ENCASE – EnhaNcing seCurity And privacy in the Social wEb: a user centered approach for the protection of minors

Flotbot

ENCASE will leverage the latest advances in usable security and privacy to design and implement a browser-based architecture for the protection of minors from malicious actors in online social networks

encase.socialcomputing.eu

ENCASE will leverage the latest advances in usable security and privacy to design and implement a browser-based architecture for the protection of minors from malicious actors in online social networks. The ENCASE user-centric architecture will consist of three distinct services, which can be combined to form an effective protective net against cyberbullying and sexually abusive acts: a) a browser add-on with its corresponding scalable back-end software stack that collects the users’ online actions to unveil incidents of aggressive or distressed behavior; b) a browser add-on with its associated scalable software stack that analyses social web data to detect fraudulent and fake activity and alert the user; and c) a browser add-on that detects when a user is about to share sensitive content (e.g., photos or address information) with an inappropriate audience and warns the user or his parents of the imminent privacy threat. The third add-on has usable controls that enable users to protect their content by suggesting suitable access lists, by watermarking, and by securing the content via cryptography or steganography. The three browser add-ons and the back-end social web data analytics software stack will be assessed with user studies and piloting activities and will be released to the public. The foundation of the research and innovation activities will be a diligently planned inter-sectorial and interdisciplinary secondment program for Experienced and Early Stage Researchers that fosters knowledge exchange. The academic partners will contribute know-how on user experience assessment, large-scale data processing, machine learning and data-mining algorithm design, and content confidentiality techniques. The industrial partners will primarily offer expertise in production-grade software development, access to real-world online social network data, and access to numerous end-users through widely deployed products.