| |||||||||||||
PSOSM 2013 : Second International Workshop on Privacy and Security in Online Social Media | |||||||||||||
Link: http://precog.iiitd.edu.in/events/psosm2013 | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
Topics / themes include, but not limited to the following:
Information privacy disclosure, revelation and its effects in OSM and online social networks Collateral damage due to information leakage (e.g. through photo tagging) on OSM Privacy issues related to location based services on OSM Effective and usable privacy setting and policies on OSM Anonymization of social network dataset Identifying and preventing social spam (including phishing and frauds) campaigns Tracking social footprint / identities across different social network Detection and characterization of spam, phishing, frauds, hate crime, abuse, extremism via online social media Cyber-bullying, abuse and harassment detection, and prevention strategies Identifying and curbing malware, phishing, and botnets on OSM Filtering of pornography, viruses, and human trafficking on OSM Studying the social and economic impact of security and privacy issues on OSM User behavior towards change in privacy features in OSM Usability (including design flaws) of secure systems on online social media Data modeling of human behavior in context of security and privacy threats Privacy and security in social gaming applications Trust systems based on social networks Legal and ethical issues for researchers studying security and privacy on OSM Information credibility on OSM Security and Privacy issues in new entrants in OSM (e.g. Google Plus) Effect of OSM on conventional crime (robberies and theft) Means to maintain different legitimate identities on the same OSM service Access control, rights management, and security of social content Privacy-enhancing technologies, including anonymity, pseudonymity and identity management, specifically for the web Identifying fraudulent entities in online social networks Problems due to unification of different identities of the same persona on different social media services Using social media (e.g. Twitter) as sensors for decision making at the organization level (i.e. detecting outbreaks) |
|