{"id":199,"date":"2018-04-22T17:59:51","date_gmt":"2018-04-22T09:59:51","guid":{"rendered":"https:\/\/networkconference.netstudies.org\/2018OUA\/?p=199"},"modified":"2018-04-22T18:06:21","modified_gmt":"2018-04-22T10:06:21","slug":"using-manufactured-identities-in-online-social-media","status":"publish","type":"post","link":"https:\/\/networkconference.netstudies.org\/2018OUA\/2018\/04\/22\/using-manufactured-identities-in-online-social-media\/","title":{"rendered":"Using Manufactured Identities in Online Social Media"},"content":{"rendered":"\r\nAbstract\r\nThe use of pseudonyms and personas when creating profiles within online social media serves to provide many vulnerable people with a way to safely have an online presence without the fear of harassment or real world threats. The rise in the number of hacking incidents involving identity theft combined with a growing number of reports of fake online identities being used for malicious and criminal intent, has led to companies such as Facebook implementing security measures such as the <a href=\"https:\/\/networkconference.netstudies.org\/2018OUA\/2018\/04\/22\/using-manufactured-identities-in-online-social-media\/\" class=\"more-link\">Read more [...]<\/a>","protected":false},"excerpt":{"rendered":"<p>Abstract The use of pseudonyms and personas when creating profiles within online social media serves to provide many vulnerable people with a way to safely have an online presence without the fear of harassment or real world threats. The rise in the number of hacking incidents involving identity theft combined with a growing number of reports of fake online identities being used for malicious and criminal intent, has led to companies such as Facebook implementing security measures such as the Read more [&#8230;]<\/p>\n","protected":false},"author":32,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[27,77,23,73,75,76,74,31],"class_list":["post-199","post","type-post","status-publish","format-standard","hentry","category-identity","tag-anonymity","tag-facebook","tag-identity","tag-online-communities","tag-personas","tag-privacy","tag-pseudonyms","tag-social-networks"],"_links":{"self":[{"href":"https:\/\/networkconference.netstudies.org\/2018OUA\/wp-json\/wp\/v2\/posts\/199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/networkconference.netstudies.org\/2018OUA\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/networkconference.netstudies.org\/2018OUA\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/networkconference.netstudies.org\/2018OUA\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/networkconference.netstudies.org\/2018OUA\/wp-json\/wp\/v2\/comments?post=199"}],"version-history":[{"count":6,"href":"https:\/\/networkconference.netstudies.org\/2018OUA\/wp-json\/wp\/v2\/posts\/199\/revisions"}],"predecessor-version":[{"id":222,"href":"https:\/\/networkconference.netstudies.org\/2018OUA\/wp-json\/wp\/v2\/posts\/199\/revisions\/222"}],"wp:attachment":[{"href":"https:\/\/networkconference.netstudies.org\/2018OUA\/wp-json\/wp\/v2\/media?parent=199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/networkconference.netstudies.org\/2018OUA\/wp-json\/wp\/v2\/categories?post=199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/networkconference.netstudies.org\/2018OUA\/wp-json\/wp\/v2\/tags?post=199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}