ABSTRACT
The widespread activity of hash-tagging, especially among the Gen-Z population, and the impact of social commerce on average consumers raise questions about privacy implications and dangers of anonymous cyberstalking. In this work, we examined the privacy implications observed in hash-tag-based social-media posts (of average users and influencers) by following the trails of online shopping platform(s) product listings, consumer reviews, social-commerce policies, and influencer posts. We have conducted a preliminary analysis considering cyberstalking as one of the avenues that an anonymous stalker may use to impact the social-media user negatively. Further, we have conceptualized the trails behind hash-tagging activities in terms of a privacy threat model, the need for practical data analysis tools, and the lack of mitigation strategies at various layers. Mainly, this paper throws light on the need for more robust user privacy policies and the impact on socio-economic-privacy aspects. This paper also demonstrates the need for expanding the scope of digital investigations and DFIR tools beyond just the devices of individuals (including victims, suspects, perpetrators, and cyber-criminals) and to thoroughly prepare the forensic professionals to consider the online presence of individuals in its entirety including anonymous cyberstalking avenues and to raise awareness about the abuse of social networks.
- Women Act. 2007. Domestic Violence, Stalking, and Antistalking Legislation. (2007).Google Scholar
- Haider M Al-Khateeb, Gregory Epiphaniou, Zhraa A Alhaboby, James Barnes, and Emma Short. 2017. Cyberstalking: Investigating formal intervention and the role of Corporate Social Responsibility. Telematics and Informatics 34, 4 (2017), 339–349.Google ScholarDigital Library
- Ibrahim Baggili and Marcus Rogers. 2009. Self-reported cyber crime: An analysis on the effects of anonymity and pre-employment integrity. (2009).Google Scholar
- Katrina Baum. 2011. Stalking victimization in the United States. Diane Publishing.Google Scholar
- Tim Boehnlein, Jeff Kretschmar, Wendy Regoeczi, and Jill Smialek. 2020. Responding to stalking victims: Perceptions, barriers, and directions for future research. Journal of family violence 35, 7 (2020), 755–768.Google ScholarCross Ref
- Wei-Jung Chang. 2020. Cyberstalking and law enforcement. Procedia Computer Science 176 (2020), 1188–1194.Google ScholarCross Ref
- Nicola Cheyne and Marika Guggisberg. 2018. Stalking: An age old problem with new expressions in the digital age. Violence against women in the 21st century: Challenges and future directions (2018), 161–190.Google Scholar
- Cassie Cox. 2014. Protecting victims of cyberstalking, cyberharassment, and online impersonation through prosecutions and effective laws. Jurimetrics (2014), 277–302.Google Scholar
- Harald Dreßing, Peter Gass, Katharina Schultz, and Christine Kuehner. 2020. The prevalence and effects of stalking: a replication study. Deutsches Ärzteblatt International 117, 20 (2020), 347.Google ScholarCross Ref
- Aimee Fukuchi. 2011. A balance of convenience: The use of burden-shifting devices in criminal cyberharassment law. BCL Rev. 52(2011), 289.Google Scholar
- Mary Graham. 1996. Domestic Violence, Stalking, & Antistalking Legislation: An Annual Report to Congress Under the Violence Against Women Act. DIANE Publishing.Google Scholar
- Steven D Hazelwood and Sarah Koon-Magnin. 2013. Cyber stalking and cyber harassment legislation in the United States: A qualitative analysis. International Journal of Cyber Criminology 7, 2 (2013), 155–168.Google Scholar
- V Kanakaris, K Tzovelekis, and DV Bandekas. 2018. Impact of AnonStalk (Anonymous Stalking) on users of Social Media: A Case Study.Journal of Engineering Science & Technology Review 11, 2 (2018).Google Scholar
- Puneet Kaur, Amandeep Dhir, Anushree Tandon, Ebtesam A Alzeiby, and Abeer Ahmed Abohassan. 2021. A systematic literature review on cyberstalking. An analysis of past achievements and future promises. Technological Forecasting and Social Change 163 (2021), 120426.Google ScholarCross Ref
- Priya Kumar, Anatoliy Gruzd, and Philip Mai. 2021. Mapping out Violence Against Women of Influence on Twitter Using the Cyber–Lifestyle Routine Activity Theory. American behavioral scientist 65, 5 (2021), 689–711.Google Scholar
- Mirela Loftus. 2016. The Anti-Social Network: Cyberstalking Victimization Among College Students. Journal of the American Academy of Child & Adolescent Psychiatry 4, 55(2016), 340–341.Google ScholarCross Ref
- Catherine D Marcum and George E Higgins. 2019. Examining the effectiveness of academic scholarship on the fight against cyberbullying and cyberstalking. American journal of criminal justice 44, 4 (2019), 645–655.Google Scholar
- Catherine D Marcum and George E Higgins. 2021. A Systematic Review of Cyberstalking Victimization and Offending Behaviors. American Journal of Criminal Justice(2021), 1–29.Google Scholar
- Emma Marshak. 2017. Online harassment: A legislative solution. Harv. J. on Legis. 54(2017), 503.Google Scholar
- Christa Miller. 2006. Cyber stalking & bullying: What law enforcement needs to know. Annotation (2006).Google Scholar
- US Dept of Justice. 1999. Cyberstalking: A New Challenge for Law Enforcement and Industry: A Report From the Attorney General to the Vice President. (1999).Google Scholar
- Nicolle Parsons-Pollard and Laura J Moriarty. 2009. Cyberstalking: Utilizing what we do know. Victims and Offenders 4, 4 (2009), 435–441.Google ScholarCross Ref
- Brian H Spitzberg. 2002. The tactical topography of stalking victimization and management. Trauma, Violence, & Abuse 3, 4 (2002), 261–288.Google ScholarCross Ref
- Yang Zhang, Mathias Humbert, Tahleen Rahman, Cheng-Te Li, Jun Pang, and Michael Backes. 2018. Tagvisor: A privacy advisor for sharing hashtags. In Proceedings of the 2018 World Wide Web Conference. 287–296.Google ScholarDigital Library
Recommendations
A Survey on Privacy in Social Media: Identification, Mitigation, and Applications
The increasing popularity of social media has attracted a huge number of people to participate in numerous activities on a daily basis. This results in tremendous amounts of rich user-generated data. These data provide opportunities for researchers and ...
Believability and Harmfulness Shape the Virality of Misleading Social Media Posts
WWW '23: Proceedings of the ACM Web Conference 2023Misinformation on social media presents a major threat to modern societies. While previous research has analyzed the virality across true and false social media posts, not every misleading post is necessarily equally viral. Rather, misinformation has ...
Privacy leakage analysis in online social networks
Online Social Networks (OSNs) have become one of the major platforms for social interactions, such as building up relationship, sharing personal experiences, and providing other services. The wide adoption of OSNs raises privacy concerns due to personal ...
Comments