Abstract
In this chapter, we explain what we mean by deviance in social media . We give examples of four types of deviance as observed on social media, viz., deviant acts , deviant events , deviant tactics , and deviant groups . We provide historical information, definitions, and examples that will be studied/explained in more details throughout the book. This chapter would help the readers understand the scope of the problem of deviance in social media, familiarize with definitions and examples of deviant events, groups, acts, and tactics, and peek at the social science theories that can explain such emergent deviant behaviors on social media.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
A very well-known example of social movements that succeeded due to the role of social media—as it acted as a vehicle for change in many countries—was during the so-called the “Arab Spring.” When Mr. Mohamed Bouazizi, a 26-year-old Tunisian fruit vendor set himself on fire, on December 18, 2010, in a protest in front of a government building. This led to many protests and grievance that caused President Zine El Abidine Ben Ali to step down. That act was captured on camera and disseminated on social media, which encouraged many other countries to protest against the authoritarian regimes in the Middle-East [5].
- 2.
Parkour is the manifestation in which traceurs (parkour practitioners) jump between distance rooftops, climb vertical walls, and continuously search for new ways to challenge the rules of gravity. Parkour history is more than 100 years as Michael Atkinson states in his article “Parkour, Anarcho-Environmentalism, and Poiesis” [6]. This practice goes back to a style called Hebertism that emerged at the beginning of the twentieth century. The practice contains variety of obstacles and landscapes usually in the wooded setting “as an unfettered animal” [7]. The first parkour was formed originally in Paris and since then it emerged all over the world, from Canada and USA to Russia and the Philippines.
- 3.
The dark web constitutes only one part of what is called the invisible web [12], hidden web [13], or deep web [14]. The dark web websites use anonymity tools such as the “packet based routing,” i.e., the Invisible Internet Project (I2P) and the “circuit based routing,” i.e., The Onion Router (TOR) to conceal their IP address [15]. The dark web is known for having markets that sell various illegal products such as drugs, guns, and even child pornography. In addition to having these types of markets, many people use the dark web because it provides protection against censorship or surveillance [15]. The invisible, hidden, or deep web is a part of the World Wide Web that is not indexed by any standard search engine. The “surface web” is the opposite of the “deep web,” i.e., the part of the World Wide Web that is indexed by standard search engines [16].
- 4.
Iraq Prime Minister Declares Victory Over ISIS. The NY Times, December 9, 2017. Available at https://goo.gl/AkUJkT.
- 5.
Westoxification is the state of being inebriated with Western culture and ideas.
- 6.
U.S. helping Ukraine investigate power grid hack. Reuters. January 12, 2016. Available at http://reut.rs/1PqNAYG.
- 7.
Anonymous is hacking Israeli Web sites. The Washington Post. November 17, 2012. Available at https://www.washingtonpost.com/news/worldviews/wp/2012/11/17/anonymous-is-hacking-israeli-web-sites/.
- 8.
Anonymous uses Twitter to highlight humanitarian crisis in Burma. The Verge. March 26, 2013. Available at https://www.theverge.com/2013/3/26/4148908/anonymous-oprohingya-burma-myanmar-humanitarian-crisis-campaign.
- 9.
#OpNimr: Anonymous fight to stop execution of Saudi youth. Al-Jazeera, September 28, 2015. Available at http://stream.aljazeera.com/story/201509282137-0025017.
- 10.
Anonymous: CIA, Interpol websites “tango down.” Reuters. 2012.
- 11.
Anonymous launched #OpBeast against animal cruelty and depravity. TechWorm. 2015.
- 12.
Woebot is a chatbot that helps people track their mood and give them therapeutic advices, available at https://woebot.io.
- 13.
Supra-dyadic relations are the relations that involve more than two nodes, i.e., a set of nodes such as food webs [74].
- 14.
Hypergraph is a graph in which each edge/relation is called a hyperedge and it connects more than two nodes that can be of different types.
References
Data Never Sleeps 5.0 | Domo. Available: https://www.domo.com/learn/data-never-sleeps-5?aid=ogsm072517_1&sf100871281=1
B. Marr, How Much Data Do We Create Every Day? The Mind-Blowing Stats Everyone Should Read. Available: https://tinyurl.com/yclva46f
N. Agarwal, M. Lim, and R.T. Wigand, Online Collective Action: Dynamics of the Crowd in Social Media (Springer, Vienna, 2014)
N. Agarwal et al., Raising and rising voices in social media: a novel methodological approach in studying cyber-collective movements. Bus. Inf. Technol. Syst. Eng. 4(3), 113–126 (2012)
N. Staff, The Arab Spring: A year of revolution, in National Public Radio (NPR) (Dec. 2011). Available: http://n.pr/1EjLbeQ
M. Atkinson, Parkour, anarcho-environmentalism, and poiesis. J. Sport Soc. Issues 33(2), 169–194 (2009)
Y.S. Mohilever, Taking over the city: developing a cybernetic geographical imagination-flash mobs & parkour, in Theatre Space After 20th Century (2012) p. 188
“ EEAS - European External Action Service - European Commission. Available: https://eeas.europa.eu/headquarters/headquarters-homepage_en
EU vs Disinformation - EU vs Disinformation. Available: https://euvsdisinfo.eu/
Definition of Deviance in English by Oxford Dictionaries. Available: https://en.oxforddictionaries.com/definition/deviance
Deviance. Available: https://www.thefreedictionary.com/deviance
J. Devine, F. Egger-Sider, Beyond Google: the invisible web in the academic library. J. Acad. Librariansh. 30(4), 265–269 (2004)
S. Raghavan, H. Garcia-Molina, Crawling the Hidden Web, Stanford, Tech. Rep. (2000)
N. Hamilton, The mechanics of a deep net metasearch engine, in WWW (Posters) (2003)
A. Greenberg, Hacker Lexicon: What is The Dark Web? (Nov. 2014). Available: https://www.wired.com/2014/11/hacker-lexicon-whats-dark-web/
M.K. Bergman, White paper: the deep web: surfacing hidden value. J. Electron. Publ. 7(1), (2001)
S. Al-khateeb, M.N. Hussain, N. Agarwal, Social cyber forensics approach to study twitter’s and blogs’ influence on propaganda campaigns, in International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation (Springer, Berlin, 2017), pp. 108–113.
S. Al-khateeb, K.J. Conlan, N. Agarwal, I.Baggili, F. Breitinger, Exploring Deviant Hacker Networks (DHN) on social media platforms. J. Digit. Forensic Secur. Law 11(2), 7–20. Available: http://bit.ly/2nKwNJE
D. Sindelar, The kremlin’s troll army: Moscow is financing legions of pro-Russia Internet commenters. But how much do they matter? The Atlantic (Aug. 2014). Available: http://www.theatlantic.com/international/archive/2014/08/the-kremlins-troll-army/375932/
K. Vick, Iraq’s Second Largest City Falls to Extremists. Available: http://ti.me/1ElCjnV
T. Arango, Key Iraqi City Falls to Isis as Last of Security Forces Flee. Available: http://nyti.ms/1Tm4SOc
T. A. et al., How ISIS Works (2014). Available: http://nyti.ms/1h0spmR
M. Townsend, T. Helm, Jihad in a Social Media Age: How Can the West Win an Online War?. Available: http://bit.ly/1wqeb4b
J. Berger, How ISIS Succeeds on Social Media Where #StopKony Fails Even with fewer clicks. The Atlantic (March 16, 2015)
S. Al-khateeb, N. Agarwal, Analyzing deviant cyber Flash Mobs of ISIL on twitter, in Social Computing, Behavioral-Cultural Modeling, and Prediction (Springer, Berlin, 2015), pp. 251–257.
C. Staff. ISIS Video Appears to Show Beheadings of Egyptian Coptic Christians in Libya. Available: http://www.cnn.com/2015/02/15/middleeast/isis-video-beheadings-christians/
T.n. editorial. ISIL Executes an Israeli Arab After Accusing him of Been an Israeli Spy. Available: http://www.tv7israelnews.com/isil-executes-an-israeli-arab-after-accusing-him-of-been-an-israeli-spy/
K. Shaheen. ISIS Video Purports to Show Massacre of Two Groups of Ethiopian Christians. Available: https://www.theguardian.com/world/2015/apr/19/isis-video-purports-to-show-massacre-of-two-groups-of-ethiopian-christians
C. News, ISIS recruits fighters through powerful online campaign, in http://cbsn.ws/1qKH8mE. Last checked: July 1, 2015, August 29, 2014
D. Quiggle, The ISIS beheading narrative. Small Wars J. (Feb 26, 2015). Accessed 12 Mar 2019. Available: https://smallwarsjournal.com/jrnl/art/the-isis-beheading-narrative
R. Janes, Losing Our Heads: Beheadings in Literature and Culture (NYU, New York, 2005)
T.J. Holt, Examining the forces shaping cybercrime markets online. Soc. Sci. Comput. Rev. 31(2), 165–177 (2013). Available: http://ssc.sagepub.com/content/31/2/165.short
T.J. Holt, Exploring the social organisation and structure of stolen data markets. Glob. Crime 14(2–3), 155–174 (2013). Available: http://www.tandfonline.com/doi/abs/10.1080/17440572.2013.787925
E. Moreau, Here’s What you Need to Know About Internet Trolling. Available: https://www.lifewire.com/what-is-internet-trolling-3485891
Z. Davis, Definition of: Trolling (2009). Available: http://www.pcmag.com/encyclopedia/term/53181/trolling#
I. University, What is a Troll? (2013). Available: https://kb.iu.edu/d/afhc
M. Allen, Kremlin’s ‘Social Media Takeover’: Cold War Tactics Fuel Ukraine Crisis (Mar. 2014). Available: http://www.demdigest.net/blog/kremlins-social-media-takeover-cold-war-tactics-fuel-ukraine-crisis/
Oxford-Dictionary, Definition of flash mob from Oxford English dictionaries online, in Oxford English Dictionaries. https://en.oxforddictionaries.com/definition/us/flash_mob. Last checked 19 Dec 2016
C. Kirkland, 12 Great Examples of Flash Mobs (Dec. 2011). Available: http://econsultancy.com/blog/8548-12-great-examples-of-flash-mobs?utm_campaign=bloglikes&utm_medium=socialnetwork&utm_source=facebook
G. Ackerman, D. Blair, G. Butler, H. Cabayan, R. Damron, J.D. Keefe, T. King, D. Hallstrom, S. Helfstein, D. Hulsey, et al., The New Face of Transnational Crime Organizations (TCOs): A Geopolitical Perspective and Implications to US National Security (Calhoun Institutional Archive of the Naval Postgraduate School, Mar. 2013). https://calhoun.nps.edu/public/handle/10945/30346.
B. Holbrook, LBPD Prepared For Potential Bash Mob Event (Jul. 2013), p. 00000. Available: http://www.everythinglongbeach.com/lbpd-prepared-for-potential-bash-mob-event/
S. Al-khateeb, N. Agarwal, Analyzing flash mobs in cybernetic space and the imminent security threats a collective action based theoretical perspective on emerging sociotechnical behaviors, in 2015 AAAI Spring Symposium Series.
Cyveillance, Bashmobs: Using Social Media to Organize Disruptive Activity. Available: https://tinyurl.com/y9rlzrah
J.S. Coleman, The Mathematics of Collective Action. (New York, Routledge, July 12, 2017). 1st edn., 2005. 246p, eISBN 9781351479714. Accessed 12 Mar 2019. Available: https://www.taylorfrancis.com/books/9781351479714; https://doi.org/10.4324/9781315133065
B. Klandermans, J.M. Sabucedo, M. Rodriguez, M. De Weerd, Identity processes in collective action participation: Farmers’ Identity and farmers’ protest in the Netherlands and Spain. Polit. Psychol. 23(2) 235–251. Available: http://onlinelibrary.wiley.com/doi/10.1111/0162-895X.00280/abstract
A. Melucci, Challenging Codes: Collective Action in the Information Age (Cambridge University, Cambridge, 1996), p. 00017
J.S. Coleman, Foundations for a Theory of Collective Decisions, vol. 71(6). Available: https://tinyurl.com/y7cugwp7
V. Labatut, N. Dugue, A. Perez, Identifying the Community Roles of Social Capitalists in the Twitter Network, p. 8. Available: http://arxiv.org/abs/1406.6611
M. Olson, The Logic of Collective Action: Public Goods and the Theory of Groups (Harvard University, Cambridge, 1977)
R.H. Coase, The nature of the firm. Economica 4(16), 386–405 (1937)
P.G. Warr, Pareto optimal redistribution and private charity. J. Public Econ. 19(1), 131–138 (1982)
P.G. Warr, The private provision of a public good is independent of the distribution of income. Econ. Lett. 13(2), 207–211 (1983)
T. Sandler, J.T. Tschirhart, The economic theory of clubs: an evolutionary survey. J. Econ. Lit. Am. Econ. Assoc. 18(4), 1481–1521 (1980)
A. Rubinstein, Equilibrium in supergames with the overtaking criterion. J. Econ. Theory 21(1), 1–9 (1979)
G.S. Becker, The Economic Approach to Human Behavior (University of Chicago, Chicago, 1976)
M.N. Zald, J.D. McCarthy, The Dynamics of Social Movements: Resource Mobilization, Social Control, and Tactics (Winthrop, Cambridge, 1979)
H.R. Kerbo, Movements of crisis and movements of affluence a critique of deprivation and resource mobilization theories. J. Confl. Resolut. 26(4) 645–663 (1982)
M.M. Ferree, in Frontiers in Social Movement Theory, ed. by A.D. Morris, C.M. Mueller (Yale University, Yale, 1992)(2), pp. 29–52.
D.A. Snow, et al., Frame alignment processes, micromobilization, and movement participation. Am. Sociol. Rev. 51(4) 464–481 (1986)
H. Johnston, E. Larana, J.R. Gusfield, Identities, grievances, and new social movements, in New Social Movements: From Ideology to Identity, vol. 3, (Temple University Press, Philadelphia, PA, 1994), pp. 3–35. Available: https://www.jstor.org/stable/j.ctt14bst9g
S. Al-khateeb, N. Agarwal, Developing a conceptual framework for modeling deviant cyber flash mob: A socio-computational approach leveraging hypergraph constructs. J. Digit. Forensic Secur. Law 9(2), 113–128 (2014)
A. Cheng, M. Evans, Inside Twitter an In-Depth Look at the 5% of Most Active Users. Available: http://sysomos.com/insidetwitter/mostactiveusers
“ Types of Bots: An Overview of Chatbot Diversity |botnerds.com. Available: http://botnerds.com/types-of-bots/
R.A. Rodríguez-Gómez, G. Maciá-Fernández, P. García-Teodoro, Survey and taxonomy of botnet research through life-cycle. ACM Comput. Surv. 45(4), 45. Available: http://dl.acm.org/citation.cfm?id=2501659
A. Karasaridis, B. Rexroad, D. Hoeflin, Wide-scale botnet detection and characterization, in Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, Cambridge MA, vol. 7. . Available: http://bit.ly/2n4fmXk
S. Bono, D. Caselden, G. Landau, C. Miller, Reducing the attack surface in massively multiplayer online role-playing games. IEEE Secur. Priv. 7(3) (2009)
N. Abokhodair, D. Yoo, D.W. McDonald, Dissecting a social botnet: Growth, content and influence in twitter, in Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (ACM, New York, 2015), pp. 839–851. Available: http://dl.acm.org/citation.cfm?id=2675208
P. Kulp, Facebook Admits to Nearly as Many Fake or Clone Accounts as the U.S. Population 2017. Available: https://goo.gl/HXUdc8
M. Newberg, Nearly 48 Million Twitter Accounts Could be Bots, Says Study (Mar. 2017). Available: https://www.cnbc.com/2017/03/10/nearly-48-million-twitter-accounts-could-be-bots-says-study.html
Y. Boshmaf, I. Muslukhov, K. Beznosov, M. Ripeanu, Key challenges in defending against malicious socialbots, in Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats (USENIX Association, Berkeley, 2012), pp. 12–12. Available: https://www.usenix.org/system/files/conference/leet12/leet12-final10.pdf
A. Melucci, Nomads of the Present: Social Movements and Individual Needs in Contemporary Society (Temple University, Philadelphia, 1989) p. 02740
L. Maheu, Social Movements and Social Classes: The Future of Collective Action. SAGE Studies in International Sociology, vol. 46 (SAGE Publications Ltd, London, 1995), p. 00620. Available: http://bit.ly/2nKwsqC
L. Tang, H. Liu, Toward predicting collective behavior via social dimension extraction. IEEE Intell. Syst. 25(4), 19–25 (2010). Available: http://bit.ly/2n4mT8w
T. Shafie, D. Schoch, J. Mans, C. Hofman, U. Brandes, Hypergraph representations: a study of Carib attacks on colonial forces, 1509–1700. J. Hist. Netw. Res. 1(1), 52–70 (2017)
P. Bonacich, A. Cody Holdren, M. Johnston, Hyper-edges and multidimensional centrality. Soc. Netw. 26(3), 189–203 (2004). Available: http://linkinghub.elsevier.com/retrieve/pii/S0378873304000024
E. Estrada, J.A. Rodriguez-Velazquez, Subgraph centrality and clustering in complex hyper-networks. Physica A Stat. Mech. Appl. 364, 581–594 (2006)
P. Bonacich, et al., Hyper-edges and multidimensional centrality. Soc. Netw. 26(3), 189–203 (2004)
T. Sandler, Collective Action: Theory and Applications (University of Michigan, Ann Arbor, 1992)
N.W. Biggart, Readings in Economic Sociology, vol. 4 (Blackwell, Chichester, 2002)
N.B. Ellison, C. Steinfield, C. Lampe, The benefits of Facebook “friends:” social capital and college students’ use of online social network sites. J. Comput. Mediat. Commun. 12(4), 1143–1168. Available: http://doi.wiley.com/10.1111/j.1083-6101.2007.00367.x
B. Klandermans et al., Identity processes in collective action participation: farmers’ identity and farmers’ protest in the Netherlands and Spain. Polit. Psychol. 23(2), 235–251 (2002)
A. Melucci, Challenging Codes: Collective Action in the Information Age (Cambridge University, Cambridge, 1996)
C. Berge, E. Minieka, Graphs and Hypergraphs, vol. 7 (North-Holland, Amsterdam, 1973)
P. Ludlow, What is a ‘Hacktivist’?. Available: http://opinionator.blogs.nytimes.com/2013/01/13/what-is-a-hacktivist/
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Al-khateeb, S., Agarwal, N. (2019). Deviance in Social Media. In: Deviance in Social Media and Social Cyber Forensics. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-030-13690-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-13690-1_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-13689-5
Online ISBN: 978-3-030-13690-1
eBook Packages: Computer ScienceComputer Science (R0)