Brown Bag Lunch Schedule: Difference between revisions
Line 53: | Line 53: | ||
<div class="mw-collapsible-content"> | <div class="mw-collapsible-content"> | ||
<b>Abstract:</b> Accurately modeling human decision-making in security is critical to think about when, why, and how to recommend that users adopt certain secure behaviors. We used behavioral economics experiments to model the rationality of end-user security decision-making in a realistic online experimental system simulating a bank account. We ask participants to make a financially impactful security choice, in the face of transparent risks of account compromise and benefits offered by an optional security behavior (two-factor authentication). We find that more than 50% of our participants made rational (e.g., utility optimal) decisions, and we find that participants are more likely to behave rationally in the face of higher risk. Additionally, we confirm that users are boundedly rational: they make decisions based on some risks and context, but not others, and we can model their behavior well as a function of these factors. Finally, we show that a “one-size-fits-all” emphasis on security can lead to market losses, but that adoption by a subset of users with higher risks or lower costs can lead to market gains. | <b>Abstract:</b> Accurately modeling human decision-making in security is critical to think about when, why, and how to recommend that users adopt certain secure behaviors. We used behavioral economics experiments to model the rationality of end-user security decision-making in a realistic online experimental system simulating a bank account. We ask participants to make a financially impactful security choice, in the face of transparent risks of account compromise and benefits offered by an optional security behavior (two-factor authentication). We find that more than 50% of our participants made rational (e.g., utility optimal) decisions, and we find that participants are more likely to behave rationally in the face of higher risk. Additionally, we confirm that users are boundedly rational: they make decisions based on some risks and context, but not others, and we can model their behavior well as a function of these factors. Finally, we show that a “one-size-fits-all” emphasis on security can lead to market losses, but that adoption by a subset of users with higher risks or lower costs can lead to market gains. | ||
<br> | <br> | ||
<b>Bio:</b> Elissa Redmiles is a Ph.D. student at the University of Maryland in Computer Science. Her research focuses on using computational and social science methodologies to understand and improve users' privacy and security learning processes, behavior, and perceptions. She is the recipient of an NSF Graduate Research Fellowship, a National Science Defense and Engineering Graduate Fellowship, and a Facebook Fellowship. Prior to pursuing her Ph.D., Elissa held Marketing Management and Software Engineering roles at IBM and was a Data Science for Social Good Fellow at the University of Chicago. | <b>Bio:</b> Elissa Redmiles is a Ph.D. student at the University of Maryland in Computer Science. Her research focuses on using computational and social science methodologies to understand and improve users' privacy and security learning processes, behavior, and perceptions. She is the recipient of an NSF Graduate Research Fellowship, a National Science Defense and Engineering Graduate Fellowship, and a Facebook Fellowship. Prior to pursuing her Ph.D., Elissa held Marketing Management and Software Engineering roles at IBM and was a Data Science for Social Good Fellow at the University of Chicago. |
Revision as of 21:58, 6 February 2018
The HCIL has an open, semi-organized weekly "brown bag lunch (BBL)" every Thursday from 12:30-1:30pm in HCIL (2105 Hornbake, South Wing). The topics range from someone's work, current interests in the HCIL, software demos/reviews, study design, proposed research topics, introductions to new people, etc. The BBL is the one hour a week where we all come together--thus, it’s a unique time for HCIL members with unique opportunities to help build collaborations, increase awareness of each other’s activities, and generally just have a bit of fun together. There is no RSVP; simply show up!
If you would like to give or suggest a talk, presentation, workshop, etc., send an email to BBL student co-coordinators Sriram Karthik Badam (sbadam@umd.edu) or Pavithra Ramasamy (pavithra.ramasamy94@gmail.com). In the email, briefly describe the topic and preferred dates.
To be notified about upcoming events, please subscribe one of these mailing lists.
Spring 2018 Schedule
Date | Leader | Topic |
---|---|---|
01/25/2018 |
Kickoff to a new Semester! |
Expand
Come, network, make introductions, and share what you are working on |
02/01/2018 |
Bahador Saket
|
Expand
Visualization by Demonstration |
02/08/2018 |
Elissa Redmiles
|
Expand
Dancing Pigs or Security? Measuring the Rationality of End-User Security Behavior
|
02/15/2018 |
Erin Peters-Burton
|
Expand
TBD
|
02/22/2018 |
Norman Su
|
Expand
TBD |
03/01/2018 |
Ya-Wei Li
|
Expand
TBD |
03/08/2018 |
Deok Gun Park
|
Expand
TBD |
03/15/2018 |
TBA |
Expand
TBD |
03/22/2017 | No Brown Bag, Spring Break. | |
03/29/2018 |
Eun-Kyoung Choe
|
Expand
TBD
|
04/05/2018 |
TBA |
Expand
TBD |
04/12/2018 |
CHI practice talks |
Expand
TBD |
04/19/2018 |
TBA |
Expand
TBD
|
04/26/2018 |
Hernisa Kacorri
|
Expand
TBD
|
05/03/2018 |
Amanda Lazar
|
Expand
TBD
|
05/10/2018 |
Joel Chan
|
Expand
TBD
|
05/17/2018 |
TBA |
Expand
TBD |
Past Brown Bags
View the Past Brown Bag Lunch Schedules to learn more about prior talks.