{"title":"Fake Identities in Social Cyberspace: From Escapism to Terrorism","authors":"Lev Topor, Moran Pollack","doi":"10.4018/ijcwt.295867","DOIUrl":null,"url":null,"abstract":"Personation - the act of assuming another’s identity with intent to deceive, is an ancient phenomenon. In this article we seek to research online impersonation and to uncover the causes for this phenomenon. We do so by analyzing and comparing several case studies while referring to more traditional concepts of social identity. As discovered, on the one hand users can create fake identities to enhance their personalities for personal reasons such as voyeurism or as means of escaping reality, or even promote human rights by avoiding local authoritarian censorship. On the other hand, malicious users like terrorists or criminals manipulate online users with phishing attempts and frauds, making social cyber space less secure.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"57 1 1","pages":"1-17"},"PeriodicalIF":0.2000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cyber Warfare and Terrorism","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijcwt.295867","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"POLITICAL SCIENCE","Score":null,"Total":0}
引用次数: 0
Abstract
Personation - the act of assuming another’s identity with intent to deceive, is an ancient phenomenon. In this article we seek to research online impersonation and to uncover the causes for this phenomenon. We do so by analyzing and comparing several case studies while referring to more traditional concepts of social identity. As discovered, on the one hand users can create fake identities to enhance their personalities for personal reasons such as voyeurism or as means of escaping reality, or even promote human rights by avoiding local authoritarian censorship. On the other hand, malicious users like terrorists or criminals manipulate online users with phishing attempts and frauds, making social cyber space less secure.