Social, behavioral and economic science
group_project
Submitted by Michelle Connolly on Mon, 10/09/2017 - 1:52pm
The critical role of spectrum as a catalyst for economic growth was highlighted in the 2010 National Broadband Plan (NBP). A challenge for the NBP is realizing optimal spectrum sharing in the presence of interference caused by rogue transmissions from any source, but particularly secondary users who share the spectrum. This complex problem straddles wireless technology, industrial economics, international standards, and regulatory policy.
group_project
Submitted by Wei-Ming Lin on Mon, 10/09/2017 - 1:48pm
Trusted hardware is essential to achieving a secure and trustworthy cyberspace. However, this security foundation is not free of threats. Specifically, an adversary involved in Integrated Circuit (IC) development and supply may launch a number of attacks such as intellectual property theft, design tamper, counterfeiting and overproduction. The Comprehensive National Cyber Security Initiative has identified this supply chain risk management problem as a top national priority.
group_project
Submitted by tdumitra on Mon, 10/09/2017 - 1:13pm
Software vulnerabilities are an important vector for malware delivery. The software updating mechanisms, responsible for deploying the vulnerability patches, are in a race with the cyber attackers seeking to exploit the vulnerabilities. Moreover, these updating mechanisms have multiple, potentially conflicting, design goals, as they must quickly deploy patches on millions of hosts worldwide, must not overburden the users, and must avoid breaking dependencies in the deployment environment.
group_project
Submitted by Michael Thomas on Mon, 10/09/2017 - 12:09pm
We believe it is a national imperative to cultivate American cybersecurity experts from a young age. However, middle school students from underrepresented groups are typically unaware of career opportunities in cybersecurity, and what they entail. Children who are members of underrepresented groups often lack a sense of identification with STEM fields and endeavors and should be introduced to career paths that are culturally relevant and developmentally appropriate.
group_project
Submitted by Michael Byrne on Mon, 10/09/2017 - 9:40am
Anything that causes the vote tally to differ from the intent of the voters is a threat to election integrity. While most threats to election integrity have concerned security, there is another critical threat to election integrity: usability. When voters are unable to successfully communicate their intent due to poor ballot design, this threatens the integrity of the election, no matter what the level of security is.
group_project
Submitted by Michael Bachmann on Mon, 10/09/2017 - 9:25am
TECH MeD (Transdisciplinary Education for Critical Hacks of Medical Devices) seeks to engage a broad audience about the cybersecurity implications of remotely accessible, implantable medical devices. The project will educate undergraduate and graduate-level students from various disciplines, healthcare professionals, patients, and the general public about the ethical, legal, social, and technical implications of these remotely accessible devices.
group_project
Submitted by Yilu Zhou on Fri, 10/06/2017 - 2:21pm
While smart phones provide an excellent way for communication, entertaining and education, they also raise many privacy and security concerns. Children are facing the risks of being exposed to inappropriate content due to mis-rated Apps. Both Android and iOS apps come with maturity ratings that examine the existence and intensity of mature themes within each app. However, each mobile platform adopts its own rating policy and rating strategy which creates inconsistency and inaccurate ratings. The maturity ratings for Android apps are purely a result of app developers' self-report.
group_project
Submitted by Shriram Krishnamu... on Fri, 10/06/2017 - 2:18pm
Application stores use sophisticated user interfaces to help users understand the permissions sought by applications. Unfortunately, these interfaces are complex and may fail to address their goal of helping users give informed consent. As a result, users may inadvertently surrender private information or open themselves up to security attacks.
group_project
Submitted by Chuan Yue on Sun, 08/20/2017 - 3:45pm
One of the most severe and challenging threats to Internet security and privacy is phishing, which uses fake websites to steal users' online identities and sensitive information. Existing studies have evaluated younger users' susceptibility to phishing attacks, but have not paid sufficient attention to elderly users' susceptibility to phishing in realistic environments.