Talk for the Cylab Partners Conference on Sept. 23, 2020. (1) Unintentional insider threat (UIT) can arise because security tools or infrastructure does not account for social needs.
(2) Social influences can be used to motivate security behaviors.
Our research focuses on understanding how attitudes and social influences act on end users in the process of cybersecurity behavior adoption (or non-adoption). This talk discusses three expectancy-value models and two stage models that have been applied successfully in social psychology, marketing, and public health. We first introduce our project, then give an overview of these existing models. We then present the progress of our empirical mixed-methods research to craft a model specific to cybersecurity adoption that identifies the relevant (1) attitudes and (2) social influences acting at each step, along with (3) tech characteristics that are associated with sustained adoption. We conclude with remarks on how our work can be of use to cybersecurity teams tasked with boosting awareness and/or adoption.
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagementAnsgar Koene
Presentation outlining the stakeholder engagement activities of the UnBias project, including case study driven debate with participants at the Winchester TRILcon conference on May 3rd 2017
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
Bayesian theory and association rule mining methods are artificial intelligence techniques that have been used in various computing fields, especially in machine learning. Internet has been considered as an easy ground for vices like radicalization because of its diverse nature and ease of information access. These vices could be managed using recommender systems methods which are used to deliver users’ preference data based on their previous interests and in relation with the community around the user. The recommender systems are divided into two broad categories, i.e. collaborative systems which considers users which share the same preferences as the user in question and content-based recommender systems tends to recommend websites similar to those already liked by the user. Recent research and information from security organs indicate that, online radicalization has been growing at an alarming rate. The paper reviews in depth what has been carried out in recommender systems and looks at how these methods could be combined to from a strong system to monitor and manage online menace as a result of radicalization. The relationship between different websites and the trend from continuous access of these websites forms the basis for probabilistic reasoning in understanding the users’ behavior. Association rule mining method has been widely used in recommender systems in profiling and generating users’ preferences. To add probabilistic reasoning considering internet magnitude and more so in social media, Bayesian theory is incorporated. Combination of this two techniques provides better analysis of the results thereby adding reliability and knowledge to the results.
Many experts say the rise of embedded and wearable computing will bring the next revolution in digital technology. They say the upsides are enhanced health, convenience, productivity, safety, and more useful information for people/organizations. At KMWorld Confererence, Lee Rainie shares the latest findings from Pew Research about the internet and puts it into organizational context with the expanding Internet of Things.
Our research focuses on understanding how attitudes and social influences act on end users in the process of cybersecurity behavior adoption (or non-adoption). This talk discusses three expectancy-value models and two stage models that have been applied successfully in social psychology, marketing, and public health. We first introduce our project, then give an overview of these existing models. We then present the progress of our empirical mixed-methods research to craft a model specific to cybersecurity adoption that identifies the relevant (1) attitudes and (2) social influences acting at each step, along with (3) tech characteristics that are associated with sustained adoption. We conclude with remarks on how our work can be of use to cybersecurity teams tasked with boosting awareness and/or adoption.
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagementAnsgar Koene
Presentation outlining the stakeholder engagement activities of the UnBias project, including case study driven debate with participants at the Winchester TRILcon conference on May 3rd 2017
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
Bayesian theory and association rule mining methods are artificial intelligence techniques that have been used in various computing fields, especially in machine learning. Internet has been considered as an easy ground for vices like radicalization because of its diverse nature and ease of information access. These vices could be managed using recommender systems methods which are used to deliver users’ preference data based on their previous interests and in relation with the community around the user. The recommender systems are divided into two broad categories, i.e. collaborative systems which considers users which share the same preferences as the user in question and content-based recommender systems tends to recommend websites similar to those already liked by the user. Recent research and information from security organs indicate that, online radicalization has been growing at an alarming rate. The paper reviews in depth what has been carried out in recommender systems and looks at how these methods could be combined to from a strong system to monitor and manage online menace as a result of radicalization. The relationship between different websites and the trend from continuous access of these websites forms the basis for probabilistic reasoning in understanding the users’ behavior. Association rule mining method has been widely used in recommender systems in profiling and generating users’ preferences. To add probabilistic reasoning considering internet magnitude and more so in social media, Bayesian theory is incorporated. Combination of this two techniques provides better analysis of the results thereby adding reliability and knowledge to the results.
Many experts say the rise of embedded and wearable computing will bring the next revolution in digital technology. They say the upsides are enhanced health, convenience, productivity, safety, and more useful information for people/organizations. At KMWorld Confererence, Lee Rainie shares the latest findings from Pew Research about the internet and puts it into organizational context with the expanding Internet of Things.
A survey of nearly 900 Internet stakeholders reveals fascinating new perspectives on the way the Internet is affecting human intelligence and the ways that information is being shared and rendered.
Presentation outlining the UnBias project, an EPSRC funded project about transparency of biases in algorithm behaviour, often due to unavoidable implicit choices that had to be made.
This presentation was given at the DASTS16 conference in Aarhus Denmark on June 3rd 2016.
Young people's policy recommendations on algorithm fairness web sci17Ansgar Koene
Conference presentation at the WebScience 2017 conference, June 26-28th 2017, Troy, NY, USA. This presentation summarizes the methodology and some preliminary results of the UnBias project Youth Juries activities, exploring young people's experiences, concerns and recommendations related to algorithms that mediate access to online information.
Public Cloud is Not Always the Answer... but Sometimes it isAxway
IDG Event: The Future of IT | August 6, 2019 | Boston, MA
In today’s digital world, protecting unstructured data where users need on-demand access to files for sharing and collaboration is top of mind for IT and Security executives. Fifty-two percent of IT executives say their organization is concerned about storing their unstructured data in the public cloud. Why is that? Join our session and get answers to that question and get even more insight into what leading IT Leaders are thinking when it comes to balancing the needs of their users and keeping their data safe. We’ll be sharing insights and findings from research we conducted with Vanson Bourne and Ponemon Institute across 2000 IT Leaders. The research focused on security and how to protect unstructured data in a digital world where security breaches continue to happen and where privacy laws and legislation are evolving quickly, including the amendments to the Massachusetts Data Breach Notification law enacted earlier this year. Find out what is top of mind from IT leaders across Healthcare, Financial Services, Manufacturing and Government and we’ll share some insights from our customers on how they’ve handled these challenges.
This is a presentation Bill gave at the May 2009 NAISG meeting on the security dangers of such social networking entities as Facebook, LinkedIn and Twitter.
Social Media have become a integral part of human life. With over 1 billion users connected through online network. Social media is an online platform where we can share our information like text, photos, thoughts, videos, messages and many people have started to share seminar, workshop in Education domain and online survey, marketing, and targeting customers in Business domain. There are various social media platforms like Facebook, Twitter, WhatsApp, Instagram etc. The main purpose of these sites is to allow people to share activities, interests, real life connections. Using social media we can communicate with the people in a world in a powerful and fun way. While enjoying on the social media platform it requires a great knowledge of privacy and security. The Internet is the safe place for only those people who are aware about the risk and the security, and can protect themselves from any fraud. Social media is a sometimes good because it allows you to share what actually we want to share, but it can also be used for negative purpose and in both the cases we are responsible for our security. In this paper we will describe about the privacy and security issues associated with social media. Rachana Khandagale | Manali Gamre "Privacy and Security on Social Media" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43821.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/43821/privacy-and-security-on-social-media/rachana-khandagale
Crowdsourcing & ethics: a few thoughts and refences. Matthew Lease
Extracts and addendums from an earlier talk, for those interested in ethics and related issues in regard to crowdsourcing, particularly research uses. Slides updated Sept. 2, 2013.
This presentation discusses Ethics considerations for Corpus Linguistics studies using internet resources. The talk was given at the Corpus Linguistics 2015 conference at Lancaster, UK (July 21-24, 2015).
In this talk for Cybersecurity Days at Ohio State University, I first discuss the urgent need for new solutions in the human side of cybersecurity, shown by the doubled increase in social attacks from 2013 to 2018 in the most recent Verizon data breach investigations report. I draw an analogy between health/wellness and cybersecurity, using the example of messaging around flu shots this time of year to point out individual and social factors that experts can leverage for awareness and behavior change. I then discuss our research at Carnegie Mellon to develop the SA-6 psychometric scale to measure security attitude and give examples of how to use it. I finish by outlining our research into cybersecurity in the workplace, in romantic relationships, and in the context of general social influence using consumer tools and apps. See our website at https://socialcybersecurity.org for more information about our research.
Understanding Users' Privacy Motivations and Behaviors in Online SpacesJessica Vitak
I’ve spent my career so far studying the social outcomes people derive from their use of new communication systems like Facebook. These sites contain numerous affordances that differentiate them from other forms of communication & create low-cost environments for things like relationship maintenance and exchange of resources. I have found this research to be extremely rewarding, as it is important to understand how these social systems extend our capabilities for human interaction, beyond the more traditional forms of communication we have relied on previously.
But, there's a flip side to this story. Humans, by nature, are very social beings and want to interact, want to disclose information and share it with others. Social network sites and their like facilitate this through a variety of features. However, as individuals have moved their communication from offline spaces, where the interactions tend to be much more ephemeral and audiences are generally known, to online spaces, where the lines between public and private become much more blurred, I believe that thoughts of privacy of personal information are often lost in the novelty of the technologies. Now, as we begin to think about this issue more and more, I believe it’s time to step back and re-evaluate how we conceptualize our privacy in this highly networked world and to integrate that understanding into solutions that will help individuals become more savvy users of the technology.
A survey of nearly 900 Internet stakeholders reveals fascinating new perspectives on the way the Internet is affecting human intelligence and the ways that information is being shared and rendered.
Presentation outlining the UnBias project, an EPSRC funded project about transparency of biases in algorithm behaviour, often due to unavoidable implicit choices that had to be made.
This presentation was given at the DASTS16 conference in Aarhus Denmark on June 3rd 2016.
Young people's policy recommendations on algorithm fairness web sci17Ansgar Koene
Conference presentation at the WebScience 2017 conference, June 26-28th 2017, Troy, NY, USA. This presentation summarizes the methodology and some preliminary results of the UnBias project Youth Juries activities, exploring young people's experiences, concerns and recommendations related to algorithms that mediate access to online information.
Public Cloud is Not Always the Answer... but Sometimes it isAxway
IDG Event: The Future of IT | August 6, 2019 | Boston, MA
In today’s digital world, protecting unstructured data where users need on-demand access to files for sharing and collaboration is top of mind for IT and Security executives. Fifty-two percent of IT executives say their organization is concerned about storing their unstructured data in the public cloud. Why is that? Join our session and get answers to that question and get even more insight into what leading IT Leaders are thinking when it comes to balancing the needs of their users and keeping their data safe. We’ll be sharing insights and findings from research we conducted with Vanson Bourne and Ponemon Institute across 2000 IT Leaders. The research focused on security and how to protect unstructured data in a digital world where security breaches continue to happen and where privacy laws and legislation are evolving quickly, including the amendments to the Massachusetts Data Breach Notification law enacted earlier this year. Find out what is top of mind from IT leaders across Healthcare, Financial Services, Manufacturing and Government and we’ll share some insights from our customers on how they’ve handled these challenges.
This is a presentation Bill gave at the May 2009 NAISG meeting on the security dangers of such social networking entities as Facebook, LinkedIn and Twitter.
Social Media have become a integral part of human life. With over 1 billion users connected through online network. Social media is an online platform where we can share our information like text, photos, thoughts, videos, messages and many people have started to share seminar, workshop in Education domain and online survey, marketing, and targeting customers in Business domain. There are various social media platforms like Facebook, Twitter, WhatsApp, Instagram etc. The main purpose of these sites is to allow people to share activities, interests, real life connections. Using social media we can communicate with the people in a world in a powerful and fun way. While enjoying on the social media platform it requires a great knowledge of privacy and security. The Internet is the safe place for only those people who are aware about the risk and the security, and can protect themselves from any fraud. Social media is a sometimes good because it allows you to share what actually we want to share, but it can also be used for negative purpose and in both the cases we are responsible for our security. In this paper we will describe about the privacy and security issues associated with social media. Rachana Khandagale | Manali Gamre "Privacy and Security on Social Media" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43821.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/43821/privacy-and-security-on-social-media/rachana-khandagale
Crowdsourcing & ethics: a few thoughts and refences. Matthew Lease
Extracts and addendums from an earlier talk, for those interested in ethics and related issues in regard to crowdsourcing, particularly research uses. Slides updated Sept. 2, 2013.
This presentation discusses Ethics considerations for Corpus Linguistics studies using internet resources. The talk was given at the Corpus Linguistics 2015 conference at Lancaster, UK (July 21-24, 2015).
In this talk for Cybersecurity Days at Ohio State University, I first discuss the urgent need for new solutions in the human side of cybersecurity, shown by the doubled increase in social attacks from 2013 to 2018 in the most recent Verizon data breach investigations report. I draw an analogy between health/wellness and cybersecurity, using the example of messaging around flu shots this time of year to point out individual and social factors that experts can leverage for awareness and behavior change. I then discuss our research at Carnegie Mellon to develop the SA-6 psychometric scale to measure security attitude and give examples of how to use it. I finish by outlining our research into cybersecurity in the workplace, in romantic relationships, and in the context of general social influence using consumer tools and apps. See our website at https://socialcybersecurity.org for more information about our research.
Understanding Users' Privacy Motivations and Behaviors in Online SpacesJessica Vitak
I’ve spent my career so far studying the social outcomes people derive from their use of new communication systems like Facebook. These sites contain numerous affordances that differentiate them from other forms of communication & create low-cost environments for things like relationship maintenance and exchange of resources. I have found this research to be extremely rewarding, as it is important to understand how these social systems extend our capabilities for human interaction, beyond the more traditional forms of communication we have relied on previously.
But, there's a flip side to this story. Humans, by nature, are very social beings and want to interact, want to disclose information and share it with others. Social network sites and their like facilitate this through a variety of features. However, as individuals have moved their communication from offline spaces, where the interactions tend to be much more ephemeral and audiences are generally known, to online spaces, where the lines between public and private become much more blurred, I believe that thoughts of privacy of personal information are often lost in the novelty of the technologies. Now, as we begin to think about this issue more and more, I believe it’s time to step back and re-evaluate how we conceptualize our privacy in this highly networked world and to integrate that understanding into solutions that will help individuals become more savvy users of the technology.
“Social Networking Sites: A Surveillance Studies Primer”
In recognizing social networking sites as sites of sociological concern, this presentation will offer a surveillance studies perspective to this topic. Using Facebook as a case study, a review of key surveillance material as well as preliminary findings will underscore directions for future research. In particular, the popularized and controversial practice of 'Facebook stalking' will serve to illustrate how lateral (or peer-to-peer) surveillance not only supplements, but may also amplify conventional forms of monitoring.
Questions:
1) Can practices such as deception or dissimulation on social networking sites be regarded as ways of resisting surveillance?
2) What kind of connections does Facebook enable between peer-based forms of surveillance, and practices such as employee screening?
Respond to these two classmates’ posts. 1. After reading thi.docxdaynamckernon
Respond to these two classmates’ posts.
1. After reading this journal article regarding
ethics of internet research, I have discovered different viewpoints of research and determined some ethical concerns.
As this type of “web-based” research grows, researchers will face ethical concerns that are different from traditional research ethical issues, (Denissen, Neumann & Van Zalk, 2010)
The main attribute of internet research, as I see it, is the ability to have a global footprint; meaning almost any one that has a computer and connectivity can access all types of information and data. Along with this power, comes great responsibility. The web can be a wonderful tool which can afford individuals, organizations, communities, and others tremendous access into good and bad places. This access can afford humans into medical breakthroughs, how to guides on repairs and building, how to get from city to city, and a multitude of positive ways to learn and grow.
Internet research use is growing at a fast pace and consequently, is creating ethical dilemmas.
At the same time, it can be a way to link terrorists’ organizations, promote child pornography etc. As you can see, internet research can be used for the greater good, or to our detriment.
This is where the ethics comes into play, and guidelines are set up to monitor ethical issues which occur due to this process. Institutional Review Boards at institutions conducting this type of
research
need specific guidelines for researchers to follow in order to maintain the integrity of
research.
(Williams) 2012)
Denissen, J. J. A., Neumann, L. & van Zalk, M. (2010). How the internet is changing the implementation of
traditional research methods, people’s daily lives, and the way in which developmental scientists conduct
research.
International Journal of Behavioral Development, 34,
564-575. DOI: 10.1177/0165025410383746.
Williams, S. G. (2012). The Ethics of Internet Research.
Online Journal Of Nursing Informatics
,
16
(2), 38-48.
2.
With the rapid increase of technology has come tremendous opportunity. Information is more easily accessible than ever before, which also creates ethical concerns. This week’s lecture describes research that is ethical as one “that the researchers are protecting the privacy of the participants and any research data collected about them.” The journal article, “The Ethics of Internet Research” examines internet research and the ethical issues that arise.
The advantages of internet research over traditional methods are that it is less costly, less of a time commitment, more controlled by the researcher, higher accuracy in data collection, and the ability to easily provide follow up and feedback (Williams, 2012). In a lot of aspects, internet research can be more efficient and less costly. However, there are many disadvantages that the article addresses on internet research. One is lack of control over the test setting (Williams, 2012). It is difficul.
Using What They Know to Teach Them What They Need to KnowLucinda Rush
Conference Presentation
Georgia International Conference on Information Literacy
Lucinda Rush
Old Dominion University
Expropriation of social networking site consumer skills to aid students in mastering the ACRL Information Literacy Threshold Concepts.
Respond to at least two of your classmates’ posts. 1. After .docxdaynamckernon
Respond to at least two of your classmates’ posts.
1. After reading this journal article regarding
ethics of internet research, I have discovered different viewpoints of research and determined some ethical concerns.
As this type of “web-based” research grows, researchers will face ethical concerns that are different from traditional research ethical issues, (Denissen, Neumann & Van Zalk, 2010)
The main attribute of internet research, as I see it, is the ability to have a global footprint; meaning almost any one that has a computer and connectivity can access all types of information and data. Along with this power, comes great responsibility. The web can be a wonderful tool which can afford individuals, organizations, communities, and others tremendous access into good and bad places. This access can afford humans into medical breakthroughs, how to guides on repairs and building, how to get from city to city, and a multitude of positive ways to learn and grow.
Internet research use is growing at a fast pace and consequently, is creating ethical dilemmas.
At the same time, it can be a way to link terrorists’ organizations, promote child pornography etc. As you can see, internet research can be used for the greater good, or to our detriment.
This is where the ethics comes into play, and guidelines are set up to monitor ethical issues which occur due to this process. Institutional Review Boards at institutions conducting this type of
research
need specific guidelines for researchers to follow in order to maintain the integrity of
research.
(Williams) 2012)
Denissen, J. J. A., Neumann, L. & van Zalk, M. (2010). How the internet is changing the implementation of
traditional research methods, people’s daily lives, and the way in which developmental scientists conduct
research.
International Journal of Behavioral Development, 34,
564-575. DOI: 10.1177/0165025410383746.
Williams, S. G. (2012). The Ethics of Internet Research.
Online Journal Of Nursing Informatics
,
16
(2), 38-48.
2.
With the rapid increase of technology has come tremendous opportunity. Information is more easily accessible than ever before, which also creates ethical concerns. This week’s lecture describes research that is ethical as one “that the researchers are protecting the privacy of the participants and any research data collected about them.” The journal article, “The Ethics of Internet Research” examines internet research and the ethical issues that arise.
The advantages of internet research over traditional methods are that it is less costly, less of a time commitment, more controlled by the researcher, higher accuracy in data collection, and the ability to easily provide follow up and feedback (Williams, 2012). In a lot of aspects, internet research can be more efficient and less costly. However, there are many disadvantages that the article addresses on internet research. One is lack of control over the test setting (Williams, 2012). It .
After reading this journal article regarding ethics of interne.docxrosiecabaniss
After reading this journal article regarding
ethics of internet research, I have discovered different viewpoints of research and determined some ethical concerns.
As this type of “web-based” research grows, researchers will face ethical concerns that are different from traditional research ethical issues, (Denissen, Neumann & Van Zalk, 2010)
The main attribute of internet research, as I see it, is the ability to have a global footprint; meaning almost any one that has a computer and connectivity can access all types of information and data. Along with this power, comes great responsibility. The web can be a wonderful tool which can afford individuals, organizations, communities, and others tremendous access into good and bad places. This access can afford humans into medical breakthroughs, how to guides on repairs and building, how to get from city to city, and a multitude of positive ways to learn and grow.
Internet research use is growing at a fast pace and consequently, is creating ethical dilemmas.
At the same time, it can be a way to link terrorists’ organizations, promote child pornography etc. As you can see, internet research can be used for the greater good, or to our detriment.
This is where the ethics comes into play, and guidelines are set up to monitor ethical issues which occur due to this process. Institutional Review Boards at institutions conducting this type of
research
need specific guidelines for researchers to follow in order to maintain the integrity of
research.
(Williams) 2012)
Denissen, J. J. A., Neumann, L. & van Zalk, M. (2010). How the internet is changing the implementation of
traditional research methods, people’s daily lives, and the way in which developmental scientists conduct
research.
International Journal of Behavioral Development, 34,
564-575. DOI: 10.1177/0165025410383746.
Williams, S. G. (2012). The Ethics of Internet Research.
Online Journal Of Nursing Informatics
,
16
(2), 38-48.
2.
With the rapid increase of technology has come tremendous opportunity. Information is more easily accessible than ever before, which also creates ethical concerns. This week’s lecture describes research that is ethical as one “that the researchers are protecting the privacy of the participants and any research data collected about them.” The journal article, “The Ethics of Internet Research” examines internet research and the ethical issues that arise.
The advantages of internet research over traditional methods are that it is less costly, less of a time commitment, more controlled by the researcher, higher accuracy in data collection, and the ability to easily provide follow up and feedback (Williams, 2012). In a lot of aspects, internet research can be more efficient and less costly. However, there are many disadvantages that the article addresses on internet research. One is lack of control over the test setting (Williams, 2012). It is difficult to verify if the subject is in fact who they .
In 2013, Development Initiatives-Africa Hub, Open Institute and Development Research, and Training, Uganda carried out a study tracing the evolution of the open data movement in Kenya and Uganda. It aimed at assessing the role that this movement plays in accountability and the equitable allocation of financial resources for the eradication poverty. The study was carried out as part of the Open Data in Developing Countries (ODDC) initiative, which seeks to explore the emerging impacts of open data in developing countries. It is centred on a number of case studies across the world.
Muchiri Nyaggah highlights the key findings from the Kenyan case study.
Big Data & Privacy -- Response to White House OSTPMicah Altman
Big data has huge implications for privacy, as summarized in our commentary below:
Both the government and third parties have the potential to collect extensive (sometimes exhaustive), fine grained, continuous, and identifiable records of a person’s location, movement history, associations and interactions with others, behavior, speech, communications, physical and medical conditions, commercial transactions, etc. Such “big data” has the ability to be used in a wide variety of ways, both positive and negative. Examples of potential applications include improving government and organizational transparency and accountability, advancing research and scientific knowledge, enabling businesses to better serve their customers, allowing systematic commercial and non-commercial manipulation, fostering pervasive discrimination, and surveilling public and private spheres.
On January 23, 2014, President Obama asked John Podesta to develop in 90 days, a 'comprehensive review' on big data and privacy.
This lead to a series of workshop on big data and technology at MIT, and on social cultural & ethical dimensions at NYU, with a third planned to discuss legal issues at Berkeley. A number of colleagues from our Privacy Tools for Research project and from the BigData@CSAIL projects have contributed to these workshops and raised many thoughtful issues (and the workshop sessions are online and well worth watching).
My colleagues at the Berkman Center, David O'Brien, Alexandra Woods, Salil Vadhan and I have submitted responses to these questions that outline a broad, comprehensive, and systematic framework for analyzing these types of questions and taxonomize a variety of modern technological, statistical, and cryptographic approaches to simultaneously providing privacy and utility. This comment is made on behalf of the Privacy Tools for Research Project, of which we are a part, and has benefitted from extensive commentary by the other project collaborators.
UX Study on Collective Spatial Intelligence Based Urban App ServicesJunie Kwon
UX Study on Collective Spatial Intelligence Based Urban App Services
: Influences of Ecological HCI Experience Factors to Empathetic Behaviours
Heejung Kwon, Ph.D.
Creative Innovation Research Centre, Yonsei Business Research Institute.
The 17th International Conference on Electronic Commerce 2015
Session E2: Mobile Service & Game
Time : 1:10 pm - 2:30 pm, Tuesday 4th August
Room : Seminar Room 3
Similar to Behavior Change Using Social Influences (20)
Working with data is a challenge for many organizations. Nonprofits in particular may need to collect and analyze sensitive, incomplete, and/or biased historical data about people. In this talk, Dr. Cori Faklaris of UNC Charlotte provides an overview of current AI capabilities and weaknesses to consider when integrating current AI technologies into the data workflow. The talk is organized around three takeaways: (1) For better or sometimes worse, AI provides you with “infinite interns.” (2) Give people permission & guardrails to learn what works with these “interns” and what doesn’t. (3) Create a roadmap for adding in more AI to assist nonprofit work, along with strategies for bias mitigation.
In this talk, Dr. Cori Faklaris gives an overview of important concepts in Human Factors engineering. She describes cognitive and social factors, interface factors, and task and environment factors that impact human performance. Importantly, she stresses that failures should be seen as normal and expected, and designers should endeavor to minimize them or prevent them. The two types of human failures - errors (inadvertent) and non-compliance (deliberate) - can be addressed through better interfaces and, sometimes, training. When human failures occur, the root cause usually can be traced to human decisions. This talk was given as a tutorial to the Center for Advanced Power Engineering Fall 2023 meeting, at Clemson University, SC, USA.
For this plenary talk at the Charlotte AI Institute for Smarter Learning, Dr. Cori Faklaris introduces her fellow college educators to the exciting world of generative AI tools. She gives a high-level overview of the generative AI landscape and how these tools use machine learning algorithms to generate creative content such as music, art, and text. She then shares some examples of generative AI tools and demonstrate how she has used some of these tools to enhance teaching and learning in the classroom and to boost her productivity in other areas of academic life.
Overview of key concepts in usable security and privacy for UX designers, chiefly: Threat modeling; Fair Information Practices; 3-pronged approach to usable security + privacy; Learning science principles; Communication-Human Information Processing model for warnings. Guest lecture in Programming Usable Interfaces, Spring 2020, Carnegie Mellon University.
We present SA-6, a six-item psychometric scale for assessing people’s security attitudes that we developed by following best practices. We identify six scale items based on theoretical and empirical research with sufficient response variance, reliability, and validity in a combined sample (N = 478) from Amazon Mechanical Turk and a university-based study pool. We validate the resulting measure with a U.S. Census-tailored Qualtrics panel (N = 209). SA-6 significantly associates with self-report measures of behavior intention and recent secure behaviors. Our work contributes a lightweight method for (1) quantifying and comparing people’s attitudes toward using recommended security tools and practices, and (2) improving predictive modeling of who will adopt security behaviors. Presentation to the Usenix Symposium on Usable Privacy and Security (SOUPS 2019), Aug. 12, 2019, Santa Clara, CA, USA.
Presentation to the Three Rivers Information Security Symposium (TRISS 2018) on Oct. 19, 2018, in Monroeville, Pennsylvania. Based on ideas developed at Carnegie Mellon University.
Presentation at the 2018 USENIX Symposium on Usable Privacy and Security (SOUPS 2018) in Baltimore, Md., USA. (https://www.usenix.org/conference/soups2018/presentation/park) Security design choices often fail to take into account users' social context. Our work is among the first to examine security behavior in romantic relationships. We surveyed 195 people on Amazon Mechanical Turk about their relationship status and account sharing behavior for a cross-section of popular websites and apps (e.g., Netflix, Amazon Prime). We examine differences in account sharing behavior at different stages in a relationship and for people in different age groups and income levels. We also present a taxonomy of sharing motivations and behaviors based on the iterative coding of open-ended responses. Based on this taxonomy, we present design recommendations to support end users in three relationship stages: when they start sharing access with romantic partners; when they are maintaining that sharing; and when they decide to stop. Our findings contribute to the field of usable privacy and security by enhancing our understanding of security and privacy behaviors and needs in intimate social relationships.
Presented July 15, 2018 to the 2018 Organizational Science and Cybersecurity Workshop, George Mason University, Fairfax, VA, USA. In this talk, I present the Transtheoretical Model (TTM) of Behavior Change for use in an organizational context as part of a larger reframing of end-user cybersecurity as a problem of organization health and wellness. I explain a visual diagram of six TTM Stages of Change and associated intervention strategies, as adapted from medical and wellness literature, and relate these to examples of security interventions currently in use, such as password strength indicators and Facebook Trusted Contacts. I conclude with my view that this framing can help researchers and practitioners approach “wicked problems” of organizational security that are not “tame” or one-and-done engineering problems but socio-cultural conditions that call for sustained, empowered action.
Slides for a presentation on what works in social media for academics, given Oct. 24, 2017 to the CHIMPS Lab at Carnegie Mellon University's Human Computer Interaction Institute in the School of Computer Science.
You have reached that point in your life where a change is needed. Perhaps you have been contemplating an upgrade to your skill set, a new degree or certificate, additional credentials or even a completely new career.
This special session at InWIC is designed to offer insights, practical tips and encouragement to anyone who is thinking about – or in the process of – pursing additional education. The co-presenters will offer their personal experiences in navigating the financial, logistical and emotional/psychological issues involved in being an adult/returning student and will provide a number of useful resources for addressing these issues. The session will include time for participants to share their own experiences and to form a network for support in the future.
Success is within your grasp, but in order to have smooth sailing, enjoy the view on the way down and not crash to the ground, you need a parachute – a plan for how you will address the risks, meet the challenges and maximize the opportunities and experiences that higher education presents. This InWIC session is intended to help you begin to prepare your plan.
Presentation prepared by Cori Faklaris of the Viégas et al. 2006 paper on the "Themail" email visualization tool for H565 Collaborative and Social Computing, Fall 2015, in the Department of Human-Centered Computing at IUPUI's School of Informatics and Computing.
Presentation for a UX design and development project authored by myself, Melissa Dryer and Joe Dara for H541 Interaction Design Practice, Fall 2015, in the graduate program in Human-Computer Interaction at Indiana University-Purdue University Indianapolis.
Presentation by Cori Faklaris and Sara Anne Hook on Sept. 18, 2015. An overview of case law, articles and key findings as to how electronic discovery in U.S. legal system is affected by the rise of Snapchat, WhatsApp and other mobile messaging apps in the face of the pending update to the Federal Rules of Civil Procedure. This presentation was originally prepared for the ATINER 2015 International Conference on Law in Athens, Greece. These revised slides were used during a Brown Bag talk to the Department of Human-Centered Computing, School of Informatics and Computing, Indiana University-Purdue University Indianapolis.
It's exciting to enter graduate school and return to college life again. But my first concern upon getting my acceptance letter was: Great, now how will I pay for it? As an adult returning student, I have more options than I did as a teenager for paying for college -- even though I'm leaving my full-time job. I detail five methods I'm focusing on to make my finances work.
Cori Faklaris, known as @heycori on Twitter and on Facebook, LinkedIn, Pinterest, Instagram and other social media platforms, offers her lessons from years curating a her online brand as a news personality and in managing social media accounts for the IndyStar.com news website.
More from University of North Carolina at Charlotte (16)
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
2. SocialCybersecurity.org Cori Faklaris | @heycori
Unintentional insider threat (UIT) can arise because security
tools or infrastructure does not account for social needs.
Social influences can be used to motivate security behaviors.
Join forces with us! We are looking for external collaborators.
MAJOR TAKEAWAYS
2
3. SocialCybersecurity.org Cori Faklaris | @heycori
“THE UIT” – LEGITIMATE USER WHO ACCIDENTALLY
JEOPARDIZES SECURITY THROUGH LEAKS OR ERRORS
Frank L. Greitzer, Jeremy R. Strozer, Sholom Cohen, Andrew P. Moore, David Mundie, and Jennifer Cowley. 2014. Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits.
In 2014 IEEE Security and Privacy Workshops, 236–250. DOI: https://doi.org/10.1109/SPW.2014.39
5. SocialCybersecurity.org Cori Faklaris | @heycori
SA-6 MEASURES SECURITY ATTITUDE
• Generally, I diligently follow a routine about security practices.
• I always pay attention to experts’ advice about the steps I need to take to keep my
online data and accounts safe.
• I am extremely knowledgeable about all the steps needed to keep my online data and
accounts safe.
• I am extremely motivated to take all the steps needed to keep my online data and
accounts safe.
• I often am interested in articles about security threats.
• I seek out opportunities to learn about security measures that are relevant to me.
Cori Faklaris, Laura Dabbish and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium
on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/soups2019-faklaris.pdf
On a scale of 1=Strongly Disagree to 5=Strongly Agree, rate your level of agreement with the following:
5
6. SocialCybersecurity.org Cori Faklaris | @heycori
• Workplace cybersecurity: Sharing
accounts and devices to collaborate on
tasks and to keep costs down.
• Workarounds are norm (ex: password taped to PC)
• Difficult to share and to control access with systems
that presume one user at a time
• Lack of accountability and awareness of one
person’s activities by others
SOCIAL CONTEXTS ARE INFLUENCE
6
Yunpeng Song, Cori Faklaris, Zhongmin Cai, Jason I. Hong, and Laura Dabbish. 2019. Normal and Easy: Account Sharing Practices in the Workplace. In
Proceedings of the ACM: Human-Computer Interaction, Vol. 3, Issue CSCW, November 2019. ACM, New York, NY, USA. Available at:
https://drive.google.com/file/d/17xb07vuKjPrgoKNzBSGouTgqNNEeACF0/view
7. SocialCybersecurity.org Cori Faklaris | @heycori
• Reciprocity: People are
driven to repay acts in kind
and to share resources in
a network of obligation
• Liking: People pay
attention to the opinions of
those they admire or who
are similar to themselves
‘WEAPONS OF INFLUENCE’
7
Robert B. Cialdini. 2008.
Influence (5th Edition). A.
Michel Port Harcourt.
ISBN-10: 9780205609994
8. SocialCybersecurity.org Cori Faklaris | @heycori
• Authority: People tend to
follow the guidance of
others presented as
authority figures or experts
• Social Proof: People look
to those around them for
guidance on how they
should behave
‘WEAPONS OF INFLUENCE’
8
Robert B. Cialdini. 2008.
Influence (5th Edition). A.
Michel Port Harcourt.
ISBN-10: 9780205609994
9. SocialCybersecurity.org Cori Faklaris | @heycori
SAFESEA BROWSER
PLUGIN FOR
GOOGLE CHROME
9
Gustavo Umbelino, Rosie Sun, Cori Faklaris, Jason I. Hong, and
Laura Dabbish. 2019. Safesea: A Chrome Plugin to
Crowdsource Privacy Settings. Poster presentation for CMU
Privacy Day at Carnegie Mellon University, Feb. 1, 2019.
Available at: http://cups.cs.cmu.edu/privacy-
day/2019/posters/Sun_Falarkis_Safesea_A_Chrome_Plugin.pdf
• Helps Facebook users navigate
privacy and security settings.
• Displays crowd and expert
suggestions for settings.
10. SocialCybersecurity.org Cori Faklaris | @heycori
• Pay people or give them
freebies to share
cybersecurity memes with
your website URL on their
social media accounts
• Use SA-6 along with
system stats and social
media metrics to measure
effectiveness
FREE RESEARCH IDEA
Image source:
https://www.pin
terest.com/The
SACompany/th
e-security-
awareness-
company/
10
11. SocialCybersecurity.org Cori Faklaris | @heycori
• Create a cybersecurity
social event such as a
game night, a movie night
or a scavenger hunt
• Use SA-6 along with other
scales/survey items to test
whether participants’
attitudes, intentions or
reported behaviors improve
FREE RESEARCH IDEA
Image source:
https://www.amazon.com/ThinkF
un-Hacker-Cybersecurity-Coding-
Girls/dp/B07FXYJ5BC
11
12. SocialCybersecurity.org Cori Faklaris | @heycori
Unintentional insider threat (UIT) can
arise because security tools or
infrastructure does not account for
social needs.
Social influences can be used to
motivate security behaviors.
Join forces with us! We are looking
for external collaborators.
TWITTER: @heycori
EMAIL: heycori [at] cmu.edu
MAJOR TAKEAWAYS
12