SlideShare a Scribd company logo
Online Social Media:
Opportunities, Challenges,
and Pitfalls
Summer Workshop on Online Social Media: Developer’s Perspective
Keynote Address
IGDTUW, Delhi
June 6, 2016
Ponnurangam Kumaraguru (“PK”)
Associate Professor
ACM Distinguished Speaker
fb/ponnurangam.kumaraguru, @ponguru
Who am I?
 Associate Professor, IIIT-Delhi
 Ph.D. from School of Computer Science,
Carnegie Mellon University (CMU)
 Research interests
- Privacy, e-crime, online social media, and usable
security
 Founding Head, CERC@IIITD, cerc.iiitd.ac.in
 Co-ordinate and manage Precog,
precog.iiitd.edu.in
 ACM Distinguished Speaker, and ACM India
Eminent Speaker
2
Some reasons for being
here?
3
4
Growth! Cliché!
5
6
7
8
9
10
Non-trustworthy Content
FAKE
11
$
RUMORS
12
SocialCaller App
13
https://play.google.com/store/apps/details?id=com.ayush.socialcaller&hl=en
14
BLR City Police on OSM
15
Keep citizens informed
Typical Post Looks like
16
Other implications
17
Signing off Twitter
18
Perceptions!
19
Exciting / challenging problems!
20
Exciting things planned
 Understanding the frameworks
 Data collection
 Data analysis
 Data Visualization
 Building and making things live!
 …
21
22
https://onlinecourses.nptel.ac.in/noc16_cs07/
Thank you
pk@iiitd.ac.in
http://precog.iiitd.edu.in/
https://onlinecourses.nptel.ac.in/noc16_cs07/
fb/ponnurangam.kumaraguru
tw/ponguru

More Related Content

What's hot

Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
cyber security
cyber securitycyber security
cyber security
abithajayavel
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Cyber security
Cyber securityCyber security
Cyber security
manavaneja3
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
Tayyab Farooq
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Social engineering
Social engineeringSocial engineering
Social engineering
Vishal Kumar
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
Tannistho Ghosh
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
Tyrone Grandison
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Jayant Raj
 
Cyber crime
Cyber crimeCyber crime
Email threats
Email threatsEmail threats
Email threats
Shivam Tomar
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal99
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
Pratham Jaiswal
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 

What's hot (20)

Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Email threats
Email threatsEmail threats
Email threats
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Viewers also liked

Social Media Opportunities & Pitfalls
Social Media Opportunities & PitfallsSocial Media Opportunities & Pitfalls
Social Media Opportunities & Pitfalls
appower2
 
Social Media: Embracing the Opportunities, Averting the Risks Webinar Present...
Social Media: Embracing the Opportunities, Averting the Risks Webinar Present...Social Media: Embracing the Opportunities, Averting the Risks Webinar Present...
Social Media: Embracing the Opportunities, Averting the Risks Webinar Present...
Elizabeth Lupfer
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Arniel Ping
 
Social Media Opportunities and Challenges in Digital Signage
Social Media Opportunities and Challenges in Digital SignageSocial Media Opportunities and Challenges in Digital Signage
Social Media Opportunities and Challenges in Digital Signage
Lynne d Johnson
 
The Power of Media Communication and Social Networks (Stand-alone PowerPoint ...
The Power of Media Communication and Social Networks (Stand-alone PowerPoint ...The Power of Media Communication and Social Networks (Stand-alone PowerPoint ...
The Power of Media Communication and Social Networks (Stand-alone PowerPoint ...
Clarisse Anne Jose
 
Media and Information Literacy (MIL) - 5. Media and Information Sources
Media and Information Literacy (MIL) - 5. Media and Information SourcesMedia and Information Literacy (MIL) - 5. Media and Information Sources
Media and Information Literacy (MIL) - 5. Media and Information Sources
Arniel Ping
 
Social Media: Opportunities and Challenges
Social Media: Opportunities and ChallengesSocial Media: Opportunities and Challenges
Social Media: Opportunities and Challenges
Stephen Selby
 
Threats & Opportunities – The Future Of Social Media For Business
Threats & Opportunities – The Future Of Social Media For BusinessThreats & Opportunities – The Future Of Social Media For Business
Threats & Opportunities – The Future Of Social Media For Business
John Bottom
 
SWOT Analysis of Digital Marketing Management
SWOT Analysis of Digital Marketing ManagementSWOT Analysis of Digital Marketing Management
SWOT Analysis of Digital Marketing Management
Yogesh M. A.
 
Challenges and opportunities of integrating technology in education in Tanzania
Challenges and opportunities of integrating technology in education in TanzaniaChallenges and opportunities of integrating technology in education in Tanzania
Challenges and opportunities of integrating technology in education in Tanzania
Ayoub Kafyulilo
 
Issues and challenges in Teaching and Learning ICT
Issues and challenges in Teaching and Learning ICTIssues and challenges in Teaching and Learning ICT
Issues and challenges in Teaching and Learning ICT
dilahz91
 
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Arniel Ping
 

Viewers also liked (12)

Social Media Opportunities & Pitfalls
Social Media Opportunities & PitfallsSocial Media Opportunities & Pitfalls
Social Media Opportunities & Pitfalls
 
Social Media: Embracing the Opportunities, Averting the Risks Webinar Present...
Social Media: Embracing the Opportunities, Averting the Risks Webinar Present...Social Media: Embracing the Opportunities, Averting the Risks Webinar Present...
Social Media: Embracing the Opportunities, Averting the Risks Webinar Present...
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
Social Media Opportunities and Challenges in Digital Signage
Social Media Opportunities and Challenges in Digital SignageSocial Media Opportunities and Challenges in Digital Signage
Social Media Opportunities and Challenges in Digital Signage
 
The Power of Media Communication and Social Networks (Stand-alone PowerPoint ...
The Power of Media Communication and Social Networks (Stand-alone PowerPoint ...The Power of Media Communication and Social Networks (Stand-alone PowerPoint ...
The Power of Media Communication and Social Networks (Stand-alone PowerPoint ...
 
Media and Information Literacy (MIL) - 5. Media and Information Sources
Media and Information Literacy (MIL) - 5. Media and Information SourcesMedia and Information Literacy (MIL) - 5. Media and Information Sources
Media and Information Literacy (MIL) - 5. Media and Information Sources
 
Social Media: Opportunities and Challenges
Social Media: Opportunities and ChallengesSocial Media: Opportunities and Challenges
Social Media: Opportunities and Challenges
 
Threats & Opportunities – The Future Of Social Media For Business
Threats & Opportunities – The Future Of Social Media For BusinessThreats & Opportunities – The Future Of Social Media For Business
Threats & Opportunities – The Future Of Social Media For Business
 
SWOT Analysis of Digital Marketing Management
SWOT Analysis of Digital Marketing ManagementSWOT Analysis of Digital Marketing Management
SWOT Analysis of Digital Marketing Management
 
Challenges and opportunities of integrating technology in education in Tanzania
Challenges and opportunities of integrating technology in education in TanzaniaChallenges and opportunities of integrating technology in education in Tanzania
Challenges and opportunities of integrating technology in education in Tanzania
 
Issues and challenges in Teaching and Learning ICT
Issues and challenges in Teaching and Learning ICTIssues and challenges in Teaching and Learning ICT
Issues and challenges in Teaching and Learning ICT
 
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
 

Similar to Online Social Media: Opportunities, Challenges, and Pitfalls

Digital Forces - Social: Future Trends, Student Projects Highlight, Software ...
Digital Forces - Social: Future Trends, Student Projects Highlight, Software ...Digital Forces - Social: Future Trends, Student Projects Highlight, Software ...
Digital Forces - Social: Future Trends, Student Projects Highlight, Software ...
IIIT Hyderabad
 
Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media
IIIT Hyderabad
 
Security Education Resource Mapping Project
Security Education Resource Mapping ProjectSecurity Education Resource Mapping Project
Security Education Resource Mapping Project
IIIT Hyderabad
 
Privacy and Security in Online Social Media.
Privacy and Security in Online Social Media. Privacy and Security in Online Social Media.
Privacy and Security in Online Social Media.
IIIT Hyderabad
 
Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media
IIIT Hyderabad
 
Data Science for Social Good
Data Science for Social Good Data Science for Social Good
Data Science for Social Good
IIIT Hyderabad
 
Introduction to privacy feedback research @ DesRes2016
Introduction to privacy feedback research @ DesRes2016Introduction to privacy feedback research @ DesRes2016
Introduction to privacy feedback research @ DesRes2016
Alessandro Carelli
 
#Privacy #Security #SocialMedia #Fake #Shadow #Profiles #Bots
#Privacy #Security #SocialMedia #Fake #Shadow #Profiles #Bots#Privacy #Security #SocialMedia #Fake #Shadow #Profiles #Bots
#Privacy #Security #SocialMedia #Fake #Shadow #Profiles #Bots
IIIT Hyderabad
 
Credibility, Identity Resolution, Privacy, and Policing in Online Social Media
Credibility, Identity Resolution, Privacy, and Policing in Online Social MediaCredibility, Identity Resolution, Privacy, and Policing in Online Social Media
Credibility, Identity Resolution, Privacy, and Policing in Online Social Media
IIIT Hyderabad
 
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
IIIT Hyderabad
 
Machine Leaning & Social Media
Machine Leaning & Social MediaMachine Leaning & Social Media
Machine Leaning & Social Media
IIIT Hyderabad
 
Social Network Analysis: Applications & Challenges
Social Network Analysis: Applications & ChallengesSocial Network Analysis: Applications & Challenges
Social Network Analysis: Applications & Challenges
IIIT Hyderabad
 
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET Journal
 
Applying Gamification to Higher Education and Libraries
Applying Gamification to Higher Education and LibrariesApplying Gamification to Higher Education and Libraries
Applying Gamification to Higher Education and Libraries
Bohyun Kim
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
lahill16
 
Top Cited Article in Computer Science & Information Technology Research: June...
Top Cited Article in Computer Science & Information Technology Research: June...Top Cited Article in Computer Science & Information Technology Research: June...
Top Cited Article in Computer Science & Information Technology Research: June...
AIRCC Publishing Corporation
 
Digital Tattoo: for MOSAIC
Digital Tattoo: for MOSAICDigital Tattoo: for MOSAIC
Digital Tattoo: for MOSAIC
University of British Columbia
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: Privacy
Ray Brannon
 
Social Networking (UA Campus Communicators)
Social Networking (UA Campus Communicators)Social Networking (UA Campus Communicators)
Social Networking (UA Campus Communicators)
rhonabwy
 
Digital Cheating
Digital CheatingDigital Cheating
Digital Cheating
Diana Benner
 

Similar to Online Social Media: Opportunities, Challenges, and Pitfalls (20)

Digital Forces - Social: Future Trends, Student Projects Highlight, Software ...
Digital Forces - Social: Future Trends, Student Projects Highlight, Software ...Digital Forces - Social: Future Trends, Student Projects Highlight, Software ...
Digital Forces - Social: Future Trends, Student Projects Highlight, Software ...
 
Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media
 
Security Education Resource Mapping Project
Security Education Resource Mapping ProjectSecurity Education Resource Mapping Project
Security Education Resource Mapping Project
 
Privacy and Security in Online Social Media.
Privacy and Security in Online Social Media. Privacy and Security in Online Social Media.
Privacy and Security in Online Social Media.
 
Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media
 
Data Science for Social Good
Data Science for Social Good Data Science for Social Good
Data Science for Social Good
 
Introduction to privacy feedback research @ DesRes2016
Introduction to privacy feedback research @ DesRes2016Introduction to privacy feedback research @ DesRes2016
Introduction to privacy feedback research @ DesRes2016
 
#Privacy #Security #SocialMedia #Fake #Shadow #Profiles #Bots
#Privacy #Security #SocialMedia #Fake #Shadow #Profiles #Bots#Privacy #Security #SocialMedia #Fake #Shadow #Profiles #Bots
#Privacy #Security #SocialMedia #Fake #Shadow #Profiles #Bots
 
Credibility, Identity Resolution, Privacy, and Policing in Online Social Media
Credibility, Identity Resolution, Privacy, and Policing in Online Social MediaCredibility, Identity Resolution, Privacy, and Policing in Online Social Media
Credibility, Identity Resolution, Privacy, and Policing in Online Social Media
 
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
 
Machine Leaning & Social Media
Machine Leaning & Social MediaMachine Leaning & Social Media
Machine Leaning & Social Media
 
Social Network Analysis: Applications & Challenges
Social Network Analysis: Applications & ChallengesSocial Network Analysis: Applications & Challenges
Social Network Analysis: Applications & Challenges
 
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...
 
Applying Gamification to Higher Education and Libraries
Applying Gamification to Higher Education and LibrariesApplying Gamification to Higher Education and Libraries
Applying Gamification to Higher Education and Libraries
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Top Cited Article in Computer Science & Information Technology Research: June...
Top Cited Article in Computer Science & Information Technology Research: June...Top Cited Article in Computer Science & Information Technology Research: June...
Top Cited Article in Computer Science & Information Technology Research: June...
 
Digital Tattoo: for MOSAIC
Digital Tattoo: for MOSAICDigital Tattoo: for MOSAIC
Digital Tattoo: for MOSAIC
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: Privacy
 
Social Networking (UA Campus Communicators)
Social Networking (UA Campus Communicators)Social Networking (UA Campus Communicators)
Social Networking (UA Campus Communicators)
 
Digital Cheating
Digital CheatingDigital Cheating
Digital Cheating
 

More from IIIT Hyderabad

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
IIIT Hyderabad
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
IIIT Hyderabad
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
IIIT Hyderabad
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
IIIT Hyderabad
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
IIIT Hyderabad
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
IIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
IIIT Hyderabad
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
IIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
IIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
IIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
IIIT Hyderabad
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
IIIT Hyderabad
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
IIIT Hyderabad
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
IIIT Hyderabad
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
IIIT Hyderabad
 

More from IIIT Hyderabad (20)

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
 

Recently uploaded

Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
Pallavi Sharma
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
paraasingh12 #V08
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
DharmaBanothu
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
wafawafa52
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 

Recently uploaded (20)

Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 

Online Social Media: Opportunities, Challenges, and Pitfalls

Editor's Notes

  1. Motivation of why it is important to study trust and credibility on Twitter
  2. They have a face to organization too,