Social, behavioral and economic science

group_project

Visible to the public SaTC: CORE: Small: Collaborative: Understanding Law-Enforcement Cyber Investigations

Numerous challenges confront law enforcement investigations and prosecutions of cybercrime offenses, including under-reporting by victims, jurisdictional conflicts and limitations, insufficient resources, training, and expertise, as well as organizational constraints. This research is a study of cybercrime investigators, their departments, and the challenges they face in fighting cybercrime. The research consists of social scientific research on how law enforcement investigators and their units conduct cybercrime investigations.

group_project

Visible to the public EAGER: Digital Inequalities in the Heartland: Exploring the Information Security Experiences of Marginalized Internet Users

This project aims to understand how Internet technology may affect patrons' privacy and data security when they use public access computers, and to develop technical solutions that will enable these individuals to go online more safely and securely. The project concentrates especially on people who are economically poor and vulnerable to risk, such as very young or old people, people of color, immigrants, Native people, non-English speakers, and the disabled. Often these patrons must rely on public libraries for their broadband Internet access.

group_project

Visible to the public SBE TWC: Small: Collaborative: Pocket Security - Smartphone Cybercrime in the Wild

Most of the world's internet access occurs through mobile devices such as smart phones and tablets. While these devices are convenient, they also enable crimes that intersect the physical world and cyberspace. For example, a thief who steals a smartphone can gain access to a person?s sensitive email, or someone using a banking app on the train may reveal account numbers to someone looking over her shoulder. This research will study how, when, and where people use smartphones and the relationship between these usage patterns and the likelihood of being a victim of cybercrime.

group_project

Visible to the public SBE: Small: An optimization framework for prioritizing cyber-security mitigations for securing information technology infrastructure

Our nation's information technology (IT) infrastructure is vulnerable to numerous security risks, including security vulnerabilities within the IT supply chain. This research addresses the cyber-security risks and vulnerabilities that exist in the Federal IT infrastructure. It will provide new insights for prioritizing and deploying IT security mitigations in a budget-constrained environment. It will also develop tools that can be used by Federal decision-makers and other large organizations which make investments.

group_project

Visible to the public SaTC-EDU: EAGER: Cybersecurity education for public policy

The project will develop a variety of video and text-based cybersecurity educational materials for anyone who is interested or involved in public policy, and who would benefit from a greater familiarity with the constraints under which cybersecurity policy making occurs.

group_project

Visible to the public TWC: Small: Collaborative: Discovering Software Vulnerabilities through Interactive Static Analysis

Software development is a complex and manual process, in part because typical software programs contain more than hundreds of thousands lines of computer code. If software programmers fail to perform critical checks in that code, such as making sure a user is authorized to update an account, serious security compromises ensue. Indeed, vulnerable software is one of the leading causes of cyber security problems. Checking for security problems is very expensive because it requires examining computer code for security mistakes, and such a process requires significant manual effort.

group_project

Visible to the public EAGER: TWC: Collaborative: iPrivacy: Automatic Recommendation of Personalized Privacy Settings for Image Sharing

The objective of this project is to investigate a comprehensive image privacy recommendation system, called iPrivacy (image Privacy), which can efficiently and automatically generate proper privacy settings for newly shared photos that also considers consensus of multiple parties appearing in the same photo. Photo sharing has become very popular with the growing ubiquity of smartphones and other mobile devices.

group_project

Visible to the public Forum on Cyber Resilience

This project provides support for a National Academies Roundtable, the Forum on Cyber Resilience. The Forum will facilitate and enhance the exchange of ideas among scientists, practitioners, and policy makers concerned with the resilience of computing and communications systems, including the Internet, critical infrastructure, and other societally important systems.

group_project

Visible to the public TWC SBE: Small: Building the human firewall: Developing organizational resistance to semantic security threats

Semantic attacks are efforts by others to steal valuable information by imitating electronic communications from a trustworthy source. A common example of a semantic attack is phishing where a phisher sends unsolicited messages to potential targets. When a targeted individual responds, the phisher then steals valuable information from the individual. Semantic attacks flow through established channels of communication (e.g., email, social media) and are difficult to distinguish from legitimate messages.

group_project

Visible to the public SBE: Small: The Force of Habit: Using fMRI to Explain Users' Habituation to Security Warnings

Warning messages are one of the last lines of defense in computer security, and are fundamental to users' security interactions with technology. Unfortunately, research shows that users routinely ignore security warnings. A key contributor to this disregard is habituation, the diminishing of attention due to frequent exposure. However, previous research examining habituation has done so only indirectly, by observing the influence of habituation on security behavior, rather than measuring habituation itself.