Becoming a Researcher: Practical Strategies for Taming the Angst and Changing the World

Jeanna Neefe Matthews

https://tinyurl.com/becomingareseacher

2019 Bogota
2019 Cape Town

Slides and Video

Where Given

This talk has been offered many times around the world through programs like the ACM Distinguished Speaker Program, and the Fulbright specialist program in places like:

Related Materials

Examples of learning research methods from a paper in addition to research results

Measuring the Practical Impact of DNSSEC Deployment, Lian et al., USENIX Security 2013.
"Answering these questions requires taking measurements from a large number of clients. We gathered our clients by purchasing ad space from an online advertising network; the ad network enabled us to host an ad at a fixed URL which would be loaded in an iframe on various publishers' web sites."

PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs, McCoy et al., USENIX Security 2012.
"Our use of found data creates two new concerns that we address here: authenticity and ethics. Through these channels we obtained access to three transactional data sets: the complete dump, covering four years, of the GlavMed and SpamIt back-end database (comprising transactions, payments and so on) and a year of more restricted transactional data for the RX-Promotion program. We also received two metadata corpuses: detailed archived chat logs from the program operator for sites operated by GlavMed and SpamIt, as well as financial data concerning the revenue and cost structure for the RX-Promotion program. For further context and back-story about this data, we refer readers to Pharma series by Brian Krebs."

Show Me the Money: Characterizing Spam-advertised Revenue , Kanich et al., USENIX Security 2011.
"We collected order data in two manners: actively via our own purchases and opportunistically, based on the purchases of others. First and foremost are our own purchases, which we conducted in two phases. The first phase arose during a previous study, during which we executed a small number of test purchases from numerous affiliate programs in January and November of 2010 using retail Visa gift cards. Of these, 46 targeted the ten programs under study in this paper. The second phase (comprising the bulk of our active measurements) reflects a regimen of purchases made over three weeks in January and February 2011 focused specifically on the ten programs we identified above."

Dirty Jobs: The Role of Freelance Labor in Web Service Abuse , Motoyama et al., USENIX Security 2011.
"Using over seven years of data from the popular crowd- sourcing site Freelancer.com, as well data from our own active job solicitations, we characterize the labor market involved in service abuse."

An Analysis of Underground Forums , Motoyama et al., ACM Internet Measurement Conference 2011.
"In this study we have the luxury of ground truth - complete records of six underground forums via SQL dumps of their underlying databases. We do not claim that these six are representative of all underground forums, but they provide us with a starting point for understanding the dynamics of underground forums. Each of these datasets has been acquired by unknown outside parties and made ) via various methods. Each forum contains a wealth of information: user registration data, private messages exchanged, forum posts, member status changes, banned user logs, etc. For a more comprehensive list of the available data, please refer to the Invision Power Board (for L33tCrew) and vBulletin database schemas."