Skip to main content

2018 | OriginalPaper | Buchkapitel

SMERF: Social Media, Ethics and Risk Framework

verfasst von : Ian Mitchell, Tracey Cockerton, Sukhvinder Hara, Carl Evans

Erschienen in: Cyber Criminology

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

SMERF is a proposed framework to support researchers and investigators in risk assessment when working with Social Media (SM). The aim of SMERF is to mitigate risk, by identifying it a priori. Risk assessment is considered where there is a potential danger involved in undertaking SM-related projects, which may include Digital Investigations and undergraduate or postgraduate projects. The vulnerbilities of the researcher or investigator that conduct SM-related work is discussed and what types of threats they may be exposed to are described. These are related to current counter-terrorim laws, data protection regulations and acceptable use policies. SMERF is proposed to mitigate risks that the investigator or researcher and their associated organisations maybe exposed to. The development of SMERF is agile and therefore has the ability to adapt to different organisations’ requirements. Finally, a quality assurance and risk assessment life-cycle is proposed and recommendations are for SMERF to be reviewed annually and updated appropriately.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Definition of trolling:“…intentionally posting provocative messages about sensitive subject to create conflict, upset people, and bait them…”(Zainudin et al. 2016). For further classifications on trolling, see Bishop (2012).
 
2
Natural Language Processing defines stemming as identifying the same words with different affixes, see Bird et al. (2009, Ch.3.), e.g. lie and lying.
 
Literatur
Zurück zum Zitat Aragon, A., AlDoubi, S., Kaminski, K., Anderson, S.K., & Isaacs, N. (2014). Social networking: Boundaries and limits part 1: Ethics. TechTrends, 58(2), 25.CrossRef Aragon, A., AlDoubi, S., Kaminski, K., Anderson, S.K., & Isaacs, N. (2014). Social networking: Boundaries and limits part 1: Ethics. TechTrends, 58(2), 25.CrossRef
Zurück zum Zitat Ashley, C., & Tuten, T. (2015). Creative strategies in social media marketing: An exploratory study of branded social content and consumer engagement. Psychology & Marketing, 32(1), 15–27.CrossRef Ashley, C., & Tuten, T. (2015). Creative strategies in social media marketing: An exploratory study of branded social content and consumer engagement. Psychology & Marketing, 32(1), 15–27.CrossRef
Zurück zum Zitat Backstrom, L., & Kleinberg, J. (2014). Romantic partnerships and the dispersion of social ties: A network analysis of relationship status on facebook. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 831–841). ACM. Backstrom, L., & Kleinberg, J. (2014). Romantic partnerships and the dispersion of social ties: A network analysis of relationship status on facebook. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 831–841). ACM.
Zurück zum Zitat Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., & Kruegel, C. (2010). Abusing social networks for automated user profiling. In International Workshop on Recent Advances in Intrusion Detection (pp. 422–441). Springer Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., & Kruegel, C. (2010). Abusing social networks for automated user profiling. In International Workshop on Recent Advances in Intrusion Detection (pp. 422–441). Springer
Zurück zum Zitat Beninger, K., Fry, A., Jago, N., Lepps, H., Nass, L., & Silvester, H. (2014). Research using social media; users’ views. National Centre for Social Research. Beninger, K., Fry, A., Jago, N., Lepps, H., Nass, L., & Silvester, H. (2014). Research using social media; users’ views. National Centre for Social Research.
Zurück zum Zitat Beurskens, M. (2014). Legal questions of twitter research. In K. Weller (Ed.), Twitter and society (p. 123). New York: Peter Lang. Beurskens, M. (2014). Legal questions of twitter research. In K. Weller (Ed.), Twitter and society (p. 123). New York: Peter Lang.
Zurück zum Zitat Bird, S., Klein, E., & Loper, E. (2009). Natural language processing with Python: Analyzing text with the natural language toolkit. Beijing: O’Reilly Media, Inc. Bird, S., Klein, E., & Loper, E. (2009). Natural language processing with Python: Analyzing text with the natural language toolkit. Beijing: O’Reilly Media, Inc.
Zurück zum Zitat Bishop, J. (2012). Tackling Internet abuse in Great Britain: Towards a framework for classifying severities of ‘flame trolling’. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp). Bishop, J. (2012). Tackling Internet abuse in Great Britain: Towards a framework for classifying severities of ‘flame trolling’. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
Zurück zum Zitat Carter, C. (2014). Twitter troll jailed for ‘campaign of hatred’ against Stella Creasy. The Daily Telegraph. Carter, C. (2014). Twitter troll jailed for ‘campaign of hatred’ against Stella Creasy. The Daily Telegraph.
Zurück zum Zitat Council of European Union. (2018). Council regulation (EU) no 2016/679. http://eur-lex.europa.eu/legal-content/en/LSU/?uri=CELEX%3A32016R0679. Accessed on June 25, 2017. Council of European Union. (2018). Council regulation (EU) no 2016/679. http://​eur-lex.​europa.​eu/​legal-content/​en/​LSU/​?​uri=​CELEX%3A32016R0679. Accessed on June 25, 2017.
Zurück zum Zitat Gerbaudo, P., & Treré, E. (2015). In search of the ‘we’ of social media activism: Introduction to the special issue on social media and protest identities. Information, Communication & Society, 18(8), 865–871.CrossRef Gerbaudo, P., & Treré, E. (2015). In search of the ‘we’ of social media activism: Introduction to the special issue on social media and protest identities. Information, Communication & Society, 18(8), 865–871.CrossRef
Zurück zum Zitat Granville, K. (2018). Facebook and cambridge analytica: What you need to know as fallout widens. The New York Times. Granville, K. (2018). Facebook and cambridge analytica: What you need to know as fallout widens. The New York Times.
Zurück zum Zitat Groth, G. G., Longo, L. M., & Martin, J. L. (2017). Social media and college student risk behaviors: A mini-review. Addictive Behaviors, 65, 87–91.CrossRef Groth, G. G., Longo, L. M., & Martin, J. L. (2017). Social media and college student risk behaviors: A mini-review. Addictive Behaviors, 65, 87–91.CrossRef
Zurück zum Zitat Gu, B., & Ye, Q. (2014). First step in social media: Measuring the influence of online management responses on customer satisfaction. Production and Operations Management, 23(4), 570–582.CrossRef Gu, B., & Ye, Q. (2014). First step in social media: Measuring the influence of online management responses on customer satisfaction. Production and Operations Management, 23(4), 570–582.CrossRef
Zurück zum Zitat Hinduja, S., & Patchin, J. W. (2010). Cyberbullying: Identification, prevention, and response. Cyberbullying Research Center. Hinduja, S., & Patchin, J. W. (2010). Cyberbullying: Identification, prevention, and response. Cyberbullying Research Center.
Zurück zum Zitat Hoff, D. L., & Mitchell, S. N. (2009). Cyberbullying: Causes, effects, and remedies. Journal of Educational Administration, 47(5), 652–665.CrossRef Hoff, D. L., & Mitchell, S. N. (2009). Cyberbullying: Causes, effects, and remedies. Journal of Educational Administration, 47(5), 652–665.CrossRef
Zurück zum Zitat Home Office. (2015a). Prevent duty guidance: For higher education institutions in England and Wales. UK Govt. Home Office. (2015a). Prevent duty guidance: For higher education institutions in England and Wales. UK Govt.
Zurück zum Zitat Home Office. (2015b). Prevent duty guidance: For higher education institutions in Scotland. UK Govt. Home Office. (2015b). Prevent duty guidance: For higher education institutions in Scotland. UK Govt.
Zurück zum Zitat Irvin, E., Taper, C., Igoe, L., & Pastore, R. S. (2015). Using Twitter in an undergraduate setting: Five recommendations from a foreign language class. eLearn 11. Irvin, E., Taper, C., Igoe, L., & Pastore, R. S. (2015). Using Twitter in an undergraduate setting: Five recommendations from a foreign language class. eLearn 11.
Zurück zum Zitat Isaacs, N., Kaminski, K., Aragon, A., & Anderson, S. K. (2014). Social networking: Boundaries and limitations part 2: Policy. TechTrends 58(3), 10.CrossRef Isaacs, N., Kaminski, K., Aragon, A., & Anderson, S. K. (2014). Social networking: Boundaries and limitations part 2: Policy. TechTrends 58(3), 10.CrossRef
Zurück zum Zitat Korda, H., & Itani, Z. (2013). Harnessing social media for health promotion and behavior change. Health Promotion Practice, 14(1), 15–23.CrossRef Korda, H., & Itani, Z. (2013). Harnessing social media for health promotion and behavior change. Health Promotion Practice, 14(1), 15–23.CrossRef
Zurück zum Zitat Lewis, K., Kaufman, J., Gonzalez, M., Wimmer, A., & Christakis, N. (2008). Tastes, ties and time: A new social network dataset using Facebook. Social Networks, 30(4), 330–342.CrossRef Lewis, K., Kaufman, J., Gonzalez, M., Wimmer, A., & Christakis, N. (2008). Tastes, ties and time: A new social network dataset using Facebook. Social Networks, 30(4), 330–342.CrossRef
Zurück zum Zitat Lin, M. F. G., Hoffman, E. S., & Borengasser, C. (2013). Is social media too social for class? A case study of Twitter use. TechTrends, 57(2), 39.CrossRef Lin, M. F. G., Hoffman, E. S., & Borengasser, C. (2013). Is social media too social for class? A case study of Twitter use. TechTrends, 57(2), 39.CrossRef
Zurück zum Zitat Markham, A. (2012). AOIR guidelines: Ethical decision making and Internet research ethics (Technical report). Association of Internet Research. Markham, A. (2012). AOIR guidelines: Ethical decision making and Internet research ethics (Technical report). Association of Internet Research.
Zurück zum Zitat Markham, A., & Buchanan, E. (2012). Ethical decision-making and Internet research (Technical report). Association of Internet Research (AoIR). Markham, A., & Buchanan, E. (2012). Ethical decision-making and Internet research (Technical report). Association of Internet Research (AoIR).
Zurück zum Zitat Morgan, E. M., Snelson, C., & Elison-Bowers, P. (2010) Image and video disclosure of substance use on social media websites. Computers in Human Behavior, 26, 1405–1411.CrossRef Morgan, E. M., Snelson, C., & Elison-Bowers, P. (2010) Image and video disclosure of substance use on social media websites. Computers in Human Behavior, 26, 1405–1411.CrossRef
Zurück zum Zitat Munar, A. M., & Jacobsen, J. K. S. (2014). Motivations for sharing tourism experiences through social media. Tourism Management, 43, 46–54.CrossRef Munar, A. M., & Jacobsen, J. K. S. (2014). Motivations for sharing tourism experiences through social media. Tourism Management, 43, 46–54.CrossRef
Zurück zum Zitat Newman, M. (2010). Networks: An introduction. Oxford: Oxford University Press.CrossRef Newman, M. (2010). Networks: An introduction. Oxford: Oxford University Press.CrossRef
Zurück zum Zitat OfCom. (2016). Adults’ media use and attitudes. Office of Communications (April 2016). OfCom. (2016). Adults’ media use and attitudes. Office of Communications (April 2016).
Zurück zum Zitat Pyżalski, J. (2012). From cyberbullying to electronic aggression: Typology of the phenomenon. Emotional and Behavioural Difficulties, 17(3–4), 305–317.CrossRef Pyżalski, J. (2012). From cyberbullying to electronic aggression: Typology of the phenomenon. Emotional and Behavioural Difficulties, 17(3–4), 305–317.CrossRef
Zurück zum Zitat Rivers, C. M., & Lewis, B. L. (2014). Ethical research standards in a world of big data. F1000Research, 3. Rivers, C. M., & Lewis, B. L. (2014). Ethical research standards in a world of big data. F1000Research, 3.
Zurück zum Zitat Sambrook, R. (2017). Taking the bait: The quest for instant gratification online is seriously compromising news reporting. Index on Censorship 46(1), 16–17.CrossRef Sambrook, R. (2017). Taking the bait: The quest for instant gratification online is seriously compromising news reporting. Index on Censorship 46(1), 16–17.CrossRef
Zurück zum Zitat UKCCIS. (2010). Child safety online: A practical guide for parent and carers whose children are using social media. UK Govt. UKCCIS. (2010). Child safety online: A practical guide for parent and carers whose children are using social media. UK Govt.
Zurück zum Zitat Universities UK. (2012). Oversight of seucrity-sensitive research material in UK Universities (Technical report). UUK (October 2012). Universities UK. (2012). Oversight of seucrity-sensitive research material in UK Universities (Technical report). UUK (October 2012).
Zurück zum Zitat Weale, S. (2018). Suicide is a sector-wide issue, says Bristol university vice-chancellor. The Guardian (Feb 2018). Weale, S. (2018). Suicide is a sector-wide issue, says Bristol university vice-chancellor. The Guardian (Feb 2018).
Zurück zum Zitat Whittaker, E., & Kowalski, R. M. (2015). Cyberbullying via social media. Journal of School Violence 14(1), 11–29.CrossRef Whittaker, E., & Kowalski, R. M. (2015). Cyberbullying via social media. Journal of School Violence 14(1), 11–29.CrossRef
Zurück zum Zitat Williams, M. L., Burnap, P., & Sloan, L. (2017). Towards an ethical framework for publishing twitter data in social research: Taking into account users’ views, online context and algorithmic estimation. Sociology, 51, 1–20. Williams, M. L., Burnap, P., & Sloan, L. (2017). Towards an ethical framework for publishing twitter data in social research: Taking into account users’ views, online context and algorithmic estimation. Sociology, 51, 1–20.
Zurück zum Zitat Wondracek, G., Holz, T., Kirda, E., & Kruegel, C. (2010). A practical attack to de-anonymize social network users. In 2010 IEEE Symposium on Security and Privacy (SP) (pp. 223–238). IEEE. Wondracek, G., Holz, T., Kirda, E., & Kruegel, C. (2010). A practical attack to de-anonymize social network users. In 2010 IEEE Symposium on Security and Privacy (SP) (pp. 223–238). IEEE.
Zurück zum Zitat Zainudin, N. M., Zainal, K. H., Hasbullah, N. A., Wahab, N. A., & Ramli, S. (2016). A review on cyberbullying in Malaysia from digital forensic perspective. In International Conference on Information and Communication Technology (ICICTM) (pp. 246–250). IEEE. Zainudin, N. M., Zainal, K. H., Hasbullah, N. A., Wahab, N. A., & Ramli, S. (2016). A review on cyberbullying in Malaysia from digital forensic perspective. In International Conference on Information and Communication Technology (ICICTM) (pp. 246–250). IEEE.
Zurück zum Zitat Zimmer, M. (2010). “But data is already public”: On the ethics of research in Facebook. Ethics Information Technology, 12, 313–325.CrossRef Zimmer, M. (2010). “But data is already public”: On the ethics of research in Facebook. Ethics Information Technology, 12, 313–325.CrossRef
Metadaten
Titel
SMERF: Social Media, Ethics and Risk Framework
verfasst von
Ian Mitchell
Tracey Cockerton
Sukhvinder Hara
Carl Evans
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-97181-0_10