Congrats to Jason for successfully defending! Best of wishes as he heads out to California to work at FXPAL for a year, before starting as an assistant professor at University of Utah.
Our paper, Increasing Security Sensitivity With Social Proof, received an honorable mention in the NSA's 3rd Annual Best Scientific Cybersecurity Paper Competition.
Our team's work on social cybersecurity was mentioned in the Financial Times. New word learned too: anorak.
Congratulations to Eiji Hayashi for passing his oral defense! His work is entitled UniAuth: Building a Human-Centered Identity Management System.
Our group has two papers that will appear at CSCW 2015. The first is “You Never Call, You Never Write”: Call and SMS Logs Do Not Always Indicate Tie Strength. The second is The Role of Social Influence In Security Feature Adoption
We presented some of our ongoing work on analyzing the privacy of smartphone apps to a packed room of Congressional staffers in Washington, DC. Slides for the talk, entitled How to Analyze the Privacy of 1 Million Smartphone Apps, are available online.
Congrats to Shahriyar Amini for completing his PhD. His dissertation was entitled: Analyzing Mobile App Privacy Using Computation and Crowdsourcing.
Congratulations to Sauvik Das and Gierad Laput on winning the annual Qualcomm Innovation Fellowship. Their project was Everyday Objects for Physical Space Authentication.
"[A] team at Carnegie Mellon University has been looking at how to use smartphone data to predict the onset of depression by modelling changes in sleep behaviours and social relationships over time. In another example, the Livehoods project, large quantities of geotagged data created by people’s smartphones (using software such as Instagram and Foursquare) and crawled from the Web have allowed researchers to understand the patterns of movement through urban spaces."
Our team has a paper presented at USEC 2014 on how developers deal with privacy and security issues when creating apps. See the full paper here.
Congratulations to Jialiu Lin for finishing her PhD. Her dissertation was entitled: Understanding and Capturing People's Mobile App Privacy Preferences
Sauvik Das and Eiji Hayashi's paper, Exploring Capturable Everyday Memory For Autobiographical Authentication, won a best paper award at Ubicomp 2013 in Zurich, Switzerland.
The CHIMPS Lab spent Saturday whitewater rafting on the Youghiogheny River at Ohioplye, PA. Despite the challenging rapids and rocks on the river, we made it through the river without capsizing and losing a man overboard. It was a fun and exciting time for the lab relying on coordination and collaboration to get through the tumultuous river.
We have three papers recently accepted.
At Mobile HCI 2013, we have Investigating Collaborative Mobile Search Behaviors.
At Ubicomp 2013, we have Memorability of the Mundane: Exploring Capturable Everyday Memory for Autobiographical Authentication.
At KDD 2013, we have Why People Hate Your App — Making Sense of User Feedback in a Mobile App Store
Sauvik's work on self-censorship on Facebook is featured on The Atlantic's web site. Here's a link to Sauvik's forthcoming ICWSM 2013 paper.
Congratulations to Guang Xiang for finishing his PhD. His dissertation was entitled: Toward a Phish Free World: A Feature-type-aware Cascade Learning Framework for Phish Detection.
Our team was recently awarded a Google Research Award on "CrowdScanning: Combining Crowdsoucring, Static Analysis, and Dynamic Analysis to Improve Mobile App Privacy and Security".
Jason Hong was recently interviewed on CBS Morning Show about smartphone app privacy, talking about several surprising behaviors about these apps.
Congratulations to Polo Chau for being awarded SCS Dissertation Award Honorable Mention for his work "Data Mining Meets HCI: Making Sense of Large Graphs".
Happy congratulations and sad farewells as Polo Chau moves on to a new position at Georgia Institute of Technology. Best of luck Polo!
National Science Foundation has funded our research grant entitled Capturing People’s Expectations of Privacy with Mobile Apps by Combining Automated Scanning and Crowdsourcing Techniques. This work is a joint collaboration with Joy Zhang at CMU Silicon Valley and Janne Lindqvist at Rutgers University.
Our paper "A Supervised Approach to Predict Company Acquisition with Factual and Topic Features Using Profiles and News Articles on TechCrunch", published at ICWSM'12, is reported by TechCrunch. TechCrunch is a leading technology media property dedicated to obsessively profiling startups, reviewing new Internet products, and breaking tech news.
Our paper is downloadable at http://www.cs.cmu.edu/~guangx/papers/icwsm12-short.pdf, and the TechCrunch article reporting us can be found at http://techcrunch.com/2012/06/30/thanks-science-new-study-says-crunchbase-is-an-information-treasure-trove/
The [livehoods.org](livehoods.org) site is now public. Our vision is to re-imagine how cities work in the age of social media. Specifically, we've analyzed and clustered 18m Foursquare checkins to understand how people use a city. We currently have maps for New York City and Pittsburgh. San Francisco will be out soon.
Two of our submissions were accepted to ICWSM 2012
A Supervised Approach to Predict Company Acquisition With Factual and Topic Features Using Profiles and News Articles on TechCrunch (accepted as a poster)
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City (accepted as a full paper)
Congrats to Guang and to Justin
Jason Wiese was named as a finalist for the 2012 Facebook Fellowship, congrats to Jason.
JasonH's survey article of phishing attacks was recently published in the Communications of the ACM.
Phishing is a kind of social-engineering attack in which criminals use spoofed email messages to trick people into sharing sensitive information or installing malware on their computers. Victims perceive these messages as being associated with a trusted brand, while in reality they are only the work of con artists. Rather than directly target the systems people use, phishing attacks target the people using the systems. Phishing cleverly circumvents the vast majority of an organization's or individual's security measures. It doesn't matter how many firewalls, encryption software, certificates, or two-factor authentication mechanisms an organization has if the person behind the keyboard falls for a phish.