doi:10.1016/j.bushor.2009.09.003.
Kietzmann, J.H., Hermkens, K., McCarthy, I.P., Silvestre,
B.S., 2011. Social media? Get serious! Understanding
the functional building blocks of social media. Bus.
Horiz., SPECIAL ISSUE: SOCIAL MEDIA 54, 241–
251. doi:10.1016/j.bushor.2011.01.005.
Kontaxis, G., Polakis, I., Ioannidis, S., Markatos, E.P.,
2011. Detecting social network profile cloning, in:
2011 IEEE International Conference on Pervasive
Computing and Communications Workshops
(PERCOM Workshops). Presented at the 2011 IEEE
International Conference on Pervasive Computing and
Communications Workshops (PERCOM Workshops),
pp. 295–300. doi:10.1109/PERCOMW.2011.5766886.
Krombholz, K., Hobel, H., Huber, M., Weippl, E., 2015.
Advanced Social Engineering Attacks. J Inf Secur
Appl 22, 113–122. doi:10.1016/j.jisa.2014.09.005.
Krombholz, K., Merkl, D., Weippl, E., 2012. Fake
identities in social media: A case study on the
sustainability of the Facebook business model. J. Serv.
Sci. Res. 4, 175–212. doi:10.1007/s12927-012-0008-z.
Lee, K., Caverlee, J., Webb, S., 2010. Uncovering Social
Spammers: Social Honeypots + Machine Learning, in:
Proceedings of the 33rd International ACM SIGIR
Conference on Research and Development in
Information Retrieval, SIGIR ’10. ACM, New York,
NY, USA, pp. 435–442. doi:10.1145/1835449.
1835522.
Lee, K., Webb, S., Ge, H., 2015. Characterizing and
automatically detecting crowdturfing in Fiverr and
Twitter. Soc. Netw. Anal. Min. 5, 2.
doi:10.1007/s13278-014-0241-1.
Lee, K., Webb, S., Ge, H., 2014. The Dark Side of Micro-
Task Marketplaces: Characterizing Fiverr and
Automatically Detecting Crowdturfing.
ArXiv14060574 Phys.
Nazir, A., Raza, S., Chuah, C.-N., Schipper, B., 2010.
Ghostbusting Facebook: Detecting and Characterizing
Phantom Profiles in Online Social Gaming
Applications, in: Proceedings of the 3rd Wonference
on Online Social Networks, WOSN’10. USENIX
Association, Berkeley, CA, USA, pp. 1–1.
Song, J., Lee, S., Kim, J., 2015. CrowdTarget: Target-
based Detection of Crowdturfing in Online Social
Networks, in: Proceedings of the 22Nd ACM SIGSAC
Conference on Computer and Communications
Security, CCS ’15. ACM, New York, NY, USA, pp.
793–804. doi:10.1145/2810103.2813661.
Stringhini, G., Kruegel, C., Vigna, G., 2010. Detecting
Spammers on Social Networks, in: Proceedings of the
26th Annual Computer Security Applications
Conference, ACSAC ’10. ACM, New York, NY,
USA, pp. 1–9. doi:10.1145/1920261.1920263.
Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna,
G., Zheng, H., Zhao, B.Y., 2013. Follow the Green:
Growth and Dynamics in Twitter Follower Markets,
in: Proceedings of the 2013 Conference on Internet
Measurement Conference, IMC ’13. ACM, New York,
NY, USA, pp. 163–176. doi:10.1145/2504730.
2504731.
Thomas, K., McCoy, D., Grier, C., Kolcz, A., Paxson, V.,
2013. Trafficking Fraudulent Accounts: The Role of
the Underground Market in Twitter Spam and Abuse,
in: Proceedings of the 22Nd USENIX Conference on
Security, SEC’13. USENIX Association, Berkeley,
CA, USA, pp. 195–210.
Viswanath, B., Bashir, M.A., Crovella, M., Guha, S.,
Gummadi, K.P., Krishnamurthy, B., Mislove, A.,
2014. Towards Detecting Anomalous User Behavior
in Online Social Networks, in: 23rd USENIX Security
Symposium (USENIX Security 14). USENIX
Association, San Diego, CA, pp. 223–238.
Wang, G., Wang, T., Zhang, H., Zhao, B.Y., 2014. Man
vs. Machine: Practical Adversarial Detection of
Malicious Crowdsourcing Workers, in: Proceedings of
the 23rd USENIX Conference on Security
Symposium, SEC’14. USENIX Association, Berkeley,
CA, USA, pp. 239–254.
Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M.,
Zheng, H., Zhao, B.Y., 2012. Serf and Turf:
Crowdturfing for Fun and Profit, in: Proceedings of
the 21st International Conference on World Wide
Web, WWW ’12. ACM, New York, NY, USA, pp.
679–688. doi:10.1145/2187836.2187928.
Yang, C., Harkreader, R.C., Gu, G., 2011. Die Free or
Live Hard? Empirical Evaluation and New Design for
Fighting Evolving Twitter Spammers, in: Proceedings
of the 14th International Conference on Recent
Advances in Intrusion Detection, RAID’11. Springer-
Verlag, Berlin, Heidelberg, pp. 318–337.
doi:10.1007/978-3-642-23644-0_17.
Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai,
Y., 2011. Uncovering Social Network Sybils in the
Wild, in: Proceedings of the 2011 ACM SIGCOMM
Conference on Internet Measurement Conference,
IMC ’11. ACM, New York, NY, USA, pp. 259–268.
doi:10.1145/2068816.2068841.
Zang, W., Zhang, P., Wang, X., Shi, J., Guo, L., 2013.
Detecting Sybil Nodes in Anonymous Communication
Systems. Procedia Comput. Sci., First International
Conference on Information Technology and
Quantitative Management 17, 861–869. doi:10.1016/
j.procs.2013.05.110.