Division of Social and Economic Sciences (SES)
group_project
Submitted by kshilton on Tue, 12/05/2017 - 10:31pm
Citizen science is a form of collaboration where members of the public participate in scientific research. Citizen science is increasingly facilitated by a variety of wireless, cellular and satellite technologies. Data collected and shared using these technologies may threaten the privacy of volunteers. This project will discover factors which lead to, or allieviate, privacy concerns for citizen science volunteers.
group_project
Submitted by Raghav Rao on Sat, 12/02/2017 - 8:41pm
group_project
Submitted by Milton Mueller on Sat, 12/02/2017 - 6:32pm
Existing research on Internet routing security concentrates on technical solutions (new standards and protocols). This project is based on the premise that organizational and institutional factors - known as governance structures in institutional economics - are as important to Internet routing security as technological design. Internet routing involves decentralized decision making among tens of thousands of autonomous network operators.
group_project
Submitted by Kirsten Martin on Tue, 11/21/2017 - 6:55am
This project closely examines data aggregation to understand what types of aggregation are normatively and descriptively important to individuals and how do different types and degree of aggregation impact individual trust. This proposed research would advance knowledge and understanding within the study of big data, trust, and business ethics. Initial investigations into data aggregation have been technical to ensure accuracy and diminish unwanted bias.
group_project
Submitted by Kevin Steinmetz on Tue, 11/21/2017 - 6:37am
One of the most serious threats in the world today to the security of cyberspace is "social engineering" - the process by which people with access to critical information regarding information systems security are tricked or manipulated into surrendering such information to unauthorized persons, thereby allowing them access to otherwise secure systems. To date, little systematic research has been conducted on social engineering.
group_project
Submitted by Lina Zhou on Mon, 11/20/2017 - 4:31pm
Online attacks can cause not only temporary asset loss, but long-term psychological or emotional harm to victims as well. The richness and large scale of online communication data open up new opportunities for detecting online attacks. However, attackers are motivated to constantly adapt their behaviors to changes in security operations to evade detection. Deception underlies most attacks in online communication, and people are poor at detecting deception.
group_project
Submitted by Joseph Valacich on Tue, 11/14/2017 - 12:33pm
The threat of malicious insiders is a top concern for governmental agencies and corporations. In general, malicious insiders are typically disgruntled employees who encounter a negative experience, or stressor, as a triggering event. Criminology research has long associated certain stressors with malicious behavior. Recent neuroscience and cognitive psychology research has unequivocally demonstrated that linkages exist between cognitive processing (e.g., cognitive conflict, emotion, arousal, etc.) and hand movements.
group_project
Submitted by Julie Downs on Tue, 11/14/2017 - 12:30pm
The project will use interviews to guide development of new web tools that parents and teens can use to improve communication about the risks of using the web and social media, and to help teens engage in online behaviors that are less risky. The researchers will create simple prototypes of these new tools, pilot testing them to improve them and refine their features by allowing teens and parents to role play using the tools. This research addresses the under-explored area of how parents and teens negotiate and make decisions about teens?
group_project
Submitted by Jingguo Wang on Tue, 11/14/2017 - 11:49am
Insiders pose substantial threats to an organization, regardless of whether they act intentionally or accidentally. Because they usually possess elevated privileges and have skills, knowledge, resources, access and motives regarding internal systems and data, insiders can easily circumvent security countermeasures, steal valuable data, and cause damage. Perimeter and host-based countermeasures like firewalls, intrusion detection systems, and antivirus software are ineffective in preventing and detecting insider threats.
group_project
Submitted by Jeffrey Hancock on Tue, 11/14/2017 - 10:38am
Human beings have evolved to detect and react to threats in their physical environment, and have developed perceptual systems selected to assess these physical stimuli for current, material risks. In cyberspace, the same stimuli are often absent, subdued, or deliberately manipulated by malicious third parties. Hence, security and privacy concerns that would normally be activated in the offline world may remain muted, and defense behaviors may be hampered.