SlideShare a Scribd company logo
1 of 30
Designing Cybersecurity
Policies with Field Experiments
Gene Moo Lee
University of Texas at Austin
Joint work with Shu He, John S. Quarterman, Andrew B. Whinston
Supported by NSF 1228990
February 25, 2015
KAIST
Gene Moo Lee, KAIST, Feb 2015
“Although the threats are serious and they
constantly evolve, I believe that if we address them
effectively, we can ensure that the Internet remains
an engine for economic growth and a platform for
the free exchange of ideas.”
—Barack Obama
2
Gene Moo Lee, KAIST, Feb 2015
Motivation
• Inadequate cybersecurity is a serious threat
• avg cost $3.5 million in 2013, 15% increase
• # of compromises increased by 25%
• data breaches of 2.6 million Target consumers
• U.S. government’s measures
• Cybersecurity Policy Review (2009)
• Executive Order 13636 (2013) “Improving Critical
Infrastructure Cybersecurity”
3
Gene Moo Lee, KAIST, Feb 2015
Approaches
• Technical approaches:
• spam filtering, intrusion detection systems (IDS), digital
forensics
• Sahami et al. (1998), Cormack and Lynam (2007), Denning
(1987), Lee and Stolfo (1998), Casey (2011), Taylor et al.
(2014)
• Economic approaches:
• underinvestment due to (1) information asymmetry, (2)
network externalities, (3) moral hazards
• van Eeten et al. (2011), Moore and Clayton (2011), Arora
et al. (2004), D’Arcy et al. (2009), Wood and Rowe (2011)
4
Gene Moo Lee, KAIST, Feb 2015
Our approach
• We found evidence that spam evaluation publication help improving
security levels in country level
• Quarterman et al. (2012), Qian et al. (2013)
• Use outbound spam to estimate latent security level
• 90% spam is from compromised computers controlled by botnets
(Rao and Reiley 2012, Moore and Clayton 2011)
• Ultimate goal:
• Evaluate the effectiveness in organizational level
• government sponsored institution to monitor and evaluate
organizational security levels (Moody’s, S&P for bonds)
• Counterfactual policy analysis with randomized field experiments
5
Gene Moo Lee, KAIST, Feb 2015
Research questions
1. Our goal is to set up an independent institution to evaluate
and monitor all organizations’ cybersecurity level
2. Does information disclosure change organizational
behaviour? In other words, spam reduce?
• Method: Randomized field experiment
• Two treatment groups with different info disclosure
• Two cycles of emails at January/March 2014
• A website built on Google cloud
6
Gene Moo Lee, KAIST, Feb 2015
Experimental design
• 7919 US organizations, three groups: control, private, public
• Private treatment: email with spam volume, rank, IP addr
• Public treatment: email + publication in public website
7
Gene Moo Lee, KAIST, Feb 2015
Randomization
• Stratification with industry sectors and IP counts
• Pair-wise matching with pre-experimental spam volume
• Re-randomization: 10,000 times and power calculation
8
Gene Moo Lee, KAIST, Feb 2015
Treatment channel: email
9
Gene Moo Lee, KAIST, Feb 2015
Website: search engine
10
• http://cloud.spamrankings.net
Gene Moo Lee, KAIST, Feb 2015
Website: overall stats
11
Gene Moo Lee, KAIST, Feb 2015
Website: detail charts
12
Gene Moo Lee, KAIST, Feb 2015
System implementation
• Back end: data collector, peer ranker, web generator, MySQL, JSON
• Front end: Google cloud, search engine, analytics
13
Gene Moo Lee, KAIST, Feb 2015
Data: CBL and PSBL
14
• A spam blocklist uses spamtraps to collect IP adresses
sending out spams:
• CBL: http://cbl.abuseat.org/
• PSBL: http://psbl.org/
• Spamtrap
• honeypot used to collect spam
• email addresses not for legit communications
• CBL daily avg data
• 8 million IP, 190K netblocks, 21K ASNs, 200 countries
Gene Moo Lee, KAIST, Feb 2015
Organizational spam data
15
• IP > netblock > ASN > organization
• IP > netblock: IP lookup
• netblock > ASN: Team Cymru
• ASN > org: algorithm + manual inspection
• Organization data from LexisNexis
• 7919 U.S. organizations identified
• Industry codes: SIC, NAICS
• Public/private, # employees
Gene Moo Lee, KAIST, Feb 2015
Org level spam volume and IP address
16
Gene Moo Lee, KAIST, Feb 2015
Industry sectors
17
Gene Moo Lee, KAIST, Feb 2015
Industry level spam volume/host
18
Gene Moo Lee, KAIST, Feb 2015
Hypothesis development
1. Information disclosure effect
2. Publicity effect
3. Pre-experimental security level
4. Industry competition level
19
Gene Moo Lee, KAIST, Feb 2015
Info sharing and publicity effects (H1, 2)
20
Gene Moo Lee, KAIST, Feb 2015
Large spammers (H3)
21
Gene Moo Lee, KAIST, Feb 2015
Competition (H4)
22
Gene Moo Lee, KAIST, Feb 2015
Empirical analysis summary
1. Private info sharing doesn’t work
2. Publicity matters
3. Organizations with (1) large spam, (2)
less competition reacted
4. Peer effect exists after the treatments.
Stronger with treatment groups.
23
Gene Moo Lee, KAIST, Feb 2015
Robustness check
1. Placebo test: change experiment time
2. Subsample analysis: only include
moderate spammers
3. Alternative pre-experimental spam
measure: 6, 4, 2, months
4. Control variables
24
Gene Moo Lee, KAIST, Feb 2015
Directions
1. Robust security evaluation: spam,
phishing, DDoS, etc.
2. Different environment: China, Korea
3. Treatment channel: social media
4. Cybersecurity insurance
5. Cloud security
25
Gene Moo Lee, KAIST, Feb 2015
Thank you!
Contact: gene@cs.utexas.edu
26
Gene Moo Lee, KAIST, Feb 2015
References (1)
[1] Adelsman, Rony M., and Andrew B. Whinston (1977). "Sophisticated voting with information
for two voting functions." Journal of Economic Theory 15, no. 1: pp. 145-159.
[2] Anderson, Axel, and Lones Smith. "Dynamic Deception." American Economic Review 103, no.
7 (2013): 2811-47.
[3] Anderson, Ross (2001). "Why information security is hard: An economic perspective." IEEE
Computer Security Applications Conference, pp. 358-365.
[4] Aral, Sinan, and Dylan Walker. "Identifying influential and susceptible members of social
networks." Science 337, no. 6092 (2012): pp. 337-341.
[5] Arora, Ashish, Ramayya Krishnan, Anand Nandkumar, Rahul Telang, and Yubao Yang (2004).
"Impact of vulnerability disclosure and patch availability-an empirical analysis." Workshop on
Economics of Information Security, vol. 24, pp. 1268-1287.
[6] Bauer, Johannes, and Michael van Eeten (2009). “Cybersecurity: Stakeholder incentives, externalities,
and policy options.” Telecommunications Policy, Vol. 33, pp. 706-719.
[7] Blei, David M., Andrew Y. Ng, and Michael I. Jordan (2003). "Latent dirichlet allocation."
Journal of Machine Learning Research 3: pp. 993-1022.
[8] Bratko, Andrej, Gordon V. Cormack, Bogdan Filipic, Thomas R. Lynam, and Blaz Zupan
(2006). Journal of Machine Learning Research 6: pp. 2673-2698.
[9] Bruhn, Miriam, and David McKenzie (2008). "In pursuit of balance: Randomization in practice
in development field experiments." World Bank Policy Research Working Paper Series.
[10] Casey, Eoghan (2011). Digital evidence and computer crime: Forensic science, computers and
the Internet. Academic Press.
[11] Cormack, Gordon V., and Thomas R. Lynam (2007). “Online supervised spam filter evaluation.”
ACM Transaction on Information Systems, Vol. 25(3)
27
Gene Moo Lee, KAIST, Feb 2015
References (2)
[12] D’Arcy, John, Anat Hovav, and Dennis Galletta (2009). "User awareness of security countermeasures
and its impact on information systems misuse: A deterrence approach." Information
Systems Research 20, no. 1: pp. 79-98.
[13] Denning, Dorothy E. (1987). “An intrusion-detection model.” IEEE Transactions on Software
Engineering, Vol. 13(2): pp. 222-232.
[14] Dharmapurikar, Sarang, Praveen Krishnamurthy, and David E. Taylor (2003). “Longest prefix
matching using bloom filters.” Proceedings of the ACM SIGCOMM Conference: pp. 201-212.
[15] Dice, Lee R. (1945). “Measures of the amount of ecologic association between species.” Ecology
26(3): pp. 297-302.
[16] Duflo, Esther, Rachel Glennerster, and Michael Kremer. "Using randomization in development
economics research: A toolkit." Handbook of development economics 4 (2007): 3895-3962.
[17] Fracassi, Cesare (2014). "Corporate finance policies and social networks." In AFA 2011 Denver
Meetings Paper.
[18] Festinger, Leon. "A theory of social comparison processes." Human relations 7, no. 2 (1954):
117-140.
[19] Gal-Or, Esther, and Anindya Ghose (2005). "The economic incentives for sharing security
information." Information Systems Research 16, no. 2: pp. 186-208.
[20] Graham, Bryan S. (2008). "Identifying social interactions through conditional variance restrictions."
Econometrica 76, no. 3: pp. 643-660.
[21] Harper, Yan Chen, F. Maxwell, Joseph Konstan, and Sherry Xin Li. "Social comparisons and
contributions to online communities: A field experiment on movielens." The American economic
review (2010): 1358-1398.
[22] Harrison, Glenn W., and John A. List (2004). "Field experiments." Journal of Economic Literature:
pp. 1009-1055.
[23] Kugler, Logan (2014). “Online Privacy: Regional Differences.” Communications of the ACM,
Vol. 58 No. 2, pp. 18-20.
28
Gene Moo Lee, KAIST, Feb 2015
References (3)
[24] Krebs, Brian (2014). Spam Nation: The Inside Story of Organized Cybercrime - from Global
Epidemic to Your Front Door. Sourcebooks, Inc.
[25] Lee, Wenke, and Salvatore J. Stolfo (1998). “Data mining approaches for intrusion detection.”
Proceedings of 7th USENIX Security Symposium.
[26] Levchenko, Kirill, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris
Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas
Weaver, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage (2011). "Click Trajectories:
End-to-End Analysis of the Spam Value Chain." IEEE Symposium on Security and Privacy.
[27] Moore, Tyler and Richard Clayton (2011). "The Impact of Public Information on Phishing
Attack and Defense." Communications & Strategies 81.
[28] Morgan, Kari Lock, and Donald B. Rubin (2012). "Rerandomization to improve covariate
balance in experiments." Annals of Statistics 40, no. 2: pp. 1263-1282.
[29] Popadak, Jillian A. (2012). "Dividend Payments as a Response to Peer Influence." Available
at SSRN 2170561, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2170561.
[30] Pitsillidis, Andreas, Chris Kanich, Geoffrey M Voelker, Kirill Levchenko, Stefan Savage (2012).
“Taster’s choice: A comparative analysis of spam feeds.” Proceedings of the 2012 ACM Internet
Meassure Conference: pp. 427-440.
[31] Rao, Justin M., and David H. Reiley (2012). "The economics of spam." Journal of Economic
Perspectives 26, no. 3: pp. 87-110.
[32] Roesch, Martin (1999). “SNORT: Lightweight intrusion detection for networks.” Proceedings
of 13th Large Installation System Administration Conference, pp. 229-238.
[33] Rothschild, Michael, and Joseph Stiglitz (1992). “Equilibrium in competitive insurance markets:
An essay on the economics of imperfect information.” Springer Netherlands.
[34] Sahami, Mehran, Susan Dumais, David Heckerman, and Eric Horvitz (1998). “A Bayesian
approach to filtering junk e-mail.” Learning for Text Categorization 62: pp. 98-105.
29
Gene Moo Lee, KAIST, Feb 2015
References (4)
[35] Shue, Kelly (2013). "Executive networks and firm policies: Evidence from the random assignment
of MBA peers." Review of Financial Studies 26, no. 6: pp. 1401-1442.
[36] Tang, Qian, Leigh Linden, John S. Quarterman, and Andrew B. Whinston (2013). “Improving
Internet security through social information and social comparison: A field quasi-experiment.”
In Workshop on the Economics of Information Security.
[37] Taylor, Robert W., Eric J. Fritsch, and John Liederbach (2014). Digital crime and digital
terrorism. Prentice Hall Press.
[38] Taylor, Shelley E., and Marci Lobel (1989). "Social comparison activity under threat: downward
evaluation and upward contacts." Psychological review 96, no. 4: p. 569.
[39] van Eeten, M., H. Asghari, J. M. Bauer, and S. Tabatabaie (2011). "Internet service providers
and botnet mitigation: A fact-finding study on the Dutch market." Delft University of Technology.
[40] Wood, Dallas, and Brent Rowe (2011). "Assessing home Internet users’ demand for security:
Will they pay ISPs?" Workshop of Economics of Information Security.
30

More Related Content

What's hot

A method to evaluate the reliability of social media data for social network ...
A method to evaluate the reliability of social media data for social network ...A method to evaluate the reliability of social media data for social network ...
A method to evaluate the reliability of social media data for social network ...Derek Weber
 
Individual project 2.20
Individual project 2.20Individual project 2.20
Individual project 2.20Monisha100
 
Explainable Fact Checking with Humans in-the-loop
Explainable Fact Checking with Humans in-the-loopExplainable Fact Checking with Humans in-the-loop
Explainable Fact Checking with Humans in-the-loopMatthew Lease
 
Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...
Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...
Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...Matthew Lease
 
How to social scientists use link data (11 june2010)
How to social scientists use link data (11 june2010)How to social scientists use link data (11 june2010)
How to social scientists use link data (11 june2010)Han Woo PARK
 
Literature Review on Social Networking in Supply chain
Literature Review on Social Networking in Supply chainLiterature Review on Social Networking in Supply chain
Literature Review on Social Networking in Supply chainSujoy Bag
 
30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow 30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow Mike Kujawski
 
Developing A Big Data Analytics Framework for Industry Intelligence
Developing A Big Data Analytics Framework for Industry IntelligenceDeveloping A Big Data Analytics Framework for Industry Intelligence
Developing A Big Data Analytics Framework for Industry IntelligenceGene Moo Lee
 
Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Mike Kujawski
 
Data Journalism and the Remaking of Data Infrastructures
Data Journalism and the Remaking of Data InfrastructuresData Journalism and the Remaking of Data Infrastructures
Data Journalism and the Remaking of Data InfrastructuresLiliana Bounegru
 
Citizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsCitizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsAmit Sheth
 
Matching Uses and Protections for Government Data Releases: Presentation at t...
Matching Uses and Protections for Government Data Releases: Presentation at t...Matching Uses and Protections for Government Data Releases: Presentation at t...
Matching Uses and Protections for Government Data Releases: Presentation at t...Micah Altman
 
Social Media Mining - Chapter 10 (Behavior Analytics)
Social Media Mining - Chapter 10 (Behavior Analytics)Social Media Mining - Chapter 10 (Behavior Analytics)
Social Media Mining - Chapter 10 (Behavior Analytics)SocialMediaMining
 
Computational Social Science:The Collaborative Futures of Big Data, Computer ...
Computational Social Science:The Collaborative Futures of Big Data, Computer ...Computational Social Science:The Collaborative Futures of Big Data, Computer ...
Computational Social Science:The Collaborative Futures of Big Data, Computer ...Academia Sinica
 
Ethics in Data Science and Machine Learning
Ethics in Data Science and Machine LearningEthics in Data Science and Machine Learning
Ethics in Data Science and Machine LearningHJ van Veen
 
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsIntroduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsMike Kujawski
 
Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019
Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019
Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019Micah Altman
 
The story of Data Stories
The story of Data StoriesThe story of Data Stories
The story of Data StoriesElena Simperl
 
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...Matthew Lease
 
Designing Human-AI Partnerships to Combat Misinfomation
Designing Human-AI Partnerships to Combat Misinfomation Designing Human-AI Partnerships to Combat Misinfomation
Designing Human-AI Partnerships to Combat Misinfomation Matthew Lease
 

What's hot (20)

A method to evaluate the reliability of social media data for social network ...
A method to evaluate the reliability of social media data for social network ...A method to evaluate the reliability of social media data for social network ...
A method to evaluate the reliability of social media data for social network ...
 
Individual project 2.20
Individual project 2.20Individual project 2.20
Individual project 2.20
 
Explainable Fact Checking with Humans in-the-loop
Explainable Fact Checking with Humans in-the-loopExplainable Fact Checking with Humans in-the-loop
Explainable Fact Checking with Humans in-the-loop
 
Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...
Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...
Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...
 
How to social scientists use link data (11 june2010)
How to social scientists use link data (11 june2010)How to social scientists use link data (11 june2010)
How to social scientists use link data (11 june2010)
 
Literature Review on Social Networking in Supply chain
Literature Review on Social Networking in Supply chainLiterature Review on Social Networking in Supply chain
Literature Review on Social Networking in Supply chain
 
30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow 30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow
 
Developing A Big Data Analytics Framework for Industry Intelligence
Developing A Big Data Analytics Framework for Industry IntelligenceDeveloping A Big Data Analytics Framework for Industry Intelligence
Developing A Big Data Analytics Framework for Industry Intelligence
 
Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...
 
Data Journalism and the Remaking of Data Infrastructures
Data Journalism and the Remaking of Data InfrastructuresData Journalism and the Remaking of Data Infrastructures
Data Journalism and the Remaking of Data Infrastructures
 
Citizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsCitizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and Applications
 
Matching Uses and Protections for Government Data Releases: Presentation at t...
Matching Uses and Protections for Government Data Releases: Presentation at t...Matching Uses and Protections for Government Data Releases: Presentation at t...
Matching Uses and Protections for Government Data Releases: Presentation at t...
 
Social Media Mining - Chapter 10 (Behavior Analytics)
Social Media Mining - Chapter 10 (Behavior Analytics)Social Media Mining - Chapter 10 (Behavior Analytics)
Social Media Mining - Chapter 10 (Behavior Analytics)
 
Computational Social Science:The Collaborative Futures of Big Data, Computer ...
Computational Social Science:The Collaborative Futures of Big Data, Computer ...Computational Social Science:The Collaborative Futures of Big Data, Computer ...
Computational Social Science:The Collaborative Futures of Big Data, Computer ...
 
Ethics in Data Science and Machine Learning
Ethics in Data Science and Machine LearningEthics in Data Science and Machine Learning
Ethics in Data Science and Machine Learning
 
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsIntroduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
 
Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019
Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019
Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019
 
The story of Data Stories
The story of Data StoriesThe story of Data Stories
The story of Data Stories
 
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...
 
Designing Human-AI Partnerships to Combat Misinfomation
Designing Human-AI Partnerships to Combat Misinfomation Designing Human-AI Partnerships to Combat Misinfomation
Designing Human-AI Partnerships to Combat Misinfomation
 

Viewers also liked

Viewers also liked (11)

CP Events - Profile p2
CP Events - Profile p2CP Events - Profile p2
CP Events - Profile p2
 
Leading Teams - jay-cee
Leading Teams - jay-ceeLeading Teams - jay-cee
Leading Teams - jay-cee
 
Los animales
Los animalesLos animales
Los animales
 
Presentación en FNAC Málaga del poemario 'Poso de ceniza'
Presentación en FNAC Málaga del poemario 'Poso de ceniza'Presentación en FNAC Málaga del poemario 'Poso de ceniza'
Presentación en FNAC Málaga del poemario 'Poso de ceniza'
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Ensayo
EnsayoEnsayo
Ensayo
 
效果图
效果图效果图
效果图
 
34
3434
34
 
To Know it all....
To Know it all....To Know it all....
To Know it all....
 
Br. luis alejandro mendoza
Br. luis alejandro mendozaBr. luis alejandro mendoza
Br. luis alejandro mendoza
 
2016 11-18.lliurament
2016 11-18.lliurament2016 11-18.lliurament
2016 11-18.lliurament
 

Similar to Designing Cybersecurity Policies with Field Experiments

BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCESBROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCESMicah Altman
 
Big Data Analytics: Challenges and Opportunities
Big Data Analytics: Challenges and OpportunitiesBig Data Analytics: Challenges and Opportunities
Big Data Analytics: Challenges and OpportunitiesGene Moo Lee
 
1. Data Science overview - part1.pptx
1. Data Science overview - part1.pptx1. Data Science overview - part1.pptx
1. Data Science overview - part1.pptxRahulTr22
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Designgloriakt
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
A survey on applications of social networks in marketing-English Version
A survey on applications of social networks in marketing-English VersionA survey on applications of social networks in marketing-English Version
A survey on applications of social networks in marketing-English Versionzohreh izadpanah
 
Big data analytics and its impact on internet users
Big data analytics and its impact on internet usersBig data analytics and its impact on internet users
Big data analytics and its impact on internet usersStruggler Ever
 
4차 산업혁명 시대의 싱크탱크의 변화(kdi)
4차 산업혁명 시대의 싱크탱크의 변화(kdi)4차 산업혁명 시대의 싱크탱크의 변화(kdi)
4차 산업혁명 시대의 싱크탱크의 변화(kdi)Sungho Lee
 
The What, Why and How of Big Data
The What, Why and How of Big DataThe What, Why and How of Big Data
The What, Why and How of Big DataLuca Naso
 
Big data - a review (2013 4)
Big data - a review (2013 4)Big data - a review (2013 4)
Big data - a review (2013 4)Sonu Gupta
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Arab Federation for Digital Economy
 
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
June 2015 (142)  MIS Quarterly Executive   67The Big Dat.docxJune 2015 (142)  MIS Quarterly Executive   67The Big Dat.docx
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docxcroysierkathey
 
Economic Challenges of Big Data
Economic Challenges of Big DataEconomic Challenges of Big Data
Economic Challenges of Big DataBYTE Project
 
Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...
Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...
Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...Galit Shmueli
 
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxWeek 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxphilipnelson29183
 
Scientific Reproducibility from an Informatics Perspective
Scientific Reproducibility from an Informatics PerspectiveScientific Reproducibility from an Informatics Perspective
Scientific Reproducibility from an Informatics PerspectiveMicah Altman
 
Reproducibility from an infomatics perspective
Reproducibility from an infomatics perspectiveReproducibility from an infomatics perspective
Reproducibility from an infomatics perspectiveMicah Altman
 
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Saurabh Mishra
 
Post 1Many of you have heard the popular slogans and taglines .docx
Post 1Many of you have heard the popular slogans and taglines .docxPost 1Many of you have heard the popular slogans and taglines .docx
Post 1Many of you have heard the popular slogans and taglines .docxstilliegeorgiana
 

Similar to Designing Cybersecurity Policies with Field Experiments (20)

BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCESBROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
 
Big Data Analytics: Challenges and Opportunities
Big Data Analytics: Challenges and OpportunitiesBig Data Analytics: Challenges and Opportunities
Big Data Analytics: Challenges and Opportunities
 
1. Data Science overview - part1.pptx
1. Data Science overview - part1.pptx1. Data Science overview - part1.pptx
1. Data Science overview - part1.pptx
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
Order 32740459
Order 32740459Order 32740459
Order 32740459
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
A survey on applications of social networks in marketing-English Version
A survey on applications of social networks in marketing-English VersionA survey on applications of social networks in marketing-English Version
A survey on applications of social networks in marketing-English Version
 
Big data analytics and its impact on internet users
Big data analytics and its impact on internet usersBig data analytics and its impact on internet users
Big data analytics and its impact on internet users
 
4차 산업혁명 시대의 싱크탱크의 변화(kdi)
4차 산업혁명 시대의 싱크탱크의 변화(kdi)4차 산업혁명 시대의 싱크탱크의 변화(kdi)
4차 산업혁명 시대의 싱크탱크의 변화(kdi)
 
The What, Why and How of Big Data
The What, Why and How of Big DataThe What, Why and How of Big Data
The What, Why and How of Big Data
 
Big data - a review (2013 4)
Big data - a review (2013 4)Big data - a review (2013 4)
Big data - a review (2013 4)
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
 
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
June 2015 (142)  MIS Quarterly Executive   67The Big Dat.docxJune 2015 (142)  MIS Quarterly Executive   67The Big Dat.docx
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
 
Economic Challenges of Big Data
Economic Challenges of Big DataEconomic Challenges of Big Data
Economic Challenges of Big Data
 
Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...
Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...
Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...
 
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxWeek 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
 
Scientific Reproducibility from an Informatics Perspective
Scientific Reproducibility from an Informatics PerspectiveScientific Reproducibility from an Informatics Perspective
Scientific Reproducibility from an Informatics Perspective
 
Reproducibility from an infomatics perspective
Reproducibility from an infomatics perspectiveReproducibility from an infomatics perspective
Reproducibility from an infomatics perspective
 
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
 
Post 1Many of you have heard the popular slogans and taglines .docx
Post 1Many of you have heard the popular slogans and taglines .docxPost 1Many of you have heard the popular slogans and taglines .docx
Post 1Many of you have heard the popular slogans and taglines .docx
 

More from Gene Moo Lee

Content Complexity, Similarity, and Consistency in Social Media: A Deep Learn...
Content Complexity, Similarity, and Consistency in Social Media: A Deep Learn...Content Complexity, Similarity, and Consistency in Social Media: A Deep Learn...
Content Complexity, Similarity, and Consistency in Social Media: A Deep Learn...Gene Moo Lee
 
Analyzing the spillover roles of user-generated reviews on purchases: Evidenc...
Analyzing the spillover roles of user-generated reviews on purchases: Evidenc...Analyzing the spillover roles of user-generated reviews on purchases: Evidenc...
Analyzing the spillover roles of user-generated reviews on purchases: Evidenc...Gene Moo Lee
 
Towards Advanced Business Analytics using Text Mining and Deep Learning
Towards Advanced Business Analytics using Text Mining and Deep LearningTowards Advanced Business Analytics using Text Mining and Deep Learning
Towards Advanced Business Analytics using Text Mining and Deep LearningGene Moo Lee
 
Towards a better measure of business proximity: Topic modeling for industry i...
Towards a better measure of business proximity: Topic modeling for industry i...Towards a better measure of business proximity: Topic modeling for industry i...
Towards a better measure of business proximity: Topic modeling for industry i...Gene Moo Lee
 
Introduction to NP Completeness
Introduction to NP CompletenessIntroduction to NP Completeness
Introduction to NP CompletenessGene Moo Lee
 
Improving Sketch Reconstruction Accuracy
Improving Sketch Reconstruction AccuracyImproving Sketch Reconstruction Accuracy
Improving Sketch Reconstruction AccuracyGene Moo Lee
 
Improving the Interaction between Overlay Routing and Traffic Engineering
Improving the Interaction between Overlay Routing and Traffic EngineeringImproving the Interaction between Overlay Routing and Traffic Engineering
Improving the Interaction between Overlay Routing and Traffic EngineeringGene Moo Lee
 
Modeling Human Mobility using Location Based Social Networks
Modeling Human Mobility using Location Based Social NetworksModeling Human Mobility using Location Based Social Networks
Modeling Human Mobility using Location Based Social NetworksGene Moo Lee
 
Mobile Video Delivery via Human Movement
Mobile Video Delivery via Human MovementMobile Video Delivery via Human Movement
Mobile Video Delivery via Human MovementGene Moo Lee
 
Towards modeling M&A in high tech industries
Towards modeling M&A in high tech industriesTowards modeling M&A in high tech industries
Towards modeling M&A in high tech industriesGene Moo Lee
 

More from Gene Moo Lee (10)

Content Complexity, Similarity, and Consistency in Social Media: A Deep Learn...
Content Complexity, Similarity, and Consistency in Social Media: A Deep Learn...Content Complexity, Similarity, and Consistency in Social Media: A Deep Learn...
Content Complexity, Similarity, and Consistency in Social Media: A Deep Learn...
 
Analyzing the spillover roles of user-generated reviews on purchases: Evidenc...
Analyzing the spillover roles of user-generated reviews on purchases: Evidenc...Analyzing the spillover roles of user-generated reviews on purchases: Evidenc...
Analyzing the spillover roles of user-generated reviews on purchases: Evidenc...
 
Towards Advanced Business Analytics using Text Mining and Deep Learning
Towards Advanced Business Analytics using Text Mining and Deep LearningTowards Advanced Business Analytics using Text Mining and Deep Learning
Towards Advanced Business Analytics using Text Mining and Deep Learning
 
Towards a better measure of business proximity: Topic modeling for industry i...
Towards a better measure of business proximity: Topic modeling for industry i...Towards a better measure of business proximity: Topic modeling for industry i...
Towards a better measure of business proximity: Topic modeling for industry i...
 
Introduction to NP Completeness
Introduction to NP CompletenessIntroduction to NP Completeness
Introduction to NP Completeness
 
Improving Sketch Reconstruction Accuracy
Improving Sketch Reconstruction AccuracyImproving Sketch Reconstruction Accuracy
Improving Sketch Reconstruction Accuracy
 
Improving the Interaction between Overlay Routing and Traffic Engineering
Improving the Interaction between Overlay Routing and Traffic EngineeringImproving the Interaction between Overlay Routing and Traffic Engineering
Improving the Interaction between Overlay Routing and Traffic Engineering
 
Modeling Human Mobility using Location Based Social Networks
Modeling Human Mobility using Location Based Social NetworksModeling Human Mobility using Location Based Social Networks
Modeling Human Mobility using Location Based Social Networks
 
Mobile Video Delivery via Human Movement
Mobile Video Delivery via Human MovementMobile Video Delivery via Human Movement
Mobile Video Delivery via Human Movement
 
Towards modeling M&A in high tech industries
Towards modeling M&A in high tech industriesTowards modeling M&A in high tech industries
Towards modeling M&A in high tech industries
 

Recently uploaded

定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 

Recently uploaded (20)

定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 

Designing Cybersecurity Policies with Field Experiments

  • 1. Designing Cybersecurity Policies with Field Experiments Gene Moo Lee University of Texas at Austin Joint work with Shu He, John S. Quarterman, Andrew B. Whinston Supported by NSF 1228990 February 25, 2015 KAIST
  • 2. Gene Moo Lee, KAIST, Feb 2015 “Although the threats are serious and they constantly evolve, I believe that if we address them effectively, we can ensure that the Internet remains an engine for economic growth and a platform for the free exchange of ideas.” —Barack Obama 2
  • 3. Gene Moo Lee, KAIST, Feb 2015 Motivation • Inadequate cybersecurity is a serious threat • avg cost $3.5 million in 2013, 15% increase • # of compromises increased by 25% • data breaches of 2.6 million Target consumers • U.S. government’s measures • Cybersecurity Policy Review (2009) • Executive Order 13636 (2013) “Improving Critical Infrastructure Cybersecurity” 3
  • 4. Gene Moo Lee, KAIST, Feb 2015 Approaches • Technical approaches: • spam filtering, intrusion detection systems (IDS), digital forensics • Sahami et al. (1998), Cormack and Lynam (2007), Denning (1987), Lee and Stolfo (1998), Casey (2011), Taylor et al. (2014) • Economic approaches: • underinvestment due to (1) information asymmetry, (2) network externalities, (3) moral hazards • van Eeten et al. (2011), Moore and Clayton (2011), Arora et al. (2004), D’Arcy et al. (2009), Wood and Rowe (2011) 4
  • 5. Gene Moo Lee, KAIST, Feb 2015 Our approach • We found evidence that spam evaluation publication help improving security levels in country level • Quarterman et al. (2012), Qian et al. (2013) • Use outbound spam to estimate latent security level • 90% spam is from compromised computers controlled by botnets (Rao and Reiley 2012, Moore and Clayton 2011) • Ultimate goal: • Evaluate the effectiveness in organizational level • government sponsored institution to monitor and evaluate organizational security levels (Moody’s, S&P for bonds) • Counterfactual policy analysis with randomized field experiments 5
  • 6. Gene Moo Lee, KAIST, Feb 2015 Research questions 1. Our goal is to set up an independent institution to evaluate and monitor all organizations’ cybersecurity level 2. Does information disclosure change organizational behaviour? In other words, spam reduce? • Method: Randomized field experiment • Two treatment groups with different info disclosure • Two cycles of emails at January/March 2014 • A website built on Google cloud 6
  • 7. Gene Moo Lee, KAIST, Feb 2015 Experimental design • 7919 US organizations, three groups: control, private, public • Private treatment: email with spam volume, rank, IP addr • Public treatment: email + publication in public website 7
  • 8. Gene Moo Lee, KAIST, Feb 2015 Randomization • Stratification with industry sectors and IP counts • Pair-wise matching with pre-experimental spam volume • Re-randomization: 10,000 times and power calculation 8
  • 9. Gene Moo Lee, KAIST, Feb 2015 Treatment channel: email 9
  • 10. Gene Moo Lee, KAIST, Feb 2015 Website: search engine 10 • http://cloud.spamrankings.net
  • 11. Gene Moo Lee, KAIST, Feb 2015 Website: overall stats 11
  • 12. Gene Moo Lee, KAIST, Feb 2015 Website: detail charts 12
  • 13. Gene Moo Lee, KAIST, Feb 2015 System implementation • Back end: data collector, peer ranker, web generator, MySQL, JSON • Front end: Google cloud, search engine, analytics 13
  • 14. Gene Moo Lee, KAIST, Feb 2015 Data: CBL and PSBL 14 • A spam blocklist uses spamtraps to collect IP adresses sending out spams: • CBL: http://cbl.abuseat.org/ • PSBL: http://psbl.org/ • Spamtrap • honeypot used to collect spam • email addresses not for legit communications • CBL daily avg data • 8 million IP, 190K netblocks, 21K ASNs, 200 countries
  • 15. Gene Moo Lee, KAIST, Feb 2015 Organizational spam data 15 • IP > netblock > ASN > organization • IP > netblock: IP lookup • netblock > ASN: Team Cymru • ASN > org: algorithm + manual inspection • Organization data from LexisNexis • 7919 U.S. organizations identified • Industry codes: SIC, NAICS • Public/private, # employees
  • 16. Gene Moo Lee, KAIST, Feb 2015 Org level spam volume and IP address 16
  • 17. Gene Moo Lee, KAIST, Feb 2015 Industry sectors 17
  • 18. Gene Moo Lee, KAIST, Feb 2015 Industry level spam volume/host 18
  • 19. Gene Moo Lee, KAIST, Feb 2015 Hypothesis development 1. Information disclosure effect 2. Publicity effect 3. Pre-experimental security level 4. Industry competition level 19
  • 20. Gene Moo Lee, KAIST, Feb 2015 Info sharing and publicity effects (H1, 2) 20
  • 21. Gene Moo Lee, KAIST, Feb 2015 Large spammers (H3) 21
  • 22. Gene Moo Lee, KAIST, Feb 2015 Competition (H4) 22
  • 23. Gene Moo Lee, KAIST, Feb 2015 Empirical analysis summary 1. Private info sharing doesn’t work 2. Publicity matters 3. Organizations with (1) large spam, (2) less competition reacted 4. Peer effect exists after the treatments. Stronger with treatment groups. 23
  • 24. Gene Moo Lee, KAIST, Feb 2015 Robustness check 1. Placebo test: change experiment time 2. Subsample analysis: only include moderate spammers 3. Alternative pre-experimental spam measure: 6, 4, 2, months 4. Control variables 24
  • 25. Gene Moo Lee, KAIST, Feb 2015 Directions 1. Robust security evaluation: spam, phishing, DDoS, etc. 2. Different environment: China, Korea 3. Treatment channel: social media 4. Cybersecurity insurance 5. Cloud security 25
  • 26. Gene Moo Lee, KAIST, Feb 2015 Thank you! Contact: gene@cs.utexas.edu 26
  • 27. Gene Moo Lee, KAIST, Feb 2015 References (1) [1] Adelsman, Rony M., and Andrew B. Whinston (1977). "Sophisticated voting with information for two voting functions." Journal of Economic Theory 15, no. 1: pp. 145-159. [2] Anderson, Axel, and Lones Smith. "Dynamic Deception." American Economic Review 103, no. 7 (2013): 2811-47. [3] Anderson, Ross (2001). "Why information security is hard: An economic perspective." IEEE Computer Security Applications Conference, pp. 358-365. [4] Aral, Sinan, and Dylan Walker. "Identifying influential and susceptible members of social networks." Science 337, no. 6092 (2012): pp. 337-341. [5] Arora, Ashish, Ramayya Krishnan, Anand Nandkumar, Rahul Telang, and Yubao Yang (2004). "Impact of vulnerability disclosure and patch availability-an empirical analysis." Workshop on Economics of Information Security, vol. 24, pp. 1268-1287. [6] Bauer, Johannes, and Michael van Eeten (2009). “Cybersecurity: Stakeholder incentives, externalities, and policy options.” Telecommunications Policy, Vol. 33, pp. 706-719. [7] Blei, David M., Andrew Y. Ng, and Michael I. Jordan (2003). "Latent dirichlet allocation." Journal of Machine Learning Research 3: pp. 993-1022. [8] Bratko, Andrej, Gordon V. Cormack, Bogdan Filipic, Thomas R. Lynam, and Blaz Zupan (2006). Journal of Machine Learning Research 6: pp. 2673-2698. [9] Bruhn, Miriam, and David McKenzie (2008). "In pursuit of balance: Randomization in practice in development field experiments." World Bank Policy Research Working Paper Series. [10] Casey, Eoghan (2011). Digital evidence and computer crime: Forensic science, computers and the Internet. Academic Press. [11] Cormack, Gordon V., and Thomas R. Lynam (2007). “Online supervised spam filter evaluation.” ACM Transaction on Information Systems, Vol. 25(3) 27
  • 28. Gene Moo Lee, KAIST, Feb 2015 References (2) [12] D’Arcy, John, Anat Hovav, and Dennis Galletta (2009). "User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach." Information Systems Research 20, no. 1: pp. 79-98. [13] Denning, Dorothy E. (1987). “An intrusion-detection model.” IEEE Transactions on Software Engineering, Vol. 13(2): pp. 222-232. [14] Dharmapurikar, Sarang, Praveen Krishnamurthy, and David E. Taylor (2003). “Longest prefix matching using bloom filters.” Proceedings of the ACM SIGCOMM Conference: pp. 201-212. [15] Dice, Lee R. (1945). “Measures of the amount of ecologic association between species.” Ecology 26(3): pp. 297-302. [16] Duflo, Esther, Rachel Glennerster, and Michael Kremer. "Using randomization in development economics research: A toolkit." Handbook of development economics 4 (2007): 3895-3962. [17] Fracassi, Cesare (2014). "Corporate finance policies and social networks." In AFA 2011 Denver Meetings Paper. [18] Festinger, Leon. "A theory of social comparison processes." Human relations 7, no. 2 (1954): 117-140. [19] Gal-Or, Esther, and Anindya Ghose (2005). "The economic incentives for sharing security information." Information Systems Research 16, no. 2: pp. 186-208. [20] Graham, Bryan S. (2008). "Identifying social interactions through conditional variance restrictions." Econometrica 76, no. 3: pp. 643-660. [21] Harper, Yan Chen, F. Maxwell, Joseph Konstan, and Sherry Xin Li. "Social comparisons and contributions to online communities: A field experiment on movielens." The American economic review (2010): 1358-1398. [22] Harrison, Glenn W., and John A. List (2004). "Field experiments." Journal of Economic Literature: pp. 1009-1055. [23] Kugler, Logan (2014). “Online Privacy: Regional Differences.” Communications of the ACM, Vol. 58 No. 2, pp. 18-20. 28
  • 29. Gene Moo Lee, KAIST, Feb 2015 References (3) [24] Krebs, Brian (2014). Spam Nation: The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door. Sourcebooks, Inc. [25] Lee, Wenke, and Salvatore J. Stolfo (1998). “Data mining approaches for intrusion detection.” Proceedings of 7th USENIX Security Symposium. [26] Levchenko, Kirill, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage (2011). "Click Trajectories: End-to-End Analysis of the Spam Value Chain." IEEE Symposium on Security and Privacy. [27] Moore, Tyler and Richard Clayton (2011). "The Impact of Public Information on Phishing Attack and Defense." Communications & Strategies 81. [28] Morgan, Kari Lock, and Donald B. Rubin (2012). "Rerandomization to improve covariate balance in experiments." Annals of Statistics 40, no. 2: pp. 1263-1282. [29] Popadak, Jillian A. (2012). "Dividend Payments as a Response to Peer Influence." Available at SSRN 2170561, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2170561. [30] Pitsillidis, Andreas, Chris Kanich, Geoffrey M Voelker, Kirill Levchenko, Stefan Savage (2012). “Taster’s choice: A comparative analysis of spam feeds.” Proceedings of the 2012 ACM Internet Meassure Conference: pp. 427-440. [31] Rao, Justin M., and David H. Reiley (2012). "The economics of spam." Journal of Economic Perspectives 26, no. 3: pp. 87-110. [32] Roesch, Martin (1999). “SNORT: Lightweight intrusion detection for networks.” Proceedings of 13th Large Installation System Administration Conference, pp. 229-238. [33] Rothschild, Michael, and Joseph Stiglitz (1992). “Equilibrium in competitive insurance markets: An essay on the economics of imperfect information.” Springer Netherlands. [34] Sahami, Mehran, Susan Dumais, David Heckerman, and Eric Horvitz (1998). “A Bayesian approach to filtering junk e-mail.” Learning for Text Categorization 62: pp. 98-105. 29
  • 30. Gene Moo Lee, KAIST, Feb 2015 References (4) [35] Shue, Kelly (2013). "Executive networks and firm policies: Evidence from the random assignment of MBA peers." Review of Financial Studies 26, no. 6: pp. 1401-1442. [36] Tang, Qian, Leigh Linden, John S. Quarterman, and Andrew B. Whinston (2013). “Improving Internet security through social information and social comparison: A field quasi-experiment.” In Workshop on the Economics of Information Security. [37] Taylor, Robert W., Eric J. Fritsch, and John Liederbach (2014). Digital crime and digital terrorism. Prentice Hall Press. [38] Taylor, Shelley E., and Marci Lobel (1989). "Social comparison activity under threat: downward evaluation and upward contacts." Psychological review 96, no. 4: p. 569. [39] van Eeten, M., H. Asghari, J. M. Bauer, and S. Tabatabaie (2011). "Internet service providers and botnet mitigation: A fact-finding study on the Dutch market." Delft University of Technology. [40] Wood, Dallas, and Brent Rowe (2011). "Assessing home Internet users’ demand for security: Will they pay ISPs?" Workshop of Economics of Information Security. 30