Skip to main content

Cyber Manhunt

Evaluation of Technologies and Practices for Effective Community Development and Maintenance

  • Conference paper
  • First Online:
Advances in Information and Communication (FICC 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1129))

Included in the following conference series:

Abstract

Internet and its related technologies have become one of the most exciting innovations in the history of social development in recent times. However, along with many positive aspects of this virtual world, it has many side effects as well, which poses many risks and threats to its users and society. When it comes to the privacy of people, the damage the Internet can make should never be underestimated. Various governments and private organizations all over the world are spending a lot of time and money on cybersecurity options to make sure that their netizens are safe, and their data is protected in the cyberspace. However, despite all these efforts, some significant cyber issues are still not getting enough attention. “Cyber Manhunt” is one of these issues. Therefore, we plan to do our research to find the cause of cyber manhunt from various technology perspectives such as dark web, IP location, information filter, and some hacker’s technique. We will also investigate the positive aspects of cyber manhunt, along with the damages caused by cyber violence and information leakage during the process. We will study the current technologies that are misused to do cyber manhunt and suggest some solutions and improvements so that it can be used efficiently to minimize the damage caused to the victims. We hope that the results of our research can help individuals deepen the understanding of cyber manhunt. The results of this research can be used in studying the ethical issues of cyber manhunt and improve the technology behind information search and filtering in the future.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cheung, A.S.Y.: A study of cyber-violence and internet service providers’ liability: lessons from China. Pac. Rim Law Policy J. Assoc. 1835(2), 336 (2009)

    Google Scholar 

  2. https://eur-lex.europa.eu/eli/reg/2016/679/oj/

  3. Aggarwal, V.: Data security approach for right to information of developer. Int. J. Adv. Res. Comput. Sci. 4, 175–246, 292–293 (2010)

    Google Scholar 

  4. Marcher, M.: Security of World Wide Web Search Engines, p. 14 (1997)

    Google Scholar 

  5. Cheswick, W.R., Bellovin, S.M., Rubin, A.D.: Firewalls and Internet Security, 2nd edn, p. 143. Addison-Wesley Longman Publishing Co., USA (2003)

    Google Scholar 

  6. Capone, V.: The Human Flesh Search Engine: Democracy, Censorship, and Political Participation in Twenty-First Century China, p. 70 (2012)

    Google Scholar 

  7. Doody, J.: China’s Expanding Cyberspace. ECFR Asia Centre (2014)

    Google Scholar 

  8. Wei, J.: Why is ‘Human Flesh Search’ Only Popular in China (2011)

    Google Scholar 

  9. Zhuo, F.: A Behavioral Study of Chinese Online Human Flesh Communities: Modeling and Analysis with Social Networks (2012)

    Google Scholar 

  10. Yan, D., Cao, Y.: Cyber Cannibalism, China Daily, 2 January 2012. http://usa.chinadaily.com.cn/china/2012-01/02/content_14370175.html

  11. Elisabeth, N.: The spiral of silence a theory of public opinion. J. Commun. 24(2), 43–51 (1974)

    Article  Google Scholar 

  12. Cheswick, W.R., Bellovin, S.M., Rubin, A.D.: Firewalls and Internet Security, 2nd edn, p. 143. Addison-Wesley Longman Publishing Co., Boston (2003)

    Google Scholar 

  13. Thomas, D.: Hacker Culture, p. 48. University of Minnesota Press, Minneapolis (2002)

    Google Scholar 

  14. Pipkin, D.L.: Halting the Hacker: A Practical Guide to Computer Security, vol. 2, p. 143. Prentice Hall Professional Technical Reference, Upper Saddle River (2002)

    Google Scholar 

  15. Connor, J.: Hacking Become the Ultimate Hacker Computer Virus, Cracking, Malware, IT Security, p. 13 (2015)

    Google Scholar 

  16. https://www.zhihu.com/question/48691691

  17. Zhang, L.: On strategies of personal information protection in the personalized information service in big data times. ITM Web Conf. 7, 03002 (2016)

    Article  Google Scholar 

  18. https://www.cbsnews.com/news/the-data-brokers-selling-your-personal-information/

  19. http://www.yidianzixun.com/article/0JRvihvn

  20. http://news.163.com/10/0601/14/683OE4T200014AED.html

  21. Shen, W.: Online Privacy and Online Speech: The Problem of the Human Flesh Search Engine, vol. 12, p. 44 (2017)

    Google Scholar 

  22. http://tech.ifeng.com/a/20150420/41061128_0.shtml

  23. http://blog.sina.com.cn/s/blog_14143d9640102zhun.html

  24. https://ozziessay.com.au/essay-on-the-cyber-manhunt/

  25. https://bokonads.com/data-is-fallout-not-oil/

  26. https://baijiahao.baidu.com/s?id=1612195281113107306&wfr=spider&for=pc

  27. http://www.zaobao.com/zopinions/editorial/story20180420-852323

  28. http://www.npc.gov.cn/npc/xinwen/2016-11/07/content_2001605.htm

  29. https://www.thepaper.cn/newsDetail_forward_1685751

  30. He, Y.H., Zhou, F.: The first decade of human flesh search – an empirical study based on the theory of collective behavior. Mod. Commun. 3, 129–134 (2013)

    Google Scholar 

  31. Nian, F.Z., et al.: A Human Flesh Search Algorithm Based on Information Puzzle, pp. 1243–1248. School of Computer & Communication Lanzhou University of Technology (2018)

    Google Scholar 

  32. Lu, L., Huang, H.: A hierarchical scheme for vehicle make and model recognition from frontal images of vehicle. Trans. Intell. Transp. Syst. 20(5), 1774–1786 (2019)

    Article  Google Scholar 

  33. https://www.cert.org.cn/publish/main/9/2018/20180605080248533599764/20180605080248533599764_.html

  34. Wang, F.Y., et al.: A Study of the Human Flesh Search Engine: Crowd- Powered Expansion of Online Knowledge. The IEEE Computer Society, August 2010

    Google Scholar 

  35. https://medium.com/cryptomuse/how-the-nsa-caught-satoshi-nakamoto-868affcef595

  36. https://www.sohu.com/a/251655420_100112719

  37. https://www.infowars.com/david-motari-alleged-puppy-killer-tracked-down/#inline-comment

  38. http://news.ifeng.com/a/20150522/43814423_0.shtml

  39. http://www.doc88.com/p-7798661090872.html

  40. United States Government Accountability Office, “Internet Privacy,” June 2019. https://www.gao.gov/assets/700/696437.pdf

  41. Chi, E.H.: Information seeking can be social. Computer 42(3), 42–46 (2009)

    Article  Google Scholar 

  42. https://www.whatsonweibo.com/suspect-in-chinese-stewardess-didi-chuxing-murder-case-jumped-into-river/

  43. https://www.zhihu.com/question/31060463

  44. http://www.soundofhope.org/gb/2019/06/04/n2933086.html

  45. Yu, J.: Study on Legal Issues of Human Flesh Search, p. 23. Shandong University, April 2011

    Google Scholar 

  46. https://m.jiemian.com/article/1526703.html

  47. https://max.book118.com/html/2017/1001/135363839.shtm

  48. Anonymous: Maximum Security: A Hacker’s Guide to Protecting Your Internet Site and Network, Kybernetes, vol. 29, no. 1, p. 500 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sonali Chandel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chandel, S., Chen, Y., Dai, J., Huang, J. (2020). Cyber Manhunt. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Advances in Information and Communication. FICC 2020. Advances in Intelligent Systems and Computing, vol 1129. Springer, Cham. https://doi.org/10.1007/978-3-030-39445-5_64

Download citation

Publish with us

Policies and ethics