Social, behavioral and economic science

group_project

Visible to the public EAGER: Physical, Social and Situational Factors as Determents of Public WiFi Users Online Behaviors

The proliferation of public WiFi networks allows users to access the Internet from various public locations. Unfortunately, many public WiFi networks are unencrypted and insecure, posing risks to users' security and privacy, and allowing users to potentially initiate illegal online behaviors.

group_project

Visible to the public  EAGER: Age-Targeted Automated Cueing Against Cyber Social Engineering Attacks

Online social engineering attacks have been often used for cybercrime activities. These attacks are low cost and complicate attack attribution. Pure technical defense solutions cannot counter them, which rely on human gullibility. Humans often engage in short-cut decision-making, which can lead to errors. Another expectation is that users should be able to understand complex security tips, which do not consider user demographics. User age has been overlooked in understanding these attacks and user behavior related to them.

group_project

Visible to the public  EAGER: Digital Interventions for Reducing Social Networking Risks in Adolescents

Adolescents are at higher risk of engaging in risky behaviors in online social networks. This project develops digital intervention solutions to motivate, educate, support and engender safe social networking behaviors among adolescents. It significantly extends the current understanding of adolescent motivations for engaging in risky online behaviors and the state-of-the-art solutions for reducing adolescent exposure to such behaviors.

group_project

Visible to the public TWC: Medium: Collaborative: Developer Crowdsourcing: Capturing, Understanding, and Addressing Security-related Blind Spots in APIs

Despite an emphasis the security community places on the importance of producing secure software, the number of new security vulnerabilities in software increases every year. This research is based on the assumption that software vulnerabilities are caused by misunderstandings, or lack of knowledge, called blind spots, which the developers experience while they are building systems. When building systems, developers often focus more on functional requirements than on non-functional ones, such as security.

group_project

Visible to the public TWC SBE: Medium: Context-Aware Harassment Detection on Social Media

As social media permeates our daily life, there has been a sharp rise in the use of social media to humiliate, bully, and threaten others, which has come with harmful consequences such as emotional distress, depression, and suicide. The October 2014 Pew Research survey shows that 73% of adult Internet users have observed online harassment and 40% have experienced it. The prevalence and serious consequences of online harassment present both social and technological challenges.

group_project

Visible to the public TWC SBE: Small: Collaborative: Brain Password: Exploring A Psychophysiological Approach for Secure User Authentication

Cryptographic systems often rely on the secrecy of cryptographic credentials; however, these are vulnerable to eavesdropping and can resist neither a user's intentional disclosure nor coercion attacks where the user is forced to reveal the credentials. Conventional biometric keys (e.g., fingerprint, iris, etc.), unfortunately, can still be surreptitiously duplicated or adversely revealed. In this research, the PIs argue that the most secure cryptographic credentials are ones of which the users aren't even aware.

group_project

Visible to the public SBE: Small: Collaborative: Improving Security Behavior of Employees in Cyberspace through Evidence-based Malware Reports and E-Learning Materials

As the use of Web applications has increased, malicious content and cyber attacks are rapidly increasing in both their frequency and their sophistication. For unwary users and their organizations, social media sites such as Tumblr, Facebook, MySpace, Twitter, and LinkedIn pose a variety of serious security risks and threats. Recent studies show that social media sites are more in use for delivering malware than were previously popular methods of email delivery. Because of this, many organizations are looking for ways to implement effective security policies.

group_project

Visible to the public TWC: Small: Collaborative: Cracking Down Online Deception Ecosystems

Used by hundreds of millions of people every day, online services are central to everyday life. Their popularity and impact make them targets of public opinion skewing attacks, in which those with malicious intent manipulate the image of businesses, mobile applications and products. Website owners often turn to crowdsourcing sites to hire an army of professional fraudsters to paint a fake flattering image for mediocre subjects or trick people into downloading malicious software.

group_project

Visible to the public EAGER: Defending Against Visual Cyberbullying Attacks in Emerging Mobile Social Networks

Adolescents have fully embraced social networks for socializing and communicating. However, cyberbullying has become widely recognized as a serious social problem, especially for adolescents using social networks. Also, cyberbullying techniques change rapidly. Perpetrators can use the camera-capacity of their mobile devices to bully others through making and distributing harmful pictures or videos of their victims via mobile social networks.

group_project

Visible to the public EAGER: Toward Transparency in Public Policy via Privacy-Enhanced Social Flow Analysis with Applications to Ecological Networks and Crime

Recent improvements in computing capabilities, data collection, and data science have enabled tremendous advances in scientific data analysis. However, the relevant data are often highly sensitive (e.g., Census records, tax records, medical records). This project addresses an emerging and critical scientific problem: Privacy concerns limit access to raw data that might reveal information about individuals. Techniques to "sanitize" such data (e.g., anonymization) could have negative impact on the quality of the scientific results that use the data.