Grant Year: 2018

January 14, 2020

The Role of Private Ordering in Cybersecurity: Towards A Cybersecurity License

The law governing the information economy is often not prescribed by legislators or courts, but rather by private entities using technology and standard-form contracts. This research proposal seeks to account for the often unobserved role of private ordering in the future of cybersecurity, and suggests that, similar to the revolutionary…

January 14, 2020

Secure Internet of Things for Senior Users

Older adults are increasingly involved in the use of emerging technologies, especially in the domain of healthcare. Examples include wearable devices for medical measurements, context-aware safety monitoring, fall sensors, and therapeutic robots. However, due to potentially limited technological literacy and high probability of physical or mental impairments, older adults are…

January 14, 2020

Security Implications of 5G Networks

5G wireless service promises to enable higher bandwidth, lower latency wireless services, not just for consumers, but also for enterprise and industrial assets. If 5G wireless networks are used to support societal infrastructures such as cities, vehicles, and industrial assets, these represent new dependencies, and the costs of outages or…

January 14, 2020

Statistical Foundations to Advance Provably Private Algorithms

In the past year, several major companies have deployed data processing systems based on differential privacy. These systems use mathematical techniques to limit the information that can be learned about individuals, but a number of limitations threaten the success of this approach. This research will bring statistical techniques to bear…

January 14, 2020

Uncovering the Risk Networks of Third-Party Data Sharing in China’s Social Credit System

China’s “social credit system” is a personal and behavioral data-driven effort to publicly rate the trustworthiness of individuals, drawing upon data from people’s social networks, online purchases, and video game consumption. Major cybersecurity risks are looming under the surface of social credit: as third-party services partner with Chinese tech firms…

January 14, 2020

Everyone Can Code? Race, Gender, and the American Learn to Code Discourse

Corporations, politicians, and educators alike have positioned computer programming as essential for individual job success, and teaching “underrepresented minorities” to code is also frequently offered as a solution for the often-problematic gender and racial politics of Silicon Valley corporations. This project examines the power relations of the learn-to-code trend, particularly…

January 14, 2020

Menstrual Biosensing Survival Guide

Biosensing technologies are increasingly present, predicting bodily or emotional health and offering promises of improved efficiency or personal wellness. Menstrual tracking apps, for example, encourage users to report intimate details, from the duration of periods, cervical mucus texture, emotional state, to sexual behavior. These apps offer benefits but also pose…

January 14, 2020

Model Agnostic Estimation of Threat Probabilities

Providing improved attack probability estimation is a tangible and useful way to shore up cyberdefenses for individual, technological, and societal systems. This research is aimed at developing a data-driven estimation framework for assessing the probabilities of diverse cybersecurity threats. The researchers are developing algorithms for estimating threat probabilities that are…

January 14, 2020

Post and Re-trauma: Enhancing the Cybersecurity of Sexual Assault Victims on Facebook

In the last few years, social media has created supportive spaces where sexual assault victims can share their testimonies, yet social media also serves as a forum for victimizing activities such as stalking, harassing, and humiliating survivors. This study aims to uncover and empirically characterize the negative aspects of Facebook…

January 14, 2020

Privacy Analysis at Scale: A Study of COPPA Compliance

This research team has launched a successful platform for detecting violations of the Children’s Online Privacy Protection Act (COPPA) at scale by automatically observing the behaviors of tens of thousands of free Android apps. They also have developed a website for use by parents, who can review the privacy behaviors…