Cyber Manhunt

Evaluation of Technologies and Practices for Effective Community Development and Maintenance
  • Sonali ChandelEmail author
  • Yanjun Chen
  • Jiale Dai
  • Jianyan Huang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1129)


Internet and its related technologies have become one of the most exciting innovations in the history of social development in recent times. However, along with many positive aspects of this virtual world, it has many side effects as well, which poses many risks and threats to its users and society. When it comes to the privacy of people, the damage the Internet can make should never be underestimated. Various governments and private organizations all over the world are spending a lot of time and money on cybersecurity options to make sure that their netizens are safe, and their data is protected in the cyberspace. However, despite all these efforts, some significant cyber issues are still not getting enough attention. “Cyber Manhunt” is one of these issues. Therefore, we plan to do our research to find the cause of cyber manhunt from various technology perspectives such as dark web, IP location, information filter, and some hacker’s technique. We will also investigate the positive aspects of cyber manhunt, along with the damages caused by cyber violence and information leakage during the process. We will study the current technologies that are misused to do cyber manhunt and suggest some solutions and improvements so that it can be used efficiently to minimize the damage caused to the victims. We hope that the results of our research can help individuals deepen the understanding of cyber manhunt. The results of this research can be used in studying the ethical issues of cyber manhunt and improve the technology behind information search and filtering in the future.


Cyber manhunt Cyber violence Cybersecurity Information leak Privacy Dark web Information filter IP location Hacker 


  1. 1.
    Cheung, A.S.Y.: A study of cyber-violence and internet service providers’ liability: lessons from China. Pac. Rim Law Policy J. Assoc. 1835(2), 336 (2009)Google Scholar
  2. 2.
  3. 3.
    Aggarwal, V.: Data security approach for right to information of developer. Int. J. Adv. Res. Comput. Sci. 4, 175–246, 292–293 (2010)Google Scholar
  4. 4.
    Marcher, M.: Security of World Wide Web Search Engines, p. 14 (1997)Google Scholar
  5. 5.
    Cheswick, W.R., Bellovin, S.M., Rubin, A.D.: Firewalls and Internet Security, 2nd edn, p. 143. Addison-Wesley Longman Publishing Co., USA (2003)Google Scholar
  6. 6.
    Capone, V.: The Human Flesh Search Engine: Democracy, Censorship, and Political Participation in Twenty-First Century China, p. 70 (2012)Google Scholar
  7. 7.
    Doody, J.: China’s Expanding Cyberspace. ECFR Asia Centre (2014)Google Scholar
  8. 8.
    Wei, J.: Why is ‘Human Flesh Search’ Only Popular in China (2011)Google Scholar
  9. 9.
    Zhuo, F.: A Behavioral Study of Chinese Online Human Flesh Communities: Modeling and Analysis with Social Networks (2012)Google Scholar
  10. 10.
    Yan, D., Cao, Y.: Cyber Cannibalism, China Daily, 2 January 2012.
  11. 11.
    Elisabeth, N.: The spiral of silence a theory of public opinion. J. Commun. 24(2), 43–51 (1974)CrossRefGoogle Scholar
  12. 12.
    Cheswick, W.R., Bellovin, S.M., Rubin, A.D.: Firewalls and Internet Security, 2nd edn, p. 143. Addison-Wesley Longman Publishing Co., Boston (2003)Google Scholar
  13. 13.
    Thomas, D.: Hacker Culture, p. 48. University of Minnesota Press, Minneapolis (2002)Google Scholar
  14. 14.
    Pipkin, D.L.: Halting the Hacker: A Practical Guide to Computer Security, vol. 2, p. 143. Prentice Hall Professional Technical Reference, Upper Saddle River (2002)Google Scholar
  15. 15.
    Connor, J.: Hacking Become the Ultimate Hacker Computer Virus, Cracking, Malware, IT Security, p. 13 (2015)Google Scholar
  16. 16.
  17. 17.
    Zhang, L.: On strategies of personal information protection in the personalized information service in big data times. ITM Web Conf. 7, 03002 (2016)CrossRefGoogle Scholar
  18. 18.
  19. 19.
  20. 20.
  21. 21.
    Shen, W.: Online Privacy and Online Speech: The Problem of the Human Flesh Search Engine, vol. 12, p. 44 (2017)Google Scholar
  22. 22.
  23. 23.
  24. 24.
  25. 25.
  26. 26.
  27. 27.
  28. 28.
  29. 29.
  30. 30.
    He, Y.H., Zhou, F.: The first decade of human flesh search – an empirical study based on the theory of collective behavior. Mod. Commun. 3, 129–134 (2013)Google Scholar
  31. 31.
    Nian, F.Z., et al.: A Human Flesh Search Algorithm Based on Information Puzzle, pp. 1243–1248. School of Computer & Communication Lanzhou University of Technology (2018)Google Scholar
  32. 32.
    Lu, L., Huang, H.: A hierarchical scheme for vehicle make and model recognition from frontal images of vehicle. Trans. Intell. Transp. Syst. 20(5), 1774–1786 (2019)CrossRefGoogle Scholar
  33. 33.
  34. 34.
    Wang, F.Y., et al.: A Study of the Human Flesh Search Engine: Crowd- Powered Expansion of Online Knowledge. The IEEE Computer Society, August 2010Google Scholar
  35. 35.
  36. 36.
  37. 37.
  38. 38.
  39. 39.
  40. 40.
    United States Government Accountability Office, “Internet Privacy,” June 2019.
  41. 41.
    Chi, E.H.: Information seeking can be social. Computer 42(3), 42–46 (2009)CrossRefGoogle Scholar
  42. 42.
  43. 43.
  44. 44.
  45. 45.
    Yu, J.: Study on Legal Issues of Human Flesh Search, p. 23. Shandong University, April 2011Google Scholar
  46. 46.
  47. 47.
  48. 48.
    Anonymous: Maximum Security: A Hacker’s Guide to Protecting Your Internet Site and Network, Kybernetes, vol. 29, no. 1, p. 500 (2000)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Sonali Chandel
    • 1
    Email author
  • Yanjun Chen
    • 1
  • Jiale Dai
    • 1
  • Jianyan Huang
    • 1
  1. 1.College of Engineering and Computing SciencesNew York Institute of TechnologyNanjingChina

Personalised recommendations