Abstract
Online social networks (OLSNs) are electronically-based social milieux where individuals gather virtually to socialize. The behavior and characteristics of these networks can provide evidence relevant for detecting and prosecuting policy violations, crimes, terrorist activities, subversive political movements, etc. Some existing forensics methods and tools are useful for such investigations. Further, forensics researchers are developing new methods and tools specifically for investigating and examining online social networks. While the privacy rights of individuals are widely respected, the privacy rights of social groups are less well developed. In the current development of OLSNs and computer forensics, the compromise of group privacy may lead to the violation of individual privacy. This paper examines the ethics regarding forensics examinations of online social networks. As with individual privacy, ethical tensions exist in social group privacy between the privacy rights that can be afforded to the membership, and the rights of institutions to detect and govern conspiracies to subversion, crimes, discrimination, etc.
References
McAfee, A., Brynjolfsson, E.: Big data: the management revolution. Harv. Bus. Rev. 90(10), 60–69 (2012)
Garfinkel, S.L.: Digital forensics research: the next 10 years. Digit. Invest. 7, S64–S73 (2010)
Huber, M., Mulazzani, M. Leithner, M., Schrittwieser, S., Wondracek, G., Weippl, E.: Social snapshots: digital forensics for online social networks. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 113–122 (2011)
Zainudin, N.M., Merabti, M., Llewellyn-Jones, D.: A digital forensic investigation model and tool for online social networks. In: 12th Annual Postgraduate Symposium on Convergence of Telecommunications, Networking and Broadcasting (PGNet 2011), Liverpool, UK, pp. 27–28 (2011)
Cocking, D., van den Hoven, J., Timmermans, J.: Introduction: one thousand friends. Ethics Inf. Technol. 14(3), 179–184 (2012)
Vallor, S.: Flourishing on Facebook: virtue friendship & new social media. Ethics Inf. Technol. 14(3), 185–199 (2012)
Hull, G., Lipford, H.R., Latulipe, C.: Contextual gaps: privacy issues on Facebook. Ethics Inf. Technol. 13(4), 289–302 (2011)
Zimmer, M.: “But the Data Is Already Public”: on the ethics of research in Facebook. Ethics Inf. Technol. 12(4), 313–325 (2010)
Lusoli, W., Compañó, R.: From security versus privacy to identity: an emerging concept for policy design? Info J. Policy Regul. Strategy Telecommun. Inf. Media 12(6), 80–94 (2010)
Posey, C., Lowry, P.B., Roberts, T.L., Ellis, T.S.: Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities. Eur. J. Inf. Syst. 19(2), 181–195 (2010)
Tow, W.N.-F.H., Dell, P., Venable, J.: Understanding information disclosure behaviour in australian Facebook users. J. Inf. Technol. 25(2), 126–136 (2010)
Mishra, A.N., Anderson, C., Angst, C.M., Agarwal, R.: Electronic health records assimilation and physician identity evolution: an identity theory perspective. Inf. Syst. Res. 23(3), 738–760, 844, 846 (2012)
Kumar, V., Mirchandani, R.: Winning with data: social media-increasing the ROI of social media marketing. MIT Sloan Manag. Rev. 54(1), 55 (2012)
Dunn, B.J.: Best buy’s ceo on learning to love social media. Harv. Bus. Rev. 88, 43–48 (2010)
Edelman, D.C.: Branding in the digital age. Harv. Bus. Rev. 88(12), 14–18 (2010)
Court, D., Elzinga, D., Mulder, S., Vetvik, O.J.: The consumer decision journey. McKinsey Q. 2, 66–77 (2009)
Sarathy, R., Robertson, C.J.: Strategic and ethical considerations in managing digital privacy. J. Bus. Ethics 46(2), 111–126 (2003)
Ashworth, L., Free, C.: Marketing dataveillance and digital privacy: using theories of justice to understand consumers’ online privacy concerns. J. Bus. Ethics 67(2), 107–123 (2006)
Calluzzo, V.J., Cante, C.J.: Ethics in information technology and software use. J. Bus. Ethics 51(3), 301–312 (2004)
Boyd, D.M., Ellison, N.B.: Social network sites: definition, history, and scholarship. IEEE Eng. Manag. Rev. 38(3), 16–31 (2010)
Boyd, D., Ellison, N.: Social network sites: definition, history, and scholarship. J. Comput. Mediat. Commun. Electron. Ed. 13(1), 210–230 (2007)
Kane, G.C., Fichman, R.G., Gallaugher, J., Glaser, J.: Community relations 2.0. Harv. Bus. Rev. 87(11), 45–50 (2009)
Boyd, D.: Friendster and publicly articulated social networking (2004)
Granovetter, M.: The strength of weak ties: a network theory revisited. Sociol. Theor. 1, 201–233 (1983)
Gross, R., Acquisti, A., Heinz III, H.: Information revelation and privacy in online social networks. In: ACM Workshop on Privacy in the Electronic Society, pp. 71–80. ACM, New York (2005)
Merriam-Webster: Forensics. In: Merriam-Webster Online Dictionary (2010)
Casey, E.: Digital Evidence and Computer Crime—Forensic Science, Computers and the Internet, 2nd edn. Academic Press, San Diego (2004)
Endicott-Popovsky, B., Frincke, D.A., Taylor, C.A.: A theoretical framework for organizational network forensic readiness. J. Comput. 2(3), 1–11 (2007)
Anson, S., Bunting, S.: Mastering Windows Network Forensics and Investigation. Sybex, New York (2007)
Fuentes, F., Kar, D.C.: Ethereal vs. Tcpdump: a comparative study on packet sniffing tools for educational purpose. J. Comput. Sci. Coll. 20(4), 169–176 (2005)
Conti, G., Dean, E.: Visual forensic analysis and reverse engineering of binary data. Black Hat USA (2008)
Kim, B.-K., Jang, J.-S., Chung, T.M.: Design of network security control system for cooperative intrusion detection. In: Chong, I. (ed.) ICOIN 2002, Part II. LNCS, vol. 2344, pp. 389–398. Springer, Heidelberg (2002)
Haggerty, J., Taylor, M., Gresty, D.: Determining culpability in investigations of malicious e-Mail dissemination within the organisation. Presented at the Third International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA 2008 (2008)
Stolfo, S., Creamer, G., Hershkop, S.: A temporal based forensic analysis of electronic communication. In: Proceedings of the 2006 International Conference on Digital Government Research, pp. 23–24. ACM (2006)
Westin, A.F., Blom-Cooper, L.: Privacy and Freedom. Atheneum, New York (1970)
Thomson, J.J.: The right to privacy. Philos. Public Aff. 4(4), 295–314 (1975)
Inness, J.C.: Privacy, Intimacy, and Isolation. Oxford University Press, Oxford (1996)
Borna, S., Sharma, D.: Considering privacy as a public good and its policy ramifications for business organizations. Bus. Soc. Rev. 116(3), 331–353 (2011)
Regan, P.M.: Legislating Privacy: Technology, Social Values, and Public Policy. University of North Carolina Press, London (1995)
Volokh, E.: Personalization and privacy. Commun. ACM 43(8), 84–88 (2000). Association for Computing Machinery
Post, R.C.: The social foundations of privacy: community and self in the common law tort. Calif. Law Rev. 77(5), 957–1010 (1989)
Baumer, D.L., Earp, J.B., Poindexter, J.C.: Internet privacy law: a comparison between the United States and the European Union. Comput. Secur. 23(5), 400–412 (2004)
Shapiro, B., Baker, C.R.: Information technology and the social construction of information privacy. J. Account. Public Policy 20(4), 295–322 (2001)
Clemons, E.: The complex problem of monetizing virtual electronic social networks. Decis. Support Syst. 48(1), 46–56 (2009)
Farhi, P.: The Twitter explosion. Am. J. Rev. 31(3), 26–31 (2009)
Steinfield, C., Ellison, N.B., Lampe, C.: Social capital, self-esteem, and use of online social network sites: a longitudinal analysis. J. Appl. Dev. Psychol. 29(6), 434–445 (2008)
Howard, B.: Analyzing online social networks. Commun. ACM 51(11), 14–16 (2008). Association for Computing Machinery
Young, K.: Online social networking: an Australian perspective. Int. J. Emerg. Technol. Soc. 7(1), 39–57 (2009)
Rosenblum, D.: What anyone can know: the privacy risks of social networking sites. IEEE Secur. Priv. 5(3), 40–49 (2007)
Young, S., Dutta, D., Dommety, G.: Extrapolating psychological insights from Facebook profiles: a study of religion and relationship status. CyberPsychol. Behav. 12(3), 347–350 (2009)
Acar, A.S., Polonsky, M.: Online social networks and insights into marketing communications. J. Internet Commer. 6(4), 55–72 (2007)
Silenzio, V.M.B., Duberstein, P.R., Tang, W., Lu, N., Tu, X., Homan, C.M.: Connecting the invisible dots: reaching lesbian, gay, and bisexual adolescents and young adults at risk for suicide through online social networks. Soc. Sci. Med. 69(3), 469–474 (2009)
Warren, S.D., Brandeis, L.D.: The right to privacy. Harv. Law Rev. 4(5), 193–220 (1890)
Bloustein, E.: Individual and Group Privacy. Transaction Publishers, Pallone (2002)
Dumsday, T.: Group privacy and government surveillance of religious services. Monist 91(1), 170–186 (2008)
Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., Vance, A.: What levels of moral reasoning and values explain adherence to information security rules? An empirical study. Eur. J. Inf. Syst. 18(2), 126–139 (2009)
Zwass, V.: Ethical issues in information systems. In: Drake, M.A. (ed.) Encyclopedia of Library and Information Science, pp. 1054–1062. Marcel Dekker, New York (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Kim, J., Baskerville, R., Ding, Y. (2016). The Ethics of Online Social Network Forensics. In: Sugumaran, V., Yoon, V., Shaw, M. (eds) E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life. WEB 2015. Lecture Notes in Business Information Processing, vol 258. Springer, Cham. https://doi.org/10.1007/978-3-319-45408-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-45408-5_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-45407-8
Online ISBN: 978-3-319-45408-5
eBook Packages: Business and ManagementBusiness and Management (R0)