Social Media Identity Manipulation: A Review in the Context of Industry 4.0 and Society 5.0
DOI:
https://doi.org/10.11113/sh.v16n1.2046Keywords:
Ethical Theories, Information and Communication Technology, Identity Manipulation, Industry 4.0, Society 5.0Abstract
Industry 4.0 shaped Society 5.0 which focused heavily on people and gave equal merit to economic development and the resolution of public issues through the utilization of a system that immensely incorporates both cyber and reality. Cyberspace such as media social is heavily used and allows users to become completely anonymous which ultimately gave birth to a new type of crime such as identity manipulation. The advancement of technology has made it simpler for an average person to change the mannerisms, appearance, and physical makeup of another human being, which is often done without their knowledge. When it comes to identity manipulation done by an individual or law enforcement even for a good reason, arguments may ensue. Is it wrong for an individual or law enforcement to pull off identity manipulation in order to lure internet predators or to deter crime by arresting the perpetrator before the crime happened? Isn't this act can be viewed as the act of deceiving somebody into violating the law? These examples of formal arguments about the appropriate course of action that needs to be taken when confronted with a moral issue are known as ethical theories. The aim of this paper is to discuss the three different Ethical Theories including Kantianism, Utilitarianism, and Devine Command Theory on social media identity manipulation in the context of Industry 4.0 and Society 5.0 using secondary data and information acquired from the literature review. Finally, we can reach the conclusion that what is ethically right in societies should be respected and that people should never be used for another's self-gain.
References
Mensah, R. O., & Agyemang, E. (2020). A comparative philosophical analysis of the Kantian principle of moral theory and the utilitarian theory: Applications and critiques. Journal of Humanities and Social Sciences, 3(3), 127-131. doi:10.33140/jhss.03.03.02
Jemberie, A. T. (2017). A Critical Analysis of Immanuel Kant’s Groundwork of the Metaphysics of Morals. International Journal of Research & Review, 4, 54. www.ijrrjournal.com
Dunn, S. (2020). Identity manipulation: Responding to advances in artificial intelligence and Robotics. Social Sciences Research Network (SSRN) Electronic Journal. doi:10.2139/ssrn.3772057
Ross, E. (2021). Father poses as underage minor to catch child predators; police make multiple arrests. Retrieved November 15, 2022, from https://www.koaa.com/news/news5-investigates/father-poses-as-underage-minor-to-catch-child-predators-police-make-multiple-arrests
Abubakar Zaria Ibrahim. 2021. “A Critique of The Divine Command Theory Of Ethics From The Teachings Of The Abrahamic Religions.” Retrieved November 13, 2022 (Https://Www.Researchgate.Net/Publication/353716005_A_Critique_Of_The_Divine_Command_Theory_Of_Ethics_From_The_Teachings_Of_The_Abrahamic_Religions).
Berghel, Hal. (2012). “Identity Theft and Financial Fraud: Some Strangeness in the Proportions.” Computer 45(1), 86–89. doi: 10.1109/MC.2012.16.
Goode, Sigi, and David Lacey. 2018. “Designing and Evaluating Two Interventions to Improve Identity Theft Recovery Outcomes.” International Symposium on Technology and Society, Proceedings 2017-August:1–6. doi: 10.1109/ISTAS.2017.8318976.
Helser, Susan. 2016. “FIT: Identity Theft Education: Study of Text-Based versus Game-Based Learning.” International Symposium on Technology and Society, Proceedings 2016-March. doi: 10.1109/ISTAS.2015.7439437.
Amichai-Hamburger, Y., Segovia, K. Y., & Bailenson, J. N. (2013). Identity Manipulation—What Happens When Identity Presentation is Not Truthful. In The social net understanding our online behaviour, 2, 45–61. essay, Oxford University Press.
Walker-Roberts, S., Hammoudeh, M., & Dehghantanha, A. (2018). A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access, 6, 25167–25177. https://doi.org/10.1109/access.2018.2817560
Alibašić, H., & Rose, J. (2019). Fake news in context: Truth and untruths. Public Integrity, 21(5), 463–468. https://doi.org/10.1080/10999922.2019.1622359
Wubet, W. M. (2020). The deepfake challenges and deepfake video detection. International Journal of Innovative Technology and Exploring Engineering, 9(6), 789–796. https://doi.org/10.35940/ijitee.e2779.049620
Westerlund, M. (2019). The emergence of Deepfake Technology: A Review. Technology Innovation Management Review, 9(11), 39–52. https://doi.org/10.22215/timreview/1282
Diakopoulos, N., & Johnson, D. (2019). Anticipating and Addressing the Ethical Implications of Deepfakes in the Context of Elections. Social Sciences Research Network (SSRN) Electronic Journal. https://doi.org/10.2139/SSRN.3474183
Chesney, R., & Citron, D. K. (2018). Deep Fakes: A looming challenge for privacy, democracy, and national security. Social Sciences Research Network (SSRN) Electronic Journal. https://doi.org/10.2139/ssrn.3213954
Rahim, Z. (2020, December 25). 'Deepfake' queen delivers alternative Christmas speech, in warning about misinformation. Cable News Network. Retrieved January 26, 2023, from https://edition.cnn.com/2020/12/25/uk/deepfake-queen-speech-christmas-intl-gbr/index.html
Atske, S. (2022, February 9). News use across social media platforms in 2020. Pew Research Center's Journalism Project. Retrieved January 27, 2023, from https://www.pewresearch.org/journalism/2021/01/12/news-use-across-social-media-platforms-in-2020/
Jaiman, A. (2020). Debating the ethics of deepfakes. Observer Research Foundation. Retrieved January 26, 2023, from https://www.orfonline.org/expert-speak/debating-the-ethics-of-deepfakes/
Liau, David, Razieh Nokhbeh Zaeem, and K. Suzanne Barber. 2020. “A Survival Game Analysis to Personal Identity Protection Strategies.” Proceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020 209–17. doi: 10.1109/TPS-ISA50397.2020.00036.
Leyla Polat. 2021. Industry 4.0 vs. Society 5.0. Retrieved November 24, 2022, from (https://www.researchgate.net/publication/346402191_Industry_40_vs_Society_50)
Carr, C. T., & Hayes, R. A. (2015). Social Media: Defining, Developing, and Divining. Atlantic Journal of Communication, 23(1), 46–65. https://doi.org/10.1080/15456870.2015.972282
DiNardo, D. (2012). Identity theft. Handbook of Loss Prevention and Crime Prevention, 22(2), 420–422. https://doi.org/10.1016/B978-0-12-385246-5.00034-1
Fukuyama, M. (2018). Society 5.0: Aiming for a New Human-centered Society. Japan Spotlight, 2(1) (August), 8–13.
Lai, F., Li, D., & Hsieh, C. T. (2012). Fighting identity theft: The coping perspective. Decision Support Systems, 52(2), 353–363. https://doi.org/10.1016/j.dss.2011.09.002
Marr, B. (2018). What is Industry 4.0? Here’s A Super Easy Explanation for Anyone, Forbes. Forbes Media LLC.
Pereira, A. G., Lima, T. M., & Charrua-Santos, F. (2020). Industry 4.0 and Society 5.0: Opportunities and Threats. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 3305–3308. https://doi.org/10.35940/ijrte.d8764.018520
Potočan, V., Mulej, M., & Nedelko, Z. (2021). Society 5.0: balancing of Industry 4.0, economic advancement and social problems. Kybernetes, 50(3), 794–811. https://doi.org/10.1108/K-12-2019-0858
Scarre, G. (2020). Utilitarianism. Routledge. Taylor and Francis Group
Simpson, B. (2005). Identity manipulation in cyberspace as a leisure option: Play and the exploration of self. Information and Communications Technology Law, 14(2), 115–131. https://doi.org/10.1080/13600830500042632
Sithy, H. (2020). Social Media in the Context of Industry 4.0. 2(12). www.cd-center.org
Yilmaz, İ. G., Aygün, D., & Tanrikulu, Z. (2017). Social Media’s Perspective on Industry 4.0: A Twitter Analysis. Social Networking, 06(04), 251–261. https://doi.org/10.4236/sn.2017.64017
Kelligrant. (2018, April 24). Identity theft isn't just an adult problem. kids are victims, too. Consumer News and Business Channel. Retrieved January 28, 2023, from https://www.cnbc.com/2018/04/24/child-identity-theft-is-a-growing-and-expensive-problem.html
Sirola, A., Kaakinen, M., Savolainen, I., Paek, H.-J., Zych, I., & Oksanen, A. (2021). Online identities and social influence in social media gambling exposure: A four-country study on young people. Telematics and Informatics, 60, 101582. https://doi.org/10.1016/j.tele.2021.101582
Stephen, O. O. (2021). Information Technology, technical vocational education in developing workforce towards globalization. Research Anthology on Business and Technical Education in the Information Era, 631–648. https://doi.org/10.4018/978-1-7998-5345-9.ch035
Rath, D. K., & Kumar, A. (2021). Information privacy concern at individual, group, organization and Societal Level - A Literature Review. Vilakshan - XIMB Journal of Management, 18(2), 171–186. https://doi.org/10.1108/xjm-08-2020-0096
Han, J. (2022). An information ethics framework based on ICT platforms. Information, 13(9), 440. https://doi.org/10.3390/info13090440