Social, behavioral and economic science

group_project

Visible to the public TWC SBE: Medium: Collaborative: Dollars for Hertz: Making Trustworthy Spectrum Sharing Technically and Economically Viable

The critical role of spectrum as a catalyst for economic growth was highlighted in the 2010 National Broadband Plan (NBP). A challenge for the NBP is realizing optimal spectrum sharing in the presence of interference caused by rogue transmissions from any source, but particularly secondary users who share the spectrum. This complex problem straddles wireless technology, industrial economics, international standards, and regulatory policy.

group_project

Visible to the public EAGER: Collaborative: IC Supply Chain Security and Quality Control in Business and Social Context

Trusted hardware is essential to achieving a secure and trustworthy cyberspace. However, this security foundation is not free of threats. Specifically, an adversary involved in Integrated Circuit (IC) development and supply may launch a number of attacks such as intellectual property theft, design tamper, counterfeiting and overproduction. The Comprehensive National Cyber Security Initiative has identified this supply chain risk management problem as a top national priority.

group_project

Visible to the public CRII: SaTC: Empirical and Analytical Models for the Deployment of Software Updates in Large Vulnerable Populations

Software vulnerabilities are an important vector for malware delivery. The software updating mechanisms, responsible for deploying the vulnerability patches, are in a race with the cyber attackers seeking to exploit the vulnerabilities. Moreover, these updating mechanisms have multiple, potentially conflicting, design goals, as they must quickly deploy patches on millions of hosts worldwide, must not overburden the users, and must avoid breaking dependencies in the deployment environment.

group_project

Visible to the public EDU: CySec: A Cybersecurity Collectable Card Game for Children

We believe it is a national imperative to cultivate American cybersecurity experts from a young age. However, middle school students from underrepresented groups are typically unaware of career opportunities in cybersecurity, and what they entail. Children who are members of underrepresented groups often lack a sense of identification with STEM fields and endeavors and should be introduced to career paths that are culturally relevant and developmentally appropriate.

group_project

Visible to the public EAGER: Protecting Election Integrity Via Automated Ballot Usability Evaluation

Anything that causes the vote tally to differ from the intent of the voters is a threat to election integrity. While most threats to election integrity have concerned security, there is another critical threat to election integrity: usability. When voters are unable to successfully communicate their intent due to poor ballot design, this threatens the integrity of the election, no matter what the level of security is.

group_project

Visible to the public SaTC-EDU: EAGER: Education Initiative TECH MeD: Transdisciplinary Education for Critical Hacks of Medical Devices

TECH MeD (Transdisciplinary Education for Critical Hacks of Medical Devices) seeks to engage a broad audience about the cybersecurity implications of remotely accessible, implantable medical devices. The project will educate undergraduate and graduate-level students from various disciplines, healthcare professionals, patients, and the general public about the ethical, legal, social, and technical implications of these remotely accessible devices.

group_project

Visible to the public EAGER: Can You Trust Apps Age Recommendations? Inconsistent and Unreliable Maturity Ratings on Mobile Platforms

While smart phones provide an excellent way for communication, entertaining and education, they also raise many privacy and security concerns. Children are facing the risks of being exposed to inappropriate content due to mis-rated Apps. Both Android and iOS apps come with maturity ratings that examine the existence and intensity of mature themes within each app. However, each mobile platform adopts its own rating policy and rating strategy which creates inconsistency and inaccurate ratings. The maturity ratings for Android apps are purely a result of app developers' self-report.

group_project

Visible to the public EAGER: By the People, For the People: Community Ratings for App Privacy

Application stores use sophisticated user interfaces to help users understand the permissions sought by applications. Unfortunately, these interfaces are complex and may fail to address their goal of helping users give informed consent. As a result, users may inadvertently surrender private information or open themselves up to security attacks.

group_project

Visible to the public EAGER: Investigating Elderly Computer Users' Susceptibility to Phishing

One of the most severe and challenging threats to Internet security and privacy is phishing, which uses fake websites to steal users' online identities and sensitive information. Existing studies have evaluated younger users' susceptibility to phishing attacks, but have not paid sufficient attention to elderly users' susceptibility to phishing in realistic environments.