Data Privacy and Sociotechnical Cybersecurity
Examining the human context of privacy and cybersecurity to develop real-world solutions.
Computer security researchers must navigate ethical dilemmas about how to use big data and shared networked resources to discover vulnerabilities; how to safely expose these problems; and how to best ensure that critical vulnerabilities are fixed.
CCE STEM: Standard: Collaborative: The Development of Ethical Cultures in Computer Security Research
Computer security researchers navigate ethical dilemmas about how to use big data and shared networked resources to discover vulnerabilities; how to safely expose vulnerabilities; and how to best ensure that vulnerabilities are fixed.
Enhancing Digital Privacy and Security Skills for Low-Socioeconomic Families: Resources for Librarians and Patrons
The project detailed below responds to the IMLS National Leadership Grants for Libraries (Research grant category) and covers a three-year period from December 2016 to November 2019. The direct audiences for this research grant are economically disadvantaged families in Maryland and the public librarians that serve them.
Today's search engines are designed principally to help people find what they want to see. Paradoxically, the fact that search engines do this well means that there are many collections that can't be searched.
"There's a creepy guy on the other end at Google!": Engaging middle school students in a drawing activity to elicit their mental models of Google
Although youth are increasingly going online to fulfill their needs for information, many youth struggle with information and digital literacy skills, such as the abilities to conduct a search and assess the credibility of online information. In order to investigate youths’ conceptions of the Google search engine, a drawing activity was conducted with 26 HackHealth after-school program participants to elicit their mental models of Google.
Patient openness to sharing data is critical for the success of big data in healthcare. However, there is a tension between privacy and disclosure.
Social media sites such as Facebook are popular platforms for spreading clickbait, links with misleading titles that do not deliver on their promises. Not only does clickbait waste users' time, it often directs users to phishing sites and sites containing spyware and malware. A large number of users fall victim to scams on social media, including those spread through clickbait, due to both a lack of awareness and a lack of appropriate warnings on social media platforms.
Cyber-attacks and the security response are high growth industries projected to exceed $248 billion by 2023
SCC-IRG Track 1: Inclusive Public Transit Toolkit to Assess Quality of Service Across Socioeconomic Status in Baltimore City
This interdisciplinary research effort will advance the state of the art in privacy, survey design, data analytics, transit equity, data-driven civic engagement, and transit simulations; and will create a unique opportunity to understand the interdependencies between these research areas generating new knowledge necessary to ultimately drive QoS transit improvements
CCE STEM: Finding Practices that Cultivate Ethical Computing in Mobile and Wearable Application Research & Development
This project will study academic and commercial software research and development (R&D) to discover factors that encourage discussion and action on ethical challenges.
Collaboration in the Future of Work: Developing Playable Case Studies to Improve STEM Career Pathways
This project aims to serve the national interest by implementing educational simulations to improve career preparation among STEM students. There is a shortage of qualified workers in many STEM careers, including cybersecurity and data science.