{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:54:13Z","timestamp":1776084853626,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:00:00Z","timestamp":1731283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,11]]},"DOI":"10.1145\/3678884.3681889","type":"proceedings-article","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T18:38:08Z","timestamp":1731523088000},"page":"444-450","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A First Look into Fake Profiles on Social Media through the Lens of Victim's Experiences"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8547-7868","authenticated-orcid":false,"given":"Arezou","family":"Behfar","sequence":"first","affiliation":[{"name":"Utah State University, Logan, Utah, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9012-6146","authenticated-orcid":false,"given":"Ankit","family":"Shrestha","sequence":"additional","affiliation":[{"name":"Utah State University, Logan, Utah, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5764-2253","authenticated-orcid":false,"given":"Mahdi Nasrullah","family":"Al-Ameen","sequence":"additional","affiliation":[{"name":"Utah State University, Logan, Utah, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Instagram fake and automated account detection. In 2019 Innovations in intelligent systems and applications conference (ASYU)","author":"Akyon Fatih Cagatay","unstructured":"Fatih Cagatay Akyon and M Esat Kalfaoglu. 2019. Instagram fake and automated account detection. In 2019 Innovations in intelligent systems and applications conference (ASYU). IEEE, 1--7."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2022.124942"},{"key":"e_1_3_2_1_3_1","unstructured":"Kathy Baxter Catherine Courage and Kelly Caine. 2015. Understanding your users: a practical guide to user research methods. Morgan Kaufmann."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v13i3.pp2962-2971"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"e_1_3_2_1_6_1","unstructured":"Richard E Boyatzis. 1998. Transforming qualitative information: Thematic analysis and code development. sage."},{"key":"e_1_3_2_1_7_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology, Vol. 3, 2 (2006), 77--101."},{"key":"e_1_3_2_1_8_1","volume-title":"Luis Marin Vera, and Anthony Uloa","author":"Chergarova Vasilka","year":"2022","unstructured":"Vasilka Chergarova, Vinicius Arcanjo, Mel Tomeo, Jeronimo Bezerra, Luis Marin Vera, and Anthony Uloa. 2022. Cryptocurrency fraud: A study on the characteristics of criminals who are using fake profiles on a social media platform to persuade individuals to invest into cryptocurrency. Issues in Information Systems, Vol. 23, 3 (2022)."},{"key":"e_1_3_2_1_9_1","volume-title":"Preventive Mechanisms: A Review. arXiv preprint arXiv:2201.03330","author":"Etuh Emmanuel","year":"2022","unstructured":"Emmanuel Etuh, Francis S Bakpo, et al. 2022. Social Media Networks Attacks and their Preventive Mechanisms: A Review. arXiv preprint arXiv:2201.03330 (2022)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610193"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-014-0194-4"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC60891.2024.10427620"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security","author":"Ion Iulia","year":"2015","unstructured":"Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. ...No One Can Hack My Mind: Comparing Expert and Non-Expert Security Practices. In Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security (Ottawa, Canada) (SOUPS '15). USENIX Association, USA, 327--346."},{"key":"e_1_3_2_1_14_1","volume-title":"Network Security and Data Sciences: Second International Conference, MIND 2020, Silchar, India, July 30--31, 2020, Proceedings, Part I 2. Springer, 17--28","author":"Joshi Shruti","year":"2020","unstructured":"Shruti Joshi, Himanshi Gupta Nagariya, Neha Dhanotiya, and Sarika Jain. 2020. Identifying fake profile in online social network: An overview and survey. In Machine Learning, Image Processing, Network Security and Data Sciences: Second International Conference, MIND 2020, Silchar, India, July 30--31, 2020, Proceedings, Part I 2. Springer, 17--28."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8621913"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3920-1_9"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516726"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335364"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3064901"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CYBConf.2017.7985764"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363270"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2024.2323248"},{"key":"e_1_3_2_1_23_1","volume-title":"TOWARDS THE DESIGN AND EVALUATION OF CLICKBAIT EDUCATION CONTENT: LEVERAGING USER MENTAL MODELS AND LEARNING SCIENCE PRINCIPLES. In INTED2024 Proceedings. IATED, 1794--1804","author":"Shrestha A","year":"2024","unstructured":"A Shrestha, A Flood, B Hackler, A Behfar, and MN Al-Ameen. 2024. TOWARDS THE DESIGN AND EVALUATION OF CLICKBAIT EDUCATION CONTENT: LEVERAGING USER MENTAL MODELS AND LEARNING SCIENCE PRINCIPLES. In INTED2024 Proceedings. IATED, 1794--1804."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642301"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555763"},{"key":"e_1_3_2_1_26_1","volume-title":"Rokeya Akter, Md Mirajul Islam","author":"Sultana Sharifa","year":"2022","unstructured":"Sharifa Sultana, Pratyasha Saha, Shaid Hasan, SM Raihanul Alam, Rokeya Akter, Md Mirajul Islam, Raihan Islam Arnob, AKM Najmul Islam, Mahdi Nasrullah Al-Ameen, and Syed Ishtiaque Ahmed. 2022. Imagined Online Communities: Communionship, Sovereignty, and Inclusiveness in Facebook Groups. Proceedings of the ACM on Human-Computer Interaction, Vol. 6, CSCW2 (2022), 1--29."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v8i1.14509"},{"key":"e_1_3_2_1_28_1","volume-title":"Irene Klugkist, and Floryt van Wesel.","author":"van Grootel Leonie","year":"2020","unstructured":"Leonie van Grootel, Lakshmi Balachandran Nair, Irene Klugkist, and Floryt van Wesel. 2020. Quantitizing findings from qualitative studies for integration in mixed methods reviewing. Research synthesis methods, Vol. 11, 3 (2020), 413--425."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102465"},{"key":"e_1_3_2_1_30_1","volume-title":"Social turing tests: Crowdsourcing sybil detection. arXiv preprint arXiv:1205.3856","author":"Wang Gang","year":"2012","unstructured":"Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam Metzger, Haitao Zheng, and Ben Y Zhao. 2012. Social turing tests: Crowdsourcing sybil detection. arXiv preprint arXiv:1205.3856 (2012)."},{"key":"e_1_3_2_1_31_1","volume-title":"Sneak into devil's colony-A study of fake profiles in online social networks and the cyber law. arXiv preprint arXiv:1803.08810","author":"Wani Mudasir Ahmad","year":"2018","unstructured":"Mudasir Ahmad Wani, Suraiya Jabin, Ghulam Yazdani, and Nehaluddin Ahmadd. 2018. Sneak into devil's colony-A study of fake profiles in online social networks and the cyber law. arXiv preprint arXiv:1803.08810 (2018)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"}],"event":{"name":"CSCW '24: The 27th ACM Conference on Computer-Supported Cooperative Work and Social Computing","location":"San Jose Costa Rica","acronym":"CSCW '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678884.3681889","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678884.3681889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T01:57:31Z","timestamp":1773539851000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678884.3681889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,11]]},"references-count":32,"alternative-id":["10.1145\/3678884.3681889","10.1145\/3678884"],"URL":"https:\/\/doi.org\/10.1145\/3678884.3681889","relation":{},"subject":[],"published":{"date-parts":[[2024,11,11]]},"assertion":[{"value":"2024-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}