Fake Identities in Social Cyberspace: From Escapism to Terrorism

Fake Identities in Social Cyberspace: From Escapism to Terrorism

Copyright: © 2022 |Pages: 17
DOI: 10.4018/IJCWT.295867
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Personation - the act of assuming another’s identity with intent to deceive, is an ancient phenomenon. In this article we seek to research online impersonation and to uncover the causes for this phenomenon. We do so by analyzing and comparing several case studies while referring to more traditional concepts of social identity. As discovered, on the one hand users can create fake identities to enhance their personalities for personal reasons such as voyeurism or as means of escaping reality, or even promote human rights by avoiding local authoritarian censorship. On the other hand, malicious users like terrorists or criminals manipulate online users with phishing attempts and frauds, making social cyber space less secure.
Article Preview
Top

Introduction

Numerous recent incidents of personations – fake profiles - on social cyber space (SCS) have raised concerns and criticism on the ease with which manipulation and fraud can be made; cyber-safety has become a sought-after concern. Specifically, a concern over the ease of utilizing fake identities for negative causes like terrorism, crime and disinformation (Dodel & Mesch, 2019; Clifford, 2019; UNICRI, 2020). Cyber-safety has grown to be a concern of many technological companies. For instance, Facebook has shut down 583 million fake profiles in the first quarter of 2018 since they violated Facebook’s policies and terms of service (Griffin, 2018). Moreover, according to the October 2020 homeland threat assessment by the Department of Homeland Security (DHS), cyber espionage and cybercrime are among the most probable threats to people in the United States (US) and elsewhere (DHS, 2020).

Interestingly, personation, the act of making and taking a fake identity in order to deceive somebody else is an ancient phenomenon that was used throughout history by writers, critics of the authorities, terrorists and criminals alike. In this article we aim to develop a discussion on the implications and usages of this phenomenon in SCS, specifically social network sites and anonymous platforms like dark webs. Our research question is simple – Why web users use fake identities, and what for? Our attempt to answer this question is achieved through a comparative analysis of various selected cases of impersonation alongside a constant comparison to different variations of fake identities, aimed to discover the key types of fake identities. Moreover, as described further on, the fact that we (both authors) were subject to an attempt of information gathering created the motivation to research and analyze this phenomenon.

We discovered that malicious users utilize SCS platforms to commit negative acts such as fraud, identity theft, espionage, terrorism and other manipulations. Those who once deceived innocent people on the busy streets of our cities are currently deceiving innocent people in SCS. However, it is important to mention that the term “fake” is not dichotomous. Currently, a great number of social network users manipulate and enhance certain characteristics of their identities, their profiles, for personal needs such as means of escaping reality or voyeurism, some find love while presenting only the positive facts about themselves while hiding the negative, some even promote human rights while evading local authoritarian censorship by creating fake identities or using privacy platforms such as the dark web. Even though the great and immediate danger is indeed terrorism, crime and fraud, we have discovered that there are some shades of grey within this phenomenon. That is, cases of escapism can truly benefit the ones who fake it – who fake or enhance their personalities. In some cases, it can be difficult to identify how “fake” a profile is, whether it’s shade is too dark or whether its shade is light enough to be considered socially and legally legitimate.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing