Date | Paper to critique and discuss | Presenter |
January 8 |
|
|
January 10 | Write 2 page summary of: Boyd, D. M. and Ellison, N. B. (2008), “Social Network Sites: Definition, History, and Scholarship,” Journal of Computer-Mediated Communication, 13: 210–230. doi: 10.1111/j.1083- 6101.2007.00393.x | |
January 15 | Critiquing & Presenting Research Papers
|
Yazan |
January 17 | Ralph Gross and Alessandro Acquisti. 2005. “Information revelation and privacy in online social networks,” In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (WPES ’05). ACM, New York, NY, USA, 71-80. | Sadeqh |
January 22 | Gao, Hongyu, et al. “Detecting and characterizing social spam campaigns,” Proceedings of the 10th annual conference on Internet measurement. ACM, 2010. | Hootan |
January 24 | Wondracek, G., Holz, T., Kirda, E., Kruegel, C., “A Practical Attack to De-Anonymize Social Network Users,” In: IEEE Symposium on Security and Privacy (S & P), 2010. | Charanpreet |
January 29 & 31 | Research Paper Proposals Blitz. Everybody presents his/her proposal for discussion. | |
February 5 | Mudhakar Srivatsa and Mike Hicks. 2012. “Deanonymizing mobility traces: using social network as a side-channel,” In Proceedings of the 2012 ACM conference on Computer and communications security (CCS ’12). ACM, New York, NY, USA, 628-637. DOI=10.1145/2382196.2382262 | Dana |
February 7 | L. Bilge, T. Strufe, D. Balzarotti, E. Kirda, “All your contacts are belong to us: automated identity theft attacks on social networks,” in Proceedings of the 18th International Conference on World Wide Web, ACM, New York, NY, USA, 2009, pp. 551–560. doi:http://doi.acm.org/10.1145/1526709.1526784. 3, 4 |
Jana
|
February 12 | Cao, Qiang, et al. “Aiding the detection of fake accounts in large scale social online services,” Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. USENIX Association, 2012. | Yazan |
February 14 | Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, Eliot Gillum, Krish Vitaldevaria, Jason Walter, Junxian Huang, and Zhuoqing Morley Mao. 2012. “Innocent by association: early recognition of legitimate users,” In Proceedings of the 2012 ACM conference on Computer and communications security (CCS ’12). ACM, New York, NY, USA, 353-364. DOI=10.1145/2382196.2382235 |
Kartik
|
February 19 & 21 | Reading Week! No classes. Work on the pre-final draft of the term paper. | |
February 26 | Pre-final draft of the term paper due | |
February 26 | Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y. Zhao, and Yafei Dai. 2011. “Uncovering social network sybils in the wild,” In Proceedings of the 2011 ACM SIGCOMM conference on Internet Measurement Conference (IMC ’11). ACM, New York, NY, USA, 259-268. | Yazan |
February 28 | Tao Stein, Erdong Chen, and Karan Mangla. 2011. “Facebook Immune System,” In Proceedings of the 4th Workshop on Social Network Systems (SNS ’11). ACM, New York, NY, USA. |
Golnaz
|
March 5 | Liu, Yabing, et al. “Analyzing Facebook privacy settings: User expectations vs. reality,” Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, 2011. | Sadeqh |
March 7 | Bonneau, Joseph, and Sören Preibusch, “The privacy jungle: On the market for data protection in social networks,” Economics of information security and privacy (2010): 121-167. | Karthik |
March 12 | Fred Stutzman, Jacob Kramer-Duffield. “Friends Only: Examining a Privacy-Enhancing Behavior in Facebook” CHI 2010. |
Charanpreet
|
March 14 | Serge Egelman, Andrew Oates, Shriram Krishnamurthi. “Oops, I Did It Again: Mitigating Repeated Access Control Errors on Facebook” CHI 2011 |
Hootan
|
March 19 | Simon Jones and Eamonn O’Neill. “Feasibility of Structural Network Clustering for Group-Based Privacy Control in Social Networks,” SOUPS 2010. | Jana |
March 21 | Felt, Adrienne, and David Evans. “Privacy protection for social networking APIs,” 2008 Web 2.0 Security and Privacy (W2SP’08) (2008). | Golnaz |
March 26 | Randy Baden, Adam Bender, Neil Spring, Bobby Bhattacharjee, and Daniel Starin. 2009. “Persona: an online social network with user-defined privacy,” In Proceedings of the ACM SIGCOMM 2009 conference on Data communication (SIGCOMM ’09). ACM, New York, NY, USA, 135-146. | Hootan |
March 28 | A. Besmer, H. Lipford, M. Shehab, and G. Cheek. “Social Applications: Exploring A More Secure Framework,” SOUPS 2009. | Dana |
April 2 & 4 | Finalizing paper and preparing presentation (no classes) | |
April 10 | Course mini-conference (All day!) KAIS 2020 | |
April 17 | Final versions of the term papers are due. | |
April 26 | Peer reviews of the term papers are due |