CREATION OF FAKE IDENTITIES ON SOCIAL MEDIA AN ANALYSIS OF FACEBOOK

http://dx.doi.org/10.31703/gdpmr.2022(V-II).05      10.31703/gdpmr.2022(V-II).05      Published : Jun 2022
Authored by : Sohail Taj , Babar Hussain Shah

05 Pages : 44-52

    Abstract

    Facebook is one of the most popular social networking sites, but some call it a "fake book" (Mülle & Schulz, 2019). Hence to explore the phenomenon of fake identities, the study examined how Facebook users construct their identities and how much profile information is phoney. The study used a survey methodology, and 647 university students (252 male and 351 female) participated. Facebook has 14 fields of profile data against which respondents have answered on the Likert scale whether they disclose their accurate information. The study found that both male (mean score 1.9) and female (mean score 2.3) Facebook users create fake identities, but women create more fake identities than men.

    Key Words

    Facebook, Online Identity, Social Media Identity, Fake Profiles

    Introduction

    Internet Communication Technology has bridged the world, and now people here and far away are connected (Gralla, 1998). This connected world is called cyberspace, where people interact with one another, make friends, have discussions on topics of common interests, share their photos and activities, etc. (Perdew, 2014). Web 2.0 has gifted us the interactive version of the Internet, i.e., social networking sites, wikis, blogs, chat forums, and email facilities are some gifts of Web 2.0 (Bria, 2013).

    Social networking sites have around 300 million consumers globally. Before smartphones, a computer device and internet connection were required for this connectivity. Now handsets have built-in fast internet service, and connectivity with peers in cyberspace has become easy (Rachakonda, 2016). 

    In the real world, an identifier is issued by the government in an identity card, driving license, and passport; in the cyber world, no such proof is required (Romanov et al., 2017). Computer-mediated communication allows users to create a virtual personality (Johnson & Miller, 1998).

    In cyberspace, users decide how they would present themselves. Some share their accurate information, while some prefer anonymity over their original identity (Warburton, 2012). In this virtual world, creating identity is easy because no proof is required. A person can use a fake photo, address, profession, and other identity features (Perdew, 2014).

    There are several reasons why people prefer to use anonymous or fake identities. For instance, Brennan and Pettit (2004) noted that people find it easy to express themselves when they are undercover. They are open to sharing their opinions and discussions when their identity is unknown (Kim 2012; Lange 2007; Papacharissi 2009), while some are shy with their real identity (McKenna et al., 2002). People may also create fake accounts for stalking, phishing, advertising, spamming, etc. (Wani et al., 2017).


    Background

    Roots of the Internet takes us back to a military project of the United States of America in the 1960s. This project was called Advanced Researched Project Agency. The said project sent and received the data packets with the help of computer technology (Lipschultz, 2020).

    Wireless connectivity, called Wi-Fi, was invented in the 1980s; however, it came into proper utilisation in 1999. This wireless connectivity gave new horizons to the use of the Internet and connectivity among the people in the cyber world (Anniss, 2014).

     During the 1990s, the Internet came into the general public's access, and they would connect through the Internet using a phone line and a modem (Ryan, 2011). Internet Realy Chat Client (mIRC) was the earliest program designed to exchange text messages, and mIRC did not require identification and allowed an anonymous chatting facility (van Doorn et al., 2008). In 2002 sixdegrees.com was launched as the first social networking site (Doser, 2018).

    Now with the courtesy of smartphones, the Internet is in the hands of everyone. Who thought that Motorola's cell phone of 28 ounces (Woyke, 2014) would get so slim that everyone would carry it in their hands and pockets 24 hours a day.

    Initially, mobile phones worked with narrow band technology to carry the voice. Over time the technology of 2G merged, which supported short message services and emails. The 2G technology helped a maximum of 9kbs of the data. During the 1990s, 3G technology was merged, supporting 2MB of data. With this advancement, users can use the Internet while walking, travelling, and performing daily house chores (Dahlman et al., 2010).

    Fourth-generation technology supports 100 Mbs (Adibi, Mobasher, & Tofighbakhsh, 2009), and now 5G technology is ready to take over the Internet landscape with a data transfer rate of 10 Gbps (Rodriguez, 2015).

    Web 1.0 had simple features like creating the content, sharing, and resharing it. While Web 2.0 is an interactive and advanced version that provides a suitable base for social networking sites (Bruns, 2008; Kaplan & Haenlein, 2010).

    Lipschultz (2020) has explained that social networking sites have provided new ways of interaction. People can share information and content. Facebook has a wall, Twitter has a Feed, and Linkedin has an endorsement.

    In 2004 Facebook and Myspace allowed their consumers to create customised profiles (Asur & Huberman, 2010). Mark Zuckerberg created Facebook with his friends, which students of Harvard used. It started with 650 students; after a month, 10,000 students joined this network. One in seven people has a Facebook account (Harris, 2012). The site is top-ranked, with 3 billion users who exchange 100 billion messages daily (Facebook, 2020).

    Literature Review

    This study deals with the creation of fake identities. Let's see how various scholars have defined "identity." Abrams and Hogg (2006) say that identity is a fundamental concept of the people about themselves. Identity is what they think they are. According to Deng (2011), identity is how people relate themselves to their religion, caste, language, culture, ethnicity, and race.

     Hence the concept of the person has two sides. One is what they are, and the other one is what they would like to become. The thought of becoming their imagined self is called fantasised self or the ideal self (Markus & Nurius, 1986). Therefore, identity creation is a continuous process in which people create their different identities to resolve their inner conflicts (Meryem, 2020).

    Users on social networking sites feel free to express themselves when their identities are not disclosed. They are comfortable and even more open in an anonymous environment where they are not identifiable (Brennan & Pettit, 2004).

    Alhabash et al. (2012) measured seven motivations, i.e., (1) social connection (maintaining a relationship, finding people, receiving friend requests, connecting and reconnecting with the people), (2) shared identities (joining groups, organisations, events, finding likeminded people), (3) photographs (tagging for being tagged in the pictures, sharing the pictures, views the photos), (4) content (playing games, participation in quizzes and using applications within Facebook); (5) social investigation (meeting new people, going into an advance search for people and stalking people), (6) social network surfing (checking profiles of friends, probing profiles of others' friends, looking into profiles of other people in general) and (7) status (for updating their status and for looking that what others have on their status).

    According to Romanov (2017), Facebook is a big platform with 5-11% per cent of fake identities from 2013-to 14. Similarly, Herzberg (n.d.) argues that around nine per cent of fake accounts on Fakebook might have been cloned, compromised, and fabricated.

    Da Silva (2017) noted that some fake accounts had been created for data harvesting. These fake accounts become friends with the people and steal their essential information.

    Hermawati et al. (2021) explored why fake accounts were created on Instagram. They concluded that fantasies, low self-confidence, and escape from the social realities lead teenagers to create fake identities.

    Meryem (2020) explained that Netizens create fake accounts to share photos and videos they do not own, for absurd discussion, for passing nasty comments, for passing aggressive messages, for defamation, for dating, and to fool others.

    Alkawaz et al. (2020) noted that on Facebook, respondents disclosed: 54% real name, age 37%, date of birth 75%, Gender 81%, email 85%, contact number 15%, home address 11%, workplace and job position 33%, interests 27%, family members 27%, relationship status 33%, 45 % actual profile picture.

    Zimmer (2010) argues that having a fake name is deception, and only 3.8% of consumers had fake names on Facebook. While Taraszow et al. (2010) noted that 10% of their respondents share their phone numbers, 10% disclose their city of living, and 54% identified their hometown.

    Kwon et al. (2015) noted that social network consumers adopt self-censorship while discussing politics. Rainie and Smith (2012) summed that 22% of the users do not share their political views to avoid offending someone, while 68% prefer silence on such discussion. While, Kaloydis, Richard, and Maas (2017) argue that it is difficult to openly discuss religious beliefs on social networking sites.

    Southcott (2019) noted that gender plays a vital role in the self-presentation of social networks because men are dominant and open while women remain restricted. Similarly, Shafie et al. (2012) view females as using attractive names while males use real names.

    WU et al. (2015) argue that photos on Facebook are a tool for self-presentation. Through photo presentations, consumers illustrate their personalities. According to Wang et al. (2010), other people in the network give importance to the photos in deciding whether they want to initiate a relationship or not.

    Kaskazi (2014) noted that some people create fake Facebook identities to initiate romantic relationships. While Liu et al. (2013) elaborate that people who disclose factual information about their sex, relationship, address, and date of birth are at a higher risk that their sensitive information could be leaked out.

    Nosko (2010) explains that social media users do not share their date of birth, name, and contact information because they may feel insecure.

    Wang and Kobsa (2009) argued that some people do not want to share their professional information. Sometimes it is because of their sensitivity and on-demand of the employer, while some seek privacy.

    Panek et al. (2018) noted that people from different ethnicities have different disclosures in the about me section. For instance, African-American users write more than white Americans in the "about me" section.

    People make friends on social networking sites considering their mutual interests (Kiesbye, 2011). Facebook users also join different groups to meet and discuss with like-minded people.

    Facebook users seek privacy and do not disclose their activities on Facebook. They also think they might have to be answerable if they reveal their activities  (Noelle-Neumann, 1993).

    Froomkin (1999) argues that going undercover and creating fake identities may give some people a sense of protection, but it opens the doors to libel, spamming copyrights, and illegal activities.

    People who use their real identities are more substantial and make healthier online relationships (Marx, 1999). Therefore, Facebook also pushes its users to use real names and photos and adopt real identities (Nagel & Frith, 2015).

     

    Research Gap

    The study has been conducted to fill the gap in the research undertaken by Wani et al. (2017). The researchers explained in detail why fake identities are created. Still, the researchers didn't pinpoint specific social networking sites and didn't quantify which account information is inaccurate. Hence, this study has focused on Facebook and the 14 profile data fields.

     

    Research Questions

    RQ 1: Do Facebook users construct Fake identities?

    RQ 2: Whether male or female Facebook users construct more fake identities?

     

    Based on the literature review, the following constructs have to be measured for analysing fake identities on Facebook.


     

    Table 1. Constructs of the Study

    Construct(s)

    Reference(s)

    Name

    (Zimmer, 2010)

    Phone Number

    (Taraszow et al., 2010)

    City of Living

    (Taraszow et al., 2010)

    Native Town

    (Taraszow et al., 2010)

    Political Views

    (Kwon et al., 2015)

    Religious Views

    (Kaloydis et al., 2017)

    Gender

    (Southcott, 2019)

    Photo

    (WU et al., 2015)

    Relationship Status

    (Kaskazi, 2014)

    Activities

    (Noelle-Neumann, 1993)

    Date of Birth

    (Molema, 2010)

    Professional Information / University Name

    (Wang & Kobsa, 2009)

    About Me

    (Panek et al., 2018)

    Interests

    (Kiesbye, 2011)

     


    Theoretical Framework

    On social media, consumers actively create their profiles, post content of their choice, and interact with others (Bruns, 2008; Kaplan & Haenlein, 2010). This phenomenon is supported by the Uses and Gratification Theory (U&G) of Mass Communication. Katz (1974) argues that U&G theory focuses on what people do with the media and make choices. Fortner and Fackler (2014) explain that U&G theory conceptualises the audience, focuses on people's actions, and finds the needs sought and met.

    Methodology

    It is a quantitative research that measures variables using instruments by gathering numerical data, which is then examined using statistical methods. It looks for casual relationships and finds the association or relationship between the variables. (Creswell & Creswell, 2017).

    The study's sample frame is students of Islamabad capital territory enrolled in universities recognised by the Higher Commission of Pakistan. According to the University-wise Enrolment of 2017-18, these universities have 1,65,086 students.

    The study has applied a Proportionate sampling strategy - a method for gathering participants for a study). It is used when the population is composed of several subgroups that are vastly different in number. The number of participants from each subset is determined by their number relative to the entire population. The sample size is 1061 with a three per cent margin error and 95% confidence interval.

    The study has used the survey method for gathering the data. The tool was designed on five points Likert scale. 

    Results

    Figure 1

    Facebook Users Who do not Disclose Phone Number

    Figure 2

    Facebook Users with Fake Relationship Status

    Figure 3

    Facebook Users with Fake Political Views

    Figure 4

    Facebook users with Fake Photos

    Figure 5

    Facebook Users with the Fake Description "about me"

    Figure 6

    Facebook Users with Fake Interests


    Figure 7

    Facebook Users with Fake Political Activities

    Figure 8

    Facebook Users with Fake University Names

    Figure 9

    Facebook Users with the Fake Living City

    Figure 10

    Facebook Users with Fake Religious Views

    Figure 11

    Facebook Users with Fake Native City

    Figure 12

    Facebook Users with a Fake Name

    Figure 13

    Facebook Users with a Fake Date of Birth

    Figure 14

    Facebook Users with a Fake Gender

    Results

    Following are the mean scores of males, females, and those who did not disclose their gender, explaining the creation of fake identities on Facebook.


     

    Table 2. Mean Score for Constructing Fake Identities

    Gender

    Mean Score for Fake Identities

    Males

    1.9

    Females

    2.3

    Undisclosed Gender

    2.1

    Conclusion

    Both male and female Facebook users construct

    fake identities, but female users create more fake identities than males.

References

  • Abrams, D., & Hogg, M. A. (2006). Social identifications: A social psychology of intergroup relations and group processes. Routledge.
  • Alhabash, S., Park, H., Kononova, A., Chiang, Y. H., & Wise, K. (2012). Exploring the Motivations of Facebook Use in Taiwan. Cyberpsychology, Behavior, and Social Networking, 15(6), 304–311.
  • Anniss, Matt. (2014) How does a network work? Gareth Stevens Publishing
  • Brennan, G., & Pettit, P. (2004). Esteem, ldentifiability and the Internet. Analyse & Kritik, 26(1), 139–157.
  • Teixeira Da Silva, J. A. (2017). Fake peer reviews, fake identities, fake accounts, fake data: beware! AME Medical Journal, 2, 28.
  • Dahlman, E., Parkvall, S., Skold, J., & Beming, P. (2010). 3G evolution: HSPA and LTE for mobile broadband. Academic press.
  • Deng, F. M. (2011). War of visions: Conflict of identities in the Sudan. Brookings Institution Press.
  • Facebook. (2020). Facebook Statistics 2. Available at:
  • Froomkin, A. M. (1999). Legal Issues in Anonymity and Pseudonymity. The Information Society, 15(2), 113–127.
  • Gralla, P. (1998). How the Internet works. Que Publishing.
  • Hermawati, T., Setyaningsih, R., & Nugraha, R. P. (2021). Teen Motivation to Create Fake Identity Account on Instagram Social Media. International Journal of Multicultural and Multireligious Understanding, 8(4), 87.
  • Johnson, D. G., & Miller, K. (1998). Anonymity, pseudonymity, or inescapable identity on the net (abstract). ACM SIGCAS Computers and Society, 28(2), 37–38.
  • Kaloydis, F. O., Richard, E. M., & Maas, E. M. (2017). Sharing political and religious information on Facebook: coworker reactions. The Journal of Social Media in Society, 6(2), 239-270.
  • Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of Social Media. Business Horizons, 53(1), 59–68.
  • Khoshsabk, N., & Southcott, J. (2019). Gender Identity and Facebook: Social Conservatism and Saving Face. The Qualitative Report 24(4), 632-647.
  • Kiesbye, S. (Ed.). (2011). Are Social Networking Sites Harmful?. Greenhaven Press.
  • Kim, S. H. (2012). Testing Fear of Isolation as a Causal Mechanism: Spiral of Silence and Genetically Modified (GM) Foods in South Korea. International Journal of Public Opinion Research, 24(3), 306–324.
  • Kwon, K. H., Moon, S. I., & Stefanone, M. A. (2014). Unspeaking on Facebook? Testing network effects on self-censorship of political expressions in social network sites. Quality & Quantity, 49(4), 1417–1435.
  • Lange, P. G. (2007). Publicly Private and Privately Public: Social Networking on YouTube. Journal of Computer-Mediated Communication, 13(1), 361–380.
  • Lipschultz, J. H. (2020). Social media communication: Concepts, practices, data, law and ethics. Routledge.
  • Liu, C., Ang, R. P., & Lwin, M. O. (2013). Cognitive, personality, and social factors associated with adolescents' online personal information disclosure. Journal of adolescence, 36(4), 629-638.
  • Markus, H., & Nurius, P. (1986). Possible selves. American psychologist, 41(9), 954.
  • McKenna, K. Y., Green, A. S., & Gleason, M. E. (2002). Relationship formation on the Internet: What's the big attraction?. Journal of social issues, 58(1), 9-31.
  • Müller, P., & Schulz, A. (2019). Facebook or Fakebook? How users’ perceptions of ‘fakenews’ are related to their evaluation and verification of news on Facebook. Studies in Communication and Media, 8(4), 547–559.
  • Noelle-Neumann, E. (1993). The spiral of silence: Public opinion--Our social skin. University of Chicago Press.
  • Nosko, A., Wood, E., & Molema, S. (2010). All about me: Disclosure in online social networking profiles: The case of Facebook. Computers in human behavior, 26(3), 406- 418.
  • Panek, E., Nardis, Y., & Auverset, L. (2018). It's All about Me (or Us): Facebook Post Frequency & Focus as Related to Narcissism. The Journal of Social Media in Society, 7(2), 1-17.
  • Papacharissi, Z. (2009). The virtual geographies of social networks: a comparative analysis of Facebook, LinkedIn and ASmallWorld. New Media & Society, 11(1–2), 199–220.
  • Perdew, L. (2014). Online Identity. Abdo.
  • Rainie, L., & Smith, A. (2012). Social networking sites and politics. Washington, DC: Pew Internet & American Life Project. Retrieved June, 12, 2012.
  • Ryan, P. (2011). Social networking. The Rosen Publishing Group, Inc.
  • Shafie, L. A., Nayan, S., & Osman, N. (2012). Constructing identity through facebook profiles: Online identity and visual impression management of university students in Malaysia. Procedia-Social and Behavioral Sciences, 65, 134-140.
  • Taraszow, T., Aristodemou, E., Shitta, G., Laouris, Y., & Arsoy, A. (2010). Disclosure of personal and contact information by young people in social networking sites: An analysis using Facebook profiles as an example. International Journal of Media & Cultural Politics, 6(1), 81–101.
  • Van Doorn, N., Wyatt, S., & Van Zoonen, L. (2008). A body of text: Revisiting textual performances of gender and sexuality on the Internet. Feminist Media Studies, 8(4), 357-374.
  • Wang, S. S., Moon, S. I., Kwon, K. H., Evans, C. A., & Stefanone, M. A. (2010). Face off: Implications of visual cues on initiating friendship on Facebook. Computers in Human Behavior, 26(2), 226-234.
  • Wani, M. A., Sofi, M. A., & Wani, S. Y. (2017). Why Fake Profiles: A study of Anomalous users in different categories of Online Social Networks. International Journal of Engineering Technology Science and Research, 4 (9), 320-329.
  • Warburton, S. (Ed.). (2012). Digital identity and social media. IGI Global.
  • Woyke, E. (2014). The Smartphone: Anatomy of an industry. The new press.
  • Wu, Y. C. J., Chang, W. H., & Yuan, C. H. (2015). Do Facebook profile pictures reflect user’s personality? Computers in Human Behavior, 51, 880–889.
  • Zimmer, M. (2010). Facebook's Zuckerberg: "Having two identities for yourself is an example of a lack of integrity.". Michael Zimmer, 14.S

Cite this article

    CHICAGO : Taj, Sohail, and Babar Hussain Shah. 2022. "Creation of Fake Identities on Social Media: An Analysis of Facebook." Global Digital & Print Media Review, V (II): 44-52 doi: 10.31703/gdpmr.2022(V-II).05
    HARVARD : TAJ, S. & SHAH, B. H. 2022. Creation of Fake Identities on Social Media: An Analysis of Facebook. Global Digital & Print Media Review, V, 44-52.
    MHRA : Taj, Sohail, and Babar Hussain Shah. 2022. "Creation of Fake Identities on Social Media: An Analysis of Facebook." Global Digital & Print Media Review, V: 44-52
    MLA : Taj, Sohail, and Babar Hussain Shah. "Creation of Fake Identities on Social Media: An Analysis of Facebook." Global Digital & Print Media Review, V.II (2022): 44-52 Print.
    OXFORD : Taj, Sohail and Shah, Babar Hussain (2022), "Creation of Fake Identities on Social Media: An Analysis of Facebook", Global Digital & Print Media Review, V (II), 44-52
    TURABIAN : Taj, Sohail, and Babar Hussain Shah. "Creation of Fake Identities on Social Media: An Analysis of Facebook." Global Digital & Print Media Review V, no. II (2022): 44-52. https://doi.org/10.31703/gdpmr.2022(V-II).05