Division of Social and Economic Sciences (SES)
group_project
Submitted by Paul Pavlou on Tue, 01/02/2018 - 5:05pm
Big Data has sparked great interest in practice. Public and private sector organizations of all kinds are making huge investments in Big Data in the well-justified belief that innovations in data analytics can bring enormous benefits in such areas as public health and safety, economic competitiveness and consumer welfare. However, a key aspect of the debate on Big Data is the potential for privacy breach by corporations, malicious individuals, and governments.
group_project
Submitted by Jason Dedrick on Tue, 01/02/2018 - 4:58pm
Smart electric meters comprise one key technology element in an overall strategy to modernize the nation's energy infrastructure. Smart meters capture data on household energy usage at frequent intervals and transmit those data to utility companies, who use the data to automate meter reading and billing, detect and respond to outages, and manage grid operations. Data collected over time can be used to forecast demand, understand customer behavior and develop new service and pricing plans.
group_project
Submitted by Mohd Anwar on Tue, 01/02/2018 - 4:57pm
As the use of Web applications has increased, malicious content and cyber attacks are rapidly increasing in both their frequency and their sophistication. For unwary users and their organizations, social media sites such as Tumblr, Facebook, MySpace, Twitter, and LinkedIn pose a variety of serious security risks and threats. Recent studies show that social media sites are more in use for delivering malware than were previously popular methods of email delivery. Because of this, many organizations are looking for ways to implement effective security policies.
group_project
Submitted by Stephanie Forrest on Tue, 01/02/2018 - 4:45pm
Cybersecurity is threatened by the zero-day exploits (software vulnerabilities that have not been previously disclosed and are therefore potential vectors for attack). The threat is serious for exploits in the hands of major cyber powers that are potentially hostile nations. Publication of a zero-day exploits can enhance the resilience of domestic cyber-infrastructure (if an adversary has discovered the same exploit), and it could give other countries the opportunity to patch their systems proactively, increasing confidence that they will not be penetrated.
group_project
Submitted by Joshua Rovner on Tue, 01/02/2018 - 4:42pm
This project examines the trade-offs governments face between engaging in cyber offense and defense. Governments may exploit a somewhat less secure Internet to gain intelligence and strategic advantage. But a more secure Internet encourages more participation online and reduces citizens' exposure to cybercrime. Thus governments face a difficult dilemma: Should they forego potentially useful cyber operations and work on strengthening the Internet in order to provide a global good?
group_project
Submitted by Telang Rahul on Tue, 01/02/2018 - 3:57pm
Despite intense media attention on data breaches and identity thefts, very little is known about how users respond to adverse security events. Effective security policy making and firm response critically depends on how users respond when the firm holding their data is breached. Many argue that users may not pay adequate attention to security events or data breaches. They may ignore firms' breach notifications, especially if they receive many such notifications or when the notices are not specific enough. Even when users respond, it may be nuanced and subtle and not readily measured.
group_project
Submitted by Jerry Cheng on Tue, 01/02/2018 - 3:50pm
This project aims to address privacy concerns of smartphone users. In particular, it investigates how the usages of the smartphone applications (apps) may reshape users' privacy perceptions and what is the implication of such reshaping. There has been recent work that investigates privacy leakage and potential defense mechanisms. However, so far there is only limited understanding on the consequences of such privacy losses, especially when large amount of privacy information leaked from smartphone users across many apps.
group_project
Submitted by Noel Greis on Tue, 01/02/2018 - 12:53pm
As the frequency and complexity of cyber attacks increase, approaches to create secure computing environments must look beyond technical barriers that protect from the outside to building a collaborative culture of cyber health from the inside. Use of online incentives have been shown to be an effective tool for enhancing an individual's engagement with a task.
group_project
Submitted by April Edwards on Tue, 12/19/2017 - 11:07am
Youths of the digital age live parallel lives online and in the real world, frequently disclosing personal information to cyberfriends and strangers, regardless of race, class or gender. Race and gender do make a difference, however, when these online disclosures lead to acts of cyberaggression. The PIs' previous work revealed that some youths are resistant to cyberaggression and that there are differences in perceptions of cyberbullying among youths from different cultural and racial backgrounds.
group_project
Submitted by ahmirf44 on Mon, 12/18/2017 - 4:55pm
Increasingly, there is a need for better understanding of behavioral and cognitive factors in cyber security. This project is a novel collaboration between computer science cyber security researchers and a cognitive science researcher to generate data on the links between personality traits and cyber security. The broad theoretical premise of the proposed research is that there are particular cognitive preferences and related personality factors that can be assessed in real time, real world scenarios and these may be associated with individual user's secure/insecure cyber behavior.