Skip to main content
Top
Published in:
Cover of the book

2019 | OriginalPaper | Chapter

1. Deviance in Social Media

Authors : Samer Al-khateeb, Nitin Agarwal

Published in: Deviance in Social Media and Social Cyber Forensics

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this chapter, we explain what we mean by deviance in social media. We give examples of four types of deviance as observed on social media, viz., deviant acts , deviant events , deviant tactics , and deviant groups . We provide historical information, definitions, and examples that will be studied/explained in more details throughout the book. This chapter would help the readers understand the scope of the problem of deviance in social media, familiarize with definitions and examples of deviant events, groups, acts, and tactics, and peek at the social science theories that can explain such emergent deviant behaviors on social media.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
A very well-known example of social movements that succeeded due to the role of social media—as it acted as a vehicle for change in many countries—was during the so-called the “Arab Spring.” When Mr. Mohamed Bouazizi, a 26-year-old Tunisian fruit vendor set himself on fire, on December 18, 2010, in a protest in front of a government building. This led to many protests and grievance that caused President Zine El Abidine Ben Ali to step down. That act was captured on camera and disseminated on social media, which encouraged many other countries to protest against the authoritarian regimes in the Middle-East [5].
 
2
Parkour is the manifestation in which traceurs (parkour practitioners) jump between distance rooftops, climb vertical walls, and continuously search for new ways to challenge the rules of gravity. Parkour history is more than 100 years as Michael Atkinson states in his article “Parkour, Anarcho-Environmentalism, and Poiesis” [6]. This practice goes back to a style called Hebertism that emerged at the beginning of the twentieth century. The practice contains variety of obstacles and landscapes usually in the wooded setting “as an unfettered animal” [7]. The first parkour was formed originally in Paris and since then it emerged all over the world, from Canada and USA to Russia and the Philippines.
 
3
The dark web constitutes only one part of what is called the invisible web[12], hidden web [13], or deep web[14]. The dark web websites use anonymity tools such as the “packet based routing,” i.e., the Invisible Internet Project (I2P) and the “circuit based routing,” i.e., The Onion Router (TOR) to conceal their IP address [15]. The dark web is known for having markets that sell various illegal products such as drugs, guns, and even child pornography. In addition to having these types of markets, many people use the dark web because it provides protection against censorship or surveillance [15]. The invisible, hidden, or deep web is a part of the World Wide Web that is not indexed by any standard search engine. The “surface web” is the opposite of the “deep web,” i.e., the part of the World Wide Web that is indexed by standard search engines [16].
 
4
Iraq Prime Minister Declares Victory Over ISIS. The NY Times, December 9, 2017. Available at https://​goo.​gl/​AkUJkT.
 
5
Westoxification is the state of being inebriated with Western culture and ideas.
 
6
U.S. helping Ukraine investigate power grid hack. Reuters. January 12, 2016. Available at http://​reut.​rs/​1PqNAYG.
 
7
Anonymous is hacking Israeli Web sites. The Washington Post. November 17, 2012. Available at https://​www.​washingtonpost.​com/​news/​worldviews/​wp/​2012/​11/​17/​anonymous-is-hacking-israeli-web-sites/​.
 
8
Anonymous uses Twitter to highlight humanitarian crisis in Burma. The Verge. March 26, 2013. Available at https://​www.​theverge.​com/​2013/​3/​26/​4148908/​anonymous-oprohingya-burma-myanmar-humanitarian-crisis-campaign.
 
9
#OpNimr: Anonymous fight to stop execution of Saudi youth. Al-Jazeera, September 28, 2015. Available at http://​stream.​aljazeera.​com/​story/​201509282137-0025017.
 
10
Anonymous: CIA, Interpol websites “tango down.” Reuters. 2012.
 
11
Anonymous launched #OpBeast against animal cruelty and depravity. TechWorm. 2015.
 
12
Woebot is a chatbot that helps people track their mood and give them therapeutic advices, available at https://​woebot.​io.
 
13
Supra-dyadic relations are the relations that involve more than two nodes, i.e., a set of nodes such as food webs [74].
 
14
Hypergraph is a graph in which each edge/relation is called a hyperedge and it connects more than two nodes that can be of different types.
 
Literature
3.
go back to reference N. Agarwal, M. Lim, and R.T. Wigand, Online Collective Action: Dynamics of the Crowd in Social Media (Springer, Vienna, 2014)CrossRef N. Agarwal, M. Lim, and R.T. Wigand, Online Collective Action: Dynamics of the Crowd in Social Media (Springer, Vienna, 2014)CrossRef
4.
go back to reference N. Agarwal et al., Raising and rising voices in social media: a novel methodological approach in studying cyber-collective movements. Bus. Inf. Technol. Syst. Eng. 4(3), 113–126 (2012)CrossRef N. Agarwal et al., Raising and rising voices in social media: a novel methodological approach in studying cyber-collective movements. Bus. Inf. Technol. Syst. Eng. 4(3), 113–126 (2012)CrossRef
7.
go back to reference Y.S. Mohilever, Taking over the city: developing a cybernetic geographical imagination-flash mobs & parkour, in Theatre Space After 20th Century (2012) p. 188 Y.S. Mohilever, Taking over the city: developing a cybernetic geographical imagination-flash mobs & parkour, in Theatre Space After 20th Century (2012) p. 188
12.
go back to reference J. Devine, F. Egger-Sider, Beyond Google: the invisible web in the academic library. J. Acad. Librariansh. 30(4), 265–269 (2004)CrossRef J. Devine, F. Egger-Sider, Beyond Google: the invisible web in the academic library. J. Acad. Librariansh. 30(4), 265–269 (2004)CrossRef
13.
go back to reference S. Raghavan, H. Garcia-Molina, Crawling the Hidden Web, Stanford, Tech. Rep. (2000) S. Raghavan, H. Garcia-Molina, Crawling the Hidden Web, Stanford, Tech. Rep. (2000)
14.
go back to reference N. Hamilton, The mechanics of a deep net metasearch engine, in WWW (Posters) (2003) N. Hamilton, The mechanics of a deep net metasearch engine, in WWW (Posters) (2003)
16.
go back to reference M.K. Bergman, White paper: the deep web: surfacing hidden value. J. Electron. Publ. 7(1), (2001) M.K. Bergman, White paper: the deep web: surfacing hidden value. J. Electron. Publ. 7(1), (2001)
17.
go back to reference S. Al-khateeb, M.N. Hussain, N. Agarwal, Social cyber forensics approach to study twitter’s and blogs’ influence on propaganda campaigns, in International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation (Springer, Berlin, 2017), pp. 108–113. S. Al-khateeb, M.N. Hussain, N. Agarwal, Social cyber forensics approach to study twitter’s and blogs’ influence on propaganda campaigns, in International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation (Springer, Berlin, 2017), pp. 108–113.
18.
go back to reference S. Al-khateeb, K.J. Conlan, N. Agarwal, I.Baggili, F. Breitinger, Exploring Deviant Hacker Networks (DHN) on social media platforms. J. Digit. Forensic Secur. Law 11(2), 7–20. Available: http://bit.ly/2nKwNJE S. Al-khateeb, K.J. Conlan, N. Agarwal, I.Baggili, F. Breitinger, Exploring Deviant Hacker Networks (DHN) on social media platforms. J. Digit. Forensic Secur. Law 11(2), 7–20. Available: http://​bit.​ly/​2nKwNJE
24.
go back to reference J. Berger, How ISIS Succeeds on Social Media Where #StopKony Fails Even with fewer clicks. The Atlantic (March 16, 2015) J. Berger, How ISIS Succeeds on Social Media Where #StopKony Fails Even with fewer clicks. The Atlantic (March 16, 2015)
25.
go back to reference S. Al-khateeb, N. Agarwal, Analyzing deviant cyber Flash Mobs of ISIL on twitter, in Social Computing, Behavioral-Cultural Modeling, and Prediction (Springer, Berlin, 2015), pp. 251–257. S. Al-khateeb, N. Agarwal, Analyzing deviant cyber Flash Mobs of ISIL on twitter, in Social Computing, Behavioral-Cultural Modeling, and Prediction (Springer, Berlin, 2015), pp. 251–257.
31.
go back to reference R. Janes, Losing Our Heads: Beheadings in Literature and Culture (NYU, New York, 2005) R. Janes, Losing Our Heads: Beheadings in Literature and Culture (NYU, New York, 2005)
40.
go back to reference G. Ackerman, D. Blair, G. Butler, H. Cabayan, R. Damron, J.D. Keefe, T. King, D. Hallstrom, S. Helfstein, D. Hulsey, et al., The New Face of Transnational Crime Organizations (TCOs): A Geopolitical Perspective and Implications to US National Security (Calhoun Institutional Archive of the Naval Postgraduate School, Mar. 2013). https://calhoun.nps.edu/public/handle/10945/30346. G. Ackerman, D. Blair, G. Butler, H. Cabayan, R. Damron, J.D. Keefe, T. King, D. Hallstrom, S. Helfstein, D. Hulsey, et al., The New Face of Transnational Crime Organizations (TCOs): A Geopolitical Perspective and Implications to US National Security (Calhoun Institutional Archive of the Naval Postgraduate School, Mar. 2013). https://​calhoun.​nps.​edu/​public/​handle/​10945/​30346.
42.
go back to reference S. Al-khateeb, N. Agarwal, Analyzing flash mobs in cybernetic space and the imminent security threats a collective action based theoretical perspective on emerging sociotechnical behaviors, in 2015 AAAI Spring Symposium Series. S. Al-khateeb, N. Agarwal, Analyzing flash mobs in cybernetic space and the imminent security threats a collective action based theoretical perspective on emerging sociotechnical behaviors, in 2015 AAAI Spring Symposium Series.
46.
go back to reference A. Melucci, Challenging Codes: Collective Action in the Information Age (Cambridge University, Cambridge, 1996), p. 00017CrossRef A. Melucci, Challenging Codes: Collective Action in the Information Age (Cambridge University, Cambridge, 1996), p. 00017CrossRef
49.
go back to reference M. Olson, The Logic of Collective Action: Public Goods and the Theory of Groups (Harvard University, Cambridge, 1977) M. Olson, The Logic of Collective Action: Public Goods and the Theory of Groups (Harvard University, Cambridge, 1977)
50.
51.
go back to reference P.G. Warr, Pareto optimal redistribution and private charity. J. Public Econ. 19(1), 131–138 (1982)CrossRef P.G. Warr, Pareto optimal redistribution and private charity. J. Public Econ. 19(1), 131–138 (1982)CrossRef
52.
go back to reference P.G. Warr, The private provision of a public good is independent of the distribution of income. Econ. Lett. 13(2), 207–211 (1983)CrossRef P.G. Warr, The private provision of a public good is independent of the distribution of income. Econ. Lett. 13(2), 207–211 (1983)CrossRef
53.
go back to reference T. Sandler, J.T. Tschirhart, The economic theory of clubs: an evolutionary survey. J. Econ. Lit. Am. Econ. Assoc. 18(4), 1481–1521 (1980) T. Sandler, J.T. Tschirhart, The economic theory of clubs: an evolutionary survey. J. Econ. Lit. Am. Econ. Assoc. 18(4), 1481–1521 (1980)
55.
go back to reference G.S. Becker, The Economic Approach to Human Behavior (University of Chicago, Chicago, 1976)CrossRef G.S. Becker, The Economic Approach to Human Behavior (University of Chicago, Chicago, 1976)CrossRef
56.
go back to reference M.N. Zald, J.D. McCarthy, The Dynamics of Social Movements: Resource Mobilization, Social Control, and Tactics (Winthrop, Cambridge, 1979) M.N. Zald, J.D. McCarthy, The Dynamics of Social Movements: Resource Mobilization, Social Control, and Tactics (Winthrop, Cambridge, 1979)
57.
go back to reference H.R. Kerbo, Movements of crisis and movements of affluence a critique of deprivation and resource mobilization theories. J. Confl. Resolut. 26(4) 645–663 (1982)CrossRef H.R. Kerbo, Movements of crisis and movements of affluence a critique of deprivation and resource mobilization theories. J. Confl. Resolut. 26(4) 645–663 (1982)CrossRef
58.
go back to reference M.M. Ferree, in Frontiers in Social Movement Theory, ed. by A.D. Morris, C.M. Mueller (Yale University, Yale, 1992)(2), pp. 29–52. M.M. Ferree, in Frontiers in Social Movement Theory, ed. by A.D. Morris, C.M. Mueller (Yale University, Yale, 1992)(2), pp. 29–52.
59.
go back to reference D.A. Snow, et al., Frame alignment processes, micromobilization, and movement participation. Am. Sociol. Rev. 51(4) 464–481 (1986)CrossRef D.A. Snow, et al., Frame alignment processes, micromobilization, and movement participation. Am. Sociol. Rev. 51(4) 464–481 (1986)CrossRef
61.
go back to reference S. Al-khateeb, N. Agarwal, Developing a conceptual framework for modeling deviant cyber flash mob: A socio-computational approach leveraging hypergraph constructs. J. Digit. Forensic Secur. Law 9(2), 113–128 (2014) S. Al-khateeb, N. Agarwal, Developing a conceptual framework for modeling deviant cyber flash mob: A socio-computational approach leveraging hypergraph constructs. J. Digit. Forensic Secur. Law 9(2), 113–128 (2014)
65.
go back to reference A. Karasaridis, B. Rexroad, D. Hoeflin, Wide-scale botnet detection and characterization, in Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, Cambridge MA, vol. 7. . Available: http://bit.ly/2n4fmXk A. Karasaridis, B. Rexroad, D. Hoeflin, Wide-scale botnet detection and characterization, in Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, Cambridge MA, vol. 7. . Available: http://​bit.​ly/​2n4fmXk
66.
go back to reference S. Bono, D. Caselden, G. Landau, C. Miller, Reducing the attack surface in massively multiplayer online role-playing games. IEEE Secur. Priv. 7(3) (2009) S. Bono, D. Caselden, G. Landau, C. Miller, Reducing the attack surface in massively multiplayer online role-playing games. IEEE Secur. Priv. 7(3) (2009)
67.
go back to reference N. Abokhodair, D. Yoo, D.W. McDonald, Dissecting a social botnet: Growth, content and influence in twitter, in Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (ACM, New York, 2015), pp. 839–851. Available: http://dl.acm.org/citation.cfm?id=2675208 N. Abokhodair, D. Yoo, D.W. McDonald, Dissecting a social botnet: Growth, content and influence in twitter, in Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (ACM, New York, 2015), pp. 839–851. Available: http://​dl.​acm.​org/​citation.​cfm?​id=​2675208
71.
go back to reference A. Melucci, Nomads of the Present: Social Movements and Individual Needs in Contemporary Society (Temple University, Philadelphia, 1989) p. 02740 A. Melucci, Nomads of the Present: Social Movements and Individual Needs in Contemporary Society (Temple University, Philadelphia, 1989) p. 02740
72.
go back to reference L. Maheu, Social Movements and Social Classes: The Future of Collective Action. SAGE Studies in International Sociology, vol. 46 (SAGE Publications Ltd, London, 1995), p. 00620. Available: http://bit.ly/2nKwsqC L. Maheu, Social Movements and Social Classes: The Future of Collective Action. SAGE Studies in International Sociology, vol. 46 (SAGE Publications Ltd, London, 1995), p. 00620. Available: http://​bit.​ly/​2nKwsqC
74.
go back to reference T. Shafie, D. Schoch, J. Mans, C. Hofman, U. Brandes, Hypergraph representations: a study of Carib attacks on colonial forces, 1509–1700. J. Hist. Netw. Res. 1(1), 52–70 (2017) T. Shafie, D. Schoch, J. Mans, C. Hofman, U. Brandes, Hypergraph representations: a study of Carib attacks on colonial forces, 1509–1700. J. Hist. Netw. Res. 1(1), 52–70 (2017)
76.
go back to reference E. Estrada, J.A. Rodriguez-Velazquez, Subgraph centrality and clustering in complex hyper-networks. Physica A Stat. Mech. Appl. 364, 581–594 (2006)MathSciNetCrossRef E. Estrada, J.A. Rodriguez-Velazquez, Subgraph centrality and clustering in complex hyper-networks. Physica A Stat. Mech. Appl. 364, 581–594 (2006)MathSciNetCrossRef
78.
go back to reference T. Sandler, Collective Action: Theory and Applications (University of Michigan, Ann Arbor, 1992) T. Sandler, Collective Action: Theory and Applications (University of Michigan, Ann Arbor, 1992)
79.
go back to reference N.W. Biggart, Readings in Economic Sociology, vol. 4 (Blackwell, Chichester, 2002)CrossRef N.W. Biggart, Readings in Economic Sociology, vol. 4 (Blackwell, Chichester, 2002)CrossRef
81.
go back to reference B. Klandermans et al., Identity processes in collective action participation: farmers’ identity and farmers’ protest in the Netherlands and Spain. Polit. Psychol. 23(2), 235–251 (2002)CrossRef B. Klandermans et al., Identity processes in collective action participation: farmers’ identity and farmers’ protest in the Netherlands and Spain. Polit. Psychol. 23(2), 235–251 (2002)CrossRef
82.
go back to reference A. Melucci, Challenging Codes: Collective Action in the Information Age (Cambridge University, Cambridge, 1996)CrossRef A. Melucci, Challenging Codes: Collective Action in the Information Age (Cambridge University, Cambridge, 1996)CrossRef
83.
go back to reference C. Berge, E. Minieka, Graphs and Hypergraphs, vol. 7 (North-Holland, Amsterdam, 1973) C. Berge, E. Minieka, Graphs and Hypergraphs, vol. 7 (North-Holland, Amsterdam, 1973)
Metadata
Title
Deviance in Social Media
Authors
Samer Al-khateeb
Nitin Agarwal
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-13690-1_1

Premium Partner