{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:01Z","timestamp":1750307581585,"version":"3.41.0"},"reference-count":22,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2009,12,1]],"date-time":"2009-12-01T00:00:00Z","timestamp":1259625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["XRDS"],"published-print":{"date-parts":[[2009,12]]},"abstract":"<jats:p>How sure are you that your friends are who they say they are? In real life, unless you are the target of some form of espionage, you can usually be fairly certain that you know whom your friends are because you have a history of shared interests and experiences. Likewise, most people can tell, just by using common sense, if someone is trying to sell them on a product, idea, or candidate. When we interact with people face-to-face, we reevaluate continuously whether something just seems off based on body language and other social and cultural cues.<\/jats:p>","DOI":"10.1145\/1665997.1666003","type":"journal-article","created":{"date-parts":[[2009,12,8]],"date-time":"2009-12-08T20:53:14Z","timestamp":1260305594000},"page":"19-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Are your friends who they say they are?"],"prefix":"10.1145","volume":"16","author":[{"given":"Roya","family":"Feizy","sequence":"first","affiliation":[]},{"given":"Ian","family":"Wakeman","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Chalmers","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2009,12]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Boyd D. 2007. Why youth (heart) social network sites: The role of networked publics in teenage social life. In Youth Identity and Digital Media Buckingham D. Ed. MacArthur Foundation Series on Digital Learning. MIT Press Cambridge MA.  Boyd D. 2007. Why youth (heart) social network sites: The role of networked publics in teenage social life. In Youth Identity and Digital Media Buckingham D. Ed. MacArthur Foundation Series on Digital Learning. MIT Press Cambridge MA."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.78"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(98)00008-2"},{"volume-title":"Proceedings of the International Conference on Weblogs and Social Media (ICWSM).","author":"Caverlee J.","key":"e_1_2_1_4_1"},{"volume-title":"Proceedings of the NSF Workshop on Next Generation Data Mining.","year":"2002","author":"Dokas P.","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:BTTJ.0000047585.06264.cc"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242594"},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Kagal L. Finin T. and Joshi A. 2001. Trust-based security in pervasive computing environments. In IEEE Comm.  Kagal L. Finin T. and Joshi A. 2001. Trust-based security in pervasive computing environments. In IEEE Comm.","DOI":"10.1109\/2.970591"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435497.1435498"},{"key":"e_1_2_1_10_1","first-page":"633","article-title":"The dishonesty of honest people: A theory of self-concept maintenance","author":"Mazar N.","year":"2007","journal-title":"J. Market. Resear."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298311"},{"volume-title":"Proceedings of Social Network Analysis: Advances and Empirical Applications Forum.","author":"Mundinger J.","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.012582999"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2729.2007.00272.x"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497457"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2002.10.005"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2008.Workshops.80"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167208318067"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/0270467607311484"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(01)00059-0"},{"volume-title":"Data Mining: Practical machine learning. In Tools and Techniques with Java Implementations. Morgan Kaufmann","year":"2000","author":"Witten I. H.","key":"e_1_2_1_21_1"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1198\/106186006X113430"}],"container-title":["XRDS: Crossroads, The ACM Magazine for Students"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1665997.1666003","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1665997.1666003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:16Z","timestamp":1750250476000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1665997.1666003"}},"subtitle":["data mining online identities"],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["10.1145\/1665997.1666003"],"URL":"https:\/\/doi.org\/10.1145\/1665997.1666003","relation":{},"ISSN":["1528-4972","1528-4980"],"issn-type":[{"type":"print","value":"1528-4972"},{"type":"electronic","value":"1528-4980"}],"subject":[],"published":{"date-parts":[[2009,12]]},"assertion":[{"value":"2009-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}