Filipo Sharevski (DePaul University)

Learning how people deal with misinformation on social media is relatively new line of inquiry as so far the research has focused on narrow information manipulation interventions. As the dissemination and/or discernment of falsehoods is uniquely driven by users’ identity and self-representation on social media, the inquiry into the misinformation “folklore” entails careful balancing between extracting users’ actual behavior traits and ensuring face-saving and dignified participation. In this talk, I will cover the strategies employed in inquires regarding users’ dealings with misinformation on both mainstream platforms (e.g. Twitter, TikTok) and alternative platforms (e.g. Gettr) that rest of substantive data-driven analysis of the platform and/or misinformation issue of interest, pilot testing, and nuanced phenomenological observations. Misinformation as a topic enables abundant social media data to append the analysis of the qualitative user responses, so. I will also cover mixed analytical approaches that enrich the overall human-subject inquiry on social media misinformation.

Speaker's Biography

Dr. Filipo Sharevski is an associate professor of cybersecurity at DePaul University and the director of the Adversarial Cybersecurity Automation Lab. His main research interest is focused on information manipulation as it unfolds across cyberspace, particularly materialized through m/disinformation campaigns on social media, social engineering, adversarial machine learning, as well as usable security ergonomics. He regularly publishes in relevant cybersecurity venues, actively participates in the ACM and IEEE associations, and holds leadership positions in scientific communities focused on creating meaningful and equitable pathways of cybersecurity education. Dr. Sharevski earned the PhD degree in interdisciplinary information security at Purdue University, CERIAS in 2015.

View More Papers

WIP: Augmenting Vehicle Safety With Passive BLE

Noah T. Curran (University of Michigan), Kang G. Shin (University of Michigan), William Hass (Lear Corporation), Lars Wolleschensky (Lear Corporation), Rekha Singoria (Lear Corporation), Isaac Snellgrove (Lear Corporation), Ran Tao (Lear Corporation)

Read More

Towards Automatic and Precise Heap Layout Manipulation for General-Purpose...

Runhao Li (National University of Defense Technology), Bin Zhang (National University of Defense Technology), Jiongyi Chen (National University of Defense Technology), Wenfeng Lin (National University of Defense Technology), Chao Feng (National University of Defense Technology), Chaojing Tang (National University of Defense Technology)

Read More

OBI: a multi-path oblivious RAM for forward-and-backward-secure searchable encryption

Zhiqiang Wu (Changsha University of Science and Technology), Rui Li (Dongguan University of Technology)

Read More

REDsec: Running Encrypted Discretized Neural Networks in Seconds

Lars Wolfgang Folkerts (University of Delaware), Charles Gouert (University of Delaware), Nektarios Georgios Tsoutsos (University of Delaware)

Read More