Division of Social and Economic Sciences (SES)

group_project

Visible to the public  WORKSHOP: PRIVACY IN AN ERA OF BIG DATA-Temple University; May 20-21, 2015

Big Data has sparked great interest in practice. Public and private sector organizations of all kinds are making huge investments in Big Data in the well-justified belief that innovations in data analytics can bring enormous benefits in such areas as public health and safety, economic competitiveness and consumer welfare. However, a key aspect of the debate on Big Data is the potential for privacy breach by corporations, malicious individuals, and governments.

group_project

Visible to the public  EAGER: Data Privacy for Smart Meter Data: A Scenario-Based Study

Smart electric meters comprise one key technology element in an overall strategy to modernize the nation's energy infrastructure. Smart meters capture data on household energy usage at frequent intervals and transmit those data to utility companies, who use the data to automate meter reading and billing, detect and respond to outages, and manage grid operations. Data collected over time can be used to forecast demand, understand customer behavior and develop new service and pricing plans.

group_project

Visible to the public SBE: Small: Collaborative: Improving Security Behavior of Employees in Cyberspace through Evidence-based Malware Reports and E-Learning Materials

As the use of Web applications has increased, malicious content and cyber attacks are rapidly increasing in both their frequency and their sophistication. For unwary users and their organizations, social media sites such as Tumblr, Facebook, MySpace, Twitter, and LinkedIn pose a variety of serious security risks and threats. Recent studies show that social media sites are more in use for delivering malware than were previously popular methods of email delivery. Because of this, many organizations are looking for ways to implement effective security policies.

group_project

Visible to the public EAGER: Collaborative: Policies for Enhancing U.S. Leadership in Cyberspace

Cybersecurity is threatened by the zero-day exploits (software vulnerabilities that have not been previously disclosed and are therefore potential vectors for attack). The threat is serious for exploits in the hands of major cyber powers that are potentially hostile nations. Publication of a zero-day exploits can enhance the resilience of domestic cyber-infrastructure (if an adversary has discovered the same exploit), and it could give other countries the opportunity to patch their systems proactively, increasing confidence that they will not be penetrated.

group_project

Visible to the public EAGER: Exploring Trade-offs in Cyber Offense and Defense Through the Lenses of Computer and Political Science

This project examines the trade-offs governments face between engaging in cyber offense and defense. Governments may exploit a somewhat less secure Internet to gain intelligence and strategic advantage. But a more secure Internet encourages more participation online and reduces citizens' exposure to cybercrime. Thus governments face a difficult dilemma: Should they forego potentially useful cyber operations and work on strengthening the Internet in order to provide a global good?

group_project

Visible to the public EAGER: Consumer Response to Security Incidences and Data Breach Notification

Despite intense media attention on data breaches and identity thefts, very little is known about how users respond to adverse security events. Effective security policy making and firm response critically depends on how users respond when the firm holding their data is breached. Many argue that users may not pay adequate attention to security events or data breaches. They may ignore firms' breach notifications, especially if they receive many such notifications or when the notices are not specific enough. Even when users respond, it may be nuanced and subtle and not readily measured.

group_project

Visible to the public EAGER: Collaborative Research: Towards Understanding Smartphone User Privacy: Implication, Derivation, and Protection

This project aims to address privacy concerns of smartphone users. In particular, it investigates how the usages of the smartphone applications (apps) may reshape users' privacy perceptions and what is the implication of such reshaping. There has been recent work that investigates privacy leakage and potential defense mechanisms. However, so far there is only limited understanding on the consequences of such privacy losses, especially when large amount of privacy information leaked from smartphone users across many apps.

group_project

Visible to the public TWC SBE: Option: Small: Building Public Cyber Health - Designing and Testing the Efficacy of a School-Focused, Gamification Approach to Create a Secure Computing Environment

As the frequency and complexity of cyber attacks increase, approaches to create secure computing environments must look beyond technical barriers that protect from the outside to building a collaborative culture of cyber health from the inside. Use of online incentives have been shown to be an effective tool for enhancing an individual's engagement with a task.

group_project

Visible to the public SBE: Small: An Analysis of the Relationship Between Cyberaggression and Self-Disclosure among Diverse Youths

Youths of the digital age live parallel lives online and in the real world, frequently disclosing personal information to cyberfriends and strangers, regardless of race, class or gender. Race and gender do make a difference, however, when these online disclosures lead to acts of cyberaggression. The PIs' previous work revealed that some youths are resistant to cyberaggression and that there are differences in perceptions of cyberbullying among youths from different cultural and racial backgrounds.

group_project

Visible to the public EAGER: Integrating Cognitive and Computer Science to Improve Cyber Security: Selective Attention and Personality Traits for the Detection and Prevention of Risk

Increasingly, there is a need for better understanding of behavioral and cognitive factors in cyber security. This project is a novel collaboration between computer science cyber security researchers and a cognitive science researcher to generate data on the links between personality traits and cyber security. The broad theoretical premise of the proposed research is that there are particular cognitive preferences and related personality factors that can be assessed in real time, real world scenarios and these may be associated with individual user's secure/insecure cyber behavior.