"Don't Break My Heart!": User Security Strategies for Online Dating (Short Paper)

  title={"Don't Break My Heart!": User Security Strategies for Online Dating (Short Paper)},
  author={Borke Obada-Obieh and Sonia Chiasson and Anil Somayaji},
Online dating sites require users to reveal information about themselves to find potential matches, yet users must also be wary of potential security and privacy threats. We conducted semi-structured interviews with 10 participants to better understand the various methods they employ to maintain their personal security and privacy while arranging to meet strangers in person. Specifically, we asked questions about how they validate the legitimacy of potential partners, how they safeguard their… Expand

Figures and Tables from this paper

Preserving User Privacy Through Ephemeral Sharing Design: A Large-Scale Randomized Field Experiment in the Online Dating Context
This work examined ephemeral sharing as a privacy-preserving mechanism to navigate the balance between users’ privacy concerns and information sharing in the initial interaction stages in online dating and finds that the observed effect on the matching outcomes is fully explained by the increases in requests with photo, a proxy of disinhibition. Expand
Balancing trust and privacy in computer-mediated introduction: featuring risk as a determinant for trustworthiness requirements elicitation
This work introduces risk as an extension of a method for eliciting trust-related software features for computer-mediated introduction so that software engineers can i) decide on the implementation of conflicting requirements in the problem space and ii) additionally reduce risks that accompany CMI use. Expand
Can I believe you?: Establishing Trust in Computer Mediated Introductions
It is found that existing mechanisms are not sufficient to establish meaningful trust in online dating, and some potential alternative mechanisms for establishing trust in CMIs are proposed. Expand
Building Trustworthiness in Computer-Mediated Introduction: A Facet-Oriented Framework
This work provides a conceptual framework for analyzing facets of trustworthiness that can influence trust in CMI systems and addresses these facets in software features that can have an impact on their perceived trustworthiness. Expand
Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement
This paper uses interviews with experts from government and private sectors who investigate cybercrimes as the main data gathering process and identifies several outstanding challenges faced by investigators, which pertain to practical, technical, and social issues such as systems availability, usability, and in computer-supported collaborative work. Expand
Automatically Dismantling Online Dating Fraud
This paper investigates the archetype of online dating profiles used in this form of fraud, including their use of demographics, profile descriptions, and images, shedding light on both the strategies deployed by scammers to appeal to victims and the traits of victims themselves. Expand
Individual differences and romantic compatibility: the relationship between personality traits, eligibility and ideal partner preference
This thesis explores the relationship between personality traits and ideal partner preference. It presents a review of the topic’s salient literature, specifically, research on: theories of romanticExpand
A System for Fake News Detection by using Supervised Learning Model for Social Media Contents
The evolution of ICTs has dramatically increased the number of people with internet access, which has altered the way the information is consumed. As a result, fake news has become one of the mainExpand


What's Love Got to Do with It? Exploring Online Dating Scams and Identity Fraud
IntroductionThe rapid development of information and communication technologies (ICTs) and the prevalence of the internet offer an alternative venue for romantic endeavors. Internet daters experienceExpand
What are the real and perceived risks and dangers of online dating? Perspectives from online daters
In this article, we explore what online daters perceive to be the risks of online dating, along with providing accounts of dangers and risky situations encountered by online daters. Between NovemberExpand
Stranger Danger? Women's Self-Protection Intent and the Continuing Stigma of Online Dating
As predicted, participants assigned greater importance to self-protective behavior after reading the online meeting scenario than the face-to-face scenario, and this tendency was especially strong among participants who had never been on a date with someone they had met online. Expand
On the differences between Tinder™ versus online dating agencies: Questioning a myth. An exploratory study
Abstract Despite common stereotypes about those who use different types of online dating, psychological research on online dating agency users’ characteristics is actually very limited, and noExpand
Quit Playing Games with My Heart: Understanding Online Dating Scams
It is shown that different types of scammers target a different demographics on the site, and therefore set up accounts with different characteristics, which shed light on the threats associated to online dating scams, and can help researchers and practitioners in developing effective countermeasures to fight them. Expand
The truth about lying in online dating profiles
Ground truth is established for 80 online daters' height, weight and age, and ground truth data is compared to the information provided in online dating profiles to suggest that deception is indeed frequently observed, but that the magnitude of the deceptions is usually small. Expand
Searching for a Mate
This article explores how the efficiency of Internet search is changing the way Americans find romantic partners. We use a new data source, the How Couples Meet and Stay Together survey. Results showExpand
Dating and intimacy in the 21st century: the use of online dating sites in Australia
This article examines the growing phenomenon of online dating and intimacy in the 21st century. The exponential rise of communications technologies, which is both reflective and constitutive of anExpand
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
It is concluded that PGP 5.0 is not usable enough to provide effective security for most computer users, despite its attractive graphical user interface, supporting the hypothesis that user interface design for effective security remains an open problem. Expand
Attitudes and Practices Regarding the Formation of Romantic Relationships on the Internet
Examination of young adults' attitudes and practices about using the Internet to facilitate the formation of intimate relationships indicates that viewing the sites did mediate opinions. Expand