Grant Year: 2017

January 14, 2020

Cyber-Infrastructures of the Personal Data Economy

This group will explore the political economy of personal data, specifically the transport, storage, circulation, and processing of individual data by commercial entities. Using in-depth, semi-structured interviews of experts and professionals in the data services sector, supplemented by direct observation of professional meetings and conferences, they will explore the question,…

January 14, 2020

Data Security Breach Notification in Singapore: The Role of the Data Privacy Officer in Enhancing Trust Relationships

This project will examine how the voluntary data security breach notification mechanism found in Singapore’s Personal Data Protection Act has been implemented by private organizations in their policies and practices. Applying comparative and qualitative methods, including interviews with chief data privacy officers, the researchers seek to understand organizational behavior in…

January 14, 2020

Exploring Internet Balkanization Through the Lens of Regional Discrimination

The research study will examine practices of regional discrimination, in which users from select geographies are blocked from access to internet resources, often as part of efforts to prevent credit card fraud and other scams. Using a combination of qualitative interviews, crowdsourcing, and automated measurement modules, this research study will…

January 14, 2020

Human-Centered Design Study on Cybersecurity of Soft Co-Robotic Systems

A team of researchers will study interactions between humans and “co-robots,” with the purpose of identifying how sensitive personal information is generated and shared between humans and the Internet of Things (IoT)-connected co-robots. Using human-centered design research methods (e.g., interviews, observations, scenarios, surveys, prototyping, testing), they will help characterize information…

January 14, 2020

Information Theoretic Methods in Cybersecurity

Information theoretic security offers the strongest possible security guarantees, since information theoretically secure keys are unbreakable in principle, without the need for any hardness assumption. This project studies information theoretic key generation in the context of the Internet of Things (IoT), for which a large number of agents of limited…

January 14, 2020

Linking Behavioral and Physiological Responses in Virtual Reality to Privacy and Security Outcomes

Using controlled, laboratory-based designs, this team of researchers will explore how virtual reality (VR), combined with small wearable biometric devices and eye-tracking technologies, can help generate behavioral profiles in simulated social interaction scenarios. The results will be of interest to those who aim to discretely identify (and perhaps correct) individuals…

January 14, 2020

New Frontiers in Public-Key Cryptography

Use of cryptographic encryption methods for maintaining the privacy of our personal communications over the Internet is ubiquitous. However, as all our devices get connected to the Internet and all our data is shipped to third-party servers, new security problems arise. Unfortunately, traditional cryptographic encryption schemes are not suitable for…

August 22, 2019

Mobile App Privacy Analysis with AppCensus

Over the past several years, our research team has developed infrastructure that gives us an unprecedented view into the privacy behaviors of Android apps. AppCensus is our dynamic analysis testbed that combines bespoke instrumentation within the operating system itself with sophisticated network analysis tools, which allows us to detect exactly…