*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************
Atlanta, GA | Posted: March 1, 2018
Fariborz Farahmand received the Best Paper Award in the Big Data, Image Processing, and Multimedia Technology Track at the 2017 IEEE 8th Annual Ubiquitous Computing, Electronics, and Mobile Communications Conference. The conference was held October 19-21 at Columbia University in New York City, New York.
Farahmand is a research faculty member in the Georgia Tech School of Electrical and Computer Engineering (ECE). The title of his award-winning paper is entitled “Security and Privacy Risks in Electronic Communications: A User’s Assessment,” which was coauthored with Robin L. Dillon-Merrill, a professor in the McDonough School of Business at Georgetown University, and Mikhail Atallah, a professor in the Department of Computer Science at Purdue University.
It is important to understand why online users indicate concern about security and privacy, but when given the opportunity, they act contrary to their stated intentions. Collecting data about 24 electronic activities, Farahmand and his colleagues find a significant inverse relationship between online users’ assessed risk and benefit, recognizing that the particular technology matters where some technologies are inherently perceived as more risky than others. This behavior is of interest because it violates the assumptions of the existing computational models in cybersecurity and privacy risk management–that are based on expected utility theory and the work of von Neumann and Morgenstern.
This team's results support dual process theory, and Kahneman’s distinction of System 1 and System 2 in security and privacy decision making: System 1 (affective) operates automatically and quickly, with little or no effort and no sense of voluntary control, and System 2 (cognitive) allocates attention to the effortful mental activities that demand it, including computations. The team's findings, and the formal description of the interplay between System 1 and System 2, can be used in developing more “realistic” computational models of cybersecurity and privacy decision-making in security and privacy enhancing technologies.