SlideShare une entreprise Scribd logo
1  sur  40
Télécharger pour lire hors ligne
Privacy	
  and	
  Security	
  in	
  Online	
  
Social	
  Media	
  
Keynote	
  @	
  SSCC’16	
  
Sept	
  22,	
  2016
Ponnurangam	
  Kumaraguru	
  (“PK”)
Associate	
  Professor
ACM	
  Distinguished	
  Speaker
fb/ponnurangam.kumaraguru,	
  @ponguru
Who	
  am	
  I?	
  
– Associate	
  Professor,	
  IIIT-­‐Delhi	
  	
  
– Ph.D.	
  from	
  School	
  of	
  Computer	
  Science,	
  	
  
Carnegie	
  Mellon	
  University	
  (CMU)	
  	
  
– Research	
  interests	
  
-Social	
  Computing,	
  Computational	
  Social	
  Science,	
  
Complex	
  Networks	
  pertaining	
  to	
  Human	
  Behavior,	
  
specifically	
  in	
  the	
  context	
  of	
  Security	
  &	
  Privacy
– Co-­‐ordinate	
  and	
  manage	
  Precog,	
  
precog.iiitd.edu.in
– ACM	
  Distinguished	
  Speaker	
  
2
https://www.youtube.com/channel/UCHWDvG
Dh4QjWbV79bM2neSg
3
4
What	
  we	
  dabble	
  with!	
  
Non-­‐trustworthy	
  Content
FAKE
5
$
RUMORS
Methodology
6
Training	
  Data
– 500	
  Tweets	
  per	
  event
– Used	
  CrowdFlower
7
Event Tweets Users
Boston	
  Marathon	
  Blasts	
  (2013) 7,888,374 3,677,531
Typhoon Haiyan /	
  Yolanda	
  (2013) 671,918 368,269
Cyclone	
  Phailin (2013) 76,136 34,776
Washington	
  Navy yard shootings (2013) 484,609 257,682
Polar	
  vortex cold wave (2014) 143,959 116,141
Oklahoma	
  Tornadoes (2013) 809,154 542,049
Total	
  	
   10,074,150 4,996,448
Credibility	
  Modeling	
  
8
Feature	
  set	
   Features (45)	
  
Tweet	
  meta-­‐data	
  
Number	
  of	
  seconds	
  since	
  the	
  tweet;	
  Source	
  of	
  tweet	
  (mobile	
  /	
  web/	
  
etc);	
  Tweet	
  contains	
  geo-­‐coordinates
Tweet	
  content	
  (simple)	
  
Number	
  of	
  characters;	
  Number	
  of	
  words;	
  Number	
  of	
  URLs;	
  Number	
  of	
  
hashtags;	
  Number	
  of	
  unique	
  characters;	
  Presence	
  of	
  stock	
  symbol;	
  
Presence	
  of	
  happy	
  smiley;	
  Presence	
  of	
  sad	
  smiley;	
  Tweet	
  contains	
  
`via';	
  Presence	
  of	
  colon	
  symbol
Tweet	
  content	
  (linguistic)	
  
Presence	
  of	
  swear	
  words;	
  Presence	
  of	
  negative	
  emotion	
  words;	
  
Presence	
  of	
  positive	
  emotion	
  words;	
  Presence	
  of	
  pronouns;	
  Mention	
  
of	
  self	
  words	
  in	
  tweet	
  (I;	
  my;	
  mine)
Tweet	
  author	
   Number	
  of	
  followers;	
  friends;	
  time	
  since	
  the	
  user	
  if	
  on	
  Twitter;	
  etc.
Tweet	
  network	
  
Number	
  of	
  retweets;	
  Number	
  of	
  mentions;	
  Tweet	
  is	
  a	
  reply;	
  Tweet	
  is	
  a	
  
retweet
Tweet links	
   WOT	
  score	
  for	
  the	
  URL;	
  Ratio	
  of	
  likes	
  /	
  dislikes	
  for	
  a	
  YouTube	
  video
Implementation
Feedback	
  by	
  Users
10
v
Harvard	
  (1839)	
  – Harvard	
  – Harvard	
  – Harvard	
  – MIT	
  –
Northwestern	
  – UIUC	
  – WUSL	
  – CMU	
  (2009)	
  – IIITD	
  
(2015)	
  	
  	
  	
  
12
http://twitdigest.iiitd.edu.in/TweetCred/
13
De-­‐duplicating	
  audience
Social	
  audience	
  	
  =	
  437,632	
  +	
  153,000	
  +	
  805,097	
  or	
  less??
14
Challenges
15
ProfessionalOpinion
Dating
Heterogeneous	
  OSNs
Personal
Degree	
  of	
  Details
Quality	
  and	
  descriptive	
  personal	
  
And	
  professional	
  information
Little	
  personal	
  information	
  
Descriptive	
  opinions
Attribute	
  Evolution
Time
Information	
  evolved	
  on	
  one	
  but	
  
not	
  on	
  other
{jainpari,	
  Bangalore}
Registration	
  with	
  same	
  
information	
  on	
  both	
  OSNs
{paridhij,	
  New	
  Delhi}
Generic	
  Identity	
  Resolution
16
Extract	
  
available	
  &	
  
discriminative
features
Candidate	
  
Identities
IDENTITY	
  SEARCH IDENTITY	
  LINKING
Pairwise	
  
Comparisons
Heuristic	
  Identity	
  Search
17
cerc.iiitd.ac.in
Profile
Content
Self-mention
Network
Syntactic
and Image
Search Linking
If self-identified /
returned by
more than one
search method
No
Yes
Candidate
Identities
name,
location,
username
mobile no,
post,
friends,
followers
Paridhi	
  Jain,	
  Ponnurangam Kumaraguru,	
  and	
  Anupam Joshi.	
  2013.	
  @I	
  seek	
  ‘fb.me’:	
  Identifying	
  Users	
  across	
  Multiple	
  Online	
  Social	
  
Networks.	
  In	
  Proceedings	
  of	
  the	
  22nd	
  International	
  Conference	
  on	
  World	
  Wide	
  Web,	
  WWW	
  ’13	
  Companion.	
  ACM,	
  New	
  York,	
  NY,	
  USA,	
  
1259-­‐ 1268.	
  DOI=http://dx.doi.org/10.1145/2487788.2488160	
  	
  [Honorable	
  Mention	
  Award}	
  
Harvard	
  (1839)	
  – Harvard	
  – Harvard	
  – Harvard	
  – MIT	
  –
Northwestern	
  – UIUC	
  – WUSL	
  – CMU	
  (2009)	
  – IIITD	
  
(2016)	
  	
  	
  	
  
18
19
20
How	
  many	
  of	
  you	
  have	
  posted	
  
mobile	
  numbers	
  on	
  Online	
  Social	
  
Networks?
How	
  many	
  of	
  you	
  have	
  seen	
  
mobile	
  numbers	
  being	
  posted	
  on	
  
Online	
  Social	
  Networks?
Sample	
  posts
21
Sample	
  posts
22
Sample	
  posts
23
Sample	
  posts
24
Data	
  statistics
– Twitter:	
  12th	
  October	
  2012	
  – 20th	
  October	
  2013
– Facebook:	
  16th	
  November	
  2012	
  – 20th	
  April	
  2013
25
Numbers Category	
  +91 Category	
  0 Category	
  void Total
Twitter Facebook Twitter Facebook Twitter Facebook Twitter Facebook
Mobile	
  
Numbers
885 2,191 14,909 8,873 25,566 25,294 41,360 36,358
User	
  
profiles
1,074 2,663 17,913 9,028 31,149 25,406 49,817 36,588
26
SocialCaller	
  App
27
https://play.google.com/store/apps/details?id=com.ayush.socialcaller&hl=en
28
20	
  Interviews 4	
  FGDs
10,427	
  Surveys
#privacyindia12	
  Methodology
18	
  months!
0.08
7.73
0.14
7.10
1.10
6.88
0.28
8.14
1.96
8.58
0.52
0.21
0.74
3.19
9.38
0.35
0.03
0.04
0.25
2.94
11.29
0.02
8.57
0.05
9.39
9.53
0.21
0.17
9.390.48
0.02
0.03
0.01
0.08
Sample	
  
Demographics
Gender	
  (N=	
  10,232)
Male 67.57
Female 32.43
30
Age	
  
(N=10,350)
<18 1.54
18-­‐24 21.31
25-­‐29 32.20
30-­‐39 25.90
40-­‐49 14.09
50-­‐64 4.46
65+ 0.50
Age
Internet	
  &	
  Social	
  Media
What	
  do	
  you	
  feel	
  about	
  privacy	
  of	
  your	
  personal	
  
information	
  on	
  your	
  OSN?	
  
31
Q42,	
  N	
  =	
  6,855
It	
  is	
  not	
  a	
  concern	
  at	
  all	
  
Since	
  I	
  have	
  specified	
  my	
  privacy	
  settings,	
  my	
  
data	
  is	
  secure	
  from	
  a	
  privacy	
  breach	
  
Even	
  though,	
  I	
  have	
  specified	
  my	
  privacy	
  
settings,	
  I	
  am	
  concerned	
  about	
  privacy	
  of	
  my	
  
data	
  
It	
  is	
  a	
  concern,	
  but	
  I	
  still	
  share	
  personal	
  
information	
  
It	
  is	
  a	
  concern;	
  hence	
  I	
  do	
  not	
  share	
  personal	
  
data	
  on	
  OSN	
  
Internet	
  &	
  Social	
  Media
What	
  do	
  you	
  feel	
  about	
  privacy	
  of	
  your	
  personal	
  
information	
  on	
  your	
  OSN?	
  
32
Q42,	
  N	
  =	
  6,855
It	
  is	
  not	
  a	
  concern	
  at	
  all	
  
Since	
  I	
  have	
  specified	
  my	
  privacy	
  settings,	
  my	
  
data	
  is	
  secure	
  from	
  a	
  privacy	
  breach	
   42.13	
  
Even	
  though,	
  I	
  have	
  specified	
  my	
  privacy	
  
settings,	
  I	
  am	
  concerned	
  about	
  privacy	
  of	
  my	
  
data	
  
It	
  is	
  a	
  concern,	
  but	
  I	
  still	
  share	
  personal	
  
information	
  
It	
  is	
  a	
  concern;	
  hence	
  I	
  do	
  not	
  share	
  personal	
  
data	
  on	
  OSN	
  
Internet	
  &	
  Social	
  Media
What	
  do	
  you	
  feel	
  about	
  privacy	
  of	
  your	
  personal	
  
information	
  on	
  your	
  OSN?	
  
33
Q42,	
  N	
  =	
  6,855
It	
  is	
  not	
  a	
  concern	
  at	
  all	
   19.30	
  
Since	
  I	
  have	
  specified	
  my	
  privacy	
  settings,	
  my	
  
data	
  is	
  secure	
  from	
  a	
  privacy	
  breach	
   42.13	
  
Even	
  though,	
  I	
  have	
  specified	
  my	
  privacy	
  
settings,	
  I	
  am	
  concerned	
  about	
  privacy	
  of	
  my	
  
data	
   23.84	
  
It	
  is	
  a	
  concern,	
  but	
  I	
  still	
  share	
  personal	
  
information	
   8.02	
  
It	
  is	
  a	
  concern;	
  hence	
  I	
  do	
  not	
  share	
  personal	
  
data	
  on	
  OSN	
   6.71	
  
Internet	
  &	
  Social	
  Media
If	
  you	
  receive	
  a	
  friendship	
  request	
  on	
  your	
  most	
  
frequently	
  used	
  OSN,	
  which	
  of	
  the	
  following	
  people	
  
will	
  you	
  add	
  as	
  friends?	
  
34
Q43,	
  N	
  =	
  6,929
Person	
  of	
  opposite	
  gender
People	
  from	
  my	
  hometown
Person	
  with	
  nice	
  profile	
  picture
Strangers	
  (people	
  you	
  do	
  not	
  
know)
Somebody,	
  whom	
  you	
  do	
  not	
  
know	
  or	
  recognize	
  but	
  have	
  
mutual	
  /	
  common	
  friends	
  with
Anyone
Internet	
  &	
  Social	
  Media
If	
  you	
  receive	
  a	
  friendship	
  request	
  on	
  your	
  most	
  
frequently	
  used	
  OSN,	
  which	
  of	
  the	
  following	
  people	
  
will	
  you	
  add	
  as	
  friends?	
  
35
Q43,	
  N	
  =	
  6,929
Person	
  of	
  opposite	
  gender
People	
  from	
  my	
  hometown
Person	
  with	
  nice	
  profile	
  picture 10.12
Strangers	
  (people	
  you	
  do	
  not	
  
know)
Somebody,	
  whom	
  you	
  do	
  not	
  
know	
  or	
  recognize	
  but	
  have	
  
mutual	
  /	
  common	
  friends	
  with
Anyone
Internet	
  &	
  Social	
  Media
If	
  you	
  receive	
  a	
  friendship	
  request	
  on	
  your	
  most	
  
frequently	
  used	
  OSN,	
  which	
  of	
  the	
  following	
  people	
  
will	
  you	
  add	
  as	
  friends?	
  
36
Q43,	
  N	
  =	
  6,929
Person	
  of	
  opposite	
  gender 27.39
People	
  from	
  my	
  hometown
Person	
  with	
  nice	
  profile	
  picture 10.12
Strangers	
  (people	
  you	
  do	
  not	
  
know)
Somebody,	
  whom	
  you	
  do	
  not	
  
know	
  or	
  recognize	
  but	
  have	
  
mutual	
  /	
  common	
  friends	
  with
Anyone 2.99
Internet	
  &	
  Social	
  Media
If	
  you	
  receive	
  a	
  friendship	
  request	
  on	
  your	
  most	
  
frequently	
  used	
  OSN,	
  which	
  of	
  the	
  following	
  people	
  
will	
  you	
  add	
  as	
  friends?	
  
37
Q43,	
  N	
  =	
  6,929
Person	
  of	
  opposite	
  gender 27.39
People	
  from	
  my	
  hometown 19.51
Person	
  with	
  nice	
  profile	
  picture 10.12
Strangers	
  (people	
  you	
  do	
  not	
  
know) 4.99
Somebody,	
  whom	
  you	
  do	
  not	
  
know	
  or	
  recognize	
  but	
  have	
  
mutual	
  /	
  common	
  friends	
  with 8.31
Anyone 2.99
38
http://precog.iiitd.edu.in/research/privacyindia/
Takeaways
– Online	
  Social	
  Media	
  is	
  a	
  different	
  beast	
  in	
  
terms	
  of	
  privacy,	
  identity,	
  and	
  credibility
-Research	
  /	
  technologies	
  should	
  be	
  developed
– Multiple	
  interesting	
  research,	
  engineering,	
  
and	
  innovation	
  waiting	
  to	
  be	
  done
– Interested	
  in	
  hosting	
  students	
  – B.Tech.,	
  
M.Tech.,	
  Ph.D.
39
40
https://www.facebook.com/PreCog.IIITD/

Contenu connexe

Tendances

Classifying Twitter Content
Classifying Twitter ContentClassifying Twitter Content
Classifying Twitter ContentStephen Dann
 
Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...
Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...
Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...Hendrik Speck
 
Think Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming SkillsThink Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming SkillsMarc Smith
 
Predicting what gets ‘Likes’ on Facebook: case study of BlogTO
Predicting what gets ‘Likes’ on Facebook:  case study of BlogTOPredicting what gets ‘Likes’ on Facebook:  case study of BlogTO
Predicting what gets ‘Likes’ on Facebook: case study of BlogTOToronto Metropolitan University
 
Beyond the MOOC platform: Gaining Insights about Learners from the Social Web
Beyond the MOOC platform: Gaining Insights about Learners from the Social WebBeyond the MOOC platform: Gaining Insights about Learners from the Social Web
Beyond the MOOC platform: Gaining Insights about Learners from the Social WebGuanliang Chen
 
Professor Hendrik Speck - Information Mining in the Social Web. Empolis Execu...
Professor Hendrik Speck - Information Mining in the Social Web. Empolis Execu...Professor Hendrik Speck - Information Mining in the Social Web. Empolis Execu...
Professor Hendrik Speck - Information Mining in the Social Web. Empolis Execu...Hendrik Speck
 
Scholarly Identity 2.0: What does the Web say about your research?
Scholarly Identity 2.0: What does the Web say about your research?Scholarly Identity 2.0: What does the Web say about your research?
Scholarly Identity 2.0: What does the Web say about your research?Michael Habib
 
From Academic Library 2.0 to (Literature) Research 2.0
From Academic Library 2.0  to (Literature) Research 2.0From Academic Library 2.0  to (Literature) Research 2.0
From Academic Library 2.0 to (Literature) Research 2.0Michael Habib
 
Scholarly Reputation Management Online : The Challenges and Opportunities of ...
Scholarly Reputation Management Online: The Challenges and Opportunities of ...Scholarly Reputation Management Online: The Challenges and Opportunities of ...
Scholarly Reputation Management Online : The Challenges and Opportunities of ...Michael Habib
 
Altmetrics: Listening & Giving Voice to Ideas with Social Media Data
Altmetrics: Listening & Giving Voice to Ideas with Social Media DataAltmetrics: Listening & Giving Voice to Ideas with Social Media Data
Altmetrics: Listening & Giving Voice to Ideas with Social Media DataToronto Metropolitan University
 
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNAMarc Smith
 
20121010 marc smith - mapping collections of connections in social media with...
20121010 marc smith - mapping collections of connections in social media with...20121010 marc smith - mapping collections of connections in social media with...
20121010 marc smith - mapping collections of connections in social media with...Marc Smith
 
Prof. Hendrik Speck - Social Network Analysis
Prof. Hendrik Speck - Social Network AnalysisProf. Hendrik Speck - Social Network Analysis
Prof. Hendrik Speck - Social Network AnalysisHendrik Speck
 
Prof. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social NetworksProf. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social NetworksHendrik Speck
 
Introduction to Social Network Analysis
Introduction to Social Network AnalysisIntroduction to Social Network Analysis
Introduction to Social Network AnalysisPatti Anklam
 
2010 june - personal democracy forum - marc smith - mapping political socia...
2010   june - personal democracy forum - marc smith - mapping political socia...2010   june - personal democracy forum - marc smith - mapping political socia...
2010 june - personal democracy forum - marc smith - mapping political socia...Marc Smith
 
Privacy Concerns and Social Robots
Privacy Concerns and Social Robots Privacy Concerns and Social Robots
Privacy Concerns and Social Robots Christoph Lutz
 

Tendances (20)

Classifying Twitter Content
Classifying Twitter ContentClassifying Twitter Content
Classifying Twitter Content
 
Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...
Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...
Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...
 
Think Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming SkillsThink Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming Skills
 
Predicting what gets ‘Likes’ on Facebook: case study of BlogTO
Predicting what gets ‘Likes’ on Facebook:  case study of BlogTOPredicting what gets ‘Likes’ on Facebook:  case study of BlogTO
Predicting what gets ‘Likes’ on Facebook: case study of BlogTO
 
Beyond the MOOC platform: Gaining Insights about Learners from the Social Web
Beyond the MOOC platform: Gaining Insights about Learners from the Social WebBeyond the MOOC platform: Gaining Insights about Learners from the Social Web
Beyond the MOOC platform: Gaining Insights about Learners from the Social Web
 
Condor3
Condor3 Condor3
Condor3
 
Professor Hendrik Speck - Information Mining in the Social Web. Empolis Execu...
Professor Hendrik Speck - Information Mining in the Social Web. Empolis Execu...Professor Hendrik Speck - Information Mining in the Social Web. Empolis Execu...
Professor Hendrik Speck - Information Mining in the Social Web. Empolis Execu...
 
Scholarly Identity 2.0: What does the Web say about your research?
Scholarly Identity 2.0: What does the Web say about your research?Scholarly Identity 2.0: What does the Web say about your research?
Scholarly Identity 2.0: What does the Web say about your research?
 
From Academic Library 2.0 to (Literature) Research 2.0
From Academic Library 2.0  to (Literature) Research 2.0From Academic Library 2.0  to (Literature) Research 2.0
From Academic Library 2.0 to (Literature) Research 2.0
 
Scholarly Reputation Management Online : The Challenges and Opportunities of ...
Scholarly Reputation Management Online: The Challenges and Opportunities of ...Scholarly Reputation Management Online: The Challenges and Opportunities of ...
Scholarly Reputation Management Online : The Challenges and Opportunities of ...
 
Nannobloging pr
Nannobloging prNannobloging pr
Nannobloging pr
 
Altmetrics: Listening & Giving Voice to Ideas with Social Media Data
Altmetrics: Listening & Giving Voice to Ideas with Social Media DataAltmetrics: Listening & Giving Voice to Ideas with Social Media Data
Altmetrics: Listening & Giving Voice to Ideas with Social Media Data
 
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
 
20121010 marc smith - mapping collections of connections in social media with...
20121010 marc smith - mapping collections of connections in social media with...20121010 marc smith - mapping collections of connections in social media with...
20121010 marc smith - mapping collections of connections in social media with...
 
Prof. Hendrik Speck - Social Network Analysis
Prof. Hendrik Speck - Social Network AnalysisProf. Hendrik Speck - Social Network Analysis
Prof. Hendrik Speck - Social Network Analysis
 
Introduction to Social Network Analysis
Introduction to Social Network AnalysisIntroduction to Social Network Analysis
Introduction to Social Network Analysis
 
Prof. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social NetworksProf. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social Networks
 
Introduction to Social Network Analysis
Introduction to Social Network AnalysisIntroduction to Social Network Analysis
Introduction to Social Network Analysis
 
2010 june - personal democracy forum - marc smith - mapping political socia...
2010   june - personal democracy forum - marc smith - mapping political socia...2010   june - personal democracy forum - marc smith - mapping political socia...
2010 june - personal democracy forum - marc smith - mapping political socia...
 
Privacy Concerns and Social Robots
Privacy Concerns and Social Robots Privacy Concerns and Social Robots
Privacy Concerns and Social Robots
 

Similaire à Keynote at 4th International Symposium on Secuirty in Computing at Communications

Privacy in India: Attitudes and Awareness V 2.0
Privacy in India: Attitudes and Awareness V 2.0Privacy in India: Attitudes and Awareness V 2.0
Privacy in India: Attitudes and Awareness V 2.0IIIT Hyderabad
 
Assessing the available and accessible evidence: How personal reputations are...
Assessing the available and accessible evidence: How personal reputations are...Assessing the available and accessible evidence: How personal reputations are...
Assessing the available and accessible evidence: How personal reputations are...Frances Ryan
 
Biomedical Data Science: We Are Not Alone
Biomedical Data Science: We Are Not AloneBiomedical Data Science: We Are Not Alone
Biomedical Data Science: We Are Not AlonePhilip Bourne
 
CSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesCSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesJessica Vitak
 
Privacy and Security in Online Social : Privacy and Pictures on Online Social...
Privacy and Security in Online Social : Privacy and Pictures on Online Social...Privacy and Security in Online Social : Privacy and Pictures on Online Social...
Privacy and Security in Online Social : Privacy and Pictures on Online Social...IIIT Hyderabad
 
Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...ARDC
 
Title of Your Research Proposal Student Name Walde
Title of Your Research Proposal Student Name WaldeTitle of Your Research Proposal Student Name Walde
Title of Your Research Proposal Student Name WaldeTakishaPeck109
 
Personal Identifiability of User Tracking Data | Whitepaper
Personal Identifiability of User Tracking Data | WhitepaperPersonal Identifiability of User Tracking Data | Whitepaper
Personal Identifiability of User Tracking Data | WhitepaperAlejandro Franceschi
 
Using Open Science to advance science - advancing open data
Using Open Science to advance science - advancing open data Using Open Science to advance science - advancing open data
Using Open Science to advance science - advancing open data Robert Oostenveld
 
Survey Methodology for Security and Privacy Researchers
Survey Methodology for Security and Privacy ResearchersSurvey Methodology for Security and Privacy Researchers
Survey Methodology for Security and Privacy ResearchersElissa Redmiles
 
Web for Information and Mental Health Support
Web for Information and Mental Health SupportWeb for Information and Mental Health Support
Web for Information and Mental Health SupportPatrick Daniels
 
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)Krishnaram Kenthapadi
 
Grounded, data with a story
Grounded, data with a storyGrounded, data with a story
Grounded, data with a storyInWithForward
 
Edmedia2011 online.surveys
Edmedia2011 online.surveysEdmedia2011 online.surveys
Edmedia2011 online.surveysValerie Irvine
 
Ga + sxsw data visualization from a ux perspective class v.0.5
Ga + sxsw data visualization from a ux perspective class v.0.5Ga + sxsw data visualization from a ux perspective class v.0.5
Ga + sxsw data visualization from a ux perspective class v.0.5Hunter Whitney
 
Nikolaou HR Pro Recruitment Conference 2019
Nikolaou HR Pro Recruitment Conference 2019Nikolaou HR Pro Recruitment Conference 2019
Nikolaou HR Pro Recruitment Conference 2019Ioannis Nikolaou
 
Types of Polarisation and Their Operationalisation in Digital and Social Medi...
Types of Polarisation and Their Operationalisation in Digital and Social Medi...Types of Polarisation and Their Operationalisation in Digital and Social Medi...
Types of Polarisation and Their Operationalisation in Digital and Social Medi...Axel Bruns
 

Similaire à Keynote at 4th International Symposium on Secuirty in Computing at Communications (20)

Privacy in India: Attitudes and Awareness V 2.0
Privacy in India: Attitudes and Awareness V 2.0Privacy in India: Attitudes and Awareness V 2.0
Privacy in India: Attitudes and Awareness V 2.0
 
Assessing the available and accessible evidence: How personal reputations are...
Assessing the available and accessible evidence: How personal reputations are...Assessing the available and accessible evidence: How personal reputations are...
Assessing the available and accessible evidence: How personal reputations are...
 
Conference Report Final 11.18
Conference Report Final 11.18Conference Report Final 11.18
Conference Report Final 11.18
 
Biomedical Data Science: We Are Not Alone
Biomedical Data Science: We Are Not AloneBiomedical Data Science: We Are Not Alone
Biomedical Data Science: We Are Not Alone
 
CSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesCSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont Principles
 
Privacy and Security in Online Social : Privacy and Pictures on Online Social...
Privacy and Security in Online Social : Privacy and Pictures on Online Social...Privacy and Security in Online Social : Privacy and Pictures on Online Social...
Privacy and Security in Online Social : Privacy and Pictures on Online Social...
 
Social Network Analysis Applications and Approach
Social Network Analysis Applications and ApproachSocial Network Analysis Applications and Approach
Social Network Analysis Applications and Approach
 
Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...
 
Title of Your Research Proposal Student Name Walde
Title of Your Research Proposal Student Name WaldeTitle of Your Research Proposal Student Name Walde
Title of Your Research Proposal Student Name Walde
 
Personal Identifiability of User Tracking Data | Whitepaper
Personal Identifiability of User Tracking Data | WhitepaperPersonal Identifiability of User Tracking Data | Whitepaper
Personal Identifiability of User Tracking Data | Whitepaper
 
Using Open Science to advance science - advancing open data
Using Open Science to advance science - advancing open data Using Open Science to advance science - advancing open data
Using Open Science to advance science - advancing open data
 
Survey Methodology for Security and Privacy Researchers
Survey Methodology for Security and Privacy ResearchersSurvey Methodology for Security and Privacy Researchers
Survey Methodology for Security and Privacy Researchers
 
Web for Information and Mental Health Support
Web for Information and Mental Health SupportWeb for Information and Mental Health Support
Web for Information and Mental Health Support
 
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
 
Digital Tattoo: for MOSAIC
Digital Tattoo: for MOSAICDigital Tattoo: for MOSAIC
Digital Tattoo: for MOSAIC
 
Grounded, data with a story
Grounded, data with a storyGrounded, data with a story
Grounded, data with a story
 
Edmedia2011 online.surveys
Edmedia2011 online.surveysEdmedia2011 online.surveys
Edmedia2011 online.surveys
 
Ga + sxsw data visualization from a ux perspective class v.0.5
Ga + sxsw data visualization from a ux perspective class v.0.5Ga + sxsw data visualization from a ux perspective class v.0.5
Ga + sxsw data visualization from a ux perspective class v.0.5
 
Nikolaou HR Pro Recruitment Conference 2019
Nikolaou HR Pro Recruitment Conference 2019Nikolaou HR Pro Recruitment Conference 2019
Nikolaou HR Pro Recruitment Conference 2019
 
Types of Polarisation and Their Operationalisation in Digital and Social Medi...
Types of Polarisation and Their Operationalisation in Digital and Social Medi...Types of Polarisation and Their Operationalisation in Digital and Social Medi...
Types of Polarisation and Their Operationalisation in Digital and Social Medi...
 

Plus de IIIT Hyderabad

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayIIIT Hyderabad
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesIIIT Hyderabad
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasIIIT Hyderabad
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIIIT Hyderabad
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyIIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityIIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...IIIT Hyderabad
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper IIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasIIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in IndiaIIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in IndiaIIIT Hyderabad
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...IIIT Hyderabad
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayIIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceIIIT Hyderabad
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...IIIT Hyderabad
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesIIIT Hyderabad
 

Plus de IIIT Hyderabad (20)

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
 

Dernier

Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringJuanCarlosMorales19600
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Dernier (20)

Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

Keynote at 4th International Symposium on Secuirty in Computing at Communications

  • 1. Privacy  and  Security  in  Online   Social  Media   Keynote  @  SSCC’16   Sept  22,  2016 Ponnurangam  Kumaraguru  (“PK”) Associate  Professor ACM  Distinguished  Speaker fb/ponnurangam.kumaraguru,  @ponguru
  • 2. Who  am  I?   – Associate  Professor,  IIIT-­‐Delhi     – Ph.D.  from  School  of  Computer  Science,     Carnegie  Mellon  University  (CMU)     – Research  interests   -Social  Computing,  Computational  Social  Science,   Complex  Networks  pertaining  to  Human  Behavior,   specifically  in  the  context  of  Security  &  Privacy – Co-­‐ordinate  and  manage  Precog,   precog.iiitd.edu.in – ACM  Distinguished  Speaker   2
  • 4. 4 What  we  dabble  with!  
  • 7. Training  Data – 500  Tweets  per  event – Used  CrowdFlower 7 Event Tweets Users Boston  Marathon  Blasts  (2013) 7,888,374 3,677,531 Typhoon Haiyan /  Yolanda  (2013) 671,918 368,269 Cyclone  Phailin (2013) 76,136 34,776 Washington  Navy yard shootings (2013) 484,609 257,682 Polar  vortex cold wave (2014) 143,959 116,141 Oklahoma  Tornadoes (2013) 809,154 542,049 Total     10,074,150 4,996,448
  • 8. Credibility  Modeling   8 Feature  set   Features (45)   Tweet  meta-­‐data   Number  of  seconds  since  the  tweet;  Source  of  tweet  (mobile  /  web/   etc);  Tweet  contains  geo-­‐coordinates Tweet  content  (simple)   Number  of  characters;  Number  of  words;  Number  of  URLs;  Number  of   hashtags;  Number  of  unique  characters;  Presence  of  stock  symbol;   Presence  of  happy  smiley;  Presence  of  sad  smiley;  Tweet  contains   `via';  Presence  of  colon  symbol Tweet  content  (linguistic)   Presence  of  swear  words;  Presence  of  negative  emotion  words;   Presence  of  positive  emotion  words;  Presence  of  pronouns;  Mention   of  self  words  in  tweet  (I;  my;  mine) Tweet  author   Number  of  followers;  friends;  time  since  the  user  if  on  Twitter;  etc. Tweet  network   Number  of  retweets;  Number  of  mentions;  Tweet  is  a  reply;  Tweet  is  a   retweet Tweet links   WOT  score  for  the  URL;  Ratio  of  likes  /  dislikes  for  a  YouTube  video
  • 11. v
  • 12. Harvard  (1839)  – Harvard  – Harvard  – Harvard  – MIT  – Northwestern  – UIUC  – WUSL  – CMU  (2009)  – IIITD   (2015)         12
  • 14. De-­‐duplicating  audience Social  audience    =  437,632  +  153,000  +  805,097  or  less?? 14
  • 15. Challenges 15 ProfessionalOpinion Dating Heterogeneous  OSNs Personal Degree  of  Details Quality  and  descriptive  personal   And  professional  information Little  personal  information   Descriptive  opinions Attribute  Evolution Time Information  evolved  on  one  but   not  on  other {jainpari,  Bangalore} Registration  with  same   information  on  both  OSNs {paridhij,  New  Delhi}
  • 16. Generic  Identity  Resolution 16 Extract   available  &   discriminative features Candidate   Identities IDENTITY  SEARCH IDENTITY  LINKING Pairwise   Comparisons
  • 17. Heuristic  Identity  Search 17 cerc.iiitd.ac.in Profile Content Self-mention Network Syntactic and Image Search Linking If self-identified / returned by more than one search method No Yes Candidate Identities name, location, username mobile no, post, friends, followers Paridhi  Jain,  Ponnurangam Kumaraguru,  and  Anupam Joshi.  2013.  @I  seek  ‘fb.me’:  Identifying  Users  across  Multiple  Online  Social   Networks.  In  Proceedings  of  the  22nd  International  Conference  on  World  Wide  Web,  WWW  ’13  Companion.  ACM,  New  York,  NY,  USA,   1259-­‐ 1268.  DOI=http://dx.doi.org/10.1145/2487788.2488160    [Honorable  Mention  Award}  
  • 18. Harvard  (1839)  – Harvard  – Harvard  – Harvard  – MIT  – Northwestern  – UIUC  – WUSL  – CMU  (2009)  – IIITD   (2016)         18
  • 19. 19
  • 20. 20 How  many  of  you  have  posted   mobile  numbers  on  Online  Social   Networks? How  many  of  you  have  seen   mobile  numbers  being  posted  on   Online  Social  Networks?
  • 25. Data  statistics – Twitter:  12th  October  2012  – 20th  October  2013 – Facebook:  16th  November  2012  – 20th  April  2013 25 Numbers Category  +91 Category  0 Category  void Total Twitter Facebook Twitter Facebook Twitter Facebook Twitter Facebook Mobile   Numbers 885 2,191 14,909 8,873 25,566 25,294 41,360 36,358 User   profiles 1,074 2,663 17,913 9,028 31,149 25,406 49,817 36,588
  • 26. 26
  • 28. 28 20  Interviews 4  FGDs 10,427  Surveys #privacyindia12  Methodology 18  months!
  • 30. Demographics Gender  (N=  10,232) Male 67.57 Female 32.43 30 Age   (N=10,350) <18 1.54 18-­‐24 21.31 25-­‐29 32.20 30-­‐39 25.90 40-­‐49 14.09 50-­‐64 4.46 65+ 0.50 Age
  • 31. Internet  &  Social  Media What  do  you  feel  about  privacy  of  your  personal   information  on  your  OSN?   31 Q42,  N  =  6,855 It  is  not  a  concern  at  all   Since  I  have  specified  my  privacy  settings,  my   data  is  secure  from  a  privacy  breach   Even  though,  I  have  specified  my  privacy   settings,  I  am  concerned  about  privacy  of  my   data   It  is  a  concern,  but  I  still  share  personal   information   It  is  a  concern;  hence  I  do  not  share  personal   data  on  OSN  
  • 32. Internet  &  Social  Media What  do  you  feel  about  privacy  of  your  personal   information  on  your  OSN?   32 Q42,  N  =  6,855 It  is  not  a  concern  at  all   Since  I  have  specified  my  privacy  settings,  my   data  is  secure  from  a  privacy  breach   42.13   Even  though,  I  have  specified  my  privacy   settings,  I  am  concerned  about  privacy  of  my   data   It  is  a  concern,  but  I  still  share  personal   information   It  is  a  concern;  hence  I  do  not  share  personal   data  on  OSN  
  • 33. Internet  &  Social  Media What  do  you  feel  about  privacy  of  your  personal   information  on  your  OSN?   33 Q42,  N  =  6,855 It  is  not  a  concern  at  all   19.30   Since  I  have  specified  my  privacy  settings,  my   data  is  secure  from  a  privacy  breach   42.13   Even  though,  I  have  specified  my  privacy   settings,  I  am  concerned  about  privacy  of  my   data   23.84   It  is  a  concern,  but  I  still  share  personal   information   8.02   It  is  a  concern;  hence  I  do  not  share  personal   data  on  OSN   6.71  
  • 34. Internet  &  Social  Media If  you  receive  a  friendship  request  on  your  most   frequently  used  OSN,  which  of  the  following  people   will  you  add  as  friends?   34 Q43,  N  =  6,929 Person  of  opposite  gender People  from  my  hometown Person  with  nice  profile  picture Strangers  (people  you  do  not   know) Somebody,  whom  you  do  not   know  or  recognize  but  have   mutual  /  common  friends  with Anyone
  • 35. Internet  &  Social  Media If  you  receive  a  friendship  request  on  your  most   frequently  used  OSN,  which  of  the  following  people   will  you  add  as  friends?   35 Q43,  N  =  6,929 Person  of  opposite  gender People  from  my  hometown Person  with  nice  profile  picture 10.12 Strangers  (people  you  do  not   know) Somebody,  whom  you  do  not   know  or  recognize  but  have   mutual  /  common  friends  with Anyone
  • 36. Internet  &  Social  Media If  you  receive  a  friendship  request  on  your  most   frequently  used  OSN,  which  of  the  following  people   will  you  add  as  friends?   36 Q43,  N  =  6,929 Person  of  opposite  gender 27.39 People  from  my  hometown Person  with  nice  profile  picture 10.12 Strangers  (people  you  do  not   know) Somebody,  whom  you  do  not   know  or  recognize  but  have   mutual  /  common  friends  with Anyone 2.99
  • 37. Internet  &  Social  Media If  you  receive  a  friendship  request  on  your  most   frequently  used  OSN,  which  of  the  following  people   will  you  add  as  friends?   37 Q43,  N  =  6,929 Person  of  opposite  gender 27.39 People  from  my  hometown 19.51 Person  with  nice  profile  picture 10.12 Strangers  (people  you  do  not   know) 4.99 Somebody,  whom  you  do  not   know  or  recognize  but  have   mutual  /  common  friends  with 8.31 Anyone 2.99
  • 39. Takeaways – Online  Social  Media  is  a  different  beast  in   terms  of  privacy,  identity,  and  credibility -Research  /  technologies  should  be  developed – Multiple  interesting  research,  engineering,   and  innovation  waiting  to  be  done – Interested  in  hosting  students  – B.Tech.,   M.Tech.,  Ph.D. 39