DAGSTUHL SEMINAR

Motivation

The range of malicious activities perpetrated on online social networks is regrettably wide, ranging from malware and spam to controlling fake and compromised accounts, to artificially manipulating the reputation of accounts and pages, spreading false information and terrorist propaganda. Unfortunately, research in this field has looked at these problems in isolation, almost exclusively relying on algorithms aimed at detecting malicious accounts that act similarly. This ultimately yields a catandmouse game, whereby providers attempt to make it more and more costly for fraudsters to evade detection.

This prompts the need for a multifaceted, multidisciplinary, holistic approach to advancing the state of knowledge on cybersafety in online social networks, and the ways in which it can be researched and protected. In this field, there exists a number of interconnected, complex issues that cannot be addressed in isolation, but have to be tackled and countered together. This Dagstuhl Seminar, we identify and plan to focus on the most relevant issues in cybersafety, as well as to explore both current and emerging solutions. Specifically, we identify four problems that are the most pressing both in terms of negative impact and potential danger on individuals and society, as well as challenging open research problems calling for a multidisciplinary approach:

  1. Cyberbullying and Hate Speech
  2. Cyber Fraud and Scams
  3. Reputation Manipulation and Fake Activities
  4. Propaganda and Radicalization

The main goal of this seminar is to bring together researchers working on all aspects of cybersafety, including security, privacy, human factors, economics, sociology, law, and psychology. We aim to discuss many facets of the problem, both technical and nontechnical, and jointly identify measures to advance the state of the art and identify promising research avenues. Examples of issues to be debated include:

  • How do we define cyberbullying and online harassment in a way that captures their inherent ambiguities and subjectiveness?
  • How do perpetrators of these activities exploit technological tools to increase their effectiveness? How do cyberbullies and online harassers organize and choose targets?
  • What are the different types of cyber fraud activities and how might we cluster different types of scams, based on psychological, sociological, situational and technical variables so as to better design countermeasures?
  • What data are ethically and socially acceptable to draw upon in detection and prevention of cyber fraud?
  • What variables are important in enabling us to distinguish those who have become single or repeat victims from nonvictims?
  • What are the current mitigation schemes adopted by social networks to counter reputation manipulation and their limitations?
  • What are the economics and legal mechanisms governing fake activities?
  • What can be done to make it economically unviable for fraudsters to engage in reputation manipulation and fake activities?
  • How does online radicalization happen?
  • Are there specific demographics that are more susceptible to being radicalized? How is online radicalization different from other types of online abuse?

 

AGENDA

Sunday

Arrivals throughout the day (access code 5142F)

Buffet dinner from 6pm until late

Monday

07.30-08.45    Breakfast

09.00-10.20    Introductions, setting the agenda for the rest of the seminar

10.20-10.40    Coffee Break

10.40-10.55    Group Assignments

10.55-11.40    Jeremy Blackburn: Cyberbullying and Hate Speech (tutorial)

11.40-12.10    Discussion

12.15-13.45    Lunch

13.45-14.30    Fil Menczer: Misinformation (tutorial)

14.30-15.00    Discussion

15.00-15.30    Coffee Break + group picture

15.30-16.15    Gianluca Stringhini: Cyberfraud and Scams (tutorial)

16.15-16.45    Discussion

16.45-17.30    Angela Sasse: Trust & Deception (tutorial)

17.30-18.00    Discussion

18.00-20.00    Dinner

20.00-        Wine and Cheese

Tuesday

07.30-08.45    Breakfast

09.00-09.15    Zinaida Benenson: Spearfishing: Email vs Facebook (Short Talk)

09.15-09.30    Ahmad-Reza Sadeghi: Cyber Deception (Short Talk)

09.30-09.45    Awais Rashid: Detecting Child Sex Offenders (Short Talk)

09.45-10.00    Monica Whitty: Psychology of Cyberfraud (Short Talk)

10.00-10.15    Srijan Kumar: Sockpuppets in online discussions: use and abuse (Short Talk)

10.15-10.40    Coffee Break

10.40-10.55    Savvas Zannettou: How Web Communities Influence Each Other (Short Talk)

10.55-11.10    Adriana Iamnitchi: Cheating in Video Games (Short Talk)

11.10-11.25    Huy Kang Kim: Game Bots (Short Talk)

11.25-11.40    Oana Goga: Inter-Domain Trust Transfer (Short Talk)

11.40-11.55    Julien Freudiger: Privacy & Safety at Apple (Short Talk)

11.55-12.10    Stefan Schiffner: Reputation (Short Talk)

12.15-13.45    Lunch

13.45-15.15    Working Groups (TBD)

15.15-15.45    Coffee Break

15.45-17.00    Working Groups  (TBD)

17.00-18.00    Social Activity (TBD)

18.00-20.00    Dinner

20.00-        Wine and Cheese

Wednesday

07.30-08.45    Breakfast

09.00-10.20    Working Groups (TBD)

10.20-10.40    Coffee Break

10.40-12.00    Wrap-up  and next steps

12.15-    Lunch and Departure

 

Keywords

  • Cybersafety
  • Online social networks
  • Security and privacy
  • Legal and ethical issues on the web

LINKS