Filipo Sharevski (DePaul University)

Learning how people deal with misinformation on social media is relatively new line of inquiry as so far the research has focused on narrow information manipulation interventions. As the dissemination and/or discernment of falsehoods is uniquely driven by users’ identity and self-representation on social media, the inquiry into the misinformation “folklore” entails careful balancing between extracting users’ actual behavior traits and ensuring face-saving and dignified participation. In this talk, I will cover the strategies employed in inquires regarding users’ dealings with misinformation on both mainstream platforms (e.g. Twitter, TikTok) and alternative platforms (e.g. Gettr) that rest of substantive data-driven analysis of the platform and/or misinformation issue of interest, pilot testing, and nuanced phenomenological observations. Misinformation as a topic enables abundant social media data to append the analysis of the qualitative user responses, so. I will also cover mixed analytical approaches that enrich the overall human-subject inquiry on social media misinformation.

Speaker's Biography

Dr. Filipo Sharevski is an associate professor of cybersecurity at DePaul University and the director of the Adversarial Cybersecurity Automation Lab. His main research interest is focused on information manipulation as it unfolds across cyberspace, particularly materialized through m/disinformation campaigns on social media, social engineering, adversarial machine learning, as well as usable security ergonomics. He regularly publishes in relevant cybersecurity venues, actively participates in the ACM and IEEE associations, and holds leadership positions in scientific communities focused on creating meaningful and equitable pathways of cybersecurity education. Dr. Sharevski earned the PhD degree in interdisciplinary information security at Purdue University, CERIAS in 2015.

View More Papers

Evaluations of Cyberattacks on Cooperative Control of Connected and...

H M Sabbir Ahmad (Boston University), Ehsan Sabouni (Boston University), Wei Xiao (Massachusetts Institute of Technology), Christos G. Cassandras (Boston University), Wenchao Li (Boston University)

Read More

A Systematic Study of the Consistency of Two-Factor Authentication...

Sanam Ghorbani Lyastani (CISPA Helmholtz Center for Information Security, Saarland University), Michael Backes (CISPA Helmholtz Center for Information Security), Sven Bugiel (CISPA Helmholtz Center for Information Security)

Read More

FCGAT: Interpretable Malware Classification Method using Function Call Graph...

Minami Someya (Institute of Information Security), Yuhei Otsubo (National Police Academy), Akira Otsuka (Institute of Information Security)

Read More

StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant...

Ke Sun (University of California San Diego), Chunyu Xia (University of California San Diego), Songlin Xu (University of California San Diego), Xinyu Zhang (University of California San Diego)

Read More