Division of Social and Economic Sciences (SES)
group_project
Submitted by Vivek Singh on Wed, 08/07/2019 - 11:01am
Prevalence of poor-quality information in cyberspaces poses threats to civic society. To increase information quality, multiple automated algorithms for undertaking quality assessment of online information have been proposed. However, the fairness and performance of these algorithms across political and policy opinions has been challenged, undermining trust in such systems.
group_project
Submitted by Lina Zhou on Tue, 08/06/2019 - 11:43am
Online attacks can cause not only temporary asset loss, but long-term psychological or emotional harm to victims as well. The richness and large scale of online communication data open up new opportunities for detecting online attacks. However, attackers are motivated to constantly adapt their behaviors to changes in security operations to evade detection. Deception underlies most attacks in online communication, and people are poor at detecting deception.
group_project
Submitted by dmaimon on Tue, 08/06/2019 - 11:16am
Most of the world's internet access occurs through mobile devices such as smart phones and tablets. While these devices are convenient, they also enable crimes that intersect the physical world and cyberspace. For example, a thief who steals a smartphone can gain access to a person?s sensitive email, or someone using a banking app on the train may reveal account numbers to someone looking over her shoulder. This research will study how, when, and where people use smartphones and the relationship between these usage patterns and the likelihood of being a victim of cybercrime.
group_project
Submitted by Ritwik Banerjee on Mon, 03/18/2019 - 12:08pm
Changes in the meaning of information as it passes through cyberspace can mislead those who access the information. This project will develop a new dataset and algorithms to identify and categorize medical information that remains true to the original meaning or undergoes distortion. Instead of imposing an external true/false label on this information, this project looks into a series of changes within the news coverage itself that gradually lead to a deviation from the original medical claims.
group_project
Submitted by Helen Nissenbaum on Thu, 03/14/2019 - 10:24am
One of the crucial ideas behind Privacy by Design (PbD) is that privacy should be taken into consideration in the process of design, not merely after-the-fact, as so often happens. Yet, this ideal has failed to gain widespread practical traction, challenged, in part, by the lack of developed methodologies and also because of privacy's conceptual complexity, which hampers its operationalization.
group_project
Submitted by April Edwards on Wed, 03/06/2019 - 11:04am
Youths of the digital age live parallel lives online and in the real world, frequently disclosing personal information to cyberfriends and strangers, regardless of race, class or gender. Race and gender do make a difference, however, when these online disclosures lead to acts of cyberaggression. The PIs' previous work revealed that some youths are resistant to cyberaggression and that there are differences in perceptions of cyberbullying among youths from different cultural and racial backgrounds.
group_project
Submitted by Raghav Rao on Mon, 04/30/2018 - 11:33am
According to recent reports in the press, the Office of Personnel Management (OPM) was hit hard in two recent cyber-attacks (OPM 2015). In April 2015, OPM discovered that personal data (e.g., Social Security Numbers, full name, and birth date) of 4.2 million current and former Federal government employees had been stolen (referred to as personnel records incident hereafter).
group_project
Submitted by Raghav Rao on Mon, 04/30/2018 - 11:33am
According to recent reports in the press, the Office of Personnel Management (OPM) was hit hard in two recent cyber-attacks (OPM 2015). In April 2015, OPM discovered that personal data (e.g., Social Security Numbers, full name, and birth date) of 4.2 million current and former Federal government employees had been stolen (referred to as personnel records incident hereafter).
group_project
Submitted by Michael Orosz on Mon, 02/26/2018 - 1:38pm
Cyber security is increasingly seen as the management of economic trade-offs: balancing losses from actual attacks (e.g., monetary costs, psychological costs due to loss of privacy, etc.) against the costs of threat/attack mitigation mechanisms (e.g., monetary costs, degradation of performance and productivity, etc.). While tackling this multi-attribute decision problem in a highly dynamic and uncertain environment, individuals frequently diverge from rationality.
group_project
Submitted by Keith James on Wed, 02/14/2018 - 5:31pm
Organizations in the U.S. and Canada collaborate extensively in collecting and sharing various types of cyberdata for purposes of border security, environmental management, economic production, health protection, and other shared goals. Organizations of all major types--governmental, private-sector, and non-profit (or NGO)--have responsibilities that involve major coordination with cross-border network partners. Recent revelations about privacy breaches have led to concerns on both sides of the border about cyberdata privacy and security.