October is Cybersecurity Awareness Month.Researchers at the betboom dacha dubaiat Michigan State Universityare working ondifferentways to advanceawareness and protection as it relates topeople’s activity online.
Astechnologies are increasingly embedded in many aspects of our daily lives,it’s important to protect“the technologies we use from people who want to abuse, misuse or disrupt them,” saidRick Wash, associate professor inthe Department of Media andInformation.“Research on betboom awareness helps us to come up with new and effective means to make technology safer and more reliable.”
Following are some of the centersthatfocus onaspectsofcybersecurity.
Following are some of theComArtScifaculty who doresearchon betboom. Click through to their profiles to learn more about their research, awards and grants.
Johannes M betboom:QuelloChair in betboom and Information Policy
Linkstoresearch:
- Using machine learning to examine cyberattack motivations on web defacement data
- An exploratory analysis of the characteristics of ideologically motivated cyberattacks
- Economics of betboom
- Economics of Fighting Botnets: Lessons from a Decade of Mitigation
- Enhancing incentives for internet betboom
- betboom: Stakeholder incentives, externalities, and policy options
- Emerging Threats to Internet betboom: Incentives, Externalities and Policy Implications
Ruth betboom:Assistant Professor, Director ofMediaandInformation Master's Program
Links toresearch:
- An exploratory analysis of the characteristics of ideologically motivated cyberattacks
- betboom capacity building: cross-national benefits and international divides
- Information Policy, Privacy Failings, and Steps Towards Empowerment in Cases of Technology-Facilitated Sexual Violence
- Online safety begins with you and me: Convincing Internet users to protect themselves
- betboom Capacity: Does It Matter?
- Multiple sources for betboom: seeking online safety information and their influence on coping self-efficacy and protection behavior habits
- Talking about online safety: A qualitative study exploring the betboom learning process of online labor market workers
- An exploratory analysis of the characteristics of ideologically motivated cyberattacks
- betboom capacity building: cross-national benefits and international divides
- Building the betboom Capacity of Nations
- Supporting a betboom mindset: getting internet users into the cat and mouse game
RickWash: Associate Professor,Mediaand Information
Links toresearch:
- How Non-Experts Try to Detect Phishing Scam Emails
- How Experts Detect Phishing Scam Emails
- Knowledge and Capabilities that Non-Expert Users Bring to Phishing Detection
- Prioritizing betboom over usability: Strategies for how people choose passwords
- Do Stories Help People Adopt Two-factor Authentication?
- Who Provides Phishing Training? Facts, Stories, and People Like Me
- Can People Self-Report betboom Accurately? Agreement Between Self-Report and Behavioral Measures
- Human Interdependencies in betboom Systems
- Understanding Password Choices: How Frequently Entered Passwords are Re-used Across Websites
- Identifying Patterns in Informal Sources of betboom Information
- Out of the Loop: How Automated Software Updates Cause Unintended betboom Consequences
- Too Much Knowledge? betboom Beliefs and Protective Behaviors Among US Internet Users
- Computer betboom Information in Stories, News Articles, and Education Documents
- Mental Models of Software Updates
- Betrayed By Updates: How Negative Experiences Affect Future betboom
- Helping You Protect You
- Folk betboom
- Stories as Informal Lessons About betboom
- Influencing Mental Models of betboom
- Folk Models of Home Computer betboom
EmileeRader: Associate Professor,Mediaand Information
Links to betboom:
- Knowledge and Capabilities that Non-Expert Users Bring to Phishing Detection
- Prioritizing betboom over usability: Strategies for how people choose passwords
- Stories as Informal Lessons About betboom
- Betrayed By Updates: How Negative Experiences Affect Future betboom
- Too Much Knowledge? betboom Beliefs and Protective Behaviors Among US Internet Users
- Identifying Patterns in Informal Sources of betboom Information
- Understanding Password Choices: How Frequently Entered Passwords are Re-used Across Websites
- Can People Self-Report betboom Accurately? Agreement Between Self-Report and Behavioral Measures
- Most Americans don’t realize what companies can predict from their data
- I Have a Narrow Thought Process: Constraints on Explanations Connecting Inferences and Self-Perceptions
- Digital Privacy