Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Suspicious Profiles

Risk Detection and Cyber Security for the Success of Contemporary Computing
A suspicious profile is a profile having common or similar attributes with the real or original profile such that there is highly no distinction between the two. Profile attributes such as first name, last name, and user name, are taken from a profile that the owner is willing to duplicate profile of his/hers. The data gathered is used to create test queries in search engines available on OSNs. The outcome of the search is used to create a suspected list of profiles-accounts which is further screened.
Published in Chapter:
Profile Clone Detection on Online Social Network Platforms
Anthony Doe Eklah (University of Ghana, Ghana), Winfred Yaokumah (University of Ghana, Ghana), and Justice Kwame Appati (University of Ghana, Ghana)
DOI: 10.4018/978-1-6684-9317-5.ch017
Abstract
Successful profile cloning attacks have far-reaching consequences for the victims. People whose profiles are cloned suffer defamation, mistrust, loss of job, interdiction, public disgrace, dent of reputation, and defrauding. This chapter aims to identify and propose a model that detects profile cloning attacks on online social network platforms. The proposed model is based on unsupervised machine learning clustering and statistical similarity verification methods for the filtration of profiles. The model computes statistical values for attribute similarity measure (ASM) and friends network similarity measure (FNSM). The model has a precision score of 100%. The attribute weight and friends network similarity measures show percentile figures ranging from 0.45 to 1.00. Profile accounts that fall within this range for both ASM and FNSM measures are likely to turn out to be cloned. The higher the figures, the more the suspicion of being a fake account to the supposed original one. The strength of the model is that it exposes the actual clone using the outcome of the computation.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR