What are Cyber Social Threats

The role of online platforms as a prime, daily communication tool is coincident with a sharp rise in its misuse, threatening our society in large. These platforms have been implicated for promoting hate speech, radicalization, harassment, cyberbullying, fake news, human trafficking, drug dealing, gender-based stereotyping, and violence among other ills, with a significant impact on individual and community well-being.

Cyber social threats during political conflicts present a critical area of concern, as online platforms are increasingly used to disseminate misinformation, amplify propaganda, and coordinate malicious activities that exploit political and social divisions. These threats can exacerbate polarization, fuel unrest, and have profound real-world consequences, and may be amplified by the widespread adoption of generative artificial intelligence technology. Understanding and mitigating such behaviors will be of particular interest for CySoc 2025. The inherent complexity of these interactions requires novel computational approaches and interdisciplinary collaboration to analyze, interpret, and counteract their impacts effectively.

These challenges have led to a rising prominence of analysis of online communications in academia, politics, homeland security, and industry using computational techniques from natural language processing, statistics, network science, data mining, machine learning, computational linguistics, human-computer interaction, and cognitive science. To meet these challenges, this workshop aims to stimulate research on social, cultural, emotional, communicative, and linguistic aspects of harmful conversations on online platforms and developing novel approaches to analyze, interpret, and understand them.

The workshop welcomes papers that employ quantitative and/or qualitative, analytical, theoretical approaches examining a diverse range of issues related to online harmful communications. Papers on resources/data and tools will also be welcome either for demos or for short/regular talks.

Why attend the CySoc Workshop?

This workshop will bring together researchers and practitioners in computer and social sciences from both academia and industry to exchange ideas on understanding the multi-faceted aspects of harmful content while leading the discussion on building novel computational methods to reliably detect, derive meaning of, interpret, understand and counter them. The participants will find opportunities to present and hear about other fundamental research and emerging applications, to exchange ideas and experiences, and to identify new opportunities for collaborations across disciplines. The researchers and practitioners from various disciplines are strongly encouraged to attend, including (but not limited to) behavioral science, computer and information sciences, psychology, sociology, political science, cognitive science, cultural study, information systems, terrorism and counter-terrorism, operations research, communication, medicine, and public health.


Themes & Topics

We are interested in both computing and social science approaches that study the above research directions, based on quantitative, qualitative and mixed research methods. We expect to receive submissions and lead discussions on the topics of novel analytic methods, tools, and datasets.

Spotlight topic

Parallel to the main themes, this year, we will have a spotlight topic: Political Conflicts in Online Platforms in the Era of Gen-AI.

Themes

The CySoc workshop has three main themes:

  • Detection and prediction of content, users, and communities
  • Countering harmful narratives
  • Ethical considerations and handling bias

Topics

Topics for research and discussions on challenges in dealing with online harmful content include (but not limited to):

  • Spotlight topic: Political Conflicts in Online Platforms in the Era of Gen-AI
  • Online extremism
  • Harassment and cyberbullying
  • Hate speech
  • Gender-based violence
  • Human trafficking
  • Illicit drug trafficking
  • Mental health implications of social media
  • Ethical considerations on privacy-preserving social media analytics
  • Emotional and psychological support
  • Trust relationship and community dynamics
  • Relationship of the social web and mainstream news media
  • Cultural implications of social web usage
  • Influencer identification and community detection for movements
  • Misinformation and disinformation (e.g., epidemics of fake news, images and videos, during a disaster, health issues and elections)

Important Dates


🚨 Paper submissions due: March 31, 2025 🚨

Submission Instructions


This year CySoc will consider for acceptance research, position, short, and demo paper submissions.

Please reference the ICWSM 2025 Submission Guidelines for all information.

As per the AAAI-ICWSM guidelines: All papers must be submitted as high-resolution PDF files, formatted in AAAI two-column, camera-ready style, for US Letter (8.5" x 11") paper (see the ICWSM 2025 Submission Guidelines for the most up to date templates). Full papers are recommended to be 8 pages long and must be at most 11 pages long, including only the main text and the references. The mandatory Ethics Checklist (and brief additional Ethics Statement, if desired, see below), optional appendices, etc., do not count toward the page limit and should be placed after the references. Appendices, if they exist, should be placed after the Ethics Checklist. Revision papers and final camera-ready full papers can be up to 12 pages. Note that reviewers are not bound to review appendices, and excessively long appendices can be a ground for rejection. Dataset papers must be no longer than 10 pages, Position papers must be no longer than 5 pages, and Demo descriptions must be no longer than 2 pages. No source files (Word or LaTeX) are required at the time of submission for review; only the PDF file is permitted. Finally, the copyright slug may be omitted in the initial submission phase, and no copyright form is required until a paper is accepted for publication.

Anonymity: The review is double-blind. Therefore, please anonymize your submission: do not put the author names or affiliations at the start of the paper, and do not include funding or other acknowledgments in papers submitted for review.

For all other matter, please rely on the ICWSM 2025 Submission Guidelines.

Papers should be submitted via EasyChair.org

Workshop Program

The below program is tentative and may change after submissions have been accepted.

All times below are in the GMT+1 timezone

🙏 08.30 - 08.45 AM | Welcome workshop attendees
🎤 08.45 - 09.45 AM | Keynote I: Preslav Nakov, Mohamed bin Zayed University of Artificial Intelligence.
📄 09.45 - 10.30 AM | Paper Session I
☕️ 10.30 - 10.50 AM | Coffee Break
💻 10.50 - 12.00 PM | Demo presentations: TBA
📄 12.00 - 12.30 PM | Paper Session II
🥪 12.30 - 01.00 PM | Lunch Break
🎤 01.00 - 02.00 PM | Keynote II: Debora Nozza, Bocconi University.
👥 02.00 - 03.00 PM | Panel Discussion: Political Conflicts in Online Platforms in the Era of Gen-AI

📄 03.00 - 03.30 PM | Paper Session III
☕️ 03.30 - 03.45 PM | Coffee Break
📄 03.35 - 04.30 PM | Keynote or Paper Session IV
🧠 04.30 - 04.45 PM | Synthesis & Research Brainstorm
🗣️ 04.45 - 05.00 PM | Research Discussion
🙇 05.00 - 05.10 PM | Closing Remarks

Registration

More information will be provided soon.

Organizers

Ugur Kursuncu

Georgia State University GA, USA
Contact Email

Kaicheng Yang

Northeastern University, MA, USA
Contact Email

Francesco Pierri

Politecnico di Milano, Milano, Italy
Contact Email

Matthew DeVerna

Indiana University, Bloomington, IN, USA
Contact Email

Yelena Mejova

ISI Foundation, Turin, Italy
Contact Email

Jeremy Blackburn

State University of New York at Binghamton, NY, USA
Contact Email




Steering Committee

Names will be added below once confirmed.

Program Committee

Names will be added below once confirmed.