Social, behavioral and economic science
group_project
Submitted by Rosario Gennaro on Wed, 01/03/2018 - 12:12pm
The problem of securely outsourcing data and computation has received widespread attention due to the rise of cloud computing: a paradigm where businesses lease computing resources from a service rather than maintain their own computing infrastructure. These scenarios introduce new security problems: in particular how do we trust the integrity of data and computation that are not under our own control. This project deals with these problems by considering methods, adapted from the world of economics, to incentivize parties to behave correctly during the execution of a computation.
group_project
Submitted by Rui Chen on Wed, 01/03/2018 - 12:06pm
group_project
Submitted by Peng Liu on Wed, 01/03/2018 - 9:44am
To better articulate privacy as a dynamic and dialectic phenomenon in a Web 2.0 world, this project proposes a set of basic empirical research activities to investigate three aspects of privacy in online social networks: conceptualization, intervention, and awareness.
group_project
Submitted by Oded Nov on Tue, 01/02/2018 - 8:52pm
A safe and productive society increasingly depends on a safe and trustworthy cyberspace. However, extensive research has repeatedly shown that the human factor is often the weakest part in cyberspace, and that users of information systems are often exposed to great risks when they respond to credible-looking emails. Thus, spear phishing attacks - which attempt to get personal or confidential information from users through well-targeted deceptive emails - represent a particularly severe security threat.
group_project
Submitted by Norman Sadeh on Tue, 01/02/2018 - 8:44pm
Natural language privacy policies have become a de facto standard to address expectations of notice and choice on the Web. Yet, there is ample evidence that users generally do not read these policies and that those who occasionally do struggle to understand what they read. Initiatives aimed at addressing this problem through the development of machine implementable standards or other solutions that require website operators to adhere to more stringent requirements have run into obstacles, with many website operators showing reluctance to commit to anything more than what they currently do.
group_project
Submitted by Zachary Peterson on Tue, 01/02/2018 - 5:04pm
group_project
Submitted by Robert LaRose on Tue, 01/02/2018 - 5:01pm
How does the average user cope with the threats they encounter while engaged in the most sensitive of all online activities, online banking? Online Safety for the Ages (OSA) examines generational differences in motivations to use risky online services and self-protective measures in the context of online banking. An influx of older adults attracted to the Internet by social media but at times unfamiliar with dealing with the hazards of online life, as well as younger users who are sometimes oblivious to those dangers, pose distinct challenges to the preservation of online safety.
group_project
Submitted by Mohd Anwar on Tue, 01/02/2018 - 3:57pm
As the use of Web applications has increased, malicious content and cyber attacks are rapidly increasing in both their frequency and their sophistication. For unwary users and their organizations, social media sites such as Tumblr, Facebook, MySpace, Twitter, and LinkedIn pose a variety of serious security risks and threats. Recent studies show that social media sites are more in use for delivering malware than were previously popular methods of email delivery. Because of this, many organizations are looking for ways to implement effective security policies.
group_project
Submitted by Dan Wallach on Tue, 01/02/2018 - 3:42pm
The security and integrity of elections is paramount in the furtherance of democracy. However, enhanced security often comes at the cost of making voting systems significantly more difficult for voters to use. With input from stakeholders in the voting process (most notably Travis County, Texas), we are constructing a prototype voting system and investigating how to design such a system so that it is significantly more secure than current solutions, without making it harder to participate in the election process.
group_project
Submitted by Raul Aranovich on Tue, 01/02/2018 - 3:04pm
Software vulnerabilities are weaknesses in the code that may be exploited by cybercriminals to harm a system. They often do not hinder a program's functionality, and are thus difficult to detect. This project focuses on developing methods to identify such "weak spots" in a program, where vulnerabilities are more likely to occur.