posted by system || 6612 views || tracked by 8 users: [display]

PSOSM 2013 : Second International Workshop on Privacy and Security in Online Social Media

FacebookTwitterLinkedInGoogle

Link: http://precog.iiitd.edu.in/events/psosm2013
 
When May 14, 2013 - May 14, 2013
Where Rio, Brazil
Abstract Registration Due Feb 22, 2013
Submission Deadline Feb 25, 2013
Categories    privacy   security   social media
 

Call For Papers

Topics / themes include, but not limited to the following:

Information privacy disclosure, revelation and its effects in OSM and online social networks
Collateral damage due to information leakage (e.g. through photo tagging) on OSM
Privacy issues related to location based services on OSM
Effective and usable privacy setting and policies on OSM
Anonymization of social network dataset
Identifying and preventing social spam (including phishing and frauds) campaigns
Tracking social footprint / identities across different social network
Detection and characterization of spam, phishing, frauds, hate crime, abuse, extremism via online social media
Cyber-bullying, abuse and harassment detection, and prevention strategies
Identifying and curbing malware, phishing, and botnets on OSM
Filtering of pornography, viruses, and human trafficking on OSM
Studying the social and economic impact of security and privacy issues on OSM
User behavior towards change in privacy features in OSM
Usability (including design flaws) of secure systems on online social media
Data modeling of human behavior in context of security and privacy threats
Privacy and security in social gaming applications
Trust systems based on social networks
Legal and ethical issues for researchers studying security and privacy on OSM
Information credibility on OSM
Security and Privacy issues in new entrants in OSM (e.g. Google Plus)
Effect of OSM on conventional crime (robberies and theft)
Means to maintain different legitimate identities on the same OSM service
Access control, rights management, and security of social content
Privacy-enhancing technologies, including anonymity, pseudonymity and identity management, specifically for the web
Identifying fraudulent entities in online social networks
Problems due to unification of different identities of the same persona on different social media services
Using social media (e.g. Twitter) as sensors for decision making at the organization level (i.e. detecting outbreaks)

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
OSNEM-DTHOSN 2025   Elsevier Online Social Networks and Media Journal Special issue on Disinformation, toxicity, harms in Online Social Networks and Media
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
IMCOM 2025   19th International Conference on Ubiquitous Information Management and Communication
CRBL 2025   5th International Conference on Cryptography and Blockchain
ISC 2025   Information Security Conference
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
SOTICS 2025   The Fifteenth International Conference on Social Media Technologies, Communication, and Informatics
BAMC 2025   The 6th Barcelona Conference on Arts, Media & Culture (BAMC2025)
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience