posted by system || 7202 views || tracked by 8 users: [display]

PSOSM 2013 : Second International Workshop on Privacy and Security in Online Social Media

FacebookTwitterLinkedInGoogle

Link: http://precog.iiitd.edu.in/events/psosm2013
 
When May 14, 2013 - May 14, 2013
Where Rio, Brazil
Abstract Registration Due Feb 22, 2013
Submission Deadline Feb 25, 2013
Categories    privacy   security   social media
 

Call For Papers

Topics / themes include, but not limited to the following:

Information privacy disclosure, revelation and its effects in OSM and online social networks
Collateral damage due to information leakage (e.g. through photo tagging) on OSM
Privacy issues related to location based services on OSM
Effective and usable privacy setting and policies on OSM
Anonymization of social network dataset
Identifying and preventing social spam (including phishing and frauds) campaigns
Tracking social footprint / identities across different social network
Detection and characterization of spam, phishing, frauds, hate crime, abuse, extremism via online social media
Cyber-bullying, abuse and harassment detection, and prevention strategies
Identifying and curbing malware, phishing, and botnets on OSM
Filtering of pornography, viruses, and human trafficking on OSM
Studying the social and economic impact of security and privacy issues on OSM
User behavior towards change in privacy features in OSM
Usability (including design flaws) of secure systems on online social media
Data modeling of human behavior in context of security and privacy threats
Privacy and security in social gaming applications
Trust systems based on social networks
Legal and ethical issues for researchers studying security and privacy on OSM
Information credibility on OSM
Security and Privacy issues in new entrants in OSM (e.g. Google Plus)
Effect of OSM on conventional crime (robberies and theft)
Means to maintain different legitimate identities on the same OSM service
Access control, rights management, and security of social content
Privacy-enhancing technologies, including anonymity, pseudonymity and identity management, specifically for the web
Identifying fraudulent entities in online social networks
Problems due to unification of different identities of the same persona on different social media services
Using social media (e.g. Twitter) as sensors for decision making at the organization level (i.e. detecting outbreaks)

Related Resources

CYBERSEC 2026   The First International Conference on Security and Cybersecurity in the AI and Digital Context
AI in Social Sciences 2026   AI in Social Sciences (working title)
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
DIGITAS 2026   The Second International Conference on Digitalization and Smart Solutions
AMA 2026   10th International Conference on Applied Mathematics and Sciences
CENTRIC 2026   The Nineteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
SCOM 2026   14th International Conference on Soft Computing
ICAITD 2026   International Conference on AI new Technologies and open Discussions
Ubi-Media 2026   The Fourteenth International Conference on Ubi-Media Computing