ACM Distinguished Speaker & ACM India Eminent Speaker
Mar 8, 2017: S.A. Engineering College, Chennai
70+ participants attended the talk
Feb 22, 2017: Manav Rachna International University, Faridabad
100+ participants attended the talk
Nov 21, 2016: Indian Institute of Technology, Kharagpur
40+ participants attended the talk
Sept 27, 2016: Indian Institute of Technology, Guwahati
75+ participants attended the talk
June 6, 2016: Indira Gandhi Technical University for Women, New Delhi
50+ participants attended the workshop
Feb 17, 2016: Bharati Vidyapeeth College of Engineering, New Delhi
100+ participants attended the talk
Sept 14, 2015: ITM University, Gurgaon
180+ participants attended the talk
July 22, 2015: Infosys Bengaluru
80+ participants attended the talk
July 22, 2015: IIIT Bengaluru
15+ participants attended the talk
March 16, 2015: Jaypee Institute of Information Technology, NOIDA
140+ participants attended the talk
Dec 18, 2014: Coimbatore Institute of Technology (CIT), Coimbatore
120+ participants attended the talk
Dec 17, 2014: PSG College of Technology, Coimbatore
40+ participants attended the talk
September 13, 2014: ACM Regional Event on CyberSecurity, Pune.
Attended by 70+ participants. Picture with a few of the participants.
March 26, 2014: Thapar Univiersity
Talk one: "Privacy and Security in Online Social Media (PSOSM)"
With increase in usage of the Internet, there has been an exponential increase in the use of online social media on the Internet. Websites like Facebook, Google+, YouTube, Orkut, Twitter and Flickr have changed the way the Internet is being used. There is a dire need to investigate, measure, and understand privacy and security on online social media from various perspectives (computational, cultural, psychological). Real world scalable systems need to be built to detect and defend security and privacy issues on online social media. I will describe briefly some cool projects that we work on: TweetCred, OSM & Policing, OCEAN, and Call Me MayBe. Many of our research work is made available for public use through tools or online services. Our work derives techniques from Computational Social Science, Data Science, Statistics, Network Science, and Human Computer Interaction. In particular, in this talk, I will focus on the following:
I will be more than happy to clarify, discuss, any of our work in detail, as required, after the talk.
TweetCred, a tool to extract intelligence from Twitter which can be useful to security analysts. TweetCred is backed by award-winning research publications in international and national venues.
How police in India are using online social media, how we can use computer science understanding to help police engage more with citizens and increase the safety in society.
OCEAN: Open source Collation of eGovernment data and Networks, how publicly available information on Government services can be used to profile citizens in India. This work obtained the Best Poster Award at Security and Privacy Symposium at IIT Kanpur, 2013 and it has gained a lot of traction in Indian media.
Given an identity in one online social media, we are interested in finding the digital foot print of the user in other social media services, this is also called digital identity stitching problem. This work is also backed by award-winning research publication.
Talk two: Designing Human-Centered Systems
Abstract: Why are things so hard to use these days? Why doesn’t this
thing I just bought work? Why is this web site so hard to use? Why are
users not liking my design? Why is my app not getting popular? These
are frustrations that we have all faced from systems not designed with
people in mind. The question this talk will focus on is: how can we
design human-centered systems that people find useful and usable? I
will briefly describe some of the fascinating work done on this space
around the world and in particular, Iwill focus on building Usable
Security and Privacy Solutions. In particular, in this talk, I will
focus on the following:
I will be more than happy to clarify, discuss, any of our work in detail, as required, once I am done with the talk.
Short Academic Bio:
Prof. Ponnurangam Kumaraguru ("PK") is an Associate Professor, at the
Indraprastha Institute of Information Technology (IIIT), Delhi, India from Aug 2009. He is a TEDx and
an ACM Distinguished speaker & ACM India Eminent Speaker. He plays an advisory role in various government organizations and a Fortune 500 company. He is the Founding
Head of Cybersecurity Education and Research Centre (CERC) at IIIT-Delhi. He is an Affiliated faculty at
IIIT Hyderabad. He received his Ph.D. from the School of Computer Science at Carnegie Mellon University (CMU). He is primarily excited about and works on issues
related to Privacy and Security in Online Social Media, Computational Social Science, and Data Science for Social Good. In the past 8 years of his faculty life,
he has managed projects close to 800,000 USDs (approx. 5 crores of Indian rupees). PK has received research funds from multiple departments of the Government of
India, National Science Foundation (NSF) USA, Adobe, RSA, and International Development Research Centre (IDRC). A technology that PK and his students have
developed at IIIT Delhi is currently being used by more than 50 different State and Central Government agencies in India. PK has spent his summer sabbaticals at IBM
India Research Labs, Adobe Research Labs – India, Universidade Federal de Minas Gerais (UFMG), Brazil, and Max Planck Institute for Software Systems, Germany. PK
regularly serves as a PC member at prestigious conferences like WWW, ICWSM, CSCW, AsiaCCS and he also serves as a reviewer for International Journal of Information
Security and ACM's Transactions on Internet Technology (TOIT). PK’s Ph.D. thesis work on anti-phishing research at Carnegie Mellon University has contributed in
creating an award winning start-up Wombat Security Technologies , wombatsecurity.com. Wombat recently
raised Series C funding and also acquired a company. PK founded and manages PreCog, precog.iiitd.edu.in
a research group at IIIT-Delhi. PK can be reached at firstname.lastname@example.org.
PhishGuru: A System to Train Users About Phishing Attacks. PhishGuru was developed using various Human Computer Interaction techniques like Think Aloud session, Contextual Inquiry, etc. The design is driven by users and we used iterative design process in developing the system. I will go through the design process followed in developing PhishGuru which helped in creating an award winning start-up Wombat Security Technologies wombatsecurity.com, a business enterprise launched in 2008.
Anti-Phishing Phil, is a fun game that we developed to engage users in a series of challenges that test their ability to identify phishing URLs. Phil is also currently being commercialized by Wombat. Through various research studies we showed that Phil was very effective in training users to identify phishing URLs; I will describe the research methodologies and results.
Privacy in India is the largest ever privacy study done in India. This has been in media recently; if you are interested search for #privacyindia12 on Twitter. This work obtained the third Best Poster Award at Security and Privacy Symposium at IIT Kanpur, 2013. Through out the talk, I will emphasize on why building systems by keeping users-in-loop is very effective. I will also briefly discuss the impacts of Human-Centered research on solutions that are developed and deployed in real world.