posted by system || 6464 views || tracked by 8 users: [display]

PSOSM 2013 : Second International Workshop on Privacy and Security in Online Social Media

FacebookTwitterLinkedInGoogle

Link: http://precog.iiitd.edu.in/events/psosm2013
 
When May 14, 2013 - May 14, 2013
Where Rio, Brazil
Abstract Registration Due Feb 22, 2013
Submission Deadline Feb 25, 2013
Categories    privacy   security   social media
 

Call For Papers

Topics / themes include, but not limited to the following:

Information privacy disclosure, revelation and its effects in OSM and online social networks
Collateral damage due to information leakage (e.g. through photo tagging) on OSM
Privacy issues related to location based services on OSM
Effective and usable privacy setting and policies on OSM
Anonymization of social network dataset
Identifying and preventing social spam (including phishing and frauds) campaigns
Tracking social footprint / identities across different social network
Detection and characterization of spam, phishing, frauds, hate crime, abuse, extremism via online social media
Cyber-bullying, abuse and harassment detection, and prevention strategies
Identifying and curbing malware, phishing, and botnets on OSM
Filtering of pornography, viruses, and human trafficking on OSM
Studying the social and economic impact of security and privacy issues on OSM
User behavior towards change in privacy features in OSM
Usability (including design flaws) of secure systems on online social media
Data modeling of human behavior in context of security and privacy threats
Privacy and security in social gaming applications
Trust systems based on social networks
Legal and ethical issues for researchers studying security and privacy on OSM
Information credibility on OSM
Security and Privacy issues in new entrants in OSM (e.g. Google Plus)
Effect of OSM on conventional crime (robberies and theft)
Means to maintain different legitimate identities on the same OSM service
Access control, rights management, and security of social content
Privacy-enhancing technologies, including anonymity, pseudonymity and identity management, specifically for the web
Identifying fraudulent entities in online social networks
Problems due to unification of different identities of the same persona on different social media services
Using social media (e.g. Twitter) as sensors for decision making at the organization level (i.e. detecting outbreaks)

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IMCOM 2025   19th International Conference on Ubiquitous Information Management and Communication
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
SOTICS 2025   The Fifteenth International Conference on Social Media Technologies, Communication, and Informatics
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
ICWSM 2025   International AAAI Conference on Web and Social Media third submission
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
BIOSIG 2025   International Conference of the Biometrics Special Interest Group
eKNOW 2025   The Seventeenth International Conference on Information, Process, and Knowledge Management
IJMPICT 2024   International Journal of Managing Public Sector Information and Communication Technologies