Abstract
Internet and its related technologies have become one of the most exciting innovations in the history of social development in recent times. However, along with many positive aspects of this virtual world, it has many side effects as well, which poses many risks and threats to its users and society. When it comes to the privacy of people, the damage the Internet can make should never be underestimated. Various governments and private organizations all over the world are spending a lot of time and money on cybersecurity options to make sure that their netizens are safe, and their data is protected in the cyberspace. However, despite all these efforts, some significant cyber issues are still not getting enough attention. “Cyber Manhunt” is one of these issues. Therefore, we plan to do our research to find the cause of cyber manhunt from various technology perspectives such as dark web, IP location, information filter, and some hacker’s technique. We will also investigate the positive aspects of cyber manhunt, along with the damages caused by cyber violence and information leakage during the process. We will study the current technologies that are misused to do cyber manhunt and suggest some solutions and improvements so that it can be used efficiently to minimize the damage caused to the victims. We hope that the results of our research can help individuals deepen the understanding of cyber manhunt. The results of this research can be used in studying the ethical issues of cyber manhunt and improve the technology behind information search and filtering in the future.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Cheung, A.S.Y.: A study of cyber-violence and internet service providers’ liability: lessons from China. Pac. Rim Law Policy J. Assoc. 1835(2), 336 (2009)
Aggarwal, V.: Data security approach for right to information of developer. Int. J. Adv. Res. Comput. Sci. 4, 175–246, 292–293 (2010)
Marcher, M.: Security of World Wide Web Search Engines, p. 14 (1997)
Cheswick, W.R., Bellovin, S.M., Rubin, A.D.: Firewalls and Internet Security, 2nd edn, p. 143. Addison-Wesley Longman Publishing Co., USA (2003)
Capone, V.: The Human Flesh Search Engine: Democracy, Censorship, and Political Participation in Twenty-First Century China, p. 70 (2012)
Doody, J.: China’s Expanding Cyberspace. ECFR Asia Centre (2014)
Wei, J.: Why is ‘Human Flesh Search’ Only Popular in China (2011)
Zhuo, F.: A Behavioral Study of Chinese Online Human Flesh Communities: Modeling and Analysis with Social Networks (2012)
Yan, D., Cao, Y.: Cyber Cannibalism, China Daily, 2 January 2012. http://usa.chinadaily.com.cn/china/2012-01/02/content_14370175.html
Elisabeth, N.: The spiral of silence a theory of public opinion. J. Commun. 24(2), 43–51 (1974)
Cheswick, W.R., Bellovin, S.M., Rubin, A.D.: Firewalls and Internet Security, 2nd edn, p. 143. Addison-Wesley Longman Publishing Co., Boston (2003)
Thomas, D.: Hacker Culture, p. 48. University of Minnesota Press, Minneapolis (2002)
Pipkin, D.L.: Halting the Hacker: A Practical Guide to Computer Security, vol. 2, p. 143. Prentice Hall Professional Technical Reference, Upper Saddle River (2002)
Connor, J.: Hacking Become the Ultimate Hacker Computer Virus, Cracking, Malware, IT Security, p. 13 (2015)
Zhang, L.: On strategies of personal information protection in the personalized information service in big data times. ITM Web Conf. 7, 03002 (2016)
https://www.cbsnews.com/news/the-data-brokers-selling-your-personal-information/
Shen, W.: Online Privacy and Online Speech: The Problem of the Human Flesh Search Engine, vol. 12, p. 44 (2017)
https://baijiahao.baidu.com/s?id=1612195281113107306&wfr=spider&for=pc
http://www.zaobao.com/zopinions/editorial/story20180420-852323
http://www.npc.gov.cn/npc/xinwen/2016-11/07/content_2001605.htm
He, Y.H., Zhou, F.: The first decade of human flesh search – an empirical study based on the theory of collective behavior. Mod. Commun. 3, 129–134 (2013)
Nian, F.Z., et al.: A Human Flesh Search Algorithm Based on Information Puzzle, pp. 1243–1248. School of Computer & Communication Lanzhou University of Technology (2018)
Lu, L., Huang, H.: A hierarchical scheme for vehicle make and model recognition from frontal images of vehicle. Trans. Intell. Transp. Syst. 20(5), 1774–1786 (2019)
https://www.cert.org.cn/publish/main/9/2018/20180605080248533599764/20180605080248533599764_.html
Wang, F.Y., et al.: A Study of the Human Flesh Search Engine: Crowd- Powered Expansion of Online Knowledge. The IEEE Computer Society, August 2010
https://medium.com/cryptomuse/how-the-nsa-caught-satoshi-nakamoto-868affcef595
https://www.infowars.com/david-motari-alleged-puppy-killer-tracked-down/#inline-comment
United States Government Accountability Office, “Internet Privacy,” June 2019. https://www.gao.gov/assets/700/696437.pdf
Chi, E.H.: Information seeking can be social. Computer 42(3), 42–46 (2009)
Yu, J.: Study on Legal Issues of Human Flesh Search, p. 23. Shandong University, April 2011
Anonymous: Maximum Security: A Hacker’s Guide to Protecting Your Internet Site and Network, Kybernetes, vol. 29, no. 1, p. 500 (2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Chandel, S., Chen, Y., Dai, J., Huang, J. (2020). Cyber Manhunt. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Advances in Information and Communication. FICC 2020. Advances in Intelligent Systems and Computing, vol 1129. Springer, Cham. https://doi.org/10.1007/978-3-030-39445-5_64
Download citation
DOI: https://doi.org/10.1007/978-3-030-39445-5_64
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-39444-8
Online ISBN: 978-3-030-39445-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)