Past CAST Research Projects
Investigation and Testing of Cybersecurity - Protective Relay
Mohd Hasan Ali, Dipankar Dasgupta
The signals and commands used for remote monitoring and control of power distribution grids can be vulnerable to hackers, resulting in the loss or delay of data critical to efficient grid operation. Drs. Ali and Dasgupta are leading a team to explore this security threat and to develop a protective relay system that can prevent cyber attacks. “The relay technology we develop will help transform our existing power grids into future smart grids that are resilient and reliable,” Dr. Ali says.
Automated Document Classification - Sensitive Information Disclosure
Zhuo Lu, Su Chen
In today’s information systems, data documents are generated every day in large volumes. There is a growing need to ensure that sensitive information for government and business operations are classified correctly, properly secured, and disseminated only to people with the proper security clearance. With so much data being generated, manual classification of documents has become a huge burden. That, in turn, prevents efficient data processing and management, increases the chance of human error, and increases risk. Drs. Lu and Chen are developing a new, automated approach to security classification of government and business documents using statistical models, big data analytics, and cyber security technologies. With their new approach, they hope to not only make classified documents more secure but also streamline the entire classification process.
Technology Dependency Perspectives on Cybersecurity Failures
Thomas Stafford, Sanderford Schaeffer
Understanding human behavior is critical to the success of cyber security–related warnings. Drs. Stafford and Schaeffer have teamed up to study the effect fear-inspiring messages have on Internet users, ones that warn of likely consequences from not engaging in pro-security behaviors. According to Dr. Stafford, people take their computer safety for granted. They generally expect that the technology they use will protect them. “They are wrong,” he says. “The confluence of social media, artificial intelligence, and quantum computing will present new and unexpected threats to personal computing security, so a vigilant mindset to computer use is ever more important as we move forward.” The researchers are conducting their study in a special neuro cognitive lab that allows them to watch how people react to their computers and security threats and gather information they could not obtain from traditional surveys.
The Effects of Gamification on Security Compliance
Bill Kettinger, Chen Zhang, Ruby Booth
How can companies ensure that their employees comply with security rules and regulations? Drs. Kettinger, Zhang, and Lee think making a game of it might be just the answer. They are looking at how “gamification,” the use of game-inspired techniques, influences security compliance among employees. Traditional security awareness training offered by organizations can be boring and tends to have only a short-term effect on employees’ behavior, according to Kettinger. “We believe our research will show that gamification is a more fun and engaging way to improve security awareness and compliance,” he says, “and it will have a more sustainable and long-term effect.”
Exploring a Data-Centric Approach to Securing Smart Homes
Lan Wang
Investigating Characteristics of Cyberbullying in Higher Education
Mitsunori Misawa
Cybersecurity Employment Pipelines: Successful Paths to Careers in Cybersecurity
Judy Simon, Sandi Richardson, Ruby Booth
Criminology and Cyber Security Dimensions of Public Health in Urban Environments
Marian Levy, Andy Kitsinger, Debra Bartelli, KB Turner
Privacy Data Impact on Retail Consumers and Suppliers
George Deitz, Mohammed Amini
Cloud Computing Security and Privacy Assessment
Sajjan Shiva
Security Online - Healthcare Communities
Naveen Kumar, Deepak Venugopal, Robin Poston, Dipankar Dasgupta
Cognitive Neuroscience - Security Behaviors in Information Security Contexts
Thomas Stafford, George Deitz