FACEBOOK IMPERSONATION RESEARCH
-
Upload
ashridhan-rosni -
Category
Documents
-
view
218 -
download
1
description
Transcript of FACEBOOK IMPERSONATION RESEARCH
COMMUNICATION RESEARCH
(JMS3133)
INDIVIDUAL RESEARCH PROPOSAL : FACEBOOK FAKE AND IMPERSONATION PROFILE
PREPARED BY
MOHD ASHRIDHAN BIN HAJI ROSNI
4135002601
PREPARED FOR
MADAM ADLENE BINTI ARIS
SUBMISSION DATE
23rd APRIL 2015 (Cohort 11534)
LIST OF CONTENTS
ACKNOWLEDGEMENT
CHAPTER 1 : INTRODUCTION
1.0 Introduction
1.1 Background of the Study
1.3 Problem Statement
1.5 Research Questions
1.6 Research Objectives
1.7 Significance of the Study
1.8 Limitation of the Study
CHAPTER 2 : LITERATURE REVIEW
2.0 Introduction
2.1 False Identity
2.2 Impostoring Group, Brand, and Organization level
2.3 Uses and Gratification Theory
2.4 Conceptual Framework
CHAPTER 3 : METHODOLOGY
3.0 Introduction
3.1 Research Design
3.2 Research Instrument
3.2.1 Administration
3.2.2 Date and Time of Collecting Data
3.2.3 Location
3.2.5 Strategy Used to Collect Data
- Example Questionnaire
BIBLIOGRAPHY
ACKNOWLEDGEMENT
Assalamualaikum and greetings,
Alhamdulillah, I have manage to complete my individual research with a much limitation
time and sources. This research topic that I have choose, is related myself as well as I also
part of become the prey for the fake and impersonation photo in Facebook. Therefore, I have
made a decision to take this opportunity to perform the further study on these in order to seek
the answer for everything need to. A million appreciation dedicated to my dear lecturer,
Madam Adlene Aris for her advised and encouragement to enforce me to establish this
research with an ease. She is very inspirational for me as she have taught me about all the
beneficial lesson for me to take the leap further in improvise my progress and achieve my
desire goals swiftly. I would like to thanks to my friends for their contribution in term of
knowledge and assist me during my research perform. I am firmly believe this research can
eliminate all the obstacles related to the issue of fraud, framing, cyber theft and bully with a
development of vivid solution to minimize and avoid this.
CHAPTER 1 - INTRODUCTION
1.0 INTRODUCTION
Social media is one of medium with diversities of functions that has brought human with
myriad of transformation and reach on another leap of establishment. As for myself, I am
admit that the important of social media especially Facebook. I started use it since I was 17
years old and I have become the loyal users right until now. The social media considered to
be the vital media which encompasses with many feature which could bring certain benefits
to society in many large area for example in business sectors. As for it allow them to publish
their product as one of advertisement technique, which is quite effective to disseminate the
information throughout massive number of audiences who also use the similar social
networking. I realized the great advantages by social media can bring the mutual bond of
friendship and getting know with other people who live afar countries, even the top celebrity,
politician and other prominence people also not avoid to use it to spread their daily life and
philosophy to be share. However, the social media especially Facebook has triggered
numerous issues indicating of fake and impersonation photo which has put me an attention to
bury deeper about how this issue occur.
1.1 BACKGROUND OF STUDY
As the world of social media began to expand, over a million people have created their own
social media account whether in Facebook, Twitter, Instagram and manymore. We all
acknowledged the functionality of social media in such a wide area of uses and advantages to
society. However, there is also the issues that happened to the social media users which
mostly related to the fake and impersonation photos in Facebook. Among all social
networkings, the Facebook have been reported many issues indicate the fake and
impersonation photos resemble to the other identity or entity which consider to be illegal in
laws. Many of the research nowadays has emphasized on protecting the privacy of an existing
online profile in a given OSN which stand for 'online social network'. Aside that, we will
aware that there will be expose to severe risk of not having a profile in the last liking in social
network. The risk is happen because of the fact that our enemy probably create a fake profile
to impersonate a real person on the OSN. The fake profile able to utilize to develop online
relationship with the friends of victim of identity theft, intention of stealing personal
information of the victim, and communicate online with the friends of the victim (5). It
actually has become viral and many social media users tend to create fake photos for various
motives neither fraud, frame, cyberbully, and so on. There is one issue about the increasing
number of impersonation of Nigerian businessmen and celebrity generally, who are
impersonated This matter has become one of issues which can actually harm the prior and
safety of every social media users. Thus, I have choose this issues because I am also one of
former victim as one of my dominant topic to be investigated thoroughly to find out every
detail and several solution can be implement to overcome it. Hence, my topic of study is
more into the 'Fake and Impersonation Photo in Facebook'.
1.3 PROBLEM STATEMENTS
Plentiful of question has come out due this problem which put us a great wonder on the how
fake and impersonation photo within Facebook can happen. This issue happen with many
various reasons that encourage them to engage such an action to faken their own identity for
unexplainable purposes. As we already know, there are issue which is quite relevant relate to
the cyberbully, and framing behaviour able to tarnish the name of people's dignity. Facebook
provide the term and regulation to all the user who are want to sign is, however it has become
less effective and many user tends to ignore the rules that implemented by Facebook. As
nowadays, the world of technology involve hacking is expand like mushroom grow after rain.
It actually already exist before the existence of social media, cyber crime perpetrator found to
be manipulate the Internet for their advantages. As the new IT era advances, many people
which include students from among nations have the acquire the skills in computer and
technology. The victims seem to be come from a well-known people like the celebrity,
politician and other famous peoples. Though, this issue can target all type of person no
matter how level of their social class it is.
1.5 RESEARCH QUESTION
1. Why do they (social media user) impersonate other photo beside using their original photo in Facebook?
2. What is their real attention or motive to attempt the fake photo inside Facebook?3. How do they get influence to attempting this behaviour?4. What is the pros and cons of fake and impersonate photo within Facebook?5. What penalty and fine for those who initiate this behaviour?6. What action must be implement by Facebook to overcome this issue?7. Is the Facebook and other Social media is the part of reason or factor lead this problem?
1.6 RESEARCH OBJECTIVE
1. To identify the factors of leading the attempt of fake and impersonation photo in Facebook.2. To examine the frequency of fake and impersonation photo in Facebook.3. Investigate the initiatives can be execute by Facebook to overcome this issue
1.7 SIGNIFICANCE OF STUDY
To study the fake and impersonation photo in Facebook can bring myriad of credibility for
all who are wanted to carry out a comprehensive understanding about this issues further. This
research is essential especially for the use of academic study in the future as well as for the
companies who wish to seek the solution and rightful information to prevent this from occur.
Hopefully it can be one of source of information to be find by many social networking
especially Facebook's users to raise the sense of awareness and understand the the rights from
becoming part of cyber's victim neither be the initiators. It is very crucial to overcome this
issue in order to protect the safety in all aspects of area for sake of future generations later.
1.8 LIMITATION OF THE STUDY
As this is an individual research, I have lack the sufficient time to complete it with a very
tight schedule which have slow down my effort. It take only a several weeks for me after
received the guideline on how to establish our research. Nevertheless, thanks to our advisor
for her patience in motivate me to carry out the investigation about my research focus.
CHAPTER 2 - LITERATURE REVIEWS
2.0 INTRODUCTION
A triggered news recently exposed on media said that 8.7 percent of users on Facebook
are fake, which can be measure to an amounts to more than 83 million accounts worldwide.
The impact is by this massive number of fake users whose profiles were involves the
capabilities of dangers ranging from spy, identity thievery, information misuse and mean of
avoidance to privacy compromise to the users and their families. Fake profiles are the profiles
which are not genuine which indicate they are who claim to be someone they are not, doing
some malicious and undesirable activity, causing problems to the social network and fellow
users. There several reason we can deduct of what reason they create fake photo either profile
which are due to the Social Engineering, Online impersonation to defame a person
and Advertising and campaigning a person. (1)
2.1 FALSE IDENTITY
False identity is known as invention of an entirely new false identity in order to avoid
capture for another crime, conduct spy activities, or to perform fraud and or prevent
detection, and suprisingly also to give aid victims of identity-crime to recover their
reputation after victimisation. It is said that Facebook have estimated that 83 million
registered users are actually duplicated accounts, spammers, or non-people, “like that profile
you made for your puppy” (Jeffries, 2012) (2)
2.2 IMPOSTORING GROUP /BRAND/ ORGANIZATION LEVEL
Fake Facebook accounts not only can intervene the individuals can not only harm
individuals but they’re also bad for businesses. Many websites and mobile apps use Facebook
Login to register new users which are coincidently have welcoming fake Facebook accounts
to be occur , businesses may easily affect themselves to three specific harms which are spam,
fraud and misspent market budget (Vitrue,2014). Fake Facebook accounts usually used by
scammers to initiate a fraud to the other individuals on their company’s platform. The
fraudsters able to use fake accounts to conduct illegal money laundering schemes or use them
as “burner” accounts to accompany stolen credit cards when making fraud purchases
(Virtrue,2014) (3)
2.3 USES AND GRATIFICATION THEORY (WIKIPEDIA)
For my research topic, I have choose Uses and gratifications theory (UGT) is an approach to
understanding why and how people actively find out the certain media to satisfy specific
needs. UGT is an audience-centered approach to understanding mass communication. UGT
focuses on "what do people do with media?" (Katz, Elihu,1959).
The driving question of Uses and gratification theory is about 'Why do people use media
and what do they use them for? UGT emphasize on how users deliberately choose media that
able to satisfy given needs and allow one to develop knowledge, relaxation, social
interactions/companionship, diversion, or escape. (Tankard Jr., James W. 2000/ McQuail,
Denis,2010). At the core of uses and gratifications theory lies the assumption that audience
members actively seek out the mass media to satisfy individual needs. (4)
Uses and gratifications theory explain more into the uses and functions of the media for
individuals, groups, and society in general. There are three objectives in constructing the uses
and gratifications theory:
1) to describe on how individuals use mass communication to gratify their needs. “What do
people do with the media”.
2) to investigate the underlying motives for individuals’ media use.
3) to identify the positive and the negative effect on individual media use.
2.4 CONCEPTUAL FRAMEWORK
I am using of quantitative methods to determine the several factors lead to the fake and
impersonation photo in Facebook. Thus, I have tried to construct the independent and
dependent variables structure focus on my research topic all about.
Independent Variables Dependent Variables
FIGURE 1
The conceptual framework shows the relationship between independent and dependent
variable. The dependent of variable on this case study will be fake and impersonate photo in
Facebook. Based on Figure 1, its show that independent variable had been divided into three
sections, which is famous or attention need factors, psychology or emotions factors like
jealousy or hatred, and profit factor by cyber theft or fraud.
FAKE AND IMPERSONATE PHOTO
IN FACEBOOK
POPULARITY/ ATTENTION NEED FACTOR
PSYCHOLOGY/EMOTION FACTOR
PROFITS FACTOR
CHAPTER 3 - METHODOLOGY
3.0 INTRODUCTION
Methodology is the systematic, theoretical analysis of the methods that related to a field of
study. Typically, it consist of concepts such as paradigm, theoretical model, phases and
quantitative or qualitative techniques.
Research Methodology is a useful way to find out the result of a given problem on a
specific matter or problem that is also referred as research problem. In Methodology,
researcher uses different criteria of solving the problem.
The small topics that falls under the research methodology which are research design,
research instrument, administrative, date and time of collecting data, location and frequency
of collecting data.
3.1 RESEARCH DESIGN
The research designs in the methodology are divided into two methods which is Quantitative
and Qualitative. Quantitative research aims to measure the quantity or amount and compares
it with past records and tries to project for future period.
Qualitative research presents non-quantitative type of analysis. Qualitative research is
collecting, analyzing and interpreting data by observing what people do and interpret.
Qualitative research refers to the meanings, definitions, characteristics, symbols, metaphors,
and description of things.
Thus, my research design of this study is more into Quantitative Research. The method
that I used is survey which can provide a means of measuring a population’s characteristics,
self-reported and observed behaviour, awareness of programs, attitudes or opinions, and
needs. Thus, I have prepare the questionnaire designs to be distribute to my targeted
respondents to achieve my objective research. My research is emphasize on fake and
impersonation photo in Facebook. on how the popularity or attention need, psychology or
emotions and profit factor that derives a person to attempt this action.
3.2 RESEARCH INTSRUMENTS
3.2.1 ADMINISTRATIVE
I have distribute the questionnaires to 350 respondents who are mostly are from Uniselian
students round age 19-25 years old in like 2- 3 weeks to receive all the feedback from them.
Then, I have establish the conclusion based my questionnaires papers which according to my
research objectives.
3.2.2 DATE AND TIME COLLECT DATA
My research to analyze the surveys questionnaires started on 23 th March 2015 until 12rd April
2015. I have try to search to distribute the questionnaires to respondents from 9.00 am until
5.00pm.
3.2.3 LOCATION
This research was carried out only inside the Unisel place as one location because this
research topic is stress out only on Unisel students as my respondents for my survey methods.
3.2.4 STRATEGY USED TO COLLECT DATA
Within my questionnaires design paper, it contain 20 questions and it only have one section
that combining the three type question that is related to independent variable mainly indicate
the popularity and attention factors, emotions factors and profit factors. Here my
questionnaire sample that I have made :
QUESTIONAIRRE - FAKE PHOTO OR IMPERSONATE OF FAMOUS PEOPLE IN SOCIAL MEDIA
Instruction : Try answer it honestly without taking much time by circle the provided answer.
1) Have you ever see a faked profile photo in your social media before ?A. Yes B. No
2) Do you ever try impersonate/fake photo of famous people within your social media profile picture?
A. Yes B. No
3) Why do people like to impersonate/faking photo of famous people?
A. They are shy B. They seek attention
C. Obsessed with their celebrity D. Other reason
4) Do you think this matter indicate fake photo/impersonation of famous people consider to be serious problem?
A. Strongly Agree B. Fairly Agree C. Neutral
D. Slightly Disagree E. Strongly Disagree
5) Do you know and ever read the Social media terms, condition and its policies?
A. Yes B. No C. Sometime
6) Those who do it probably are lonely person.
A. Strongly Agree B. Slightly Agree C. Neutral
D. Slightly Disagree E. Strongly Disagree
7) Do you think it is wrong and illegal to impersonate/faking famous people photo in Social Media ?
A. Strongly Agree B. Slightly Agree C. Neutral
D. Slightly Disagree E. Strongly Disagree
8) Do their parent know about what they are doing it?
A. Yes B. No C. Maybe
9) Who do you think influence them the most which cause it happen?
A. Celebrity B. Friends C. Social Media D. Parent E. Others
10) Do you think this problem consider as a new type of social issue?
A. Yes B. No C. Maybe
11) A person who do this may have mental disorder due to be bullied or lack sense of love.
A. Strongly Agree B. Slightly Agree C. Neutral
D. Slightly Disagree E. Strongly Agree
12) Who are to be blame the most?
A. Parent B. Social Media C. Friends D. Celebrity
13) Which famous person do they impersonates/faking photo the most that you ever see?
A. Western or Europe artist B. East Asia artist C. Local Artist D. Cartoons
14) Do you think this issue should bring down to the police and court responsible?
A. Strongly Agree B. Slightly Disagree C. Neutral
D. Slightly Disagree E. Strongly Agree
15) If you are the one who do it, what do you feel?
A. Fun B. Guilty C. Uncertain
16) If you see someone impersonate of others famous person in Social media, what come out inside your mind?
A. Doubt or Disbelief B. Impress or Belief C. Uncertain
17) Have you ever believed and been fooled by someone who impersonate famous person in Social media ?
A. Yes B. No
18) Those who attempt it mostly are ?
A. Teenagers B. Middle Age C. Old Age D. Kids
19) Do you agree the quotes " Be yourself, be original" is the best word define this issue?
A. Strongly Agree B. Slightly Agree C. Neutral
D. Slightly Disagree E. Strongly Disagree
20) What is your best way to overcome when this problem occur?
A. Report to the Social Media to block their account
B. Give an advice to them
C. Report to the police to arrest them
D. Others
BIBLIOGRAPHY
1. R.N. Reddy & N. Kumar. Automatic Detection of Fake Profile in Online Social
Networks. National Institute of Technology Rourkela, India. Page 4-7, 2012.
2. D.S. Wall. Future Identities : Changing identities in the UK - the next 10 years. Durkham
University, UK. Page 9, 2013.
3. C. Mawere & T.P. Mpofu. Profile Impostoring : A Use Case on the Rising Social
Engineering Attack on Facebook Users. Jawaharlal Nehru Technological University
Hyderabad, India. Page 3, 2012.
4. Uses and Gratification Theory Article Retrieved on 20th March 2015 on
http://en.wikipedia.org/wiki/Uses_and_gratifications_theory
5. M. Conti, R. Poovendran & M. Secchiero. Fakebook : Detecting Fake Profile in On-line
Social Network. University of Padua, Italy and University of Washington, USA. Page 1,
2012.