Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3678884.3681889acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article
Open access

A First Look into Fake Profiles on Social Media through the Lens of Victim's Experiences

Published: 13 November 2024 Publication History

Abstract

With the rise in online social media usage, fake user profiles are becoming prevalent concerns. A body of work suggested machine learning-based models to identify fake profiles, however, the accuracy and applicability of those techniques are still at large. A little study to date, considered end users in the loop, to understand the strategies of intruders, and the reactions of victims. We begin to address this gap in our work, where we aim to look through the lens of users' perceptions who had prior experiences of interacting with fake profiles on social media (i.e., victims of fake profiles). To this end, we conducted semi-structured interviews with 26 participants. Our findings unpack the viewpoints of fake-profile victims, with regard to intruders' traits and strategies to befriend them on social media, as well as their reactions when they realize that they have interacted with a fake profile. Based on our findings, we provide recommendations on empowering and supporting social media users in order to alleviate their vulnerability to online exploitation.

References

[1]
Fatih Cagatay Akyon and M Esat Kalfaoglu. 2019. Instagram fake and automated account detection. In 2019 Innovations in intelligent systems and applications conference (ASYU). IEEE, 1--7.
[2]
Mazhar Javed Awan, Muhammad Asad Khan, Zain Khalid Ansari, Awais Yasin, and Hafiz Muhammad Faisal Shehzad. 2022. Fake profile recognition using big data analytics in social media platforms. International Journal of Computer Applications in Technology, Vol. 68, 3 (2022), 215--222.
[3]
Kathy Baxter, Catherine Courage, and Kelly Caine. 2015. Understanding your users: a practical guide to user research methods. Morgan Kaufmann.
[4]
Nasib Singh Gill Bharti and Preeti Gulia. 2023. Exploring machine learning techniques for fake profile detection in online social networks. International Journal of Electrical and Computer Engineering (IJECE), Vol. 13, 3 (2023), 2962--2971.
[5]
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. 2011. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th annual computer security applications conference. 93--102.
[6]
Richard E Boyatzis. 1998. Transforming qualitative information: Thematic analysis and code development. sage.
[7]
Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology, Vol. 3, 2 (2006), 77--101.
[8]
Vasilka Chergarova, Vinicius Arcanjo, Mel Tomeo, Jeronimo Bezerra, Luis Marin Vera, and Anthony Uloa. 2022. Cryptocurrency fraud: A study on the characteristics of criminals who are using fake profiles on a social media platform to persuade individuals to invest into cryptocurrency. Issues in Information Systems, Vol. 23, 3 (2022).
[9]
Emmanuel Etuh, Francis S Bakpo, et al. 2022. Social Media Networks Attacks and their Preventive Mechanisms: A Review. arXiv preprint arXiv:2201.03330 (2022).
[10]
Matthias Fassl, Alexander Ponticello, Adrian Dabrowski, and Katharina Krombholz. 2023. Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon. Proceedings of the ACM on Human-Computer Interaction, Vol. 7, CSCW2 (2023), 1--26.
[11]
Michael Fire, Dima Kagan, Aviad Elyashar, and Yuval Elovici. 2014. Friend or foe Fake profile identification in online social networks. Social Network Analysis and Mining, Vol. 4, 1 (2014), 1--23.
[12]
AKM Rubaiyat Reza Habib, Edidiong Elijah Akpan, Bhaskar Ghosh, and Indira Kalyan Dutta. 2024. Techniques to detect fake profiles on social media using the new age algorithms-A Survey. In 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 0329--0335.
[13]
Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. ...No One Can Hack My Mind: Comparing Expert and Non-Expert Security Practices. In Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security (Ottawa, Canada) (SOUPS '15). USENIX Association, USA, 327--346.
[14]
Shruti Joshi, Himanshi Gupta Nagariya, Neha Dhanotiya, and Sarika Jain. 2020. Identifying fake profile in online social network: An overview and survey. In Machine Learning, Image Processing, Network Security and Data Sciences: Second International Conference, MIND 2020, Silchar, India, July 30--31, 2020, Proceedings, Part I 2. Springer, 17--28.
[15]
Sarah Khaled, Neamat El-Tazi, and Hoda MO Mokhtar. 2018. Detecting fake accounts on social media. In 2018 IEEE international conference on big data (big data). IEEE, 3672--3681.
[16]
Priyanka Kumari and Nemi Chandra Rathore. 2018. Fake profile identification on Facebook through SocialMedia app. In Information and Communication Technology for Sustainable Development: Proceedings of ICT4SD 2016, Volume 2. Springer, 83--90.
[17]
Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley, Richard Shay, and Blase Ur. 2013. Measuring Password Guessability for an Entire University. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (Berlin, Germany) (CCS '13). Association for Computing Machinery, New York, NY, USA, 173--186. https://doi.org/10.1145/2508859.2516726
[18]
Emilee Rader, Rick Wash, and Brandon Brooks. 2012. Stories as informal lessons about security. In Proceedings of the Eighth Symposium on Usable Privacy and Security. 1--17.
[19]
Pradeep Kumar Roy and Shivam Chahar. 2020. Fake profile detection on social networking websites: a comprehensive review. IEEE Transactions on Artificial Intelligence, Vol. 1, 3 (2020), 271--285.
[20]
Christopher Sandy, Patrice Rusconi, and Shujun Li. 2017. Can humans detect the authenticity of social media accounts?. In 3rd IEEE International Conference on Cybernetics (CYBCONF-2017).
[21]
Sovantharith Seng, Huzeyfe Kocabas, Mahdi Nasrullah Al-Ameen, and Matthew Wright. 2019. Poster: Understanding Users Decision to Interact with Potential Phishing Posts on Facebook Using a Vignette Study. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (London, United Kingdom) (CCS '19). Association for Computing Machinery, New York, NY, USA, 2617--2619. https://doi.org/10.1145/3319535.3363270
[22]
Ankit Shrestha, Arezou Behfar, and Mahdi Nasrullah Al-Ameen. 2024. It is Luring You to Click on the Link With False Advertising-Mental Models of Clickbait and Its Impact on Users Perceptions and Behavior Towards Clickbait Warnings. International Journal of Human-Computer Interaction (2024), 1--19.
[23]
A Shrestha, A Flood, B Hackler, A Behfar, and MN Al-Ameen. 2024. TOWARDS THE DESIGN AND EVALUATION OF CLICKBAIT EDUCATION CONTENT: LEVERAGING USER MENTAL MODELS AND LEARNING SCIENCE PRINCIPLES. In INTED2024 Proceedings. IATED, 1794--1804.
[24]
Ankit Shrestha, Audrey Flood, Saniat Sohrawardi, Matthew Wright, and Mahdi Nasrullah Al-Ameen. 2024. A First Look into Targeted Clickbait and its Countermeasures: The Power of Storytelling. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1--23.
[25]
Ankit Shrestha, Danielle M Graham, Prakriti Dumaru, Rizu Paudel, Kristin A Searle, and Mahdi Nasrullah Al-Ameen. 2022. Understanding the Behavior, Challenges, and Privacy Risks in Digital Technology Use by Nursing Professionals. Proceedings of the ACM on Human-Computer Interaction, Vol. 6, CSCW2 (2022), 1--22.
[26]
Sharifa Sultana, Pratyasha Saha, Shaid Hasan, SM Raihanul Alam, Rokeya Akter, Md Mirajul Islam, Raihan Islam Arnob, AKM Najmul Islam, Mahdi Nasrullah Al-Ameen, and Syed Ishtiaque Ahmed. 2022. Imagined Online Communities: Communionship, Sovereignty, and Inclusiveness in Facebook Groups. Proceedings of the ACM on Human-Computer Interaction, Vol. 6, CSCW2 (2022), 1--29.
[27]
Catalina Laura Toma. 2014. Counting on friends: Cues to perceived trustworthiness in Facebook profiles. In Eighth International AAAI Conference on Weblogs and Social Media.
[28]
Leonie van Grootel, Lakshmi Balachandran Nair, Irene Klugkist, and Floryt van Wesel. 2020. Quantitizing findings from qualitative studies for integration in mixed methods reviewing. Research synthesis methods, Vol. 11, 3 (2020), 413--425.
[29]
Putra Wanda and Huang Jin Jie. 2020. DeepProfile: Finding fake profile in online social network using dynamic CNN. Journal of Information Security and Applications, Vol. 52 (2020), 102465.
[30]
Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam Metzger, Haitao Zheng, and Ben Y Zhao. 2012. Social turing tests: Crowdsourcing sybil detection. arXiv preprint arXiv:1205.3856 (2012).
[31]
Mudasir Ahmad Wani, Suraiya Jabin, Ghulam Yazdani, and Nehaluddin Ahmadd. 2018. Sneak into devil's colony-A study of fake profiles in online social networks and the cyber law. arXiv preprint arXiv:1803.08810 (2018).
[32]
Rick Wash. 2010. Folk models of home computer security. In Proceedings of the Sixth Symposium on Usable Privacy and Security. 1--16.

Index Terms

  1. A First Look into Fake Profiles on Social Media through the Lens of Victim's Experiences

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CSCW Companion '24: Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing
      November 2024
      755 pages
      ISBN:9798400711145
      DOI:10.1145/3678884
      This work is licensed under a Creative Commons Attribution International 4.0 License.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 13 November 2024

      Check for updates

      Author Tags

      1. fake profiles
      2. online social media
      3. semi-structured interview

      Qualifiers

      • Research-article

      Conference

      CSCW '24
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

      Upcoming Conference

      CSCW '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 43
        Total Downloads
      • Downloads (Last 12 months)43
      • Downloads (Last 6 weeks)43
      Reflects downloads up to 18 Nov 2024

      Other Metrics

      Citations

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media