Filipo Sharevski (DePaul University)

Learning how people deal with misinformation on social media is relatively new line of inquiry as so far the research has focused on narrow information manipulation interventions. As the dissemination and/or discernment of falsehoods is uniquely driven by users’ identity and self-representation on social media, the inquiry into the misinformation “folklore” entails careful balancing between extracting users’ actual behavior traits and ensuring face-saving and dignified participation. In this talk, I will cover the strategies employed in inquires regarding users’ dealings with misinformation on both mainstream platforms (e.g. Twitter, TikTok) and alternative platforms (e.g. Gettr) that rest of substantive data-driven analysis of the platform and/or misinformation issue of interest, pilot testing, and nuanced phenomenological observations. Misinformation as a topic enables abundant social media data to append the analysis of the qualitative user responses, so. I will also cover mixed analytical approaches that enrich the overall human-subject inquiry on social media misinformation.

Speaker's Biography

Dr. Filipo Sharevski is an associate professor of cybersecurity at DePaul University and the director of the Adversarial Cybersecurity Automation Lab. His main research interest is focused on information manipulation as it unfolds across cyberspace, particularly materialized through m/disinformation campaigns on social media, social engineering, adversarial machine learning, as well as usable security ergonomics. He regularly publishes in relevant cybersecurity venues, actively participates in the ACM and IEEE associations, and holds leadership positions in scientific communities focused on creating meaningful and equitable pathways of cybersecurity education. Dr. Sharevski earned the PhD degree in interdisciplinary information security at Purdue University, CERIAS in 2015.

View More Papers

DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement...

Seongil Wi (KAIST), Trung Tin Nguyen (CISPA Helmholtz Center for Information Security, Saarland University), Jihwan Kim (KAIST), Ben Stock (CISPA Helmholtz Center for Information Security), Sooel Son (KAIST)

Read More

BEAGLE: Forensics of Deep Learning Backdoor Attack for Better...

Siyuan Cheng (Purdue University), Guanhong Tao (Purdue University), Yingqi Liu (Purdue University), Shengwei An (Purdue University), Xiangzhe Xu (Purdue University), Shiwei Feng (Purdue University), Guangyu Shen (Purdue University), Kaiyuan Zhang (Purdue University), Qiuling Xu (Purdue University), Shiqing Ma (Rutgers University), Xiangyu Zhang (Purdue University)

Read More

DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning

Shuo Wang (CSIRO's Data61 & Cybersecurity CRC, Australia), Mahathir Almashor (CSIRO's Data61 & Cybersecurity CRC, Australia), Alsharif Abuadbba (CSIRO's Data61 & Cybersecurity CRC, Australia), Ruoxi Sun (CSIRO's Data61), Minhui Xue (CSIRO's Data61), Calvin Wang (CSIRO's Data61), Raj Gaire (CSIRO's Data61 & Cybersecurity CRC, Australia), Surya Nepal (CSIRO's Data61 & Cybersecurity CRC, Australia), Seyit Camtepe (CSIRO's…

Read More

POSE: Practical Off-chain Smart Contract Execution

Tommaso Frassetto (Technical University of Darmstadt), Patrick Jauernig (Technical University of Darmstadt), David Koisser (Technical University of Darmstadt), David Kretzler (Technical University of Darmstadt), Benjamin Schlosser (Technical University of Darmstadt), Sebastian Faust (Technical University of Darmstadt), Ahmad-Reza Sadeghi (Technical University of Darmstadt)

Read More