The Social, Behavioral, and Economic (SBE) Perspective in Secure and Trustworthy Cyberspace (SaTC) Aug 17, 2014 Heng Xu SaTC Program Director Directorate.

Slides:



Advertisements
Similar presentations
W ashington A rea T rustworthy C omputing H our
Advertisements

Copyright The New Yorker Cybersecurity Incident Reports and Repairs Office.
NSF Support of Socio-Technical Research University of Maryland - College Park, December 3, 2013 Heng Xu Program Director Division of Social and Economic.
Science of Science and Innovation Policy (SciSIP) Presentation to: SBE Advisory Committee By: Dr. Kaye Husbands Fealing National Science Foundation November.
NSF Research Opportunities For Social Scientists Harold Clarke Ashbel Smith Professor University of Texas at Dallas and University of Essex Former NSF.
18th WATCH: An Experiment in Hiring Discrimination via Online Social Networks Alessandro Acquisti Carnegie Mellon University MONDAY Nov. 25 th, Noon, Room.
Funding Opportunities at NSF 2010 Neuroeconomics Conference Jonathan W. Leland Decision, Risk and Management Science Division of Social and Economic Sciences.
Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
U.S. Science Policy Cheryl L. Eavey, Program Director
NSF SBE|BCS|GSS Funding “Priorities” for Research in GIScience Scott Freundschuh, Program Director Geography and Spatial Sciences.
How to Get NSF to Fund Your Social Science Research Robert E. O’Connor, Director Program in Decision, Risk and Management Sciences Division of Social and.
The IGERT Program Preliminary Proposals June 2008 Carol Van Hartesveldt IGERT Program Director IGERT Program Director.
SING* and ToNC * Scientific Foundations for Internet’s Next Generation Sirin Tekinay Program Director Theoretical Foundations Communication Research National.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
Graduate Research Fellowship Program National Science Foundation Graduate Research Fellowship Operations Center.
Overview of the National Science Foundation (NSF) and the Major Research Instrumentation (MRI) Program Office of Integrative Activities National Science.
How to Get NSF to Fund Your Social Science Research Robert E
The College of Information Sciences and Technology ist.psu.edu.
 Explores theoretical questions concerning the nature of the mind, knowledge, and mental phenomena. Examines the nature of knowledge, creativity, the.
SKA-cba-ase NSF and Science of Design Avogadro Scale Engineering Center for Bits & Atoms November 18-19, 2003 Kamal Abdali Computing & Communication.
Company LOGO Broader Impacts Sherita Moses-Whitlow 07/09/09.
David C. Croson, Ph.D. Office of the Assistant Director Directorate for Social, Behavioral, and Economic Sciences National Science Foundation
26th WATCH: Differential Privacy: Theoretical and Practical Challenges Salil Vadhan Harvard University THURSDAY Jan. 15, Noon, Room 110 W ashington A rea.
21st WATCH: Increasing Trust in the E-Health Environment: Privacy Mechanisms and Policy Problems Maya Bernstein US Department of Health & Human Services.
BRAIN: Brain Research through Advancing Innovative Neurotechnologies Announced by President Obama in February 2013 as part of FY 2014 Budget Request to.
Computational Scientometrics Studying science by scientific means Dr. Katy Börner Cyberinfrastructure for Network Science Center, Director Information.
Edward Seidel, Assistant Director Directorate for Mathematical and Physical Sciences.
 Examines the nature of culture and the diverse ways in which societies make meaning and are organized across time and space. Topics include cultural.
Funding Opportunities for GI Science at National Science Foundation Nina Lam 02/04/00.
NSF for CASIC Researchers Jacqueline Meszaros, Ph.D. Decision, Risk and Management Sciences Innovation and Organizational Sciences
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) 1 st REVIEW Brussels, 12th April 2013 FP7-ICT
Directorate for Social, Behavioral, and Economic Sciences Amber L. Story Deputy Division Director Directorate for Social, Behavioral, and Economic Sciences.
Communication 2 Report Writing.
DOE 2000, March 8, 1999 The IT 2 Initiative and NSF Stephen Elbert program director NSF/CISE/ACIR/PACI.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Introduction & NSF Overview NSF Tribal College Workshop November 14, 2008.
NSF Economics Program 2009 Status Report Nancy Lutz Andrew Feltenstein Florenz Plassmann.
NSF DDRIG Doctoral Dissertation Research Improvement Grants.
National Science Foundation Overview. Agenda Our Legacy: About NSF Our Work: Programs & The Merit Review Process Our Opportunities: Working at the NSF.
Mapping New Strategies: National Science Foundation J. HicksNew York Academy of Sciences4 April 2006 Examples from our daily life at NSF Vision Opportunities.
NSF – HSI Workshop 1 Introduction & NSF Overview NSF Workshop for Sponsored Project Administrators at Hispanic Serving Institutions April 13, Miami,
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
National Science Foundation. Seeking Doctoral Dissertation Support from the National Science Foundation: Do’s and Don’ts Program Officer Political Science.
© Cloud Security Alliance, 2015 Jim Reavis CEO, Cloud Security Alliance.
Cybersecurity Challenges and Opportunities Anita Nikolich Program Director, Advanced Cyberinfrastructure October 2015.
ARL Workshop on New Collaborative Relationships: The Role of Academic Libraries in the Digital Data Universe September 26-27, 2006 ARL Prue.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.
Digital Data Collections ARL, CNI, CLIR, and DLF Forum October 28, 2005 Washington DC Chris Greer Program Director National Science Foundation.
1 Grant Applications Rachel Croson, PhD Dean, College of Business UT Arlington (formerly DD SES/SBE NSF)
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Keith A. Marzullo, Ph.D. CISE/CNS DD February 24, 2011 Welcome to the Directorate for Computer and Information Science and Engineering.
33rd WATCH: Privacy: Plural, Contextual, Contestable but not Unworkable Deirdre K. Mulligan University of California, Berkeley Thursday March 17, Noon,
NSF INCLUDES Inclusion Across the Nation of Learners of Underrepresented Discoverers in Engineering and Science AISL PI Meeting, March 1, 2016 Sylvia M.
Social, Behavioral and Economic Sciences Nancy Lutz, Program Director Economics NSF Day Conference SUNY Albany, October 2011.
Directorate for Education and Human Resources Photo credits (from left) : U.S. Army Corps of Engineers, Intel Free Press, Kate Ter Haar, Woodley Wonder.
Digital Data Collections in Biology Collaborative Expedition Workshop November 8, 2005 Arlington, Virginia Chris Greer Program Director National Science.
Introduction and NSF Overview. Vannevar Bush And Science: The Endless Frontier.
Navigating NSF Programs Esin Gulari Dean, College of Engineering & Science Clemson University.
National Science Foundation Opportunities
Horizon 2020 Secure Societies European Info Day and Brokerage Event
Building a CMMI Data Infrastructure
Building a CMMI Data Infrastructure
NSF Graduate Research Fellowship Program
Towards Excellence in Research: Achievements and Visions of
The Curry School of Education October 3, 2018
S-STEM (NSF ) NSF Scholarships for Science, Technology, Engineering, & Mathematics Information Materials 6 Welcome! This is the seventh in a series.
IT Applications with Emerging Techniques: Security Solutions
Presentation transcript:

The Social, Behavioral, and Economic (SBE) Perspective in Secure and Trustworthy Cyberspace (SaTC) Aug 17, 2014 Heng Xu SaTC Program Director Directorate for Social, Behavioral and Economic Sciences

Agenda 1.What is SBE? 2.The SBE Perspective of SaTC Program 3.SaTC EAGERs Enabling New Collaborations Between Computer and Social Scientists 4.Research on Privacy in Today's Networked World

NATIONAL SCIENCE FOUNDATION Information & Resource Management Social, Behavioral, & Economic Sciences Office of Inspector General National Science Board Offices International & Integrative Activities Legislative & Public Affairs General Counsel Diversity & Inclusion Computer & Info. Science & Engineering Computer & Info. Science & Engineering Engineering Geosciences Mathematical & Physical Sciences Education & Human Resources Budget, Finance & Award Management Budget, Finance & Award Management Biological Sciences Office of the Director

NSF SBE OVERVIEW Division of Social and Economic Sciences (SES) Division of Behavioral and Cognitive Sciences (BCS) National Center for Science and Engineering Statistics Directorate for Social, sBehavioral & Economic Sciences Dr. Joanne Tornow, Acting Assistant Director Directorate for Social, sBehavioral & Economic Sciences Dr. Joanne Tornow, Acting Assistant Director SBE Office of Multidisciplinary Activities (SMA)

Archaeology and Archaeometry Cognitive Neuroscience Cultural Anthropology Developmental and Learning Sciences Documenting Endangered Languages Geography and Spatial Sciences Linguistics Perception, Action, and Cognition Biological Anthropology Social Psychology BCS STANDING PROGRAMS

SES STANDING PROGRAMS Decision, Risk and Management Sciences Economics Ethics Education in Science and Engineering Science of Organizations Law and Social Sciences Methodology, Measurement and Statistics Political Science Science, Technology and Society Sociology

NATIONAL CENTER FOR SCIENCE AND ENGINEERING STATISTICS (NCSES) Nation’s primary source of data and analysis on the science and engineering enterprise Designs, supports and directs about 11 periodic surveys, other data collections and research projects 30 publications yearly Congressionally-mandated publications: –Science and Engineering Indicators –Women, Minorities and Persons with Disabilities in Science and Engineering

The SBE / SaTC Perspective SBE / SaTC seeks to fund cutting edge SBE research proposals that –Have the potential to enhance the trustworthiness and security of cyberspace AND –contribute to theory or methodology of basic SBE sciences Proposers are encouraged to include SBE science and collaborate with SBE scientists as needed

The SBE / SaTC Perspective SBE primary proposals should NOT simply apply SBE research and methods to cybersecurity. Research from the SBE perspective uses the domain of cybersecurity to explore, develop, or "push the boundaries" of SBE science. –Make theoretical or methodological contributions to the SBE sciences –Seek generalizable theories –Proposals will be reviewed by SBE scientists

The SBE / SaTC Perspective Proposals that APPLY rather than contribute to the SBE sciences may fit into the TWC perspective or with the SBE perspective as secondary. –E.g. as human factors research

Example SBE / SaTC Topics The value of cybersecurity insurance Methods to incentivize or nudge end-users to improve their cybersecurity compliance Socio-technical solutions to reduce risk exposure of end-users Game theoretic and microeconomic modeling and experimentation to identify incentive mechanisms for enhancing security and privacy Behavioral economic analyses of privacy decision making Motivators of insider threat and incentive countermeasures Methods for detecting deception and cybercrime prevention The impact of trust and institutional design on cybersecurity decisions Social network methods of detecting malware propagation Incentive structures for cybersecurity in firms and other organizations Incentive, communication, and profitability mechanisms of attackers

Dear Colleague Letter (DCL): SaTC EAGERs Enabling New Collaborations Between Computer and Social Scientists

SaTC New Collaboration EAGERs New Collaboration:New Collaboration –Proposals should clarify how the proposed NEW collaboration between computer and social scientists will take place –Budget: around $200,000 Stay tuned for future opportunities

: Consumer Response to Security Incidences and Data Breach Notification PIs: Rahul Telang (applied economics), Artur Dubrawski (machine learning & data mining), CMU –Analyze a large financial dataset regarding customer transactions and details on security incidence –Examine degree of user behavior changes due to an adverse security event or breach notification –Highlight the cost and benefits of existing policies & provide guidelines on more effective regulations –Budget: $199,908 for two years

: Exploring Spear-Phishing: a Socio-Technical Experimental Framework PIs: Oded Nov (behavioral research), Nasir Memon (computer security), Polytechnic Institute of NYU –Examine the effect of Big Five personality traits on users’ responses to spear-phishing attacks –Send simulated spear-phishing messages to people on their actual accts at 4 organizations (2 universities and 2 companies) –Develop novel types of cyber defenses that are tailored to users’ idiosyncratic characteristics –Budget: $203,648 for two years

Dear Colleague Letter (DCL): Research on Privacy in Today's Networked World

Law: Privacy = “Right to be left alone” (Warren and Brandeis 1890). Warren, S.D., and Brandeis, D.L. (1890) "The Right to Privacy," Harvard Law Review (4:5), pp

Computer Science  Privacy: Several definitions have evolved over the last decade including k-Anonymity, L-diversity, T-closeness, M- invariance, differential privacy, private information retrieval…

Social Psychology, HCI and Information Systems:  Frequent linkage of privacy and control

What is Privacy? Privacy scholars “do not agree...on what privacy is or on whether privacy is a behavior, attitude, process, goal, phenomenal state, or what” (Margulis 1977, p.17) “The notion of privacy is fraught with multiple meanings, interpretations, and value judgments” (NAC 2007). Privacy "is in disarray and nobody can articulate what it means" (Solove 2006, p. 477) Margulis, S.T. (1977) "Conceptions of Privacy - Current Status and Next Steps," Journal of Social Issues (33:3), pp Solove, D.J. (2006) "A Taxonomy of Privacy," University of Pennsylvania Law Review (154:3), pp

NSF Privacy Research Portfolio Formulation of privacy in terms of access to information Formulation of privacy as a social-psychological construct Privacy policy formulation, specification, enforcement, analysis Algorithmic foundations for privacy and tools Economics of privacy Usability aspects of privacy Privacy - Security - Usability trade-offs Privacy preserving solutions for data integration, mining, querying Privacy preserving solutions for cloud computing

NSF Privacy Research Portfolio In August 2013 and in February 2014, the White House Office of Science and Technology Policy (OSTP) issued two Requests For Information (RFI) on privacy research activities pursued by the agencies NSF: Approximately $25M per year is invested in privacy research activities –Approximately 35% of the FY13 SaTC program is in whole or large part related to privacy ranging from $100K/2 years to $10M/5 years

Privacy Related Awards CISE: –The general goal is to ensure that data can be shared and utilized but does not reveal personally identifiable information (PII). SBE: –Privacy should be a social-psychological construct. –Address privacy by seeking means of protecting PII.

Dear Colleague Letter: Research on Privacy in Today's Networked World Encourages social, behavioral & economic aspects of privacy research. Proposals should be submitted through existing programs including: 1)SBE Interdisciplinary Behavioral and Social Science (IBSS) Research program 2)Secure and Trustworthy Cyberspace (SaTC) program 3)Standing SBE programs  Science, Technology & Society  Economics  Sociology

Psychological or social consequences of privacy violations Factors encouraging attention or inattention to privacy Understanding the contextual nature of privacy or privacy violations Institutional adaptations to and utilization or avoidance of privacy- invading technologies Research on Privacy in Today's Networked World Relationship between technical and psychological conceptualizations of privacy Social and psychological functions privacy performs Examining privacy issues and impacts across different levels of analysis with different technologies

QUESTIONS? Phone: (703) Division of Social and Economic Sciences Directorate for Social, Behavioral and Economic Sciences