The ethics of online social network forensics
MetadataShow full item record
© Springer International Publishing Switzerland 2016.Online social networks (OLSNs) are electronically-based social milieux where individuals gather virtually to socialize. The behavior and characteristics of these networks can provide evidence relevant for detecting and prosecuting policy violations, crimes, terrorist activities, subversive political movements, etc. Some existing forensics methods and tools are useful for such investigations. Further, forensics researchers are developing new methods and tools specifically for investigating and examining online social networks. While the privacy rights of individuals are widely respected, the privacy rights of social groups are less well developed. In the current development of OLSNs and computer forensics, the compromise of group privacy may lead to the violation of individual privacy. This paper examines the ethics regarding forensics examinations of online social networks. As with individual privacy, ethical tensions exist in social group privacy between the privacy rights that can be afforded to the membership, and the rights of institutions to detect and govern conspiracies to subversion, crimes, discrimination, etc.
Showing items related by title, author, creator and subject.
Kim, J.; Baskerville, Richard; Ding, Y. (2018)© 2018 Springer Science+Business Media, LLC, part of Springer Nature Online social networks (OLSNs) are electronically-based social milieux where individuals gather virtually to socialize. The behavior and characteristics ...
Modelling the co-occurence of Streptococcus pneumoniae with other bacterial and viral pathogens in the upper respiratory tractJacoby, P.; Watson, K.; Bowman, J.; Taylor, A.; Riley, T.; Smith, D.; Lehmann, Deborah (2007)Go to ScienceDirect® Home Skip Main Navigation Links Brought to you by: The University of Western Australia Library Login: + Register Athens/Institution Login Not Registered? - User Name: Password: ...
Thompson, Nik; Lee, K. (2013)The discipline of information security must adapt to new technologies and methods of interaction with those technologies. New technologies present both challenges and opportunities for the security professional, especially ...