Filipo Sharevski (DePaul University)

Learning how people deal with misinformation on social media is relatively new line of inquiry as so far the research has focused on narrow information manipulation interventions. As the dissemination and/or discernment of falsehoods is uniquely driven by users’ identity and self-representation on social media, the inquiry into the misinformation “folklore” entails careful balancing between extracting users’ actual behavior traits and ensuring face-saving and dignified participation. In this talk, I will cover the strategies employed in inquires regarding users’ dealings with misinformation on both mainstream platforms (e.g. Twitter, TikTok) and alternative platforms (e.g. Gettr) that rest of substantive data-driven analysis of the platform and/or misinformation issue of interest, pilot testing, and nuanced phenomenological observations. Misinformation as a topic enables abundant social media data to append the analysis of the qualitative user responses, so. I will also cover mixed analytical approaches that enrich the overall human-subject inquiry on social media misinformation.

Speaker's Biography

Dr. Filipo Sharevski is an associate professor of cybersecurity at DePaul University and the director of the Adversarial Cybersecurity Automation Lab. His main research interest is focused on information manipulation as it unfolds across cyberspace, particularly materialized through m/disinformation campaigns on social media, social engineering, adversarial machine learning, as well as usable security ergonomics. He regularly publishes in relevant cybersecurity venues, actively participates in the ACM and IEEE associations, and holds leadership positions in scientific communities focused on creating meaningful and equitable pathways of cybersecurity education. Dr. Sharevski earned the PhD degree in interdisciplinary information security at Purdue University, CERIAS in 2015.

View More Papers

The Power of Bamboo: On the Post-Compromise Security for...

Tianyang Chen (Huazhong University of Science and Technology), Peng Xu (Huazhong University of Science and Technology), Stjepan Picek (Radboud University), Bo Luo (The University of Kansas), Willy Susilo (University of Wollongong), Hai Jin (Huazhong University of Science and Technology), Kaitai Liang (TU Delft)

Read More

StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant...

Ke Sun (University of California San Diego), Chunyu Xia (University of California San Diego), Songlin Xu (University of California San Diego), Xinyu Zhang (University of California San Diego)

Read More

Analysing Adversarial Threats to Rule-Based Local-Planning Algorithms for Autonomous...

Andrew Roberts (Tallinn University of Technology), Mohsen Malayjerdi (Tallinn University of Technology), Mauro Bellone (Tallinn University of Technology), Olaf Maennel (The University of Adelaide), Ehsan Malayjerdi (Tallinn University of Technology)

Read More

Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey...

Mohit Kumar Jangid (The Ohio State University), Yue Zhang (Computer Science & Engineering, Ohio State University), Zhiqiang Lin (The Ohio State University)

Read More