Join a hybrid seminar on “Exploring Mis(Use) on the WhatsApp Messaging Platform” with Dr. Gareth Tyson from Hong Kong University of Science & Technology!
Date: Tuesday March 8, 2022
Time: 2PM – 4PM
Venue: Room TC103, Telecommunication Building at AIT (limited seats, first come first serve)
Register to join online: https://forms.gle/Ri4zbjGe79kiZDWg9
Join online with Zoom
Meeting ID: 592 715 4698
Organized by intERLab and the Department of Computer Science and Information Management.
Further information please contact: firstname.lastname@example.org
Bio: Gareth Tyson is an Assistant Professor at Hong Kong University of Science & Technology. His research focuses on Internet measurements, developing ways to better understand both network level and user-level activities. He regularly publishes in “top-tier” venues such as SIGMETRICS,
WWW, IMC and INFOCOM, and holds over 3000 citations. His work has been awarded $6.7 million in research funding and has received coverage from news outlets such as MIT Tech Review, Washington Post, BBC, The Times, Wired, Ars Technica, Business Insider and The Register.
Alongside collaborators, he has received the Facebook/WOAH’s Shared Task on Hateful Memes Prize 2021; the Best Student Paper Award at the Web Conference 2020; the Best Paper Award at eCrime’19; the Honourable Mention Award at the Web Conference 2018 (best paper in track); and the Best Presentation Award at INFOCOM’18. He received the Faculty Research Excellence Award in 2021 at Queen Mary University of London, and the Brendan Murphy Memorial Young Researcher Prize in 2013.
About this talk: In this presentation, I will share some of our work on measuring user behaviour on WhatsApp, recently published at WWW’22. Through a set of empirical measurements, I will discuss ways in which WhatsApp has been used and misused by people around the world, covering topics such as spam and misinformation. I will conclude the presentation by discussing ways in which such activities could be automatically detecting without compromising end-to-end encryption.