Skip to main content

The Ethics of Online Social Network Forensics

  • Conference paper
  • First Online:
E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life (WEB 2015)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 258))

Included in the following conference series:

  • 1208 Accesses

Abstract

Online social networks (OLSNs) are electronically-based social milieux where individuals gather virtually to socialize. The behavior and characteristics of these networks can provide evidence relevant for detecting and prosecuting policy violations, crimes, terrorist activities, subversive political movements, etc. Some existing forensics methods and tools are useful for such investigations. Further, forensics researchers are developing new methods and tools specifically for investigating and examining online social networks. While the privacy rights of individuals are widely respected, the privacy rights of social groups are less well developed. In the current development of OLSNs and computer forensics, the compromise of group privacy may lead to the violation of individual privacy. This paper examines the ethics regarding forensics examinations of online social networks. As with individual privacy, ethical tensions exist in social group privacy between the privacy rights that can be afforded to the membership, and the rights of institutions to detect and govern conspiracies to subversion, crimes, discrimination, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. McAfee, A., Brynjolfsson, E.: Big data: the management revolution. Harv. Bus. Rev. 90(10), 60–69 (2012)

    Google Scholar 

  2. Garfinkel, S.L.: Digital forensics research: the next 10 years. Digit. Invest. 7, S64–S73 (2010)

    Article  Google Scholar 

  3. Huber, M., Mulazzani, M. Leithner, M., Schrittwieser, S., Wondracek, G., Weippl, E.: Social snapshots: digital forensics for online social networks. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 113–122 (2011)

    Google Scholar 

  4. Zainudin, N.M., Merabti, M., Llewellyn-Jones, D.: A digital forensic investigation model and tool for online social networks. In: 12th Annual Postgraduate Symposium on Convergence of Telecommunications, Networking and Broadcasting (PGNet 2011), Liverpool, UK, pp. 27–28 (2011)

    Google Scholar 

  5. Cocking, D., van den Hoven, J., Timmermans, J.: Introduction: one thousand friends. Ethics Inf. Technol. 14(3), 179–184 (2012)

    Article  Google Scholar 

  6. Vallor, S.: Flourishing on Facebook: virtue friendship & new social media. Ethics Inf. Technol. 14(3), 185–199 (2012)

    Article  Google Scholar 

  7. Hull, G., Lipford, H.R., Latulipe, C.: Contextual gaps: privacy issues on Facebook. Ethics Inf. Technol. 13(4), 289–302 (2011)

    Article  Google Scholar 

  8. Zimmer, M.: “But the Data Is Already Public”: on the ethics of research in Facebook. Ethics Inf. Technol. 12(4), 313–325 (2010)

    Article  Google Scholar 

  9. Lusoli, W., Compañó, R.: From security versus privacy to identity: an emerging concept for policy design? Info J. Policy Regul. Strategy Telecommun. Inf. Media 12(6), 80–94 (2010)

    Google Scholar 

  10. Posey, C., Lowry, P.B., Roberts, T.L., Ellis, T.S.: Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities. Eur. J. Inf. Syst. 19(2), 181–195 (2010)

    Article  Google Scholar 

  11. Tow, W.N.-F.H., Dell, P., Venable, J.: Understanding information disclosure behaviour in australian Facebook users. J. Inf. Technol. 25(2), 126–136 (2010)

    Article  Google Scholar 

  12. Mishra, A.N., Anderson, C., Angst, C.M., Agarwal, R.: Electronic health records assimilation and physician identity evolution: an identity theory perspective. Inf. Syst. Res. 23(3), 738–760, 844, 846 (2012)

    Google Scholar 

  13. Kumar, V., Mirchandani, R.: Winning with data: social media-increasing the ROI of social media marketing. MIT Sloan Manag. Rev. 54(1), 55 (2012)

    Google Scholar 

  14. Dunn, B.J.: Best buy’s ceo on learning to love social media. Harv. Bus. Rev. 88, 43–48 (2010)

    Google Scholar 

  15. Edelman, D.C.: Branding in the digital age. Harv. Bus. Rev. 88(12), 14–18 (2010)

    Google Scholar 

  16. Court, D., Elzinga, D., Mulder, S., Vetvik, O.J.: The consumer decision journey. McKinsey Q. 2, 66–77 (2009)

    Google Scholar 

  17. Sarathy, R., Robertson, C.J.: Strategic and ethical considerations in managing digital privacy. J. Bus. Ethics 46(2), 111–126 (2003)

    Article  Google Scholar 

  18. Ashworth, L., Free, C.: Marketing dataveillance and digital privacy: using theories of justice to understand consumers’ online privacy concerns. J. Bus. Ethics 67(2), 107–123 (2006)

    Article  Google Scholar 

  19. Calluzzo, V.J., Cante, C.J.: Ethics in information technology and software use. J. Bus. Ethics 51(3), 301–312 (2004)

    Article  Google Scholar 

  20. Boyd, D.M., Ellison, N.B.: Social network sites: definition, history, and scholarship. IEEE Eng. Manag. Rev. 38(3), 16–31 (2010)

    Article  Google Scholar 

  21. Boyd, D., Ellison, N.: Social network sites: definition, history, and scholarship. J. Comput. Mediat. Commun. Electron. Ed. 13(1), 210–230 (2007)

    Article  Google Scholar 

  22. Kane, G.C., Fichman, R.G., Gallaugher, J., Glaser, J.: Community relations 2.0. Harv. Bus. Rev. 87(11), 45–50 (2009)

    Google Scholar 

  23. Boyd, D.: Friendster and publicly articulated social networking (2004)

    Google Scholar 

  24. Granovetter, M.: The strength of weak ties: a network theory revisited. Sociol. Theor. 1, 201–233 (1983)

    Article  Google Scholar 

  25. Gross, R., Acquisti, A., Heinz III, H.: Information revelation and privacy in online social networks. In: ACM Workshop on Privacy in the Electronic Society, pp. 71–80. ACM, New York (2005)

    Google Scholar 

  26. Merriam-Webster: Forensics. In: Merriam-Webster Online Dictionary (2010)

    Google Scholar 

  27. Casey, E.: Digital Evidence and Computer Crime—Forensic Science, Computers and the Internet, 2nd edn. Academic Press, San Diego (2004)

    Google Scholar 

  28. Endicott-Popovsky, B., Frincke, D.A., Taylor, C.A.: A theoretical framework for organizational network forensic readiness. J. Comput. 2(3), 1–11 (2007)

    Article  Google Scholar 

  29. Anson, S., Bunting, S.: Mastering Windows Network Forensics and Investigation. Sybex, New York (2007)

    Google Scholar 

  30. Fuentes, F., Kar, D.C.: Ethereal vs. Tcpdump: a comparative study on packet sniffing tools for educational purpose. J. Comput. Sci. Coll. 20(4), 169–176 (2005)

    Google Scholar 

  31. Conti, G., Dean, E.: Visual forensic analysis and reverse engineering of binary data. Black Hat USA (2008)

    Google Scholar 

  32. Kim, B.-K., Jang, J.-S., Chung, T.M.: Design of network security control system for cooperative intrusion detection. In: Chong, I. (ed.) ICOIN 2002, Part II. LNCS, vol. 2344, pp. 389–398. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  33. Haggerty, J., Taylor, M., Gresty, D.: Determining culpability in investigations of malicious e-Mail dissemination within the organisation. Presented at the Third International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA 2008 (2008)

    Google Scholar 

  34. Stolfo, S., Creamer, G., Hershkop, S.: A temporal based forensic analysis of electronic communication. In: Proceedings of the 2006 International Conference on Digital Government Research, pp. 23–24. ACM (2006)

    Google Scholar 

  35. Westin, A.F., Blom-Cooper, L.: Privacy and Freedom. Atheneum, New York (1970)

    Google Scholar 

  36. Thomson, J.J.: The right to privacy. Philos. Public Aff. 4(4), 295–314 (1975)

    Google Scholar 

  37. Inness, J.C.: Privacy, Intimacy, and Isolation. Oxford University Press, Oxford (1996)

    Book  Google Scholar 

  38. Borna, S., Sharma, D.: Considering privacy as a public good and its policy ramifications for business organizations. Bus. Soc. Rev. 116(3), 331–353 (2011)

    Article  Google Scholar 

  39. Regan, P.M.: Legislating Privacy: Technology, Social Values, and Public Policy. University of North Carolina Press, London (1995)

    Google Scholar 

  40. Volokh, E.: Personalization and privacy. Commun. ACM 43(8), 84–88 (2000). Association for Computing Machinery

    Article  Google Scholar 

  41. Post, R.C.: The social foundations of privacy: community and self in the common law tort. Calif. Law Rev. 77(5), 957–1010 (1989)

    Article  Google Scholar 

  42. Baumer, D.L., Earp, J.B., Poindexter, J.C.: Internet privacy law: a comparison between the United States and the European Union. Comput. Secur. 23(5), 400–412 (2004)

    Article  Google Scholar 

  43. Shapiro, B., Baker, C.R.: Information technology and the social construction of information privacy. J. Account. Public Policy 20(4), 295–322 (2001)

    Article  Google Scholar 

  44. Clemons, E.: The complex problem of monetizing virtual electronic social networks. Decis. Support Syst. 48(1), 46–56 (2009)

    Article  Google Scholar 

  45. Farhi, P.: The Twitter explosion. Am. J. Rev. 31(3), 26–31 (2009)

    MathSciNet  Google Scholar 

  46. Steinfield, C., Ellison, N.B., Lampe, C.: Social capital, self-esteem, and use of online social network sites: a longitudinal analysis. J. Appl. Dev. Psychol. 29(6), 434–445 (2008)

    Article  Google Scholar 

  47. Howard, B.: Analyzing online social networks. Commun. ACM 51(11), 14–16 (2008). Association for Computing Machinery

    Article  Google Scholar 

  48. Young, K.: Online social networking: an Australian perspective. Int. J. Emerg. Technol. Soc. 7(1), 39–57 (2009)

    Google Scholar 

  49. Rosenblum, D.: What anyone can know: the privacy risks of social networking sites. IEEE Secur. Priv. 5(3), 40–49 (2007)

    Article  Google Scholar 

  50. Young, S., Dutta, D., Dommety, G.: Extrapolating psychological insights from Facebook profiles: a study of religion and relationship status. CyberPsychol. Behav. 12(3), 347–350 (2009)

    Article  Google Scholar 

  51. Acar, A.S., Polonsky, M.: Online social networks and insights into marketing communications. J. Internet Commer. 6(4), 55–72 (2007)

    Article  Google Scholar 

  52. Silenzio, V.M.B., Duberstein, P.R., Tang, W., Lu, N., Tu, X., Homan, C.M.: Connecting the invisible dots: reaching lesbian, gay, and bisexual adolescents and young adults at risk for suicide through online social networks. Soc. Sci. Med. 69(3), 469–474 (2009)

    Article  Google Scholar 

  53. Warren, S.D., Brandeis, L.D.: The right to privacy. Harv. Law Rev. 4(5), 193–220 (1890)

    Article  Google Scholar 

  54. Bloustein, E.: Individual and Group Privacy. Transaction Publishers, Pallone (2002)

    Google Scholar 

  55. Dumsday, T.: Group privacy and government surveillance of religious services. Monist 91(1), 170–186 (2008)

    Article  Google Scholar 

  56. Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., Vance, A.: What levels of moral reasoning and values explain adherence to information security rules? An empirical study. Eur. J. Inf. Syst. 18(2), 126–139 (2009)

    Article  Google Scholar 

  57. Zwass, V.: Ethical issues in information systems. In: Drake, M.A. (ed.) Encyclopedia of Library and Information Science, pp. 1054–1062. Marcel Dekker, New York (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jongwoo Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Kim, J., Baskerville, R., Ding, Y. (2016). The Ethics of Online Social Network Forensics. In: Sugumaran, V., Yoon, V., Shaw, M. (eds) E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life. WEB 2015. Lecture Notes in Business Information Processing, vol 258. Springer, Cham. https://doi.org/10.1007/978-3-319-45408-5_9

Download citation

Publish with us

Policies and ethics