Fake identities in social media: A case study on the sustainability of the Facebook business model

@article{Krombholz2012FakeII,
  title={Fake identities in social media: A case study on the sustainability of the Facebook business model},
  author={Katharina Krombholz and Dieter Merkl and Edgar R. Weippl},
  journal={Journal of Service Science Research},
  year={2012},
  volume={4},
  pages={175-212}
}
Social networks such as Facebook, Twitter and Google+ have attracted millions of users in the last years. One of the most widely used social networks, Facebook, recently had an initial public offering (IPO) in May 2012, which was among the biggest in Internet technology. Forprofit and nonprofit organizations primarily use such platforms for target-oriented advertising and large-scale marketing campaigns. Social networks have attracted worldwide attention because of their potential to address… Expand
SPAM DETECTION ISSUES AND SPAM IDENTIFICATION OF FAKE PROFILES ON SOCIAL NETWORKS
  • 2017
Spam has been a major and global threat, Social networks have become our daily live and everyday tools, while different social networks have different target groups. With the rapid growth of socialExpand
Sybil Defense Techniques in Online Social Networks: A Survey
TLDR
A comprehensive survey of literature from 2006 to 2016 on Sybil attacks in online social networks and use of social networks as a tool to analyze and prevent these attack types is provided. Expand
A sneak into the Devil's Colony - Fake Profiles in Online Social Networks
TLDR
Various types of OSN threat generators like compromised profiles, cloned profiles and online bots (spam bots, social bots, like bots and influential bots) have been classified and an attempt is made to present several categories of features that have been used to train classifiers in order to identify a fake profile. Expand
Today's social network sites: An analysis of emerging security risks and their counter measures
The concept of social networking sites boomed in this modern era of globalization as it opens the door for the people to communicate with each other despite thinking about geographical distances.Expand
Social Network Analysis & Information Disclosure: A Case Study
TLDR
The analysis of the results seem to suggest that the majority of users were mainly using Facebook, despite of concerns raised about the disclosure of personal information on social network sites, users continue to disclose huge quantity ofpersonal information, they find that reading privacy policy is time consuming and changes made can result into improper settings. Expand
Utilizing Social Media in Modern Business
Social media has become one of the most popular applications over the Internet (Zhang, Lin, & Wang, 2013). Social networking sites (SNSs), such as Facebook and Twitter, gain the increasing popularityExpand
Cyber Security Challenges in Social Media
Recent actions by social media platforms have sparked a new debate on the privacy of users. There have been reports of user data being sold to third parties and personal data being accessed forExpand
Identifying Fake Profiles in LinkedIn
TLDR
This research identifies the minimal set of profile data that are necessary for identifying fake profiles in LinkedIn and identifies the appropriate data mining approach for such task and demonstrates that with limited profile data this approach can identify the fake profile with 84% accuracy and only 2.44% false negative. Expand
Developing a Regulatory and Control Frameworks for Enhancing the Security of Facebook Users
Nowadays Social Media services are performing an active and plentiful role with high dynamism in our normal lifecycle. Facebook was the most popular and outstanding lead on online Social Media inExpand
Sneak into Devil's Colony- A study of Fake Profiles in Online Social Networks and the Cyber Law
TLDR
This paper has studied various categories of fake profiles like compromised profiles, cloned profiles and online bots on different OSN sites along with existing cyber laws to mitigate their threats and presents several machine learning techniques employed to design different fake profile detection systems. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 51 REFERENCES
Privacy concerns and identity in online social networks
Driven by privacy-related fears, users of Online Social Networks may start to reduce their network activities. This trend can have a negative impact on network sustainability and its business value.Expand
The socialbot network: when bots socialize for fame and money
TLDR
This paper adopts a traditional web-based botnet design and built a Socialbot Network (SbN): a group of adaptive socialbots that are orchestrated in a command-and-control fashion that is evaluated how vulnerable OSNs are to a large-scale infiltration by socialbots. Expand
Analyzing facebook privacy settings: user expectations vs. reality
TLDR
A survey is deployed to 200 Facebook users recruited via Amazon Mechanical Turk, finding that 36% of content remains shared with the default privacy settings, and overall, privacy settings match users' expectations only 37% of the time, and when incorrect, almost always expose content to more users than expected. Expand
All your contacts are belong to us: automated identity theft attacks on social networks
TLDR
This paper investigates how easy it would be for a potential attacker to launch automated crawling and identity theft attacks against a number of popular social networking sites in order to gain access to a large volume of personal user information. Expand
Information revelation and privacy in online social networks
TLDR
This paper analyzes the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges and evaluates the amount of information they disclose and study their usage of the site's privacy settings. Expand
De-anonymizing Social Networks
TLDR
A framework for analyzing privacy and anonymity in social networks is presented and a new re-identification algorithm targeting anonymized social-network graphs is developed, showing that a third of the users who can be verified to have accounts on both Twitter and Flickr can be re-identified in the anonymous Twitter graph. Expand
Detecting and characterizing social spam campaigns
TLDR
This paper presents an initial study to quantify and characterize spam campaigns launched using accounts on online social networks, and analyzes a large anonymized dataset of asynchronous "wall" messages between Facebook users to detect and characterize coordinated spam campaigns. Expand
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles
TLDR
This work shows how an adversary can exploit an online social network with a mixture of public and private user profiles to predict the private attributes of users, and proposes practical models that use friendship and group membership information to infer sensitive attributes. Expand
Loose tweets: an analysis of privacy leaks on twitter
TLDR
The nature of privacy leaks on Twitter is characterized to gain an understanding of what types of private information people are revealing on it and automatic classifiers are built to detect incriminating tweets for these three topics in real time in order to demonstrate the real threat posed to users by, e.g., burglars and law enforcement. Expand
StarClique: guaranteeing user privacy in social networks against intersection attacks
TLDR
This paper identifies StarClique, a locally minimal graph structure required for users to attain k-anonymity, where at worst, a user is identified as one of k possible contributors of a data object, and proposes anonymization techniques to protect users. Expand
...
1
2
3
4
5
...