We just loaded the CyberSafety'16 proceedings into the DL. You can view the proceedings material here. Please be aware that the material was just loaded to the DL and it takes time for the data to propagate through the entire system. Full text article files (PDFs) will be available for download either on the conference start date or on the date set by the ACM SIG. you can also check out the individual talks by clicking the talk title links.

Tentative Program

Session 1

  • Workshop Introduction Talk (9:00AM - 9:15AM)
  • Invited keynote speech on "Bad Actors in Social Media", Francesca Spezzano, Boise State University, USA (9:15 AM - 10:30 AM) Slides
    • Short bio

      Francesca Spezzano is an Assistant Professor at Boise State University in the Computer Science department. Before that, she was Postdoctoral Research Associate at the University of Maryland Institute for Advanced Computer Studies. She received her Ph.D. from University of Calabria, Italy in 2012. While a Ph.D. student, she visited the Database Group at University of California Santa Cruz. Her research interests deal with identifying bad actors on social media, signed social networks, information diffusion, and national security.

    • Keynote Abstract

      Bad actors seriously compromise social media every day by threatening the safety of the users and the integrity of the content. This keynote speech will give an overview of the state of the art social network analysis, data mining, and machine learning techniques to detect bad actors in social media. More specifically, we will describe both general methods that are platform independent or valid for any malicious user, and methods specific to a particular social media (Twitter, Facebook, Slashdot, Wikipedia, Instagram) and/or a given type of bad actor (bots, spammers, trolls, vandals, cyberbullies). We will group these methods into four broad categories, namely (i) active methods, (ii) content-based, (iii) social network-based, and (iv) behaviorbased, and show their effectiveness in enforcing cybersafety.

Session 2

Session 3

Session 4