{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T23:12:50Z","timestamp":1654125170747},"reference-count":21,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4,1]]},"abstract":"<p>The use of social network sites has exploded with its multitude of functions which include posting pictures, interests, activities and establishing contacts. However, users may be unaware of the lurking dangers of threats originating from Social Networking Sites (SNS) which include malware or fake profiles. This paper investigates the indicators to arouse suspicion that a social networking account is invalid with a specific focus on Facebook as an illustrative example. The results from a survey on users\u2019 opinions on social networks, is presented in the paper. This helps reveal some of the trust indicators that leads users to ascertaining whether a social networking profile is valid or not. Finally, indicators of potentially deceptive agents and profiles are given as a guideline to help users decide whether they should proceed with interaction with certain contacts.<\/p>","DOI":"10.4018\/ijcwt.2013040102","type":"journal-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T18:45:19Z","timestamp":1393353919000},"page":"22-37","source":"Crossref","is-referenced-by-count":0,"title":["Ascertaining Trust Indicators in Social Networking Sites"],"prefix":"10.4018","volume":"3","author":[{"given":"N.","family":"Veerasamy","sequence":"first","affiliation":[{"name":"Defense, Peace, Safety and Security, Council for Scientific and Industrial Research, Pretoria, South Africa"}]},{"given":"W. A.","family":"Labuschagne","sequence":"additional","affiliation":[{"name":"Defense, Peace, Safety and Security, Council for Scientific and Industrial Research, Pretoria, South Africa"}]}],"member":"2432","reference":[{"key":"ijcwt.2013040102-0","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.1100.0596"},{"key":"ijcwt.2013040102-1","unstructured":"Barracuda Labs. (2012). Social networking analysis. Retrieved June 15, 2012, from http:\/\/www.barracudalabs.com\/fbinfographic\/"},{"key":"ijcwt.2013040102-2","unstructured":"Brean, J. (2012). Chinese cyber-spies set up fake Facebook profile to \u2018friend\u2019 top NATO officials. National Post. Retrieved June 15, 2012, from http:\/\/news.nationalpost.com\/2012\/03\/11\/chinese-cyber-spies-set-up-fake-facebook-profile-to-friend-top-nato-officials\/"},{"key":"ijcwt.2013040102-3","unstructured":"Enigma Software Group. (2013). Koobface worm return to Twitter, Facebook and Myspace. Retrieved October 23, 2013, from http:\/\/www.enigmasoftware.com\/koobface-worm-returns-to-twitter-facebook-myspace"},{"key":"ijcwt.2013040102-4","unstructured":"Facebook. (2012). How to spot a fake profile. Facebook.com. Retrieved June 15, 2012, from http:\/\/www.facebook.com\/notes\/my-social-practice\/how-to-spot-a-fake-profile\/199791076710071"},{"key":"ijcwt.2013040102-5","unstructured":"Golbeck, J. A. (2005). Computing and applying trust in web-based social networks. Dissertation University of Maryland, College Park."},{"key":"ijcwt.2013040102-6","unstructured":"IdentifyFakeFacebook.blogspot.com. (2010). How to identify fake profiles on Facebook. Retrieved January 20, 2011, from http:\/\/identifyfakeinfacebook.blogspot.com\/"},{"key":"ijcwt.2013040102-7","year":"2007","journal-title":"Recruitment and mobilisation for the Islamist militant movement in Europe"},{"key":"ijcwt.2013040102-8","unstructured":"Kumar, P. (2010). 10+ tips to identify fake profiles on Facebook. Hellbound Bloggers. Retrieved June 15, 2012, from http:\/\/hellboundbloggers.com\/2010\/05\/17\/identify-fake-facebook-profiles\/"},{"issue":"3","key":"ijcwt.2013040102-9","doi-asserted-by":"crossref","first-page":"473","DOI":"10.5465\/amr.1998.926622","article-title":"Initial trust formation in new organizational relationships.","volume":"23","author":"D. H.McKnight","year":"1998","journal-title":"Academy of Management Review"},{"key":"ijcwt.2013040102-10","first-page":"81","article-title":"Securing trust online: Wisdom or oxymoron.","volume":"81","author":"H.Nissennbaum","year":"2001","journal-title":"BUL Rev"},{"key":"ijcwt.2013040102-11","unstructured":"Penn State College of Information Sciences. (n.d.). IST researchers examine the implications of online networks used to recruit potential terrorists. Retrieved October 29, 2013, from http:\/\/ist.psu.edu\/news\/ist-researchers-examine-the-implications-of-online-networks-used-to-recruit-potential-terrorists"},{"key":"ijcwt.2013040102-12","unstructured":"Rahman, M., Haque, M., & Khan, M. (2011). The influence of privacy, trust towards online social networks: An online exploratory study on Bangladeshi customers perception. European Journal of Economics, Finance and Administrative Sciences, 126-134."},{"key":"ijcwt.2013040102-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.10.017"},{"key":"ijcwt.2013040102-14","unstructured":"Symantec Corporation. (2013). Internet security threat report 2013 (vol. 18). Mountain View, CA. Retrieved from http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/other_resources\/b-istr_main_report_v18_2012_21291018.en-us.pdf"},{"key":"ijcwt.2013040102-15","unstructured":"Thomas, H., Enrico, M., & Marian, P. (2006). Person to person trust factors in word of mouth recommendation. In Proceedings of Conference on Human Factors in Computing Systems (CHI '06), Montreal, Quebec, Canada."},{"key":"ijcwt.2013040102-16","doi-asserted-by":"crossref","unstructured":"Thomas, K., & Nicol, D. M. (2010), The Koobface Botnet and the rise of social malware. In Proceedings of the 5th International Conference on Malicious and Unwanted Software (pp 63-70).","DOI":"10.1109\/MALWARE.2010.5665793"},{"key":"ijcwt.2013040102-17","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01474.x"},{"key":"ijcwt.2013040102-18","unstructured":"Veerasamy, N., & Grobler, M. M. (2011). Terrorist use of the internet, exploitation and support through ICT infrastructure. In Proceedings of the International Conference on Information Warfare and Security, Washington, DC (pp 260-267). Academic Conferences."},{"key":"ijcwt.2013040102-19","unstructured":"Volakis, N. (2011). Trust in online social networks. MS dissertation, University of Edinburgh, School of Informatics, Retrieved June 15, 2012, from http:\/\/www.inf.ed.ac.uk\/publications\/thesis\/online\/IM110932.pdf"},{"key":"ijcwt.2013040102-20","unstructured":"Whelpton, J. (2009). Psychology of cyber terrorism. In Proceedings of the Ekwinox Cyber Terrorism Seminar, South Africa."}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=101938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:37:12Z","timestamp":1654123032000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcwt.2013040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,4,1]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2013040102","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,1]]}}}