Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shari Lawrence Pfleeger is active.

Publication


Featured researches published by Shari Lawrence Pfleeger.


Computers & Security | 2012

Leveraging behavioral science to mitigate cyber security risk

Shari Lawrence Pfleeger; Deanna D. Caputo

Most efforts to improve cyber security focus primarily on incorporating new technological approaches in products and processes. However, a key element of improvement involves acknowledging the importance of human behavior when designing, building and using cyber security technology. In this survey paper, we describe why incorporating an understanding of human behavior into cyber security products and processes can lead to more effective technology. We present two examples: the first demonstrates how leveraging behavioral science leads to clear improvements, and the other illustrates how behavioral science offers the potential for significant increases in the effectiveness of cyber security. Based on feedback collected from practitioners in preliminary interviews, we narrow our focus to two important behavioral aspects: cognitive load and bias. Next, we identify proven and potential behavioral science findings that have cyber security relevance, not only related to cognitive load and bias but also to heuristics and behavioral science models. We conclude by suggesting several next steps for incorporating behavioral science findings in our technological design, development and use.


ieee symposium on security and privacy | 2011

Guest Editors' Introduction: Shouldn't All Security Be Usable?

Mary F. Theofanos; Shari Lawrence Pfleeger

Usability is defined as the extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency, and satisfaction in a specified context of use. It is more than a well-designed user interface.


IEEE Software | 2011

Guest Editors' Introduction: Software as a Business

John Favaro; Shari Lawrence Pfleeger

Software plays an increasingly important role in most aspects of business. Many new business models for software-intensive enterprises have arisen in the last decade, ranging from selling software as a service to off shoring and crowd sourcing. Governments and standards bodies have also intervened to influence business models for stimulating growth in the industry. The software business has also had ancillary effects including the creation of new sectors such as innovation management. The management of intellectual property rights has become a more critical issue as software is embedded in more and more products. The debate about whether the software business is fundamentally different from others will continue, even as the software business continues to transform itself.


ieee symposium on security and privacy | 2014

The Eyes Have It: Surveillance and How It Evolved

Shari Lawrence Pfleeger

This article presents a brief history of surveillance, technological and otherwise. It includes a discussion of some of the issues technologists should consider when building software and hardware to capture and analyze personal characteristics, habits, movements, and more.


ieee symposium on security and privacy | 2012

Does Profiling Make Us More Secure

Shari Lawrence Pfleeger; Marc Rogers; Masooda Bashir; Kelly E. Caine; Deanna D. Caputo; Michael Losavio; Salvatore J. Stolfo

“Profiling” means making predictions about likely user behavior based on collected characteristics and activities. Shari Lawrence Pfleeger and Marc Rogers brought together a group of researchers from a variety of disciplines to discuss whether profiling and prediction actually make us secure.


ieee symposium on security and privacy | 2012

Security Measurement Steps, Missteps, and Next Steps

Shari Lawrence Pfleeger

Over the past decade, this magazine has focused on a wide variety of important issues, each of which contributes not only to our understanding of security but also to innovative and effective solutions to security problems. Measurement has frequently held star and supporting roles in many of these articles. The author describes the past, present, and future for measurements role in security.


ieee symposium on security and privacy | 2014

Technology, Transparency, and Trust

Shari Lawrence Pfleeger

Over time, device control and transparency have continued to decrease. As users and consumers, we have a responsibility to think about how technology fits in our lives and what we want it to accomplish. We also have a responsibility to think about secondary effects, such as when and whether allowing our devices to monitor and track us is acceptable. These are important questions to ask at a time when enthusiasm for functionality can lead to a rush to market before the security and privacy implications are fully realized, assessed, and addressed.


ieee symposium on security and privacy | 2013

Ramsey Theory: Learning about the Needle in the Haystack

Shari Lawrence Pfleeger

Results from number theory show us that even in seemingly random sets, we can find order; total disorder is impossible. Ramseys theorem can help broaden our perspective in cybersecurity by showing us how to use the emergent order to find patterns and to design systems to avoid certain patterns.


ieee symposium on security and privacy | 2012

A Key to the Castle

Shari Lawrence Pfleeger

Understanding and providing incentives for good security behavior can be more effective and welcome than disruptive or constraining technology.


ieee symposium on security and privacy | 2014

Going Spear Phishing: Exploring Embedded Training and Awareness

Deanna D. Caputo; Shari Lawrence Pfleeger; Jesse D. Freeman; M. Eric Johnson

Collaboration


Dive into the Shari Lawrence Pfleeger's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mary F. Theofanos

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge