TPSOS 2015 - First International Workshop on Trust, Privacy and Security in Online Social Media (TPSOS'15)
Topics/Call fo Papers
Topics / themes include, but not limited to the following:
- Information privacy disclosure, revelation and its effects in OSM and online social networks
- Collateral damage due to information leakage (e.g. through photo tagging) on OSM
- Privacy issues related to location based services on OSM
- Effective and usable privacy setting and policies on OSM
- Anonymization of social network dataset
- Identifying and preventing social spam (including phishing and frauds) campaigns
- Tracking social footprint / identities across different social network
- Detection and characterization of spam, phishing, frauds, hate crime, abuse, extremism via online social media
- Cyber-bullying, abuse and harassment detection, and prevention strategies
- Identifying and curbing malware, phishing, and botnets on OSM
- Filtering of pornography, viruses, and human trafficking on OSM
- Studying the social and economic impact of security and privacy issues on OSM
- User behavior towards change in privacy features in OSM
- Usability (including design flaws) of secure systems on online social media
- Data modeling of human behavior in context of security and privacy threats
- Privacy and security in social gaming applications
- Trust systems based on social networks
- Legal and ethical issues for researchers studying security and privacy on OSM
- Information credibility on OSM
- Security and Privacy issues in new entrants in OSM (e.g. Google Plus)
- Effect of OSM on conventional crime (robberies and theft)
- Means to maintain different legitimate identities on the same OSM service
- Access control, rights management, and security of social content
- Privacy-enhancing technologies, including anonymity, pseudonymity and identity management, specifically for the web
- Identifying fraudulent entities in online social networks
- Problems due to unification of different identities of the same persona on different social media services
- Using social media (e.g. Twitter) as sensors for decision making at the organization level (i.e. detecting outbreaks)
- Information privacy disclosure, revelation and its effects in OSM and online social networks
- Collateral damage due to information leakage (e.g. through photo tagging) on OSM
- Privacy issues related to location based services on OSM
- Effective and usable privacy setting and policies on OSM
- Anonymization of social network dataset
- Identifying and preventing social spam (including phishing and frauds) campaigns
- Tracking social footprint / identities across different social network
- Detection and characterization of spam, phishing, frauds, hate crime, abuse, extremism via online social media
- Cyber-bullying, abuse and harassment detection, and prevention strategies
- Identifying and curbing malware, phishing, and botnets on OSM
- Filtering of pornography, viruses, and human trafficking on OSM
- Studying the social and economic impact of security and privacy issues on OSM
- User behavior towards change in privacy features in OSM
- Usability (including design flaws) of secure systems on online social media
- Data modeling of human behavior in context of security and privacy threats
- Privacy and security in social gaming applications
- Trust systems based on social networks
- Legal and ethical issues for researchers studying security and privacy on OSM
- Information credibility on OSM
- Security and Privacy issues in new entrants in OSM (e.g. Google Plus)
- Effect of OSM on conventional crime (robberies and theft)
- Means to maintain different legitimate identities on the same OSM service
- Access control, rights management, and security of social content
- Privacy-enhancing technologies, including anonymity, pseudonymity and identity management, specifically for the web
- Identifying fraudulent entities in online social networks
- Problems due to unification of different identities of the same persona on different social media services
- Using social media (e.g. Twitter) as sensors for decision making at the organization level (i.e. detecting outbreaks)
Other CFPs
- First International Workshop on Storage and File Systems (SFS'15)
- International Workshop on Visible Light Communications (LightComm’15)
- International Conference on Advances in Computing, Communications and Informatics (ICACCI)
- Third International Symposium on Security in Computing and Communications (SSCC’15)
- 2015 Workshop on Heterogeneous Learning
Last modified: 2014-11-29 23:20:30