SlideShare a Scribd company logo
1 of 13
Alan Nochenson
IST 501
10/9/2012
   Launched in 2005
   Allows requestors to post Human Interface
    Tasks (HITs) which are completed by people
    for a small prices
   Security: “The state of being free from
    danger or threat.”
   Privacy: “The state or condition of being free
    from being observed or disturbed by other
    people.”
   Behavioral economics: concerned with
    decision-making and rationality
   E.g. Grossklags UPSEC ‘08
     Recruited participants in from a university into a
      lab study
     Had them play an economic game (weakest link)
      in a security context
     Compared actual behavior to predicted behavior
      and found a number of differences
     Small scale, time-consuming to organize
   Online surveys and simple task-based surveys
     Facebook privacy desired settings (Liu et al.)
     Targeted ad taglines (Leon et al.)
     Comparing privacy policy designs (Kelley et al.)
   More involved uses
     Phishing susceptibility (Sheng et al.)




     Malware installations (Christin et al., Kanich et al.)
   Study by Christin et al. aimed to see how
    much you need to pay people to install an
    unknown application
   70% of participants that ran the program
    realized the danger
   Follow up by Kanich et al.
     Investigated what vulnerabilities were active on
      computers of people that downloaded the
      program
     Found that it costs about $50 to infect 1000 hosts
      (taking into account payment and vulnerability
      rates)
   Incentives (payment)
   Validity
     Demographics
     Habitual participants
     Online effects (Horton et al., Paolacci et al.)
     Attrition
     Cheating
     Ethics/legality
501 Presentation 10-9
501 Presentation 10-9

More Related Content

What's hot

An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the WorkplaceTawny Brown
 
TAROT2013 Testing School - Antonia Bertolino presentation
TAROT2013 Testing School - Antonia Bertolino presentationTAROT2013 Testing School - Antonia Bertolino presentation
TAROT2013 Testing School - Antonia Bertolino presentationHenry Muccini
 
Taming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and PolicyTaming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and PolicyAnsgar Koene
 
Issues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behaviorgloriakt
 
AI and us communicating for algorithmic bias awareness
AI and us communicating for algorithmic bias awarenessAI and us communicating for algorithmic bias awareness
AI and us communicating for algorithmic bias awarenessAnsgar Koene
 
The Age of Algorithms
The Age of AlgorithmsThe Age of Algorithms
The Age of AlgorithmsAnsgar Koene
 
IEEE P7003 at ICSE Fairware 2018
IEEE P7003 at ICSE Fairware 2018IEEE P7003 at ICSE Fairware 2018
IEEE P7003 at ICSE Fairware 2018Ansgar Koene
 
Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...The Higher Education Academy
 
A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017Ansgar Koene
 
Presentation1
Presentation1Presentation1
Presentation1khanbipo
 
Five Trends that will Impact IT
Five Trends that will Impact ITFive Trends that will Impact IT
Five Trends that will Impact ITHolly Ross
 

What's hot (14)

An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the Workplace
 
TAROT2013 Testing School - Antonia Bertolino presentation
TAROT2013 Testing School - Antonia Bertolino presentationTAROT2013 Testing School - Antonia Bertolino presentation
TAROT2013 Testing School - Antonia Bertolino presentation
 
Taming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and PolicyTaming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and Policy
 
Issues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behavior
 
AI and us communicating for algorithmic bias awareness
AI and us communicating for algorithmic bias awarenessAI and us communicating for algorithmic bias awareness
AI and us communicating for algorithmic bias awareness
 
The Age of Algorithms
The Age of AlgorithmsThe Age of Algorithms
The Age of Algorithms
 
IEEE P7003 at ICSE Fairware 2018
IEEE P7003 at ICSE Fairware 2018IEEE P7003 at ICSE Fairware 2018
IEEE P7003 at ICSE Fairware 2018
 
Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...
 
Extended abstract slides
Extended abstract slidesExtended abstract slides
Extended abstract slides
 
A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017
 
Presentation1
Presentation1Presentation1
Presentation1
 
Aspa ai webinar
Aspa   ai webinarAspa   ai webinar
Aspa ai webinar
 
03.ethics
03.ethics03.ethics
03.ethics
 
Five Trends that will Impact IT
Five Trends that will Impact ITFive Trends that will Impact IT
Five Trends that will Impact IT
 

Similar to 501 Presentation 10-9

Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdfTwin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdfSreevalsan V.K.
 
In defence of the human factor
In defence of the human factorIn defence of the human factor
In defence of the human factorCiarán Mc Mahon
 
INTRODUCTION This chapter will focus on the causes o.docx
     INTRODUCTION  This chapter will focus on the causes o.docx     INTRODUCTION  This chapter will focus on the causes o.docx
INTRODUCTION This chapter will focus on the causes o.docxhallettfaustina
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?IJCNCJournal
 
Social engineering - Ingeniería social
Social engineering - Ingeniería socialSocial engineering - Ingeniería social
Social engineering - Ingeniería socialNeuromon 21
 
Respond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxRespond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxdaynamckernon
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
After reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxAfter reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxrosiecabaniss
 
Respond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxRespond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxdaynamckernon
 
RATIO ANALYSIS RATIO ANALYSIS Note Please change the column names.docx
RATIO ANALYSIS RATIO ANALYSIS Note Please change the column names.docxRATIO ANALYSIS RATIO ANALYSIS Note Please change the column names.docx
RATIO ANALYSIS RATIO ANALYSIS Note Please change the column names.docxaudeleypearl
 
Privacy tool osha comments
Privacy tool osha commentsPrivacy tool osha comments
Privacy tool osha commentsMicah Altman
 
Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Ann Johnson
 
httpojni.orgissuesp=1708 August 13, 2012The Ethics of.docx
httpojni.orgissuesp=1708 August 13, 2012The Ethics of.docxhttpojni.orgissuesp=1708 August 13, 2012The Ethics of.docx
httpojni.orgissuesp=1708 August 13, 2012The Ethics of.docxadampcarr67227
 
Outline D
Outline DOutline D
Outline Dbutest
 
All About Phishing Exploring User Research Through A Systematic Literature R...
All About Phishing  Exploring User Research Through A Systematic Literature R...All About Phishing  Exploring User Research Through A Systematic Literature R...
All About Phishing Exploring User Research Through A Systematic Literature R...Gina Rizzo
 
Observational research methods
Observational research methodsObservational research methods
Observational research methodsChrisSwanson37
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were assimba35
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Designgloriakt
 
Evaluating the effectiveness of situational crime prevention tec.docx
Evaluating the effectiveness of situational crime prevention tec.docxEvaluating the effectiveness of situational crime prevention tec.docx
Evaluating the effectiveness of situational crime prevention tec.docxturveycharlyn
 

Similar to 501 Presentation 10-9 (20)

Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdfTwin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
 
In defence of the human factor
In defence of the human factorIn defence of the human factor
In defence of the human factor
 
INTRODUCTION This chapter will focus on the causes o.docx
     INTRODUCTION  This chapter will focus on the causes o.docx     INTRODUCTION  This chapter will focus on the causes o.docx
INTRODUCTION This chapter will focus on the causes o.docx
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
 
Social engineering - Ingeniería social
Social engineering - Ingeniería socialSocial engineering - Ingeniería social
Social engineering - Ingeniería social
 
Respond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxRespond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docx
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
After reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxAfter reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docx
 
Respond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxRespond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docx
 
RATIO ANALYSIS RATIO ANALYSIS Note Please change the column names.docx
RATIO ANALYSIS RATIO ANALYSIS Note Please change the column names.docxRATIO ANALYSIS RATIO ANALYSIS Note Please change the column names.docx
RATIO ANALYSIS RATIO ANALYSIS Note Please change the column names.docx
 
ISSC451 Cybercrime.docx
ISSC451 Cybercrime.docxISSC451 Cybercrime.docx
ISSC451 Cybercrime.docx
 
Privacy tool osha comments
Privacy tool osha commentsPrivacy tool osha comments
Privacy tool osha comments
 
Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...
 
httpojni.orgissuesp=1708 August 13, 2012The Ethics of.docx
httpojni.orgissuesp=1708 August 13, 2012The Ethics of.docxhttpojni.orgissuesp=1708 August 13, 2012The Ethics of.docx
httpojni.orgissuesp=1708 August 13, 2012The Ethics of.docx
 
Outline D
Outline DOutline D
Outline D
 
All About Phishing Exploring User Research Through A Systematic Literature R...
All About Phishing  Exploring User Research Through A Systematic Literature R...All About Phishing  Exploring User Research Through A Systematic Literature R...
All About Phishing Exploring User Research Through A Systematic Literature R...
 
Observational research methods
Observational research methodsObservational research methods
Observational research methods
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
Evaluating the effectiveness of situational crime prevention tec.docx
Evaluating the effectiveness of situational crime prevention tec.docxEvaluating the effectiveness of situational crime prevention tec.docx
Evaluating the effectiveness of situational crime prevention tec.docx
 

501 Presentation 10-9

  • 2. Launched in 2005  Allows requestors to post Human Interface Tasks (HITs) which are completed by people for a small prices
  • 3.
  • 4. Security: “The state of being free from danger or threat.”  Privacy: “The state or condition of being free from being observed or disturbed by other people.”  Behavioral economics: concerned with decision-making and rationality
  • 5. E.g. Grossklags UPSEC ‘08  Recruited participants in from a university into a lab study  Had them play an economic game (weakest link) in a security context  Compared actual behavior to predicted behavior and found a number of differences  Small scale, time-consuming to organize
  • 6. Online surveys and simple task-based surveys  Facebook privacy desired settings (Liu et al.)  Targeted ad taglines (Leon et al.)  Comparing privacy policy designs (Kelley et al.)
  • 7. More involved uses  Phishing susceptibility (Sheng et al.)  Malware installations (Christin et al., Kanich et al.)
  • 8. Study by Christin et al. aimed to see how much you need to pay people to install an unknown application
  • 9. 70% of participants that ran the program realized the danger
  • 10. Follow up by Kanich et al.  Investigated what vulnerabilities were active on computers of people that downloaded the program  Found that it costs about $50 to infect 1000 hosts (taking into account payment and vulnerability rates)
  • 11. Incentives (payment)  Validity  Demographics  Habitual participants  Online effects (Horton et al., Paolacci et al.)  Attrition  Cheating  Ethics/legality