Discipline: Computer Sciences and Information Management
Subcategory: Computer Science & Information Systems
Session: 2
Room: Exhibit Hall
Tricia Camaya - Norfolk State University
Co-Author(s): Mohammed Abdulai, Norfolk State University, Norfolk, VA
Background: This poster presents the design, development, and implementation of the Web application, SocioCyber, to simulate cybersecurity protocols typically implemented by organizations. The interdisciplinary development team consists of computer science, information technology, and sociology students, supervised by a computer science faculty member. Scenarios implemented to date include password policy, captchas, and secret questions. The premise of this research is that we can understand users’ attitudes to cybersecurity in an organization through interaction with this application. The application will also be for simulated data gathering as users respond to cybersecurity prompts while using the application. Methodology: Several tools are used for the development of SocioCyber. On the server side, Apache, MySQL, and PHP are utilized. Apache is one of the most popularly used web server. It allows a web site to literally serve-up pages. MySQL is a database management system. The client-side tools include JavaScript, Cascaded Style Sheets (CSS) and Hypertext Markup Language (HTML). HTML is a language browsers understand and is used to create web page content. CSS enables the formatting of web page content or pages. JavaScript is a programming language that adds dynamic content to a web page. Hypothesis: The SocioCyber Desktop is an effective tool to capture users’ attitudes toward cybersecurity prompts. Results: The implemented security protocols containing security questions, password policies, and captchas will help to assess users’ opinions of cybersecurity protocols through the use of the SocioCyber. Preliminary results demonstrate that users are more comfortable with taken-for-grated protocols. Furthermore, if a user is satisfied with an app’s usability, responses to cybersecurity protocols are generally positive.
Funder Acknowledgement(s): National Science Foundation Excellence in Research
Faculty Advisor: Claude Turner, cturner@nsu.edu
Role: I implemented the captcha and help with creating web development interface