Human Aspects

group_project

Visible to the public CAREER: Secure and Trustworthy Ocular Biometrics

The need for accurate and unforgeable identity recognition techniques has become an issue of increasing urgency. Biometric approaches such as iris recognition hold huge promise but still have significant limitations, including susceptibility to 'spoofing'. This project seeks to advance our knowledge of security and accuracy of multibiometric systems by inventing, evaluating, and applying innovative methods and tools to combine highly accurate static traits, such as iris patterns, with novel traits based on the dynamics of eye movements.

group_project

Visible to the public TC: Large: Collaborative Research: Practical Privacy: Metrics and Methods for Protecting Record-level and Relational Data

Safely managing the release of data containing confidential information about individuals is a problem of great societal importance. Governments, institutions, and researchers collect data whose release can have enormous benefits to society by influencing public policy or advancing scientific knowledge. But dissemination of these data can only happen if the privacy of the respondents' data is preserved or if the amount of disclosure is limited.

group_project

Visible to the public EAGER: Exploring Heuristics and Designing Interface Cues to Understand Revealing or Withholding of Private Information

In individual pursuits of personalized service and other functionalities, people disclose personal and private information by trusting certain online sites and services. Scholars often assume that such trust is based on a careful assessment of the benefits and risks of disclosing information online. This project departs from such an assumption and investigates the possibility that decision-making about online information disclosure is not systematic, but rather based on cognitive heuristics (or mental shortcuts) triggered by cues in the interaction context.

group_project

Visible to the public EAGER: Privacy in Citizen Science: An Emerging Concern for Research and Practice

Citizen science is a form of collaboration where members of the public participate in scientific research. Citizen science is increasingly facilitated by a variety of wireless, cellular and satellite technologies. Data collected and shared using these technologies may threaten the privacy of volunteers. This project will discover factors which lead to, or allieviate, privacy concerns for citizen science volunteers.

group_project

Visible to the public EAGER: Cybercrime Susceptibility in the Sociotechnical System: Exploration of Integrated Micro- and Macro-Level Sociotechnical Models of Cybersecurity

This project develops a holistic approach to sociotechnical system security that combines innovations in both criminology and engineering/computer science. We design unified sociotechnical security models that capture how sociotechnical intrusions against social as well as technical aspects of the system (i.e., modeled as hidden sequences of system security states) result in observed hard data such as security sensor alerts and soft data produced by human/social sensors such as reports about slow machines.

group_project

Visible to the public TWC: Small: Collaborative: Cracking Down Online Deception Ecosystems

Used by hundreds of millions of people every day, online services are central to everyday life. Their popularity and impact make them targets of public opinion skewing attacks, in which those with malicious intent manipulate the image of businesses, mobile applications and products. Website owners often turn to crowdsourcing sites to hire an army of professional fraudsters to paint a fake flattering image for mediocre subjects or trick people into downloading malicious software.

group_project

Visible to the public EAGER: Automated Content-Based Detection of Public Online Harrassment

Public, online harassment takes many forms, but at its core are posts that are offensive, threatening, and intimidating. It is not an isolated problem. The Pew Research Center found 73% of people had witnessed harassment online, and a full 40% of people had experienced harassment directly. This research develops a method for analyzing the things people post online, and automatically detecting which posts fall into the category of severe public online harassment -- messages posted simply to disrupt, offend, or threaten others.

group_project

Visible to the public Identifying Research Approaches, Technologies, Options, and Tradeoffs for Encrypted Communications Access

This National Academies study examines the tradeoffs associated with mechanisms to provide authorized government agencies with access to the plaintext version of encrypted information. The study describes the context in which decisions about such mechanisms would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information sought by the government for law enforcement or intelligence investigations.

group_project

Visible to the public ETHICS OF DATA AGGREGATION: PRIVACY, TRUST, AND FAIRNESS

This project closely examines data aggregation to understand what types of aggregation are normatively and descriptively important to individuals and how do different types and degree of aggregation impact individual trust. This proposed research would advance knowledge and understanding within the study of big data, trust, and business ethics. Initial investigations into data aggregation have been technical to ensure accuracy and diminish unwanted bias.

group_project

Visible to the public TWC: Medium: Collaborative: Studying Journalists to Identify Requirements for Usable, Secure, and Trustworthy Communication

This research focuses on understanding the digital security and privacy needs of journalists and their sources to evaluate and design communication technologies that better support the fundamental operations of a globally free and unfettered press. Journalists -- along with their organizations and sources -- are known to be high-risk targets for cyberattack. This community can serve as a privacy and security bellwether, motivated to use new technologies, but requiring flexibility and ease-of-use. Many existing secure tools are too cumbersome for journalists to use on a regular basis.