Identifying Fake Profiles in LinkedIn

نویسندگان

  • Shalinda Adikari
  • Kaushik Dutta
چکیده

Social networks have become an everyday tool in our lives and different social networks have different target groups. Among them LinkedIn is greatly preferred by the people who are in the professional occupations. With the rapid growth of social networks, people tend to misuse them for unethical and illegal conducts. Creation of a fake profile becomes such adversary effect which is difficult to identify without apt research. The current solutions that have been practically developed and theorized to solve this contention, primarily considered the characteristics and the social network ties of the user’s social profile. However, when it comes to LinkedIn such behavioral observations are highly restrictive in publicly available profile data for the users by the privacy policies. The limited publicly available profile data of LinkedIn makes it ineligible in applying the existing approaches in fake profile identification. Therefore, there is a need to conduct targeted research on identifying approaches for fake profile identification in LinkedIn. In this research, we identify the minimal set of profile data that are necessary for identifying fake profiles in LinkedIn and identify the appropriate data mining approach for such task. We demonstrate that with limited profile data our approach can identify the fake profile with 84% accuracy and only 2.44% false negative, which is comparable to the results obtained by other existing approaches based on the larger data set and more profile information.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Can You Spot the Fakes?: On the Limitations of User Feedback in Online Social Networks

Online social networks (OSNs) are appealing platforms for spammers and fraudsters, who typically use fake or compromised accounts to connect with and defraud real users. To combat such abuse, OSNs allow users to report fraudulent profiles or activity. The OSN can then use reporting data to review and/or limit activity of reported accounts. Previous authors have suggested that an OSN can augment...

متن کامل

The Effect of Linkedin on Deception in Resumes

This study explores how Linkedin shapes patterns of deception in resumes. The general self-presentation goal to appear favorably to others motivates deception when one's true characteristics are inconsistent with their desired impression. Because Linkedin makes resume claims public, deception patterns should be altered relative to traditional resumes. Participants (n=119) in a between-subjects ...

متن کامل

Developing Knowledge Models of Social Media: A Case Study on LinkedIn

User Generated Content (UGC) exchanged [1] via large Social Network is considered a very important knowledge source about all aspects of the social engagements (e.g. interests, events, personal information, personal preferences, social experience, skills etc.). However this data is inherently unstructured or semi-structured. In this paper, we describe the results of a case study on LinkedIn Ire...

متن کامل

Sneak into Devil's Colony- A study of Fake Profiles in Online Social Networks and the Cyber Law

Massive content about user’s social, personal and professional life stored on Online Social Networks (OSNs) has attracted not only the attention of researchers and social analysts but also the cyber criminals. These cyber criminals penetrate illegally into an OSN by establishing fake profiles or by designing bots and exploit the vulnerabilities of an OSN to carry out illegal activities. With th...

متن کامل

Fake News Detection Through Multi-Perspective Speaker Profiles

Automatic fake news detection is an important, yet very challenging topic. Traditional methods using lexical features have only very limited success. This paper proposes a novel method to incorporate speaker profiles into an attention based LSTM model for fake news detection. Speaker profiles contribute to the model in two ways. One is to include them in the attention model. The other includes ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014