In this workshop we discuss the emergence of social media, how the concept gained popularity and has now become the axle in collaborative communication on the Internet. We follow this with a presentation of basic approaches that you can use to protect your data and more importantly your privacy on these platforms.
Have you ever accepted a friendship request from the guy or girl you met at the corner store only to regret it the minute you clicked on “ACCEPT”? Or have you ever mistakenly allocated a “friend” to the wrong category and spent endless hours going through your list of 75,000 friends in order to find and reallocate your friend to the correct category? If you have, then you probably know about the nagging feeling of discomfort that you try to ignore or comfort yourself by telling yourself that it does not matter. We discuss examples of cyber-attackers to illustrate to you that this feeling should be taken seriously. If you feel concerned that something is not quite right, it most likely is the case.
Finally, we consider users like your Great Grandma who probably don’t use the Internet. If you have drifted away envying that peaceful time when social media did not exist, you could not be more mistaken. Privacy is still a concern for users who do not actively use the Internet!
Find out more in the certificate guidelines.
Dr. Anne Kayem is a researcher working in the field of Information Security. She holds a PhD degree obtained from Queen’s University in Canada. Her research interests range from designing and analysing secure and privacy preserving data sharing algorithms, to evaluating their usability. Dr. Kayem has served on several international conference and workshop program committees, and is the Program Chair for INTRICATE-SEC 2018. She has also served as a reviewer for journals in the field of Information Security such as IEEE Transactions on Mobile Computing, Elsevier Computers and Security, and ACM Surveys. She is on the Parallel Processing Letters editorial board, and has published more than 30 conference and journal papers in addition to two books on Information Security.