Erica Briscoe

Learn More
This paper reports on methods and results of an applied research project by a team consisting of SAIC and four universities to develop, integrate, and evaluate new approaches to detect the weak signals characteristic of insider threats on organizations' information systems. Our system combines structural and semantic information from a real corporate(More)
The way people communicate– be it verbally, visually, or via text– is indicative of personality traits. In social media the concept of the status update is used for individuals to communicate to their social networks in an always-on fashion. In doing so individuals utilize various kinds of speech acts that, while primarily communicating their content, also(More)
With the increasing reliance on social media as a dominant communication medium for current news and personal communications, communicators are capable of executing deception with relative ease. While past-related research has investigated written deception in traditional forms of computer mediated communication (e.g. email), we are interested determining(More)
With the growth of social media, embedded sensors, and “smart” devices, those responsible for managing resources during emergencies, such as weather-related disasters, are transitioning from an era of data scarcity to data deluge. During a crisis situation, emergency managers must aggregate various data to assess the situation on the ground,(More)
The increasing proliferation of social media results in users that are forced to ascertain the truthfulness of information that they encounter from unknown sources using a variety of indicators (e.g. explicit ratings, profile information, etc.). Through human-subject experimentation with an online social network-style platform, our study focuses on the(More)
Although a large body of work has previously investigated various cues predicting deceptive communications, especially as demonstrated through written and spoken language (e.g., [30]), little has been done to explore predicting kinds of deception. We present novel work to evaluate the use of textual cues to discriminate between deception strategies (such as(More)
Because social network sites such as Twitter are increasingly being used to express opinions and attitudes, the utility of using these sites as legitimate and immediate information sources is of growing interest. This research examines how well information derived from social media aligns with that from more traditional polling methods. Specifically, this(More)
The adoption of new technology depends on various factors, such as the type of technology, the context or culture in which the technology is introduced, and the individual decisions by people within that culture. This work presents an approach that uses an agent-based model to encompass the detailed behavior of individuals and their immediate network of(More)
A fundamental problem in detecting threats to security by monitoring computer usage is the high number of false positives that are created when analyzing a large data set for anomalous behavior. We address the problem by modeling user behavior at multiple scales so as to allow for the identification potential insider threats from users' logged activity by(More)
Modeling the specific motivations and influences related to an individual‘s decision to become involved in insurgent warfare presents its own collection of unique challenges. The difficulty of the problem often necessitates simplifications that, while making the task more manageable, may inadvertently ̳smooth away‘ critical aspects of the problem.(More)