form video content. It introduced music and creative effects, and it rapidly gained global popularity, particularly among younger users. TikTok’s userfriendly interface and emphasis on viral trends and challenges reshaped how we engage with and create short videos.

Clubhouse (2020)

: Clubhouse disrupted the social media landscape by introducing the concept of audio-based social networking. Users could join “rooms” where live audio discussions took place. This innovative approach drew early attention for its unique mode of social interaction and discourse.

1.4 Types of Social Media Crimes

1.4.1 Overview of Social Media Crimes

Social media platforms, with their vast user base and seamless connectivity, have become hotbeds for various types of crimes. Understanding these crimes is essential to combat and prevent them. Below, we delve into the details of the major types of social media crimes:

Cyberbullying:

The use of social media platforms to harass, intimidate, or threaten others, often with the intention of causing emotional distress or harm. Cyberbullying can manifest as online harassment, hate speech, or stalking and may have serious consequences for the victims.

Identity Theft and Scams:

Social media is fertile ground for identity thieves and scammers who use deceptive tactics to steal personal information, engage in fraudulent activities, or manipulate individuals into providing sensitive data or financial resources.

Hate Speech and Incitement to Violence:

Hate speech on social media involves the dissemination of discriminatory, prejudiced, or violent content targeting specific groups or individuals based on their characteristics, such as race, religion, or nationality. Incitement to violence occurs when individuals or groups use social media to encourage or plan violent acts, potentially leading to real-world harm.

Online Fraud and Financial Crimes:

These encompass a variety of schemes aimed at defrauding individuals or organizations through social media, including fake investment opportunities, phishing attacks, and online scams designed to steal money or valuable assets.

Copyright and Intellectual Property Violations:

Unauthorized sharing and distribution of copyrighted material, such as movies, music, or software, without proper licensing or consent from rights holders, constitute intellectual property violations.

These types of social media crimes exploit the features of these platforms, such as anonymity, ease of communication, and the potential to reach a wide audience. Recognizing these crimes and their characteristics is crucial for law enforcement, social media companies, and users to take appropriate preventive and responsive measures.

1.4.2 Key Characteristics

Online Platforms as a Facilitator:

These crimes primarily occur on social media platforms or other online communication channels, exploiting the convenience, reach, and anonymity that these platforms provide.

Global Nature:

Social media crimes often transcend geographical boundaries, making them international issues that may require cooperation among law enforcement agencies from different countries.

Anonymity:

Perpetrators of social media crimes can hide behind online pseudonyms, making it challenging to identify and apprehend them.

Rapid Dissemination:

Information, threats, or content can spread rapidly through social media, amplifying the impact of these crimes.

Psychological and Emotional Impact:

Many social media crimes are designed to inflict emotional or psychological harm on victims, leading to real-world consequences such as depression, anxiety, or even self-harm.

Legal and Ethical Considerations:

Addressing social media crimes requires navigating complex legal and ethical issues related to free speech, privacy, and the balance between security and civil liberties.

Effectively addressing social media crimes involves understanding the types of offenses that occur within this domain and the unique challenges they pose for law enforcement and society as a whole.

1.4.3 Cyberbullying and Online Harassment

Cyberbullying and online harassment involve the use of digital communication channels, including social media platforms, to intimidate, threaten, or harm individuals. These actions often target specific individuals or groups and may manifest in various forms, such as:

Harassing Messages:

Perpetrators send abusive, threatening, or offensive messages to their victims. This can include derogatory comments, insults, or threats of physical harm.

Doxxing:

Attackers publish private or sensitive information about their victims, such as home addresses, phone numbers, or financial details, with the intention of causing harm or distress.

Posting Inappropriate Content:

Cyberbullies may create and share humiliating or embarrassing content about their victims, such as manipulated images, false rumors, or defamatory posts.

Impersonation:

Some harassers impersonate their victims online, using fake accounts to tarnish their reputation or provoke conflicts with others.

Exclusion and Isolation:

Online harassment can take the form of excluding individuals from online groups, conversations, or social circles, causing feelings of isolation and loneliness.

1.4.3.1 Impact on Victims

The impact of cyberbullying and online harassment on victims is profound and can lead to a range of emotional, psychological, and even physical consequences, including:

Emotional Distress:

Victims often experience significant emotional distress, including anxiety, depression, stress, and a loss of self-esteem.

Social Isolation:

Online harassment can lead to social withdrawal, as victims may fear continued attacks or may be excluded from online communities.

Academic and Professional Consequences:

Students targeted by cyberbullying may struggle academically, while employees might face difficulties in their professional lives.

Health Issues:

Prolonged exposure to online harassment can contribute to physical health problems, including sleep disturbances and psychosomatic symptoms.

Risk of Self-Harm:

In severe cases, the emotional toll of cyberbullying may lead to self-harm or even suicidal tendencies.

1.4.4 Identity Theft and Scams

Identity theft and scams on social media encompass various methods employed by criminals, including:

Phishing:

Criminals use deceptive emails, messages, or websites that mimic legitimate platforms to trick individuals into revealing sensitive information, such as login credentials, financial data, or personal details.

Impersonation:

Scammers often impersonate trusted entities or individuals to gain trust and manipulate victims. This could involve posing as a bank, a government agency, or even a friend or family member.

Online Shopping Scams:

Criminals create fake online stores or listings on social media to sell non-existent products or goods that do not match their descriptions. Victims may lose money or provide personal information during these transactions.

Romance Scams:

Scammers build online romantic relationships with victims, gaining their trust before exploiting them financially.

Advance Fee Fraud:

Perpetrators promise victims a large sum of money or a valuable prize in exchange for a smaller upfront fee. Once the fee is paid, the promised reward never materializes.

1.4.4.1 Consequences for Victims

Victims of identity theft and scams on social media face significant consequences, including:

Financial Loss:

Scams can result in substantial financial losses for victims who may never recover their money.

Emotional Distress:

Victims often experience stress, humiliation, and emotional turmoil after falling victim to scams.

Damage to Reputation:

Impersonation or scams that involve manipulation by criminals can tarnish the victim’s reputation, leading to social and professional repercussions.

Legal and Administrative Hassles:

Victims may need to deal with legal issues and administrative burdens to rectify the damage caused by identity theft or fraud.

Trust Issues:

Scams can erode victims’ trust in online interactions and may affect their willingness to engage with others on social media or the internet.

1.4.5 Hate Speech and Incitement to Violence

Examining the Rise of Online Hate Speech Online hate speech has experienced a significant increase in recent years. The prevalence of this phenomenon is driven by several factors, including:

Anonymity:

The relative anonymity provided by social media platforms encourages some individuals to express discriminatory views they might not voice publicly.

Echo Chambers:

Social media algorithms often expose users to content that aligns with their existing beliefs, which can reinforce prejudiced views and encourage the spread of hate speech within like-minded communities.

Polarization:

Social and political polarization in society can fuel online hate speech, as individuals may resort to extreme rhetoric to bolster their positions.

Viral Content:

Hate speech can spread rapidly on social media, becoming viral and gaining a broad audience, contributing to its growth.

1.4.5.1 Link to Real-World Violence

The connection between online hate speech and real-world violence has raised significant concerns. Several incidents have demonstrated the potential link between the two, such as:

Hate Crimes:

Online hate speech has been linked to incidents of hate crimes in which individuals or groups target specific communities based on their online expressions of hatred.

Radicalization:

Online platforms have been exploited for radicalization, leading to acts of violence or terrorism inspired by extremist ideologies found online.

Incitement to Violence:

In some cases, individuals have used social media to incite violence or plan criminal acts, emphasizing the dangerous potential of online rhetoric.

Targeted Attacks:

Prominent cases involve individuals acting on their online hate speech, leading to targeted attacks against specific individuals or groups.

The rise of online hate speech and its potential to incite violence underscores the complex challenges society faces in balancing free speech and the prevention of harm in the digital age.

1.5 Trends in Social Media Crimes

The landscape of social media crimes is continually evolving, reflecting the changing ways in which individuals and criminals interact in the digital realm. Several key trends have emerged, highlighting the dynamic nature of these crimes:

Escalation of Cyberbullying and Online Harassment:

Trend:

Cyberbullying and online harassment have intensified, with an increasing number of individuals falling victim to hurtful and harmful online behavior.

Statistics:

A Pew Research Center study found that 59% of U.S. teens have experienced some form of online harassment, and 63% have witnessed others being harassed. This trend isn’t confined to the young, as adults are also targeted.

Growth of Identity Theft and Scams:

Trend:

Identity theft, particularly through catfishing and romance scams, is on the rise, taking advantage of individuals’ trust and desire for connection.

Statistics:

The Federal Trade Commission (FTC) reported that identity theft is a growing issue, with 20% of consumer complaints in 2020 related to identity theft.

Pervasiveness of Online Harassment:

Trend:

Online harassment, including hate speech and doxxing, has become alarmingly widespread, affecting a significant portion of internet users.

Statistics:

According to the Cyberbullying Research Center, 37% of U.S. internet users aged 18-29 have experienced online harassment, highlighting the pervasive nature of this issue.

Spread of Extremist Content:

Trend:

Social media platforms are increasingly used to disseminate extremist content, fueling radical ideologies and recruiting potential supporters.

Statistics:

In 2019, a report by the Anti-Defamation League (ADL) revealed that 59% of U.S. extremist-related murders were linked to white supremacists who used social media to spread their messages.

Child Exploitation and Online Grooming:

Trend:

Online predators are increasingly targeting minors for sexual exploitation, grooming them over social media.

Statistics:

Law enforcement agencies continue to report numerous cases of child exploitation through social media platforms, highlighting the ongoing threat to children’s safety.

Spread of False Information and Scare Tactics:

Trend:

Perpetrators are increasingly using social media to spread false information, manipulate public opinion, and provoke fear.

Statistics:

Instances offalse emergency alerts and misleading information have caused significant public concern and necessitated the development of countermeasures.

These trends underscore the serious and evolving nature of social media crimes. To address these challenges, it is essential for individuals, law enforcement, social media platforms, and policymakers to stay informed about emerging trends, adapt their strategies, and work together to prevent and combat these crimes effectively.

1.5.1 Case Studies

Christchurch Mosque Shootings (2019)

Background:

In March 2019, a gunman targeted two mosques in Christchurch, New Zealand, killing 51 people and injuring dozens. The shooter live-streamed the entire attack on Facebook, which quickly went viral.

Impact: Th

is horrific event demonstrated the real-time broadcasting of a terrorist attack through social media, leading to widespread global condemnation. It underscored the role of social media in not only promoting extremist content but also enabling violent acts.

Capital One Data Breach (2019)

Background:

In July 2019, Paige Thompson, a former employee of Amazon Web Services, exploited a vulnerability in Capital One’s systems to steal sensitive customer data. Thompson boasted about the data theft on social media platforms.

Impact:

The breach exposed the personal and financial information of over 100 million Capital One customers. It highlighted the risks of individuals using social media to brag about their criminal activities and the potential consequences for victims.

Phineas Fisher’s Hacking Campaign (2016-2020)

Background:

An individual known as Phineas Fisher conducted a high-profile hacking campaign against various targets, including banks and surveillance companies. Phineas Fisher communicated about the hacks through social media and even published a “how-to” guide on hacking.

Impact:

While Phineas Fisher’s motivations included political activism, their actions demonstrated how social media can be used to share hacking techniques and claims of responsibility for cybercrimes. The case raised questions about the ethics and consequences of hacktivism.

Instagram Data Breach (2019)

Background:

In May 2019, Instagram suffered a data breach where an unknown entity exposed the contact information of millions of Instagram users. The exposed data was later discovered for sale on the dark web.

Impact:

The breach revealed the potential vulnerabilities of social media platforms in protecting user data. Users affected by the breach faced risks of identity theft and unsolicited contact. This case highlighted the responsibility of platforms to safeguard user information.

Terrorist Recruitment on Twitter (Ongoing)

Background:

Terrorist organizations like ISIS and Al-Qaeda have been known to use Twitter for recruitment and radicalization efforts. They share propaganda and interact with potential recruits, exploiting the platform’s global reach.

Impact:

The ongoing use of Twitter by terrorist groups demonstrates the persistent challenges of monitoring and mitigating online extremism. It emphasizes the need for constant vigilance and cooperation between law enforcement and social media companies.

Cambridge Analytica Scandal (2018)

Background:

The data analytics firm Cambridge Analytica was involved in a massive data harvesting operation on Facebook. They collected personal data from millions of Facebook users without their consent, and this data was used for political purposes, including influencing elections.

Impact:

The scandal shed light on the privacy concerns associated with social media platforms. It sparked investigations into data protection practices, leading to regulatory changes and increased scrutiny of how personal data is handled on social media.

Ashley Madison Data Breach (2015)

Background:

The extramarital affairs website Ashley Madison suffered a data breach in 2015, resulting in the exposure of user data, including real names and personal details. The hacker group Impact Team claimed responsibility.

Impact:

This breach highlighted the risks associated with online dating and sensitive personal information shared on social media platforms. It also led to public embarrassment and fallout for those exposed as users of the site.

Twitter Bitcoin Scams (2020)

Background:

In July 2020, several high-profile Twitter accounts, including those of Barack Obama, Elon Musk, and Bill Gates, were hacked as part of a Bitcoin scam. The hackers used the compromised accounts to promote a cryptocurrency scam.

Impact:

This incident revealed the vulnerabilities of even well-known social media platforms like Twitter to cyberattacks. It also emphasized the potential for financial fraud on social media.

Racist Twitter Abuse (Ongoing)

Background:

Social media platforms like Twitter have faced ongoing issues with users spreading hate speech and engaging in online harassment. Targets of abuse have included public figures, activists, and everyday users.

Impact:

The persistence of online hate speech on platforms like Twitter raises concerns about the psychological and emotional toll on victims. It also highlights the challenges faced by platforms in moderating content and addressing such issues effectively.

Facebook and Myanmar Genocide (2018)

Background:

Facebook was criticized for its role in the spread of hate speech and misinformation in Myanmar, contributing to violence and persecution against the Rohingya Muslim minority. The platform was used to incite violence and disseminate false information.

Impact:

This case demonstrated the significant real-world consequences of unchecked social media activity. It brought attention to the ethical responsibilities of social media companies and the need to prevent the misuse of their platforms for incitement to violence.

These case studies illustrate the diverse range of social media-related crimes, from acts of terrorism and data breaches to hacking campaigns and online radicalization efforts. They emphasize the need for robust cybersecurity measures, law enforcement cooperation, and public awareness to address these evolving challenges.

1.6 Law Enforcements’s Use of Social Media Surveillance

1.6.1 The Evolution of Social Media Surveillance

Over the past decade, social media surveillance by law enforcement agencies has evolved significantly. Initially, officers mainly conducted manual monitoring, perusing public profiles, and performing searches across various platforms. However, the increasing prevalence of social media and the rise of mobile device usage have driven law enforcement to adopt more advanced techniques and technologies. Today, automated tools and third-party vendors have emerged, enabling law enforcement to efficiently monitor social media. This transition from manual methods to automated systems represents a significant shift in how agencies gather intelligence.

1.6.2 Key Motivations

Solving Crimes:

One of the primary motivations behind the adoption of social media surveillance is the desire to solve crimes. Social media platforms serve as a valuable source of information that can aid law enforcement in solving cases, from murders to cybercrimes. Perpetrators often boast of their crimes or leave digital footprints that law enforcement can follow.

Proactive Monitoring:

The increasing public pressure for law enforcement to investigate crimes online has driven proactive monitoring. After high-profile violent incidents, journalists often uncover social media profiles that contain warning signs of potential criminal activity. As a result, law enforcement faces mounting pressure to identify potential offenders before they act, making proactive monitoring a key motivation.

1.6.3 Methods Employed

Manual Surveillance:

Manual surveillance methods involve officers manually browsing public profiles, conducting searches, and creating profiles to connect with individuals of interest. While it allows a level of control, it is time-consuming and may not be as effective in handling the vast amount of data generated on social media.

Automated Tools and Third-Party Vendors:

The adoption of automated tools and third-party vendors has made social media surveillance more efficient and scalable. These tools can continuously monitor online activity, utilize algorithms to identify specific keywords or phrases, and even geotag posts. Third-party vendors offer specialized products that enable law enforcement to conduct lead-based investigations into various aspects of the deep web.

1.6.4 Legal and Ethical Considerations

Fourth Amendment Implications:

Social media surveillance raises Fourth Amendment concerns related to unreasonable searches and seizures. The traditional understanding of this amendment may not fully account for the low-cost, scalable, and widespread surveillance made possible by social media.

Privacy Concerns:

Privacy considerations are central to the ethical debates surrounding social media surveillance. Social media platforms contain a mix of public and private information, and the ease with which law enforcement can access this data raises important privacy questions.

Balancing First Amendment Rights:

Social media surveillance can also impact First Amendment rights, including free speech. Monitoring of peaceful protests and the potential chilling effect on online expression are areas of concern.

The Debate on Surveillance During Protests:

Surveillance during protests, such as the monitoring of the #BlackLivesMatter movement, has sparked significant debate. While agencies argue it enhances situational awareness, questions about the Fourth Amendment and the protection of First Amendment rights persist. This debate highlights the tension between effective law enforcement and civil liberties in the digital age.