{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T00:34:35Z","timestamp":1773016475593,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030495695","type":"print"},{"value":"9783030495701","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-49570-1_24","type":"book-chapter","created":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T00:25:10Z","timestamp":1594340710000},"page":"349-358","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Catfishing: A Look into Online Dating and Impersonation"],"prefix":"10.1007","author":[{"given":"Mariah","family":"Simmons","sequence":"first","affiliation":[]},{"given":"Joon Suk","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"24_CR1","unstructured":"Catfish: In Merriam-Webster.com Dictionary. https:\/\/www.merriam-webster.com\/dictionary\/catfish"},{"key":"24_CR2","unstructured":"Cooke, K.: When Love Bites: 2019 Catfishing Numbers by State (2019). https:\/\/www.highspeedinternet.com\/resources\/states-with-most-catfishing-scams"},{"key":"24_CR3","first-page":"323","volume":"16","author":"K Clanton","year":"2014","unstructured":"Clanton, K.: We are not who we pretend to be: ODR alternatives to online impersonation statutes. Cardozo J. Conflict Resolut. 16, 323\u2013356 (2014)","journal-title":"Cardozo J. Conflict Resolut."},{"key":"24_CR4","unstructured":"Clement, J.: U.S. Internet Usage Penetration 2019 by Age Group (2019). https:\/\/www.statista.com\/statistics\/266587\/percentage-of-internet-users-by-age-groups-in-the-us\/"},{"issue":"2014","key":"24_CR5","first-page":"741","volume":"50","author":"A Derzakarian","year":"2014","unstructured":"Derzakarian, A.: The dark side of social media romance: civil recourse for catfish victims. Loyola Los Angeles Law Rev. 50(2014), 741\u2013764 (2014)","journal-title":"Loyola Los Angeles Law Rev."},{"issue":"2","key":"24_CR6","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1111\/j.1083-6101.2006.00020.x","volume":"11","author":"N Ellison","year":"2006","unstructured":"Ellison, N., Heino, R., Gibbs, J.: Managing impressions online: self-presentation processes in the online dating environment. J. Comput. Mediated Commun. 11(2), 415\u2013441 (2006). https:\/\/doi.org\/10.1111\/j.1083-6101.2006.00020.x","journal-title":"J. Comput. Mediated Commun."},{"key":"24_CR7","unstructured":"Engler, A.: Fighting deepfakes when detection fails (2019). https:\/\/www.brookings.edu\/research\/fighting-deepfakes-when-detection-fails\/"},{"key":"24_CR8","unstructured":"Flug, K.C.: Swipe, right? young people and online dating in the digital age (2016). https:\/\/sophia.stkate.edu\/msw_papers\/578"},{"key":"24_CR9","unstructured":"Hale, M.: There\u2019s Always a Catch (2012). https:\/\/www.nytimes.com\/2012\/12\/arts\/television\/catfish-the-tv-show-with-nev-schulman-exposes-deceit.html"},{"key":"24_CR10","doi-asserted-by":"publisher","unstructured":"Jeffrey, T., Hancock, C.T, Ellison, N.: The truth about lying in online dating profiles. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2007), pp. 449\u2013452. Association for Computing Machinery, New York (2007). https:\/\/doi.org\/10.1145\/1240624.1240697","DOI":"10.1145\/1240624.1240697"},{"issue":"1","key":"24_CR11","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/2063176.2063197","volume":"55","author":"J Hong","year":"2012","unstructured":"Hong, J.: The state of phishing attacks. Commun. ACM 55(1), 74 (2012). https:\/\/doi.org\/10.1145\/2063176.2063197","journal-title":"Commun. ACM"},{"key":"24_CR12","unstructured":"Jentzen, A.: The Latest Phishing Statistics and News May 2019. https:\/\/www.proofpoint.com\/us\/security-awareness\/post\/latest-phishing-may-2019"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Kirda, E., Kruegel, C.: Protecting users against phishing attacks with antiphish. In: 29th Annual International Computer Software and Applications Conference (COMPSAC05) (2005). http:\/\/dx.doi.org\/10.1109\/compsac.2005.126","DOI":"10.1109\/COMPSAC.2005.126"},{"issue":"2017","key":"24_CR14","first-page":"233","volume":"88","author":"CM Koch","year":"2017","unstructured":"Koch, C.M.: To catch a catfish: a statutory solution for victims of online impersonation. Univ. Colorado Law Rev. 88(2017), 233\u2013280 (2017)","journal-title":"Univ. Colorado Law Rev."},{"key":"24_CR15","unstructured":"Kottemann, K.: The rhetoric of deliberate deception: what catfishing can teach us. Dissertation, ProQuest, Ann Arbor, MI (2015)"},{"issue":"3","key":"24_CR16","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1177\/1527476416662709","volume":"18","author":"M Lovelock","year":"2006","unstructured":"Lovelock, M.: Catching a catfish. Telev. New Media 18(3), 203\u2013217 (2006). https:\/\/doi.org\/10.1177\/1527476416662709","journal-title":"Telev. New Media"},{"key":"24_CR17","unstructured":"Lumbres, D.: A qualitative study on friendship: comparing offline and exclusively online experiences. Dissertation. ProQuest, Ann Arbor, MI (2018)"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Magdy, W., Elkhatib, Y., Tyson, G., Joglekar, S., Sastry, N.: Fake it till you make it. In: proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2017- ASONAM 2017 (2017). http:\/\/dx.doi.org\/10.1145\/3110025.3110075","DOI":"10.1145\/3110025.3110075"},{"issue":"2017","key":"24_CR19","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1016\/j.chb.2017.06.021","volume":"75","author":"K Marett","year":"2017","unstructured":"Marett, K., George, J.F., Lewis, C.C., Gupta, M., Giordano, G.: Beware the dark side: cultural preferences for lying online. Comput. Hum. Behav. 75(2017), 834\u2013844 (2017). https:\/\/doi.org\/10.1016\/j.chb.2017.06.021","journal-title":"Comput. Hum. Behav."},{"key":"24_CR20","unstructured":"Marwah, E.V.: Understanding how young people experience risk with online-to-offline sexual encounters: a second qualitative phase for the CH@T project. University of South Florida Scholar Commons: Graduate theses and dissertations (2015). http:\/\/scholarcommons.usf.edu\/etd\/5988."},{"key":"24_CR21","doi-asserted-by":"publisher","unstructured":"Masden, C., Edwards, W.K.: Understanding the Role of Community in Online Dating. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems-CHI 2015 (2015). https:\/\/doi.org\/10.1145\/2702123.2702417","DOI":"10.1145\/2702123.2702417"},{"key":"24_CR22","unstructured":"Meerts, A.: How did catfishing come into our society? (2018). https:\/\/www.diggitmagazine.com\/articles\/catfishing"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Nolan, M.P.: Learning to circumvent the limitations of the written-self: the rhetorical benefits of poetic fragmentation and internet \u2018catfishing\u2019. Persona Studies 1(1) (2015). http:\/\/dx.doi.org\/10.21153\/ps2015vol1no1art431","DOI":"10.21153\/ps2015vol1no1art431"},{"key":"24_CR24","doi-asserted-by":"publisher","unstructured":"Obada-Obieh, B., Somayaji, A.: Can I believe you? Establishing trust in computer mediated introductions. In: Proceedings of the 2017 New Security Paradigms Workshop (NSPW 2017), pp. 94\u2013106. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3171533.3171544","DOI":"10.1145\/3171533.3171544"},{"key":"24_CR25","volume-title":"The Coding Manual for Qualitative Researchers","author":"J Salda\u00f1a","year":"2016","unstructured":"Salda\u00f1a, J.: The Coding Manual for Qualitative Researchers. SAGE, Los Angeles (2016)"},{"issue":"1","key":"24_CR26","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1123\/jlas.2016-0020","volume":"27","author":"LR Smith","year":"2017","unstructured":"Smith, L.R., Smith, K.D., Blazka, M.: Follow me, what\u2019s the harm? Considerations of catfishing and utilizing fake online personas on social media. J. Legal Aspects Sport 27(1), 32\u201345 (2017). https:\/\/doi.org\/10.1123\/jlas.2016-0020","journal-title":"J. Legal Aspects Sport"},{"key":"24_CR27","unstructured":"Snowball sampling. https:\/\/research-methodology.net\/sampling-in-primary-data-collection\/snowball-sampling\/"},{"key":"24_CR28","unstructured":"The State of Privacy in America (2016). https:\/\/www.pewresearch.org\/fact-tank\/2016\/09\/21\/the-state-of-privacy-in-america\/"},{"issue":"1","key":"24_CR29","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.tele.2016.04.009","volume":"34","author":"SR Sumter","year":"2017","unstructured":"Sumter, S.R., Vandenbosch, L., Ligtenberg, L.: Love me tinder: untangling emerging adults\u2019 motivations for using the dating application tinder. Telematics Inform. 34(1), 67\u201378 (2017). https:\/\/doi.org\/10.1016\/j.tele.2016.04.009","journal-title":"Telematics Inform."},{"key":"24_CR30","unstructured":"Van Neygen, E.: The Representation of Online Daters in Reality TV: An analysis of \u2018Catfish: The TV Show\u2019. Dissertation, University of Ghent, Ghent, Belgium (2015)"},{"key":"24_CR31","unstructured":"Waring, O.: What is catfishing and how can you spot it? (2019). https:\/\/metro.co.uk\/2018\/03\/18\/catfishing-can-spot-7396549\/"},{"issue":"7","key":"24_CR32","first-page":"457","volume":"5","author":"P Vipobtanaseth","year":"2017","unstructured":"Vipobtanaseth, P., Mujtaba, B.: A study of users\u2019 perception of online dating websites. Int. J. Curr. Sci. Technol. 5(7), 457\u2013466 (2017)","journal-title":"Int. J. Curr. Sci. Technol."},{"key":"24_CR33","doi-asserted-by":"publisher","unstructured":"Zytko, D., Grandhi, S.A., Jones, Q.: Online dating coaches\u2019 user evaluation strategies. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA 2016), pp. 1337\u20131343. Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2851581.2892482","DOI":"10.1145\/2851581.2892482"}],"container-title":["Lecture Notes in Computer Science","Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49570-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:15:04Z","timestamp":1720570504000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-49570-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030495695","9783030495701"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49570-1_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}