With increase in the usage of the Internet, there is an exponential increase in the use of online social media on the Internet. Websites like Facebook, YouTube, Orkut, Twitter, Flickr, and the likes have changed the way the Internet is being used. There is lack of understanding of privacy and security issues on online social media among the users using these online services. There is a big need to study and characterize privacy and security of online social media from various perspectives (computational, cultural, psychological, etc.). Students in the class will be required to read papers assigned for the week and send an individual summary before (at least 6 hours) the class of the week. The class will be presentation and discussion format.
- May 7
- Objectives of the course, Logistics of the course, aligning the expectations from both sides, introduction to social media
- May 9
- May 14
- Analyzing Spammers' Social Networks For Fun and Profit - A Case
Study of Cyber Criminal Ecosystem on Twitter. Chao Yang, Robert
Harkreader, Jialong Zhang, Suengwon Shin and Guofei Gu.
facebook: detecting and characterizing phantom profiles in online
social gaming applications. Atif, N., Saqib, R., Chen-Nee, C., and Burkhard, S. In Proceedings of the 3rd conference on
Online social networks (Berkeley, CA, USA, 2010), WOSN'10, USENIX
- Short discussion about the project for the course.
- May 16
- Design and Evaluation of a Real-Time URL Spam Filtering Service. Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song,
- We know who you followed last summer: inferring social link
creation times in twitter. Brendan Meeder, Brian Karrer, Amin Sayedi,
R. Ravi, Christian Borgs, and Jennifer Chayes. In Proceedings of the
20th international conference on World wide web (WWW '11). ACM.
- Project proposal by students; submit through email a 500 word
description about the project that you would like to do for the
course. Prepaper to present in the class for 10 mins each project.
- May 21
- On the leakage of personally
identifiable information via online social networks. Krishnamurthy, B., and Wills, C. E. SIGCOMM Comput.
- Phi.sh/$oCiaL: The Phishing Landscape through Short URLs. Chhabra, S., Aggarwal, A., Benevenuto, F., and Kumaraguru, P.Accepted at
8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam
Conference (CEAS 2011).
Leonardo (student): Slides
- Invited talk by Prof. Jussara DCC, UFMG.
- May 23
- May 28
- May 30
- All your
contacts are belong to us: automated identity theft attacks on social networks. Leyla
Bilge, WWW 2009
- Information credibility on twitter. Castillo, C., Mendoza, M., and Poblete, B. In Proceedings of the 20th international conference on World wide web (New York, NY, USA, 2011
), WWW'11, ACM.
- Invited talk by Prof. Wagner Meira Jr. DCC, UFMG
- June 4
- June 6
- Project evaluation presentation by students