DAGSTUHL SEMINAR

Motivation

The range of malicious activities perpetrated on online social networks is regrettably wide, ranging from malware and spam to controlling fake and compromised accounts, to artificially manipulating the reputation of accounts and pages, spreading false information and terrorist propaganda. Unfortunately, research in this field has looked at these problems in isolation, almost exclusively relying on algorithms aimed at detecting malicious accounts that act similarly. This ultimately yields a catandmouse game, whereby providers attempt to make it more and more costly for fraudsters to evade detection.

This prompts the need for a multifaceted, multidisciplinary, holistic approach to advancing the state of knowledge on cybersafety in online social networks, and the ways in which it can be researched and protected. In this field, there exists a number of interconnected, complex issues that cannot be addressed in isolation, but have to be tackled and countered together. This Dagstuhl Seminar, we identify and plan to focus on the most relevant issues in cybersafety, as well as to explore both current and emerging solutions. Specifically, we identify four problems that are the most pressing both in terms of negative impact and potential danger on individuals and society, as well as challenging open research problems calling for a multidisciplinary approach:

  1. Cyberbullying and Hate Speech
  2. Cyber Fraud and Scams
  3. Reputation Manipulation and Fake Activities
  4. Propaganda and Radicalization

The main goal of this seminar is to bring together researchers working on all aspects of cybersafety, including security, privacy, human factors, economics, sociology, law, and psychology. We aim to discuss many facets of the problem, both technical and nontechnical, and jointly identify measures to advance the state of the art and identify promising research avenues. Examples of issues to be debated include:

  • How do we define cyberbullying and online harassment in a way that captures their inherent ambiguities and subjectiveness?
  • How do perpetrators of these activities exploit technological tools to increase their effectiveness? How do cyberbullies and online harassers organize and choose targets?
  • What are the different types of cyber fraud activities and how might we cluster different types of scams, based on psychological, sociological, situational and technical variables so as to better design countermeasures?
  • What data are ethically and socially acceptable to draw upon in detection and prevention of cyber fraud?
  • What variables are important in enabling us to distinguish those who have become single or repeat victims from nonvictims?
  • What are the current mitigation schemes adopted by social networks to counter reputation manipulation and their limitations?
  • What are the economics and legal mechanisms governing fake activities?
  • What can be done to make it economically unviable for fraudsters to engage in reputation manipulation and fake activities?
  • How does online radicalization happen?
  • Are there specific demographics that are more susceptible to being radicalized? How is online radicalization different from other types of online abuse?

AGENDA

Monday

07.30-08.45    Breakfast

09.00-10.20    Introductions, setting the agenda for the rest of the seminar

10.20-10.40    Coffee Break


10.40-10.55    Group Assignments

10.55-11.40    Jeremy Blackburn: Cyberbullying and Hate Speech (tutorial)

11.40-12.10    Discussion

12.15-13.45    Lunch

13.45-14.45    Fil Menczer: Misinformation (tutorial)

14.45-15.15    Discussion

15.15-15.45    Group picture + Coffee break

15.45-16.30    Gianluca Stringhini: Cyberfraud and Scams (tutorial)

16.30-17.00    Discussion

17.00-17.40    Awais Rashid: Detecting Child Sex Offenders (tutorial)

17.40-18.00    Discussion

18.00-20.00    Dinner

20.00-        Wine and Cheese
Tuesday

07.30-08.45    Breakfast

09.00-09.15    Zinaida Benenson: Spear Phishing: Email vs Facebook (Short Talk)

09.15-09.30    Ahmad-Reza Sadeghi: Cyber Deception (Short Talk)

09.30-09.45    Michael Sirivianos: Combatting Friend Spam using Social Rejections (Short Talk)

09.45-10.00    Alexandra Olteanu: Hate Speech: Thoughts on the Role of User Aspects & External Events (Short Talk)

10.00-10.15    Srijan Kumar: Sockpuppets in online discussions: use and abuse (Short Talk)

10.15-10.40    Coffee Break

10.40-10.55    Savvas Zannettou: How Web Communities Influence Each Other (Short Talk)

10.55-11.10    Manuel Egele: Compromised Social Network Accounts: Detection and Incentives (Short Talk)

11.10-11.25    Huy Kang Kim: Game Bots (Short Talk)

11.25-11.40    Oana Goga: Inter-Domain Trust Transfer (Short Talk)

11.40-11.55    Julien Freudiger: Privacy & Safety at Apple (Short Talk)

11.55-12.10    Stefan Schiffner: Crypto Wars 3.0 (Short Talk)

12.15-13.30    Lunch

13.30-14.30    Working Groups-1

14.30-15.30    Working Groups-2 (Hate speech, room 25)

15.30-16.00    Coffee Break

16.00-17.00    Working Groups-3

17.00-18.00    Social Activity (TBD)

18.00-20.00    Dinner

20.00-        Wine and Cheese
Wednesday

07.30-08.45    Breakfast

09.00-10.10    Working Groups-4

10.10-10.30    Coffee Break

10.30-12.00    Wrap-up  and next steps

12.15-        Lunch and Departure

 

Keywords

  • Cybersafety
  • Online social networks
  • Security and privacy
  • Legal and ethical issues on the web

LINKS