Social, behavioral and economic science
group_project
Submitted by alfredkobsa on Mon, 10/16/2017 - 12:47pm
User errors or delays while performing security-critical tasks can lead to undesirable or even disastrous consequences. The impact of both accidental and intentional distractions on users in such situations has received little investigation. In particular, it is unclear whether and how sensory stimuli (e.g., sound or light) influence users' behavior and trigger mistakes. Better understanding of the effects of such distractions can lead to increased user awareness and countermeasures.
group_project
Submitted by Rebecca Wright on Fri, 10/13/2017 - 1:29pm
Modern critical infrastructure relies on successful interdependent function among many different types of networks. For example, the Internet depends on access to the power grid, which in turn depends on the power-grid communication network and the energy production network. For this reason, network science researchers have begun examining the robustness of critical infrastructure as a network of networks, or a multilayer network. Research in network anomaly detection systems has focused on single network structures (specifically, the Internet as a single network).
group_project
Submitted by Serge Egelman on Wed, 10/11/2017 - 3:07pm
Over the past decade, people have realized that failure to account for human factors has resulted in many software security problems. Yet, when software does feature user-centric design, it takes into account average user behavior rather than catering to the individual. Thus, systems designers have gone from designing for security experts to now appealing to the least common denominator.
group_project
Submitted by Phillipa Gill on Wed, 10/11/2017 - 12:58pm
The proliferation and increasing sophistication of censorship warrants continuing efforts to develop tools to evade it. Yet, designing effective mechanisms for censorship resistance ultimately depends on accurate models of the capabilities of censors, as well as how those capabilities will likely evolve. In contrast to more established disciplines within security, censorship resistance is relatively nascent, not yet having solid foundations for understanding censor capabilities or evaluating the effectiveness of evasion technologies.
group_project
Submitted by Norman Sadeh on Wed, 10/11/2017 - 10:14am
Whether it is on their smartphones, in their browsers or on social networks, people are confronted with an increasingly unmanageable number of privacy settings. What is needed is a new, more scalable paradigm that empowers them to regain control over the collection and use of their data. This is particularly the case for mobile apps people download on their smartphones. These apps have been shown to collect and share a wide variety of sensitive data, with users unable to keep up.
group_project
Submitted by Zachary Peterson on Wed, 10/11/2017 - 12:56am
The project involves the design and development of a pedagogical alternate reality game (ARG) teaching Cybersecurity and Computer Science (CS) concepts to first-year, undergraduate students.
group_project
Submitted by Grandon Gill on Wed, 10/11/2017 - 12:36am
The project will develop a case method capstone course for a new multidisciplinary Master's degree program in Cybersecurity at the University of South Florida (USF). It extends a project that focused on developing a capstone course for an undergraduate program employing the case method pedagogy. That study demonstrated the feasibility of building a course entirely around discussions of local case studies and demonstrated positive learning outcomes using a variety of instruments.
group_project
Submitted by ninghui on Tue, 10/10/2017 - 1:05pm
Risk communication is an important part of many cyber security mechanisms. Android's current risk communication mechanism is based on security warnings and has been demonstrated to be ineffective because users become habituated to ignore such warnings and tend to consent to all prompts. This multi-disciplinary research project aims at developing holistic solutions to usable risk communication and control for the Android platform.
group_project
Submitted by Nelson Sa on Tue, 10/10/2017 - 11:02am
The critical role of spectrum as a catalyst for economic growth was highlighted in the 2010 National Broadband Plan (NBP). A challenge for the NBP is realizing optimal spectrum sharing in the presence of interference caused by rogue transmissions from any source, but particularly secondary users who share the spectrum. This complex problem straddles wireless technology, industrial economics, international standards, and regulatory policy.
group_project
Submitted by Nasir Memon on Tue, 10/10/2017 - 10:58am
The main objective of this two-year project is to develop, implement, and study an intervention that increases cybersecurity awareness and proficiency among high school teachers and exposes high school girls to cybersecurity activities and careers. This objective is spurred by the growing need for cybersecurity professionals coupled with the under-representation of women in this field. The Bureau of Labor Statistics reports that 18% of cybersecurity specialists are women.