Targeted advertising remains an important part of the free web browsing experience, where advertisers' targeting and personalization algorithms together find the most relevant audience for millions of ads every day. However, given the wide use of advertising, this also enables using ads as a vehicle for problematic content, such as scams or clickbait. Recent work that explores people's sentiments toward online ads, and the impacts of these ads on people's online experiences, has found evidence that online ads can indeed be problematic. Further, there is the potential for personalization to aid the delivery of such ads, even when the advertiser targets with low specificity. In this paper, we study Facebook--one of the internet's largest ad platforms--and investigate key gaps in our understanding of problematic online advertising: (a) What categories of ads do people find problematic? (b) Are there disparities in the distribution of problematic ads to viewers? and if so, (c) Who is responsible--advertisers or advertising platforms? To answer these questions, we empirically measure a diverse sample of user experiences with Facebook ads via a 3-month longitudinal panel. We categorize over 32,000 ads collected from this panel (n = 132); and survey participants' sentiments toward their own ads to identify four categories of problematic ads. Statistically modeling the distribution of problematic ads across demographics, we find that older people and minority groups are especially likely to be shown such ads. Further, given that 22% of problematic ads had no specific targeting from advertisers, we infer that ad delivery algorithms (advertising platforms themselves) played a significant role in the biased distribution of these ads.
more »
« less
A Heuristic Method for Identifying Scam Ads on Craigslist
Craigslist is a popular online customer-to-customer marketplace, which has attracted millions of consumers for trading and purchasing secondhand items. Because of the high financial return that sellers could gain from using this site and the anonymity option that the website provides to its users, Craigslist is highly subject to fraudulent activities. The primary objective of this study is to detect scam ads on Craigslist. Based on the related literature and our observations of ads collected from the platform, we develop a heuristic method for identifying scam ads. We evaluate the proposed heuristics by conducting an experiment and performing additional data analyses using real data. The results provide preliminary evidence for efficacy of the heuristics developed in this study.
more »
« less
- Award ID(s):
- 1912898
- PAR ID:
- 10095443
- Date Published:
- Journal Name:
- European Intelligence & Security Informatics Conference
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Gross, Thomas; Vigano, Luca (Ed.)We present the results of a research study in which participants were subjected to social engineering attacks via telephone, telephone scams, in order to determine the features of scams which peopleare most susceptible to. The study has involved 186 university participants who were attacked with one of 27 different attack scripts which span different independent variables including the pretext used and the method of elicitation. In order to ensure informed consent, each participant was warned that they would receive a scam phone call within 3 months. One independent variable used is the time between the warning and launching the scam. In spite of this warning, a large fraction of participants were still deceived by the scam. A limitation to research in the study of telephone scams is the lack of a dataset of real phone scams for examination. Each phone call in our study was recorded and we present the dataset of these recordings, and their transcripts. To our knowledge, there is no similar publicly-available dataset or phone scams. We hope that our dataset will support future research in phone scams and their detection.more » « less
-
null (Ed.)A bstract Using the fact that flat space with a boundary is related by a Weyl transformation to anti-de Sitter (AdS) space, one may study observables in boundary conformal field theory (BCFT) by placing a CFT in AdS. In addition to correlation functions of local operators, a quantity of interest is the free energy of the CFT computed on the AdS space with hyperbolic ball metric, i.e. with a spherical boundary. It is natural to expect that the AdS free energy can be used to define a quantity that decreases under boundary renormalization group flows. We test this idea by discussing in detail the case of the large N critical O ( N ) model in general dimension d , as well as its perturbative descriptions in the epsilon-expansion. Using the AdS approach, we recover the various known boundary critical behaviors of the model, and we compute the free energy for each boundary fixed point, finding results which are consistent with the conjectured F -theorem in a continuous range of dimensions. Finally, we also use the AdS setup to compute correlation functions and extract some of the BCFT data. In particular, we show that using the bulk equations of motion, in conjunction with crossing symmetry, gives an efficient way to constrain bulk two-point functions and extract anomalous dimensions of boundary operators.more » « less
-
null (Ed.)We consider a logit model-based framework for modeling joint pricing and assortment decisions that take into account customer features. This model provides a significant advantage when one has insufficient data for any one customer and wishes to generalize learning about one customer’s preferences to the population. Under this model, we study the statistical learning task of model fitting from a static store of precollected customer data. This setting, in contrast to the popular learning and earning paradigm, represents the situation many business teams encounter in which their data collection abilities have outstripped their data analysis capabilities. In this learning setting, we establish finite-sample convergence guarantees on the model parameters. The parameter convergence guarantees are then extended to out-of-sample performance guarantees in terms of revenue, in the form of a high-probability bound on the gap between the expected revenue of the best action taken under the estimated parameters and the revenue generated by a decision maker with full knowledge of the choice model. We further discuss practical implications of these bounds. We demonstrate the personalization approach using ticket purchase data from an airline carrier. This paper was accepted by J. George Shanthikumar, special issue on data-driven prescriptive analyticsmore » « less
-
The Internet's combination of low communication cost, global reach, and functional anonymity has allowed fraudulent scam volumes to reach new heights. Designing effective interventions requires first understanding the context: how scammers reach potential victims, the earnings they make, and any potential bottlenecks for durable interventions. In this short paper, we focus on these questions in the context of cryptocurrency giveaway scams, where victims are tricked into irreversibly transferring funds to scammers under the pretense of even greater returns. Combining data from Twitter (also known as X), YouTube and Twitch livestreams, landing pages, and cryptocurrency blockchains, we measure how giveaway scams operate at scale. We find that 1 in 1000 scam tweets, and 4 in 100,000 livestream views, net a victim, and that scammers managed to extract nearly $4.62 million from just hundreds of victims during our measurement window.more » « less
An official website of the United States government

