Masooda Bashir

Photo of Masooda Bashir

Assistant Professor

PhD, Psychology, Purdue University

320 LIS / CSL 468
(217) 244-1139
mnb [at] illinois.edu

Research Focus

As the amount of digital information around us continues to increase by leaps and bounds, and our lives increasingly depend on technology, issues of trust, privacy, and security in this digital ecosystem are also becoming increasingly important. My research interests lie at the interface of IT, Psychology, and Society, especially how privacy, security, and trust intersect from a psychological point of view with information technology.


Other Professional Appointments

  • Director, Social Sciences in Engineering Research, College of Engineering, University of Illinois at Urbana-Champaign, 2013 - present
  • Assistant Professor, Coordinated Science Laboratory and Information Trust Institute, College of Engineering, University of Illinois at Urbana-Champaign, 2013 - present
  • Adjunct Assistant Professor, Department of Industrial and Enterprise Systems Engineering, University of Illinois at Urbana-Champaign, August 2012 - present

Biography

Masooda Bashir received degrees in mathematics, computer science, and psychology and earned her PhD in psychology from Purdue University. She worked for several years as a systems analyst, technical trainer, manager, and global manager for a number of corporations in Silicon Valley, including Lotus and IBM. Most recently, she was the assistant director for social trust initiatives in the Information Trust Institute (ITI) at the University of Illinois. In addition, Bashir has led multiple ITI educational initiatives, including the summer Research Experiences for Undergraduates internship program and the Illinois Cyber Security Scholarship Program.

Current Projects and Affiliations

  • Principal Investigator of the “Enhancing the Cyber Security Workforce—The Human Angle” 2013-present
  • Director, Social Sciences in Engineering Research, College of Engineering 2013-present.

Recent Courses Taught

  • Advanced Digital Forensics (CS 498) – Spring 2015
  • Privacy in the Internet Age (LIS 590) – Fall 2013 - 2014
  • Human Factors for Engineers (IE 340/Psych 358) – Fall 2011- 2015
  • Cyber Security and Information Assurance Seminar (CS 491) – Fall 2009 -  2014
  • Introduction to Digital Forensics (team taught) (CS 498) – Fall 2013 - 2015
  • Privacy and Technology (LIS 390) – Spring 2014

Research Projects

CyberSecurityHumanAnglePicture.JPG
Enhancing the Cyber Security Workforce—The Human Angle

The United States is a world leader in technological innovation. However, as our technology has advanced, the need for cyber security experts has increased dramatically. Unfortunately, the U.S. lacks the cyber security workforce needed to manage many of the threats our society faces.

Selected Publications, Papers, and Presentations

Recent Publications

  • Kesan, J., Hayes, C. & Bashir, M. (2016). A comprehensive empirical study of data privacy, trust, and consumer autonomy. Accepted for publication in Indiana Law Journal, 91.
  • Huang, H.Y. & Bashir, M. (2015, 6-8 Nov.). Direct-to-consumer genetic testing: Contextual privacy predicament. Paper to be presented at the 78th ASIS&T Annual Meeting, St. Louis, MO.
  • Lambert, A.D., Parker, M., & Bashir, M. (2015, 6-8 Nov.) Library patron privacy in jeopardy: An analysis of the privacy policies of digital content vendors. Paper to be presented at 78th ASIS&T Annual Meeting, St. Louis, MO.
  • Bashir, M. & Lambert, A.D. (2015, 6-8 Nov.). Online privacy and informed consent: The dilemma of information asymmetry. Paper to be presented at 78th ASIS&T Annual Meeting, St. Louis, MO.
  • Alvarez, K. & Bashir, M. (2015, 6-8 Oct.) Exploring the effectiveness of digital forensics tools on the Sony PlayStation Vita. Paper to be presented at 7th International Conference on Digital Forensics & Cyber Crime, Seoul, South Korea.
  • Palmer, I., Nagy, S. Garcia, G., Wood, E., Destefano, L., Campbell, R., & Bashir, M. (2015, 6-8 Oct.) Digital forensics education: A multidisciplinary curriculum model. Paper to be presented at 7th International Conference on Digital Forensics and Cyber Crime, Seoul, South Korea.
  • Mullens, C., Kesan, J., Hoff, K. & Bashir, M. (2015, 25-27 September). Shaping privacy law and policy by examining the intersection of knowledge and opinions. Paper to be presented at the Research Conference on Communication, Information and Internet Policy (TPRC 43), Arlington, Virginia.
  • Bashir, M., Lambert, A., Wee, J.M.C., & Guo, B. (2015, 11 August). An examination of the vocational and psychological characteristics of cybersecurity competition participants. Proceedings of the USENIX Summit on Gaming, Games and Gamification in Security Education, Washington, D.C.
  • Huang, H.Y. & Bashir, M. (2015, 2-7 August). Examining the gender gap in information assurance: a study of psychological factors. Proceedings of 17th HCI International Conference. Los Angeles, CA.
  • Huang, H.Y. & Bashir, M. (2015, 22-24 July). Multiple dimensions of information privacy: A socio-cultural approach in a global context. Proceedings of the Symposium on Usable Privacy and Security, 2nd Annual Privacy Personas and Segmentation (PPS) Workshop, Ottowa, Canada.
  • Huang, H.Y., Bashir, M. & Borisov, N. (2015, 22-24 July). Who is behind the onion? Understanding Tor-relay operators. Proceedings of 11th Symposium on Usable Privacy and Security (SOUPS), Ottawa, Canada.
  • Bashir, M. & Campbell, R. (2015, 22-24 July). Developing a standardized and multidisciplinary curriculum for digital forensics education. Proceedings of 11th Symposium on Usable Privacy and Security, Workshop on Usable Security and Privacy Education, Ottawa, Canada.
  • Huang, H.Y. & Bashir, M. (2015, 21-23 July). Is privacy a human right? An empirical study in a global context. Proceedings of 13th Annual Conference on Privacy, Security and Trust, Izmir, Turkey.
  • Huh, J.H., Kim, H., Bobba, R., & Bashir, M. (2015, 22-24 July). On the memorability of system generated PINs: Can chunking help? Proceedings of the Symposium on Usable Privacy and Security, Ottawa, Canada.
  • Bashir, M., Lambert, A.D., Wee, J.M.C., Guo, B., & Memon, N. (2015, 15-17 June). Exploring the vocational interests of cybersecurity competition participants. Paper to be presented at Colloquium for Information Security Education (CISSE), Las Vegas, NV.
  • Lambert, A.D., Bashir, M., Guo, B., Memon, N., & Halevi, T. (2015, May 18-20). Are competitions effective in increasing the cybersecurity workforce? Proceedings of  IEEE Security & Privacy, San Jose, CA.
  • Noureddine, M., Keefe, K., Bashir, M. & Sanders, W.H. (2015, April). Quantitative security metrics with human in the loop (Poster Abstract). Proceedings of the ACM Symposium and Bootcamp on the Science of Security (HotSoS), University of Illinois at Urbana Champaign, Urbana, IL . DOI: 10.1145/2746194.2746215
  • Hoff, K. & Bashir, M. (2014) Trust in automation: integrating empirical evidence on factors that influence trust. Human Factors: The Journal of the Human Factors and Ergonomics Society, 57 (3), 407-434. DOI:10.1177/0018720814547570
  • Mullens, C. Kesan, J., Hoff, K. & Bashir, M. (2014, 12-14 Sept.). Knowledge, behavior, and opinions regarding online privacy. Proceedings of the 42nd Research Conference on Communication, Information and Internet Policy (TPRC 2014), George Mason University, Arlington, VA.  http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2418830
  • Lang, A., Bashir, M., Campbell, R. & DeStefano, L. (2014, 3-6 August). Developing a new digital forensics curriculum. Proceedings of the Digital Forensics Workshop Research Conference, Denver, CO. DOI: 10.1016/j.diin.2014.05.008
  • Bohr, J. & Bashir, M. (2014, 23-24 July). Who uses bitcoin? An exploration of the bitcoin community. Proceedings of the Twelfth Annual International Conference on Privacy, Security and Trust (PST), Toronto, ON. 2014. DOI: 10.1109/PST.2014.6890928
  • Hernandez, Bashir, M., Gahyun, J. & Bohr, J. (2014, 22-27 July). Are bitcoin users less sociable? An analysis of users’ language and social connections on twitter. Proceedings of the Human Computer Interaction International (HCII) Conference, Crete, Greece. DOI: 10.1007/978-3-319-07854-0_5
  • Huh, J., Kim, H., Bobba, R.B., Bashir, M., & Beznosov, K. (2014, 9-11 July). On the memorability of system-generated PINs: Can Chunking Help? Proceedings of the Symposium On Usable Privacy and Security (SOUPS), Who Are You? Adventures in Authentication (WAY Workshop), Menlo Park, CA. http://cups.cs.cmu.edu/soups/2014/workshops/papers/chunking_huh_11.pdf
  • Hoff, K. & Bashir, M. (2014, 27 June). Knowledge-based individualized privacy plans (KIPPs): a potential tool to improve the effectiveness of privacy notices. Proceedings of the Carnegie Mellon University, CyLab Workshop on the Future of Privacy Notice and Choice, Pittsburg, PA. https://www.cylab.cmu.edu/news_events/events/fopnac/pdfs/bashir.pdf
  • Bashir, M., Applequist, J., Campbell, R. DeStafano, L., Garcia, G., & Lang, A. (2014, 28-29 May). Development and dissemination of a new multidisciplinary undergraduate curriculum in digital forensics. Proceedings of the Conference on Associate Digital Forensics, Security and Law (ADFSL), Richmond, Virginia. http://www.digitalforensics-conference.org/files/cdfsl-2014.pdf
  • Bashir, M. & Jeon, G. (2014, 11-12 Apr).  An examination of psychological factors underlying the gender gap in cybersecurity.  Proceedings of the 2014 Women in Cyber Security Conference (WiCyS), Nashville, TN.
  • Bashir, M., Hoff, K. (2013, 29 Apr—3 May). A theoretical model for trust in automated systems. Proceedings of Computer Human Interactions Conference, Paris, France. DOI: 10.1145/2468356.2468378
  • Pfleeger, S., Rogers, M., Bashir, M., Caine, K., Caputo, D., Losavio, M. & Stolfo, S. (2012). Does profiling make us more secure? Privacy & Security: IEEE, 10 (4), 10-15. 10.1109/MSP.2012.95
  • Bashir, M., Kesan, J., Hayes, C., Zielinski; R. (2011, Dec.). Privacy in the cloud: Going beyond the contractarian paradigm. Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies (GTIP '11). DOI:10.1145/2076496.2076499

Invited Talks

  • Carnegie Mellon University – Workshop on the Future of Privacy Notice and Choice panelist. “Online Privacy Agreements, Is it Informed Consent?” June 27th, 2014.
  • Purdue University – The Center for Education and Research in Information Assurance and Security (CERIAS) speaker series, W. Lafayette IN. “Online Privacy Agreements, is it informed Consent?” April 16th, 2014.
  • UIUC Campus Insights – Presentation to the Board of Trustee on the Program Develop-ment in Digital Forensics. September 11th, 2013.
  • Air Force Research Laboratory (AFRL) – Center of Excellence of Assured Cloud Computing Seminar series, Rome NY. “Digital Forensics: a Multidisciplinary Approach”. August 21st, 2013.
  • Sandia National Laboratory – Panelist at “Symposium graduate panel”, Albuquerque NM, annual TITANS University Week. August 5th-7th, 2013.
  • Cyber and Information Challenges 2012 Conference – SUNYIT and the Cyber New York Alliance, Utica NY. “Consumer Privacy Choices, informed consent, and Baseline protections to facilitate market transactions in the cloud”. June 12th -14th, 2012.
  • Institute for Information Infrastructure Protection (I3P) – Profiling and Prediction Roundtable panel member, West Lafayette, IN. Workshop “Does Profiling Makes Us More Secure?” March, 2012.
  • Air Force Research Lab – Assured Cloud Computing seminar, Rome, NY. “Privacy in the cloud: Going beyond the contractarian paradigm”. December, 2011.
  • Sandia National Laboratory – University Partners Cyber Open House and Workshop, Albuquerque, NM. “Trust - human dimension” Workshop. July 25th -27th, 2011.

Related Topics

Ethics and Values for Information, Information Practices and Behaviors, Privacy, Security, and Trust, Social Media, information privacy policy, online communities-master