Privacy and Security in Online Social : Privacy and Pictures on Online Social...IIIT Hyderabad
This document summarizes a presentation on privacy and security in online social media. It discusses topics that will be covered including online social networks, programming languages, APIs, databases, and data analysis techniques. It then discusses concepts related to privacy including Westin's categories of privacy attitudes, concerns about privacy of personal information shared online, and types of privacy. Several experiments are described that aim to re-identify individuals by matching their publicly available social media photos with other unidentified sources, such as dating profiles or campus photos. The results showed that 6.3-10.5% of dating profiles and 38.18% of campus photos could be re-identified this way. The presentation concludes by discussing potential applications of these techniques in India.
Privacy and Security in Online Social Media : Trust and Credebillity on OSMIIIT Hyderabad
This document summarizes a lecture on privacy and security in online social media. It discusses analyzing misinformation spread on social media during real-world events like hurricanes and bombings. Features of tweets and user profiles are used to classify tweets as real or fake. A Chrome extension called TweetCred is demonstrated that analyzes tweets in real-time to assess credibility using machine learning models trained on these features. The lecture covers collecting, filtering, and annotating social media data from events. Network and linguistic analysis are used to understand information flow and credibility.
The document discusses privacy and security issues related to online social media. It covers topics like overview of online social media, programming languages and tools used for analysis, trust and credibility, privacy, policing, social network analysis using NLTK, e-crime detection and prevention, and future directions involving machine learning. The document also discusses a study on using social media to support police work and get citizens' opinions on policing in Indian cities. It outlines research questions, methodology of analyzing posts from 85 police department accounts, and technological implications of the findings. Finally, different types of crimes on social media like phishing, fake accounts, clickbaiting and account hijacking are described.
Privacy and Security in Online Social Media : Intro to courseIIIT Hyderabad
This document provides an introduction to an online course on privacy and security in online social media taught by Ponnurangam Kumaraguru. It outlines Kumaraguru's background and research interests in privacy, security, and data science related to online social media. It describes the course goals for students to understand privacy and security concerns on social media and analyze social media data. The document details assignments, online discussions, office hours, and course topics which will include hands-on experience with programming, social network analysis, and data visualization tools.
Privacy and Security in Online Social Media : Privacy and Social MediaIIIT Hyderabad
This document discusses privacy and security issues related to using online social media. It covers topics like how privacy is defined, Westin's three categories of privacy attitudes, and different types of privacy issues that can occur on Facebook. Specific examples mentioned include getting personalized ads based on online activity and demographic information being collected from social media users. The document appears to be from a tutorial or presentation on privacy concerns in social media.
Privacy and Security in Online Social Media : Policing and Social Media - Part 1IIIT Hyderabad
This document summarizes a course on privacy and security in online social media. It outlines topics that will be covered including an overview of online social media, tools like Linux, Python, APIs, and databases, and issues like trust, credibility, privacy, social network analysis, cybercrime, and identity resolution. It also discusses how police departments around the world are using social media for community outreach and to share information. Case studies of police presence on Facebook and Twitter in India, the US, and UK are presented.
Privacy and Security in Online Social : Privacy and Pictures on Online Social...IIIT Hyderabad
This document summarizes a presentation on privacy and security in online social media. It discusses topics that will be covered including online social networks, programming languages, APIs, databases, and data analysis techniques. It then discusses concepts related to privacy including Westin's categories of privacy attitudes, concerns about privacy of personal information shared online, and types of privacy. Several experiments are described that aim to re-identify individuals by matching their publicly available social media photos with other unidentified sources, such as dating profiles or campus photos. The results showed that 6.3-10.5% of dating profiles and 38.18% of campus photos could be re-identified this way. The presentation concludes by discussing potential applications of these techniques in India.
Privacy and Security in Online Social Media : Trust and Credebillity on OSMIIIT Hyderabad
This document summarizes a lecture on privacy and security in online social media. It discusses analyzing misinformation spread on social media during real-world events like hurricanes and bombings. Features of tweets and user profiles are used to classify tweets as real or fake. A Chrome extension called TweetCred is demonstrated that analyzes tweets in real-time to assess credibility using machine learning models trained on these features. The lecture covers collecting, filtering, and annotating social media data from events. Network and linguistic analysis are used to understand information flow and credibility.
The document discusses privacy and security issues related to online social media. It covers topics like overview of online social media, programming languages and tools used for analysis, trust and credibility, privacy, policing, social network analysis using NLTK, e-crime detection and prevention, and future directions involving machine learning. The document also discusses a study on using social media to support police work and get citizens' opinions on policing in Indian cities. It outlines research questions, methodology of analyzing posts from 85 police department accounts, and technological implications of the findings. Finally, different types of crimes on social media like phishing, fake accounts, clickbaiting and account hijacking are described.
Privacy and Security in Online Social Media : Intro to courseIIIT Hyderabad
This document provides an introduction to an online course on privacy and security in online social media taught by Ponnurangam Kumaraguru. It outlines Kumaraguru's background and research interests in privacy, security, and data science related to online social media. It describes the course goals for students to understand privacy and security concerns on social media and analyze social media data. The document details assignments, online discussions, office hours, and course topics which will include hands-on experience with programming, social network analysis, and data visualization tools.
Privacy and Security in Online Social Media : Privacy and Social MediaIIIT Hyderabad
This document discusses privacy and security issues related to using online social media. It covers topics like how privacy is defined, Westin's three categories of privacy attitudes, and different types of privacy issues that can occur on Facebook. Specific examples mentioned include getting personalized ads based on online activity and demographic information being collected from social media users. The document appears to be from a tutorial or presentation on privacy concerns in social media.
Privacy and Security in Online Social Media : Policing and Social Media - Part 1IIIT Hyderabad
This document summarizes a course on privacy and security in online social media. It outlines topics that will be covered including an overview of online social media, tools like Linux, Python, APIs, and databases, and issues like trust, credibility, privacy, social network analysis, cybercrime, and identity resolution. It also discusses how police departments around the world are using social media for community outreach and to share information. Case studies of police presence on Facebook and Twitter in India, the US, and UK are presented.
Link prediction 방법의 개념 및 활용Kyunghoon Kim
The document discusses link prediction in social networks. It begins with an introduction to social networks and link prediction. It then covers the framework of link prediction, including common methods and applications. As an example, it discusses using link prediction to analyze terrorist networks. Finally, it discusses performing link prediction using Python tools like NumPy, Pandas, and NetworkX.
Visualiz'em is a tool that provides unified visualization of heterogeneous personal information about people from multiple sources. A between-subjects study with 40 participants compared Visualiz'em to usual apps. Visualiz'em allowed participants to obtain faster and richer overviews about people and find specific information more quickly. The timeline and profile views in Visualiz'em were most useful, while the tag cloud was less helpful. Visualiz'em shows potential for integrating personal information beyond close relationships.
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET Journal
This document summarizes a research paper on tweet segmentation and its application to named entity recognition. It proposes a novel framework called Hybrid Segmentation that splits tweets into meaningful segments to preserve semantic context for downstream natural language processing applications like named entity recognition. HybridSeg finds optimal tweet segmentations by maximizing the stickiness score of segments, which considers global context based on English phrases and local context based on linguistic features or term dependencies within a batch of tweets. Experiments show significantly improved segmentation quality when learning both global and local contexts compared to global context alone. The segmented tweets can then be used for high accuracy named entity recognition through part-of-speech tagging.
Presentation for tutorial session 'Measuring scholarly impact: Methods and practice' at ISSI2015
Explains how to use linkpred: https://github.com/rafguns/linkpred
This document outlines the development of a system called Coalmine for analyzing social media data to detect potential threats. It describes collecting over 1 billion tweets per week from Twitter's API and storing the data. The analysis method involves both manual querying of the data as well as automated detection algorithms. Example case studies where Coalmine detected botnet command and control channels and spam are provided. Future work to improve Coalmine's scalability is also discussed.
The document outlines an agenda for a workshop on online social media and network analysis. It discusses collecting Twitter data using twecoll and analyzing it in Gephi to calculate social network analysis metrics like centrality, modularity, and communities. Participants will brainstorm a research idea involving finding food enthusiasts on Instagram by analyzing the network of users who post photos tagged #foodporn and who likes whose photos.
The document discusses social media security challenges related to cognition, cross-platform issues, and push algorithms. It covers topics like abuse targeting internal or external victims, security issues on social media, and the life cycle and influence of social media posts. Detection of multiple accounts and geolocation identification on social media are also summarized.
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Jason Hong
This document discusses research into detecting and preventing phishing attacks. It begins by outlining the negative impacts of phishing from consumer, corporate, and societal perspectives. It then describes how phishing attacks are becoming more sophisticated through spear phishing, social engineering, and the use of malware. The document outlines various techniques developed by the author and his colleagues to educate users and automatically detect phishing attacks, including embedded phishing training software called PhishGuru, educational microgames like Anti-Phishing Phil, analyzing search engine results to detect fake websites, and using machine learning to label new phishing sites based on similarities to known ones. User studies demonstrated that embedded, game-based training can significantly reduce users falling for phishing
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Beth Sallay
Why do certain users fall for phishing attacks? What's going on? Are they on auto-pilot, not fully engaged in their online activities? Are they lacking critical thinking abilities? The short answer is no, they are in fact fully aware of what they are doing and reading but lack the experience to know they are being scammed. There are also several personality traits that contribute to their increased likelihood of victimization.
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009Jason Hong
An overview of our group's work on teaching people not to fall for phishing attacks, using simulated phish. The summary is that simulated phish work surprisingly well, in terms of learning and retention.
How To Write Ap Lang Essays. Online assignment writing service.Amanda Anderson
Frannie displays symptoms consistent with obsessive-compulsive disorder (OCD), including recurrent obsessive thoughts about dirt and germs and compulsive cleaning and handwashing behaviors. OCD involves obsessive thoughts and compulsive behaviors that the person feels driven to perform in order to reduce anxiety. Frannie's symptoms meet the diagnostic criteria for OCD according to the DSM-5. A thorough analysis is needed to properly diagnose and treat Frannie's condition.
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Jason Hong
In this position paper, we argue that usable privacy and security is a grand challenge that needs more attention from the HCI community. We also discuss benefits to and new challenges for HCI, and use our research experiences to provide a critique of HCI.
This document provides an overview of a webinar on protecting organizational data. It introduces the presenters, Katie Gaston and Seth Steward, and provides an agenda for covering why security matters, 5 ways to protect an organization, how Bloomerang helps with security, and resources. Some key points made include that the average cost of a cyber attack for small businesses is $25,000, over 50% of non-profits were targeted by attacks in 2021, and 5 things organizations can do for cyber security are encrypt data, use password managers, start security training, use chat platforms, and create incident response plans.
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Jason Hong
A webinar I gave in September 2010 about protecting organizations from phishing scams. This talk is based on our research at Carnegie Mellon University.
Micheal Green - JustTech
Mary O'Shaughnessy - Her Justice
Sart Rowe - LSNTAP
In this webinar we look at what phishing is, how it impacts legal aid organizations, and how to take steps to reduce the likelihood and impact of getting hit with an attack.
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007Jason Hong
This document discusses research into combating phishing through both technical and human-focused approaches. It describes a multi-pronged project that takes both computer-focused and human-focused angles. On the computer side, it involves developing email (PILFER) and web (CANTINA) filters to automatically detect phishing attacks. On the human side, it involves interviews to understand how people make trust decisions online, embedded anti-phishing training in emails, an anti-phishing game (Anti-Phishing Phil), and studies on the effectiveness of browser warnings. The goal is to automate detection where possible but also support users through training as people are often not good at identifying unfamiliar phishing attempts.
Business Email Compromise: A Symptom Not A Cause.pdfNiloufer Tamboly
In an era where digital communication dominates the corporate landscape, business email compromise (BEC) has emerged as a critical threat to organizational integrity and financial stability. This talk explores BEC not as an isolated phenomenon but as a symptom of broader, underlying vulnerabilities within an organization's control systems. As a cybersecurity expert, I will guide you through a comprehensive examination of the factors that contribute to BEC, demonstrating that these incidents are often preventable through more robust internal controls and heightened employee awareness.
Business email compromise is a type of cyber fraud that involves the unauthorized use of business email accounts to conduct unauthorized transfers of funds or sensitive information. Despite its simplicity, the impact of BEC can be devastating, leading to significant financial losses and eroding trust within organizations. This presentation will outline the mechanics of BEC, examine its causes, and detail the profound impact it can have on organizations.
The document provides an overview of biometric technologies and key concepts. It discusses:
- Benefits of biometrics like increased security, convenience and accountability over traditional authentication methods.
- Key terms like verification, identification, enrollment, templates and matching.
- Factors that affect biometric system accuracy such as false match rate, false non-match rate and failure to enroll rate.
- The document is the syllabus for a module on biometrics that will cover introduction, standards, system design, applications and matching methods.
Privacy, Proof, and other Pain Points within International Enrollment Managem...Cheryl DarrupBoychuck
Explore the latest research and emerging solutions to specific operational pain points within International Enrollment Management, namely:
* Addressing the latest trends in data privacy and online security
* Facilitating the fight against fraud in financial documentation
* Detecting fraud in academic credential evaluations
* Measuring Return on Investment in international student recruitment
Session chair Cheryl DarrupBoychuck (USjournal.com and FundsV) will be joined by co-presenters Liliane Bauduy of Education Credential Evaluators, Mary Churchill of Salem State University, and Ben Waxman of INTEAD.
Link prediction 방법의 개념 및 활용Kyunghoon Kim
The document discusses link prediction in social networks. It begins with an introduction to social networks and link prediction. It then covers the framework of link prediction, including common methods and applications. As an example, it discusses using link prediction to analyze terrorist networks. Finally, it discusses performing link prediction using Python tools like NumPy, Pandas, and NetworkX.
Visualiz'em is a tool that provides unified visualization of heterogeneous personal information about people from multiple sources. A between-subjects study with 40 participants compared Visualiz'em to usual apps. Visualiz'em allowed participants to obtain faster and richer overviews about people and find specific information more quickly. The timeline and profile views in Visualiz'em were most useful, while the tag cloud was less helpful. Visualiz'em shows potential for integrating personal information beyond close relationships.
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET Journal
This document summarizes a research paper on tweet segmentation and its application to named entity recognition. It proposes a novel framework called Hybrid Segmentation that splits tweets into meaningful segments to preserve semantic context for downstream natural language processing applications like named entity recognition. HybridSeg finds optimal tweet segmentations by maximizing the stickiness score of segments, which considers global context based on English phrases and local context based on linguistic features or term dependencies within a batch of tweets. Experiments show significantly improved segmentation quality when learning both global and local contexts compared to global context alone. The segmented tweets can then be used for high accuracy named entity recognition through part-of-speech tagging.
Presentation for tutorial session 'Measuring scholarly impact: Methods and practice' at ISSI2015
Explains how to use linkpred: https://github.com/rafguns/linkpred
This document outlines the development of a system called Coalmine for analyzing social media data to detect potential threats. It describes collecting over 1 billion tweets per week from Twitter's API and storing the data. The analysis method involves both manual querying of the data as well as automated detection algorithms. Example case studies where Coalmine detected botnet command and control channels and spam are provided. Future work to improve Coalmine's scalability is also discussed.
The document outlines an agenda for a workshop on online social media and network analysis. It discusses collecting Twitter data using twecoll and analyzing it in Gephi to calculate social network analysis metrics like centrality, modularity, and communities. Participants will brainstorm a research idea involving finding food enthusiasts on Instagram by analyzing the network of users who post photos tagged #foodporn and who likes whose photos.
The document discusses social media security challenges related to cognition, cross-platform issues, and push algorithms. It covers topics like abuse targeting internal or external victims, security issues on social media, and the life cycle and influence of social media posts. Detection of multiple accounts and geolocation identification on social media are also summarized.
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Jason Hong
This document discusses research into detecting and preventing phishing attacks. It begins by outlining the negative impacts of phishing from consumer, corporate, and societal perspectives. It then describes how phishing attacks are becoming more sophisticated through spear phishing, social engineering, and the use of malware. The document outlines various techniques developed by the author and his colleagues to educate users and automatically detect phishing attacks, including embedded phishing training software called PhishGuru, educational microgames like Anti-Phishing Phil, analyzing search engine results to detect fake websites, and using machine learning to label new phishing sites based on similarities to known ones. User studies demonstrated that embedded, game-based training can significantly reduce users falling for phishing
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Beth Sallay
Why do certain users fall for phishing attacks? What's going on? Are they on auto-pilot, not fully engaged in their online activities? Are they lacking critical thinking abilities? The short answer is no, they are in fact fully aware of what they are doing and reading but lack the experience to know they are being scammed. There are also several personality traits that contribute to their increased likelihood of victimization.
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009Jason Hong
An overview of our group's work on teaching people not to fall for phishing attacks, using simulated phish. The summary is that simulated phish work surprisingly well, in terms of learning and retention.
How To Write Ap Lang Essays. Online assignment writing service.Amanda Anderson
Frannie displays symptoms consistent with obsessive-compulsive disorder (OCD), including recurrent obsessive thoughts about dirt and germs and compulsive cleaning and handwashing behaviors. OCD involves obsessive thoughts and compulsive behaviors that the person feels driven to perform in order to reduce anxiety. Frannie's symptoms meet the diagnostic criteria for OCD according to the DSM-5. A thorough analysis is needed to properly diagnose and treat Frannie's condition.
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Jason Hong
In this position paper, we argue that usable privacy and security is a grand challenge that needs more attention from the HCI community. We also discuss benefits to and new challenges for HCI, and use our research experiences to provide a critique of HCI.
This document provides an overview of a webinar on protecting organizational data. It introduces the presenters, Katie Gaston and Seth Steward, and provides an agenda for covering why security matters, 5 ways to protect an organization, how Bloomerang helps with security, and resources. Some key points made include that the average cost of a cyber attack for small businesses is $25,000, over 50% of non-profits were targeted by attacks in 2021, and 5 things organizations can do for cyber security are encrypt data, use password managers, start security training, use chat platforms, and create incident response plans.
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Jason Hong
A webinar I gave in September 2010 about protecting organizations from phishing scams. This talk is based on our research at Carnegie Mellon University.
Micheal Green - JustTech
Mary O'Shaughnessy - Her Justice
Sart Rowe - LSNTAP
In this webinar we look at what phishing is, how it impacts legal aid organizations, and how to take steps to reduce the likelihood and impact of getting hit with an attack.
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007Jason Hong
This document discusses research into combating phishing through both technical and human-focused approaches. It describes a multi-pronged project that takes both computer-focused and human-focused angles. On the computer side, it involves developing email (PILFER) and web (CANTINA) filters to automatically detect phishing attacks. On the human side, it involves interviews to understand how people make trust decisions online, embedded anti-phishing training in emails, an anti-phishing game (Anti-Phishing Phil), and studies on the effectiveness of browser warnings. The goal is to automate detection where possible but also support users through training as people are often not good at identifying unfamiliar phishing attempts.
Business Email Compromise: A Symptom Not A Cause.pdfNiloufer Tamboly
In an era where digital communication dominates the corporate landscape, business email compromise (BEC) has emerged as a critical threat to organizational integrity and financial stability. This talk explores BEC not as an isolated phenomenon but as a symptom of broader, underlying vulnerabilities within an organization's control systems. As a cybersecurity expert, I will guide you through a comprehensive examination of the factors that contribute to BEC, demonstrating that these incidents are often preventable through more robust internal controls and heightened employee awareness.
Business email compromise is a type of cyber fraud that involves the unauthorized use of business email accounts to conduct unauthorized transfers of funds or sensitive information. Despite its simplicity, the impact of BEC can be devastating, leading to significant financial losses and eroding trust within organizations. This presentation will outline the mechanics of BEC, examine its causes, and detail the profound impact it can have on organizations.
The document provides an overview of biometric technologies and key concepts. It discusses:
- Benefits of biometrics like increased security, convenience and accountability over traditional authentication methods.
- Key terms like verification, identification, enrollment, templates and matching.
- Factors that affect biometric system accuracy such as false match rate, false non-match rate and failure to enroll rate.
- The document is the syllabus for a module on biometrics that will cover introduction, standards, system design, applications and matching methods.
Privacy, Proof, and other Pain Points within International Enrollment Managem...Cheryl DarrupBoychuck
Explore the latest research and emerging solutions to specific operational pain points within International Enrollment Management, namely:
* Addressing the latest trends in data privacy and online security
* Facilitating the fight against fraud in financial documentation
* Detecting fraud in academic credential evaluations
* Measuring Return on Investment in international student recruitment
Session chair Cheryl DarrupBoychuck (USjournal.com and FundsV) will be joined by co-presenters Liliane Bauduy of Education Credential Evaluators, Mary Churchill of Salem State University, and Ben Waxman of INTEAD.
The document discusses a biology student's volunteer experience participating in a breast cancer walk for a class assignment, requiring preparation for the event including fundraising and spreading awareness about breast cancer. During the event, the student helped set up, assisted participants, and learned more about how nonprofit organizations support breast cancer research and patients. Overall, the experience provided valuable learning outside of the classroom.
This course will address the risks to a business from data breaches, various forms of cyberfraud and identity theft. We will discuss the legal issues with data breaches including issues for companies that are victims of data breaches.
Attacking the Privacy of Social Network users (HITB 2011)Marco Balduzzi
The document summarizes research into attacking the privacy of social network users. It describes how the researcher was able to automatically query social networks to map email addresses to user profiles and correlate information across networks. Experiments showed this could profile over 10 million users, discovering inconsistencies. The researcher also demonstrated how to leverage friend networks through techniques like reverse social engineering and drive-by downloads. Finally, alternatives like a decentralized "Safebook" social network are proposed to address privacy and security issues.
How to Make People Click on a Dangerous Link Despite their Security Awareness mark-smith
It is possible to make virtually any person click on a link, as any person will be curious about something, or interested in some topic, or find the message plausible because they know the sender, or because it fits their expectations (context).
Two-factor authentication- A sample writing _ZamanAsad Zaman
This document discusses various authentication methods including passwords, biometrics, tokens, two-factor authentication, and multi-factor authentication. It provides details on each method, including their strengths, weaknesses, and how they provide different levels of security. Multiple authentication factors can be combined to achieve stronger authentication through a multi-factor approach. The document also includes examples of how different authentication methods may be suitable for different access levels and use cases.
Similar to Week 7.3 Semantic Attacks - Spear Phishing (20)
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayIIIT Hyderabad
This document discusses responsible and safe artificial intelligence. It summarizes PK's work on developing context-aware models to reduce bias in large language models and techniques for removing harmful knowledge from models. The talk outlines issues like inconsistency in models, bias indicators, and corrective machine unlearning. It encourages collaborating to advance this important research and addresses building more accountability as models grow more powerful.
International Collaboration: Experiences, Challenges, Success storiesIIIT Hyderabad
This document discusses strategies for successful international collaboration, including maintaining an active website, pursuing joint grant proposals, student exchanges through co-advising and visits, organizing workshops together, and publishing joint papers. It emphasizes finding connections through one's existing network to avoid cold emails, and developing equal partnerships.
The document summarizes a workshop on responsible and safe AI held at IIT Madras. It discusses topics like legal bias and inconsistency in large language models, bias in AI systems, and approaches to make models more interpretable and remove harmful knowledge. Live demonstrations of ChatGPT were shown to illustrate issues like factual inconsistencies and how context is needed to avoid confusion. Overall, the workshop highlighted challenges with AI systems and ongoing research efforts to address issues like bias, lack of context, and removal of harmful information.
Identify, Inspect and Intervene Multimodal Fake NewsIIIT Hyderabad
Fake news refers to intentionally and verifiably false stories created to manipulate people’s perceptions of reality.
The concept of fake news is not new and has marked its presence dating back to AD 1475, affecting the citizens of Italy on eastern Sunday to the COVID-19 pandemic in 2020. Fake news has gained traction among audiences, created a buzz online, and faced repercussions offline. For instance, intruding hyperbolized fake articles into political campaigns or health and climate studies is havoc. In addition, the proliferation of fabricated stories has played a crucial role in inflaming or suppressing a social event. In conclusion, fake news is destructive and can lead to hatred against religion, politics, celebrities or organizations, resulting in riots/protests or even death.
The massive growth in the proliferation of fake news online might result from numerous technological advancements. Fake news seems to be the permanent reality, with social media being a primary conduit for its creation and dissemination. Despite the difficulty in identifying, tracking, and controlling unreliable content, there must be an effort to halt its expansion. Our research endeavors contribute to tackling various aspects of fake news, encompassing identification, inspection, and intervention. The premise of our thesis is firmly placed at the point where we analyze multiple facets of user-generated content produced online in the form of text and visuals to investigate the field of fake news.
First, we focus on devising different methods to Identify, a.k.a. detect fake news online, by extracting different feature sets from the given information. By designing foundational detection mechanisms, our work accelerates research innovations. Second, our research closely Inspects the fake stories from two perspectives. First, from the information point of view, one can inspect fabricated content to identify the patterns of false reports disseminating over the web, the modality used to create the fabricated content and the platform used for dissemination. Next, from the model point of view, we inspect detection mechanisms used in prior work and their generalizability to other datasets. The thesis also suggests Intervention techniques to help internet users broaden their comprehension of fake news. We discuss potential practical implications for social media platform owners and policymakers.
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyIIIT Hyderabad
Discuss work on using technology for Judiciary, Lawyers, etc. Analyse social media data, music listening habits for mental health. Bias and Safety in AI Systems.
Papers are available at https://precog.iiit.ac.in/pages/publications.html
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
This document appears to be the transcript from a B.Tech orientation presentation given by Ponnurangam Kumaraguru at IIIT Hyderabad. The presentation provides advice and encouragement to new students on managing their time at IIIT Hyderabad. It emphasizes making friends, trying new activities and clubs, controlling wants and FOMO, celebrating failures, and using social media to connect with others in a positive way. References are made to movies to illustrate points about perseverance, finding passion, and having a growth mindset during the transition to university life.
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityIIIT Hyderabad
We investigate two specific forms of linguistic ambiguities - polysemy, which is the multiplicity of meanings for a specific word, and tautology, which are seemingly uninformative and ambiguous phrases used in conversations. Both phenomena are widely-known manifestations of linguistic ambiguity at the lexical and pragmatic level, respectively.
The first part of the thesis focuses on addressing this challenge by proposing a new method for quantifying the degree of polysemy in words, which refers to the number of distinct meanings that a word can have. The proposed approach is a novel, unsupervised framework to compute and estimate polysemy scores for words in multiple languages, infusing syntactic knowledge in the form of dependency structures. The proposed framework is tested on curated datasets controlling for different sense distributions of words in three typologically diverse languages - English, French, and Spanish. The framework leverages contextual language models and syntactic structures to empirically support the widely held theoretical linguistic notion that syntax is intricately linked to ambiguity/polysemy.
The second part of the thesis explores how language models handle colloquial tautologies, a type of redundancy commonly used in conversational speech. We first present a dataset of colloquial tautologies and evaluate several state-of-the-art language models on this dataset using perplexity scores. We conduct probing experiments while controlling for the noun type, context and form of tautologies. The results reveal that BERT and GPT2 perform better with modal forms and human nouns, which aligns with previous literature and human intuition.
Data Science for Social Good: #LegalNLP #AlgorithmicBias...IIIT Hyderabad
Talk describes legal NLP idea discusses the following papers:
HLDC: Hindi Legal Documents Corpus https://precog.iiit.ac.in/pubs/HLDC_ACL_2022.pdf
Drug consumption: https://precog.iiit.ac.in/pubs/Effect_oF_Feedback_on_Drug_Consumption_Disclosures_on_Social_Media___ICWSM2023___16Sept1730hrs.pdf
This document provides tips for writing a good research paper. It discusses selecting an appropriate topic and audience, developing an outline, writing drafts for feedback, choosing a descriptive title, writing a literature review, crafting an introduction, including figures and tables, addressing reviewer comments, avoiding plagiarism, and acknowledging collaborators. The goal is to write papers that clearly communicate research and can be improved based on feedback from others.
Data Science for Social Good: #LegalNLP #AlgorithmicBiasIIIT Hyderabad
This document summarizes research on evaluating algorithmic bias in models trained on Hindi legal documents. The researchers collected a dataset of 900k legal documents from Uttar Pradesh courts in Hindi. They trained a bail prediction model on this data and evaluated it for demographic parity bias related to religious attributes. The results showed the model predictions changed more when replacing Hindu names with Muslim names compared to the reverse, indicating a potential bias against Muslims. Overall, the study highlights the need to evaluate models trained on real-world legal data for fairness to avoid perpetuating societal biases.
I discussed our work on #LegalAI #CodeMixing #FakeNews #Elections and other cool projects that we are currently working on at https://precog.iiit.ac.in/
The document discusses social computing research in India, focusing on legal AI and natural language processing applications. It summarizes work analyzing over 900,000 Hindi legal documents from district courts in Uttar Pradesh. Models were developed for tasks like bail prediction and legal document summarization. The research also addresses challenges in processing code-mixed text and fact-checking social media. Overall, the document outlines current research areas and opportunities in social computing for Indian contexts and languages, and provides contact information for those interested in the work.
Modeling Online User Interactions and their Offline effects on Socio-Technica...IIIT Hyderabad
Do online interactions trigger reactions back in the offline world? How can these reactions be detected and quantified? Specifically, what insights can be extracted for users, platform owners, and policymakers to minimize the potential harm of such reactions?
Society functions based on the complex interactions between individuals, communities, and organizations. The advent of the Internet has enabled these interactions to move online. A website or an application that facilitates the digitization of social interactions is called a socio-technical platform. For instance, individuals converse with each other via direct messaging applications (e.g., WhatsApp, Telegram), share thoughts, and gather feedback from communities (e.g., Reddit, Twitter, Youtube). Trade of goods occurs via e-commerce (e.g., Flipkart, Amazon) and online marketplaces (e.g., Google Play store). At times interactions happening in the online world, trigger reactions in the offline world, which we call overflow. Such overflows can have either a positive or negative impact. Socio-technical platforms save every interaction and associated metadata, providing a unique opportunity to analyze rich data at scale. Discover interaction patterns, detect and quantify overflow of interactions, and extract insights for users and policymakers.
This report aims to study the interactions by keeping the individual as the focal point. We focus on two broad forms of interactions - i) the effect online community feedback can have on individual offline actions and ii) organizations leveraging individual customers' online presence to optimize business processes. In the first part, we work on two scenarios - (a) How does community feedback affect an individual future drug consumption frequency in a drug community forum? and (b) What changes does an individual undergo immediately after getting sudden popularity in Online social media? What actions help in maintaining popularity for longer? In the second part, we leverage online information about a customer to improve the prediction of Return-to-Origin in the e-commerce platform.
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayIIIT Hyderabad
The document provides an overview of privacy concepts including definitions of privacy, forms of privacy, social media privacy, data anonymity, and ethics around studying privacy. It discusses Westin's four states of privacy (solitude, intimacy, anonymity, reserve) and Solove's taxonomy of privacy harms. It also covers Westin's privacy indexes, privacy studies conducted in India, OECD and FTC privacy principles, and the costs of reading privacy policies.
The document then discusses privacy enhancing technologies like communication anonymizers, shared bogus online accounts, obfuscation, and anonymization. Examples of privacy invasive technologies like spyware and RFID are also provided. Privacy decision making frameworks like Platform for Privacy Preferences (P3P)
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
The document provides advice and guidance for students transitioning to campus life from PK, a professor at IIIT Hyderabad. It includes quotes and links related to time management, pursuing interests, controlling wants and FOMO, exploring options before deciding on majors, aiming high while making consistent small progress, and asking for help when needed. The document acknowledges students who provided inputs and the knowledge gained from others to help with advising students.
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
The document is a transcript of a talk given by PK to B.Tech orientation students at IIIT Hyderabad. Some key points from the talk include:
- Encouraging students to make friends, participate in clubs and extracurricular activities.
- Emphasizing time management and not missing out on opportunities in the first two semesters.
- Advising students to explore different projects and areas before deciding on a focus or specialization.
- Noting that managing courses, social life, hobbies and more will be challenging but important during their time at IIIT.
Development of Stress Induction and Detection System to Study its Effect on B...IIIT Hyderabad
Stress has become a significant mental health problem of the 21st century. The number of people suffering from stress is increasing rapidly. Thus, easy-to-use, inexpensive, and accurate biomarkers are needed to detect stress during its inception. Early detection of stress-related diseases allows people to access healthcare services. This thesis focuses on the development of stress stimuli and the detection of stress induced by these stimuli. Identifying brain regions affected while exposing the subject to these stressful stimuli has also been done. Three different stimuli, viz. videos, gamified application, and a game, are investigated to study their effect as stress induction stimuli. To this end, in this thesis, a system is proposed to classify participants into stressed and non-stressed categories using machine learning, deep learning, and statistical techniques. The statistical significance between stressed and non-stressed was found using Higuchi Fractal Dimensions (HFD) feature extracted from EEG. This feature also helped identify the brain’s most affected region due to stress. Another outcome of this thesis is the extra annotation of the ground truth which further helps to validate the participant’s experience under the influence of stressful stimuli. This annotation was performed by evaluating participant performance under time pressure. In addition, a technique based on in-game analytics is presented to complement the betterment of self-reported data. Further, another dimension utilizing signatures from WiFi Media Access Control (MAC) layer traffic is presented to detect stress indicators in a device-agnostic way.
A Framework for Automatic Question Answering in Indian LanguagesIIIT Hyderabad
The distribution of research efforts done in the field of Natural Language
Processing (NLP) has not been uniform across all natural languages. It has
been observed that there is a significant gap between the development of
NLP tools in Indic languages (indic-NLP), and in European languages. We
aim to explore different directions to develop an automatic question answering system for Indic languages. We built a FAQ-retrieval based chatbot for
healthcare workers and young mothers of India. It supported Hindi language in either Devanagri script or Roman script. We observed that, in our
FAQ database, if there exists a question similar to the query asked by the
user, then the developed chatbot is able to find a relevant Question-Answer
pair (QnA) among its top-3 suggestions 70% of the time. We also observed
that performance of our chatbot is dependent on the diversity in the FAQ
database. Since database creation requires substantial manual efforts, we decided to explore other ways to curate knowledge from raw text irrespective
of domain.
We developed an Open Information Extraction (OIE) tool for Indic languages. During the preprocessing, chunking of text is performed with our
fine-tuned chunker, and the phrase-level dependency tree was constructed
using the predicted chunks. In order to generate triples, various rules were
handcrafted using the dependency relations in Indic languages. Our method
performed better than other multilingual OIE tools on manual and automatic evaluations. The contextual embeddings used in this work does not
take syntactic structure of sentence into consideration. Hence, we devised
an architecture that takes the dependency tree of the sentence into consideration to calculate Dependency-aware Transformer (DaT) embeddings.
Since the dependency tree is also a graph, we used Graph Convolution
Network (GCN) to incorporate the dependency information into the contextual embeddings, thus producing DaT embeddings. We used a hate-speech
detection task to evaluate the effectiveness of DaT embeddings. Our future
plan is to evaluate the applicability of DaT embeddings for the task of chunking. Moreover, the broader aim for the future is to develop an end-to-end
pronoun resolution model to improve the quality of triples and DaT embeddings. We also aim to explore the applicability of all our works to solve the
problem of long-context question answering.
Discover essential SEO Google tools to boost your website's performance, from Google Analytics and Search Console to Keyword Planner and Page Speed Insights.
Learn more: https://elysiandigitalservices.com/seo-google-tools/
The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...AJHSSR Journal
ABSTRACT :This research aims to analyze the correlation between employee work stress and digital literacy
with employee performance at PT Telkom Akses Area Cirebon, both concurrently and partially. Employing a
quantitative approach, the study's objectives are descriptive and causal, adopting a positivist paradigm with a
deductive approach to theory development and a survey research strategy. Findings reveal that work stress
negatively and significantly impacts employee performance, while digital literacy positively and significantly
affects it. Simultaneously, work stress and digital literacy have a positive and significant influence on employee
performance. It is anticipated that company management will devise workload management strategies to
alleviate work stress and assess the implementation of more efficient digital technology to enhance employee
performance.
KEYWORDS -digital literacy, employee performance,job stress, multiple regression analysis, workload
management
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...AJHSSR Journal
ABSTRACT: Security plays an important role in human life and endeavors. Securing information and
disseminating are critical challenges in the present day. This study aimed at identifying innovative technologies
that aid cybercrimes and can constitute threats to cybersecurity in North Central (Middle Belt) Nigeria covering
its six States and the FCT Abuja. A survey research design was adopted. The researchers employed the use of
Google form in administering the structured questionnaire. The instruments were faced validated by one expert
each from ICT and security. Cronbach Alpha reliability Coefficient was employed and achieved 0.83 level of
coefficient. The population of the study was 200, comprising 100 undergraduate students from computer science
and Computer/Robotics Education, 80 ICT instructors, technologists and lecturers in the University and
Technical Colleges in the Middle Belt Nigeria using innovative technologies for their daily jobs and 20 officers
of the crime agency such as: Independent Corrupt Practices Commission (ICPC) andEconomic and Financial
Crimes Commission (EFCC). Three research purposes and questions as well as the hypothesis guided the study
on Five (5) point Likert scale. Data collected were analyzed using mean and standard deviation for the three
research questions while three hypotheses were tested using t-test at 0.05 level of significance. Major findings
revealed that serious steps are needed to better secure the cybers against cybercrimes. Motivation, types, threats
and strategies for the prevention of cybercrimes were identified. The study recommends that government,
organizations and individuals should place emphasis on moral development, regular training of its employees,
regular update of software, use strong password, back up data and information, produce strong cybersecurity
policy, install antivirus soft and security surveillance (CCTV) in offices in order to safeguard its employees and
properties from being hacked and vandalized.
KEYWORDS: Cybersecurity, cybercrime, cyberattack, cybercriminal, computer virus, Virtual Private Networks
(VPN).
SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...AJHSSR Journal
ABSTRACT: This qualitative study investigates the adaption experiences of indigenous college students at the
University of Mindanao, Matina-main campus. Eight major themes emerged, including difficulties with language
proficiency, online learning, classroom interaction, examination systems, grading procedures, school regulations,
resource accessibility, coping mechanisms, and future goals. Implications include the requirement for targeted
language proficiency and technology use support, an understanding of adaption processes, interventions to
improve resource accessibility, and equitable public administration policies. The study underlines the importance
of adaptation in various educational contexts, as well as the role of educators and legislators in creating inclusive
learning environments.
KEYWORDS: indigenous college students, adaptation, educational challenges, coping strategies
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...AJHSSR Journal
ABSTRACT: Salman Rushdie’s novels are humorous books about serious times. His cosmopolitanism and
hybrid identity allowed him access to multiple cultures, religions, languages, dialects, and various modes of
writing. His style is often classified as magic realism, blending the imaginary with the real. He draws
inspiration from both English literature and Indian classical sources. Throughout his works, there is a lineage of
‘bastards of history’, a carnival of shameful characters scrolling all along his works. Rushdie intertwines fiction
with reality, incorporating intertextual references to Western literature in his texts, and frequently employing
mythology to explore history. This paper focuses on Rushdie’s three novels: Midnight’s Children, Shame, and
Haroun and the Sea of Stories, analyzing his postmodern storytelling techniques that aim to explore human
vices and follies while offering socio-political criticism.
KEYWORDS : Magic Realism, Rushdie, Satire, Storytelling, Transfictional Identities
UR BHatti Academy dedicated to providing the finest IT courses training in the world. Under the guidance of experienced trainer Usman Rasheed Bhatti, we have established ourselves as a professional online training firm offering unparalleled courses in Pakistan. Our academy is a trailblazer in Dijkot, being the first institute to officially provide training to all students at their preferred schedules, led by real-world industry professionals and Google certified staff.
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMAJHSSR Journal
ABSTRACT: Huzhou has rich tourism resources, as early as a considerable development since the reform and
opening up, especially in recent years, Huzhou tourism has ushered in a new period of development
opportunities. At present, Huzhou tourism has become one of the most characteristic tourist cities on the East
China tourism line. With the development of Huzhou City, the tourism industry has been further improved, and
the tourism degree of the whole city has further increased the transformation and upgrading of the tourism
industry. However, the development of tourism in Huzhou City still lags far behind the tourism development of
major cities in East China. This round of research mainly analyzes the current development of tourism in
Huzhou City, on the basis of analyzing the specific situation, pointed out that the current development of
Huzhou tourism problems, and then analyzes these problems one by one, and put forward some specific
solutions, so as to promote the further rapid development of tourism in Huzhou City.
KEYWORDS:Huzhou; Travel; Development
Factors affecting undergraduate students’ motivation at a university in Tra VinhAJHSSR Journal
ABSTRACT: Motivation plays an important role in foreign language learning process. This study aimed to
investigate student’s motivation patterns towards English language learning at a University in Tra Vinh, and factors
affecting their motivation change toward English language learning of non-English-major students in the semester.
The researcher used semi-structured interview at the first phase of choosing the participants and writing reflection
through the instrument called “My English Learning Motivation History” adapted from Sawyer (2007) to collect
qualitative data within 15 weeks. The participants consisted of nine first year non-English-major students who learning
General English at pre-intermediate level. They were chosen and divided into three groups of three members each
(high motivation group; average motivation group; and low motivation group). The results of the present study
identified six visual motivation patterns of three groups of students with different motivation fluctuation, through the
use of cluster analysis. The study also indicated a diversity of factors affecting students’ motivation involving internal
factors as influencing factors (cognitive, psychology, and emotion) and external factors as social factors (instructor,
peers, family, and learning environment) during English language learning in a period of 15 weeks. The findings of
the study helped teacher understand relationship of motivation change and its influential factors. Furthermore, the
findings also inspired next research about motivation development in learning English process.
KEY WORDS: language learning motivation, motivation change, motivation patterns, influential factors, students’
motivation.
10. Until now, work that we have seen?
⚫Using voters database
⚫Using Medical health database
⚫Using Pictures from FB
38
11. Goal
⚫To see how phishing attacks can be
performed by collecting personal
information from social networks
-How easily or effectively can phisher use this
information?
39
13. Methodology
⚫Collected publicly available personal
information using simple tools like Perl LWP
library
⚫Correlated this data with IU’s address book
database
⚫Launched in April 2005
⚫Age between 18 – 24
41
16. Methodology
⚫ Blogging, social network, and other public data is harvested
⚫ Data is correlated and stored in a relational database
⚫ Heuristics are used to craft spoofed email message by Eve
“as Alice” to Bob (a friend)
⚫ Message is sent to Bob
⚫ Bob follows the link contained within the email message
and is sent to an unchecked redirect
⚫ Bob is sent to attacker whuffo.com site
⚫ Bob is prompted for his University credentials
⚫ Bob’s credentials are verified with the University
authenticator
⚫ a. Bob is successfully phished
b. Bob is not phished in this session; he could try again. 44
17. Victims
⚫Control group high – sender email ID was IU
⚫Experimental condition consistent with other
studies
45
19. Repeated authentications
47
⚫ Subject tried multiple times
⚫ Tried again because “overload” message was shown
⚫ Lower bound of users to fall, continued to be
deceived
⚫ Some tried 80 times
20. Gender
48
⚫18,294 Ms and 19,527 Fs
⚫Overall F more victims
⚫More successful if it came from opposite gender
⚫F to M (13%) was more effect than M to F (2%)
22. 50
⚫All majors significant difference between
control and experimental
⚫Max difference in Science
⚫Technology lowest #satisfying ☺
23. Reactions
⚫Anger
-Unethical, inappropriate, illegal, fraudulent
-Researchers fired
-Psychological cost
⚫Denial
-Nobody accepted that they fell for it
-Admitting our vulnerability is hard
⚫Misunderstanding over spoofing emails
⚫Underestimation of publicly available
information
51