PhD, Psychology, Purdue University
320 LIS / CSL 468
mnb [at] illinois.edu
The interface of information technology, human psychology, and society; especially how privacy, security, and trust intersect from a psychological point of view with information systems.
Other Professional Appointments
- Director, Social Sciences in Engineering Research, College of Engineering, University of Illinois at Urbana-Champaign, 2013 - present
- Assistant Professor, Coordinated Science Laboratory and Information Trust Institute, College of Engineering, University of Illinois at Urbana-Champaign, 2013 - present
- Adjunct Assistant Professor, Department of Industrial and Enterprise Systems Engineering, University of Illinois at Urbana-Champaign, August 2012 - present
Masooda Bashir received degrees in mathematics, computer science, and psychology and earned her PhD in psychology from Purdue University. She worked for several years as a systems analyst, technical trainer, manager, and global manager for a number of corporations in Silicon Valley, including Lotus and IBM. Most recently, she was the assistant director for social trust initiatives in the Information Trust Institute (ITI) at the University of Illinois. In addition, Bashir has led multiple ITI educational initiatives, including the summer Research Experiences for Undergraduates internship program and the Illinois Cyber Security Scholarship Program.
Current Projects and Affiliations
- Principal Investigator of the “Enhancing the Cyber Security Workforce—The Human Angle” 2013-present
- Co-Principal Investigator and Co-Director of the Digital Forensic curriculum development, 2013-present, http://www.iti.illinois.edu/education/program-digital-forensics
- Co-Principal Investigator and Co-Director of the Illinois Cyber Security Scholarship Program, 2009-present. http://publish.illinois.edu/cybersecurityscholars/
- Co-PI of Assured Cloud Computing, 2012-present, http://assured-cloud-computing.illinois.edu/archived-press-releases/
- Researcher, Science of Security (SoS) Lablet, 2014-present, http://www.iti.illinois.edu/research/evaluation/science-security-sos-lablet
- Director, Social Sciences in Engineering Research, College of Engineering 2013-present.
Recent Courses Taught
- Information Assurance (IS 490) – Spring 2016 & Fall 2016
- Advanced Digital Forensics (team taught) (CS 498) – Spring 2015 & 2016
- Privacy in the Internet Age (LIS 590) – Fall 2013, 2014, 2015
- Human Factors for Engineers (IE 340/Psych 358) – Fall 2011- 2015
- Cyber Security and Information Assurance Seminar (CS 491) – Fall 2009 - 2016
- Introduction to Digital Forensics (team taught) (CS 498) – Fall 2013 - 2015
- Privacy and Technology (LIS 390) – Spring 2014
TEACHING THIS SEMESTERInformation Assurance (IS462G4)
Information Assurance (IS462UG3)
The United States is a world leader in technological innovation. However, as our technology has advanced, the need for cyber security experts has increased dramatically. Unfortunately, the U.S. lacks the cyber security workforce needed to manage many of the threats our society faces.
Selected Publications, Papers, and Presentations
Di Giulio, C., Sprabery, R., Kamhoua, C., Kwiat, K. Campbell, R., Bashir, M. (forthcoming 2017). “Cloud Security Certifications: A Comparison to Improve Cloud Service Provider Security”. In the proceedings of the second International Conference on Internet of Things, Data and Cloud Computing (ICC 2017), Churchill College, Cambridge, UK. March 22-23, 2017. ACM Digital Library. http://icc-conference.org/
Di Giulio, C., Sprabery, R., Kamhoua, C., Kwiat, K. Campbell, R., Bashir, M. (forthcoming 2017). “IT Security and Privacy Standards in Comparison: Improving FedRAMP Authorization for Cloud Service Providers”. To be presented at the International Workshop on Assured Cloud Computing and QoS Aware Big Data (WACC ‘17), Madrid, Spain. May 14, 2017. http://www.eubra-bigsea.eu/WACC_2017
Di Giulio, C., Sprabery, R., Kamhoua, C., Kwiat, K. Campbell, R., Bashir, M. (forthcoming 2017). “Cloud Standards in Comparison Are New Security Frameworks Improving Cloud Security?”. To be presented at the 10th IEEE International Conference on Cloud Computing (IEEE CLOUD), June 25 - June 30, 2017, Honolulu, Hawaii, USA. http://www.thecloudcomputing.org/2017/
Addawood, A., Schneider, J., & Bashir, M. (2017). Stance Classification of Twitter Debates: The Encryption Debate as A Use Case. SMSociety’17, July 28–30, 2017, Toronto, ON, Canada. https://socialmediaandsociety.org/
Huang, H.Y. & Bashir, M., (2017). Examining the Impact of Information Cues on Users’ Adoption of Mental Health Applications. Journal of Medical Internet Research, Journal of mHealth and uHealth. https://www.jmir.org/
Huang, H.Y. & Bashir, M., (2017, July). Trust in Automation: A Cultural Perspective. In AHFE 2017 Applied Human Factor and Ergonomics, Los Angeles, U.S. http://www.ahfe2017.org/
Huang, H.Y. & Bashir, M., (2017, July). Examining the Influence of App Permission on Users’ Adoption of Mental Health Applications. HCI International, Vancouver, Canada. http://2017.hci.international/
Bashir, M., Wee, J. M. C., Lambert A., Guo, B. & Memon, N. (2015). Profiling cybersecurity competition participants. Submitted to Computers and Security, "Attitudes Towards Encryption: A Social Media Analysis" submitted to SocInfo 2016 conference.
Huang, H.Y. & Bashir, M., (2016, December). Users’ perspective on designing inclusive privacy-enhancing indicators. In 14th annual conferences in Privacy, Security and Trust, Auckland, New Zealand. IEEE. DOI: 10.1109/PST.2016.7906993
Huang, H.Y. & Bashir, M., (2016, December). Privacy by Region: Understanding Online Users' Privacy Perceptions by Geographical Regions. In Future Technologies Conference, San Francisco, US. IEEE.
Huang, H.Y. & Bashir, M., (2016, October). The Onion Router: Understanding a Privacy-Enhancing Technology Community. In Annual Meeting of Association Information Science & Technology (ASIS&T), Denmark.
Addawood, A., & Bashir, M. (2016). "What Is Your Evidence?" A Study of Controversial Topics on Social Media. Proceedings of the Association for Computational Linguistics (ACL), Third Workshop on Argument Mining (ArgMining2016). Berlin, Germany. http://www.aclweb.org/anthology/W/W16/W16-28.pdf#page=13
Lamb, K., Huang, H. Y., Marturano, A., & Bashir, M. (2016). Users' Privacy Perceptions About Wearable Technology: Examining Influence of Personality, Trust, and Usability. Advances in Human Factors in Cybersecurity, 55. http://link.springer.com/chapter/10.1007/978-3-319-41932-9_6
Wee, J. M. C. , Bashir, M. & Memon, N. (2016). Self-efficacy in Cybersecurity Tasks and Its relationship with cybersecurity competition and work-related outcomes. Paper presentation at the 25th USENIX Security Symposium – Workshop on Advances in Security Education, Orlando, FL. https://www.usenix.org/conference/ase16/workshop-program/presentation/wee
Wee, J. M. C. & Bashir, M. (2016). Understanding the Personality Characteristics of Cybersecurity Competition Participants to Improve the Effectiveness of Competitions as Recruitment Tools. Paper presentation at the 2nd International Conference on Human Factors in Cybersecurity, Orlando, FL. http://link.springer.com/chapter/10.1007/978-3-319-41932-9_10
Wee, J. M. C. , Bashir, M. & Memon, N. (2016, June). The Cybersecurity Competition Experience: Perceptions from Cybersecurity Workers. Proceedings of the Symposium on Usable Privacy and Security, 2nd Workshop on Security Information Workers, Denver Colorado. https://www.usenix.org/conference/soups2016/workshop-program/wsiw16/presentation/wee
Huang, H.Y. & Bashir, M., (2016, May). Bias of Crowd: Investigating the Use of Online Community for Suicide Prevention. In CHI 2016 Computing and Mental Health Workshop, San Jose, U.S. http://mentalhealth.media.mit.edu/wp-content/uploads/sites/46/2016/04/sui_final_2016CHI.pdf
Kesan, J., Hayes, C. & Bashir, M. (2016). A comprehensive empirical study of data privacy, trust, and consumer autonomy. Accepted for publication in Indiana Law Journal, 91. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2576346
Bashir, M., Lambert, A.D., Guo, B., Memon, N., & Halevi, T. (2015) Cybersecurity Competitions; the Human Angle. Proceedings of IEEE Security & Privacy, (Volume:13, Issue:5) San Jose, CA. https://www.computer.org/csdl/mags/sp/2015/05/msp2015050074-abs.html
Huang, H.Y. & Bashir, M. (2015, 6-8 Nov.). Direct-to-consumer genetic testing: Contextual privacy predicament. Paper to be presented at the 78th ASIS&T Annual Meeting, St. Louis, MO. http://dl.acm.org/citation.cfm?id=2857120
Lambert, A.D., Parker, M., & Bashir, M. (2015, 6-8 Nov.) Library patron privacy in jeopardy: An analysis of the privacy policies of digital content vendors. Paper to be presented at 78th ASIS&T Annual Meeting, St. Louis, MO. https://www.asist.org/files/meetings/am15/proceedings/submissions/papers/98paper.pdf
Bashir, M. & Lambert, A.D. (2015, 6-8 Nov.). Online privacy and informed consent: The dilemma of information asymmetry. Paper to be presented at 78th ASIS&T Annual Meeting, St. Louis, MO. https://www.asist.org/files/meetings/am15/proceedings/submissions/papers/97paper.pdf
Alvarez, K. & Bashir, M. (2015, 6-8 Oct.) Exploring the effectiveness of digital forensics tools on the Sony PlayStation Vita. Paper to be presented at 7th International Conference on Digital Forensics & Cyber Crime, Seoul, South Korea. http://link.springer.com/chapter/10.1007%2F978-3-319-25512-5_14
Palmer, I., Nagy, S. Garcia, G., Wood, E., Destefano, L., Campbell, R., & Bashir, M. (2015, 6-8 Oct.) Digital forensics education: A multidisciplinary curriculum model. Paper to be presented at 7th International Conference on Digital Forensics and Cyber Crime, Seoul, South Korea. http://link.springer.com/chapter/10.1007%2F978-3-319-25512-5_1
Mullens, C., Kesan, J., Hoff, K. & Bashir, M. (2015, 25-27 September). Shaping privacy law and policy by examining the intersection of knowledge and opinions. Paper to be presented at the Research Conference on Communication, Information and Internet Policy (TPRC 43), Arlington, Virginia. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2588077
Bashir, M., Lambert, A., Wee, J.M.C., & Guo, B. (2015, 11 August). An examination of the vocational and psychological characteristics of cybersecurity competition participants. Proceedings of the USENIX Summit on Gaming, Games and Gamification in Security Education, Washington, D.C. https://www.usenix.org/conference/3gse15/summit-program/presentation/bashir
Huang, H.Y. & Bashir, M. (2015, 2-7 August). Examining the gender gap in information assurance: a study of psychological factors. Proceedings of 17th HCI International Conference. Los Angeles, CA. http://link.springer.com/chapter/10.1007%2F978-3-319-21380-4_21
Huang, H.Y. & Bashir, M. (2015, 22-24 July). Multiple dimensions of information privacy: A socio-cultural approach in a global context. Proceedings of the Symposium on Usable Privacy and Security, 2nd Annual Privacy Personas and Segmentation (PPS) Workshop, Ottowa, Canada.
Huang, H.Y., Bashir, M. & Borisov, N. (2015, 22-24 July). Who is behind the onion? Understanding Tor-relay operators. Proceedings of 11th Symposium on Usable Privacy and Security (SOUPS), Ottawa, Canada. https://cups.cs.cmu.edu/soups/2015/posters/soups2015_posters-final12.pdf
Bashir, M. & Campbell, R. (2015, 22-24 July). Developing a standardized and multidisciplinary curriculum for digital forensics education. Proceedings of 11th Symposium on Usable Privacy and Security, Workshop on Usable Security and Privacy Education, Ottawa, Canada. https://cups.cs.cmu.edu/soups/2015/papers/eduBashir.pdf
Huang, H.Y. & Bashir, M. (2015, 21-23 July). Is privacy a human right? An empirical study in a global context. Proceedings of 13th Annual Conference on Privacy, Security and Trust, Izmir, Turkey. http://ieeexplore.ieee.org/document/7232957/?tp=&arnumber=7232957
Huh, J.H., Kim, H., Bobba, R., & Bashir, M. (2015, 22-24 July). On the memorability of system generated PINs: Can chunking help? Proceedings of the Symposium on Usable Privacy and Security, Ottawa, Canada. https://www.usenix.org/conference/soups2015/proceedings/presentation/huh
Bashir, M., Lambert, A.D., Wee, J.M.C., Guo, B., & Memon, N. (2015, 15-17 June). Exploring the vocational interests of cybersecurity competition participants. Paper to be presented at Colloquium for Information Security Education (CISSE), Las Vegas, NV.
Lambert, A.D., Bashir, M., Guo, B., Memon, N., & Halevi, T. (2015, May 18-20). Are competitions effective in increasing the cybersecurity workforce? Proceedings of IEEE Security & Privacy, San Jose, CA.
Noureddine, M., Keefe, K., Bashir, M. & Sanders, W.H. (2015, April). Quantitative security metrics with human in the loop (Poster Abstract). Proceedings of the ACM Symposium and Bootcamp on the Science of Security (HotSoS), University of Illinois at Urbana Champaign, Urbana, IL . DOI: 10.1145/2746194.2746215
Hoff, K. & Bashir, M. (2014) Trust in automation: integrating empirical evidence on factors that influence trust. Human Factors: The Journal of the Human Factors and Ergonomics Society, 57 (3), 407-434. DOI:10.1177/0018720814547570
Mullens, C. Kesan, J., Hoff, K. & Bashir, M. (2014, 12-14 Sept.). Knowledge, behavior, and opinions regarding online privacy. Proceedings of the 42nd Research Conference on Communication, Information and Internet Policy (TPRC 2014), George Mason University, Arlington, VA. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2418830
Lang, A., Bashir, M., Campbell, R. & DeStefano, L. (2014, 3-6 August). Developing a new digital forensics curriculum. Proceedings of the Digital Forensics Workshop Research Conference, Denver, CO. DOI: 10.1016/j.diin.2014.05.008
Bohr, J. & Bashir, M. (2014, 23-24 July). Who uses bitcoin? An exploration of the bitcoin community. Proceedings of the Twelfth Annual International Conference on Privacy, Security and Trust (PST), Toronto, ON. 2014. DOI: 10.1109/PST.2014.6890928
Hernandez, Bashir, M., Gahyun, J. & Bohr, J. (2014, 22-27 July). Are bitcoin users less sociable? An analysis of users’ language and social connections on twitter. Proceedings of the Human Computer Interaction International (HCII) Conference, Crete, Greece. DOI: 10.1007/978-3-319-07854-0_5
Bashir, M., Hoff, K, & Jeon, G. (2014, 9-11 July). Factors associated with online privacy knowledge. Proceedings of the Symposium On Usable Privacy and Security (SOUPS), Menlo Park, CA. https://cups.cs.cmu.edu/soups/2014/posters/soups2014_posters-paper30.pdf
Huh, J., Kim, H., Bobba, R.B., Bashir, M., & Beznosov, K. (2014, 9-11 July). On the memorability of system-generated PINs: Can Chunking Help? Proceedings of the Symposium On Usable Privacy and Security (SOUPS), Who Are You? Adventures in Authentication (WAY Workshop), Menlo Park, CA. http://cups.cs.cmu.edu/soups/2014/workshops/papers/chunking_huh_11.pdf
Hoff, K. & Bashir, M. (2014, 27 June). Knowledge-based individualized privacy plans (KIPPs): a potential tool to improve the effectiveness of privacy notices. Proceedings of the Carnegie Mellon University, CyLab Workshop on the Future of Privacy Notice and Choice, Pittsburg, PA. https://www.cylab.cmu.edu/news_events/events/fopnac/pdfs/bashir.pdf
Bashir, M., Applequist, J., Campbell, R. DeStafano, L., Garcia, G., & Lang, A. (2014, 28-29 May). Development and dissemination of a new multidisciplinary undergraduate curriculum in digital forensics. Proceedings of the Conference on Associate Digital Forensics, Security and Law (ADFSL), Richmond, Virginia. http://www.digitalforensics-conference.org/files/cdfsl-2014.pdf
Bashir, M. & Jeon, G. (2014, 11-12 Apr). An examination of psychological factors underlying the gender gap in cybersecurity. Proceedings of the 2014 Women in Cyber Security Conference (WiCyS), Nashville, TN.
Kesan, J. P., Hayes, C. M., and Bashir, M. (2013). Information privacy and data control in cloud computing: Consumers, privacy preferences, and market efficiency. Washington and Lee Law Review, 70 (1) 341-472. http://scholarlycommons.law.wlu.edu/cgi/viewcontent.cgi?article=4311&context=wlulr
Bashir, M., Hoff, K. (2013, 29 Apr—3 May). A theoretical model for trust in automated systems. Proceedings of Computer Human Interactions Conference, Paris, France. DOI: 10.1145/2468356.2468378
Pfleeger, S., Rogers, M., Bashir, M., Caine, K., Caputo, D., Losavio, M. & Stolfo, S. (2012). Does profiling make us more secure? Privacy & Security: IEEE, 10 (4), 10-15. 10.1109/MSP.2012.95
Bashir, M., Kesan, J., Hayes, C., Zielinski; R. (2011, Dec.). Privacy in the cloud: Going beyond the contractarian paradigm. Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies (GTIP '11). DOI:10.1145/2076496.2076499
Huang, H.Y. & Bashir, M., (2016, June). Measuring Privacy from Users' Perspective of Information Control and Perceived Risks. 9th Annual Privacy Law Scholars Conference, Washington D.C., U.S. Carnegie Mellon University – Workshop on the Future of Privacy Notice and Choice panelist. "Online Privacy Agreements, Is it Informed Consent?" June 27th, 2014.
Jethwani, M., Memon, N., Wee, J., Bashir, M. (June 2016). The Effectiveness of GenCyber Programs at Building Adolescent Girls' Knowledge, Confidence and Interest. Round Table presentation at The Colloquium for Information Systems Security Education (CISSE), Philadelphia, PA.
Purdue University – The Center for Education and Research in Information Assurance and Security (CERIAS) speaker series, W. Lafayette IN. “Online Privacy Agreements, is it informed Consent?” April 16th, 2014.
UIUC Campus Insights – Presentation to the Board of Trustee on the Program Develop-ment in Digital Forensics. September 11th, 2013.
Air Force Research Laboratory (AFRL) – Center of Excellence of Assured Cloud Computing Seminar series, Rome NY. “Digital Forensics: a Multidisciplinary Approach”. August 21st, 2013.
Sandia National Laboratory – Panelist at “Symposium graduate panel”, Albuquerque NM, annual TITANS University Week. August 5th-7th, 2013.
Cyber and Information Challenges 2012 Conference – SUNYIT and the Cyber New York Alliance, Utica NY. “Consumer Privacy Choices, informed consent, and Baseline protections to facilitate market transactions in the cloud”. June 12th -14th, 2012.
Institute for Information Infrastructure Protection (I3P) – Profiling and Prediction Roundtable panel member, West Lafayette, IN. Workshop “Does Profiling Makes Us More Secure?” March, 2012.
Air Force Research Lab – Assured Cloud Computing seminar, Rome, NY. “Privacy in the cloud: Going beyond the contractarian paradigm”. December, 2011.
Sandia National Laboratory – University Partners Cyber Open House and Workshop, Albuquerque, NM. “Trust - human dimension” Workshop. July 25th -27th, 2011.'
Bashir, M., Xu, H., Lambert, A., & Huang, H. Y. (2016). Information Privacy: Current and future research directions. iConference, Philadelphia, U.S.
Huang, H.Y. & Bashir, M., (2016, June). Measuring Privacy from Users' Perspective of Information Control and Perceived Risks. Privacy, Trust and Security conference, Auckland, New Zealand, (December 12-14, 2016)
Bashir, M., Strickland, B., & Bohr, J. (2016). What motivates people to use bitcoin? 8th International Conference on Social Informatics, Seattle, WA.
In the News
Mar. 15, 2016
Jan. 8, 2016
Nov. 2, 2015
Nov. 6, 2014
Jan. 23, 2014