Fake it till you make it Fishing for Catfishes
Many adult content websites incorporate social networking features. Although these are popular, they raise significant challenges, including the potential for users to "catfish", i.e., to create fake profiles to deceive other users. This paper takes an initial step towards automated catfis...
Saved in:
| Abstract | Many adult content websites incorporate social networking features. Although these are popular, they raise significant challenges, including the potential for users to "catfish", i.e., to create fake profiles to deceive other users. This paper takes an initial step towards automated catfish detection. We explore the characteristics of the different age and gender groups, identifying a number of distinctions. Through this, we train models based on user profiles and comments, via the ground truth of specially verified profiles. When applying our models for age and gender estimation to unverified profiles, 38% of profiles are classified as lying about their age, and 25% are predicted to be lying about their gender. The results suggest that women have a greater propensity to catfish than men. Our preliminary work has notable implications on operators of such online social networks, as well as users who may worry about interacting with catfishes. |
|---|---|
| AbstractList | Many adult content websites incorporate social networking features. Although these are popular, they raise significant challenges, including the potential for users to "catfish", i.e., to create fake profiles to deceive other users. This paper takes an initial step towards automated catfish detection. We explore the characteristics of the different age and gender groups, identifying a number of distinctions. Through this, we train models based on user profiles and comments, via the ground truth of specially verified profiles. When applying our models for age and gender estimation to unverified profiles, 38% of profiles are classified as lying about their age, and 25% are predicted to be lying about their gender. The results suggest that women have a greater propensity to catfish than men. Our preliminary work has notable implications on operators of such online social networks, as well as users who may worry about interacting with catfishes. |
| Author | Magdy, Walid Joglekar, Sagar Tyson, Gareth Elkhatib, Yehia Sastry, Nishanth |
| Author_xml | – sequence: 1 givenname: Walid surname: Magdy fullname: Magdy, Walid email: wmagdy@inf.ed.ac.uk organization: School of Informatics, The University of Edinburgh, UK – sequence: 2 givenname: Yehia surname: Elkhatib fullname: Elkhatib, Yehia email: y.elkhatib@lancaster.ac.uk organization: School of Computing and Communications, Lancaster University, UK – sequence: 3 givenname: Gareth surname: Tyson fullname: Tyson, Gareth email: gareth.tyson@eecs.qmul.ac.uk organization: School of Electronic Engineering and Computer Science, Queen Mary University of London, UK – sequence: 4 givenname: Sagar surname: Joglekar fullname: Joglekar, Sagar email: sagar.joglekar@kcl.ac.uk organization: Department of Informatics, King's College London, UK – sequence: 5 givenname: Nishanth surname: Sastry fullname: Sastry, Nishanth email: nishanth.sastry@kcl.ac.uk organization: Department of Informatics, King's College London, UK |
| BookMark | eNqNUD1PwzAQNV8SbekMEktGloQ7O45zI6ooIFViAYnNspOLFJo0qAlD_z0uycDIcPek9949nd5cnO-6HQtxjZAgpvpeIQJInfyi0SdiHlhQKZHSp2ImU6NiIvw4-ytcimXff0I4xDyMmombtdtyVA_RUDdNdOi-o3YkrsRF5ZqelxMuxPv68W31HG9en15WD5vYSYQhzr1JsczK3OuiSitijTKvlA-buFKkDRtVAFEmJRRSeShZS1NIduigNGohbsfcmpnt175u3f5gCTICkkG9G1VXtNZ33ba3CPZYgJ0KsFMBwZr802r9vg6__QAOxVU6 |
| ContentType | Conference Proceeding |
| Copyright | 2017 ACM |
| Copyright_xml | – notice: 2017 ACM |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1145/3110025.3110075 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library (IEL) (UW System Shared) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science Sociology & Social History |
| EISBN | 1450349935 9781450349932 |
| EISSN | 2473-991X |
| Editor | Diesner, Jana Ferrari, Elena Xu, Guandong |
| Editor_xml | – sequence: 1 givenname: Jana surname: Diesner fullname: Diesner, Jana – sequence: 2 givenname: Elena surname: Ferrari fullname: Ferrari, Elena – sequence: 3 givenname: Guandong surname: Xu fullname: Xu, Guandong |
| EndPage | 504 |
| ExternalDocumentID | 9069092 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IL 6IN AAWTH ABLEC ACM ALMA_UNASSIGNED_HOLDINGS APO BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK GUFHI IEGSK LHSKQ OCL RIB RIC RIE RIL |
| ID | FETCH-LOGICAL-a210t-8b741d6d8b5cf4f9e5128f3b1289ef3957e73c0996220c23b0de527c2ea1a0d73 |
| IEDL.DBID | RIE |
| ISBN | 1450349935 9781450349932 |
| IngestDate | Tue Nov 04 05:04:44 EST 2025 Thu Jul 10 05:53:10 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| License | Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org |
| LinkModel | DirectLink |
| MeetingName | ASONAM '17: Advances in Social Networks Analysis and Mining 2017 |
| MergedId | FETCHMERGED-LOGICAL-a210t-8b741d6d8b5cf4f9e5128f3b1289ef3957e73c0996220c23b0de527c2ea1a0d73 |
| PageCount | 8 |
| ParticipantIDs | acm_books_10_1145_3110025_3110075 acm_books_10_1145_3110025_3110075_brief ieee_primary_9069092 |
| PublicationCentury | 2000 |
| PublicationDate | 20170731 2017-July |
| PublicationDateYYYYMMDD | 2017-07-31 2017-07-01 |
| PublicationDate_xml | – month: 07 year: 2017 text: 20170731 day: 31 |
| PublicationDecade | 2010 |
| PublicationPlace | New York, NY, USA |
| PublicationPlace_xml | – name: New York, NY, USA |
| PublicationSeriesTitle | ACM Conferences |
| PublicationTitle | 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) |
| PublicationTitleAbbrev | ASONAM |
| PublicationYear | 2017 |
| Publisher | ACM |
| Publisher_xml | – name: ACM |
| SSID | ssj0002180213 ssj0001615928 |
| Score | 1.7216458 |
| Snippet | Many adult content websites incorporate social networking features. Although these are popular, they raise significant challenges, including the potential for... |
| SourceID | ieee acm |
| SourceType | Publisher |
| StartPage | 497 |
| SubjectTerms | Computing methodologies Computing methodologies -- Machine learning Computing methodologies -- Machine learning -- Learning paradigms Computing methodologies -- Machine learning -- Learning paradigms -- Multi-task learning Human-centered computing Human-centered computing -- Collaborative and social computing Human-centered computing -- Collaborative and social computing -- Collaborative and social computing design and evaluation methods Human-centered computing -- Collaborative and social computing -- Collaborative and social computing design and evaluation methods -- Social network analysis Human-centered computing -- Collaborative and social computing -- Collaborative and social computing systems and tools Human-centered computing -- Collaborative and social computing -- Collaborative and social computing systems and tools -- Social networking sites Human-centered computing -- Collaborative and social computing -- Collaborative and social computing theory, concepts and paradigms Human-centered computing -- Collaborative and social computing -- Collaborative and social computing theory, concepts and paradigms -- Social media Human-centered computing -- Collaborative and social computing -- Collaborative and social computing theory, concepts and paradigms -- Social networks Information systems Information systems -- World Wide Web Information systems -- World Wide Web -- Web searching and information discovery Networks Networks -- Network types Networks -- Network types -- Overlay and other logical network structures Networks -- Network types -- Overlay and other logical network structures -- Online social networks Social and professional topics Social and professional topics -- User characteristics Social and professional topics -- User characteristics -- Gender |
| Subtitle | Fishing for Catfishes |
| Title | Fake it till you make it |
| URI | https://ieeexplore.ieee.org/document/9069092 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFD5swwefptvEzQsRRF_s1qbN0vg6LD7I2IPC3kqTnMBwF9k6Yf_epK0bgiBC6SWUUA5Nzpec830H4JZFqCX6yrMzn_QiJWIvNox7gY5cUI3JQBdVS174eBxPp2JSg4c9FwYRi-Qz7LvbIpavV2rrtsoGwsnqCjvh1jkfllytw36Kdc2igtLumTppsyCs1HyCiA1Cp45GWb-4urzCeqYWP4qqFD4laf7va06gcyDnkcne7ZxCDZctaH5XZyDVYG1Bb89FIXekZOGSUhRk14ZBkr0jmeUkn83nZLfakkXZ8EiScleKWDRLRlluXNL8pgNvydPr6Nmraid4mV3E5V4sLVTQQx1LpkxkBFrHHptQ2rNA44JzyENl4eGQUl_RUPoaGeWKYhZkvubhGTSWqyWeA8mEipQ29rDgyud2QPuZsMDQhLHUmpou3FhDpm5RsElLnjNLK2OnlbG7cP_nO6lcz9D21namTj9KsY20snLv9-YLOKbOzxb5s5fQyNdbvIIj9ZnPNuvr4g_5Ap_Cs4s |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFD7MKejTdJu4eYsg-mK3Nm3XxtfhmDjHHibsLeQKxV1k64T9e5O2bgiCCKWXUEI5NDlfcs73HYDbMFCSK1c4ZubjTiBI7MQ6jBxPBjaoFnJPZlVLBtFwGE8mZFSChy0XRimVJZ-plr3NYvlyIdZ2q6xNrKwuMRPuvq2cVbC1djsqxjmTAkzbZ2zFzTy_0PPxgrDtW300HLayq80s3GNi9qOsSuZVepX_fc8x1Hf0PDTaOp4TKKl5FSrf9RlQMVyr0NyyUdAdynm4KJcF2dSg3WPvCiUpSpPpFG0WazTLGx5RL9-XQgbPoi5LtU2bX9Xhrfc07vadonqCw8wyLnVibsCC7MiYh0IHmijj2mPtc3MmStvwnIp8YQBiB2NXYJ-7UoU4Elgxj7ky8k-hPF_M1RkgRkQgpDaHgVduZIa0y4iBhtqPuZRYN-DGGJLaZcGK5kznkBbGpoWxG3D_5zuULxNleqtZU9OPXG6DFlZu_t58DYf98euADp6HL-dwhK3XzbJpL6CcLtfqEg7EZ5qsllfZ3_IFL2W21A |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+of+the+2017+IEEE%2FACM+International+Conference+on+Advances+in+Social+Networks+Analysis+and+Mining+2017&rft.atitle=Fake+it+till+you+make+it&rft.au=Magdy%2C+Walid&rft.au=Elkhatib%2C+Yehia&rft.au=Tyson%2C+Gareth&rft.au=Joglekar%2C+Sagar&rft.series=ACM+Conferences&rft.date=2017-07-31&rft.pub=ACM&rft.isbn=1450349935&rft.spage=497&rft.epage=504&rft_id=info:doi/10.1145%2F3110025.3110075 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450349932/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450349932/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450349932/sc.gif&client=summon&freeimage=true |

