{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T23:02:52Z","timestamp":1772146972375,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Office of the Privacy Commissioner of Canada (OPC)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025901","type":"proceedings-article","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T12:34:28Z","timestamp":1493814868000},"page":"3810-3820","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Characterizing Social Insider Attacks on Facebook"],"prefix":"10.1145","author":[{"given":"Wali Ahmed","family":"Usmani","sequence":"first","affiliation":[{"name":"The University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Diogo","family":"Marques","sequence":"additional","affiliation":[{"name":"University of Lisbon, Lisbon, Portugal"}]},{"given":"Ivan","family":"Beschastnikh","sequence":"additional","affiliation":[{"name":"The University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Konstantin","family":"Beznosov","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Tiago","family":"Guerreiro","sequence":"additional","affiliation":[{"name":"University of Lisbon, Lisbon, Portugal"}]},{"given":"Lu\u00eds","family":"Carri\u00e7o","sequence":"additional","affiliation":[{"name":"University of Lisbon, Lisbon, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2017. SocialInsiderStudyResults. (Jan 2017). https:\/\/bestchai.github.io\/social-insider-study\/  2017. SocialInsiderStudyResults. (Jan 2017). https:\/\/bestchai.github.io\/social-insider-study\/"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1093\/pan\/mpr048"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078847"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663749"},{"key":"e_1_3_2_2_5_1","unstructured":"Urban Dictionary. 2007. Urban Dictionary Definition Frape. (2007). http:\/\/www.urbandictionary.com\/define.php?term=Frape  Urban Dictionary. 2007. Urban Dictionary Definition Frape. (2007). http:\/\/www.urbandictionary.com\/define.php?term=Frape"},{"key":"e_1_3_2_2_6_1","unstructured":"Urban Dictionary. 2010. Urban Dictionary Definition Facekjack. (2010). http: \/\/www.urbandictionary.com\/define.php?term=Facejacking  Urban Dictionary. 2010. Urban Dictionary Definition Facekjack. (2010). http: \/\/www.urbandictionary.com\/define.php?term=Facejacking"},{"key":"e_1_3_2_2_7_1","unstructured":"Jim Edwards. 2014. (2014). http:\/\/www.businessinsider. com\/frape-facebook-rape-now-a-crime-2014--7  Jim Edwards. 2014. (2014). http:\/\/www.businessinsider. com\/frape-facebook-rape-now-a-crime-2014--7"},{"key":"e_1_3_2_2_8_1","volume-title":"Immersive Worlds and Transmedia Narratives 1st Global Conference. Inter-Disciplinary.Net. http:\/\/www.inter-disciplinary.net\/critical-issues\/ wp-content\/uploads\/2012\/10\/grahamtmpaper.pdf","author":"Graham Caroline","year":"2012","unstructured":"Caroline Graham and Krista Mathis . 2012 . Frape, Stalking and Whores: Semantics and social narrative on Facebook . In Immersive Worlds and Transmedia Narratives 1st Global Conference. Inter-Disciplinary.Net. http:\/\/www.inter-disciplinary.net\/critical-issues\/ wp-content\/uploads\/2012\/10\/grahamtmpaper.pdf Caroline Graham and Krista Mathis. 2012. Frape, Stalking and Whores: Semantics and social narrative on Facebook. In Immersive Worlds and Transmedia Narratives 1st Global Conference. Inter-Disciplinary.Net. http:\/\/www.inter-disciplinary.net\/critical-issues\/ wp-content\/uploads\/2012\/10\/grahamtmpaper.pdf"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335369"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397744"},{"key":"e_1_3_2_2_12_1","volume-title":"Snooping on Mobile Phones: Prevalence and Trends. In Twelfth Symposium on Usable Privacy and Security (SOUPS). USENIX Association","author":"Marques Diogo","year":"2016","unstructured":"Diogo Marques , Ildar Muslukhov , Tiago Guerreiro , Lu\u00eds Carri\u00e7o , and Konstantin Beznosov . 2016 . Snooping on Mobile Phones: Prevalence and Trends. In Twelfth Symposium on Usable Privacy and Security (SOUPS). USENIX Association , Denver, CO, 159--174. https:\/\/www.usenix.org\/conference\/soups 2016\/ technical-sessions\/presentation\/marques Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Lu\u00eds Carri\u00e7o, and Konstantin Beznosov. 2016. Snooping on Mobile Phones: Prevalence and Trends. In Twelfth Symposium on Usable Privacy and Security (SOUPS). USENIX Association, Denver, CO, 159--174. https:\/\/www.usenix.org\/conference\/soups2016\/ technical-sessions\/presentation\/marques"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/13676261.2014.901493"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.05.042"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493223"},{"key":"e_1_3_2_2_16_1","unstructured":"Pew Research Center. 2013. Anonymity Privacy and Security Online. Report. (2013). http: \/\/pewinternet.org\/Reports\/2013\/Anonymity-online.aspx  Pew Research Center. 2013. Anonymity Privacy and Security Online. Report. (2013). http: \/\/pewinternet.org\/Reports\/2013\/Anonymity-online.aspx"},{"key":"e_1_3_2_2_17_1","unstructured":"Pew Research Center. 2015. The Demographics of Social Media Users. Report. (2015). http:\/\/www.pewinternet.org\/2015\/08\/19\/ the-demographics-of-social-media-users\/  Pew Research Center. 2015. The Demographics of Social Media Users. Report. (2015). http:\/\/www.pewinternet.org\/2015\/08\/19\/ the-demographics-of-social-media-users\/"},{"key":"e_1_3_2_2_18_1","series-title":"Series B (Methodological)","volume-title":"Block total response as an alternative to the randomized response method in surveys. Journal of the Royal Statistical Society","author":"Raghavarao Damaraju","year":"1979","unstructured":"Damaraju Raghavarao and Walter T Federer . 1979. Block total response as an alternative to the randomized response method in surveys. Journal of the Royal Statistical Society . Series B (Methodological) ( 1979 ), 40--45. https:\/\/www.jstor.org\/stable\/2984720 Damaraju Raghavarao and Walter T Federer. 1979. Block total response as an alternative to the randomized response method in surveys. Journal of the Royal Statistical Society. Series B (Methodological) (1979), 40--45. https:\/\/www.jstor.org\/stable\/2984720"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557330"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466449"},{"key":"e_1_3_2_2_21_1","volume-title":"Facebook: U.S. user age distribution 2016 | Statistic. Report.","year":"2016","unstructured":"Statista. 2016 . Facebook: U.S. user age distribution 2016 | Statistic. Report. (2016). https:\/\/www.statista.com\/statistics\/187041\/ us-user-age-distribution-on-facebook\/ Statista. 2016. Facebook: U.S. user age distribution 2016 | Statistic. Report. (2016). https:\/\/www.statista.com\/statistics\/187041\/ us-user-age-distribution-on-facebook\/"},{"key":"e_1_3_2_2_22_1","volume-title":"Sensitive questions in surveys. Psychological bulletin 133, 5","author":"Tourangeau Roger","year":"2007","unstructured":"Roger Tourangeau and Ting Yan . 2007. Sensitive questions in surveys. Psychological bulletin 133, 5 ( 2007 ), 859. http:\/\/eric.ed.gov\/?id=EJ774165 Roger Tourangeau and Ting Yan. 2007. Sensitive questions in surveys. Psychological bulletin 133, 5 (2007), 859. http:\/\/eric.ed.gov\/?id=EJ774165"},{"key":"e_1_3_2_2_23_1","volume-title":"Wikipedia co-founder Jimmy Wales? Twitter account hijacked - Naked Security. (August","author":"Vaas Lisa","year":"2016","unstructured":"Lisa Vaas . 2016. Wikipedia co-founder Jimmy Wales? Twitter account hijacked - Naked Security. (August 2016 ). https:\/\/nakedsecurity.sophos.com\/2016\/08\/23\/ wikipedia-co-founder-jimmy-wales-twitter-account-hijacked\/ Lisa Vaas. 2016. Wikipedia co-founder Jimmy Wales? Twitter account hijacked - Naked Security. (August 2016). https:\/\/nakedsecurity.sophos.com\/2016\/08\/23\/ wikipedia-co-founder-jimmy-wales-twitter-account-hijacked\/"}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","location":"Denver Colorado USA","acronym":"CHI '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025901","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:15Z","timestamp":1750215795000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025901"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":23,"alternative-id":["10.1145\/3025453.3025901","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025901","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}