Motivation
The range of malicious activities perpetrated on online social networks is regrettably wide, ranging from malware and spam to controlling fake and compromised accounts, to artificially manipulating the reputation of accounts and pages, spreading false information and terrorist propaganda. Unfortunately, research in this field has looked at these problems in isolation, almost exclusively relying on algorithms aimed at detecting malicious accounts that act similarly. This ultimately yields a catandmouse game, whereby providers attempt to make it more and more costly for fraudsters to evade detection.
This prompts the need for a multifaceted, multidisciplinary, holistic approach to advancing the state of knowledge on cybersafety in online social networks, and the ways in which it can be researched and protected. In this field, there exists a number of interconnected, complex issues that cannot be addressed in isolation, but have to be tackled and countered together. This Dagstuhl Seminar, we identify and plan to focus on the most relevant issues in cybersafety, as well as to explore both current and emerging solutions. Specifically, we identify four problems that are the most pressing both in terms of negative impact and potential danger on individuals and society, as well as challenging open research problems calling for a multidisciplinary approach:
- Cyberbullying and Hate Speech
- Cyber Fraud and Scams
- Reputation Manipulation and Fake Activities
- Propaganda and Radicalization
The main goal of this seminar is to bring together researchers working on all aspects of cybersafety, including security, privacy, human factors, economics, sociology, law, and psychology. We aim to discuss many facets of the problem, both technical and nontechnical, and jointly identify measures to advance the state of the art and identify promising research avenues. Examples of issues to be debated include:
- How do we define cyberbullying and online harassment in a way that captures their inherent ambiguities and subjectiveness?
- How do perpetrators of these activities exploit technological tools to increase their effectiveness? How do cyberbullies and online harassers organize and choose targets?
- What are the different types of cyber fraud activities and how might we cluster different types of scams, based on psychological, sociological, situational and technical variables so as to better design countermeasures?
- What data are ethically and socially acceptable to draw upon in detection and prevention of cyber fraud?
- What variables are important in enabling us to distinguish those who have become single or repeat victims from nonvictims?
- What are the current mitigation schemes adopted by social networks to counter reputation manipulation and their limitations?
- What are the economics and legal mechanisms governing fake activities?
- What can be done to make it economically unviable for fraudsters to engage in reputation manipulation and fake activities?
- How does online radicalization happen?
- Are there specific demographics that are more susceptible to being radicalized? How is online radicalization different from other types of online abuse?
AGENDA
Monday
07.30-08.45 Breakfast
09.00-10.20 Introductions, setting the agenda for the rest of the seminar
10.20-10.40 Coffee Break
10.40-10.55 Group Assignments
10.55-11.40 Jeremy Blackburn: Cyberbullying and Hate Speech (tutorial)
11.40-12.10 Discussion
12.15-13.45 Lunch
13.45-14.45 Fil Menczer: Misinformation (tutorial)
14.45-15.15 Discussion
15.15-15.45 Group picture + Coffee break
15.45-16.30 Gianluca Stringhini: Cyberfraud and Scams (tutorial)
16.30-17.00 Discussion
17.00-17.40 Awais Rashid: Detecting Child Sex Offenders (tutorial)
17.40-18.00 Discussion
18.00-20.00 Dinner
20.00- Wine and Cheese
Tuesday
07.30-08.45 Breakfast
09.00-09.15 Zinaida Benenson: Spear Phishing: Email vs Facebook (Short Talk)
09.15-09.30 Ahmad-Reza Sadeghi: Cyber Deception (Short Talk)
09.30-09.45 Michael Sirivianos: Combatting Friend Spam using Social Rejections (Short Talk)
09.45-10.00 Alexandra Olteanu: Hate Speech: Thoughts on the Role of User Aspects & External Events (Short Talk)
10.00-10.15 Srijan Kumar: Sockpuppets in online discussions: use and abuse (Short Talk)
10.15-10.40 Coffee Break
10.40-10.55 Savvas Zannettou: How Web Communities Influence Each Other (Short Talk)
10.55-11.10 Manuel Egele: Compromised Social Network Accounts: Detection and Incentives (Short Talk)
11.10-11.25 Huy Kang Kim: Game Bots (Short Talk)
11.25-11.40 Oana Goga: Inter-Domain Trust Transfer (Short Talk)
11.40-11.55 Julien Freudiger: Privacy & Safety at Apple (Short Talk)
11.55-12.10 Stefan Schiffner: Crypto Wars 3.0 (Short Talk)
12.15-13.30 Lunch
13.30-14.30 Working Groups-1
14.30-15.30 Working Groups-2 (Hate speech, room 25)
15.30-16.00 Coffee Break
16.00-17.00 Working Groups-3
17.00-18.00 Social Activity (TBD)
18.00-20.00 Dinner
20.00- Wine and Cheese
Wednesday
07.30-08.45 Breakfast
09.00-10.10 Working Groups-4
10.10-10.30 Coffee Break
10.30-12.00 Wrap-up and next steps
12.15- Lunch and Departure
Keywords
- Cybersafety
- Online social networks
- Security and privacy
- Legal and ethical issues on the web
LINKS