Socially engineered attacks aim to steal private information by deceiving technology users in order to obtain information. Many security professionals see technology users within companies as an IT security problem when in fact, they may be part of the solution. With proper training and implementation, users can serve as part of the solution by providing the last layer of protection against socially engineered attacks.
Building the Human Firewall
Iron Biofortified Foods and Supplements
Several studies have been conducted to test the efficacy of iron biofortified foods and supplements. Researchers want to know if this supplemental iron can significantly increase iron levels in those who are unable to maintain a diet with sufficient iron.
Dogs and Families in a Northern Plains Tribe
Free-roaming dogs, often in large numbers, are a common phenomenon on many American Indian reservations. This collaborative research project focused on the relationship between families and dogs, both at home and in the community.
Bias Mitigation with Digital Games
Although there is a lot of evidence documenting the existence of cognitive bias in decision making, we do not know much about our ability to mitigate these biases. Cognitive biases are so natural and ingrained, overcoming them is extremely difficult. Thus, the prime objective of this project is to explore an innovative approach to using game-based learning to not only help make us aware of our cognitive biases, but also prompt us to overcome our reliance on simple heuristics.
Ideological Website Communication
Ideological groups have found the internet a useful place to promote particular ideologies, recruit new group members, and exert influence in political, social, and religious domains. Some of these groups are extreme, sanctioning or promoting violence in order to further their ideologies. This research examines characteristics of violent and non-violent ideological websites. Additionally, through the creation of realistic but fictional ideological group websites, we manipulated various features of credibility, persuasion tactics, website interactivity, and violence to examine the casual impact of these features on emotions, attitudes, and behavioral intentions.