SlideShare a Scribd company logo
1 of 64
©2015CarnegieMellonUniversity:1
Social Cybersecurity
Applying Social Psychology
to Cybersecurity
Laura Dabbish
Sauvik Das
Jason Hong
July 31, 2017
Computer
Human
Interaction:
Mobility
Privacy
Security
©2017CarnegieMellonUniversity:2
How can we design systems that
encourage better cybersecurity
behaviors?
©2017CarnegieMellonUniversity:3
Today, Cybersecurity is Something People
Tolerate, If Not Ignore
©2017CarnegieMellonUniversity:4
But Sometimes People Do Change Their
Cybersecurity Behaviors
• What makes people decide to add a PIN to
their phone?
• What makes people decide to change their
passwords?
• What makes people decide to adopt two-
factor authentication?
©2017CarnegieMellonUniversity:5
"When I first had a smartphone
I didn’t have a code, but then I
started using one because
everyone around me had a
code so I kind of felt a group
pressure to also use a code."
©2017CarnegieMellonUniversity:6
"One of my boys wanted
to use my phone for
something so I gave them
my passcode. And not that
I have anything that I don’t
care for them to see or
anything, but after they
did that then I changed it
again."
©2017CarnegieMellonUniversity:7
"my friends...have a lot of
different accounts, the same as
me. But they didn't get into
any trouble. So I think maybe it
will not be dangerous [to reuse
passwords]."
©2017CarnegieMellonUniversity:8
Some Cybersecurity Behaviors Seem to
Have a Social Dimension
• Over 40% of behavior changes had some
kind of social dimension to it
• Security behavior, like any human behavior,
is driven in part by social trends
– Learning new things from other people
– Seeing what others do
– Listening to what others say or talk about
©2017CarnegieMellonUniversity:9
Cybersecurity Research Today
• Most research focuses on the computer itself
– Protocols, cryptography, static analysis
• Also some research on individuals
– Usability of tools, passwords, smartphones
• But very little on groups of people
– How the design of tools might affect diffusion
– Improving people’s awareness and adoption
– I’ll talk about our team’s work in this area today
©2017CarnegieMellonUniversity:10
About Me
• Computer scientist by training
• Research in mobility, privacy, and security
– Designing UIs, building systems, using ML
– Internet of Things: software infrastructures,
analyzing network traffic, notifications
– Smartphones: helping developers, analyzing
smartphone apps (PrivacyGrade.org)
– Anti-phishing: why people fall for attacks, how
to detect fake web pages, Wombat Security
©2017CarnegieMellonUniversity:11
Today: Social Cybersecurity
• Today’s talk is unusual for me
– Not a system, and driven by theory
• Talk ~40min about social cybersecurity
– Will also reflect on the research as I go
– Ex. The role of theory, why doesn’t computer
science have more theory, dissemination, etc
• Feel free to ask questions throughout
©2017CarnegieMellonUniversity:12
The Origin of this Research
Did you hear what happened
to Moe? He slipped on ice
and damaged his laptop. Now
he can’t get his data.
©2017CarnegieMellonUniversity:13
The Origin of this Research
Did you hear what happened
to Moe? He slipped on ice
and damaged his laptop. Now
he can’t get his data.
I’m going to back
up my data right
now!
©2017CarnegieMellonUniversity:14
Light Bulb Moment
• Hung around behavioral scientists in my
department for many years
– HCII has designers, compsci, psych sitting near
each other and working together
– Learned basics of social psych thru osmosis
• Realized that this simple social interaction led
to desirable action
©2017CarnegieMellonUniversity:15
Social Proof
©2017CarnegieMellonUniversity:16
• Baseline effectiveness is 35%
©2017CarnegieMellonUniversity:17
©2017CarnegieMellonUniversity:18
• “showing each user pictures of friends who
said they had already voted, generated
340,000 additional votes nationwide”
• “they also discovered that about 4 percent of
those who claimed they had voted were not
telling the truth”
©2017CarnegieMellonUniversity:19
Energy Consumption
©2017CarnegieMellonUniversity:20
Energy Consumption
©2017CarnegieMellonUniversity:21
Social Cybersecurity
• Observation: useful security features still
rarely adopted by general population
• Pop Quiz: How many of you have heard of /
use these features?
– Login Approvals (two-factor authentication)
– Login notifications on Facebook
– Trusted contacts on Facebook
©2017CarnegieMellonUniversity:22
Login Notifications
©2017CarnegieMellonUniversity:23
Trusted Contacts
©2017CarnegieMellonUniversity:24
Social Cybersecurity
• Adoption rate typically single digits [Das et al 2015]
• This doesn’t seem to be just functionality
• This doesn’t seem to be just usability either
• Not much point in building new security
features if people don’t adopt good ones today
©2017CarnegieMellonUniversity:25
Reflection 1
Need New Ideas for Longstanding Problems
• Cybersecurity research somewhat stuck in
its approaches
• Diminishing returns in cybersecurity, need
new ideas and perspectives
– See Lakhani08 paper on Innocentive
©2017CarnegieMellonUniversity:26
Reflection 2
Computer Science Tends to Have Little Theory
• CompSci rarely uses or builds theory
– Math: algorithms, type theory, machine learning
– HCI: Fitts’ law, visual perception, info foraging
– Security: crypto
• CompSci has a fair amount of model building
and design principles
– Models: passwords, phishing, bug finding, biometrics
– Principles: TOCTOU, least privilege, layered security
©2017CarnegieMellonUniversity:27
Reflection 2
Computer Science Tends to Have Little Theory
• Much of CompSci is showing that something
can be done, and/or how to do it better
– They offer insight, sometimes new models and
new principles
– Often not predictive power or generalizability
• Examples from IEEE Security and Privacy 2017
– Measurements of malware
– Two permissions to take over smartphones
– How Volkswagen defeat devices worked
– Multi-touch authentication using hand geometry
©2017CarnegieMellonUniversity:28
Reflection 2
Computer Science Tends to Have Little Theory
• This lack of theory isn’t necessarily bad
– But it’s also pretty intrinsic to how CompSci works
• Science of the artificial
– Outside of speed of light, few limits to computing
– We make a lot of the rules, and mostly limited by
our imagination, market, and computing context
• Compare to natural sciences
– Only one way DNA works
– Only one way brain circuit works
– (And only one research team can win)
©2017CarnegieMellonUniversity:29
Reflection 3
An Opportunity for Behavioral Sciences
• Cybersecurity needs new ideas + CompSci
tends to have little theory = Opportunity
– New source of ideas (about individual and group
behaviors) for solving hard problems
– New kinds of methods for understanding,
analyzing, and designing solutions
©2017CarnegieMellonUniversity:30
Social Cybersecurity
Our Team’s Work to Date
• Interviews about why people changed
behaviors and what they talk about with
others [SOUPS 2014]
• Study w/ Facebook evaluating social
interventions [CCS 2014]
• Analysis of who does and doesn’t adopt
features [CSCW 2015]
©2017CarnegieMellonUniversity:31
Semi-Structured Interviews about Recent
Changes to Security Behaviors
• Interviewed 19 people
– Mobile authentication (e.g. PIN)
– App installation / uninstallation
– Online privacy settings
• What caused the change?
• Hear about incident thru a friend?
• Talk to others about the change?
Das, S., H.J. Kim, L. Dabbish, and J.I. Hong. The Effect of Social
Influence on Security Sensitivity. SOUPS 2014.
©2017CarnegieMellonUniversity:32
Cybersec Behavior Changes
• 114 behavior changes coded (grounded theory)
• 48 had social influences (42%)
– Observing friends (14 of 48)
– Social sensemaking (9 of 48)
– Pranks and demonstrations (8)
– Experiencing security breach (6)
– Sharing access (3)
©2017CarnegieMellonUniversity:33
Insight: Observability
• One person stopped in coffee shop and asked
about the Android 9-dot:
“We were just sitting in a
coffee shop and I wanted
to show somebody
something and [they said], ‘
My phone does not have
that,’ and I was like, ‘I
believe it probably does.’”
©2017CarnegieMellonUniversity:34
Diffusion of Innovations
• Five major factors
for successful
innovations:
– Relative Advantage
– Trialability
– Complexity
– Compatibility
– Observability
©2017CarnegieMellonUniversity:35
Most Cybersecurity not very Observable
• How strong are Matt’s passwords?
• What privacy settings does Astrid have for
Facebook?
• What does Elizabeth look for to avoid
phishing attacks?
• Low observability -> hard for good practices
to diffuse and be adopted
©2017CarnegieMellonUniversity:36
Social Proof + Observability
• Variants
– Control
– Over # / %
– Only # / %
– Raw # / %
– Some
Das, S., A. Kramer, L. Dabbish, J.I. Hong. Increasing Security Sensitivity
With Social Proof: A Large-Scale Experimental Confirmation. CCS 2014.
©2017CarnegieMellonUniversity:37
Method
• Controlled, randomized study
with 50k active Facebook users
– 8 conditions, so N=6250
• Part of annual security awareness campaign
Facebook was going to run anyway
©2017CarnegieMellonUniversity:38
Results of Experiment
©2017CarnegieMellonUniversity:39
Social Influences on Adoption
• Analyzed 1.5M people on Facebook
– Matched propensity sampling to distinguish
between homophily vs social influence
• People with similar characteristics but different levels
of friends using a security feature
– 750k users of features and 750 use-nots
– Collected over 12 days, evenly across 3 features
• Login notifications, login approvals, trusted contacts
– No interventions, existing behaviors only
Das, S., A.D.I. Kramer, L. Dabbish, J.I.Hong. The Role of Social Influence
In Security Feature Adoption. CSCW 2015.
©2017CarnegieMellonUniversity:40
©2017CarnegieMellonUniversity:41
Insight: Social Factors Might Work
Against Adoption
• A lot of early adopters tend to be:
– People with clear reason (e.g. job), or
– Security experts
• Often viewed as “Nutty” or paranoid [Gaw et al 06]
• Disaffiliation due to external factors
©2017CarnegieMellonUniversity:42
Who Uses What Computer?
• “These people aren’t like me”
– (Regardless of whether true or not)
©2017CarnegieMellonUniversity:43
Ongoing Challenges + Opportunities
Observability
How can we make it easier for people to
observe and emulate good security behaviors?
Can we make security behaviors more
observable while still preserving safety of
system and individuals?
©2017CarnegieMellonUniversity:44
Ongoing Challenges + Opportunities
Inclusiveness
How can we design additive security systems
that make group security a sum instead of a
min function?
Can we design more systems for groups of
people to be effective in protecting others?
©2017CarnegieMellonUniversity:45
Ongoing Challenges + Opportunities
Stewardship
How can we design systems that allow people
to act on their concern for the security of their
loved ones?
©2017CarnegieMellonUniversity:46
©2017CarnegieMellonUniversity:47
©2017CarnegieMellonUniversity:48
©2017CarnegieMellonUniversity:49
Reflection 4
Be Prepared for Culture Mismatch
• This work came about primarily because of
structure of my department
– Proximity of designers, compsci, psych
– Students cross-trained in these areas
– Easy co-advising
– One discipline not in service to another
– Shared funding and publication model
©2017CarnegieMellonUniversity:50
Reflection 4
Be Prepared for Culture Mismatch
• Most CompSci work
– How to build things better
• Problem -> solution
– Mostly atheoretical
– Mostly design, build, and evaluate
• Most behavioral work
– Understanding world better
– Mostly about theory
– Mostly solely on evaluation
©2017CarnegieMellonUniversity:51
Newell’s Time
Bands of Cognition
©2017CarnegieMellonUniversity:52
Newell’s Time
Bands of Cognition
Computational
Most traditional
computer security
focuses here (and often
just the computer)
©2017CarnegieMellonUniversity:53
Newell’s Time
Bands of Cognition
Computational
Most usable security
focuses here, and often
just one person (or a
few people)
©2017CarnegieMellonUniversity:54
Newell’s Time
Bands of Cognition
Computational
Little understanding of
cybersecurity here
(larger time scales,
larger groups of people)
©2017CarnegieMellonUniversity:55
Closing
• Social cybersecurity
– One line of research combining behavioral
sciences + cybersecurity
– Drawn from theory, data analysis at scale, practical
• Reflections
– Cybersecurity needs new ideas
– CompSci tends to be atheoretical
– Opportunity for behavioral sciences here
– But lots of challenges and pitfalls to collaboration
©2017CarnegieMellonUniversity:56
©2017CarnegieMellonUniversity:57
Recommendations
• Give tutorials on behavioral methods at
some top security venues (CCS, Usenix Sec,
IEEE S&P)
• Vice versa for the different behavioral scienc
es
• Invited tutorials for SaTC PI meeting
• Offer funding to travel to these venues to
understand methods, values, potential
partners
– Focus on people “closer” to other side
©2017CarnegieMellonUniversity:58
Reflection
Good Theory Offers Vocabulary
• If we weren’t aware of Diffusion of
Innovations, might have overlooked the
comments about Observability
• Act of having a name focuses
©2017CarnegieMellonUniversity:59
Why Little Theory Building in CompSci?
• Is it because it’s engineering?
– I would say no
– Civil Eng has traffic modeling, materials
– MechE has heat transfer, mass transfer
– EE has AC theory, circuit models, signal
©2017CarnegieMellonUniversity:60
Why Little Theory Building in Tech HCI?
• No clear natural objective function
• Instead, goal of Tech HCI is to:
– Expand frontiers of what’s possible (expand our
imagination)
– Sweep parameter space to understand principles
and tradeoffs
• And while Tech HCI doesn’t build theory, it will
occasionally use it
©2017CarnegieMellonUniversity:61
©2017CarnegieMellonUniversity:62
Cybersecurity Research
Empirical Measurements + Models
• Interviews or collection+analysis of data set
• Spamalytics
• How much money do spammers make?
• The state of {phishing, malware, DNS attacks}
• How is Bitcoin used today
• How do orgs handle phishing attacks?
©2017CarnegieMellonUniversity:63
Cybersecurity Research
New Techniques for the Security Toolbox
• Faster, better, cheaper
• New forms of authentication
• Better ways of protecting Tor
• Better ways of doing fuzz testing
• Role-based access control
• Sand-boxing of apps
©2017CarnegieMellonUniversity:64
Cybersecurity Research
New Vulnerabilities + Defenses
• “Here’s this interesting new problem…”
• Cloud computing data leaks
• Side channel attacks
• Voice-based interfaces
• Automobiles
• Tor anonymous routing

More Related Content

What's hot

Online reputation management survey presentation
Online reputation management survey presentationOnline reputation management survey presentation
Online reputation management survey presentation
Josep Claret
 

What's hot (20)

Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
 
Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013
 
10 reasons why now is the perfect time to get started with the mobile web
10 reasons why now is the perfect time to get started with the mobile web10 reasons why now is the perfect time to get started with the mobile web
10 reasons why now is the perfect time to get started with the mobile web
 
Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)
 
KPCB Internet Trends 2013
KPCB Internet Trends 2013KPCB Internet Trends 2013
KPCB Internet Trends 2013
 
Technology Adoption by Lower Income Populations
Technology Adoption by Lower Income PopulationsTechnology Adoption by Lower Income Populations
Technology Adoption by Lower Income Populations
 
Older Adults and Internet Use: (Some of) What we know
Older Adults and Internet Use: (Some of) What we knowOlder Adults and Internet Use: (Some of) What we know
Older Adults and Internet Use: (Some of) What we know
 
Jon Moser edSocialMedia Presentation at Loomis
Jon Moser edSocialMedia Presentation at LoomisJon Moser edSocialMedia Presentation at Loomis
Jon Moser edSocialMedia Presentation at Loomis
 
Older adults and technology
Older adults and technologyOlder adults and technology
Older adults and technology
 
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...
 
How Digital & Big Data Revolution Will Transform Primary Care Medicine
How Digital & Big Data Revolution Will Transform Primary Care MedicineHow Digital & Big Data Revolution Will Transform Primary Care Medicine
How Digital & Big Data Revolution Will Transform Primary Care Medicine
 
Mobile Gamification
Mobile GamificationMobile Gamification
Mobile Gamification
 
Networked worlds and networked enterprises
Networked worlds and networked enterprisesNetworked worlds and networked enterprises
Networked worlds and networked enterprises
 
Technology For Learning
Technology For Learning Technology For Learning
Technology For Learning
 
Improving Web Accessibility for the Elderly
Improving Web Accessibility for the ElderlyImproving Web Accessibility for the Elderly
Improving Web Accessibility for the Elderly
 
The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
 
Report: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAASReport: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAAS
 
Online reputation management survey presentation
Online reputation management survey presentationOnline reputation management survey presentation
Online reputation management survey presentation
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
Mobile Learning - Done Right
Mobile Learning - Done RightMobile Learning - Done Right
Mobile Learning - Done Right
 

Similar to Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuman Workshop July 2017

Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Jason Hong
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
Melissa Krasnow
 

Similar to Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuman Workshop July 2017 (20)

Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015
 
Social Media: Managing Risk
Social Media:  Managing RiskSocial Media:  Managing Risk
Social Media: Managing Risk
 
Jmrx 2014年3月ray poynter march 2014 v2 mx
Jmrx 2014年3月ray poynter march 2014 v2 mxJmrx 2014年3月ray poynter march 2014 v2 mx
Jmrx 2014年3月ray poynter march 2014 v2 mx
 
Accessible Privacy and Security
Accessible Privacy and SecurityAccessible Privacy and Security
Accessible Privacy and Security
 
Co-designing online safety with young people in a post-crisis world.pptx
Co-designing online safety with young people in a post-crisis world.pptxCo-designing online safety with young people in a post-crisis world.pptx
Co-designing online safety with young people in a post-crisis world.pptx
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
 
Less is More: An Empirical Investigation of the Relationship Between Amount o...
Less is More: An Empirical Investigation of the Relationship Between Amount o...Less is More: An Empirical Investigation of the Relationship Between Amount o...
Less is More: An Empirical Investigation of the Relationship Between Amount o...
 
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
 
How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
 
Unplug Yourself
Unplug YourselfUnplug Yourself
Unplug Yourself
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuman Workshop July 2017

Editor's Notes

  1. The main credit for all of this work goes to Sauvik Das Laura Dabbish and I helped with some of the formulation of the work, but Sauvik did all of the heavy lifting
  2. Excerpts from interviews we did (SOUPS 2014 paper)
  3. My ideas crystallized due to one incident at my company, Wombat Security Technologies
  4. Happened at Wombat Security Technologies, my company NOTE: Frank Ritter asked if the other person actually backed up the data, she actually did so immediately afterward, since she happened to have her portable HD with her.
  5. Pictures of Laura Dabbish, Sara Kiesler, Sue Fussell (now Cornell), Bob Kraut, Niki Kittur, Geoff Kaufman
  6. The draw of the crowd is devilishly strong There have been studies demonstrating that if you have lots of people looking up, pretty much every passerby will too
  7. http://www.carlsonschool.umn.edu/assets/118359.pdf Baseline environmental message was 35%
  8. Four kinds of flyers
  9. http://opower.com/uploads/library/file/2/understanding_and_motivating_energy_conservation_via_social_norms.pdf
  10. From our CSCW 2015 paper Table 2. Exposed condition prerequisites for each security feature. For example, if a user is “exposed” at E3 for login approvals, at least 1.3% of her friends must have adopted login approvals at the time of data collection.
  11. More heterogeneity -> more likely to be solved Further from field, more likely to solve Lakhani et al, 2007 http://www.hbs.edu/faculty/Publication%20Files/07-050.pdf Lakhani et al The Value of Openness in Scientific Problem Solving
  12. NOTE: Steve Whittaker brought up this topic afterward, that a lot of good theory can be built directly into toolkits. I had it in my backup slides, so it didn’t come up in the talk itself.
  13. https://www.ieee-security.org/TC/SP2017/program-papers.html
  14. Only one team can win, which is why I think Tech HCI folks are pretty friendly. I once heard from a person in the natural sciences that after you publish in Science or Nature, a dozen teams around the world will try to replicate your work and beat you to the next step. We are competing against each other, but not in the same way that folks in natural sciences are. Or as Ben Shneiderman once said, our field has more hugs per hour than any other field.
  15. The Effect of Social Influence on Security Sensitivity http://www.cmuchimps.org/uploads/publication/paper/147/the_effect_of_social_influence_on_security_sensitivity.pdf
  16. Das, S., A. Kramer, L. Dabbish, J.I. Hong. Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation. In The 21st ACM Conference on Computer and Communications Security (CCS 2014). 2014. [19.5% accept rate] http://www.cmuchimps.org/publications/increasing_security_sensitivity_with_social_proof_a_large_scale_experimental_confirmation_2014
  17. Results more subtle than presented in this table, see the CCS 2014 paper for details. The basics are there though, that social conditions worked better than control in almost every case
  18. NOTE: Cecilia Aragon protested that she uses Linux! I responded that I liked her beard. 
  19. Organizing groups of people, collective wisdom of crowds Harnessing a desire to want to protect others
  20. Originally cognitive psychology Now elements of social psych, learning sciences, anthro, design, econ (decision and behavioral econ), feminism Big open question as to how to train given so much breadth, defer the question
  21. Funding well-aligned Mostly NSF in our department Compare to departments that do mostly teaching and master’s students
  22. NOTE: Stu Card commented that this is one area where Tech HCI might use and even advance theory, relying on natural phenomena. For example, for Skinput, it might be natural phenomena of how waves propagate in a person’s arm. I think that’s true, that we can rely on natural phenomena, but that a lot of Tech HCI is still artificial in that we don’t have a lot of guidance as to what to build based on theory, nor do we advance “natural” theory.