BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Penn Engineering Events - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Penn Engineering Events
X-ORIGINAL-URL:https://seasevents.nmsdev7.com
X-WR-CALDESC:Events for Penn Engineering Events
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20180311T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20181104T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190319T150000
DTEND;TZID=America/New_York:20190319T160000
DTSTAMP:20260409T004812
CREATED:20190215T152018Z
LAST-MODIFIED:20190215T152018Z
UID:1317-1553007600-1553011200@seasevents.nmsdev7.com
SUMMARY:CIS Seminar: "Security for All: Modeling Structural Inequities to Design More Secure Systems"
DESCRIPTION:Users often fall for phishing emails\, reuse simple passwords\, and fail to effectively utilize “provably” secure systems. These behaviors expose users to significant harm and frustrate industry practitioners and security researchers alike. As consequences of security breaches become ever more grave\, it is important to study why humans behave seemingly irrationally. In this talk\, I will illustrate how modeling the effects of structural inequities — variance in skill\, socioeconomic status\, as well as culture and gender identity — can both explain apparent irrationality in users’ security behavior and offer tangible improvements in industry systems. Modeling and mitigating security inequities requires a combination of techniques from economic\, data scientific\, and social science methodologies to develop new tools for systematically understanding and mitigating insecure behavior. \nThrough novel experimental methodology\, I empirically show strong evidence of bounded rationality in security behavior: Users make mathematically modelable tradeoffs between the protection offered by security behaviors and the costs of practicing those behaviors\, which even in a highly usable system may outweigh the benefits\, especially for less resourced users. These findings emphasize the need for industry systems that balance structural inequities and accommodate behavioral variance between users rather than one-size-fits-all security solutions. More broadly\, my techniques for modeling and accounting for inequities have offered key insights in growing technical areas beyond security\, including algorithmic fairness.
URL:https://seasevents.nmsdev7.com/event/cis-seminar-security-for-all-modeling-structural-inequities-to-design-more-secure-systems/
LOCATION:Wu and Chen Auditorium (Room 101)\, Levine Hall\, 3330 Walnut Street\, Philadelphia\, PA\, 19104\, United States
END:VEVENT
END:VCALENDAR