posted by system || 5596 views || tracked by 8 users: [display]

PSOSM 2013 : Second International Workshop on Privacy and Security in Online Social Media

FacebookTwitterLinkedInGoogle

Link: http://precog.iiitd.edu.in/events/psosm2013
 
When May 14, 2013 - May 14, 2013
Where Rio, Brazil
Abstract Registration Due Feb 22, 2013
Submission Deadline Feb 25, 2013
Categories    privacy   security   social media
 

Call For Papers

Topics / themes include, but not limited to the following:

Information privacy disclosure, revelation and its effects in OSM and online social networks
Collateral damage due to information leakage (e.g. through photo tagging) on OSM
Privacy issues related to location based services on OSM
Effective and usable privacy setting and policies on OSM
Anonymization of social network dataset
Identifying and preventing social spam (including phishing and frauds) campaigns
Tracking social footprint / identities across different social network
Detection and characterization of spam, phishing, frauds, hate crime, abuse, extremism via online social media
Cyber-bullying, abuse and harassment detection, and prevention strategies
Identifying and curbing malware, phishing, and botnets on OSM
Filtering of pornography, viruses, and human trafficking on OSM
Studying the social and economic impact of security and privacy issues on OSM
User behavior towards change in privacy features in OSM
Usability (including design flaws) of secure systems on online social media
Data modeling of human behavior in context of security and privacy threats
Privacy and security in social gaming applications
Trust systems based on social networks
Legal and ethical issues for researchers studying security and privacy on OSM
Information credibility on OSM
Security and Privacy issues in new entrants in OSM (e.g. Google Plus)
Effect of OSM on conventional crime (robberies and theft)
Means to maintain different legitimate identities on the same OSM service
Access control, rights management, and security of social content
Privacy-enhancing technologies, including anonymity, pseudonymity and identity management, specifically for the web
Identifying fraudulent entities in online social networks
Problems due to unification of different identities of the same persona on different social media services
Using social media (e.g. Twitter) as sensors for decision making at the organization level (i.e. detecting outbreaks)

Related Resources

PST 2020   18th Annual International Conference on Privacy, Security, and Trust (PST2020)
SP 2020   IEEE Symposium on Security and Privacy
CPCS 2020   Call for Chapters: Security and Privacy in Cyber-Physical Systems: Threats and Defenses
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
SPIoT 2020   9th International Symposium on Security and Privacy on the Internet of Things
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
CANS 2020   Cryptology and Network Security
MoWiN 2020   9th International Conference on Mobile & Wireless Networks
CASON 2020   The 9th International Conference on Computational Aspects of Social Networks
NCWMC 2020   5th International Conference on Networks, Communications, Wireless and Mobile Computing