Costello Research Cybersecurity / en The NYPD gave officers iPhones. Here’s what we learned about race and policing /news/2024-06/nypd-gave-officers-iphones-heres-what-we-learned-about-race-and-policing <span>The NYPD gave officers iPhones. Here’s what we learned about race and policing</span> <span><span>Jennifer Anzaldi</span></span> <span><time datetime="2024-06-04T12:50:43-04:00" title="Tuesday, June 4, 2024 - 12:50">Tue, 06/04/2024 - 12:50</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/bgreenwo" hreflang="en">Brad Greenwood</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">The controversy about biased policing seems to draw endless fuel from race-based differences in public perception. Simply put, the vast majority of White citizens in the United States believe the police are doing a good job, including on issues of racial equality, while a similar percentage of Black citizens </span><a href="https://www.pewresearch.org/social-trends/2016/09/29/the-racial-confidence-gap-in-police-performance/#wide-racial-gaps-in-views-of-police-performance" title="Learn more."><span class="intro-text">hold the opposite opinion</span></a><span class="intro-text">. And while a growing number of studies have indicated persistent patterns of racial discrimination in policing, an emergent concern among scholars is that the data these papers rely on are also subject to baked-in biases, since they often derive from officers’ self-reports of their own behavior.</span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2023-05/brad-greenwood.jpg?itok=Tr3bfzzH" width="350" height="350" alt="Brad Greenwood" loading="lazy"> </div> </div> <figcaption>Brad Greenwood</figcaption> </figure> <p>Enter <a href="https://business.gmu.edu/profiles/bgreenwo" title="Learn more.">Brad Greenwood</a>, professor of information systems and operations management at the <a href="https://business.gmu.edu/" title="Costello College of Business | 鶹Ƶ">Donald G. Costello College of Business</a> at 鶹Ƶ. One of his research interests lies in how digital technologies are bringing unprecedented transparency to police practices. For example, Greenwood’s 2022 paper documented how the introduction of body-worn cameras for the New York Police Department (NYPD) resulted in a significant reduction in abuse-of-authority complaints.&nbsp;<br><br>His latest work on policing is forthcoming in <em>Proceedings of the National Academy of Sciences</em>. Along with Gordon Burtch from Boston University and Jeremy Watson from the University of Minnesota, Greenwood examined the recent rollout of iPhones across the NYPD, which included a series of digital tools designed to replace the handwritten memo books officers previously relied on. Instead of scribbling in the physical books, which NYPD officers were required to hang onto even into retirement, officers could log their activities directly into a centralized database maintained by the NYPD. These detailed digital records shed fresh light on how cops spend their time—and attention—on the beat.&nbsp;<br><br>The researchers tracked data on NYPD stops and complaints in 2017 and 2018, the period when iPhones were being rolled out across precincts in New York City. A curious pattern emerged. There was an 18% increase in reported stops after a precinct received iPhones, which would be consistent with the digital tools making it easier for officers to report a citizen interaction. Further, the researchers discovered that this increase resulted in neither more arrests nor more complaints from the public. It wasn’t, therefore, that the phones were somehow causing the police to stop people more often, but rather that so-called “unproductive stops”—those leading to no further action—were being reported more often.<br><br>However, when breaking the results down across White and non-White citizens, the researchers found that unproductive stops involving non-White citizens were entirely responsible for the increase. In other words, the observed changes were based on police encounters with non-White members of the public, that would likely have gone unreported in the days of pen and paper. More specifically, after switching to the smartphone system, officers logged 22% more stops involving non-White citizens, while the number of reported stops of White citizens remained unchanged. These are statistical averages—the pattern was more marked in high-crime neighborhoods and those with a greater proportion of non-White residents.<br><br>Greenwood offered an interpretation of the finding: “The concern here is that we have an underreporting, which is concentrated in certain groups and means that we need to be cautious when interpreting prior work. On the one hand, it opens the door to bias in police interactions with civilians being worse than initially anticipated, at least based on the frequency of stops. On the other hand, it could mean that older data doesn’t accurately reflect the likelihood of an arrest once a stop occurs. And we need to be doubly cautious, because we don’t know if officers are reporting stops more frequently just because it is easier, or for some other reason.”&nbsp;<br><br>Greenwood cautions against making sweeping conclusions based on the study. “The only thing we know for sure is that more and deeper work is needed by scholars and policy makers to ensure transparency between law enforcement and the people they are charged to protect,” he said.</p> <p>On the whole, however, the study raises the possibility that race-based disparities in policing are not only very real, but may have been underestimated thus far because of reporting gaps.<br><br>As police officers are not obligated to document all civilian interactions, their decisions regarding what—and what not—to report can be biased. The introduction of new technology, as in the case of the NYPD, can help counter such biases, but is not the only avenue worth pursuing. The researchers recommend that police departments “investigate the appropriate organizational complements (i.e., policies and procedures) necessary to uncover and eliminate such biases.”</p> <p><br>&nbsp;</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/21026" hreflang="en">A.I. &amp; Innovation - Costello</a></div> <div class="field__item"><a href="/taxonomy/term/21021" hreflang="en">ESG - Costello</a></div> <div class="field__item"><a href="/taxonomy/term/20911" hreflang="en">Costello Research ICT</a></div> <div class="field__item"><a href="/taxonomy/term/21091" hreflang="en">Costello Research Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/20921" hreflang="en">Costello Research Data Analytics</a></div> <div class="field__item"><a href="/taxonomy/term/20916" hreflang="en">Costello Research Digital Platforms</a></div> <div class="field__item"><a href="/taxonomy/term/12501" hreflang="en">Costello College of Business News</a></div> <div class="field__item"><a href="/taxonomy/term/13796" hreflang="en">Costello College of Business Faculty Research</a></div> <div class="field__item"><a href="/taxonomy/term/13131" hreflang="en">ISOM Faculty Research</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/20301" hreflang="en">impact fall 2024</a></div> </div> </div> </div> </div> </div> Tue, 04 Jun 2024 16:50:43 +0000 Jennifer Anzaldi 112411 at George 鶹Ƶ faculty are tackling cybersecurity’s talent pipeline problem /news/2024-05/george-mason-faculty-are-tackling-cybersecuritys-talent-pipeline-problem <span>George 鶹Ƶ faculty are tackling cybersecurity’s talent pipeline problem</span> <span><span>Jennifer Anzaldi</span></span> <span><time datetime="2024-05-10T13:01:06-04:00" title="Friday, May 10, 2024 - 13:01">Fri, 05/10/2024 - 13:01</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">If you’re a cybercriminal, the latest news on cybersecurity talent shortfalls should put a smile on your face. For example, </span><a href="https://www.isaca.org/-/media/files/isacadp/project/isaca/resources/infographics/isaca_state_of_cyber_2023_global_infographic_final.pdf"><span class="intro-text">the majority of cybersecurity leaders report</span></a><span class="intro-text"> that their teams are understaffed, and they have problems retaining qualified professionals.</span><br><br>But for <a href="https://business.gmu.edu/profiles/nmenon">Nirup Menon</a>, a 鶹Ƶ professor of information systems and operations management (ISOM), and <a href="https://business.gmu.edu/profiles/bngac">Brian Ngac</a>, an instructor in the ISOM area, this workforce challenge is a golden career opportunity for the young people of Northern Virginia and the Washington, D.C., area.</p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-05/ngac_and_menon_golf_600x600.jpg?itok=iRijGNjV" width="350" height="350" alt="Nirup Menon and Brian Ngac" loading="lazy"> </div> </div> <figcaption>Nirup Menon and Brian Ngac</figcaption> </figure> <p>The pair recently won a two-year award from the <a href="https://www.nist.gov/">National Institute of Standards and Technology</a> (NIST), an agency within the U.S. Department of Commerce, to create unique experiential learning opportunities and workshops designed to enhance cybersecurity education and workforce development.<br><br>Working closely with industry partners <a href="https://mobius-llc.com/">Mobius Consulting</a> and <a href="https://www.ida.org/">Institute for Defense Analyses (IDA)</a>, Menon and Ngac will recruit and help select students to work on actual cybersecurity projects. “They need to have taken some fundamental cyber class ahead of time,” Menon clarifies. “We want students with a commitment to the field. It allows you to get experience but it’s also competitive.”<br><br>Throughout the 12-week projects, students will receive mentoring both from the industry participant and from business faculty. “We run it in an agile scrum-like manner,” Ngac says. “Every week, we ask ‘What did you do?’ ‘What are you going to do?’ ‘What are the challenges that are impacting your work?’” If students run into trouble, faculty mentors can work with industry managers to help them get back on track.<br><br>“We’re trying to build not just the cyber workforce but the skills as well,” Ngac says.<br><br>Menon and Ngac have developed a specialty in this type of hands-on learning, which they have dubbed the Professional Readiness Experiential Program (PREP). More than 100 Virginia-based undergraduates and 20 industry participants have participated in PREP, which includes projects funded by two <a href="https://cyberinitiative.org/">Commonwealth Cybersecurity Initiative</a>&nbsp;Experiential Learning grants in collaboration with Mobius and IDA.&nbsp;<br><br>“PREP not only focuses on cybersecurity projects, but also works on many business process improvement projects,” says Ngac. "Honors and high-performing ISOM students work on real-world projects with industry participants on identifying technical solutions to business challenges through rigorous research, modelling, analysis, quantification, risk management, implementation planning, and, at times, execution.”<br><br><span lang="EN-SG">The NIST award also incorporates workshops for students who are new to cybersecurity but interested in exploring it as a career option. Workshops will be launched in collaboration with&nbsp;</span><a href="https://www2.trinitydc.edu/" target="_blank" title="Trinity Washington University"><span lang="EN-SG">Trinity Washington University</span></a><span lang="EN-SG">&nbsp;(TWU), a PBI (predominantly black institution) and HSI (Hispanic-serving institution) whose College of Arts and Sciences is women-only. For a field such as cybersecurity, which continues to face diversity challenges, the participation of organizations such as TWU is essential.</span><br><br>“We want to bring in students who have not thought of cybersecurity as a field, because they think it’s all engineering, hacking and coding,” Menon says. The workshops will emphasize the variety of functions that are integral to the space, such as management and auditing, in addition to engineering.&nbsp;</p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2024-05/ngac_and_menon_golf_group_600x1300.jpg?itok=uNzuuKi8" width="560" height="252" alt="Students and industry participants in the current CCI Experiential Learning Projects" loading="lazy"> </div> </div> <figcaption>Students and industry participants in the current CCI Experiential Learning Projects</figcaption> </figure> <p><br>“It’s not just tech, there may be creativity involved in anticipating scams and threats,” Ngac explains. “These are different things we’ll be bringing up in the workshop in terms of roleplaying what cybercriminals might do, or how someone might try to socially engineer an attack.”<br><br>Unlike a standard grant, the NIST award is structured as a cooperative agreement in which the funding agency will collaborate in shaping and delivering programs as they evolve.<br><br>“The advantage of working with NIST is that top people work there. They are the standards body, so they have seen and surveyed a lot of industry,” Menon says. He also lauds NIST’s high-level view of cybersecurity and its implications. “They’re not just looking at technology but also public policy, human factors, etc. It’s a holistic approach.”<br><br><em>Organizations interested in being an industry participant (whether they have cybersecurity-focused or business process improvement-focused projects) with PREP are encouraged to contact </em><a href="mailto:bngac@gmu.edu"><em>Brian Ngac</em></a><em>.</em></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="07a7b036-4377-4afd-9d70-f66f9b300e24"> <div class="cta"> <a class="cta__link" href="/admissions-aid"> <h4 class="cta__title">Join the 鶹Ƶ Nation <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="4731e68e-8e07-4ddf-a91b-b3f486139b82" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="d25831bc-6cce-452d-b805-bb45b8714043" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-69c53aa752788b8816d956a76832baf701db4f0950ce55965294f27b37b5552f"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-07/george-mason-part-northern-virginias-first-innovation-district-launched" hreflang="en">George 鶹Ƶ is part of Northern Virginia’s first innovation district, launched with transformational grant from GO Virginia</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">July 1, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-05/advisors-george-mason-receive-national-academic-advising-association-honors" hreflang="en">Advisors from George 鶹Ƶ receive National Academic Advising Association honors</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">May 30, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-05/new-mason-career-academy-gives-students-and-displaced-workers-immediate-access" hreflang="en">New 鶹Ƶ Career Academy gives students and displaced workers immediate access to industry certificates and micro-credentials </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">May 22, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-04/generous-gift-will-name-school-computing-support-scholarships" hreflang="en">Generous gift will name School of Computing, support scholarships</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">April 28, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-04/computer-science-major-uses-multiple-internships-prep-dream-career-tech" hreflang="en">Computer science major uses multiple internships to prep for dream career in tech </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">April 10, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/21026" hreflang="en">A.I. &amp; Innovation - Costello</a></div> <div class="field__item"><a href="/taxonomy/term/21091" hreflang="en">Costello Research Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/20911" hreflang="en">Costello Research ICT</a></div> <div class="field__item"><a href="/taxonomy/term/12501" hreflang="en">Costello College of Business News</a></div> <div class="field__item"><a href="/taxonomy/term/13796" hreflang="en">Costello College of Business Faculty Research</a></div> <div class="field__item"><a href="/taxonomy/term/13131" hreflang="en">ISOM Faculty Research</a></div> <div class="field__item"><a href="/taxonomy/term/15126" hreflang="en">workforce</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/19536" hreflang="en">National Institute of Standards and Technology NIST</a></div> <div class="field__item"><a href="/taxonomy/term/4066" hreflang="en">Tech Talent Investment Program (TTIP)</a></div> <div class="field__item"><a href="/taxonomy/term/17356" hreflang="en">Strategic Direction</a></div> </div> </div> </div> </div> </div> Fri, 10 May 2024 17:01:06 +0000 Jennifer Anzaldi 112546 at Information systems and operations management profs awarded $100,000 Commonwealth Cyber Initiative Grant /news/2022-08/information-systems-and-operations-management-profs-awarded-100000-commonwealth-cyber <span>Information systems and operations management profs awarded $100,000 Commonwealth Cyber Initiative Grant</span> <span><span>Jennifer Anzaldi</span></span> <span><time datetime="2022-08-09T00:25:50-04:00" title="Tuesday, August 9, 2022 - 00:25">Tue, 08/09/2022 - 00:25</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/bngac" hreflang="en">Brian Ngac</a></div> <div class="field__item"><a href="/profiles/nmenon" hreflang="en">Nirup Menon</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2022-03/brian-ngac_0.jpg?itok=wGdLrY6h" width="278" height="350" alt="Brian Ngac" loading="lazy"> </div> </div> <figcaption>Brian Ngac</figcaption> </figure> <p><span>Brian Ngac and Nirup Menon, from the </span><a href="https://business.gmu.edu/faculty-and-research/academic-areas/information-systems-and-operations-management-area" title="Information Systems and Operations Management Area | 鶹Ƶ School of Business"><span>information systems and operations management area</span></a><span> at the School of Business, were recently awarded a $100,000 grant from the Commonwealth Cyber Initiative (CCI) located in Arlington, Virginia. This Commonwealth Cyber Initiative Grant was awarded for their proposal to develop a new experiential learning program that will engage students and companies from the Commonwealth.</span><br><span>&nbsp;</span><br><span>According to Menon and Ngac, there is a workforce and skills shortage internationally in the cyber security market across all sectors of the economy. Experiential learning can counteract this shortage.&nbsp;</span><br><br><span>“We are hoping to grow the cyber workforce to address the skills gap that currently exists,” says Ngac. Ngac and Menon propose providing students with hands-on training through real projects, with real industry participants. “With this grant, we will choose 24 cyber-interested undergraduates and graduate students from across the state to participate, along with eight industry participants over the spring 2023 and summer 2023 semesters. Each cohort will run for about 12 weeks.”</span><br><br><span>Ngac and Menon’s proposal for this program stemmed from the successful past performance of their experiential learning course titled </span><em><span>MIS 491: Technology Analysis &amp; Proposals with Clients</span></em><span>.&nbsp; After three semesters of offering the course, Ngac and Menon have overseen 15 projects by students ranging from cyber to business process improvement. Working in teams, students planned and recommended technology solutions for solving business problems.</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2021-08/nirup-menon_1.jpg?itok=MAzLTmIK" width="278" height="350" alt="Nirup Menon" loading="lazy"> </div> </div> <figcaption>Nirup Menon</figcaption> </figure> <p><br><br><span>“Having run experiential learning courses since spring 2021, our team’s methodology has evolved to provide students an effective and enjoyable experience to be remembered, and leveraged for their early career years,” says Ngac.&nbsp;</span><br><br><span>The integration of industry participation is the key differentiator for Ngac and Menon. In addition to recruiting students interested in the cyber security field, the duo plans to recruit industry leaders interested in mentorship, and then work with these leaders to design the challenging and engaging cyber projects that will be used. Industry leaders will also guide the students through the execution of these projects.&nbsp;</span><br><br><span>“The experience benefits our industry participants by leveraging our talent pool for recruitment opportunities, and by providing a cost-effective method for attempting new/risky projects,” says the team.</span><br><br><span>“I am really excited about this grant as it will serve the dual purpose of training students across the Commonwealth using hands-on projects, and addressing the critical need of businesses in the area to find cyber ready individuals,” says Pallab Sanyal, area chair of information systems and operations management.</span><br><br><span>At the conclusion of the 12-week course, students will present their work and lessons-learned to the CCI community, and other business and academic leaders.</span><br><br><span>“By integrating business leaders from the industry into the students’ learning journey, our experiential learning efforts will prepare students with practical skills and theoretical understanding to be more marketable and effective in the workforce,” says Menon.</span></p> <p class="xxx">&nbsp;</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/21091" hreflang="en">Costello Research Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/7171" hreflang="en">Tech Talent Investment Pipeline (TTIP)</a></div> <div class="field__item"><a href="/taxonomy/term/18541" hreflang="en">TTIP</a></div> <div class="field__item"><a href="/taxonomy/term/19491" hreflang="en">Tech Talent Investment Program</a></div> <div class="field__item"><a href="/taxonomy/term/12501" hreflang="en">Costello College of Business News</a></div> <div class="field__item"><a href="/taxonomy/term/13131" hreflang="en">ISOM Faculty Research</a></div> <div class="field__item"><a href="/taxonomy/term/13796" hreflang="en">Costello College of Business Faculty Research</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Tue, 09 Aug 2022 04:25:50 +0000 Jennifer Anzaldi 75576 at The Cybercriminals Are Winning. Why Don’t Consumers Care? /news/2022-02/cybercriminals-are-winning-why-dont-consumers-care <span>The Cybercriminals Are Winning. Why Don’t Consumers Care?</span> <span><span>Marianne Klinker</span></span> <span><time datetime="2022-02-11T11:33:24-05:00" title="Friday, February 11, 2022 - 11:33">Fri, 02/11/2022 - 11:33</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/nmenon" hreflang="en">Nirup Menon</a></div> <div class="field__item"><a href="/profiles/psanyal" hreflang="en">Pallab Sanyal</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>Despite the software industry’s rapid growth and deep pockets, tech companies are still engaged in bare-knuckles battle with cybercriminals. Hardly a week goes by without a high-profile cyberattack hitting the headlines.</p> <p>Most recently, vulnerabilities in the&nbsp;<a href="https://www.wired.com/story/log4j-flaw-hacking-internet/" target="_blank" title="Log4j open-source framework">Log4j open-source framework</a>—used in hundreds of software products from IBM, Microsoft, Cisco, and others—handed hackers a huge opening, which has yet to be completely patched. While the fallout from the Log4j fiasco hasn’t been as grave as some feared, experts worry that cybercriminals are waiting for the frenzy to die down before launching major attacks in the coming months.</p> <p>Like Log4j, the 2014 Heartbleed bug involved flaws in widely used open-source software. A team of hackers took advantage of Heartbleed’s vulnerabilities to gain illicit access to the Community Health Systems network and steal the personal data of an estimated 4.5 million patients.</p> <p>These lapses point to the lingering dangers inherent in tech companies’ reliance upon free open-source software that carries little or no security and community support. The Heartbleed bug went undetected for nearly two years. As late as November 2020,&nbsp;<a href="https://blog.tuxcare.com/cve/why-your-servers-can-still-suffer-from-a-heartbleed-and-what-to-do" target="_blank" title="more than 200,000 machines">more than 200,000 machines</a>&nbsp;were found to be still compromised by Heartbleed, even though fixes had long been available.</p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2022-02/Nirup_and_Pallab_325x226.jpg?itok=6x15gCwR" width="325" height="226" alt="Nirup Menon (left) and Pallab Sanyal (right) " loading="lazy"> </div> </div> <figcaption>Nirup Menon (left) and&nbsp;Pallab Sanyal (right)&nbsp;</figcaption> </figure> <p>For&nbsp;<a href="/profiles/nmenon" title="Nirup Menon">Nirup Menon</a>, associate dean for Arlington Ventures at 鶹Ƶ, and&nbsp;<a href="/profiles/psanyal" title="Pallab Sanyal">Pallab Sanyal</a>, chair of the Information Systems and Operations Management area at 鶹Ƶ, the current cybersecurity morass is inseparable from economic incentives. Companies hesitate to invest enough in cybersecurity, not out of general miserliness but because they don’t see much ROI from those investments. At the end of the day, the end consumer is reluctant to pay for additional security, compared to extra features that improve user experience.</p> <p>Menon and Sanyal’s recent paper in&nbsp;<a href="https://misq.umn.edu/an-empirical-examination-of-the-economics-of-mobile-application-security.html" target="_blank" title="MIS Quarterly"><em>MIS Quarterly</em></a><em>,</em>&nbsp;co-authored by Mikko Siponen of the University of Jyväskylä, confirms the existence of this willingness-to-pay (WTP) dilemma. Instead of attempting to cover the entire software industry, their research focuses on mobile apps, a narrower area, but one with which most consumers are familiar. Menon and Sanyal sent surveys to 580 people recruited through Amazon’s Mechanical Turk platform, describing three hypothetical apps for which paid upgrades were being offered: a password manager, a home expenses and income manager, and a medical records manager. All three types of apps would presumably have access to sensitive user information, thus making security a higher priority than it would be for, say, a news aggregation or mindfulness app. Participants were presented with a usability-based and a security-based feature, each with a nominal price tag, and asked which, if any, they would pay for. They could choose to purchase both, one, or none (no actual money changed hands). For example, in the password manager condition, they were asked if they would buy auto-login capability (usability) and advanced encryption (security).</p> <p>All else being equal, Menon and Sanyal found that customers were about 43 percent less likely to pay for security than usability, amounting to a wide and worrying WTP gap between the two categories.</p> <p>Based on that figure alone, you might think that consumers simply don’t care nearly as much about cybersecurity. A deeper dive into the results reveals a more complicated situation. Women and participants who, in their answers to other questions in the surveys, said they tended to avoid risk were more likely than the rest to pay for mobile app security—older and less wealthy participants were less so. Surprisingly, those who were told about past security breaches affecting the hypothetical app were less likely to pay for security, perhaps because of the quirky human propensity to believe oneself immune to the misfortunes of others.</p> <p>But the most significant difference concerned the issue of outside confirmation. In the surveys, the feature descriptions were framed as either verified by an independent third party or “according to the application producer.” Restricting their analysis to third-party verified features, Menon and Sanyal found the WTP discrepancy disappeared. People were just as willing to buy security features that had been vouched for by a credible source.</p> <p>A separate survey provides clarifying context. Respondents were asked to rate all the hypothetical features for difficulty of verifiability, and the security features ranked significantly higher. This helps explain why, without third-party confirmation, cybersecurity enhancements face a WTP disadvantage: A moderately safe app will feel the same as an extremely safe one to the average consumer. A non-tech professional is not well-equipped to decide whether the upgrade is worth paying for, but if an outside authority endorses the feature, users will accept it as desirable.</p> <p>Menon and Sanyal’s study suggests a number of ways software producers could monetize enhanced security features. Most obviously, companies could seek and promote verification from top security companies. In addition, they arguably need to work on improving communications about security so that ordinary users better understand the tech-speak, empowering consumers to make more informed buying decisions. By contrast, a communications approach emphasizing cautionary tales of past cyberattacks may well backfire due to the “it can’t happen to me” effect noted above. Theoretically, as more and more people start voting for enhanced security with their wallets, the internet would become safer for legitimate business and more dangerous for bad actors.</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/20936" hreflang="en">Costello Research Innovation Strategy</a></div> <div class="field__item"><a href="/taxonomy/term/21091" hreflang="en">Costello Research Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/20911" hreflang="en">Costello Research ICT</a></div> <div class="field__item"><a href="/taxonomy/term/7171" hreflang="en">Tech Talent Investment Pipeline (TTIP)</a></div> <div class="field__item"><a href="/taxonomy/term/18541" hreflang="en">TTIP</a></div> <div class="field__item"><a href="/taxonomy/term/19491" hreflang="en">Tech Talent Investment Program</a></div> <div class="field__item"><a href="/taxonomy/term/12501" hreflang="en">Costello College of Business News</a></div> <div class="field__item"><a href="/taxonomy/term/13796" hreflang="en">Costello College of Business Faculty Research</a></div> <div class="field__item"><a href="/taxonomy/term/13131" hreflang="en">ISOM Faculty Research</a></div> </div> </div> </div> </div> </div> Fri, 11 Feb 2022 16:33:24 +0000 Marianne Klinker 65156 at Data Security and Cognition: How Executives Select Measures Is in Their Personality /news/2021-11/data-security-and-cognition-how-executives-select-measures-their-personality <span>Data Security and Cognition: How Executives Select Measures Is in Their Personality</span> <span><span>Marianne Klinker</span></span> <span><time datetime="2021-11-16T15:55:26-05:00" title="Tuesday, November 16, 2021 - 15:55">Tue, 11/16/2021 - 15:55</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/nmenon" hreflang="en">Nirup Menon</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>It is a truth universally acknowledged that a person in possession of any official, medical, or financial paperwork must be worried about potential data breaches. We live in an online time. Information is stored virtually. Just as old-time bank robbers could access vaults if they had the inclination, modern criminals can—if they have the right skills—access all that data online.</p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2021-08/nirup-menon_1.jpg?itok=MAzLTmIK" width="278" height="350" alt="Nirup Menon" loading="lazy"> </div> </div> <figcaption>Nirup Menon</figcaption> </figure> <p>Information security is a critical part of every organization. However, it’s also expensive—a problem for executives deciding on funding allocation.&nbsp;<a href="/profiles/nmenon" title="Nirup Menon">Nirup Menon</a>, professor and chair of information systems and operations management, along with coauthor Mikko Siponen, delved into the role personality plays in determining how executives react to information security costs. Their paper’s premise is simple: Security managers propose system security measures, and the executive makes a decision depending on a variety of factors, including cost, risk-benefit analysis, and—it turns out—the executive’s “preferred subordinate influence approach.” That is, the X factor in whether an executive adopts a proposal is in his or her cognition—whether they are emotional or rational.</p> <p>In the paper, “Executives’ Commitment to Information Security: Interaction between the Preferred Subordinate Influence Approach and Proposal Characteristics,” Menon and Siponen note, “In information security, subordinates can frame a proposal positively (e.g., action increases protection) or negatively (e.g., inaction increases risk). The framing of information security proposals affects the motivation of the message recipient to exert effort in decision making.” In short, data security proposals should be customized to the receiver. It’s not only the message but the way the message is received that safeguards information.</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/20911" hreflang="en">Costello Research ICT</a></div> <div class="field__item"><a href="/taxonomy/term/20921" hreflang="en">Costello Research Data Analytics</a></div> <div class="field__item"><a href="/taxonomy/term/21091" hreflang="en">Costello Research Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/12501" hreflang="en">Costello College of Business News</a></div> <div class="field__item"><a href="/taxonomy/term/13796" hreflang="en">Costello College of Business Faculty Research</a></div> <div class="field__item"><a href="/taxonomy/term/13131" hreflang="en">ISOM Faculty Research</a></div> </div> </div> </div> </div> </div> Tue, 16 Nov 2021 20:55:26 +0000 Marianne Klinker 57601 at