Masooda Bashir

Photo of Masooda Bashir

Assistant Professor

PhD, Psychology, Purdue University

320 LIS / CSL 468
(217) 244-1139
mnb [at] illinois.edu

Research Focus

My research interests lie at the interface of information technology, human psychology, and society; especially how privacy, security, and trust intersect from a psychological point of view with information systems.


Other Professional Appointments

  • Director, Social Sciences in Engineering Research, College of Engineering, University of Illinois at Urbana-Champaign, 2013 - present
  • Assistant Professor, Coordinated Science Laboratory and Information Trust Institute, College of Engineering, University of Illinois at Urbana-Champaign, 2013 - present
  • Adjunct Assistant Professor, Department of Industrial and Enterprise Systems Engineering, University of Illinois at Urbana-Champaign, August 2012 - present

Biography

Masooda Bashir received degrees in mathematics, computer science, and psychology and earned her PhD in psychology from Purdue University. She worked for several years as a systems analyst, technical trainer, manager, and global manager for a number of corporations in Silicon Valley, including Lotus and IBM. Most recently, she was the assistant director for social trust initiatives in the Information Trust Institute (ITI) at the University of Illinois. In addition, Bashir has led multiple ITI educational initiatives, including the summer Research Experiences for Undergraduates internship program and the Illinois Cyber Security Scholarship Program.

Current Projects and Affiliations

  • Principal Investigator of the “Enhancing the Cyber Security Workforce—The Human Angle” 2013-present
  • Director, Social Sciences in Engineering Research, College of Engineering 2013-present.

Recent Courses Taught

  • Information Assurance (IS 490) – Spring 2016 & Fall 2016
  • Advanced Digital Forensics (team taught) (CS 498) – Spring 2015 & 2016
  • Privacy in the Internet Age (LIS 590) – Fall 2013, 2014, 2015
  • Human Factors for Engineers (IE 340/Psych 358) – Fall 2011- 2015
  • Cyber Security and Information Assurance Seminar (CS 491) – Fall 2009 -  2016
  • Introduction to Digital Forensics (team taught) (CS 498) – Fall 2013 - 2015
  • Privacy and Technology (LIS 390) – Spring 2014

Teaching this Semester

Research Projects

CyberSecurityHumanAnglePicture.JPG
Enhancing the Cyber Security Workforce—The Human Angle

The United States is a world leader in technological innovation. However, as our technology has advanced, the need for cyber security experts has increased dramatically. Unfortunately, the U.S. lacks the cyber security workforce needed to manage many of the threats our society faces.

Selected Publications, Papers, and Presentations

2016

Bashir, M., Wee, J. M. C., Lambert A., Guo, B. & Memon, N. (2015). Profiling cybersecurity competition participants. Submitted to Computers and Security, "Attitudes Towards Encryption: A Social Media Analysis"submitted to SocInfo 2016 conference.

Huang, H.Y. & Bashir, M., (2016, December). Privacy by Region: Understanding Online Users' Privacy Perceptions by Geographical Regions. In Future Technologies Conference, San Francisco, US. IEEE.

Huang, H.Y. & Bashir, M., (2016, October). The Onion Router: Understanding a Privacy-Enhancing Technology Community. In Annual Meeting of Association Information Science & Technology (ASIS&T), Denmark.

Addawood, A., & Bashir, M. (2016). "What Is Your Evidence?" A Study of Controversial Topics on Social Media. Proceedings of the Association for Computational Linguistics (ACL), Third Workshop on Argument Mining (ArgMining2016). Berlin, Germany. http://www.aclweb.org/anthology/W/W16/W16-28.pdf#page=13

Lamb, K., Huang, H. Y., Marturano, A., & Bashir, M. (2016). Users' Privacy Perceptions About Wearable Technology: Examining Influence of Personality, Trust, and Usability. Advances in Human Factors in Cybersecurity, 55. http://link.springer.com/chapter/10.1007/978-3-319-41932-9_6

Wee, J. M. C. , Bashir, M. & Memon, N. (2016). Self-efficacy in Cybersecurity Tasks and Its relationship with cybersecurity competition and work-related outcomes. Paper presentation at the 25th USENIX Security Symposium – Workshop on Advances in Security Education, Orlando, FL. https://www.usenix.org/conference/ase16/workshop-program/presentation/wee

Wee, J. M. C. & Bashir, M. (2016). Understanding the Personality Characteristics of Cybersecurity Competition Participants to Improve the Effectiveness of Competitions as Recruitment Tools. Paper presentation at the 2nd International Conference on Human Factors in Cybersecurity, Orlando, FL. http://link.springer.com/chapter/10.1007/978-3-319-41932-9_10

Wee, J. M. C. , Bashir, M. & Memon, N. (2016, June). The Cybersecurity Competition Experience: Perceptions from Cybersecurity Workers. Proceedings of the Symposium on Usable Privacy and Security, 2nd Workshop on Security Information Workers, Denver Colorado. https://www.usenix.org/conference/soups2016/workshop-program/wsiw16/presentation/wee

Huang, H.Y. & Bashir, M., (2016, May). Bias of Crowd: Investigating the Use of Online Community for Suicide Prevention. In CHI 2016 Computing and Mental Health Workshop, San Jose, U.S. http://mentalhealth.media.mit.edu/wp-content/uploads/sites/46/2016/04/sui_final_2016CHI.pdf

Kesan, J., Hayes, C. & Bashir, M. (2016). A comprehensive empirical study of data privacy, trust, and consumer autonomy. Accepted for publication in Indiana Law Journal, 91. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2576346

Bashir, M., Lambert, A.D., Guo, B., Memon, N., & Halevi, T. (2015) Cybersecurity Competitions; the Human Angle. Proceedings of  IEEE Security & Privacy, (Volume:13, Issue:5) San Jose, CA. https://www.computer.org/csdl/mags/sp/2015/05/msp2015050074-abs.html

2015

Huang, H.Y. & Bashir, M. (2015, 6-8 Nov.). Direct-to-consumer genetic testing: Contextual privacy predicament. Paper to be presented at the 78th ASIS&T Annual Meeting, St. Louis, MO. http://dl.acm.org/citation.cfm?id=2857120

Lambert, A.D., Parker, M., & Bashir, M. (2015, 6-8 Nov.) Library patron privacy in jeopardy: An analysis of the privacy policies of digital content vendors. Paper to be presented at 78th ASIS&T Annual Meeting, St. Louis, MO. https://www.asist.org/files/meetings/am15/proceedings/submissions/papers/98paper.pdf

Bashir, M. & Lambert, A.D. (2015, 6-8 Nov.). Online privacy and informed consent: The dilemma of information asymmetry. Paper to be presented at 78th ASIS&T Annual Meeting, St. Louis, MO. https://www.asist.org/files/meetings/am15/proceedings/submissions/papers/97paper.pdf

Alvarez, K. & Bashir, M. (2015, 6-8 Oct.) Exploring the effectiveness of digital forensics tools on the Sony PlayStation Vita. Paper to be presented at 7th International Conference on Digital Forensics & Cyber Crime, Seoul, South Korea. http://link.springer.com/chapter/10.1007%2F978-3-319-25512-5_14

Palmer, I., Nagy, S. Garcia, G., Wood, E., Destefano, L., Campbell, R., & Bashir, M. (2015, 6-8 Oct.) Digital forensics education: A multidisciplinary curriculum model. Paper to be presented at 7th International Conference on Digital Forensics and Cyber Crime, Seoul, South Korea. http://link.springer.com/chapter/10.1007%2F978-3-319-25512-5_1

Mullens, C., Kesan, J., Hoff, K. & Bashir, M. (2015, 25-27 September). Shaping privacy law and policy by examining the intersection of knowledge and opinions. Paper to be presented at the Research Conference on Communication, Information and Internet Policy (TPRC 43), Arlington, Virginia. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2588077

Bashir, M., Lambert, A., Wee, J.M.C., & Guo, B. (2015, 11 August). An examination of the vocational and psychological characteristics of cybersecurity competition participants. Proceedings of the USENIX Summit on Gaming, Games and Gamification in Security Education, Washington, D.C. https://www.usenix.org/conference/3gse15/summit-program/presentation/bashir

Huang, H.Y. & Bashir, M. (2015, 2-7 August). Examining the gender gap in information assurance: a study of psychological factors. Proceedings of 17th HCI International Conference. Los Angeles, CA. http://link.springer.com/chapter/10.1007%2F978-3-319-21380-4_21

Huang, H.Y. & Bashir, M. (2015, 22-24 July). Multiple dimensions of information privacy: A socio-cultural approach in a global context. Proceedings of the Symposium on Usable Privacy and Security, 2nd Annual Privacy Personas and Segmentation (PPS) Workshop, Ottowa, Canada.

Huang, H.Y., Bashir, M. & Borisov, N. (2015, 22-24 July). Who is behind the onion? Understanding Tor-relay operators. Proceedings of 11th Symposium on Usable Privacy and Security (SOUPS), Ottawa, Canada. https://cups.cs.cmu.edu/soups/2015/posters/soups2015_posters-final12.pdf

Bashir, M. & Campbell, R. (2015, 22-24 July). Developing a standardized and multidisciplinary curriculum for digital forensics education. Proceedings of 11th Symposium on Usable Privacy and Security, Workshop on Usable Security and Privacy Education, Ottawa, Canada. https://cups.cs.cmu.edu/soups/2015/papers/eduBashir.pdf

Huang, H.Y. & Bashir, M. (2015, 21-23 July). Is privacy a human right? An empirical study in a global context. Proceedings of 13th Annual Conference on Privacy, Security and Trust, Izmir, Turkey. http://ieeexplore.ieee.org/document/7232957/?tp=&arnumber=7232957

Huh, J.H., Kim, H., Bobba, R., & Bashir, M. (2015, 22-24 July). On the memorability of system generated PINs: Can chunking help? Proceedings of the Symposium on Usable Privacy and Security, Ottawa, Canada. https://www.usenix.org/conference/soups2015/proceedings/presentation/huh

Bashir, M., Lambert, A.D., Wee, J.M.C., Guo, B., & Memon, N. (2015, 15-17 June). Exploring the vocational interests of cybersecurity competition participants. Paper to be presented at Colloquium for Information Security Education (CISSE), Las Vegas, NV.

Lambert, A.D., Bashir, M., Guo, B., Memon, N., & Halevi, T. (2015, May 18-20). Are competitions effective in increasing the cybersecurity workforce? Proceedings of  IEEE Security & Privacy, San Jose, CA.

Noureddine, M., Keefe, K., Bashir, M. & Sanders, W.H. (2015, April). Quantitative security metrics with human in the loop (Poster Abstract). Proceedings of the ACM Symposium and Bootcamp on the Science of Security (HotSoS), University of Illinois at Urbana Champaign, Urbana, IL . DOI: 10.1145/2746194.2746215

2014

Hoff, K. & Bashir, M. (2014) Trust in automation: integrating empirical evidence on factors that influence trust. Human Factors: The Journal of the Human Factors and Ergonomics Society, 57 (3), 407-434. DOI:10.1177/0018720814547570

Mullens, C. Kesan, J., Hoff, K. & Bashir, M. (2014, 12-14 Sept.). Knowledge, behavior, and opinions regarding online privacy. Proceedings of the 42nd Research Conference on Communication, Information and Internet Policy (TPRC 2014), George Mason University, Arlington, VA.  http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2418830

Lang, A., Bashir, M., Campbell, R. & DeStefano, L. (2014, 3-6 August). Developing a new digital forensics curriculum. Proceedings of the Digital Forensics Workshop Research Conference, Denver, CO. DOI: 10.1016/j.diin.2014.05.008

Bohr, J. & Bashir, M. (2014, 23-24 July). Who uses bitcoin? An exploration of the bitcoin community. Proceedings of the Twelfth Annual International Conference on Privacy, Security and Trust (PST), Toronto, ON. 2014. DOI: 10.1109/PST.2014.6890928

Hernandez, Bashir, M., Gahyun, J. & Bohr, J. (2014, 22-27 July). Are bitcoin users less sociable? An analysis of users’ language and social connections on twitter. Proceedings of the Human Computer Interaction International (HCII) Conference, Crete, Greece. DOI: 10.1007/978-3-319-07854-0_5

Bashir, M., Hoff, K, & Jeon, G. (2014, 9-11 July). Factors associated with online privacy knowledge. Proceedings of the Symposium On Usable Privacy and Security (SOUPS), Menlo Park, CA. https://cups.cs.cmu.edu/soups/2014/posters/soups2014_posters-paper30.pdf

Huh, J., Kim, H., Bobba, R.B., Bashir, M., & Beznosov, K. (2014, 9-11 July). On the memorability of system-generated PINs: Can Chunking Help? Proceedings of the Symposium On Usable Privacy and Security (SOUPS), Who Are You? Adventures in Authentication (WAY Workshop), Menlo Park, CA. http://cups.cs.cmu.edu/soups/2014/workshops/papers/chunking_huh_11.pdf

Hoff, K. & Bashir, M. (2014, 27 June). Knowledge-based individualized privacy plans (KIPPs): a potential tool to improve the effectiveness of privacy notices. Proceedings of the Carnegie Mellon University, CyLab Workshop on the Future of Privacy Notice and Choice, Pittsburg, PA. https://www.cylab.cmu.edu/news_events/events/fopnac/pdfs/bashir.pdf

Bashir, M., Applequist, J., Campbell, R. DeStafano, L., Garcia, G., & Lang, A. (2014, 28-29 May). Development and dissemination of a new multidisciplinary undergraduate curriculum in digital forensics. Proceedings of the Conference on Associate Digital Forensics, Security and Law (ADFSL), Richmond, Virginia. http://www.digitalforensics-conference.org/files/cdfsl-2014.pdf

Bashir, M. & Jeon, G. (2014, 11-12 Apr).  An examination of psychological factors underlying the gender gap in cybersecurity.  Proceedings of the 2014 Women in Cyber Security Conference (WiCyS), Nashville, TN.

2013

Kesan, J. P., Hayes, C. M., and Bashir, M. (2013). Information privacy and data control in cloud computing: Consumers, privacy preferences, and market efficiency. Washington and Lee Law Review, 70 (1) 341-472. http://scholarlycommons.law.wlu.edu/cgi/viewcontent.cgi?article=4311&context=wlulr

Bashir, M., Hoff, K. (2013, 29 Apr—3 May). A theoretical model for trust in automated systems. Proceedings of Computer Human Interactions Conference, Paris, France. DOI: 10.1145/2468356.2468378

2012

Pfleeger, S., Rogers, M., Bashir, M., Caine, K., Caputo, D., Losavio, M. & Stolfo, S. (2012). Does profiling make us more secure? Privacy & Security: IEEE, 10 (4), 10-15. 10.1109/MSP.2012.95

2011

Bashir, M., Kesan, J., Hayes, C., Zielinski; R. (2011, Dec.). Privacy in the cloud: Going beyond the contractarian paradigm. Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies (GTIP '11). DOI:10.1145/2076496.2076499

Invited Talks

Huang, H.Y. & Bashir, M., (2016, June). Measuring Privacy from Users' Perspective of Information Control and Perceived Risks. 9th Annual Privacy Law Scholars Conference, Washington D.C., U.S. Carnegie Mellon University – Workshop on the Future of Privacy Notice and Choice panelist. "Online Privacy Agreements, Is it Informed Consent?" June 27th, 2014.

Jethwani, M., Memon, N., Wee, J., Bashir, M. (June 2016). The Effectiveness of GenCyber Programs at Building Adolescent Girls' Knowledge, Confidence and Interest. Round Table presentation at The Colloquium for Information Systems Security Education (CISSE), Philadelphia, PA.

Purdue University – The Center for Education and Research in Information Assurance and Security (CERIAS) speaker series, W. Lafayette IN. “Online Privacy Agreements, is it informed Consent?” April 16th, 2014.

UIUC Campus Insights – Presentation to the Board of Trustee on the Program Develop-ment in Digital Forensics. September 11th, 2013.

Air Force Research Laboratory (AFRL) – Center of Excellence of Assured Cloud Computing Seminar series, Rome NY. “Digital Forensics: a Multidisciplinary Approach”. August 21st, 2013.

Sandia National Laboratory – Panelist at “Symposium graduate panel”, Albuquerque NM, annual TITANS University Week. August 5th-7th, 2013.

Cyber and Information Challenges 2012 Conference – SUNYIT and the Cyber New York Alliance, Utica NY. “Consumer Privacy Choices, informed consent, and Baseline protections to facilitate market transactions in the cloud”. June 12th -14th, 2012.

Institute for Information Infrastructure Protection (I3P) – Profiling and Prediction Roundtable panel member, West Lafayette, IN. Workshop “Does Profiling Makes Us More Secure?” March, 2012.

Air Force Research Lab – Assured Cloud Computing seminar, Rome, NY. “Privacy in the cloud: Going beyond the contractarian paradigm”. December, 2011.

Sandia National Laboratory – University Partners Cyber Open House and Workshop, Albuquerque, NM. “Trust - human dimension” Workshop. July 25th -27th, 2011.'

Workshop Offering

Bashir, M., Xu, H., Lambert, A., & Huang, H. Y. (2016). Information Privacy: Current and future research directions. iConference, Philadelphia, U.S.

Under Review

Huang, H.Y. & Bashir, M., (2016, June). Measuring Privacy from Users' Perspective of Information Control and Perceived Risks. Privacy, Trust and Security conference, Auckland, New Zealand, (December 12-14, 2016)

Bashir, M., Strickland, B., & Bohr, J. (2016). What motivates people to use bitcoin?  8th International Conference on Social Informatics, Seattle, WA.

 

 


Related Topics

Ethics and Values for Information, Information Practices and Behaviors, Privacy, Security, and Trust, Social Media, information privacy policy, online communities-master