- Privacy, Security, and Data Protection
- Information and Cyber Security
- Spam and Phishing Detection
- Advanced Malware Detection Techniques
- User Authentication and Security Systems
- FinTech, Crowdfunding, Digital Finance
- Open Source Software Innovations
- Wikis in Education and Collaboration
- Personal Information Management and User Behavior
- Knowledge Management and Sharing
- Digital Marketing and Social Media
- Microfinance and Financial Inclusion
- Social Media and Politics
- Impact of Technology on Adolescents
- Blockchain Technology Applications and Security
- Internet Traffic Analysis and Secure E-voting
- Innovative Human-Technology Interaction
- Auction Theory and Applications
- Sharing Economy and Platforms
- Information Retrieval and Search Behavior
- Recommender Systems and Techniques
- Mobile Crowdsensing and Crowdsourcing
- Experimental Behavioral Economics Studies
- Game Theory and Applications
- Online and Blended Learning
University of Wisconsin–Madison
2025
Michigan State University
2013-2022
University of Michigan
1993-2011
Home computer systems are insecure because they administered by untrained users. The rise of botnets has amplified this problem; attackers compromise these computers, aggregate them, and use the resulting network to attack third parties. Despite a large security industry that provides software advice, home users remain vulnerable. I identify eight 'folk models' threats used decide what use, which expert advice follow: four conceptualizations 'viruses' other malware, 'hackers' break into...
A consistent theoretical and practical challenge in the design of socio-technical systems is that motivating users to participate contribute them. This study examines case Everything2.com from perspectives Uses Gratifications Organizational Commitment compare individual versus organizational motivations user participation. We find evidence may continue a site for different reasons than those led them site. Feelings belonging are important both anonymous registered across types uses....
Non-expert computer users regularly need to make security-relevant decisions; however, these decisions tend not be particularly good or sophisticated. Nevertheless, their choices are random. Where does the information come from that non-experts base upon? We argue much of this comes stories they hear other people. conducted a survey ask open- and closed- ended questions about security people others. found most have learned lessons incidents informally family friends. These impact way think...
Crowdfunding websites like Kickstarter, Spot.Us and Donor's Choose seek to fund multiple projects simultaneously by soliciting donations from a large number of donors. site designers must decide what do with that don't reach their goal the deadline. Some crowdfunding sites use an all-or-nothing return rule in which are returned donors if project doesn't meet its goal. Other direct donation structure where all kept even total is insufficient. We simulated using threshold public goods game set...
Crowdfunding systems are social media websites that allow people to donate small amounts of money add up fund valuable larger projects. These structured around projects: finite campaigns with well-defined goals, end dates, and completion criteria. We use a dataset from an existing crowdfunding website --- the school charity Donors Choose understand value completing find project is important act leads donations (over twice as large), greater likelihood returning again, few projects expire...
Social network games embedded within social sites (SNSs) such as Facebook facilitate play with "Friends" the SNS. In this study, we look at different dimensions of how game contributes to relationship initiation and development using qualitative data collected from adult users (N=18). Our suggest that interpersonal motivations are a primary driver initial while doesn't direct interaction, participants perceived indirect interaction sharing game-based content was useful in maintaining even...
Installing security-relevant software updates is one of the best computer protection mechanisms. However, users do not always choose to install updates. Through interviewing non-expert Windows users, we found that frequently decide future updates, regardless whether they are important for security, after negative experiences with past This means even non-security (such as user interface changes) can impact security a computer. We discuss three themes impacting users' willingness updates:...
Computer users have access to computer security information from many different sources, but few people receive explicit training. Despite this lack of formal education, regularly make important decisions, such as “Should I click on potentially shady link?” or enter my password into form?” For these much knowledge comes incidental and informal learning. To better understand differences in the security-related available for learning, we compared three sources information: news articles, web...
Humans represent one of the most persistent vulnerabilities in many computing systems. Since human users are independent agents who make their own choices, closing these means persuading to different choices. Focusing on specific choice -- clicking a link phishing email we conducted an experiment identify better ways train more secure decisions. We compared traditional facts-and-advice training against that uses simple story convey same lessons. found surprising interaction effect: works...
Over 80 million households in the United States have a home computer and an Internet connection. The vast majority of these are administered by people who little security knowledge or training, many users try to avoid making decisions because they feel don't skills maintain proper security. Nevertheless, still make security-related on regular basis -- for example, whether not click shady link email message without even knowing that's what doing. Their guided how think about security, their...
Crowdfunding sites often impose deadlines for projects to receive their requested funds. This deadline structure creates a difficult decision potential donors. Donors can donate early project help it reach its goal and signal other donors that the is worthwhile. But may also want wait similar from others. We conduct an experimental simulation of crowdfunding website explore how make this decision. find evidence both strategies in our experiment; some while others till last second. However,...
Crowdfunding, the request of resources through social media, has generated much discussion in popular press; however, there have been few systematic empirical studies this growing phenomenon. We bring together leading HCI researchers crowdfunding and crowdsourcing to discuss potentially transformative socio-technical innovation that may advance (or harm) human capabilities innovate collaborate. will current research on future field from diverse perspectives including computer science,...
Phishing scam emails are that pretend to be something they not in order get the recipient of email undertake some action normally would not. While technical protections against phishing reduce number received, perfect and remains one largest sources security risk technology communication systems. To better understand cognitive process end users can use identify messages, I interviewed 21 IT experts about instances where successfully identified as their own inboxes. naturally follow a...
Collaborative tagging systems have the potential to produce socially constructed information organization schemes. The effectiveness of tags for finding and re-finding depends upon how individual users choose tags; however, influences on users' tag choices are poorly understood. We quantitatively test competing hypotheses from literature concerning these choices, using data del.icio.us (a collaborative system organizing web bookmarks) a computer model possible choice strategies. find...
It is common for researchers to use self-report measures (e.g. surveys) measure people's security behaviors. In the computer community, we don't know what behaviors people understand well enough accurately, or how those self-reports correlate with actually do. a six week field study, collected both behavior data and survey responses from 122 subjects. We found that relatively small number of -- mostly related tasks require users take specific, regular action have non-zero correlations. Since...
Abstract If communication involves some transactions cost to both sender and recipient, what policy ensures that correct messages -- those with positive social surplus - get sent? Filters block harm recipients but benefit senders by more than costs. Taxes can value messages, allow harmful through. In contrast, we propose an ``Attention Bond,'' allowing define a price must risk deliver the initial message.The underlying problem is first-contact information asymmetry negative externalities....
Fledgling online communities often hope to achieve critical mass so that the community becomes sustainable. This concept however is not well understood. At what point does a mass, and how know this? Furthermore, become sustainable when they of what? We explore this question by analyzing growth in large number on Wikipedia. find individual have different patterns membership from its pattern contribution or production. also early stages development, building has greater impact production...
Abstract Users of social computing websites are both producers and consumers the information found on site. This creates a novel problem for web‐based software applications: how can website designers induce users to produce that is useful others? We study this question by interviewing bookmarking del.icio.us. find in our sample, metadata reflecting who bookmarked webpage better supports seeking than free‐form keyword (tags). explain finding describing differences way design del.icio.us...