Social, behavioral and economic science

group_project

Visible to the public SBE: Small: Technological Con-Artistry: An Analysis of Social Engineering

One of the most serious threats in the world today to the security of cyberspace is "social engineering" - the process by which people with access to critical information regarding information systems security are tricked or manipulated into surrendering such information to unauthorized persons, thereby allowing them access to otherwise secure systems. To date, little systematic research has been conducted on social engineering.

group_project

Visible to the public EDU: Collaborative: Branching Interactive Graphic Stories for Cybersecurity Education

The purpose of the Branching Interactive Graphic Stories for Cybersecurity Education (BIGSCE) project is to determine how a technology for creating branching ("choose-your-own-adventure") comic book stories, called Comic-BEE, can be used to teach middle school students about cybersecurity. BIGSCE is potentially transformative, informing the development of new approaches to teaching and learning cybersecurity: branching graphic stories can incorporate culturally relevant pedagogy, and therefore have the potential to reach a broader and more diverse body of students.

group_project

Visible to the public EDU: Collaborative: Branching Interactive Graphic Stories for Cybersecurity Education

The purpose of the Branching Interactive Graphic Stories for Cybersecurity Education (BIGSCE) project is to determine how a technology for creating branching ("choose-your-own-adventure") comic book stories, called Comic-BEE, can be used to teach middle school students about cybersecurity. BIGSCE is potentially transformative, informing the development of new approaches to teaching and learning cybersecurity: branching graphic stories can incorporate culturally relevant pedagogy, and therefore have the potential to reach a broader and more diverse body of students.

group_project

Visible to the public TWC: Large: Collaborative: Computing Over Distributed Sensitive Data

Information about individuals is collected by a variety of organizations including government agencies, banks, hospitals, research institutions, and private companies. In many cases, sharing this data among organizations can bring benefits in social, scientific, business, and security domains, as the collected information is of similar nature, of about similar populations. However, much of this collected data is sensitive as it contains personal information, or information that could damage an organization's reputation or competitiveness.

group_project

Visible to the public CAREER: The Value of Privacy

This project takes a new approach to problems involving sensitive data, by focusing on rigorous mathematical modeling and characterization of the value of private information. By focusing on quantifying the loss incurred by affected individuals when their information is used -- and quantifying the attendant benefits of such use -- the approaches advanced by this work enable concrete reasoning about the relative risks and rewards of a wide variety of potential computations on sensitive data.

group_project

Visible to the public EAGER: Understanding Cybersecurity Needs and Gaps at the Local Level

This project investigates the degree to which businesses at a local level are dependent on computers and the Internet for daily operations. Of those that are, the project investigates the degree to which they implement good or bad cybersecurity practices with an particular emphasis on very small businesses. Understanding their needs helps fill a knowledge gap within the cybersecurity industry and has local as well as national security and economic implications.

group_project

Visible to the public TWC SBE: Small: Identifying Malicious Insiders through Mouse Cursor Movements

The threat of malicious insiders is a top concern for governmental agencies and corporations. In general, malicious insiders are typically disgruntled employees who encounter a negative experience, or stressor, as a triggering event. Criminology research has long associated certain stressors with malicious behavior. Recent neuroscience and cognitive psychology research has unequivocally demonstrated that linkages exist between cognitive processing (e.g., cognitive conflict, emotion, arousal, etc.) and hand movements.

group_project

Visible to the public SBE: Small: Collaborative: Modeling Insider Threat Behavior in Financial Institutions: Large Scale Data Analysis

Insiders pose substantial threats to an organization, regardless of whether they act intentionally or accidentally. Because they usually possess elevated privileges and have skills, knowledge, resources, access and motives regarding internal systems and data, insiders can easily circumvent security countermeasures, steal valuable data, and cause damage. Perimeter and host-based countermeasures like firewalls, intrusion detection systems, and antivirus software are ineffective in preventing and detecting insider threats.

group_project

Visible to the public EAGER: Collaborative: Mapping Privacy and Surveillance Dynamics in Emerging Mobile Ecosystems: Practices and Contexts in the Netherlands and US

The increasing ubiquity of mobile technologies creates unique privacy and surveillance challenges for users. These problems are global, but the way users, organizations, and governments approach these challenges varies based on cultural norms around privacy. This cross-cultural project evaluates how mobile users in the U.S. and the Netherlands think about and make decisions about their privacy when using mobile apps.

group_project

Visible to the public SBE: Small: Cybersecurity risks of dynamic, two-way distributed electricity markets

The U.S. electric grid is being transformed from a one-way channel delivering electricity from central power plants to customers at set prices, toward a distributed grid with two-way flows of information and electricity and dynamic distributed markets. The benefits of creating distributed markets for electricity are potentially great. Consumers can participate as buyers and sellers in these markets, utilities can reduce costly peak electricity load and risk of outages, and firms can be rewarded for innovation.