메뉴 건너뛰기




Volumn 20, Issue 4, 2014, Pages 1027-1043

Ethical Considerations when Employing Fake Identities in Online Social Networks for Research

Author keywords

Data mining; Ethics; Fake profile; Online social network

Indexed keywords

CONFIDENTIALITY; DECEPTION; ETHICS; HUMAN; IDENTITY; INFORMATION PROCESSING; METHODOLOGY; MORALITY; PRIVACY; RESEARCH ETHICS; SOCIAL MEDIA; SOCIAL SUPPORT; SOCIOLOGY;

EID: 84912046665     PISSN: 13533452     EISSN: 14715546     Source Type: Journal    
DOI: 10.1007/s11948-013-9473-0     Document Type: Article
Times cited : (29)

References (41)
  • 3
    • 84912027959 scopus 로고    scopus 로고
    • BGU Social Networks Security Research Group. (2013). BGU social networks dataset collection
    • BGU Social Networks Security Research Group. (2013). BGU social networks dataset collection. http://proj.ise.bgu.ac.il/sns/datasets.html.
  • 4
    • 84855692796 scopus 로고    scopus 로고
    • The socialbot network: When bots socialize for fame and money. In Proceedings of the 27th annual computer security applications conference
    • Boshmaf, Y., Muslukhov, I., Beznosov, K., & Ripeanu, M. (2011). The socialbot network: When bots socialize for fame and money. In Proceedings of the 27th annual computer security applications conference, ACM (pp. 93–102).
    • (2011) ACM , pp. 93-102
    • Boshmaf, Y.1    Muslukhov, I.2    Beznosov, K.3    Ripeanu, M.4
  • 5
    • 84912022105 scopus 로고    scopus 로고
    • Anonymized Internet Traces, Dataset:
    • CAIDA. (2012). Anonymized Internet Traces 2012 Dataset. http://www.caida.org/data/passive/passive_2012_dataset.xml.
    • (2012) (2012)
  • 7
    • 68349123169 scopus 로고    scopus 로고
    • The ethics of internet research
    • Eynon, R., Fry, J., & Schroeder, R, (pp. 23–42). Sage, London
    • Eynon, R., Fry, J., & Schroeder, R. (2008). The ethics of internet research. In Handbook of online research methods (pp. 23–42). Sage, London.
    • (2008) In Handbook of online research methods
  • 8
    • 68349101174 scopus 로고    scopus 로고
    • New techniques in online research: Challenges for research ethics
    • Eynon, R., Schroeder, R., & Fry, J. (2009). New techniques in online research: Challenges for research ethics. Twenty-First Century Society, 4(2), 187–199.
    • (2009) Twenty-First Century Society , vol.4 , Issue.2 , pp. 187-199
    • Eynon, R.1    Schroeder, R.2    Fry, J.3
  • 9
    • 0035841472 scopus 로고    scopus 로고
    • Ethical issues in qualitative research on internet communities
    • Eysenbach, G., & Till, J. E. (2001). Ethical issues in qualitative research on internet communities. BMJ, 323(7321), 1103–1105.
    • (2001) BMJ , vol.323 , Issue.7321 , pp. 1103-1105
    • Eysenbach, G.1    Till, J.E.2
  • 12
    • 84893273434 scopus 로고    scopus 로고
    • Strangers intrusion detection-detecting spammers and fake profiles in social networks based on topology anomalies
    • Fire, M., Katz, G., & Elovici, Y. (2012). Strangers intrusion detection-detecting spammers and fake profiles in social networks based on topology anomalies. Human Journal, 1(1), 26–39.
    • (2012) Human Journal , vol.1 , Issue.1 , pp. 26-39
    • Fire, M.1    Katz, G.2    Elovici, Y.3
  • 14
    • 84871965752 scopus 로고    scopus 로고
    • Data mining opportunities in geosocial networks for improving road safety
    • Fire, M., Kagan, D., Puzis, R., Rokach, L., & Elovici, Y, 2012 (pp. 1–4). IEEE
    • Fire, M., Kagan, D., Puzis, R., Rokach, L., & Elovici, Y. (2012b). Data mining opportunities in geosocial networks for improving road safety. In IEEE 27th convention of electrical and electronics engineers in Israel (IEEEI), 2012 (pp. 1–4). IEEE.
    • (2012) In IEEE 27th convention of electrical and electronics engineers in Israel (IEEEI)
  • 15
  • 16
    • 1342307809 scopus 로고    scopus 로고
    • Ethical dilemmas in research on internet communities
    • Flicker, S., Haans, D., & Skinner, H. (2004). Ethical dilemmas in research on internet communities. Qualitative Health Research, 14(1), 124–134.
    • (2004) Qualitative Health Research , vol.14 , Issue.1 , pp. 124-134
    • Flicker, S.1    Haans, D.2    Skinner, H.3
  • 17
    • 80053013660 scopus 로고    scopus 로고
    • Forcing johnny to login safely—long-term user study of forcing and training login mechanisms
    • Atluri V., Díaz C., (eds), 6879, Springer, Berlin:
    • Herzberg, A., & Margulies, R. (2011). Forcing johnny to login safely—long-term user study of forcing and training login mechanisms. In V. Atluri, C. Díaz (Ed.), ESORICS, lecture notes in computer science (vol. 6879, pp. 452–471). Springer, Berlin
    • (2011) ESORICS, lecture notes in computer science
    • Herzberg, A.1    Margulies, R.2
  • 18
    • 79955551180 scopus 로고    scopus 로고
    • Friend-in-the-middle attacks: Exploiting social networking sites for spam
    • Huber, M., Mulazzani, M., Weippl, E., Kitzler, G., & Goluch, S. (2011). Friend-in-the-middle attacks: Exploiting social networking sites for spam. Internet Computing, IEEE, 15(3), 28–34.
    • (2011) Internet Computing, IEEE , vol.15 , Issue.3 , pp. 28-34
    • Huber, M.1    Mulazzani, M.2    Weippl, E.3    Kitzler, G.4    Goluch, S.5
  • 19
    • 84855658209 scopus 로고    scopus 로고
    • Social snapshots: Digital forensics for online social networks
    • Huber, M., Mulazzani, M., Leithner, M., Schrittwieser, S., Wondracek, G., & Weippl, E, (pp. 113–122). ACM
    • Huber, M., Mulazzani, M., Leithner, M., Schrittwieser, S., Wondracek, G., & Weippl, E. (2011a). Social snapshots: Digital forensics for online social networks. In Proceedings of the 27th annual computer security applications conference (pp. 113–122). ACM.
    • (2011) Proceedings of the 27th annual computer security applications conference
  • 20
    • 71649097455 scopus 로고    scopus 로고
    • Gaydar: Facebook friendships expose sexual orientation
    • Jernigan, C., & Mistree, B. F. (2009). Gaydar: Facebook friendships expose sexual orientation. First Monday, 14(10).
    • (2009) First Monday , vol.14 , Issue.10
    • Jernigan, C.1    Mistree, B.F.2
  • 21
    • 79958043518 scopus 로고    scopus 로고
    • Kontaxis, G., Polakis, I., Ioannidis, S., & Markatos E. P. (2011). Detecting social network profile cloning. In IEEE international conference on pervasive computing and communications workshops (PERCOM workshops) (pp. 295–300). IEEE
    • Kontaxis, G., Polakis, I., Ioannidis, S., & Markatos E. P. (2011). Detecting social network profile cloning. In IEEE international conference on pervasive computing and communications workshops (PERCOM workshops) (pp. 295–300). IEEE
  • 22
    • 84911995672 scopus 로고    scopus 로고
    • Kunegis, J. (2013). KONECT—the Koblenz Network Collection
    • Kunegis, J. (2013). KONECT—the Koblenz Network Collection. http://konect.uni-koblenz.de.
  • 23
    • 77954619566 scopus 로고    scopus 로고
    • What is twitter, a social network or a news media?
    • Kwak, H., Lee, C., Park, H., & Moon, S, (pp. 591–600). ACM
    • Kwak, H., Lee, C., Park, H., & Moon, S. (2010). What is twitter, a social network or a news media? In Proceedings of the 19th international conference on world wide web (pp. 591–600). ACM.
    • (2010) In Proceedings of the 19th international conference on world wide web
  • 24
    • 82955190606 scopus 로고    scopus 로고
    • Analyzing facebook privacy settings: User expectations vs. reality
    • Liu, Y., Gummadi, K. P., Krishnamurthy, B., & Mislove, A, (pp. 61–70). ACM
    • Liu, Y., Gummadi, K. P., Krishnamurthy, B., & Mislove, A. (2011). Analyzing facebook privacy settings: User expectations vs. reality. In Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference (pp. 61–70). ACM.
    • (2011) Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference
  • 26
    • 84911995671 scopus 로고    scopus 로고
    • Margulies, R., & Herzberg, A. (2013). Conducting ethical yet realistic usable security studies. In Cyber-security research ethics dialog and strategy workshop (CREDS)
    • Margulies, R., & Herzberg, A. (2013). Conducting ethical yet realistic usable security studies. In Cyber-security research ethics dialog and strategy workshop (CREDS).
  • 27
    • 84911995670 scopus 로고    scopus 로고
    • Microsoft-Research. (2013). LETOR: Learning to rank for information retrieval
    • Microsoft-Research. (2013). LETOR: Learning to rank for information retrieval. http://research.microsoft.com/en-us/projects/mslr/.
  • 28
    • 42149117427 scopus 로고    scopus 로고
    • Mislove, A., Marcon, M., Gummadi, K. P., Druschel, P., & Bhattacharjee, B. (2007). Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement (pp. 29–42). ACM
    • Mislove, A., Marcon, M., Gummadi, K. P., Druschel, P., & Bhattacharjee, B. (2007). Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement (pp. 29–42). ACM.
  • 29
    • 77950886667 scopus 로고    scopus 로고
    • Mislove, A., Viswanath, B., Gummadi, K. P., & Druschel, P. (2010). You are who you know: Inferring user profiles in online social networks. In Proceedings of the third ACM international conference on web search and data mining (pp. 251–260). ACM
    • Mislove, A., Viswanath, B., Gummadi, K. P., & Druschel, P. (2010). You are who you know: Inferring user profiles in online social networks. In Proceedings of the third ACM international conference on web search and data mining (pp. 251–260). ACM.
  • 31
    • 80054758441 scopus 로고    scopus 로고
    • Narayanan, A., Shi, E., & Rubinstein, B. I. (2011). Link prediction by de-anonymization: How we won the kaggle social network challenge. In The 2011 international joint conference on neural networks (IJCNN) (pp. 1825–1834). IEEE
    • Narayanan, A., Shi, E., & Rubinstein, B. I. (2011). Link prediction by de-anonymization: How we won the kaggle social network challenge. In The 2011 international joint conference on neural networks (IJCNN) (pp. 1825–1834). IEEE.
  • 33
    • 85076213516 scopus 로고    scopus 로고
    • Efficient and scalable socware detection in online social networks. In Proceedings of the 21st USENIX conference on Security symposium
    • Rahman, M. S., Huang, T. K., Madhyastha, H. V., & Faloutsos, M. (2012). Efficient and scalable socware detection in online social networks. In Proceedings of the 21st USENIX conference on Security symposium, USENIX Association (pp. 32–32).
    • (2012) USENIX Association , pp. 32
    • Rahman, M.S.1    Huang, T.K.2    Madhyastha, H.V.3    Faloutsos, M.4
  • 34
    • 84874918773 scopus 로고    scopus 로고
    • Virtual world research ethics and the private/public distinction
    • Rosenberg, A. (2010). Virtual world research ethics and the private/public distinction. International Journal of Internet Research Ethics, 3(12), 23–36.
    • (2010) International Journal of Internet Research Ethics , vol.3 , Issue.12 , pp. 23-36
    • Rosenberg, A.1
  • 35
    • 80755172908 scopus 로고    scopus 로고
    • Busting frame busting: a study of clickjacking vulnerabilities at popular sites
    • Rydstedt, G., Bursztein, E., Boneh, D., & Jackson, C. (2010). Busting frame busting: a study of clickjacking vulnerabilities at popular sites. In IEEE Oakland Web 2.
    • (2010) In IEEE Oakland Web , pp. 2
    • Rydstedt, G.1    Bursztein, E.2    Boneh, D.3    Jackson, C.4
  • 36
    • 84911995668 scopus 로고    scopus 로고
    • Stanford. (2013). Stanford large network dataset collection
    • Stanford. (2013). Stanford large network dataset collection. http://snap.stanford.edu/data/.
  • 37
    • 84912043998 scopus 로고    scopus 로고
    • Taylor, C. (2012). Startup claims 80 bots
    • Taylor, C. (2012). Startup claims 80 bots. http://techcrunch.com/2012/07/30/startup-claims-80-of-its-facebook-ad-clicks-are-coming-from-bots/.
  • 39
    • 81755188521 scopus 로고    scopus 로고
    • Researching personal information on the public web methods and ethics
    • Wilkinson, D., & Thelwall, M. (2011). Researching personal information on the public web methods and ethics. Social Science Computer Review, 29(4), 387–401.
    • (2011) Social Science Computer Review , vol.29 , Issue.4 , pp. 387-401
    • Wilkinson, D.1    Thelwall, M.2
  • 40
    • 84912011719 scopus 로고    scopus 로고
    • Zafarani, R., & Liu, H. (2009). Social computing data repository at asu. , Arizona State University, School of Computing, Informatics and Decision Systems Engineering
    • Zafarani, R., & Liu, H. (2009). Social computing data repository at asu. http://socialcomputing.asu.edu, Arizona State University, School of Computing, Informatics and Decision Systems Engineering.
  • 41
    • 78149496553 scopus 로고    scopus 로고
    • But the data is already public: On the ethics of research in Facebook
    • Zimmer, M. (2010). But the data is already public: On the ethics of research in Facebook. Ethics and Information Technology, 12(4), 313–325.
    • (2010) Ethics and Information Technology , vol.12 , Issue.4 , pp. 313-325
    • Zimmer, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.