237,99 €
This book presents a vital method for companies to connect with potential clients andconsumers in the digital era of Online Social Networks (OSNs), utilizing the strengthof well-known social networks and AI to achieve success through fostering brandsupporters, generating leads, and enhancing customer interactions.
There are currently 4.8 billion Online Social Network (OSN) users worldwide. Online Social Networks in Business Frameworks presents marketing through online social networks (OSNs), which is a potent method for companies of all sizes to connect with potential clients and consumers. If visitors are not on OSN sites like Facebook, Twitter, and LinkedIn, they are missing out on the fact that people discover, learn about, follow, and purchase from companies on OSNs. Excellent OSN advertising may help a company achieve amazing success by fostering committed brand supporters and even generating leads and revenue. A type of digital advertising known as social media marketing (SMM) makes use of the strength of well-known social networks to further advertise and establish branding objectives. Nevertheless, it goes beyond simply setting up company accounts and tweeting whenever visitors feel like it. Preserving and improving profiles means posting content that represents the company and draws in the right audience, such as images, videos, articles, and live videos, addressing comments, shares, and likes while keeping an eye on the reputation to create a brand network, and following and interacting with followers, clients, and influencers.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 1016
Veröffentlichungsjahr: 2024
Cover
Table of Contents
Series Page
Title Page
Copyright Page
Preface
1 Unmasking Social Media Crimes: Types, Trends, and Impact
1.1 Introduction
1.2 Related Work
1.3 Social Media
1.4 Types of Social Media Crimes
1.5 Trends in Social Media Crimes
1.6 Law Enforcements’s Use of Social Media Surveillance
1.7 Challenges in Social Media Surveillance
1.8 Impact of Social Media Crimes
1.9 Conclusion
References
2 Study on Vulnerability in Online Social Networking: Impact on an Individual, Community
2.1 Introduction
2.2 Statistics of Online Social Media Network
2.3 Existing Research on Social Media Vulnerabilities
2.4 Vulnerability
2.5 Future Trends
2.6 Conclusion
Acknowledgement
References
3 Application of Google Lens Clone Using Image Recognition in Enterprise Environment
3.1 Introduction
3.2 Requirement and Application
3.3 Strengths and Weaknesses
3.4 Limitations
3.5 Approach
3.6 Design and Implementation
3.7 Experimental Results and Analysis
3.8 Conclusion
References
4 An Artificial Intelligence Risk Assessment of a Material Handling System Using a Cost–Safety Matrix
Introduction
References
5 Sustainable Futures: Navigating Blockchain’s Energy Dilemma
5.1 Introduction
5.2 Related Work
5.3 Understanding Blockchain Technology
5.4 Energy Dilemma in Blockchain Technology
5.5 Environmental Implications
5.6 Sustainable Solutions in Blockchain
5.7 Scalability and Efficiency Issues in Greener Consensus Mechanisms
5.8 Blockchain’s Role in Sustainable Development Goals (SDGS) [11, 12]
5.9 Industry Applications and Best Practices [7, 8]
5.10 Conclusion
References
6 Role of Online Social Networking in Smart Healthcare
6.1 Introduction
6.2 Evolution of Online Social Network and Smart Healthcare
6.3 Issues and Challenges Towards Online Social Networking in Smart Healthcare
6.4 Popular Case Study 1: Online Social Networking in Smart Healthcare
6.5 Integrating Social Networking into Healthcare Policies for Better and Reliable Services
6.6 Future Opportunities and Innovation Towards Online Social Networking in Healthcare
6.7 An Open Discussion on OSN [18, 19] for Healthcare with Cutting Edge Technologies for Modern People
6.8 Conclusion
References
7 Application and Future Trends in Online Social Networking for the Next Generation
7.1 Introduction to Online Social Networking, and Next Generation Society: Fundamentals, and Key Component and Features
7.2 Current Applications of Online Social Networking
7.3 Role of Emerging Applications in Making Effective Online Social Networking
7.4 Next-Generation Social Networking Technologies for Modern Generation
7.5 Future Research Opportunities Towards Online Social Networking for the Next Generation
7.6 Open Issues and Challenges in Next-Generation Machine-Based Social Networking
7.7 User Perspectives and Expectations Today by OSN and Its Effect on Modern Society/Generation
7.8 Conclusion
References
8 Security and Possible Threats in Today’s Online Social Networking Platforms
8.1 Introduction
8.2 Existing Security Architecture in Social Networking Platforms
8.3 Common Security Threats on Network and Websites
8.4 Security and Privacy Issues in Online Social Networking in Today’s Smart Era
8.5 Emerging Threats for Next Generation Based Online Social Networking
8.6 Security Measures and Tools Available for Protecting Network/OSNs
8.7 Regulatory Framework and Compliance for Reliable/Safe/Secure OSNs for Next Generation
8.8 Incident Response and Recovery Towards OSNs
8.9 Detection and Notification Towards OSNs
8.10 Conclusion
References
9 The Future of Artificial Intelligence and Machine Learning in Online Social Networking
9.1 Introduction
9.2 Current Landscape of Online Social Networking
9.3 Open Issues and Challenges Towards AI and ML in Social Networking
9.4 Future Research Opportunities Towards AI and ML in Social Networking
9.5 Applications of AI in Online Social Networking
9.6 Future Research Opportunities Towards AI and ML in Social Networking Using Emerging Technologies
9.7 Conclusion
References
10 Future Opportunities Towards Online Social Networking in the Era of Industry 4.0/5.0
10.1 Introduction
10.2 Evolution of Online Social Networking in Industry 4.0/5.0
10.3 Emerging Opportunities with Emerging Technologies for Social Networking in Industry 4.0/5.0
10.4 Interconnectivity and Integration of Emerging Technology with Industry 4.0/5.0 for Effective Online Social Networking
10.5 Smart Manufacturing and Social Networking Towards Industry 4.0/5.0
10.6 Open Issues and Challenges Towards Industry 4.0/5.0 for Effective Online Social Networking
10.7 Future Research Opportunities Towards Industry 4.0/5.0 for an Effective Online Social Networking
10.8 Conclusion
References
11 Online Social Networking: Power of Industry 6.0 and Beyond
11.1 Introduction
11.2 Background
11.3 Transformative Shifts in Industrial Paradigms for Industry 6.0
11.4 The Role of Online Social Networking in Industry 6.0
11.5 Integration of Emerging Technologies for Social Networking in the Era of Industry 6.0
11.6 Smart Factories and Social Collaboration
11.7 Future Research Opportunities for Social Networking in the Era of Industry 6.0 [31, 32]
11.8 Popular Issue and Challenges Towards Online Social Networking in the Era of Industry 6.0
11.9 Conclusion
References
12 An Investigation on Detection of Botnets in Online Social Networks
12.1 Introduction
12.2 Literature Survey
12.3 Challenges in Social Chatbot Detection
12.4 Socialbots Detection
12.5 Conclusion
References
13 Design and Development of Techniques for Fake Profile Detection in Online Social Networks
13.1 Introduction
13.2 Literature Survey
13.3 Methods and Results
13.4 Conclusion
References
14 Spammer Detection in Online Social Networks
14.1 Introduction
14.2 Challenges in Online Social Network Spammer Detection
14.3 Literature Review
14.4 Machine Learning for Spammer Detection
14.5 Conclusion
References
15 A Review of Various Applications of Internet of Things with Related Security Issues and Challenges
15.1 Introduction
15.2 Literature Survey
15.3 IoT Applications and Related Security Issues
15.4 Security Issues and Challenges
15.5 Conclusion
References
16 AGRO-Cloud Model and Smart Algorithm to Increase Crop Yield Prediction to Improve Agriculture Quality
16.1 Introduction
16.2 Related Work
16.3 AGRO-Cloud Model
16.4 Deep Learning for Smart Agriculture
16.5 Conclusion and Future Work
References
17 OSN in Healthcare Performance View Through Integration
17.1 Introduction
17.2 The Role of OSNs in Patient Care
17.3 OSNs and Public Health Initiatives
17.4 OSNs in Medical Research and Data Sharing
17.5 Leveraging AI and Data Analytics in Healthcare OSNs
17.6 Privacy and Security Concerns in OSN-Enabled Healthcare
17.7 Case Studies of Successful OSN Implementation in Healthcare
17.8 Future Directions and Innovation in OSN Healthcare Integration
17.9 Healthcare Organizations and OSN Adoption Strategies
17.10 Conclusion
References
18 Internet-Based Platforms and Trends Towards Online Social Networking
18.1 Introduction
18.2 Applications of OSN
18.3 Emerging Trends in Online Social Networking [12]
18.4 Implications and Challenges [5, 6]
18.5 Related Work
18.6 Proposed Methodology
References
19 Security and Threat in Online Social Networking
19.1 Introduction
19.2 User-Centric Security Challenges
19.3 Platform-Centric Vulnerabilities [13]
19.4 Content Moderation and Algorithmic Solutions [5]
19.5 Emerging Threats [1]
19.6 User Education and Privacy Controls [1–4]
19.7 Regulatory Frameworks and Industry Standards [2, 3]
19.8 Interdisciplinary Approaches [9, 10]
19.9 Case Studies and Real-World Examples [2, 3]
19.10 Conclusion
19.11 Conclusion
References
20 Social Media Platform Scraping and Extracting Paradigm
20.1 Introduction
20.2 Significance of Facebook, Twitter Data Scraping [1, 2, 11–13]
20.3 Related Work
20.4 Proposed Methodology
20.5 Conclusion
References
21 Computer-Generated Environment for Virtual Reality and Digital Information Technologies
21.1 Introduction
21.2 Advantages of Virtual Reality
21.3 Related Work: Virtual Reality and Digital Information Technologies [1–5]
21.4 Proposed Methodology: Leveraging Virtual Reality and Digital Information Technologies
21.5 Conclusion
References
22 Online Social Networking: Navigating the Myth and Reality of Friendship in the Era of Zero Trust
22.1 Introduction
22.2 Significance of Zero Trust in Online Friendship Environment
22.3 Literature Review
22.4 The Virtual Facade of Online Friendship
22.5 Psychological Dynamics of Online Friendships
22.6 Zero Trust and Safety in Virtual Spaces
22.7 State-of-the-Art Countermeasures for Cyber Crime
22.8 Public Awareness Advisory: Reporting Cybercrime Immediately
22.9 Conclusion
Acknowledgement
References
23 Various Threats and Attacks on Online Social Networks and Their Counter Measures
23.1 Introduction
23.2 Literature Survey
23.3 Privacy Breaches in Online Social Network (OSN)
23.4 Attacks and Threats on Online Social Network
23.5 Attacks on Online Social Networks
23.6 Conclusion
References
24 Blockchain-Based Decentralized Online Social Networks – Benefits and Challenges
24.1 Introduction
24.2 Online Social Network Threats
24.3 Introduction to Blockchain
24.4 Blockchain Features
24.5 Blockchain Based Social Networks
24.6 Challenges
24.7 Conclusion
References
25 Integrating TF-IDF Features to Divide Amazon Product Reviews into Positive and Negative Groups
25.1 Introduction
25.2 Proposed Work
25.3 Analysis of Results
25.4 Conclusion
References
26 Improved Supervised Classification Model for Automatically Categorizes of News Articles
26.1 Introduction
26.2 Related Work
26.3 Proposed Model
26.4 Dataset Description
26.5 Experiment, Results, and Discussion
26.6 Conclusion
References
27 OSN Traits and Vulnerability for Measurement and Analysis
27.1 Introduction
27.2 Media and Social Network Statistics Online
27.3 Open Research Problems and Difficulties [2, 4]
27.4 Conclusion
References
28 Privacy Preservation in Online Social Networks
28.1 Introduction
28.2 Privacy Protection in Online Social Networks
28.3 Security and Privacy Issues in Online Social Network
28.4 Review of Privacy Preserving Techniques for Online Social Networks
28.5 Recommendations for Privacy Preservation in Online Social Networks
28.6 Conclusion
References
29 Machine Learning Techniques for Heart Disease Detection using E-Health Monitoring System
29.1 Introduction
29.2 Literature Survey
29.3 Methodology
29.4 Results and Discussion
29.5 Conclusion
References
30 A Hybrid Method for Image Encryption Using Lagrange’s Interpolation
30.1 Introduction
30.2 Related Work
30.3 Mathematical Background in Lagrange’s Interpolation
30.4 Proposed Image Encryption Cryptosystem Using Lagrange’s Interpolation
30.5 Conclusion
References
31 Improvement of Underwater Blur Images Using Dark Channel Prior and Fuzzy Intensification Operator for Better Social Network’s Transmission
31.1 Introduction
31.2 Literature Survey
31.3 Proposed Methodology
31.4 Experimental Results
31.5 Conclusion
References
About the Editors
Index
Also of Interest
End User License Agreement
Chapter 2
Table 2.1 Recommendations and techniques for cybercrime prevention.
Table 2.2 Popular case study based on vulnerability.
Table 2.3 Study of vulnerability trends.
Chapter 4
Table 4.1 Cost per unit.
Table 4.2 Cost – safety matrix (a).
Table 4.3 Cost–safety matrix (b).
Chapter 8
Table 8.1 Types of security threats, along with their features.
Table 8.2 Security and privacy issues in online social networking.
Table 8.3 Deepfake technology threat to modern OSNs.
Table 8.4 Security tools used in OSNs.
Table 8.5 Key components of a regulatory framework.
Chapter 15
Table 15.1 Major issues in IoT.
Chapter 16
Table 16.1 Comparative analysis table for crop yield prediction using hybrid d...
Table 16.2 Comparison of crop yield prediction results using different deep le...
Chapter 17
Table 17.1 Misinformation mitigation process diagram [3–7].
Chapter 22
Table 22.1 Historical perspective of friendship.
Table 22.2 The evolution of social networking platforms and its key features.
Table 22.3 Online vs. offline friendship.
Table 22.4 Zero trust model principles.
Table 22.5 Cybercrime and state of the art countermeasures.
Table 22.6 Public awareness advisory to counter measure cybercrime.
Chapter 24
Table 24.1 Comparison of traditional and blockchain based social networks
Table 24.2 Blockchain-based social platforms.
Chapter 25
Table 25.1 Review of a product on amazon classified review class C as an outpu...
Table 25.2 Precision.
Table 25.3 Recall.
Table 25.4 F1-score.
Table 25.5 Utilization of memory.
Table 25.6 Training time.
Table 25.7 Performance summary.
Chapter 31
Table 31.1 Peak signal to noise ratio (base method and proposed method) calcul...
Table 31.2 Entropy value (base method and proposed method).
Chapter 2
Figure 2.1 Proliferation of online social networking.
Figure 2.2 No of online social networking users [2].
Figure 2.3 Biggest social media platform worldwide [3].
Figure 2.4 Comparative study of information disclosure on different social med...
Figure 2.5 Classification of vulnerabilities.
Chapter 3
Figure 3.1 Adoption of the review process.
Figure 3.2 Architectural design of the work.
Figure 3.3 Design fragment.
Chapter 6
Figure 6.1 Timeline of social media network. Adopted from
1
.
Figure 6.2 Benefits of online social networking in healthcare.
Figure 6.3 Online social networking in smart healthcare.
Figure 6.4 Online social networking in smart healthcare.
Chapter 8
Figure 8.1 Types of online social networking platforms.
Figure 8.2 Security in online social networking.
Figure 8.3 Existing security architecture in social networking platforms.
Figure 8.4 Emerging threats for next generation based online social networking...
Chapter 9
Figure 9.1 Current landscape of online social networking.
Figure 9.2 Role of algorithms in social networking.
Figure 9.3 Key issues and challenges associated with AI and ML in the context ...
Figure 9.4 Artificial intelligence technology landscape.
Figure 9.5 Application of artificial intelligence in marketing.
Chapter 12
Figure 12.1 A machine learning-based framework for social chatbots classificat...
Chapter 13
Figure 13.1 Machine learning-based framework for spam profile detection in onl...
Figure 13.2 Accuracy of model for spam profile detection in online social netw...
Figure 13.3 Sensitivity of model for spam profile detection in online social n...
Figure 13.4 Specificity of model for spam profile detection in online social n...
Chapter 14
Figure 14.1 Spammer detection in online social network using optimized machine...
Chapter 15
Figure 15.1 IoT applications.
Chapter 16
Figure 16.1 Smart agriculture.
Figure 16.2 AGRO-Cloud model.
Figure 16.3 Putting together a convolutional neural network in one dimension (...
Chapter 17
Figure 17.1 Patient consent workflow diagram [1, 2].
Figure 17.2 Ethical guidelines framework [5, 7].
Figure 17.3 System architecture diagram.
Figure 17.4 Data flow diagram [3, 6, 7, 10, 11].
Figure 17.5 Future trends and implications diagram [16, 17].
Chapter 18
Figure 18.1 Poll for people engaged in OSN usage [2–5].
Chapter 19
Figure 19.1 Paradigm of OSN channels [8, 9].
Figure 19.2 Gateways of information transfer [10–13].
Chapter 20
Figure 20.1 OSN platform scraping [6, 7].
Figure 20.2 OSN users globally during 2017–2027 [12, 13].
Figure 20.3 Authentication process (web scraping) [1, 4–7].
Figure 20.4 JSON formatted data structure [10–13].
Figure 20.5 JSON formatted data structure [6–9].
Chapter 21
Figure 21.1 Model of virtual reality [7, 8].
Figure 21.2 Flow of digital information technologies [9, 10].
Figure 21.3 Flow of virtual reality features [6–9].
Figure 21.4 Productivity of virtual reality features [5–8].
Chapter 22
Figure 22.1 Use of social media platforms in the US during 2019 [8].
Figure 22.2 Factors responsible for online social networking and friendship [3...
Figure 22.3 Dark side of online friendship.
Figure 22.4 Motives of cyber crime. Data source: NCRB Government of India.
Figure 22.5 Reports on identity theft and fraud, 2018–2022. Data source: [Fede...
Figure 22.6 Addiction of online social media [22].
Figure 22.7 Classification of positive impact and challenges faced due to onli...
Figure 22.8 Cybercrime reported in year 2023 in India under IT Act.
Chapter 24
Figure 24.1 Number of OSN users (in billion).
Figure 24.2 Percentage of social media users vs. total population (in billion)...
Figure 24.3 Percentage of organizations targeted worldwide in 2021.
Figure 24.4 Original and tempered blockchain.
Figure 24.5 Features of decentralized social networks.
Chapter 25
Figure 25.1 Proposed system architecture.
Figure 25.2 Precision.
Figure 25.3 Recall.
Figure 25.4 F1-result.
Figure 25.5 Memory utilization.
Figure 25.6 Exercise period.
Chapter 26
Figure 26.1 Categories of methods with its benefits and findings [16–24].
Figure 26.2 Proposed model for automatically categorizing news articles [25–28...
Figure 26.3 Categories of articles [29–31].
Figure 26.4 Count of articles [13–16].
Figure 26.5 News category performance [17–19].
Figure 26.6 Method performance [26–30].
Chapter 27
Figure 27.1 Connection of OSN [5–7].
Figure 27.2 The quantity of users on various social media sites [6, 9].
Figure 27.3 Hazards of various platforms [3–6, 11].
Figure 27.4 The top five categories of 2021 hacking [4–6].
Figure 27.5 Threat classification [12, 16, 17].
Chapter 29
Figure 29.1 A framework to predict heart disease.
Figure 29.2 Result comparison of classifiers for heart disease detection.
Figure 29.3 Accuracy, sensitivity, and specificity of machine learning for hea...
Chapter 30
Figure 30.1 Image cryptography.
Chapter 31
Figure 31.1 Illustration of the colour attenuation for different wavelength at...
Figure 31.2 Illustration of forward scatter, backward scatter and direct compo...
Figure 31.3 Haze removal using equation (a) input hazy image (b) dark channel ...
Figure 31.4 Flow chart of proposed method.
Figure 31.5 Experiment dataset.
Figure 31.6 Comparison results of approach [15] and proposed approach.
Cover Page
Table of Contents
Series Page
Title Page
Copyright Page
Preface
Begin Reading
About the Editors
Index
Also of Interest
WILEY END USER LICENSE AGREEMENT
ii
iii
iv
xxv
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
611
612
613
614
615
616
617
618
619
620
621
622
623
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
641
642
643
644
645
646
647
648
649
650
651
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
685
686
687
688
Scrivener Publishing100 Cummings Center, Suite 541JBeverly, MA 01915-6106
Publishers at ScrivenerMartin Scrivener ([email protected])Phillip Carmical ([email protected])
Edited by
Sudhir Kumar Rathi
Bright Keswani
Rakesh Kumar Saxena
Sumit Kumar Kapoor
Sangita Gupta
and
Romil Rawat
This edition first published 2024 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA© 2024 Scrivener Publishing LLCFor more information about Scrivener publications please visit www.scrivenerpublishing.com.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
Wiley Global Headquarters111 River Street, Hoboken, NJ 07030, USA
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
Limit of Liability/Disclaimer of WarrantyWhile the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.
Library of Congress Cataloging-in-Publication Data
ISBN 9781394231096
Front cover images supplied by Adobe FireflyCover design by Russell Richardson
The book discusses marketing through online social networks (OSNs), which is a potent method for companies of all sizes to connect with potential clients and consumers. If visitors are not on OSN sites like Facebook, Twitter, and LinkedIn, they are missing out on the fact that people discover, learn about, follow, and purchase from companies on OSN. Excellent OSN advertising may help a company achieve amazing success by fostering committed brand supporters and even generating leads and revenues. A type of digital advertising known as social media marketing (SMM) makes use of the strength of well-known social networks to further advertise and establish branding objectives. Nevertheless, it goes beyond simply setting up company accounts and tweeting whenever visitors feel like it. Preserving and improving the profiles means posting content that represents the company and draws in the right audience, such as images, videos, articles, and live videos. Addressing comments, shares, and likes while keeping an eye on reputation to create a brand network, follow and interact with followers, clients, and influencers.
Rijvan Beg1, Vivek Bhardwaj2, Mukesh Kumar3, Prathamesh Muzumdar4, Aman Rajput5* and Kamal Borana6
1Department of Computer Science and Engineering, Maulana Azad National Institute of Technology (MANIT), Bhopal, India
2School of Computer Science and Engineering, Manipal University Jaipur, Jaipur, India
3Department of CSE, Chandigarh College of Engineering, Chandigarh Group of Colleges, Jhanjeri, Punjab, India
4Department of Management, Suresh Gyan Vihar University, Jaipur, Rajasthan, India
5Department of Computer Science & Engineering, Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, M.P., India
6Department of CSE, Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, India
Social media platforms have profoundly transformed how humans interact, offering new avenues for communication and self-expression. Yet, this digital revolution has also led to the emergence of social media crimes, presenting unique challenges. This research comprehensively explores these crimes, delving into their various types, evolving trends, and wide-ranging impact on individuals, communities, and civil rights. Through a multifaceted research approach, this study meticulously investigates social media crimes, drawing from extensive literature reviews, real-world cases, legal documents, and expert insights. The research also examines the roles played by social media platforms themselves, shedding light on their policies, data-sharing practices, and enforcement methods. Both qualitative and quantitative methodologies are employed to categorize and trace the evolution of social media crimes, addressing issues such as cyberbullying, identity theft, and the dissemination of extremist content. The findings underscore the profound implications of social media crimes on individuals and society, with marginalized communities and younger generations bearing the brunt of these consequences. The paper emphasizes the need for clear guidelines governing the use of social media in intelligence gathering, particularly in cases related to community organizing and public protests. In conclusion, this research highlights the pressing necessity for legislative and technological measures to combat social media crimes and protect civil rights. It advocates for educational programs to equip law enforcement, legal professionals, and individuals with the knowledge to navigate the digital landscape responsibly while preserving fundamental rights in the digital age.
Keywords: Social media crimes, cyberbullying, identity theft, online harassment, extremist content
Social media’s rise traces back to the early 2000s, with platforms like Friendster and MySpace laying the foundation. Facebook’s 2004 debut marked a turning point, fostering rapid social media adoption. Platforms such as Twitter, Instagram, Snapchat, and TikTok have since become central to global online interaction. User-friendly profiles and content sharing have led to substantial online presences for individuals and communities. Social media crimes, including cyberbullying, online harassment, identity theft, cyberstalking, malware distribution, and extremist content dissemination, have grown with these platforms. Their anonymity and connectivity facilitate these activities, harming individuals and society. Statistics reveal the extent of these crimes:
Cyberbullying:
59% of U.S. teens experience online harassment; 63% witness it.
Identity Theft:
20% of 2020 consumer complaints to the FTC involved identity theft.
Online Harassment:
37% of U.S. internet users aged 18-29 face online harassment.Extremist Content: In 2019, 59% of U.S. extremist-related murders were tied to white supremacists who used social media.
A substantial body of research and literature has begun to address various aspects of social media crimes. Studies have examined the psychological implications of online harassment, the legal dimensions of cybercrimes, and the role of social media platforms in combating harmful content. Research has also delved into the evolving strategies employed by criminals and extremists in exploiting the digital realm for their purposes. These investigations have yielded insights into the multifaceted nature of social media crimes, their causes, and the mechanisms employed to perpetrate them.
Despite the growing body of research, notable gaps persist in our understanding of social media crimes. Existing studies often focus on specific aspects of these crimes or approach them from individual disciplinary lenses. The literature tends to emphasize psychological, legal, or sociological dimensions in isolation, often overlooking the complex interplay of these factors. As a result, a comprehensive, multidisciplinary overview of social media crimes, which synthesizes their types, dynamic trends, and overarching impact, remains an unaddressed challenge.
The primary objective of this research paper is to unmask social media crimes by conducting a thorough examination of their types, trends, and impact. We aim to bridge the gaps in existing literature by providing a holistic analysis that considers psychological, legal, and sociological aspects in conjunction. We seek to categorize and track the evolution of social media crimes, identifying the latest trends and strategies employed by wrongdoers. Moreover, we aspire to uncover the extent of social media platforms’ involvement in shaping the landscape of these crimes.
This research paper will focus on a wide range of social media crimes, including but not limited to cyberbullying, online harassment, identity theft, and the dissemination of extremist content. It will encompass both qualitative and quantitative data analysis, incorporating real-world cases and expert insights. While the study will emphasize the United States, it will also draw from international cases to provide a global perspective. The research will not delve into the technical aspects of cybercrimes but will explore the sociological and psychological dimensions. Additionally, it will raise critical questions about law enforcement’s role in social media surveillance and intelligence gathering, highlighting potential ethical and legal concerns in these areas.
A comprehensive literature survey reveals a wealth of studies and research papers that have explored various aspects of social media crimes. These studies provide valuable insights into the types, trends, and impact of these crimes and the challenges they pose to individuals and society.
Cyberbullying and Online Harassment:
Research in this area has delved into the psychological and emotional consequences of cyberbullying and online harassment. For instance, a study by Hinduja and Patchin (2010) examined the emotional and psychological impacts on victims, shedding light on the detrimental effects of online harassment.
Identity Theft:
Studies have investigated the methods and techniques employed by cybercriminals to commit identity theft on social media platforms. “Fraud on Facebook” by Arun Vishwanath and Heng Xu (2018) explores the tactics used to deceive users and steal their personal information, highlighting the sophisticated nature of these crimes.
Extremist Content and Online Radicalization:
The dissemination of extremist ideologies on social media platforms has attracted significant attention. A report by the Institute for Strategic Dialogue (2019) detailed the use of social media in promoting extremist content and radicalizing individuals, contributing to the understanding of this pressing issue.
Social Media and Law Enforcement:
Research has also examined the relationship between social media and law enforcement agencies. A study by Jyoti Mishra (2019) investigates the challenges faced by law enforcement in dealing with social media crimes and highlights the need for improved strategies and tools.
Privacy Concerns and Online Security:
Studies such as “The Privacy Paradox: Social Networking in the United States” by Rainie and Madden (2015) delve into the privacy concerns of social media users and the implications for online security. These concerns are closely tied to social media crimes involving data breaches and the misuse of personal information.
While these studies have contributed valuable insights, a research gap persists in providing a holistic analysis of the various types of social media crimes, their evolving trends, and the broader impact on individuals and society. Few studies have attempted to connect the dots between different types of social media crimes, the changing landscape of social media platforms, and the resulting societal consequences. This research paper aims to bridge this gap by offering a comprehensive analysis of social media crimes, their emerging trends, and their profound impact on individuals and communities.
Social media has become an integral part of modern society, reshaping the way we communicate, share information, and connect with others. It encompasses a wide range of platforms, each with its unique features and purposes.
The history of social media platforms is a captivating journey that has fundamentally reshaped the way we connect, communicate, and disseminate information. This evolution has spanned several decades and has seen the rise and fall of numerous platforms, each leaving a significant mark on the social media landscape. Let’s delve deeper into the intricate history of social media platforms, tracing their origins, key features, and the impact they’ve had on our digital and physical lives.
SixDegrees (1997)
: Often heralded as one of the pioneers of social media, SixDegrees made its debut by allowing users to create personal profiles and connect with friends online. This marked the inception of the idea that the internet could be a space for fostering digital relationships. However, SixDegrees had a relatively short-lived existence, primarily due to its limited features and a somewhat modest user base.
Friendster (2002)
: Friendster is another early trailblazer in the social media landscape. It popularized the concept of connecting with friends through an online platform and introduced the world to the notion of a social network. While it gained significant traction in Asia, it eventually lost ground to emerging competitors.
LinkedIn (2003)
: LinkedIn, a platform solely focused on professional networking, emerged as one of the earliest players in this space. It provided a platform for users to connect with colleagues, potential employers, and industry professionals, emphasizing the importance of professional relationships in the digital age.
MySpace (2003)
: MySpace, with its innovative features allowing users to personalize their profiles with music, photos, and more, played a pivotal role in shaping the early social media landscape. It became a creative haven, particularly for musicians and artists. However, it eventually ceded its position to Facebook, which offered a more user-friendly and streamlined experience.
Facebook (2004)
: The brainchild of Mark Zuckerberg and his Harvard classmates, Facebook began as a platform exclusively for college students. However, it quickly expanded its user base to include other universities and, ultimately, the general public. Facebook’s success redefined the social media landscape and established many of the conventions and features we associate with the medium today.
YouTube (2005)
: YouTube disrupted the way we create, share, and consume video content. This platform allowed users to upload, view, and share videos, empowering the rise of content creators, influencers, and online video as a dominant medium for information and entertainment.
Twitter (2006)
: Twitter introduced the concept of microblogging, with its signature 140-character limit (later expanded to 280 characters). This microblogging approach transformed Twitter into a real-time hub for information, conversations, and trending topics, influencing news dissemination and public discourse.
Tumblr (2007)
: Tumblr blended elements of traditional blogging with social networking, encouraging users to share text, images, and multimedia content in a more casual and creative manner. It embraced the concept of microblogging and appealed to users seeking an outlet for personal expression and creativity.
Pinterest (2010)
: Pinterest, with its focus on visual content and the creation of virtual pinboards, redefined how we organize and share images and ideas. It emerged as a hub for inspiration, DIY projects, and visual discovery, especially popular among those seeking creative and lifestyle inspiration.
Instagram (2010)
: Instagram concentrated on photo and video sharing, emphasizing the visual medium. It gained immense popularity for its simplicity and creative features, enabling users to apply filters and share visually stunning moments.
Snapchat (2011)
: Snapchat introduced the revolutionary concept of temporary multimedia messaging. It allowed users to send photos and videos that would disappear after a brief period. This ephemeral approach to communication quickly gained traction, especially among a younger demographic.
WhatsApp (2011)
: WhatsApp disrupted the messaging landscape by offering a secure, cross-platform messaging app. It provided users with the ability to send text messages, make voice and video calls, and share various forms of media, all while emphasizing end-to-end encryption. This made it a favorite choice for individuals and groups seeking private, reliable communication.
Vine (2013)
: Vine, a short-form video platform, enabled users to create and share six-second looping videos. It fostered creativity and humor, inspiring a wave of short-form content creators. Despite its influence, Vine was discontinued in 2017.
TikTok (2016)
: TikTok, a spiritual successor to Vine, breathed new life into short-form video content. It introduced music and creative effects, and it rapidly gained global popularity, particularly among younger users. TikTok’s userfriendly interface and emphasis on viral trends and challenges reshaped how we engage with and create short videos.
Clubhouse (2020)
: Clubhouse disrupted the social media landscape by introducing the concept of audio-based social networking. Users could join “rooms” where live audio discussions took place. This innovative approach drew early attention for its unique mode of social interaction and discourse.
Social media platforms, with their vast user base and seamless connectivity, have become hotbeds for various types of crimes. Understanding these crimes is essential to combat and prevent them. Below, we delve into the details of the major types of social media crimes:
Cyberbullying:
The use of social media platforms to harass, intimidate, or threaten others, often with the intention of causing emotional distress or harm. Cyberbullying can manifest as online harassment, hate speech, or stalking and may have serious consequences for the victims.
Identity Theft and Scams:
Social media is fertile ground for identity thieves and scammers who use deceptive tactics to steal personal information, engage in fraudulent activities, or manipulate individuals into providing sensitive data or financial resources.
Hate Speech and Incitement to Violence:
Hate speech on social media involves the dissemination of discriminatory, prejudiced, or violent content targeting specific groups or individuals based on their characteristics, such as race, religion, or nationality. Incitement to violence occurs when individuals or groups use social media to encourage or plan violent acts, potentially leading to real-world harm.
Online Fraud and Financial Crimes:
These encompass a variety of schemes aimed at defrauding individuals or organizations through social media, including fake investment opportunities, phishing attacks, and online scams designed to steal money or valuable assets.
Copyright and Intellectual Property Violations:
Unauthorized sharing and distribution of copyrighted material, such as movies, music, or software, without proper licensing or consent from rights holders, constitute intellectual property violations.
These types of social media crimes exploit the features of these platforms, such as anonymity, ease of communication, and the potential to reach a wide audience. Recognizing these crimes and their characteristics is crucial for law enforcement, social media companies, and users to take appropriate preventive and responsive measures.
Online Platforms as a Facilitator:
These crimes primarily occur on social media platforms or other online communication channels, exploiting the convenience, reach, and anonymity that these platforms provide.
Global Nature:
Social media crimes often transcend geographical boundaries, making them international issues that may require cooperation among law enforcement agencies from different countries.
Anonymity:
Perpetrators of social media crimes can hide behind online pseudonyms, making it challenging to identify and apprehend them.
Rapid Dissemination:
Information, threats, or content can spread rapidly through social media, amplifying the impact of these crimes.
Psychological and Emotional Impact:
Many social media crimes are designed to inflict emotional or psychological harm on victims, leading to real-world consequences such as depression, anxiety, or even self-harm.
Legal and Ethical Considerations:
Addressing social media crimes requires navigating complex legal and ethical issues related to free speech, privacy, and the balance between security and civil liberties.
Effectively addressing social media crimes involves understanding the types of offenses that occur within this domain and the unique challenges they pose for law enforcement and society as a whole.
Cyberbullying and online harassment involve the use of digital communication channels, including social media platforms, to intimidate, threaten, or harm individuals. These actions often target specific individuals or groups and may manifest in various forms, such as:
Harassing Messages:
Perpetrators send abusive, threatening, or offensive messages to their victims. This can include derogatory comments, insults, or threats of physical harm.
Doxxing:
Attackers publish private or sensitive information about their victims, such as home addresses, phone numbers, or financial details, with the intention of causing harm or distress.
Posting Inappropriate Content:
Cyberbullies may create and share humiliating or embarrassing content about their victims, such as manipulated images, false rumors, or defamatory posts.
Impersonation:
Some harassers impersonate their victims online, using fake accounts to tarnish their reputation or provoke conflicts with others.
Exclusion and Isolation:
Online harassment can take the form of excluding individuals from online groups, conversations, or social circles, causing feelings of isolation and loneliness.
The impact of cyberbullying and online harassment on victims is profound and can lead to a range of emotional, psychological, and even physical consequences, including:
Emotional Distress:
Victims often experience significant emotional distress, including anxiety, depression, stress, and a loss of self-esteem.
Social Isolation:
Online harassment can lead to social withdrawal, as victims may fear continued attacks or may be excluded from online communities.
Academic and Professional Consequences:
Students targeted by cyberbullying may struggle academically, while employees might face difficulties in their professional lives.
Health Issues:
Prolonged exposure to online harassment can contribute to physical health problems, including sleep disturbances and psychosomatic symptoms.
Risk of Self-Harm:
In severe cases, the emotional toll of cyberbullying may lead to self-harm or even suicidal tendencies.
Identity theft and scams on social media encompass various methods employed by criminals, including:
Phishing:
Criminals use deceptive emails, messages, or websites that mimic legitimate platforms to trick individuals into revealing sensitive information, such as login credentials, financial data, or personal details.
Impersonation:
Scammers often impersonate trusted entities or individuals to gain trust and manipulate victims. This could involve posing as a bank, a government agency, or even a friend or family member.
Online Shopping Scams:
Criminals create fake online stores or listings on social media to sell non-existent products or goods that do not match their descriptions. Victims may lose money or provide personal information during these transactions.
Romance Scams:
Scammers build online romantic relationships with victims, gaining their trust before exploiting them financially.
Advance Fee Fraud:
Perpetrators promise victims a large sum of money or a valuable prize in exchange for a smaller upfront fee. Once the fee is paid, the promised reward never materializes.
Victims of identity theft and scams on social media face significant consequences, including:
Financial Loss:
Scams can result in substantial financial losses for victims who may never recover their money.
Emotional Distress:
Victims often experience stress, humiliation, and emotional turmoil after falling victim to scams.
Damage to Reputation:
Impersonation or scams that involve manipulation by criminals can tarnish the victim’s reputation, leading to social and professional repercussions.
Legal and Administrative Hassles:
Victims may need to deal with legal issues and administrative burdens to rectify the damage caused by identity theft or fraud.
Trust Issues:
Scams can erode victims’ trust in online interactions and may affect their willingness to engage with others on social media or the internet.
Examining the Rise of Online Hate Speech Online hate speech has experienced a significant increase in recent years. The prevalence of this phenomenon is driven by several factors, including:
Anonymity:
The relative anonymity provided by social media platforms encourages some individuals to express discriminatory views they might not voice publicly.
Echo Chambers:
Social media algorithms often expose users to content that aligns with their existing beliefs, which can reinforce prejudiced views and encourage the spread of hate speech within like-minded communities.
Polarization:
Social and political polarization in society can fuel online hate speech, as individuals may resort to extreme rhetoric to bolster their positions.
Viral Content:
Hate speech can spread rapidly on social media, becoming viral and gaining a broad audience, contributing to its growth.
The connection between online hate speech and real-world violence has raised significant concerns. Several incidents have demonstrated the potential link between the two, such as:
Hate Crimes:
Online hate speech has been linked to incidents of hate crimes in which individuals or groups target specific communities based on their online expressions of hatred.
Radicalization:
Online platforms have been exploited for radicalization, leading to acts of violence or terrorism inspired by extremist ideologies found online.
Incitement to Violence:
In some cases, individuals have used social media to incite violence or plan criminal acts, emphasizing the dangerous potential of online rhetoric.
Targeted Attacks:
Prominent cases involve individuals acting on their online hate speech, leading to targeted attacks against specific individuals or groups.
The rise of online hate speech and its potential to incite violence underscores the complex challenges society faces in balancing free speech and the prevention of harm in the digital age.
The landscape of social media crimes is continually evolving, reflecting the changing ways in which individuals and criminals interact in the digital realm. Several key trends have emerged, highlighting the dynamic nature of these crimes:
Escalation of Cyberbullying and Online Harassment:
Trend:
Cyberbullying and online harassment have intensified, with an increasing number of individuals falling victim to hurtful and harmful online behavior.
Statistics:
A Pew Research Center study found that 59% of U.S. teens have experienced some form of online harassment, and 63% have witnessed others being harassed. This trend isn’t confined to the young, as adults are also targeted.
Growth of Identity Theft and Scams:
Trend:
Identity theft, particularly through catfishing and romance scams, is on the rise, taking advantage of individuals’ trust and desire for connection.
Statistics:
The Federal Trade Commission (FTC) reported that identity theft is a growing issue, with 20% of consumer complaints in 2020 related to identity theft.
Pervasiveness of Online Harassment:
Trend:
Online harassment, including hate speech and doxxing, has become alarmingly widespread, affecting a significant portion of internet users.
Statistics:
According to the Cyberbullying Research Center, 37% of U.S. internet users aged 18-29 have experienced online harassment, highlighting the pervasive nature of this issue.
Spread of Extremist Content:
Trend:
Social media platforms are increasingly used to disseminate extremist content, fueling radical ideologies and recruiting potential supporters.
Statistics:
In 2019, a report by the Anti-Defamation League (ADL) revealed that 59% of U.S. extremist-related murders were linked to white supremacists who used social media to spread their messages.
Child Exploitation and Online Grooming:
Trend:
Online predators are increasingly targeting minors for sexual exploitation, grooming them over social media.
Statistics:
Law enforcement agencies continue to report numerous cases of child exploitation through social media platforms, highlighting the ongoing threat to children’s safety.
Spread of False Information and Scare Tactics:
Trend:
Perpetrators are increasingly using social media to spread false information, manipulate public opinion, and provoke fear.
Statistics:
Instances offalse emergency alerts and misleading information have caused significant public concern and necessitated the development of countermeasures.
These trends underscore the serious and evolving nature of social media crimes. To address these challenges, it is essential for individuals, law enforcement, social media platforms, and policymakers to stay informed about emerging trends, adapt their strategies, and work together to prevent and combat these crimes effectively.
Christchurch Mosque Shootings (2019)
Background:
In March 2019, a gunman targeted two mosques in Christchurch, New Zealand, killing 51 people and injuring dozens. The shooter live-streamed the entire attack on Facebook, which quickly went viral.
Impact: Th
is horrific event demonstrated the real-time broadcasting of a terrorist attack through social media, leading to widespread global condemnation. It underscored the role of social media in not only promoting extremist content but also enabling violent acts.
Capital One Data Breach (2019)
Background:
In July 2019, Paige Thompson, a former employee of Amazon Web Services, exploited a vulnerability in Capital One’s systems to steal sensitive customer data. Thompson boasted about the data theft on social media platforms.
Impact:
The breach exposed the personal and financial information of over 100 million Capital One customers. It highlighted the risks of individuals using social media to brag about their criminal activities and the potential consequences for victims.
Phineas Fisher’s Hacking Campaign (2016-2020)
Background:
An individual known as Phineas Fisher conducted a high-profile hacking campaign against various targets, including banks and surveillance companies. Phineas Fisher communicated about the hacks through social media and even published a “how-to” guide on hacking.
Impact:
While Phineas Fisher’s motivations included political activism, their actions demonstrated how social media can be used to share hacking techniques and claims of responsibility for cybercrimes. The case raised questions about the ethics and consequences of hacktivism.
Instagram Data Breach (2019)
Background:
In May 2019, Instagram suffered a data breach where an unknown entity exposed the contact information of millions of Instagram users. The exposed data was later discovered for sale on the dark web.
Impact:
The breach revealed the potential vulnerabilities of social media platforms in protecting user data. Users affected by the breach faced risks of identity theft and unsolicited contact. This case highlighted the responsibility of platforms to safeguard user information.
Terrorist Recruitment on Twitter (Ongoing)
Background:
Terrorist organizations like ISIS and Al-Qaeda have been known to use Twitter for recruitment and radicalization efforts. They share propaganda and interact with potential recruits, exploiting the platform’s global reach.
Impact:
The ongoing use of Twitter by terrorist groups demonstrates the persistent challenges of monitoring and mitigating online extremism. It emphasizes the need for constant vigilance and cooperation between law enforcement and social media companies.
Cambridge Analytica Scandal (2018)
Background:
The data analytics firm Cambridge Analytica was involved in a massive data harvesting operation on Facebook. They collected personal data from millions of Facebook users without their consent, and this data was used for political purposes, including influencing elections.
Impact:
The scandal shed light on the privacy concerns associated with social media platforms. It sparked investigations into data protection practices, leading to regulatory changes and increased scrutiny of how personal data is handled on social media.
Ashley Madison Data Breach (2015)
Background:
The extramarital affairs website Ashley Madison suffered a data breach in 2015, resulting in the exposure of user data, including real names and personal details. The hacker group Impact Team claimed responsibility.
Impact:
This breach highlighted the risks associated with online dating and sensitive personal information shared on social media platforms. It also led to public embarrassment and fallout for those exposed as users of the site.
Twitter Bitcoin Scams (2020)
Background:
In July 2020, several high-profile Twitter accounts, including those of Barack Obama, Elon Musk, and Bill Gates, were hacked as part of a Bitcoin scam. The hackers used the compromised accounts to promote a cryptocurrency scam.
Impact:
This incident revealed the vulnerabilities of even well-known social media platforms like Twitter to cyberattacks. It also emphasized the potential for financial fraud on social media.
Racist Twitter Abuse (Ongoing)
Background:
Social media platforms like Twitter have faced ongoing issues with users spreading hate speech and engaging in online harassment. Targets of abuse have included public figures, activists, and everyday users.
Impact:
The persistence of online hate speech on platforms like Twitter raises concerns about the psychological and emotional toll on victims. It also highlights the challenges faced by platforms in moderating content and addressing such issues effectively.
Facebook and Myanmar Genocide (2018)
Background:
Facebook was criticized for its role in the spread of hate speech and misinformation in Myanmar, contributing to violence and persecution against the Rohingya Muslim minority. The platform was used to incite violence and disseminate false information.
Impact:
This case demonstrated the significant real-world consequences of unchecked social media activity. It brought attention to the ethical responsibilities of social media companies and the need to prevent the misuse of their platforms for incitement to violence.
These case studies illustrate the diverse range of social media-related crimes, from acts of terrorism and data breaches to hacking campaigns and online radicalization efforts. They emphasize the need for robust cybersecurity measures, law enforcement cooperation, and public awareness to address these evolving challenges.
Over the past decade, social media surveillance by law enforcement agencies has evolved significantly. Initially, officers mainly conducted manual monitoring, perusing public profiles, and performing searches across various platforms. However, the increasing prevalence of social media and the rise of mobile device usage have driven law enforcement to adopt more advanced techniques and technologies. Today, automated tools and third-party vendors have emerged, enabling law enforcement to efficiently monitor social media. This transition from manual methods to automated systems represents a significant shift in how agencies gather intelligence.
Solving Crimes:
One of the primary motivations behind the adoption of social media surveillance is the desire to solve crimes. Social media platforms serve as a valuable source of information that can aid law enforcement in solving cases, from murders to cybercrimes. Perpetrators often boast of their crimes or leave digital footprints that law enforcement can follow.
Proactive Monitoring:
The increasing public pressure for law enforcement to investigate crimes online has driven proactive monitoring. After high-profile violent incidents, journalists often uncover social media profiles that contain warning signs of potential criminal activity. As a result, law enforcement faces mounting pressure to identify potential offenders before they act, making proactive monitoring a key motivation.
Manual Surveillance:
Manual surveillance methods involve officers manually browsing public profiles, conducting searches, and creating profiles to connect with individuals of interest. While it allows a level of control, it is time-consuming and may not be as effective in handling the vast amount of data generated on social media.
Automated Tools and Third-Party Vendors:
The adoption of automated tools and third-party vendors has made social media surveillance more efficient and scalable. These tools can continuously monitor online activity, utilize algorithms to identify specific keywords or phrases, and even geotag posts. Third-party vendors offer specialized products that enable law enforcement to conduct lead-based investigations into various aspects of the deep web.
Fourth Amendment Implications:
Social media surveillance raises Fourth Amendment concerns related to unreasonable searches and seizures. The traditional understanding of this amendment may not fully account for the low-cost, scalable, and widespread surveillance made possible by social media.
Privacy Concerns:
Privacy considerations are central to the ethical debates surrounding social media surveillance. Social media platforms contain a mix of public and private information, and the ease with which law enforcement can access this data raises important privacy questions.
Balancing First Amendment Rights:
Social media surveillance can also impact First Amendment rights, including free speech. Monitoring of peaceful protests and the potential chilling effect on online expression are areas of concern.
The Debate on Surveillance During Protests:
Surveillance during protests, such as the monitoring of the #BlackLivesMatter movement, has sparked significant debate. While agencies argue it enhances situational awareness, questions about the Fourth Amendment and the protection of First Amendment rights persist. This debate highlights the tension between effective law enforcement and civil liberties in the digital age.