Updated at: Jan 04, 2016
Tristan Henderson is a Senior Lecturer in Computer Science at the University of St Andrews. His research has involved the study of privacy and security in systems including networked games, wireless local area networks, mobile location sharing systems, online social networks and opportunistic networks, and has been funded by bodies including the EPSRC (UK), HSARPA (US), and NSF (US). He runs the CRAWDAD data archive (http://crawdad.org), the world’s largest wireless network data archive, with over 110 datasets and tools in use by over 7000 users from 108 countries. Tristan has degrees in Economics and Computer Science from Cambridge and University College London. Abstract
The use of online social networks (OSNs) such as Facebook and Twitter for research has exploded in recent years, as researchers take advantage of access to the hundreds of millions of users of these sites to understand social dynamics, health, mobility, psychology and more. But there are myriad challenges in collecting the appropriate data from OSNs for an experiment and studying or improving the security and privacy of such systems.
We will discuss some of these challenges. First, we will look at differences in passive collection of OSN data (e.g., crawling Facebook) versus actively requesting information from OSN users. Secondly, we will examine the state-of-the-art in reproducible OSN research; that is, appropriate documentation of OSN experiments to enable replication and indeed understanding of an experiment. Finally, we will look at responsible data collection; in particular, collecting data in an ethical fashion that respects the desires of the OSN users themselves.Prereading
- E. Buchanan, J. Aycock, S. Dexter, D. Dittrich, and E. Hvizdak. Computer science security research and human subjects: Emerging considerations for research ethics boards. Journal of Empirical Research on Human Research Ethics, 6(2):71–83, June 2011. doi:10.1525/jer.2011.6.2.71.
- L. Hutton and T. Henderson. Towards reproducibility in online social network research. IEEE
Transactions on Emerging Topics in Computing, 2015. To appear
* * *
- A. J. Burstein. Conducting cybersecurity research legally and
ethically. In Proceedings of the 1st Usenix Workshop on Large-Scale
Exploits and Emergent Threats, LEET’08, San Francisco, CA, USA, Apr.
2008. Online at http://www.usenix.org/events/leet08/tech/full_papers/burstein/burstein_html/
- S. Arabas, M. R. Bareford, I. P. Gent, B. M. Gorman, M.
Hajiarabderkani, T. Henderson, L. Hutton, A. Konovalov, L. Kotthoff, C.
McCreesh, R. R. Paul, K. E. J. Petrie, A. Razaq, and D. Reijsbergen.
Case studies and challenges in reproducibility in the computational
sciences, 11 Sept. 2014. Online at http://arxiv.org/abs/1408.2123
- F. Ben Abdesslem, I. Parris, and T. Henderson. Reliable online social network data collection. In
Abraham, editor, Computational Social Networks, chapter 8, pages
183–210. Springer London, London, UK, 2012.