狠狠撸

狠狠撸Share a Scribd company logo
Information Infiltration on
Social Media
Chun-Ming Lai
<cmlai@thu.edu.tw>
Advertising
Recommendation Engines
Public Impersonal Pages
Public Personal Profiles
Private Groups
Private Personal
Profiles
Group
Messages
1:1
10/18/2021 2
Embrace transparency and restraint
on communication behavior
Amplification Privacy Concern
? Confidentiality,
? Policy
? Law
Content
Context
Cognitive
Collective Behavior
Information Influence
2021/10/18 3
Defense Strategy
12/06/2019
Media Sources
Social Algorithms
Online Participants
Content
Comments
Reactions
ML is learning how to select the
information you like to read
Addictive Design
A major design change around 2012~2013
12/06/2019 5
????? ?
?? ????
? ue is user affinity
? ?? is how the content is weighted
? ?? ?? ? ???? ????? ????? ?????????
Social Algorithms
11/28/2019
Occupy Wall St.
OUR ALGORITHM
Attack
Disinformation is ineffective without a successful
manipulation of social algorithm
Detect Attack behavior-OUR ALGORITHM
11/28/2019
Media Sources
Manipulated Social Algorithms
Online Participants
Content
Comments
Reactions
Online Participants
12/06/2019 9
Temporal/
Spatial
Interaction
Graph
Accounts Credibility
Fact Checker
Research Directions
CML's presentation with IORG
12/06/2019 11
Our Work in National Defense
Conference
2021/10/18 12
Crisis Informatics
2021/10/18 13
Partnership
12/06/2019 14
Thank you!
Ad

Recommended

America Saves Week 2013 eXtension Social Media Project Final Report With Data...
America Saves Week 2013 eXtension Social Media Project Final Report With Data...
Barbara O'Neill
?
US Cyber Security Policy
US Cyber Security Policy
suhlingse
?
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
Sarah Granger
?
Design and Prototyping of a Social Media Observatory
Design and Prototyping of a Social Media Observatory
Karissa Rae McKelvey
?
Misinfosec frameworks Cansecwest 2019
Misinfosec frameworks Cansecwest 2019
bodaceacat
?
Terp breuer misinfosecframeworks_cansecwest2019
Terp breuer misinfosecframeworks_cansecwest2019
bodaceacat
?
CansecWest2019: Infosec Frameworks for Misinformation
CansecWest2019: Infosec Frameworks for Misinformation
bodaceacat
?
Facebook usato da Governi anche per fake news
Facebook usato da Governi anche per fake news
Andrea Spinosi Picotti
?
CSW2022_05_data collection.pptx.pdf
CSW2022_05_data collection.pptx.pdf
SaraJayneTerp
?
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
Alireza Ghahrood
?
Threaths and risks
Threaths and risks
HHSome
?
Threaths and risks
Threaths and risks
HHSome
?
social media impact on the society nowdays
social media impact on the society nowdays
tepoj55801
?
IRJET- Competitive Analysis of Attacks on Social Media
IRJET- Competitive Analysis of Attacks on Social Media
IRJET Journal
?
Introduction to Mining Social Media Data
Introduction to Mining Social Media Data
Miriam Fernandez
?
Social engineering
Social engineering
n|u - The Open Security Community
?
Data Breaches and Social Media: yugg.cloud
Data Breaches and Social Media: yugg.cloud
Navya kumari
?
Types-of-Social-Engineering-Attacks.pdf in
Types-of-Social-Engineering-Attacks.pdf in
rg3935
?
Social Media Analytics Strategies And Governance Hamid Jahankhani
Social Media Analytics Strategies And Governance Hamid Jahankhani
parlohanikva
?
Cognitive security: all the other things
Cognitive security: all the other things
Sara-Jayne Terp
?
Social Media Challenges in the Digital Age: Mental Health, Misinformation, an...
Social Media Challenges in the Digital Age: Mental Health, Misinformation, an...
Azmeen Gadit
?
disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...
Sara-Jayne Terp
?
sabhira khadgi MYP Presentation for students.pptx
sabhira khadgi MYP Presentation for students.pptx
sudeshaschool2041
?
How tech titans and rogue nations threaten global stability.
How tech titans and rogue nations threaten global stability.
MvdzMloncrypto
?
CCU Talk at 2022/01/03
CCU Talk at 2022/01/03
Tunghai University
?
When Online Computational Data Meets Offline Real World Events
When Online Computational Data Meets Offline Real World Events
Tunghai University
?
Mimic iv
Mimic iv
Tunghai University
?
Pydata Taipei 2020
Pydata Taipei 2020
Tunghai University
?
CML's Presentation at FengChia University
CML's Presentation at FengChia University
Tunghai University
?
NDU Present
NDU Present
Tunghai University
?

More Related Content

Similar to CML's presentation with IORG (16)

CSW2022_05_data collection.pptx.pdf
CSW2022_05_data collection.pptx.pdf
SaraJayneTerp
?
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
Alireza Ghahrood
?
Threaths and risks
Threaths and risks
HHSome
?
Threaths and risks
Threaths and risks
HHSome
?
social media impact on the society nowdays
social media impact on the society nowdays
tepoj55801
?
IRJET- Competitive Analysis of Attacks on Social Media
IRJET- Competitive Analysis of Attacks on Social Media
IRJET Journal
?
Introduction to Mining Social Media Data
Introduction to Mining Social Media Data
Miriam Fernandez
?
Social engineering
Social engineering
n|u - The Open Security Community
?
Data Breaches and Social Media: yugg.cloud
Data Breaches and Social Media: yugg.cloud
Navya kumari
?
Types-of-Social-Engineering-Attacks.pdf in
Types-of-Social-Engineering-Attacks.pdf in
rg3935
?
Social Media Analytics Strategies And Governance Hamid Jahankhani
Social Media Analytics Strategies And Governance Hamid Jahankhani
parlohanikva
?
Cognitive security: all the other things
Cognitive security: all the other things
Sara-Jayne Terp
?
Social Media Challenges in the Digital Age: Mental Health, Misinformation, an...
Social Media Challenges in the Digital Age: Mental Health, Misinformation, an...
Azmeen Gadit
?
disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...
Sara-Jayne Terp
?
sabhira khadgi MYP Presentation for students.pptx
sabhira khadgi MYP Presentation for students.pptx
sudeshaschool2041
?
How tech titans and rogue nations threaten global stability.
How tech titans and rogue nations threaten global stability.
MvdzMloncrypto
?
CSW2022_05_data collection.pptx.pdf
CSW2022_05_data collection.pptx.pdf
SaraJayneTerp
?
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
Alireza Ghahrood
?
Threaths and risks
Threaths and risks
HHSome
?
Threaths and risks
Threaths and risks
HHSome
?
social media impact on the society nowdays
social media impact on the society nowdays
tepoj55801
?
IRJET- Competitive Analysis of Attacks on Social Media
IRJET- Competitive Analysis of Attacks on Social Media
IRJET Journal
?
Introduction to Mining Social Media Data
Introduction to Mining Social Media Data
Miriam Fernandez
?
Data Breaches and Social Media: yugg.cloud
Data Breaches and Social Media: yugg.cloud
Navya kumari
?
Types-of-Social-Engineering-Attacks.pdf in
Types-of-Social-Engineering-Attacks.pdf in
rg3935
?
Social Media Analytics Strategies And Governance Hamid Jahankhani
Social Media Analytics Strategies And Governance Hamid Jahankhani
parlohanikva
?
Cognitive security: all the other things
Cognitive security: all the other things
Sara-Jayne Terp
?
Social Media Challenges in the Digital Age: Mental Health, Misinformation, an...
Social Media Challenges in the Digital Age: Mental Health, Misinformation, an...
Azmeen Gadit
?
disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...
Sara-Jayne Terp
?
sabhira khadgi MYP Presentation for students.pptx
sabhira khadgi MYP Presentation for students.pptx
sudeshaschool2041
?
How tech titans and rogue nations threaten global stability.
How tech titans and rogue nations threaten global stability.
MvdzMloncrypto
?

More from Tunghai University (8)

CCU Talk at 2022/01/03
CCU Talk at 2022/01/03
Tunghai University
?
When Online Computational Data Meets Offline Real World Events
When Online Computational Data Meets Offline Real World Events
Tunghai University
?
Mimic iv
Mimic iv
Tunghai University
?
Pydata Taipei 2020
Pydata Taipei 2020
Tunghai University
?
CML's Presentation at FengChia University
CML's Presentation at FengChia University
Tunghai University
?
NDU Present
NDU Present
Tunghai University
?
Yuntech present
Yuntech present
Tunghai University
?
Big data johnson_public
Big data johnson_public
Tunghai University
?
Ad

Recently uploaded (20)

cybercrime investigation and digital forensics
cybercrime investigation and digital forensics
goverdhankumar137300
?
history of internet in nepal Class-8 (sparsha).pptx
history of internet in nepal Class-8 (sparsha).pptx
SPARSH508080
?
ChatGPT_and_Its_Uses_Presentationss.pptx
ChatGPT_and_Its_Uses_Presentationss.pptx
Neha Prakash
?
最新版美国特拉华大学毕业证(鲍顿别濒毕业证书)原版定制
最新版美国特拉华大学毕业证(鲍顿别濒毕业证书)原版定制
taqyea
?
Topic 2 - Cloud Computing Basics,,,.pptx
Topic 2 - Cloud Computing Basics,,,.pptx
oneillp100
?
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
notgachabite123
?
Make DDoS expensive for the threat actors
Make DDoS expensive for the threat actors
APNIC
?
Paper: The World Game (s) Great Redesign.pdf
Paper: The World Game (s) Great Redesign.pdf
Steven McGee
?
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
AhmadAli716831
?
3 years of Quarkus in production, what have we learned - Devoxx Polen
3 years of Quarkus in production, what have we learned - Devoxx Polen
Jago de Vreede
?
TCP/IP presentation SET2- Information Systems
TCP/IP presentation SET2- Information Systems
agnesegtcagliero
?
原版澳洲斯文本科技大学毕业证(厂鲍罢毕业证书)如何办理
原版澳洲斯文本科技大学毕业证(厂鲍罢毕业证书)如何办理
taqyed
?
DDoS in India, presented at INNOG 8 by Dave Phelan
DDoS in India, presented at INNOG 8 by Dave Phelan
APNIC
?
COMPUTER ETHICS AND CRIME.......................................................
COMPUTER ETHICS AND CRIME.......................................................
FOOLKUMARI
?
BroadLink Cloud Service introduction.pdf
BroadLink Cloud Service introduction.pdf
DevendraDwivdi1
?
Lecture 3.1 Analysing the Global Business Environment .pptx
Lecture 3.1 Analysing the Global Business Environment .pptx
shofalbsb
?
inside the internet - understanding the TCP/IP protocol
inside the internet - understanding the TCP/IP protocol
shainweniton02
?
最新版美国威斯康星大学绿湾分校毕业证(鲍奥骋叠毕业证书)原版定制
最新版美国威斯康星大学绿湾分校毕业证(鲍奥骋叠毕业证书)原版定制
Taqyea
?
Topic 1 Foundational IT Infrastructure_.pptx
Topic 1 Foundational IT Infrastructure_.pptx
oneillp100
?
最新版加拿大奎斯特大学毕业证(蚕鲍颁毕业证书)原版定制
最新版加拿大奎斯特大学毕业证(蚕鲍颁毕业证书)原版定制
taqyed
?
cybercrime investigation and digital forensics
cybercrime investigation and digital forensics
goverdhankumar137300
?
history of internet in nepal Class-8 (sparsha).pptx
history of internet in nepal Class-8 (sparsha).pptx
SPARSH508080
?
ChatGPT_and_Its_Uses_Presentationss.pptx
ChatGPT_and_Its_Uses_Presentationss.pptx
Neha Prakash
?
最新版美国特拉华大学毕业证(鲍顿别濒毕业证书)原版定制
最新版美国特拉华大学毕业证(鲍顿别濒毕业证书)原版定制
taqyea
?
Topic 2 - Cloud Computing Basics,,,.pptx
Topic 2 - Cloud Computing Basics,,,.pptx
oneillp100
?
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
notgachabite123
?
Make DDoS expensive for the threat actors
Make DDoS expensive for the threat actors
APNIC
?
Paper: The World Game (s) Great Redesign.pdf
Paper: The World Game (s) Great Redesign.pdf
Steven McGee
?
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
AhmadAli716831
?
3 years of Quarkus in production, what have we learned - Devoxx Polen
3 years of Quarkus in production, what have we learned - Devoxx Polen
Jago de Vreede
?
TCP/IP presentation SET2- Information Systems
TCP/IP presentation SET2- Information Systems
agnesegtcagliero
?
原版澳洲斯文本科技大学毕业证(厂鲍罢毕业证书)如何办理
原版澳洲斯文本科技大学毕业证(厂鲍罢毕业证书)如何办理
taqyed
?
DDoS in India, presented at INNOG 8 by Dave Phelan
DDoS in India, presented at INNOG 8 by Dave Phelan
APNIC
?
COMPUTER ETHICS AND CRIME.......................................................
COMPUTER ETHICS AND CRIME.......................................................
FOOLKUMARI
?
BroadLink Cloud Service introduction.pdf
BroadLink Cloud Service introduction.pdf
DevendraDwivdi1
?
Lecture 3.1 Analysing the Global Business Environment .pptx
Lecture 3.1 Analysing the Global Business Environment .pptx
shofalbsb
?
inside the internet - understanding the TCP/IP protocol
inside the internet - understanding the TCP/IP protocol
shainweniton02
?
最新版美国威斯康星大学绿湾分校毕业证(鲍奥骋叠毕业证书)原版定制
最新版美国威斯康星大学绿湾分校毕业证(鲍奥骋叠毕业证书)原版定制
Taqyea
?
Topic 1 Foundational IT Infrastructure_.pptx
Topic 1 Foundational IT Infrastructure_.pptx
oneillp100
?
最新版加拿大奎斯特大学毕业证(蚕鲍颁毕业证书)原版定制
最新版加拿大奎斯特大学毕业证(蚕鲍颁毕业证书)原版定制
taqyed
?
Ad

CML's presentation with IORG

Editor's Notes

  • #2: 王老师演讲在前
  • #3: 倒三角形、1:1 通訊是什麼 Source Target Audience
  • #5: 四個 Components
  • #6: 大家公认的叁个贵补肠迟辞谤蝉
  • #7: Occupy 行動 UC Davis 的行動