Mohammed A Gharawi
Doaa Elsayed Ramadan
Social media, Impersonation, Platforms, Virtual, Media
Social media is becoming a critical part of everyone’s life. Social media has numerous platforms including Facebook, Twitter, Instagram, and LinkedIn. Impersonation is a common phenomenon found nearly on all social media platforms; it is the act of attempting to deceive someone by pretending that he is another person. Impersonators always try to hide a real account by making another similar profile to spread the fake contents on social media platforms making it very difficult to know the real accounts from the fake ones. Aims: This paper aims to write a comprehensive review on the social media impersonation, impersonation types, how to identify the social media impersonation, cases of social media impersonation, how to prevent impersonation, and how to protect the security of a social media user. Besides, the article explains the position of Islam toward impersonations including social media impersonation. Method: This is a narrative review of the existed literature review on the social media impersonation in the virtual world. Conclusion: Social media impersonation is the act of pretending that a person is another person which usually occurs on all social media platforms.
Al-Qaradawi, Y. (2013). The Lawful and the Prohibited in Islam: الحلال والحرام في الإسلام: The Other Press.
Badawy, A., Gharawi, M. A., Bidin, A., & Khamis, M. Role of Ministerial Media Arms During COVID-19 In Malaysia.
Benson, V., Saridakis, G., Tennakoon, H., & Ezingeard, J. N. (2015). The role of security notices and online consumer behaviour: An empirical study of social networking users. International Journal of Human-Computer Studies, 80, 36-44.
Boyd, D. (2010). Social network sites as networked publics: Affordances, dynamics, and implications. In A networked self (pp. 47-66): Routledge.
Boyd, D., & Marwick, A. E. (2011). Social privacy in networked publics: Teens’ attitudes, practices, and strategies. Paper presented at the A decade in internet time: Symposium on the dynamics of the internet and society.
De, A., Bogart, C. M., & Collins, C. S. (2012). Detecting impersonation on a social network. In: Google Patents.
De, A., Bogart, C. M., & Collins, C. S. (2013). Detecting impersonation on a social network. In: Google Patents.
Esposito, J. L. (1998). Islam: The straight path (Vol. 165): Oxford University Press New York.
Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2016). The rise of social bots. Communications of the ACM, 59(7), 96-104.
Gharawi, M. A., & Bidin, A. (2016). Computer assisted language learning for learning Arabic as a second language in Malaysia: Teacher perceptions. International Journal of Information Education Technology, 6(8), 633.
Hoby, E., & Mohamed, H. M. H. (2014). Perception of the impersonation on facebook in the Egyption context. Kuala Lumpur: International Islamic University Malaysia, 2014,
Hoffmeister, T. (2014). The challenges of preventing and prosecuting social media crimes. Pace L. Rev., 35, 115.
Kambellari, E. (2017). Online Impersonation: I Have a Right to Be Left Alone v. You Can’t Mandate How I Use My Privacy Toolbox. You Can’t Mandate How I Use My Privacy Toolbox (September 2017). The University of Illinois Timely Tech online journal (September, 2017).
Kaplan, A. M., & Haenlein, M. (2011). Two hearts in three-quarter time: How to waltz the social media/viral marketing dance. Business horizons, 54(3), 253-263.
Li, B., & Han, L. (2013). Distance weighted cosine similarity measure for text classification. Paper presented at the International Conference on Intelligent Data Engineering and Automated Learning.
Nuakoh, E. B., & Anwar, M. (2018). Detecting Impersonation in Social Network Sites (SNS) Using Artificial Immune Systems (AIS). Paper presented at the SoutheastCon 2018.
Page, R. (2014). Hoaxes, hacking and humour: analysing impersonated identity on social network sites. In The language of social media (pp. 46-64): Springer.
Page, R. E. (2013). Stories and social media: Identities and interaction: Routledge.
Reznik, M. (2012). Identity theft on social networking sites: developing issues of internet impersonation. Touro L. Rev., 29, 455.
Senthil Kumar, N., Saravanakumar, K., & Deepa, K. (2016). On privacy and security in social media–a comprehensive study. Procedia Computer Science, 78, 114-119.
Timm, C., & Perez, R. (2010). Seven deadliest social network attacks: Syngress.
Van Dijck, J., & Poell, T. (2013). Understanding social media logic. Media and communication, 1(1), 2-14.
Zarei, K., Farahbakhsh, R., & Crespi, N. (2019). Typification of impersonated accounts on instagram. Paper presented at the 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC).
Zarei, K., Farahbakhsh, R., & Crespi, N. (2020). How impersonators exploit Instagram to generate fake engagement? arXiv preprint arXiv:2002.07173.
Zarei, K., Farahbakhsh, R., Crespi, N., & Tyson, G. (2020). Impersonation on Social Media: A Deep Neural Approach to Identify Ingenuine Content. arXiv preprint arXiv:2010.08438.