{"id":"https://openalex.org/W4321380162","doi":"https://doi.org/10.34028/iajit/20/2/15","title":"In Loco Identity Fraud Detection Model using Statistical Analysis for Social Networking Sites: A Case Study with Facebook","display_name":"In Loco Identity Fraud Detection Model using Statistical Analysis for Social Networking Sites: A Case Study with Facebook","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4321380162","doi":"https://doi.org/10.34028/iajit/20/2/15"},"language":"en","primary_location":{"id":"doi:10.34028/iajit/20/2/15","is_oa":true,"landing_page_url":"https://doi.org/10.34028/iajit/20/2/15","pdf_url":null,"source":{"id":"https://openalex.org/S100666833","display_name":"The International Arab Journal of Information Technology","issn_l":"1683-3198","issn":["1683-3198","2309-4524"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4362726017","host_organization_name":"Zarqa University","host_organization_lineage":["https://openalex.org/P4362726017"],"host_organization_lineage_names":["Zarqa University"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International Arab Journal of Information Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.34028/iajit/20/2/15","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034009103","display_name":"Shalini Hanok","orcid":null},"institutions":[{"id":"https://openalex.org/I4210137436","display_name":"JSS Science and Technology University","ror":"https://ror.org/04mnmkz07","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210137436"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shalini Hanok","raw_affiliation_strings":["Electronics and Communication Engineering, ATME College of Engineering, Karnataka","Shankaraiah Sri Jayachamarajendra College of Engineering (SJCE), JSS Science and Technology University, Karnataka"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Electronics and Communication Engineering, ATME College of Engineering, Karnataka","institution_ids":[]},{"raw_affiliation_string":"Shankaraiah Sri Jayachamarajendra College of Engineering (SJCE), JSS Science and Technology University, Karnataka","institution_ids":["https://openalex.org/I4210137436"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071875890","display_name":"Shankaraiah Shankaraiah","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shankaraiah Shankaraiah","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5034009103"],"corresponding_institution_ids":["https://openalex.org/I4210137436"],"apc_list":null,"apc_paid":null,"fwci":1.315,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.83178659,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"20","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9721999764442444,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.726193368434906},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.6923865079879761},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6823441386222839},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.6620336174964905},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6594010591506958},{"id":"https://openalex.org/keywords/spouse","display_name":"Spouse","score":0.5941281914710999},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.5649359226226807},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5571708083152771},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5314753651618958},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.4702429175376892},{"id":"https://openalex.org/keywords/internet-users","display_name":"Internet users","score":0.4525349736213684},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4373815655708313},{"id":"https://openalex.org/keywords/online-identity","display_name":"Online identity","score":0.4260643422603607},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.41243863105773926},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.25150278210639954},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.143238365650177},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.13234931230545044},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.09439146518707275}],"concepts":[{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.726193368434906},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.6923865079879761},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6823441386222839},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.6620336174964905},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6594010591506958},{"id":"https://openalex.org/C2777495918","wikidata":"https://www.wikidata.org/wiki/Q1196129","display_name":"Spouse","level":2,"score":0.5941281914710999},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.5649359226226807},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5571708083152771},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5314753651618958},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.4702429175376892},{"id":"https://openalex.org/C3019036681","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"Internet users","level":3,"score":0.4525349736213684},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4373815655708313},{"id":"https://openalex.org/C2780542009","wikidata":"https://www.wikidata.org/wiki/Q1091147","display_name":"Online identity","level":3,"score":0.4260643422603607},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.41243863105773926},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.25150278210639954},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.143238365650177},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.13234931230545044},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.09439146518707275},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.34028/iajit/20/2/15","is_oa":true,"landing_page_url":"https://doi.org/10.34028/iajit/20/2/15","pdf_url":null,"source":{"id":"https://openalex.org/S100666833","display_name":"The International Arab Journal of Information Technology","issn_l":"1683-3198","issn":["1683-3198","2309-4524"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4362726017","host_organization_name":"Zarqa University","host_organization_lineage":["https://openalex.org/P4362726017"],"host_organization_lineage_names":["Zarqa University"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International Arab Journal of Information Technology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.34028/iajit/20/2/15","is_oa":true,"landing_page_url":"https://doi.org/10.34028/iajit/20/2/15","pdf_url":null,"source":{"id":"https://openalex.org/S100666833","display_name":"The International Arab Journal of Information Technology","issn_l":"1683-3198","issn":["1683-3198","2309-4524"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4362726017","host_organization_name":"Zarqa University","host_organization_lineage":["https://openalex.org/P4362726017"],"host_organization_lineage_names":["Zarqa University"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International Arab Journal of Information Technology","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1500855703","https://openalex.org/W1528177290","https://openalex.org/W1781642226","https://openalex.org/W2062837055","https://openalex.org/W2071051349","https://openalex.org/W2117410972","https://openalex.org/W2125441033","https://openalex.org/W2162826105","https://openalex.org/W2168980949","https://openalex.org/W2342426366","https://openalex.org/W2397135192","https://openalex.org/W2408574227","https://openalex.org/W2508568678","https://openalex.org/W2510476599","https://openalex.org/W2524624025","https://openalex.org/W2551090952","https://openalex.org/W2595521492","https://openalex.org/W2735077801","https://openalex.org/W2786537343","https://openalex.org/W2896379568","https://openalex.org/W2896416676","https://openalex.org/W2979847881","https://openalex.org/W2980013009","https://openalex.org/W3018324503","https://openalex.org/W3052871334","https://openalex.org/W4229452260","https://openalex.org/W4280533272","https://openalex.org/W4281263927","https://openalex.org/W6630104509","https://openalex.org/W6683814169","https://openalex.org/W6729853723","https://openalex.org/W6776134283"],"related_works":["https://openalex.org/W2121587354","https://openalex.org/W182956790","https://openalex.org/W2186893595","https://openalex.org/W2080177354","https://openalex.org/W1981963489","https://openalex.org/W2595760708","https://openalex.org/W2184450942","https://openalex.org/W3180177175","https://openalex.org/W2026740268","https://openalex.org/W4200527052"],"abstract_inverted_index":{"Rapid":[0],"advancement":[1],"in":[2,89,95,130,140,178,184],"internet":[3],"has":[4,36],"made":[5],"many":[6],"Social":[7],"Networking":[8],"Sites":[9],"(SNS)":[10],"popular":[11],"among":[12],"a":[13,148,174],"huge":[14],"population,":[15],"as":[16],"various":[17,39],"SNS":[18,105,111,176],"accounts":[19,112],"are":[20,75,87],"interlinked":[21],"with":[22],"each":[23],"other,":[24],"spread":[25],"of":[26,30,45,57,62,124,132,201],"stored":[27],"susceptible":[28],"information":[29],"an":[31,108,117,139],"individual":[32],"is":[33,47,54,92,187],"increasing.":[34],"That":[35],"led":[37],"to":[38,66,70,152,169],"security":[40],"and":[41,194],"privacy":[42],"issues;":[43],"one":[44],"them":[46],"impersonation":[48],"or":[49,59],"identity":[50,65,142],"fraud.":[51],"Identity":[52],"fraud":[53,143],"the":[55,96,122,125,155,160],"outcome":[56],"illegitimate":[58,118],"secret":[60],"use":[61],"account":[63,69,97,126,177],"owner\u2019s":[64,98,127],"invade":[67],"his/her":[68],"track":[71],"personal":[72,104],"information.":[73,134],"There":[74],"possibilities":[76],"that":[77,146],"known":[78,162],"persons":[79],"like":[80],"parents,":[81],"spouse,":[82],"close":[83],"friends,":[84],"siblings":[85],"who":[86],"interested":[88],"knowing":[90],"what":[91],"going":[93],"on":[94],"online":[99],"life":[100],"may":[101,166],"check":[102],"their":[103],"accounts.":[106],"Hence":[107],"individual\u2019s":[109],"private":[110,133],"can":[113],"be":[114,167],"invaded":[115],"by":[116],"user":[119],"secretly":[120],"without":[121],"knowledge":[123],"which":[128,158],"results":[129],"compromise":[131],"Thus,":[135],"this":[136,185],"paper":[137],"proposes":[138],"loco":[141],"detection":[144],"strategy":[145,165],"employs":[147],"statistical":[149],"analysis":[150],"approach":[151],"constantly":[153],"authenticate":[154],"authorized":[156],"user,":[157],"outperforms":[159],"previously":[161],"technique.":[163],"This":[164],"used":[168],"prevent":[170],"stalkers":[171],"from":[172],"penetrating":[173],"person's":[175],"real":[179],"time.":[180],"The":[181],"accuracy":[182],"attained":[183],"research":[186],"greater":[188,195],"than":[189,196],"90%":[190],"after":[191,198],"1":[192],"minute":[193],"95%":[197],"5":[199],"minutes":[200],"observation.":[202]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
