Social Media Identity Manipulation: A Review in the Context of Industry 4.0 and Society 5.0

Eric Gideon, Ahmad Rifqi Mohd Jerome Rinjes, Nurul Fathia Mohamand Noor, M. Masrom
{"title":"Social Media Identity Manipulation: A Review in the Context of Industry 4.0 and Society 5.0","authors":"Eric Gideon, Ahmad Rifqi Mohd Jerome Rinjes, Nurul Fathia Mohamand Noor, M. Masrom","doi":"10.11113/sh.v16n1.2046","DOIUrl":null,"url":null,"abstract":"Industry 4.0 shaped Society 5.0 which focused heavily on people and gave equal merit to economic development and the resolution of public issues through the utilization of a system that immensely incorporates both cyber and reality. Cyberspace such as media social is heavily used and allows users to become completely anonymous which ultimately gave birth to a new type of crime such as identity manipulation. The advancement of technology has made it simpler for an average person to change the mannerisms, appearance, and physical makeup of another human being, which is often done without their knowledge.  When it comes to identity manipulation done by an individual or law enforcement even for a good reason, arguments may ensue. Is it wrong for an individual or law enforcement to pull off identity manipulation in order to lure internet predators or to deter crime by arresting the perpetrator before the crime happened? Isn't this act can be viewed as the act of deceiving somebody into violating the law? These examples of formal arguments about the appropriate course of action that needs to be taken when confronted with a moral issue are known as ethical theories. The aim of this paper is to discuss the three different Ethical Theories including Kantianism, Utilitarianism, and Devine Command Theory on social media identity manipulation in the context of Industry 4.0 and Society 5.0 using secondary data and information acquired from the literature review. Finally, we can reach the conclusion that what is ethically right in societies should be respected and that people should never be used for another's self-gain.","PeriodicalId":407354,"journal":{"name":"Sains Humanika","volume":"99 2","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sains Humanika","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11113/sh.v16n1.2046","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Industry 4.0 shaped Society 5.0 which focused heavily on people and gave equal merit to economic development and the resolution of public issues through the utilization of a system that immensely incorporates both cyber and reality. Cyberspace such as media social is heavily used and allows users to become completely anonymous which ultimately gave birth to a new type of crime such as identity manipulation. The advancement of technology has made it simpler for an average person to change the mannerisms, appearance, and physical makeup of another human being, which is often done without their knowledge.  When it comes to identity manipulation done by an individual or law enforcement even for a good reason, arguments may ensue. Is it wrong for an individual or law enforcement to pull off identity manipulation in order to lure internet predators or to deter crime by arresting the perpetrator before the crime happened? Isn't this act can be viewed as the act of deceiving somebody into violating the law? These examples of formal arguments about the appropriate course of action that needs to be taken when confronted with a moral issue are known as ethical theories. The aim of this paper is to discuss the three different Ethical Theories including Kantianism, Utilitarianism, and Devine Command Theory on social media identity manipulation in the context of Industry 4.0 and Society 5.0 using secondary data and information acquired from the literature review. Finally, we can reach the conclusion that what is ethically right in societies should be respected and that people should never be used for another's self-gain.
社交媒体身份操纵:工业 4.0 和社会 5.0 背景下的回顾
工业 4.0 造就了社会 5.0,社会 5.0 高度关注人,通过利用网络和现实相结合的系统,将经济发展和解决公共问题放在同等重要的位置。媒体社交等网络空间被大量使用,用户可以完全匿名,这最终催生了新型犯罪,如身份操纵。技术的进步使普通人更容易改变他人的言行举止、外貌和身体构造,而这往往是在他人不知情的情况下完成的。 说到个人或执法部门出于正当理由操纵他人身份的行为,可能会引发争论。个人或执法部门为了引诱网络掠夺者或在犯罪发生前逮捕犯罪者以阻止犯罪而进行身份操纵,这样做有错吗?这种行为难道不可以被视为欺骗他人违反法律的行为吗?这些关于在面对道德问题时需要采取的适当行动的正式论证的例子被称为伦理理论。本文旨在利用从文献综述中获得的二手数据和信息,就工业 4.0 和社会 5.0 背景下的社交媒体身份操纵问题讨论三种不同的伦理理论,包括康德主义、功利主义和戴文命令理论。最后,我们可以得出这样的结论:在社会中,伦理上正确的东西应该得到尊重,人永远不应该被用来为他人谋取私利。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信