Social, behavioral and economic science
group_project
Submitted by Kevin Steinmetz on Tue, 11/21/2017 - 5:37am
One of the most serious threats in the world today to the security of cyberspace is "social engineering" - the process by which people with access to critical information regarding information systems security are tricked or manipulated into surrendering such information to unauthorized persons, thereby allowing them access to otherwise secure systems. To date, little systematic research has been conducted on social engineering.
group_project
Submitted by Laurin Buchanan on Mon, 11/20/2017 - 3:51pm
The purpose of the Branching Interactive Graphic Stories for Cybersecurity Education (BIGSCE) project is to determine how a technology for creating branching ("choose-your-own-adventure") comic book stories, called Comic-BEE, can be used to teach middle school students about cybersecurity. BIGSCE is potentially transformative, informing the development of new approaches to teaching and learning cybersecurity: branching graphic stories can incorporate culturally relevant pedagogy, and therefore have the potential to reach a broader and more diverse body of students.
group_project
Submitted by Lori Scarlatos on Mon, 11/20/2017 - 6:00am
The purpose of the Branching Interactive Graphic Stories for Cybersecurity Education (BIGSCE) project is to determine how a technology for creating branching ("choose-your-own-adventure") comic book stories, called Comic-BEE, can be used to teach middle school students about cybersecurity. BIGSCE is potentially transformative, informing the development of new approaches to teaching and learning cybersecurity: branching graphic stories can incorporate culturally relevant pedagogy, and therefore have the potential to reach a broader and more diverse body of students.
group_project
Submitted by Marco Gaboardi on Mon, 11/20/2017 - 5:47am
Information about individuals is collected by a variety of organizations including government agencies, banks, hospitals, research institutions, and private companies. In many cases, sharing this data among organizations can bring benefits in social, scientific, business, and security domains, as the collected information is of similar nature, of about similar populations. However, much of this collected data is sensitive as it contains personal information, or information that could damage an organization's reputation or competitiveness.
group_project
Submitted by Katrina Ligett on Mon, 11/20/2017 - 5:37am
This project takes a new approach to problems involving sensitive data, by focusing on rigorous mathematical modeling and characterization of the value of private information. By focusing on quantifying the loss incurred by affected individuals when their information is used -- and quantifying the attendant benefits of such use -- the approaches advanced by this work enable concrete reasoning about the relative risks and rewards of a wide variety of potential computations on sensitive data.
group_project
Submitted by Mario Caire on Tue, 11/14/2017 - 11:50am
This project investigates the degree to which businesses at a local level are dependent on computers and the Internet for daily operations. Of those that are, the project investigates the degree to which they implement good or bad cybersecurity practices with an particular emphasis on very small businesses. Understanding their needs helps fill a knowledge gap within the cybersecurity industry and has local as well as national security and economic implications.
group_project
Submitted by Joseph Valacich on Tue, 11/14/2017 - 11:33am
The threat of malicious insiders is a top concern for governmental agencies and corporations. In general, malicious insiders are typically disgruntled employees who encounter a negative experience, or stressor, as a triggering event. Criminology research has long associated certain stressors with malicious behavior. Recent neuroscience and cognitive psychology research has unequivocally demonstrated that linkages exist between cognitive processing (e.g., cognitive conflict, emotion, arousal, etc.) and hand movements.
group_project
Submitted by Jingguo Wang on Tue, 11/14/2017 - 10:49am
Insiders pose substantial threats to an organization, regardless of whether they act intentionally or accidentally. Because they usually possess elevated privileges and have skills, knowledge, resources, access and motives regarding internal systems and data, insiders can easily circumvent security countermeasures, steal valuable data, and cause damage. Perimeter and host-based countermeasures like firewalls, intrusion detection systems, and antivirus software are ineffective in preventing and detecting insider threats.
group_project
Submitted by Jessica Vitak on Tue, 11/14/2017 - 9:49am
The increasing ubiquity of mobile technologies creates unique privacy and surveillance challenges for users. These problems are global, but the way users, organizations, and governments approach these challenges varies based on cultural norms around privacy. This cross-cultural project evaluates how mobile users in the U.S. and the Netherlands think about and make decisions about their privacy when using mobile apps.
group_project
Submitted by Jason Dedrick on Mon, 11/13/2017 - 3:48pm
The U.S. electric grid is being transformed from a one-way channel delivering electricity from central power plants to customers at set prices, toward a distributed grid with two-way flows of information and electricity and dynamic distributed markets. The benefits of creating distributed markets for electricity are potentially great. Consumers can participate as buyers and sellers in these markets, utilities can reduce costly peak electricity load and risk of outages, and firms can be rewarded for innovation.