Skip to main content

Deviance in Social Media

  • Chapter
  • First Online:

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

Abstract

In this chapter, we explain what we mean by deviance in social media . We give examples of four types of deviance as observed on social media, viz., deviant acts , deviant events , deviant tactics , and deviant groups . We provide historical information, definitions, and examples that will be studied/explained in more details throughout the book. This chapter would help the readers understand the scope of the problem of deviance in social media, familiarize with definitions and examples of deviant events, groups, acts, and tactics, and peek at the social science theories that can explain such emergent deviant behaviors on social media.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    A very well-known example of social movements that succeeded due to the role of social media—as it acted as a vehicle for change in many countries—was during the so-called the “Arab Spring.” When Mr. Mohamed Bouazizi, a 26-year-old Tunisian fruit vendor set himself on fire, on December 18, 2010, in a protest in front of a government building. This led to many protests and grievance that caused President Zine El Abidine Ben Ali to step down. That act was captured on camera and disseminated on social media, which encouraged many other countries to protest against the authoritarian regimes in the Middle-East [5].

  2. 2.

    Parkour is the manifestation in which traceurs (parkour practitioners) jump between distance rooftops, climb vertical walls, and continuously search for new ways to challenge the rules of gravity. Parkour history is more than 100 years as Michael Atkinson states in his article “Parkour, Anarcho-Environmentalism, and Poiesis” [6]. This practice goes back to a style called Hebertism that emerged at the beginning of the twentieth century. The practice contains variety of obstacles and landscapes usually in the wooded setting “as an unfettered animal” [7]. The first parkour was formed originally in Paris and since then it emerged all over the world, from Canada and USA to Russia and the Philippines.

  3. 3.

    The dark web constitutes only one part of what is called the invisible web [12], hidden web [13], or deep web [14]. The dark web websites use anonymity tools such as the “packet based routing,” i.e., the Invisible Internet Project (I2P) and the “circuit based routing,” i.e., The Onion Router (TOR) to conceal their IP address [15]. The dark web is known for having markets that sell various illegal products such as drugs, guns, and even child pornography. In addition to having these types of markets, many people use the dark web because it provides protection against censorship or surveillance [15]. The invisible, hidden, or deep web is a part of the World Wide Web that is not indexed by any standard search engine. The “surface web” is the opposite of the “deep web,” i.e., the part of the World Wide Web that is indexed by standard search engines [16].

  4. 4.

    Iraq Prime Minister Declares Victory Over ISIS. The NY Times, December 9, 2017. Available at https://goo.gl/AkUJkT.

  5. 5.

    Westoxification is the state of being inebriated with Western culture and ideas.

  6. 6.

    U.S. helping Ukraine investigate power grid hack. Reuters. January 12, 2016. Available at http://reut.rs/1PqNAYG.

  7. 7.

    Anonymous is hacking Israeli Web sites. The Washington Post. November 17, 2012. Available at https://www.washingtonpost.com/news/worldviews/wp/2012/11/17/anonymous-is-hacking-israeli-web-sites/.

  8. 8.

    Anonymous uses Twitter to highlight humanitarian crisis in Burma. The Verge. March 26, 2013. Available at https://www.theverge.com/2013/3/26/4148908/anonymous-oprohingya-burma-myanmar-humanitarian-crisis-campaign.

  9. 9.

    #OpNimr: Anonymous fight to stop execution of Saudi youth. Al-Jazeera, September 28, 2015. Available at http://stream.aljazeera.com/story/201509282137-0025017.

  10. 10.

    Anonymous: CIA, Interpol websites “tango down.” Reuters. 2012.

  11. 11.

    Anonymous launched #OpBeast against animal cruelty and depravity. TechWorm. 2015.

  12. 12.

    Woebot is a chatbot that helps people track their mood and give them therapeutic advices, available at https://woebot.io.

  13. 13.

    Supra-dyadic relations are the relations that involve more than two nodes, i.e., a set of nodes such as food webs [74].

  14. 14.

    Hypergraph is a graph in which each edge/relation is called a hyperedge and it connects more than two nodes that can be of different types.

References

  1. Data Never Sleeps 5.0 | Domo. Available: https://www.domo.com/learn/data-never-sleeps-5?aid=ogsm072517_1&sf100871281=1

  2. B. Marr, How Much Data Do We Create Every Day? The Mind-Blowing Stats Everyone Should Read. Available: https://tinyurl.com/yclva46f

  3. N. Agarwal, M. Lim, and R.T. Wigand, Online Collective Action: Dynamics of the Crowd in Social Media (Springer, Vienna, 2014)

    Book  Google Scholar 

  4. N. Agarwal et al., Raising and rising voices in social media: a novel methodological approach in studying cyber-collective movements. Bus. Inf. Technol. Syst. Eng. 4(3), 113–126 (2012)

    Article  Google Scholar 

  5. N. Staff, The Arab Spring: A year of revolution, in National Public Radio (NPR) (Dec. 2011). Available: http://n.pr/1EjLbeQ

  6. M. Atkinson, Parkour, anarcho-environmentalism, and poiesis. J. Sport Soc. Issues 33(2), 169–194 (2009)

    Article  MathSciNet  Google Scholar 

  7. Y.S. Mohilever, Taking over the city: developing a cybernetic geographical imagination-flash mobs & parkour, in Theatre Space After 20th Century (2012) p. 188

    Google Scholar 

  8. “ EEAS - European External Action Service - European Commission. Available: https://eeas.europa.eu/headquarters/headquarters-homepage_en

  9. EU vs Disinformation - EU vs Disinformation. Available: https://euvsdisinfo.eu/

  10. Definition of Deviance in English by Oxford Dictionaries. Available: https://en.oxforddictionaries.com/definition/deviance

  11. Deviance. Available: https://www.thefreedictionary.com/deviance

  12. J. Devine, F. Egger-Sider, Beyond Google: the invisible web in the academic library. J. Acad. Librariansh. 30(4), 265–269 (2004)

    Article  Google Scholar 

  13. S. Raghavan, H. Garcia-Molina, Crawling the Hidden Web, Stanford, Tech. Rep. (2000)

    Google Scholar 

  14. N. Hamilton, The mechanics of a deep net metasearch engine, in WWW (Posters) (2003)

    Google Scholar 

  15. A. Greenberg, Hacker Lexicon: What is The Dark Web? (Nov. 2014). Available: https://www.wired.com/2014/11/hacker-lexicon-whats-dark-web/

  16. M.K. Bergman, White paper: the deep web: surfacing hidden value. J. Electron. Publ. 7(1), (2001)

    Google Scholar 

  17. S. Al-khateeb, M.N. Hussain, N. Agarwal, Social cyber forensics approach to study twitter’s and blogs’ influence on propaganda campaigns, in International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation (Springer, Berlin, 2017), pp. 108–113.

    Google Scholar 

  18. S. Al-khateeb, K.J. Conlan, N. Agarwal, I.Baggili, F. Breitinger, Exploring Deviant Hacker Networks (DHN) on social media platforms. J. Digit. Forensic Secur. Law 11(2), 7–20. Available: http://bit.ly/2nKwNJE

  19. D. Sindelar, The kremlin’s troll army: Moscow is financing legions of pro-Russia Internet commenters. But how much do they matter? The Atlantic (Aug. 2014). Available: http://www.theatlantic.com/international/archive/2014/08/the-kremlins-troll-army/375932/

  20. K. Vick, Iraq’s Second Largest City Falls to Extremists. Available: http://ti.me/1ElCjnV

  21. T. Arango, Key Iraqi City Falls to Isis as Last of Security Forces Flee. Available: http://nyti.ms/1Tm4SOc

  22. T. A. et al., How ISIS Works (2014). Available: http://nyti.ms/1h0spmR

  23. M. Townsend, T. Helm, Jihad in a Social Media Age: How Can the West Win an Online War?. Available: http://bit.ly/1wqeb4b

  24. J. Berger, How ISIS Succeeds on Social Media Where #StopKony Fails Even with fewer clicks. The Atlantic (March 16, 2015)

    Google Scholar 

  25. S. Al-khateeb, N. Agarwal, Analyzing deviant cyber Flash Mobs of ISIL on twitter, in Social Computing, Behavioral-Cultural Modeling, and Prediction (Springer, Berlin, 2015), pp. 251–257.

    Google Scholar 

  26. C. Staff. ISIS Video Appears to Show Beheadings of Egyptian Coptic Christians in Libya. Available: http://www.cnn.com/2015/02/15/middleeast/isis-video-beheadings-christians/

  27. T.n. editorial. ISIL Executes an Israeli Arab After Accusing him of Been an Israeli Spy. Available: http://www.tv7israelnews.com/isil-executes-an-israeli-arab-after-accusing-him-of-been-an-israeli-spy/

  28. K. Shaheen. ISIS Video Purports to Show Massacre of Two Groups of Ethiopian Christians. Available: https://www.theguardian.com/world/2015/apr/19/isis-video-purports-to-show-massacre-of-two-groups-of-ethiopian-christians

  29. C. News, ISIS recruits fighters through powerful online campaign, in http://cbsn.ws/1qKH8mE. Last checked: July 1, 2015, August 29, 2014

  30. D. Quiggle, The ISIS beheading narrative. Small Wars J. (Feb 26, 2015). Accessed 12 Mar 2019. Available: https://smallwarsjournal.com/jrnl/art/the-isis-beheading-narrative

  31. R. Janes, Losing Our Heads: Beheadings in Literature and Culture (NYU, New York, 2005)

    Google Scholar 

  32. T.J. Holt, Examining the forces shaping cybercrime markets online. Soc. Sci. Comput. Rev. 31(2), 165–177 (2013). Available: http://ssc.sagepub.com/content/31/2/165.short

    Article  Google Scholar 

  33. T.J. Holt, Exploring the social organisation and structure of stolen data markets. Glob. Crime 14(2–3), 155–174 (2013). Available: http://www.tandfonline.com/doi/abs/10.1080/17440572.2013.787925

    Article  Google Scholar 

  34. E. Moreau, Here’s What you Need to Know About Internet Trolling. Available: https://www.lifewire.com/what-is-internet-trolling-3485891

  35. Z. Davis, Definition of: Trolling (2009). Available: http://www.pcmag.com/encyclopedia/term/53181/trolling#

  36. I. University, What is a Troll? (2013). Available: https://kb.iu.edu/d/afhc

  37. M. Allen, Kremlin’s ‘Social Media Takeover’: Cold War Tactics Fuel Ukraine Crisis (Mar. 2014). Available: http://www.demdigest.net/blog/kremlins-social-media-takeover-cold-war-tactics-fuel-ukraine-crisis/

  38. Oxford-Dictionary, Definition of flash mob from Oxford English dictionaries online, in Oxford English Dictionaries. https://en.oxforddictionaries.com/definition/us/flash_mob. Last checked 19 Dec 2016

  39. C. Kirkland, 12 Great Examples of Flash Mobs (Dec. 2011). Available: http://econsultancy.com/blog/8548-12-great-examples-of-flash-mobs?utm_campaign=bloglikes&utm_medium=socialnetwork&utm_source=facebook

  40. G. Ackerman, D. Blair, G. Butler, H. Cabayan, R. Damron, J.D. Keefe, T. King, D. Hallstrom, S. Helfstein, D. Hulsey, et al., The New Face of Transnational Crime Organizations (TCOs): A Geopolitical Perspective and Implications to US National Security (Calhoun Institutional Archive of the Naval Postgraduate School, Mar. 2013). https://calhoun.nps.edu/public/handle/10945/30346.

  41. B. Holbrook, LBPD Prepared For Potential Bash Mob Event (Jul. 2013), p. 00000. Available: http://www.everythinglongbeach.com/lbpd-prepared-for-potential-bash-mob-event/

  42. S. Al-khateeb, N. Agarwal, Analyzing flash mobs in cybernetic space and the imminent security threats a collective action based theoretical perspective on emerging sociotechnical behaviors, in 2015 AAAI Spring Symposium Series.

    Google Scholar 

  43. Cyveillance, Bashmobs: Using Social Media to Organize Disruptive Activity. Available: https://tinyurl.com/y9rlzrah

  44. J.S. Coleman, The Mathematics of Collective Action. (New York, Routledge, July 12, 2017). 1st edn., 2005. 246p, eISBN 9781351479714. Accessed 12 Mar 2019. Available: https://www.taylorfrancis.com/books/9781351479714; https://doi.org/10.4324/9781315133065

  45. B. Klandermans, J.M. Sabucedo, M. Rodriguez, M. De Weerd, Identity processes in collective action participation: Farmers’ Identity and farmers’ protest in the Netherlands and Spain. Polit. Psychol. 23(2) 235–251. Available: http://onlinelibrary.wiley.com/doi/10.1111/0162-895X.00280/abstract

  46. A. Melucci, Challenging Codes: Collective Action in the Information Age (Cambridge University, Cambridge, 1996), p. 00017

    Book  Google Scholar 

  47. J.S. Coleman, Foundations for a Theory of Collective Decisions, vol. 71(6). Available: https://tinyurl.com/y7cugwp7

  48. V. Labatut, N. Dugue, A. Perez, Identifying the Community Roles of Social Capitalists in the Twitter Network, p. 8. Available: http://arxiv.org/abs/1406.6611

  49. M. Olson, The Logic of Collective Action: Public Goods and the Theory of Groups (Harvard University, Cambridge, 1977)

    Google Scholar 

  50. R.H. Coase, The nature of the firm. Economica 4(16), 386–405 (1937)

    Article  Google Scholar 

  51. P.G. Warr, Pareto optimal redistribution and private charity. J. Public Econ. 19(1), 131–138 (1982)

    Article  Google Scholar 

  52. P.G. Warr, The private provision of a public good is independent of the distribution of income. Econ. Lett. 13(2), 207–211 (1983)

    Article  Google Scholar 

  53. T. Sandler, J.T. Tschirhart, The economic theory of clubs: an evolutionary survey. J. Econ. Lit. Am. Econ. Assoc. 18(4), 1481–1521 (1980)

    Google Scholar 

  54. A. Rubinstein, Equilibrium in supergames with the overtaking criterion. J. Econ. Theory 21(1), 1–9 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  55. G.S. Becker, The Economic Approach to Human Behavior (University of Chicago, Chicago, 1976)

    Book  Google Scholar 

  56. M.N. Zald, J.D. McCarthy, The Dynamics of Social Movements: Resource Mobilization, Social Control, and Tactics (Winthrop, Cambridge, 1979)

    Google Scholar 

  57. H.R. Kerbo, Movements of crisis and movements of affluence a critique of deprivation and resource mobilization theories. J. Confl. Resolut. 26(4) 645–663 (1982)

    Article  Google Scholar 

  58. M.M. Ferree, in Frontiers in Social Movement Theory, ed. by A.D. Morris, C.M. Mueller (Yale University, Yale, 1992)(2), pp. 29–52.

    Google Scholar 

  59. D.A. Snow, et al., Frame alignment processes, micromobilization, and movement participation. Am. Sociol. Rev. 51(4) 464–481 (1986)

    Article  Google Scholar 

  60. H. Johnston, E. Larana, J.R. Gusfield, Identities, grievances, and new social movements, in New Social Movements: From Ideology to Identity, vol. 3, (Temple University Press, Philadelphia, PA, 1994), pp. 3–35. Available: https://www.jstor.org/stable/j.ctt14bst9g

    Google Scholar 

  61. S. Al-khateeb, N. Agarwal, Developing a conceptual framework for modeling deviant cyber flash mob: A socio-computational approach leveraging hypergraph constructs. J. Digit. Forensic Secur. Law 9(2), 113–128 (2014)

    Google Scholar 

  62. A. Cheng, M. Evans, Inside Twitter an In-Depth Look at the 5% of Most Active Users. Available: http://sysomos.com/insidetwitter/mostactiveusers

  63. Types of Bots: An Overview of Chatbot Diversity |botnerds.com. Available: http://botnerds.com/types-of-bots/

  64. R.A. Rodríguez-Gómez, G. Maciá-Fernández, P. García-Teodoro, Survey and taxonomy of botnet research through life-cycle. ACM Comput. Surv. 45(4), 45. Available: http://dl.acm.org/citation.cfm?id=2501659

  65. A. Karasaridis, B. Rexroad, D. Hoeflin, Wide-scale botnet detection and characterization, in Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, Cambridge MA, vol. 7. . Available: http://bit.ly/2n4fmXk

  66. S. Bono, D. Caselden, G. Landau, C. Miller, Reducing the attack surface in massively multiplayer online role-playing games. IEEE Secur. Priv. 7(3) (2009)

    Google Scholar 

  67. N. Abokhodair, D. Yoo, D.W. McDonald, Dissecting a social botnet: Growth, content and influence in twitter, in Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (ACM, New York, 2015), pp. 839–851. Available: http://dl.acm.org/citation.cfm?id=2675208

    Google Scholar 

  68. P. Kulp, Facebook Admits to Nearly as Many Fake or Clone Accounts as the U.S. Population 2017. Available: https://goo.gl/HXUdc8

  69. M. Newberg, Nearly 48 Million Twitter Accounts Could be Bots, Says Study (Mar. 2017). Available: https://www.cnbc.com/2017/03/10/nearly-48-million-twitter-accounts-could-be-bots-says-study.html

  70. Y. Boshmaf, I. Muslukhov, K. Beznosov, M. Ripeanu, Key challenges in defending against malicious socialbots, in Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats (USENIX Association, Berkeley, 2012), pp. 12–12. Available: https://www.usenix.org/system/files/conference/leet12/leet12-final10.pdf

    Google Scholar 

  71. A. Melucci, Nomads of the Present: Social Movements and Individual Needs in Contemporary Society (Temple University, Philadelphia, 1989) p. 02740

    Google Scholar 

  72. L. Maheu, Social Movements and Social Classes: The Future of Collective Action. SAGE Studies in International Sociology, vol. 46 (SAGE Publications Ltd, London, 1995), p. 00620. Available: http://bit.ly/2nKwsqC

    Google Scholar 

  73. L. Tang, H. Liu, Toward predicting collective behavior via social dimension extraction. IEEE Intell. Syst. 25(4), 19–25 (2010). Available: http://bit.ly/2n4mT8w

    Article  Google Scholar 

  74. T. Shafie, D. Schoch, J. Mans, C. Hofman, U. Brandes, Hypergraph representations: a study of Carib attacks on colonial forces, 1509–1700. J. Hist. Netw. Res. 1(1), 52–70 (2017)

    Google Scholar 

  75. P. Bonacich, A. Cody Holdren, M. Johnston, Hyper-edges and multidimensional centrality. Soc. Netw. 26(3), 189–203 (2004). Available: http://linkinghub.elsevier.com/retrieve/pii/S0378873304000024

    Article  Google Scholar 

  76. E. Estrada, J.A. Rodriguez-Velazquez, Subgraph centrality and clustering in complex hyper-networks. Physica A Stat. Mech. Appl. 364, 581–594 (2006)

    Article  MathSciNet  Google Scholar 

  77. P. Bonacich, et al., Hyper-edges and multidimensional centrality. Soc. Netw. 26(3), 189–203 (2004)

    Article  MathSciNet  Google Scholar 

  78. T. Sandler, Collective Action: Theory and Applications (University of Michigan, Ann Arbor, 1992)

    Google Scholar 

  79. N.W. Biggart, Readings in Economic Sociology, vol. 4 (Blackwell, Chichester, 2002)

    Book  Google Scholar 

  80. N.B. Ellison, C. Steinfield, C. Lampe, The benefits of Facebook “friends:” social capital and college students’ use of online social network sites. J. Comput. Mediat. Commun. 12(4), 1143–1168. Available: http://doi.wiley.com/10.1111/j.1083-6101.2007.00367.x

  81. B. Klandermans et al., Identity processes in collective action participation: farmers’ identity and farmers’ protest in the Netherlands and Spain. Polit. Psychol. 23(2), 235–251 (2002)

    Article  Google Scholar 

  82. A. Melucci, Challenging Codes: Collective Action in the Information Age (Cambridge University, Cambridge, 1996)

    Book  Google Scholar 

  83. C. Berge, E. Minieka, Graphs and Hypergraphs, vol. 7 (North-Holland, Amsterdam, 1973)

    Google Scholar 

  84. P. Ludlow, What is a ‘Hacktivist’?. Available: http://opinionator.blogs.nytimes.com/2013/01/13/what-is-a-hacktivist/

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Al-khateeb, S., Agarwal, N. (2019). Deviance in Social Media. In: Deviance in Social Media and Social Cyber Forensics. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-030-13690-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-13690-1_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-13689-5

  • Online ISBN: 978-3-030-13690-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics