Sauvik Das and Eiji Hayashi's paper, Exploring Capturable Everyday Memory For Autobiographical Authentication, won a best paper award at Ubicomp 2013 in Zurich, Switzerland.
The CHIMPS Lab spent Saturday whitewater rafting on the Youghiogheny River at Ohioplye, PA. Despite the challenging rapids and rocks on the river, we made it through the river without capsizing and losing a man overboard. It was a fun and exciting time for the lab relying on coordination and collaboration to get through the tumultuous river.
We have three papers recently accepted.
At Mobile HCI 2013, we have Investigating Collaborative Mobile Search Behaviors.
At Ubicomp 2013, we have Memorability of the Mundane: Exploring Capturable Everyday Memory for Autobiographical Authentication.
At KDD 2013, we have Why People Hate Your App — Making Sense of User Feedback in a Mobile App Store
Sauvik's work on self-censorship on Facebook is featured on The Atlantic's web site. Here's a link to Sauvik's forthcoming ICWSM 2013 paper.
Congratulations to Guang Xiang for finishing his PhD. His dissertation was entitled: Toward a Phish Free World: A Feature-type-aware Cascade Learning Framework for Phish Detection
Our team was recently awarded a Google Research Award on "CrowdScanning: Combining Crowdsoucring, Static Analysis, and Dynamic Analysis to Improve Mobile App Privacy and Security".
Jason Hong was recently interviewed on CBS Morning Show about smartphone app privacy, talking about several surprising behaviors about these apps.
Congratulations to Polo Chau for being awarded SCS Dissertation Award Honorable Mention for his work "Data Mining Meets HCI: Making Sense of Large Graphs".
Happy congratulations and sad farewells as Polo Chau moves on to a new position at Georgia Institute of Technology. Best of luck Polo!
National Science Foundation has funded our research grant entitled Capturing People’s Expectations of Privacy with Mobile Apps by Combining Automated Scanning and Crowdsourcing Techniques. This work is a joint collaboration with Joy Zhang at CMU Silicon Valley and Janne Lindqvist at Rutgers University.
Our paper "A Supervised Approach to Predict Company Acquisition with Factual and Topic Features Using Profiles and News Articles on TechCrunch", published at ICWSM'12, is reported by TechCrunch. TechCrunch is a leading technology media property dedicated to obsessively profiling startups, reviewing new Internet products, and breaking tech news.
Our paper is downloadable at http://www.cs.cmu.edu/~guangx/papers/icwsm12-short.pdf, and the TechCrunch article reporting us can be found at http://techcrunch.com/2012/06/30/thanks-science-new-study-says-crunchbase-is-an-information-treasure-trove/
The [livehoods.org](livehoods.org) site is now public. Our vision is to re-imagine how cities work in the age of social media. Specifically, we've analyzed and clustered 18m Foursquare checkins to understand how people use a city. We currently have maps for New York City and Pittsburgh. San Francisco will be out soon.
Two of our submissions were accepted to ICWSM 2012
A Supervised Approach to Predict Company Acquisition With Factual and Topic Features Using Profiles and News Articles on TechCrunch (accepted as a poster)
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City (accepted as a full paper)
Congrats to Guang and to Justin
Jason Wiese was named as a finalist for the 2012 Facebook Fellowship, congrats to Jason.
JasonH's survey article of phishing attacks was recently published in the Communications of the ACM.
Phishing is a kind of social-engineering attack in which criminals use spoofed email messages to trick people into sharing sensitive information or installing malware on their computers. Victims perceive these messages as being associated with a trusted brand, while in reality they are only the work of con artists. Rather than directly target the systems people use, phishing attacks target the people using the systems. Phishing cleverly circumvents the vast majority of an organization's or individual's security measures. It doesn't matter how many firewalls, encryption software, certificates, or two-factor authentication mechanisms an organization has if the person behind the keyboard falls for a phish.