Professional Documents
Culture Documents
Is it easy for fake accounts to gain the information they need to impersonate/fraud another
user?
Intro
When looking to the how fake users on social media are common it was easy to see how the
can impersonate a person. Also when looking at whether if it is illegal to impersonate a person it
only became clear it was when the user was being fraud. The main issue with fake users is that
they are hard to detect and also difficult to be found. There is limited research that can be found
on the topic. Which in turn means there is a lot that can be explored when looking at what can
be done to help stop the use of fake accounts. There are possible applications for the sites that
could be suggested such as a program which will detect if the information and images have
been used before of the social media site that the fake account would like to use.
Literature Review
Research design
In order for a question a design needs to be put in place so that you do not lose track of where
you are going. So this is how a project will be investigated. For the dissertation the aim is to look
at what research needs to be done.
For the dissertation to take a full effect data first needs to be collected so that there is some
form of start to this project. Without collecting data it is hard part of the research project. This
data needs to be analysed as clean so that any data that is not needed or nulls are not there.
This may take a while to do as a lot of data may be collected and therefore make take a lot of
time to complete. Through a literature review it will come clear what methodologies that have
been used have worked to some degree. A literature review will be complete to look at other
research papers and how they have dealt with an issue similar to that of the topic of fraud and
social media. It is important that the literature review has points that relate to the topic and that it
can be linked back to previous research that has been completed. There is little knowledge on
fake accounts on social media and also on that of fraud. It is necessary that the dissertation that
is to be completed shows a methodology that has not been done before that would ideally stop
both fake accounts and fraud on social media sites. To gather the data needed a questionaire
will be created and distributed via different sources this will be done face to face and over social
media sites.
The choice to use qualitative data was made as the data that will be collected would either be
through interviews and questionnaires rather than a database of information. The only issue
with conducting interviews and questionnaires is that members that compete theses may not be
completely honest and not give the answer honestly. With the topic chosen been specific
members of the public may not know much information on what fraud is and fake accounts. This
could lead to them been misinformed. This then could lead to the data been collected not being
correct. To stop this from happening before the interview or questionnaire is conducted a brief
summary would be given to stop the any confusion that might occur. This would give be a
definition of what fraud is and in what ways it can occur. And similar with fake accounts on
social media. It is important that each participant knows what the definition and background of
the issues is. The questionnaires and interviews are the main where data will be collected from,
as well as looking at databases that my be able to help. This type of data would be used to
more for the fake accounts from social media as it would be easier for members of the public to
be able to answer questions about social media rather than that of fraud.
When looking at collecting data that has already been collect it can be difficult to clean the data
to find if it is useful for the topic. The data that would be collected from a database would be
quantitative data. As this would be reported as part of a statistically report with the numbers with
comparisons been made throughout the report. Unlike the qualitative data this dataset would
already be clean and able to use right away. No issues should arise while using this dataset,
also no human interaction would be needed for this data as it had already been collected
meaning that the data would be correct and with no issues. When collecting this type of data it
would be for the fraud aspect of the dissertation as a more wide range of data would be
available to use. With fraud it is a topic that is a topic which is spoke about, but not many people
actual know what it is.
The aim of the dissertation is to give a conclusive analysis, looking at all of the elements that
occur with the topic which has been chosen. This will include a suitable methodology which will
help to give direction and what will help to aid question at hand. It is important that all aspects of
the dissertation are discussed to a certain degree and are able to provide an answer which
would help to answer the research question.
Ethics
There are multiple resources that could be involved in order to complete the research that is at
hand. For example, a questionnaire would be filled out for the gaining data about whether
members of the public are aware about fake accounts on social media and this could lead to
misunderstanding data. Another risk to the survey would be if it is conducted outside in an
uncontrolled environment. This could lead to the survey conductor coming into harm’s way and
injuring themselves. This could be meaning that there is not a good representation of the data
that is needed. There are also issues that may arise when wanting to gather data from social
media sites as it may be difficult to gain the access that is needed. This could lead to legal
issues been raised and may not be given access to the data. Another issue is that gaining data
that is publicly available may also have missing data and this is an issue because it can give out
missing results which may affect the whole project.
BBC News. (2019). Millions lost in 'celebrity-backed scams'. [online] Available at:
https://www.bbc.co.uk/news/business-
48336169?intlink_from_url=https://www.bbc.co.uk/news/topics/cvwydw4g8pzt/fraud&link_locati
on=live-reporting-story
Ethics Checklist
This form is designed to help students and their supervisors to complete an ethical
scrutiny of proposed research. The SHU Research Ethics Policy should be consulted
before completing the form.
Answering the questions below will help you decide whether your proposed research
requires ethical review by a Designated Research Ethics Working Group.
The final responsibility for ensuring that ethical research practices are followed rests with
the supervisor for student research.
Note that students and staff are responsible for making suitable arrangements for keeping
data secure and, if relevant, for keeping the identity of participants anonymous.
They are also responsible for following SHU guidelines about data encryption and
research data management.
The form also enables the University and Faculty to keep a record confirming that
research conducted has been subjected to ethical scrutiny.
For student projects, the form may be completed by the student and the supervisor and/or
module leader (as applicable). In all cases, it should be counter-signed by the supervisor
and/or module leader, and kept as a record showing that ethical scrutiny has
occurred. Students should retain a copy for inclusion in their research projects, and staff
should keep a copy in the student file.
Please note if it may be necessary to conduct a health and safety risk assessment for the
proposed research. Further information can be obtained from the Faculty Safety Co-
ordinator.
General
Details
Course or qualification
(student)
Name of supervisor
email address
Title of proposed research Is it easy for fake accounts to gain the information
they need to impersonate/fraud another user?
Brief outline of research to When looking to the how fake users on social
include, rationale & aims media are common it was easy to see how the can
(250-500 words). impersonate a person. Also when looking at
whether if it is illegal to impersonate a person it
only became clear it was when the user was being
fraud. The main issue with fake users is that they
are hard to detect and also difficult to be found.
There is limited research that can be found on the
topic. Which in turn means there is a lot that can
be explored when looking at what can be done to
help stop the use of fake accounts. There are
possible applications for the sites that could be
suggested such as a program which will detect if
the information and images have been used
before of the social media site that the fake
account would like to use.
1. Health Related Research Involving the NHS or Social Care / Community Care or the
Criminal Justice Service or with research participants unable to provide informed
consent
Question Yes/No
1. Does the research involve? no
If you have answered YES to questions 1 & 2 then you must seek the appropriate
external approvals from the NHS, Social Care or the National Offender
Management Service (NOMS) under their independent Research Governance
schemes. Further information is provided below.
NHS https://www.myresearchproject.org.uk/Signin.aspx
* All prison and probation projects also need HM Prison and Probation Service (HMPPS)
approval. Further guidance at:
https://www.myresearchproject.org.uk/help/hlphmpps.aspx
NB FRECs provide Independent Scientific Review for NHS or SC research and initial
scrutiny for ethics applications as required for university sponsorship of the research.
Applicants can use the NHS proforma and submit this initially to their FREC.
Question Yes/No
Does the research involve human participants? This includes yes
surveys, questionnaires, observing behaviour etc.
Question Yes/No
5. Is pain or more than mild discomfort likely to result from the study? no
9. Is it covert research?
Note: ‘Covert research’ refers to research that is conducted without the
knowledge of participants.
10. Will the research output allow identification of any individual no
who has not given their express consent to be identified?
If you answered YES only to question 1, the checklist should be saved and any course
procedures for submission followed. If you have answered YES to any of the other
questions you are required to submit a SHUREC8A (or 8B) to the FREC. If you answered
YES to question 8 and participants cannot provide informed consent due to their
incapacity you must obtain the appropriate approvals from the NHS research governance
system. Your supervisor will advise.
3. Research in
Organisations
Question Yes/No
Question Yes/No
1. Will the research involve working with copyrighted documents, yes
films, broadcasts, photographs, artworks, designs, products,
programmes, databases, networks, processes, existing datasets
or secure data?
2. If you answered YES to question 1, are the materials you intend to use yes
in the public domain?
Notes: ‘In the public domain’ does not mean the same thing as ‘publicly
accessible’.
• Information which is 'in the public domain' is no longer
protected by copyright (i.e. copyright has either expired or been
waived) and can be used without permission.
• Information which is 'publicly accessible' (e.g. TV broadcasts,
websites, artworks, newspapers) is available for anyone to
consult/view. It is still protected by copyright even if there is no
copyright notice. In UK law, copyright protection is automatic
and does not require a copyright statement, although it is
always good practice to provide one. It is necessary to check
the terms and conditions of use to find out exactly how the
material may be reused etc.
If you answered YES to question 1, be aware that you may need to
consider other ethics codes. For example, when conducting Internet
research, consult the code of the Association of Internet Researchers;
for educational research, consult the Code of Ethics of the British
Educational Research Association.
Student
Name: Date:
Signature:
I can confirm that completion of this form has not identified the need for ethical
approval by the FREC or an NHS, Social Care or other external REC. The research
will not commence until any approvals required under Sections 3 & 4 have been
received.
Name: Date:
Signature:
Name: Date:
Signature:
Please ensure the following are included with this form if applicable, tick box to indicate:
Yes No N/A
Debriefing materials