skip to main content
10.1145/3538969.3544457acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article
Public Access

Preliminary Analysis of Privacy Implications Observed in Social-Media Posts Across Shopping Platforms

Published:23 August 2022Publication History

ABSTRACT

The widespread activity of hash-tagging, especially among the Gen-Z population, and the impact of social commerce on average consumers raise questions about privacy implications and dangers of anonymous cyberstalking. In this work, we examined the privacy implications observed in hash-tag-based social-media posts (of average users and influencers) by following the trails of online shopping platform(s) product listings, consumer reviews, social-commerce policies, and influencer posts. We have conducted a preliminary analysis considering cyberstalking as one of the avenues that an anonymous stalker may use to impact the social-media user negatively. Further, we have conceptualized the trails behind hash-tagging activities in terms of a privacy threat model, the need for practical data analysis tools, and the lack of mitigation strategies at various layers. Mainly, this paper throws light on the need for more robust user privacy policies and the impact on socio-economic-privacy aspects. This paper also demonstrates the need for expanding the scope of digital investigations and DFIR tools beyond just the devices of individuals (including victims, suspects, perpetrators, and cyber-criminals) and to thoroughly prepare the forensic professionals to consider the online presence of individuals in its entirety including anonymous cyberstalking avenues and to raise awareness about the abuse of social networks.

References

  1. Women Act. 2007. Domestic Violence, Stalking, and Antistalking Legislation. (2007).Google ScholarGoogle Scholar
  2. Haider M Al-Khateeb, Gregory Epiphaniou, Zhraa A Alhaboby, James Barnes, and Emma Short. 2017. Cyberstalking: Investigating formal intervention and the role of Corporate Social Responsibility. Telematics and Informatics 34, 4 (2017), 339–349.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ibrahim Baggili and Marcus Rogers. 2009. Self-reported cyber crime: An analysis on the effects of anonymity and pre-employment integrity. (2009).Google ScholarGoogle Scholar
  4. Katrina Baum. 2011. Stalking victimization in the United States. Diane Publishing.Google ScholarGoogle Scholar
  5. Tim Boehnlein, Jeff Kretschmar, Wendy Regoeczi, and Jill Smialek. 2020. Responding to stalking victims: Perceptions, barriers, and directions for future research. Journal of family violence 35, 7 (2020), 755–768.Google ScholarGoogle ScholarCross RefCross Ref
  6. Wei-Jung Chang. 2020. Cyberstalking and law enforcement. Procedia Computer Science 176 (2020), 1188–1194.Google ScholarGoogle ScholarCross RefCross Ref
  7. Nicola Cheyne and Marika Guggisberg. 2018. Stalking: An age old problem with new expressions in the digital age. Violence against women in the 21st century: Challenges and future directions (2018), 161–190.Google ScholarGoogle Scholar
  8. Cassie Cox. 2014. Protecting victims of cyberstalking, cyberharassment, and online impersonation through prosecutions and effective laws. Jurimetrics (2014), 277–302.Google ScholarGoogle Scholar
  9. Harald Dreßing, Peter Gass, Katharina Schultz, and Christine Kuehner. 2020. The prevalence and effects of stalking: a replication study. Deutsches Ärzteblatt International 117, 20 (2020), 347.Google ScholarGoogle ScholarCross RefCross Ref
  10. Aimee Fukuchi. 2011. A balance of convenience: The use of burden-shifting devices in criminal cyberharassment law. BCL Rev. 52(2011), 289.Google ScholarGoogle Scholar
  11. Mary Graham. 1996. Domestic Violence, Stalking, & Antistalking Legislation: An Annual Report to Congress Under the Violence Against Women Act. DIANE Publishing.Google ScholarGoogle Scholar
  12. Steven D Hazelwood and Sarah Koon-Magnin. 2013. Cyber stalking and cyber harassment legislation in the United States: A qualitative analysis. International Journal of Cyber Criminology 7, 2 (2013), 155–168.Google ScholarGoogle Scholar
  13. V Kanakaris, K Tzovelekis, and DV Bandekas. 2018. Impact of AnonStalk (Anonymous Stalking) on users of Social Media: A Case Study.Journal of Engineering Science & Technology Review 11, 2 (2018).Google ScholarGoogle Scholar
  14. Puneet Kaur, Amandeep Dhir, Anushree Tandon, Ebtesam A Alzeiby, and Abeer Ahmed Abohassan. 2021. A systematic literature review on cyberstalking. An analysis of past achievements and future promises. Technological Forecasting and Social Change 163 (2021), 120426.Google ScholarGoogle ScholarCross RefCross Ref
  15. Priya Kumar, Anatoliy Gruzd, and Philip Mai. 2021. Mapping out Violence Against Women of Influence on Twitter Using the Cyber–Lifestyle Routine Activity Theory. American behavioral scientist 65, 5 (2021), 689–711.Google ScholarGoogle Scholar
  16. Mirela Loftus. 2016. The Anti-Social Network: Cyberstalking Victimization Among College Students. Journal of the American Academy of Child & Adolescent Psychiatry 4, 55(2016), 340–341.Google ScholarGoogle ScholarCross RefCross Ref
  17. Catherine D Marcum and George E Higgins. 2019. Examining the effectiveness of academic scholarship on the fight against cyberbullying and cyberstalking. American journal of criminal justice 44, 4 (2019), 645–655.Google ScholarGoogle Scholar
  18. Catherine D Marcum and George E Higgins. 2021. A Systematic Review of Cyberstalking Victimization and Offending Behaviors. American Journal of Criminal Justice(2021), 1–29.Google ScholarGoogle Scholar
  19. Emma Marshak. 2017. Online harassment: A legislative solution. Harv. J. on Legis. 54(2017), 503.Google ScholarGoogle Scholar
  20. Christa Miller. 2006. Cyber stalking & bullying: What law enforcement needs to know. Annotation (2006).Google ScholarGoogle Scholar
  21. US Dept of Justice. 1999. Cyberstalking: A New Challenge for Law Enforcement and Industry: A Report From the Attorney General to the Vice President. (1999).Google ScholarGoogle Scholar
  22. Nicolle Parsons-Pollard and Laura J Moriarty. 2009. Cyberstalking: Utilizing what we do know. Victims and Offenders 4, 4 (2009), 435–441.Google ScholarGoogle ScholarCross RefCross Ref
  23. Brian H Spitzberg. 2002. The tactical topography of stalking victimization and management. Trauma, Violence, & Abuse 3, 4 (2002), 261–288.Google ScholarGoogle ScholarCross RefCross Ref
  24. Yang Zhang, Mathias Humbert, Tahleen Rahman, Cheng-Te Li, Jun Pang, and Michael Backes. 2018. Tagvisor: A privacy advisor for sharing hashtags. In Proceedings of the 2018 World Wide Web Conference. 287–296.Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security
    August 2022
    1371 pages
    ISBN:9781450396707
    DOI:10.1145/3538969

    Copyright © 2022 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 23 August 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate228of451submissions,51%
  • Article Metrics

    • Downloads (Last 12 months)148
    • Downloads (Last 6 weeks)52

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format