EAGER

group_project

Visible to the public EAGER: Collaborative: Mapping Privacy and Surveillance Dynamics in Emerging Mobile Ecosystems: Practices and Contexts in the Netherlands and US

The increasing ubiquity of mobile technologies creates unique privacy and surveillance challenges for users. These problems are global, but the way users, organizations, and governments approach these challenges varies based on cultural norms around privacy. This cross-cultural project evaluates how mobile users in the U.S. and the Netherlands think about and make decisions about their privacy when using mobile apps.

group_project

Visible to the public EAGER: Collaborative: Faster and Stronger Onion Routing (FASOR)

Tor is used daily by millions of users, including journalists, militaries and law enforcement, activists, companies, whistleblowers, and ordinary people, to protect their web browsing against surveillance. However, the internal architecture of Tor is very complicated. This complexity creates performance problems, and it makes security analysis difficult. Furthermore, Tor's encryption will be broken by future quantum computers.

group_project

Visible to the public SaTC-EDU: EAGER: Development and Evaluation of Privacy Education Tools via Open Collaboration

As the Internet grows in importance, it is vital to develop methods and techniques for educating end-users to improve their awareness of online privacy. However, the development of Web-based education tools for online privacy is still in the early stage. Traditional solutions involving professionals can make the tool development costly. It is also not clear how motivating, inspiring, and/or effective these education tools are to general users, especially novice users who have rarely dealt with privacy issues.

group_project

Visible to the public EAGER: Securing Integrated Circuits Through Realtime Hardware Trojan Detection

Modifications to integrated circuits (ICs) or the insertion of foreign intellectual property pose a serious threat to U.S. sovereignty, as ICs are found in many consumer electronic devices, including phones, computers, and televisions. More importantly, many commercial and military U.S. assets rely on ICs for computation and management of critical infrastructure such as banking, energy, and defense systems. The primary impact of the proposed work is to improve the security of U.S.

group_project

Visible to the public EAGER: Collaborative: A Research Agenda to Explore Privacy in Small Data Applications

One of the crucial ideas behind Privacy by Design (PbD) is that privacy should be taken into consideration in the process of design, not merely after-the-fact, as so often happens. Yet, this ideal has failed to gain widespread practical traction, challenged, in part, by the lack of developed methodologies and also because of privacy's conceptual complexity, which hampers its operationalization.

group_project

Visible to the public EAGER: Understanding the Strategic Values of Privacy Practices in Organizations

As companies collect consumer data in increasingly larger quantity and mine the data more deeply, trade-offs arise with respect to companies' practices about information privacy. A company may choose practices that augment targeted advertisements or services. However, the financial rewards associated with privacy practices are highly uncertain, since they are affected by a company's competition with rivals.

group_project

Visible to the public EAGER: USBRCCR: HealthSense: Assessing and Protecting Privacy in Wireless Wearable Sensor-Generated Medical Data

Medical and body-worn sensors will enhance human health monitoring and diagnosis of critical ailments in the next decade. As the popularity of such devices increases, there will be an emergence of new and varied types of attacks targeting privacy intrusions. In all such cases, ensuring that user's physiological data is only accessed by authorized entities and confidentially transmitted to the remote medical experts is of critical importance.

group_project

Visible to the public EAGER: A Mathematical Model of Privacy Decisions: A Behavioral Economic Perspective

When making decisions about information privacy, people do not always act rationally according to their best interests. It is thus important to understand why people express concerns about privacy, but often act contrary to their stated intentions.

group_project

Visible to the public EAGER: Exploring Job Applicant Privacy Concerns

Millions of people in the U.S. and worldwide apply for jobs online, and the use of online job application systems is growing. Thus, online job applicants are an important population to study. However, few studies have examined job applicants' concerns about their privacy and how to protect it. Further, job applicants' privacy concerns may affect how willing they are to apply for jobs and even whether job applicants pursue legal action against employers for privacy violations.

group_project

Visible to the public EAGER: USBRCCR: Improving Network Security at the Network Edge

Recent years have seen the Internet playing an increasingly critical role in our daily lives with home networks hosting PCs, tablets, mobile devices along with more specialized devices such as smart televisions, thermostats, and other Internet-of-Things (IoT) devices. While these devices offer users an array of services and conveniences, they come at the cost of introducing security vulnerabilities into the home network.