Social Media Identity Manipulation: A Review in the Context of Industry 4.0 and Society 5.0


  • Eric Gideon Razak Faculty of Technology and Informatics, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, Malaysia
  • Ahmad Rifqi Mohd Jerome Rinjes Razak Faculty of Technology and Informatics, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, Malaysia
  • Nurul Fathia Mohamand Noor Razak Faculty of Technology and Informatics, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, Malaysia
  • Maslin Masrom Razak Faculty of Technology and Informatics, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, Malaysia



Ethical Theories, Information and Communication Technology, Identity Manipulation, Industry 4.0, Society 5.0


Industry 4.0 shaped Society 5.0 which focused heavily on people and gave equal merit to economic development and the resolution of public issues through the utilization of a system that immensely incorporates both cyber and reality. Cyberspace such as media social is heavily used and allows users to become completely anonymous which ultimately gave birth to a new type of crime such as identity manipulation. The advancement of technology has made it simpler for an average person to change the mannerisms, appearance, and physical makeup of another human being, which is often done without their knowledge.  When it comes to identity manipulation done by an individual or law enforcement even for a good reason, arguments may ensue. Is it wrong for an individual or law enforcement to pull off identity manipulation in order to lure internet predators or to deter crime by arresting the perpetrator before the crime happened? Isn't this act can be viewed as the act of deceiving somebody into violating the law? These examples of formal arguments about the appropriate course of action that needs to be taken when confronted with a moral issue are known as ethical theories. The aim of this paper is to discuss the three different Ethical Theories including Kantianism, Utilitarianism, and Devine Command Theory on social media identity manipulation in the context of Industry 4.0 and Society 5.0 using secondary data and information acquired from the literature review. Finally, we can reach the conclusion that what is ethically right in societies should be respected and that people should never be used for another's self-gain.


Mensah, R. O., & Agyemang, E. (2020). A comparative philosophical analysis of the Kantian principle of moral theory and the utilitarian theory: Applications and critiques. Journal of Humanities and Social Sciences, 3(3), 127-131. doi:10.33140/jhss.03.03.02

Jemberie, A. T. (2017). A Critical Analysis of Immanuel Kant’s Groundwork of the Metaphysics of Morals. International Journal of Research & Review, 4, 54.

Dunn, S. (2020). Identity manipulation: Responding to advances in artificial intelligence and Robotics. Social Sciences Research Network (SSRN) Electronic Journal. doi:10.2139/ssrn.3772057

Ross, E. (2021). Father poses as underage minor to catch child predators; police make multiple arrests. Retrieved November 15, 2022, from

Abubakar Zaria Ibrahim. 2021. “A Critique of The Divine Command Theory Of Ethics From The Teachings Of The Abrahamic Religions.” Retrieved November 13, 2022 (Https://Www.Researchgate.Net/Publication/353716005_A_Critique_Of_The_Divine_Command_Theory_Of_Ethics_From_The_Teachings_Of_The_Abrahamic_Religions).

Berghel, Hal. (2012). “Identity Theft and Financial Fraud: Some Strangeness in the Proportions.” Computer 45(1), 86–89. doi: 10.1109/MC.2012.16.

Goode, Sigi, and David Lacey. 2018. “Designing and Evaluating Two Interventions to Improve Identity Theft Recovery Outcomes.” International Symposium on Technology and Society, Proceedings 2017-August:1–6. doi: 10.1109/ISTAS.2017.8318976.

Helser, Susan. 2016. “FIT: Identity Theft Education: Study of Text-Based versus Game-Based Learning.” International Symposium on Technology and Society, Proceedings 2016-March. doi: 10.1109/ISTAS.2015.7439437.

Amichai-Hamburger, Y., Segovia, K. Y., & Bailenson, J. N. (2013). Identity Manipulation—What Happens When Identity Presentation is Not Truthful. In The social net understanding our online behaviour, 2, 45–61. essay, Oxford University Press.

Walker-Roberts, S., Hammoudeh, M., & Dehghantanha, A. (2018). A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access, 6, 25167–25177.

Alibašić, H., & Rose, J. (2019). Fake news in context: Truth and untruths. Public Integrity, 21(5), 463–468.

Wubet, W. M. (2020). The deepfake challenges and deepfake video detection. International Journal of Innovative Technology and Exploring Engineering, 9(6), 789–796.

Westerlund, M. (2019). The emergence of Deepfake Technology: A Review. Technology Innovation Management Review, 9(11), 39–52.

Diakopoulos, N., & Johnson, D. (2019). Anticipating and Addressing the Ethical Implications of Deepfakes in the Context of Elections. Social Sciences Research Network (SSRN) Electronic Journal.

Chesney, R., & Citron, D. K. (2018). Deep Fakes: A looming challenge for privacy, democracy, and national security. Social Sciences Research Network (SSRN) Electronic Journal.

Rahim, Z. (2020, December 25). 'Deepfake' queen delivers alternative Christmas speech, in warning about misinformation. Cable News Network. Retrieved January 26, 2023, from

Atske, S. (2022, February 9). News use across social media platforms in 2020. Pew Research Center's Journalism Project. Retrieved January 27, 2023, from

Jaiman, A. (2020). Debating the ethics of deepfakes. Observer Research Foundation. Retrieved January 26, 2023, from

Liau, David, Razieh Nokhbeh Zaeem, and K. Suzanne Barber. 2020. “A Survival Game Analysis to Personal Identity Protection Strategies.” Proceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020 209–17. doi: 10.1109/TPS-ISA50397.2020.00036.

Leyla Polat. 2021. Industry 4.0 vs. Society 5.0. Retrieved November 24, 2022, from (

Carr, C. T., & Hayes, R. A. (2015). Social Media: Defining, Developing, and Divining. Atlantic Journal of Communication, 23(1), 46–65.

DiNardo, D. (2012). Identity theft. Handbook of Loss Prevention and Crime Prevention, 22(2), 420–422.

Fukuyama, M. (2018). Society 5.0: Aiming for a New Human-centered Society. Japan Spotlight, 2(1) (August), 8–13.

Lai, F., Li, D., & Hsieh, C. T. (2012). Fighting identity theft: The coping perspective. Decision Support Systems, 52(2), 353–363.

Marr, B. (2018). What is Industry 4.0? Here’s A Super Easy Explanation for Anyone, Forbes. Forbes Media LLC.

Pereira, A. G., Lima, T. M., & Charrua-Santos, F. (2020). Industry 4.0 and Society 5.0: Opportunities and Threats. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 3305–3308.

Potočan, V., Mulej, M., & Nedelko, Z. (2021). Society 5.0: balancing of Industry 4.0, economic advancement and social problems. Kybernetes, 50(3), 794–811.

Scarre, G. (2020). Utilitarianism. Routledge. Taylor and Francis Group

Simpson, B. (2005). Identity manipulation in cyberspace as a leisure option: Play and the exploration of self. Information and Communications Technology Law, 14(2), 115–131.

Sithy, H. (2020). Social Media in the Context of Industry 4.0. 2(12).

Yilmaz, İ. G., Aygün, D., & Tanrikulu, Z. (2017). Social Media’s Perspective on Industry 4.0: A Twitter Analysis. Social Networking, 06(04), 251–261.

Kelligrant. (2018, April 24). Identity theft isn't just an adult problem. kids are victims, too. Consumer News and Business Channel. Retrieved January 28, 2023, from

Sirola, A., Kaakinen, M., Savolainen, I., Paek, H.-J., Zych, I., & Oksanen, A. (2021). Online identities and social influence in social media gambling exposure: A four-country study on young people. Telematics and Informatics, 60, 101582.

Stephen, O. O. (2021). Information Technology, technical vocational education in developing workforce towards globalization. Research Anthology on Business and Technical Education in the Information Era, 631–648.

Rath, D. K., & Kumar, A. (2021). Information privacy concern at individual, group, organization and Societal Level - A Literature Review. Vilakshan - XIMB Journal of Management, 18(2), 171–186.

Han, J. (2022). An information ethics framework based on ICT platforms. Information, 13(9), 440.




How to Cite

Gideon, E., Mohd Jerome Rinjes, A. R., Mohamand Noor, N. F., & Masrom, M. (2023). Social Media Identity Manipulation: A Review in the Context of Industry 4.0 and Society 5.0 . Sains Humanika, 16(1), 1–7.