The ethics of online social network forensics
Access Status
Authors
Date
2016Type
Metadata
Show full item recordCitation
Source Title
Source Conference
ISBN
School
Collection
Abstract
© Springer International Publishing Switzerland 2016.Online social networks (OLSNs) are electronically-based social milieux where individuals gather virtually to socialize. The behavior and characteristics of these networks can provide evidence relevant for detecting and prosecuting policy violations, crimes, terrorist activities, subversive political movements, etc. Some existing forensics methods and tools are useful for such investigations. Further, forensics researchers are developing new methods and tools specifically for investigating and examining online social networks. While the privacy rights of individuals are widely respected, the privacy rights of social groups are less well developed. In the current development of OLSNs and computer forensics, the compromise of group privacy may lead to the violation of individual privacy. This paper examines the ethics regarding forensics examinations of online social networks. As with individual privacy, ethical tensions exist in social group privacy between the privacy rights that can be afforded to the membership, and the rights of institutions to detect and govern conspiracies to subversion, crimes, discrimination, etc.
Related items
Showing items related by title, author, creator and subject.
-
Kim, J.; Baskerville, Richard; Ding, Y. (2018)© 2018 Springer Science+Business Media, LLC, part of Springer Nature. Online social networks (OLSNs) are electronically-based social milieux where individuals gather virtually to socialize. The behavior and characteristics ...
-
Leaver, Tama (2018)While social media are, by definition, about connecting multiple people, many discussions about social media platforms and practices presume that accounts and profiles are managed by individual users with the agency to ...
-
Thompson, Nik; Lee, K. (2013)The discipline of information security must adapt to new technologies and methods of interaction with those technologies. New technologies present both challenges and opportunities for the security professional, especially ...