Social Media https://volgenau.sitemasonry.gmu.edu/ en Commonwealth Cyber Initiative (CCI) researchers address multidisciplinary challenges https://volgenau.sitemasonry.gmu.edu/news/2022-01/commonwealth-cyber-initiative-cci-researchers-address-multi-disciplinary-challenges <span>Commonwealth Cyber Initiative (CCI) researchers address multidisciplinary challenges</span> <span><span lang="" about="/user/221" typeof="schema:Person" property="schema:name" datatype="">Martha Bushong</span></span> <span>Wed, 01/26/2022 - 15:19</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class='field__items'> <div class="field__item"><a href="/profiles/hpurohit" hreflang="und">Hemant Purohit</a></div> <div class="field__item"><a href="/profiles/eoster" hreflang="und">Eric Osterweil</a></div> <div class="field__item"><a href="/profiles/dbarbara" hreflang="und">Daniel Barbará</a></div> <div class="field__item"><a href="/profiles/vmotti" hreflang="und">Vivian Genaro Motti</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span>Whether you are an experienced software developer, a teen texting on a smartphone, or an older adult checking a bank statement, cybersecurity is part of your life. Humans and computers interact every minute of every day and cybersecurity is there to keep information safe and actions private. But normal human behavior can compromise safety and privacy.</span></span></p> <p><span><span>For the next 12 months, researchers funded by the <a href="https://cci-novanode.org" title="CCI Nova Node">Commonwealth Cyber Initiative’s </a>(CCI) Northern Virginia Node (NoVa Node) will be exploring the impact of human behavior on cybersecurity systems. Divided into six teams, the researchers will seek to leverage the power of their academic expertise in the social sciences, and related fields. The teams include faculty from the Colleges <a href="https://cec.gmu.edu" title="College of Engineering and Computing">of Engineering and Computing</a>, <a href="https://chss.gmu.edu" title="College of Humanities and Social Sciences">Humanities and Social Sciences</a>, <a href="https://cehd.gmu.edu" title="College of Education and Human Development">Education and Human Development</a>, and the School of Business. Each team will explore a different aspect of the problem as they aim to translate those understandings into solutions or areas for additional investigation that can impact the welfare of Virginians.</span></span></p> <p> </p> <p><strong><span><span><span><span>“Human-Centric Training for Privacy and Security Controls: Bridging the Awareness Gap for Diverse Populations”</span></span></span></span></strong></p> <p><span><span>PI: Vivian Genero Motti, College of Engineering and Computing (CEC), George Mason University; Co-PIs: <span><span>Samy El-Tawab, and Ahmad Salman, <a href="https://isc.jmu.edu/programs/academic-programs/integrated-science-and-engineering" title="College of Integrated Sciences and Engineering">College of Integrated Sciences, James Madison University</a></span></span></span></span></p> <p><span><span><span>If you retired from the workforce 25 years ago, before Wi-Fi, online shopping, banking, or smartphones, you are likely more vulnerable to cyberattacks. In fact, older adults face a disproportionate risk of suffering cyberattacks; still, they do not have access to resources and educational materials suitable to meet their needs related to human behavior and privacy protection.</span></span></span></p> <p><span><span><span>Vivian Motti and her team want to do something about that. They plan to reach out to underrepresented users and characterize their level of awareness about cybersecurity. Motti and her team believe that gaining a better understanding of these populations will help inform educational content development, providing content, language, and design aspects that are all suitable to their specific user profiles. </span></span></span></p> <p><span><span><span>“By adopting a user-centric design approach, this project will ensure that cybersecurity training meets users' needs for minority groups. By involving older adults front and center in the research agenda, we will establish training contents that are appropriate to their level of understanding,” says Motti.  Also, besides following the training contents and retaining what they learn, they will be able to act and prevent potential attacks that could pose privacy risks.</span></span></span></p> <p> </p> <p><strong><span><span><span>“Impact of Human Behavior in a Mixed Traffic Environment”</span></span></span></strong></p> <p><span><span><span>PI:</span> <span>Linghan Zhang, CEC</span><span>; Co-PIs: </span><span>Nirup Menon, School of Business, Nupoor Ranade, College of Humanities and Social Sciences (CHSS), </span></span></span></p> <p><span><span><span>As autonomous vehicles become more prevalent and mingle with human-driven vehicles this mixed traffic environment may comprise both. In mixed traffic, the behaviors of human drivers are unpredictable and can lead to situations that confuse autonomous vehicles and cause adverse events for both. </span></span></span></p> <p><span><span><span>The CCI NoVa Node’s research in autonomous vehicles (AVs) has already garnered attention from vehicle manufacturers such as Ford, Cadillac, and Daimler-Benz. Linghan Zhang and her team aim to extend that research by studying their use in mixed traffic.</span></span></span></p> <p><span><span><span>According to Linghan, the team’s goal is to reflect driving reality through a multi-vehicle simulation in mixed traffic, using driving conditions that have led to real-world collisions in the past. She says, “Prior research only focuses on a single user’s behavior, and the data collected is mainly limited to surveys and interviews. With objective driving data missing, prior experiments did not reflect on-road driving reality.” </span></span></span><span><span> </span></span></p> <p><span><span><span>This project could achieve valuable and meaningful data on how human driver behaviors affect other components in mixed driving environments, especially in security- and safety-critical contexts when human errors are inevitable as well as uncover what humans need to know while driving alongside AVs. The team expects that the results will be significant for autonomous vehicle implementation and policymaking. </span></span></span></p> <p> </p> <p><span><span><strong><span>“Towards Building Cyber-Security Resilience in a COVID-Induced Virtual Workplace” </span></strong></span></span></p> <p><span><span><span>PI: Amitava Dutta; Co-PI: Pallab Sanyal, School of Business, George Mason University</span></span></span></p> <p><span><span><span>Before COVID-19 rocked our world, individuals and businesses were already increasing their online presence. The pandemic accelerated the speed forcing a change. People who were not comfortable in the online environment were made to go online and people who were already comfortable expanded their online presence to areas that they had previously conducted in person.</span></span></span></p> <p><span><span><span>“In short, COVID-19 has caused a shift from organizational ecosystems to a virtual workplace for employees, which has opened multiple vectors for cyberattacks,” says Amitava Duta, professor at the School of Business. “Our research focuses on the behavioral and organizational aspects of cybersecurity and is motivated by the ongoing transformations following the onset of the COVID-19 pandemic.”</span></span></span></p> <p><span><span><span>In their project, the team will investigate the significant changes in online behavior following the onset of the COVID-19 pandemic are. They expect their insights will help organizations build greater cyber-security resilience in a virtual workplace.  </span></span></span></p> <p><span><span><span>Because Washington, D.C. and Northern Virginia are home to prominent financial services organizations these businesses would have a strong interest in strengthening their cybersecurity posture to address its behavioral aspects. Soon, Amazon will also have a significant presence and retail online sales is another area frequently targeted by cybercriminals. If organizations would be willing to provide data on customer behavior on their website, the models developed from the team’s work could be refined and tailored for an important application domain.</span></span></span></p> <p> </p> <p><strong><span><span><span><span>“Characterizing and Countering User Security Fatigue in Password Enhancement through Deep Learning”</span></span></span></span></strong></p> <p><span><span><span>PI: Gerald Matthews, CHSS, George Mason University; Co-PIs: Giuseppe Anteniese and Daniel Barbará, CEC, George Mason University</span></span></span></p> <p><span><span><span>If you already have a demanding job, you might think maintaining security is an additional burden, and not keep up with cybersecurity best practices such as updating or changing your passwords. </span></span></span></p> <p><span><span><span>Professor Giuseppe Ateniese has designed a tool for enhancing password strength, based on a deep learning approach, but psychological factors may limit the adoption and impact of the tool. Everyone can be vulnerable to security fatigue and lax cybersecurity practices can have major societal consequences—threats to national security, financial losses to individuals and organizations, and invasion of privacy. </span></span></span></p> <p><span><span><span>Introducing security tools powered by Artificial Intelligence, when successful, will counteract typical human fallibilities and promote safety in computer systems across government, industry, and personal use. This project investigates the effect of security fatigue on the use of Anteniese’s tool. It will also explore strategies for mitigating fatigue and supporting user engagement. </span></span></span></p> <p><span><span><span>The team believes that enhancing employees' ability and motivation to maintain effective security protocols has immediate economic benefits and the research has the potential to suggest design features of security tools that can support commercialization as well as training protocols.</span></span></span></p> <p> </p> <p><span><span><span>“<strong>Enabling Invisible Security and Privacy for Resilient Human-Centric Cybersecurity Systems</strong>”</span></span></span></p> <p><span><span><span>PI: Eric Osterweil, CEC, George Mason University; Co-PI: Matt Canham, CHSS, George Mason University</span></span></span></p> <p><span><span><span>For decades, cryptography has been one of cybersecurity’s most essential tools. While its utility is certain, its complexity limits its use for non-experts. The result—non-experts fall prey to cybercriminals for many reasons including lack of knowledge, incorrect thought processes, and the inability to invest adequate time and resources to implement proper data protection.</span></span></span></p> <p><span><span><span>Eric Osterweil and his co-investigator Matt Canham hope to change that through their work with the CCI NoVa Node. “This project will seed a critical foundation for adaptive cybersecurity protections for human users’ end-to-end encryption (E2EE) needs. The results from this project will be used as foundations for enhancing a core staple of Internet communications (email) and future advances in prescriptive protections for Cybersecurity Threat Intelligence (CTI) information sharing,” says Osterweil. </span></span></span></p> <p><span><span><span>The CTI industry continues to grow, with companies, federal agencies, and international communities relying on CTI. In Virginia, where federal agencies and their partners routinely conduct transactions over email, this is especially true. Their view is that building human usable E2EE protections and extending those to adaptive CTI will be directly relevant to operational cybersecurity projects and needs throughout the industry and public sectors in Virginia. </span></span></span></p> <p><span><span><span>The pair believes that a key benefit to the Commonwealth will include course-related exposure of this material to the students at George Mason University. “Students will be able to showcase both the results of this work and their own derived qualifications to benefit their entry into local industry and jumpstart their ascension to professional careers,” says Osterweil. </span></span></span></p> <p><span><span> </span></span></p> <p><strong><span><span><span><span><span>"Characterizing Biases in Automated Scam Detection Tools for Social Media to Aid Individuals with Developmental Disabilities"</span></span> </span></span></span></strong></p> <p><span><span><span><span><span>PI: Hemant Purohit, CEC; Co-PIs: Géraldine Walther, CHHS; Matt Peterson, CHHS; YooSun Chung, CEHD </span></span></span></span></span></p> <p><span><span><span><span>Designers of scam detection tools often focus on improving the computational accuracy of the methods, especially those with state-of-the-art Natural Language Processing (NLP) and Machine Learning (ML)-based techniques, but their understanding of the diverse human behavior can be limited. This project aims to build a foundation for inclusive cybersecurity technologies to protect individuals with disabilities from online scams using a unique interdisciplinary collaborative approach between computing and non-computing researchers. </span></span></span></span></p> <p><span><span><span><span>Specifically, the team’s objective is to uncover the biases in the existing scam detection techniques for social media using NLP and ML methods. “We will conduct Eye Tracking analyses using a labeled scam dataset of social media posts from existing literature on online cybersecurity and study the differences between the attention patterns of individuals with and without developmental disabilities when perceiving scam posts,” says Hemant Purohit. </span></span></span></span></p> <p><span><span><span><span>The project hopes to gain insights that will support cybersecurity training development for reducing online fraud for individuals with special education needs. At the same time, the researchers want to identify limitations in automated scam detection tools and help create more effective cybersecurity tools that can protect user groups in our communities.   </span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class='field__items'> <div class="field__item"><a href="/taxonomy/term/181" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/1236" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/166" hreflang="en">Artificial Intellgence</a></div> <div class="field__item"><a href="/taxonomy/term/3156" hreflang="en">cryptography</a></div> <div class="field__item"><a href="/taxonomy/term/886" hreflang="en">coronavirus; covid-19</a></div> <div class="field__item"><a href="/taxonomy/term/876" hreflang="en">Social Media</a></div> <div class="field__item"><a href="/taxonomy/term/2531" hreflang="en">natural language processing</a></div> <div class="field__item"><a href="/taxonomy/term/86" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Wed, 26 Jan 2022 20:19:34 +0000 Martha Bushong 6931 at https://volgenau.sitemasonry.gmu.edu Professor uses tech to tackle social problems https://volgenau.sitemasonry.gmu.edu/news/2020-02/professor-uses-tech-tackle-social-problems <span>Professor uses tech to tackle social problems</span> <span><span lang="" about="/user/211" typeof="schema:Person" property="schema:name" datatype="">Nanci Hellmich</span></span> <span>Mon, 02/03/2020 - 14:13</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div > </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="2a270a75-bda4-4d34-901d-d9c46c0c7718" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><div class="block-feature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"><img src="https://content.sitemasonry.gmu.edu/sites/g/files/yyqcgq336/files/content-image/hemant-portrait for his story.jpg" alt="" /></div> </div> <div class="feature-image-caption"> <div class="field field--name-field-feature-image-caption field--type-text-long field--label-hidden field__item"> <p>Hemant Purohit, assistant professor in the Department of Information Sciences and Technology, is using technology and artificial intelligence to analyze social media messages. </p> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:basic" data-inline-block-uuid="0bf3ad89-2400-4292-854a-b2abe658d1f3" class="block block-layout-builder block-inline-blockbasic"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>Social media notifications flood our phones daily. Our feeds are filled with news, family updates, and ads, but these messages have untapped information that a <a href="https://volgenau.gmu.edu/" target="_blank">Mason Engineering</a> professor is mining using the power of technology and artificial intelligence (AI) to tackle social problems.</p> <p><a href="https://volgenau.gmu.edu/profile/view/11100" target="_blank">Hemant Purohit</a>, assistant professor of <a href="https://ist.gmu.edu/" target="_blank">information sciences and technology</a>, has been working with <a href="https://schar.gmu.edu/about/faculty-directory/bonnie-stabile" target="_blank">Bonnie Stabile</a> from the <a href="https://schar.gmu.edu/" target="_blank">Schar School of Policy and Government</a> for the last two years on their multidisciplinary research project to use AI techniques to look at the connection between social media and its impact on policy and law and the way people perceive misleading or misguided information on the web.</p> <p>“We address this problem of how policies to support women empowerment are undermined due to the way women, who are considered weak by the power in a society, are socially constructed negatively in online social spaces by people with potentially malicious intent,” says Purohit. “Like the Stanford swimmer sexual assault case where some people took a stand for the accused, and they were maliciously creating uncertainty about the survivor perhaps due to prior biased beliefs.”</p> <p>Purohit and Stabile wanted to see if one could recognize this social construction on the web and find the intent of the people doing it by translating this challenge into a computational problem of intent mining and employing state-of-the-art deep learning (AI) techniques.</p> <p>Purohit and his PhD student Rahul Pandey in collaboration with Stabile and her PhD student Aubrey Grant created a computational framework to collect, process, and analyze social media messages discussing rape or sexual assault topics using natural language understanding methods of AI.  They then categorized their data set of tweets into four categories based on intent: accusational, validational, sensational, and other, says Purohit.</p> <p>“We found that nearly half of 100,000 tweets referencing key terms associated with ‘rape’ and ‘deception’ were accusational, meaning that they blamed, disparaged, and disbelieved women reporting rape or sexual assault,” says Stabile.</p> <p>In comparison, only 12 percent of these tweets validated the victim, making accusational and negative tweets almost three times as prevalent, which Stabile and Purohit believe directly reflects an unfortunate reality of how social construction in online public conversations could influence the implementation and actual impact of policy and laws, given there are several strong policies and laws to curb gender violence and sexual assault.</p> <p>“We believe that this both reflects damaging portrayals of those who experience sexual assault and can serve to perpetuate such portrayals,” says Stabile. “Such evidence is critical in bringing attention to how women, the predominant victims of sexual assault and harassment, can be mischaracterized in ways that can disadvantage them when policy is made.”</p> <p>Purohit and Stabile have been working to combine their theoretical and computational expertise to tackle social issues and their work has been recognized at international forums.</p> <p>Their paper led by PhD student Rahul Pandey, “Distributional Semantics Approach to Detect Intent in Twitter Conversations on Sexual Assaults,” won the best paper award at the 2018 IEEE/WIC/ACM International Conference on Web Intelligence hosted in Santiago, Chile. They recently published a journal article entitled, “She Lied: Social Construction, Rape Myth Prevalence in Social Media and Sexual Assault Policy.”</p> <p>“We will continue to explore other application areas of policy and laws where we could take our multidisciplinary research approach to study the online social media and web spaces with theoretically-inspired computational methods,” says Purohit. “We are currently exploring hate speech on social media platforms and how to detect and mitigate that, again given the fact that there are already many policies and laws to prevent this phenomenon."</p> </div> </div> </div> </div> Mon, 03 Feb 2020 19:13:44 +0000 Nanci Hellmich 5121 at https://volgenau.sitemasonry.gmu.edu