Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems 2018
DOI: 10.1145/3173574.3173786
|View full text |Cite
|
Sign up to set email alerts
|

Examining the Demand for Spam

Abstract: Despite significant advances in automated spam detection, some spam content manages to evade detection and engage users. While the spam supply chain is well understood through previous research, there is little understanding of spam consumers. We focus on the demand side of the spam equation examining what drives users to click on spam via a largescale analysis of de-identified, aggregated Facebook log data (n=600,000). We find (1) that the volume of spam and clicking norms in a users' network are significantl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
23
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 30 publications
(24 citation statements)
references
References 45 publications
1
23
0
Order By: Relevance
“…Similarly to Redmiles et al [27], our work intends to shed some light on the dynamics behind user clicks on social networks. However, as opposed to Redmiles et al [27], our work does not study social connections between users or user properties such as demographics. Instead, our work focuses on the content of a link preview, the trustworthiness of the link preview creation, and it explores the extent to which an attacker can control the fields displayed to the victims.…”
Section: A Analysis Of Clicks On Social Platformsmentioning
confidence: 97%
See 4 more Smart Citations
“…Similarly to Redmiles et al [27], our work intends to shed some light on the dynamics behind user clicks on social networks. However, as opposed to Redmiles et al [27], our work does not study social connections between users or user properties such as demographics. Instead, our work focuses on the content of a link preview, the trustworthiness of the link preview creation, and it explores the extent to which an attacker can control the fields displayed to the victims.…”
Section: A Analysis Of Clicks On Social Platformsmentioning
confidence: 97%
“…Victim -The victim of these attacks can be a specific individual or small group of individuals (i.e., targeted attack), or as many users as possible, indiscriminately. For the analysis of this paper, we consider skilled and experienced social network users-a category of users who is less prone to click on malicious URLs [27], [8], [17], [38].…”
Section: Threat Modelmentioning
confidence: 99%
See 3 more Smart Citations