Lecture 1 - Intro to Course
Lecture 2 - Intro to Course
Lecture 3 - Incidents
Lecture 4 - Tutorial 1 - Part 1 Ubuntu
Lecture 5 - Tutorial 1 - Part 2 Python
Lecture 6 - OSM APIs and tools for data collection
Lecture 7 - Tutorial 2 - Part 1 Facebook API
Lecture 8 - Tutorial 2 - Part 2 Facebook API
Lecture 9 - Trust and Credibility on OSM
Lecture 10 - Misinformation on Social Media
Lecture 11 - Privacy and Social Media
Lecture 12 - Tutorial 3 - Part 1 Twitter API
Lecture 13 - Tutorial 3 - Part 2 MySQL
Lecture 14 - Tutorial 3 - Part 3 MongoDB
Lecture 15 - Privacy and Pictures on Online Social Media
Lecture 16 - Policing and Online Social Media
Lecture 17 - Policing and Online Social Media
Lecture 18 - Policing and Online Social Media
Lecture 19 - eCrime on Online Social Media
Lecture 20 - eCrime on Online Social Media
Lecture 21 - Tutorial 4 - Social Network Analysis
Lecture 22 - Link Farming in Online Social Media
Lecture 23 - Nudges
Lecture 24 - Semantic attacks: Spear phishing
Lecture 25 - Tutorial 5 - Analyzing text using Python NLTK
Lecture 26 - Profile Linking on Online Social Media
Lecture 27 - Anonymous Networks
Lecture 28 - Tutorial 6 - Gephi Network Visualization
Lecture 29 - Privacy in Location Based Social Networks - Part 1
Lecture 30 - Privacy in Location Based Social Networks - Part 2
Lecture 31 - Tutorial 7 - Visualization - Highcharts
Lecture 32 - Beware of What You Share Inferring Home Location in Social Networks
Lecture 33 - On the dynamics of username change behavior on Twitter
Lecture 34 - Boston Marathon Analyzing Fake Content on Twitter