SlideShare a Scribd company logo
1 of 12
Honeypot profiles and
malevolent e-reputation attacks
on Facebook
Nasri Messarra, Anne Mione
Université de Montpellier 1 – MRM
International Network for Social Network Analysis (INSNA) Conference, Sunbelt XXXIV,
Tampa, Florida, USA, 2014
Background
 Most SN studies in general & OSN studies in particular work on
already existing networks to find influencers (Trusov, Bodapati &
Bucklin), hubs, bridges, etc., and restructure them (Valente)
 Social bots and fake profiles have one objective: maximizing the
number of friends and then, eventually studying the resulting network
(Boshmaf, Muslukhov). They are in majority based on sexual attraction
(Barracuda statistics) and are used as carriers of information – not an
influencers (empiric)
 Recent studies show that size does not matter (Scarpi) and that one of
the keys to success is the initial seeding population (Liu-Thompkins)
 We believe that Facebook is not really a non-directed network (in &
out degrees matter)
How activists attack on Facebook
1- Post directly on the
brand page
2- Post on their own social networks and
Facebook communities and wait for the viral
effect to reach the brand
Reported cases & littérature about Nestlé, Pampers, DKNY,
Marie-Claire, Capri Sun, Cooks Source, Bershka…
Weaknesses of both methods
1- Post directly on the
brand page
2- Post on their own social networks and
Facebook communities and wait for the viral
effect to reach the brand
Exposure of consumer posts on
the page was reduced since FB
has chosen to put all customer
comments in a small discrete
area
The user gets banned,
Communication is closed
Creating viral content is
demanding and complex.
Information may never break
through
Brand community
On Facebook
(Brand page)
Engaged
fans
Efficient schema for a blitz unstoppable
attack
Personal
timeline
What if a person can become friend
on his own timeline/profile with
engaged fans of a brand?
Diffusion will only need to be
organic, not viral (no need for WOM
for diffusion)
The brand will not have direct control
to ban the user
Engaged
fans
Honeypot profiles
Can we attract engaged fans of a brand
Around a high-prestige profile (in degree > out degree) with
common interests and call for reciprocity (the illusion of social
proof)
In order to create an efficient initial seeding population
That can be reached directly through organic communication?
Attraction by common interest
 The cover experiment
 Infiltration of a politician network: Obama, Hariri…, Infiltration of a movement:
Syrian revolution, Infiltration of a star: Ronaldo, Infiltration of a company’s
group – using a profile with a cover photo that reflect a common interest and
without any other content
 Sending requests to 100 engaged users - 40% responded positively
Attraction through the value of friends
 Creating network value by choosing
popular friends
 The Spartacus experiment (male, very
small set of photos, standard mid-age
person with kids, etc.) - Different from
social bots: unattractive male, weird
name (cannot be confused with
someone else),
 Started with 5 real friends & only
chooses the most popular mutual
friends
 After 4 months from the beginning of
the experiment we started receiving
friend requests on a regular basis
(Prestige = 10% after 2 years)
 Currently has more than 500 friends
Attraction by impersonation
 Impersonating a public figure
 Zero friend request sent
 The impersonator just likes comments on Facebook talking about him and his actions
 2 experiments, 5000 friends reached exponentially in a matter of weeks
The strategic power of honeypot profiles
 Build their network
 Which is an optimized seeding population
 Of engaged fans of an adversary or friend.
Honeypot profiles
 Cannot be banned from a page
 Reach fans organically
 Can have a very high prestige rate depending on the method used
 Have the illusion of social proof, liking and reciprocity.
Discussion
 We are aware that our experiments on honeypot profiles and malevolent influence
in online social networks raise ethical questions. Yet, we hope that our work will
make brands and consumer more aware of the manipulation they can face on
online social network and help them find ways to immune themselves again such
malevolent attacks.
 We’re only seeing the tip of the OSN iceberg. Brands and consumers should be
ready for future and smarter evolutions.
 The same experiments can be reproduced with real Facebook accounts and the
findings can be used as well to create engaged communities and improve a
company’s reputation or promote brands in an ethical way.
Thank You
 Nasri Messarra: nasri@messarra.com
 Anne Mione: anne.mione@univ-montp1.fr

More Related Content

What's hot

Facebook and bullying
Facebook and bullyingFacebook and bullying
Facebook and bullyingdelmount
 
The Power of Like: How Brands Reach and Influence Fans Through Social Media M...
The Power of Like: How Brands Reach and Influence Fans Through Social Media M...The Power of Like: How Brands Reach and Influence Fans Through Social Media M...
The Power of Like: How Brands Reach and Influence Fans Through Social Media M...Jordi Sabater Domènech
 
Com score the power of like
Com score   the power of likeCom score   the power of like
Com score the power of likeSumit Roy
 
Fan Identification, Twitter Use, & Social Identity Theory in Sport
Fan Identification, Twitter Use, & Social Identity Theory in SportFan Identification, Twitter Use, & Social Identity Theory in Sport
Fan Identification, Twitter Use, & Social Identity Theory in Sportdaronvaught
 
Networks, Crowds & Markets Final Paper
Networks, Crowds & Markets Final PaperNetworks, Crowds & Markets Final Paper
Networks, Crowds & Markets Final PaperJason Rawlins
 
Heather Burchfield's #recruitcamp Nashville Presentation
Heather Burchfield's #recruitcamp Nashville PresentationHeather Burchfield's #recruitcamp Nashville Presentation
Heather Burchfield's #recruitcamp Nashville PresentationPaulette Bennett
 
UNF NP Management Conference 2011 Nonprofits and Social Media: An Introduction
UNF NP Management Conference 2011 Nonprofits and Social Media: An Introduction  UNF NP Management Conference 2011 Nonprofits and Social Media: An Introduction
UNF NP Management Conference 2011 Nonprofits and Social Media: An Introduction Georgette Dumont
 
Social Mar
Social MarSocial Mar
Social Marksawatzk
 

What's hot (12)

Facebook and bullying
Facebook and bullyingFacebook and bullying
Facebook and bullying
 
The Power of Like: How Brands Reach and Influence Fans Through Social Media M...
The Power of Like: How Brands Reach and Influence Fans Through Social Media M...The Power of Like: How Brands Reach and Influence Fans Through Social Media M...
The Power of Like: How Brands Reach and Influence Fans Through Social Media M...
 
The Power of Like
The Power of LikeThe Power of Like
The Power of Like
 
Com score the power of like
Com score   the power of likeCom score   the power of like
Com score the power of like
 
ICICCE0297
ICICCE0297ICICCE0297
ICICCE0297
 
Fan Identification, Twitter Use, & Social Identity Theory in Sport
Fan Identification, Twitter Use, & Social Identity Theory in SportFan Identification, Twitter Use, & Social Identity Theory in Sport
Fan Identification, Twitter Use, & Social Identity Theory in Sport
 
Networks, Crowds & Markets Final Paper
Networks, Crowds & Markets Final PaperNetworks, Crowds & Markets Final Paper
Networks, Crowds & Markets Final Paper
 
Com scorefacebook2011
Com scorefacebook2011Com scorefacebook2011
Com scorefacebook2011
 
Heather Burchfield's #recruitcamp Nashville Presentation
Heather Burchfield's #recruitcamp Nashville PresentationHeather Burchfield's #recruitcamp Nashville Presentation
Heather Burchfield's #recruitcamp Nashville Presentation
 
UNF NP Management Conference 2011 Nonprofits and Social Media: An Introduction
UNF NP Management Conference 2011 Nonprofits and Social Media: An Introduction  UNF NP Management Conference 2011 Nonprofits and Social Media: An Introduction
UNF NP Management Conference 2011 Nonprofits and Social Media: An Introduction
 
ASA style sample
ASA style sampleASA style sample
ASA style sample
 
Social Mar
Social MarSocial Mar
Social Mar
 

Similar to Honeypot profiles and malevolent e-reputation attacks on Facebook

Sweeny smx-social-media-2014 with-notes
Sweeny smx-social-media-2014 with-notesSweeny smx-social-media-2014 with-notes
Sweeny smx-social-media-2014 with-notesBrightEdge
 
Future of Online Organizing training
Future of Online Organizing training  Future of Online Organizing training
Future of Online Organizing training Cheryl Contee
 
Minnesota Planned Giving Council
Minnesota Planned Giving CouncilMinnesota Planned Giving Council
Minnesota Planned Giving Counciljmstremcha
 
CMC Group 3: WhatsThat Chrome Extension
CMC Group 3: WhatsThat Chrome ExtensionCMC Group 3: WhatsThat Chrome Extension
CMC Group 3: WhatsThat Chrome ExtensionLarissaChurchill
 
Social Media - Goldmine or Landmine
Social Media - Goldmine or LandmineSocial Media - Goldmine or Landmine
Social Media - Goldmine or LandmineSteve Lowisz
 
Sweeny smx-social-media-2014 final-with-notes
Sweeny smx-social-media-2014 final-with-notesSweeny smx-social-media-2014 final-with-notes
Sweeny smx-social-media-2014 final-with-notesMarianne Sweeny
 
Social Media and Marketing: One Practitioner's Perspective
Social Media and Marketing: One Practitioner's PerspectiveSocial Media and Marketing: One Practitioner's Perspective
Social Media and Marketing: One Practitioner's PerspectiveAndrew Careaga
 
Evans DC Ethics of Behavioral Design
Evans DC Ethics of Behavioral DesignEvans DC Ethics of Behavioral Design
Evans DC Ethics of Behavioral DesignDavid Evans
 
Social Media 101 for Associations with notes
Social Media 101 for Associations with notesSocial Media 101 for Associations with notes
Social Media 101 for Associations with notesDeirdre Reid
 
Social Network Theory & Analysis
Social Network Theory & Analysis Social Network Theory & Analysis
Social Network Theory & Analysis Susan Chesley Fant
 
Understand and Unleash the Power of Word of Mouth Marketing
Understand and Unleash the Power of Word of Mouth MarketingUnderstand and Unleash the Power of Word of Mouth Marketing
Understand and Unleash the Power of Word of Mouth MarketingRipple6, Inc.
 
League of American Orchestras
League of American OrchestrasLeague of American Orchestras
League of American OrchestrasBeth Kanter
 
Introduction to Computational Social Science
Introduction to Computational Social ScienceIntroduction to Computational Social Science
Introduction to Computational Social SciencePremsankar Chakkingal
 
How to Make People Click on a Dangerous Link Despite their Security Awareness
How to Make People Click on a Dangerous Link Despite their Security Awareness How to Make People Click on a Dangerous Link Despite their Security Awareness
How to Make People Click on a Dangerous Link Despite their Security Awareness mark-smith
 
Get Connected: Building Digital Relationships to Improve Recruiting
Get Connected: Building Digital Relationships to Improve RecruitingGet Connected: Building Digital Relationships to Improve Recruiting
Get Connected: Building Digital Relationships to Improve RecruitingMichelle Spellerberg, MBA
 
Social media marketing- Women Online
Social media marketing- Women OnlineSocial media marketing- Women Online
Social media marketing- Women OnlineWomen Online
 
Pages and Profiles: Understanding Facebook & Pinterest
Pages and Profiles: Understanding Facebook & Pinterest Pages and Profiles: Understanding Facebook & Pinterest
Pages and Profiles: Understanding Facebook & Pinterest Susan Chesley Fant
 

Similar to Honeypot profiles and malevolent e-reputation attacks on Facebook (20)

Sweeny smx-social-media-2014 with-notes
Sweeny smx-social-media-2014 with-notesSweeny smx-social-media-2014 with-notes
Sweeny smx-social-media-2014 with-notes
 
Future of Online Organizing training
Future of Online Organizing training  Future of Online Organizing training
Future of Online Organizing training
 
Minnesota Planned Giving Council
Minnesota Planned Giving CouncilMinnesota Planned Giving Council
Minnesota Planned Giving Council
 
CMC Group 3: WhatsThat Chrome Extension
CMC Group 3: WhatsThat Chrome ExtensionCMC Group 3: WhatsThat Chrome Extension
CMC Group 3: WhatsThat Chrome Extension
 
Social Media - Goldmine or Landmine
Social Media - Goldmine or LandmineSocial Media - Goldmine or Landmine
Social Media - Goldmine or Landmine
 
Sweeny smx-social-media-2014 final-with-notes
Sweeny smx-social-media-2014 final-with-notesSweeny smx-social-media-2014 final-with-notes
Sweeny smx-social-media-2014 final-with-notes
 
Social Media and Marketing: One Practitioner's Perspective
Social Media and Marketing: One Practitioner's PerspectiveSocial Media and Marketing: One Practitioner's Perspective
Social Media and Marketing: One Practitioner's Perspective
 
Evans DC Ethics of Behavioral Design
Evans DC Ethics of Behavioral DesignEvans DC Ethics of Behavioral Design
Evans DC Ethics of Behavioral Design
 
What is digital influence?
What is digital influence? What is digital influence?
What is digital influence?
 
Social Media 101 for Associations with notes
Social Media 101 for Associations with notesSocial Media 101 for Associations with notes
Social Media 101 for Associations with notes
 
Social Network Theory & Analysis
Social Network Theory & Analysis Social Network Theory & Analysis
Social Network Theory & Analysis
 
Understand and Unleash the Power of Word of Mouth Marketing
Understand and Unleash the Power of Word of Mouth MarketingUnderstand and Unleash the Power of Word of Mouth Marketing
Understand and Unleash the Power of Word of Mouth Marketing
 
League of American Orchestras
League of American OrchestrasLeague of American Orchestras
League of American Orchestras
 
Introduction to Computational Social Science
Introduction to Computational Social ScienceIntroduction to Computational Social Science
Introduction to Computational Social Science
 
How to Make People Click on a Dangerous Link Despite their Security Awareness
How to Make People Click on a Dangerous Link Despite their Security Awareness How to Make People Click on a Dangerous Link Despite their Security Awareness
How to Make People Click on a Dangerous Link Despite their Security Awareness
 
Get Connected: Building Digital Relationships to Improve Recruiting
Get Connected: Building Digital Relationships to Improve RecruitingGet Connected: Building Digital Relationships to Improve Recruiting
Get Connected: Building Digital Relationships to Improve Recruiting
 
Psychology of Social Media -- Portfolio
Psychology of Social Media -- PortfolioPsychology of Social Media -- Portfolio
Psychology of Social Media -- Portfolio
 
Marketing Case Competition part 2
Marketing Case Competition part 2Marketing Case Competition part 2
Marketing Case Competition part 2
 
Social media marketing- Women Online
Social media marketing- Women OnlineSocial media marketing- Women Online
Social media marketing- Women Online
 
Pages and Profiles: Understanding Facebook & Pinterest
Pages and Profiles: Understanding Facebook & Pinterest Pages and Profiles: Understanding Facebook & Pinterest
Pages and Profiles: Understanding Facebook & Pinterest
 

More from Nasri Messarra

Smart Govs III: How Political Players Sway Public Opinion
Smart Govs III: How Political Players Sway Public OpinionSmart Govs III: How Political Players Sway Public Opinion
Smart Govs III: How Political Players Sway Public OpinionNasri Messarra
 
From smart mobs to smart govs
From smart mobs to smart govsFrom smart mobs to smart govs
From smart mobs to smart govsNasri Messarra
 
The use of fake profiles on Facebook for business and research
The use of fake profiles on Facebook for business and researchThe use of fake profiles on Facebook for business and research
The use of fake profiles on Facebook for business and researchNasri Messarra
 
Social Media Analysis in a Nutshell
Social Media Analysis in a NutshellSocial Media Analysis in a Nutshell
Social Media Analysis in a NutshellNasri Messarra
 
Honey-pot profiles and malevolent e-reputation attacks on Facebook
Honey-pot profiles and malevolent e-reputation attacks on FacebookHoney-pot profiles and malevolent e-reputation attacks on Facebook
Honey-pot profiles and malevolent e-reputation attacks on FacebookNasri Messarra
 
Soutenance Stratégie du marketing viral sur Facebook-v4_EN
Soutenance Stratégie du marketing viral sur Facebook-v4_ENSoutenance Stratégie du marketing viral sur Facebook-v4_EN
Soutenance Stratégie du marketing viral sur Facebook-v4_ENNasri Messarra
 
Rethinking marketing strategies on facebook
Rethinking marketing strategies on facebookRethinking marketing strategies on facebook
Rethinking marketing strategies on facebookNasri Messarra
 
Finding political network bridges on facebook
Finding political network bridges on facebookFinding political network bridges on facebook
Finding political network bridges on facebookNasri Messarra
 
Initiating a Network Effect in a Social Network - A Facebook Experiment
Initiating a Network Effect in a Social Network - A Facebook ExperimentInitiating a Network Effect in a Social Network - A Facebook Experiment
Initiating a Network Effect in a Social Network - A Facebook ExperimentNasri Messarra
 

More from Nasri Messarra (9)

Smart Govs III: How Political Players Sway Public Opinion
Smart Govs III: How Political Players Sway Public OpinionSmart Govs III: How Political Players Sway Public Opinion
Smart Govs III: How Political Players Sway Public Opinion
 
From smart mobs to smart govs
From smart mobs to smart govsFrom smart mobs to smart govs
From smart mobs to smart govs
 
The use of fake profiles on Facebook for business and research
The use of fake profiles on Facebook for business and researchThe use of fake profiles on Facebook for business and research
The use of fake profiles on Facebook for business and research
 
Social Media Analysis in a Nutshell
Social Media Analysis in a NutshellSocial Media Analysis in a Nutshell
Social Media Analysis in a Nutshell
 
Honey-pot profiles and malevolent e-reputation attacks on Facebook
Honey-pot profiles and malevolent e-reputation attacks on FacebookHoney-pot profiles and malevolent e-reputation attacks on Facebook
Honey-pot profiles and malevolent e-reputation attacks on Facebook
 
Soutenance Stratégie du marketing viral sur Facebook-v4_EN
Soutenance Stratégie du marketing viral sur Facebook-v4_ENSoutenance Stratégie du marketing viral sur Facebook-v4_EN
Soutenance Stratégie du marketing viral sur Facebook-v4_EN
 
Rethinking marketing strategies on facebook
Rethinking marketing strategies on facebookRethinking marketing strategies on facebook
Rethinking marketing strategies on facebook
 
Finding political network bridges on facebook
Finding political network bridges on facebookFinding political network bridges on facebook
Finding political network bridges on facebook
 
Initiating a Network Effect in a Social Network - A Facebook Experiment
Initiating a Network Effect in a Social Network - A Facebook ExperimentInitiating a Network Effect in a Social Network - A Facebook Experiment
Initiating a Network Effect in a Social Network - A Facebook Experiment
 

Recently uploaded

pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxarsathsahil
 
GreenSEO April 2024: Join the Green Web Revolution
GreenSEO April 2024: Join the Green Web RevolutionGreenSEO April 2024: Join the Green Web Revolution
GreenSEO April 2024: Join the Green Web RevolutionWilliam Barnes
 
How to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessHow to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessAggregage
 
Social Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa
 
Local SEO Domination: Put your business at the forefront of local searches!
Local SEO Domination:  Put your business at the forefront of local searches!Local SEO Domination:  Put your business at the forefront of local searches!
Local SEO Domination: Put your business at the forefront of local searches!dstvtechnician
 
Red bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxxRed bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxx216310017
 
BLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_April2024. Balmer Lawrie Online Monthly BulletinBLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_April2024. Balmer Lawrie Online Monthly BulletinBalmerLawrie
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guidekiva6
 
What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?Juan Pineda
 
Best Persuasive selling skills presentation.pptx
Best Persuasive selling skills  presentation.pptxBest Persuasive selling skills  presentation.pptx
Best Persuasive selling skills presentation.pptxMasterPhil1
 
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Richard Ingilby
 
Mastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldMastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldScalenut
 
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO SuccessBrighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO SuccessVarn
 
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...Benjamin Szturmaj
 

Recently uploaded (20)

pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptx
 
GreenSEO April 2024: Join the Green Web Revolution
GreenSEO April 2024: Join the Green Web RevolutionGreenSEO April 2024: Join the Green Web Revolution
GreenSEO April 2024: Join the Green Web Revolution
 
No Cookies No Problem - Steve Krull, Be Found Online
No Cookies No Problem - Steve Krull, Be Found OnlineNo Cookies No Problem - Steve Krull, Be Found Online
No Cookies No Problem - Steve Krull, Be Found Online
 
How to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessHow to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail Success
 
Social Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdf
 
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting GroupSEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
 
Local SEO Domination: Put your business at the forefront of local searches!
Local SEO Domination:  Put your business at the forefront of local searches!Local SEO Domination:  Put your business at the forefront of local searches!
Local SEO Domination: Put your business at the forefront of local searches!
 
Red bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxxRed bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxx
 
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose GuirgisCreator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
 
Brand Strategy Master Class - Juntae DeLane
Brand Strategy Master Class - Juntae DeLaneBrand Strategy Master Class - Juntae DeLane
Brand Strategy Master Class - Juntae DeLane
 
BLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_April2024. Balmer Lawrie Online Monthly BulletinBLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
 
The Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison KaltmanThe Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison Kaltman
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guide
 
What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?
 
Best Persuasive selling skills presentation.pptx
Best Persuasive selling skills  presentation.pptxBest Persuasive selling skills  presentation.pptx
Best Persuasive selling skills presentation.pptx
 
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
 
Mastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldMastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven World
 
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO SuccessBrighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
 
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
 
BUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAIL
BUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAILBUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAIL
BUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAIL
 

Honeypot profiles and malevolent e-reputation attacks on Facebook

  • 1. Honeypot profiles and malevolent e-reputation attacks on Facebook Nasri Messarra, Anne Mione Université de Montpellier 1 – MRM International Network for Social Network Analysis (INSNA) Conference, Sunbelt XXXIV, Tampa, Florida, USA, 2014
  • 2. Background  Most SN studies in general & OSN studies in particular work on already existing networks to find influencers (Trusov, Bodapati & Bucklin), hubs, bridges, etc., and restructure them (Valente)  Social bots and fake profiles have one objective: maximizing the number of friends and then, eventually studying the resulting network (Boshmaf, Muslukhov). They are in majority based on sexual attraction (Barracuda statistics) and are used as carriers of information – not an influencers (empiric)  Recent studies show that size does not matter (Scarpi) and that one of the keys to success is the initial seeding population (Liu-Thompkins)  We believe that Facebook is not really a non-directed network (in & out degrees matter)
  • 3. How activists attack on Facebook 1- Post directly on the brand page 2- Post on their own social networks and Facebook communities and wait for the viral effect to reach the brand Reported cases & littérature about Nestlé, Pampers, DKNY, Marie-Claire, Capri Sun, Cooks Source, Bershka…
  • 4. Weaknesses of both methods 1- Post directly on the brand page 2- Post on their own social networks and Facebook communities and wait for the viral effect to reach the brand Exposure of consumer posts on the page was reduced since FB has chosen to put all customer comments in a small discrete area The user gets banned, Communication is closed Creating viral content is demanding and complex. Information may never break through
  • 5. Brand community On Facebook (Brand page) Engaged fans Efficient schema for a blitz unstoppable attack Personal timeline What if a person can become friend on his own timeline/profile with engaged fans of a brand? Diffusion will only need to be organic, not viral (no need for WOM for diffusion) The brand will not have direct control to ban the user Engaged fans
  • 6. Honeypot profiles Can we attract engaged fans of a brand Around a high-prestige profile (in degree > out degree) with common interests and call for reciprocity (the illusion of social proof) In order to create an efficient initial seeding population That can be reached directly through organic communication?
  • 7. Attraction by common interest  The cover experiment  Infiltration of a politician network: Obama, Hariri…, Infiltration of a movement: Syrian revolution, Infiltration of a star: Ronaldo, Infiltration of a company’s group – using a profile with a cover photo that reflect a common interest and without any other content  Sending requests to 100 engaged users - 40% responded positively
  • 8. Attraction through the value of friends  Creating network value by choosing popular friends  The Spartacus experiment (male, very small set of photos, standard mid-age person with kids, etc.) - Different from social bots: unattractive male, weird name (cannot be confused with someone else),  Started with 5 real friends & only chooses the most popular mutual friends  After 4 months from the beginning of the experiment we started receiving friend requests on a regular basis (Prestige = 10% after 2 years)  Currently has more than 500 friends
  • 9. Attraction by impersonation  Impersonating a public figure  Zero friend request sent  The impersonator just likes comments on Facebook talking about him and his actions  2 experiments, 5000 friends reached exponentially in a matter of weeks
  • 10. The strategic power of honeypot profiles  Build their network  Which is an optimized seeding population  Of engaged fans of an adversary or friend. Honeypot profiles  Cannot be banned from a page  Reach fans organically  Can have a very high prestige rate depending on the method used  Have the illusion of social proof, liking and reciprocity.
  • 11. Discussion  We are aware that our experiments on honeypot profiles and malevolent influence in online social networks raise ethical questions. Yet, we hope that our work will make brands and consumer more aware of the manipulation they can face on online social network and help them find ways to immune themselves again such malevolent attacks.  We’re only seeing the tip of the OSN iceberg. Brands and consumers should be ready for future and smarter evolutions.  The same experiments can be reproduced with real Facebook accounts and the findings can be used as well to create engaged communities and improve a company’s reputation or promote brands in an ethical way.
  • 12. Thank You  Nasri Messarra: nasri@messarra.com  Anne Mione: anne.mione@univ-montp1.fr

Editor's Notes

  1. We know how teens strive to avoid the low friends count humiliation and the effect of friend count on self-estime (Kim & Lee). Opt-in to become a friend with someone should have a value (empiric) Trusov, M., Bodapati, A. V, & Bucklin, R. E. (2010). Determining Influential Users in Internet Social Networks. Journal of Marketing Research, XLVII(August), 643–658. Tom Valente, Network Interventions Kim, J., & Lee, J.-E. R. (2011). The Facebook paths to happiness: effects of the number of Facebook friends and self-presentation on subjective well-being. Cyberpsychology, Behavior and Social Networking, 14(6), 359–64. doi:10.1089/cyber.2010.0374 Scarpi, D. (2010). Does size matter? An examination of small and large web-based brand communities. Journal of Interactive Marketing. Retrieved from http://www.sciencedirect.com/science/article/pii/S1094996809000899 Boshmaf, Y., & Muslukhov, I. (2011). The socialbot network: when bots socialize for fame and money. Proceedings of the 27th …. Retrieved from http://dl.acm.org/citation.cfm?id=2076746
  2. http://thenextweb.com/socialmedia/2010/11/30/brands-how-to-survive-a-facebook- attack/ Nestlé, Pampers, DKNY, Marie-Claire, Capri Sun, Cooks Source, Bershka…
  3. We’re eliminating both weakness The messenger is the message (Tom Valente) By the time the brand reports the attack to Facebook, the damage is done (time factor)
  4. Boshmaf, Y., Muslukhov, I., Beznosov, K., & Ripeanu, M. (2011). The Socialbot Network : When Bots Socialize for Fame and Money. University of British Columbia. Robert Cialdini 6 principles of influence social bots The classic method of making friends is creating a sexually attractive profile and using social bots to send massively requests to friends and mutual friends Weaknesses of the method “Friends” are targeted almost randomly, not “strategically”. The social bot is trying to maximize its social capital by increasing the number of friends. “Friends” are attracted by the “looks”: the social bot has no “authority” value.
  5. Magnifying glass