Introduction Currently 40 % of the world’s population, around 3 billion users, are online using cyberspace for everything from work to pleasure. While there are numerous benefits accompanying this medium, the Internet is not without its perils. In this case study article, we focus specifically on the challenge of fake (or unnatural) online identities, such as those used to defraud people and organisations, with the aim of exploring an approach to detect them. Case description In particular, through our method and case study we outline and experiment with novel analytics for characterising and measuring the naturalness of an online persona or identity; this naturalness is defined as the extent to which that persona has features similar to t...
In this research, we conceptually examine the use of personas in an age of large-scale online analyt...
Since the harmful consequences of the online publication of fake news have emerged clearly, many res...
People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to...
Currently 40 % of the world’s population, around 3 billion users, are online using cyberspace for ev...
Online cybercrime activities often involve criminals hiding behind multiple identities (so-called di...
Whenever they interact on big data platforms such as social media, humans run the risk of being tar...
Searching for people online is a common search task that most of us have performed at some point or ...
There is a growing number of people who hold accounts on social media platforms (SMPs) but hide thei...
Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in ...
The increasing use of the Internet for social purposes enriches the data available online about all ...
Today, users sign on to most online social networking sites like Facebook, Twitter, and Google+ via ...
In this critique, we conceptually examine the use of personas in an age of availability of large-sca...
The overall aim of our research is to use qualitative methods to help understand online identity dec...
PURPOSE : This paper aims to describe requirements for a model that can assist in identity deception...
The proliferation of ubiquitous and pervasive computing devices has led to the emergence of research...
In this research, we conceptually examine the use of personas in an age of large-scale online analyt...
Since the harmful consequences of the online publication of fake news have emerged clearly, many res...
People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to...
Currently 40 % of the world’s population, around 3 billion users, are online using cyberspace for ev...
Online cybercrime activities often involve criminals hiding behind multiple identities (so-called di...
Whenever they interact on big data platforms such as social media, humans run the risk of being tar...
Searching for people online is a common search task that most of us have performed at some point or ...
There is a growing number of people who hold accounts on social media platforms (SMPs) but hide thei...
Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in ...
The increasing use of the Internet for social purposes enriches the data available online about all ...
Today, users sign on to most online social networking sites like Facebook, Twitter, and Google+ via ...
In this critique, we conceptually examine the use of personas in an age of availability of large-sca...
The overall aim of our research is to use qualitative methods to help understand online identity dec...
PURPOSE : This paper aims to describe requirements for a model that can assist in identity deception...
The proliferation of ubiquitous and pervasive computing devices has led to the emergence of research...
In this research, we conceptually examine the use of personas in an age of large-scale online analyt...
Since the harmful consequences of the online publication of fake news have emerged clearly, many res...
People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to...